aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts
diff options
context:
space:
mode:
authorThomas Lange <lange@debian.org>2024-01-09 20:01:07 +0100
committerThomas Lange <lange@debian.org>2024-01-09 20:01:07 +0100
commit2aa73ff15bfc4eb2afd85ca6d3ba081babf22432 (patch)
tree138d359f85bd93fc1849b19a5526da658eeb67cb /english/lts
parente005fa1933fbc76d8755c603a6a35feedb002e49 (diff)
remove unused security files
This is what I did: git rm -rf */security/199* git rm -rf */security/20* git rm -rf */security/key-rollover git rm -rf */security/undated git rm -rf */lts/security/20* It removes 54335 files, including around 9650 DSA/DLA data files, 44189 wml files, nearly 500 Makefiles
Diffstat (limited to 'english/lts')
-rw-r--r--english/lts/security/2014/Makefile25
-rw-r--r--english/lts/security/2014/dla-0001.data10
-rw-r--r--english/lts/security/2014/dla-0001.wml13
-rw-r--r--english/lts/security/2014/dla-0002.data10
-rw-r--r--english/lts/security/2014/dla-0002.wml12
-rw-r--r--english/lts/security/2014/dla-0003.data10
-rw-r--r--english/lts/security/2014/dla-0003.wml51
-rw-r--r--english/lts/security/2014/dla-0004.data10
-rw-r--r--english/lts/security/2014/dla-0004.wml12
-rw-r--r--english/lts/security/2014/dla-0005.data10
-rw-r--r--english/lts/security/2014/dla-0005.wml22
-rw-r--r--english/lts/security/2014/dla-0006.data10
-rw-r--r--english/lts/security/2014/dla-0006.wml15
-rw-r--r--english/lts/security/2014/dla-0007.data10
-rw-r--r--english/lts/security/2014/dla-0007.wml28
-rw-r--r--english/lts/security/2014/dla-0008.data10
-rw-r--r--english/lts/security/2014/dla-0008.wml36
-rw-r--r--english/lts/security/2014/dla-0009.data10
-rw-r--r--english/lts/security/2014/dla-0009.wml13
-rw-r--r--english/lts/security/2014/dla-0010.data10
-rw-r--r--english/lts/security/2014/dla-0010.wml16
-rw-r--r--english/lts/security/2014/dla-0011.data10
-rw-r--r--english/lts/security/2014/dla-0011.wml15
-rw-r--r--english/lts/security/2014/dla-0012.data10
-rw-r--r--english/lts/security/2014/dla-0012.wml13
-rw-r--r--english/lts/security/2014/dla-0013.data10
-rw-r--r--english/lts/security/2014/dla-0013.wml12
-rw-r--r--english/lts/security/2014/dla-0014.data10
-rw-r--r--english/lts/security/2014/dla-0014.wml38
-rw-r--r--english/lts/security/2014/dla-0015.data10
-rw-r--r--english/lts/security/2014/dla-0015.wml82
-rw-r--r--english/lts/security/2014/dla-0016.data10
-rw-r--r--english/lts/security/2014/dla-0016.wml11
-rw-r--r--english/lts/security/2014/dla-0018.data10
-rw-r--r--english/lts/security/2014/dla-0018.wml32
-rw-r--r--english/lts/security/2014/dla-0019.data10
-rw-r--r--english/lts/security/2014/dla-0019.wml46
-rw-r--r--english/lts/security/2014/dla-0021.data10
-rw-r--r--english/lts/security/2014/dla-0021.wml29
-rw-r--r--english/lts/security/2014/dla-0022.data10
-rw-r--r--english/lts/security/2014/dla-0022.wml14
-rw-r--r--english/lts/security/2014/dla-100.data10
-rw-r--r--english/lts/security/2014/dla-100.wml12
-rw-r--r--english/lts/security/2014/dla-101.data10
-rw-r--r--english/lts/security/2014/dla-101.wml13
-rw-r--r--english/lts/security/2014/dla-102.data10
-rw-r--r--english/lts/security/2014/dla-102.wml13
-rw-r--r--english/lts/security/2014/dla-103.data10
-rw-r--r--english/lts/security/2014/dla-103.wml78
-rw-r--r--english/lts/security/2014/dla-104.data10
-rw-r--r--english/lts/security/2014/dla-104.wml14
-rw-r--r--english/lts/security/2014/dla-105.data10
-rw-r--r--english/lts/security/2014/dla-105.wml13
-rw-r--r--english/lts/security/2014/dla-106.data10
-rw-r--r--english/lts/security/2014/dla-106.wml41
-rw-r--r--english/lts/security/2014/dla-107.data10
-rw-r--r--english/lts/security/2014/dla-107.wml15
-rw-r--r--english/lts/security/2014/dla-108.data10
-rw-r--r--english/lts/security/2014/dla-108.wml14
-rw-r--r--english/lts/security/2014/dla-109.data10
-rw-r--r--english/lts/security/2014/dla-109.wml16
-rw-r--r--english/lts/security/2014/dla-110.data10
-rw-r--r--english/lts/security/2014/dla-110.wml13
-rw-r--r--english/lts/security/2014/dla-111.data10
-rw-r--r--english/lts/security/2014/dla-111.wml13
-rw-r--r--english/lts/security/2014/dla-112.data10
-rw-r--r--english/lts/security/2014/dla-112.wml18
-rw-r--r--english/lts/security/2014/dla-113.data10
-rw-r--r--english/lts/security/2014/dla-113.wml28
-rw-r--r--english/lts/security/2014/dla-114.data10
-rw-r--r--english/lts/security/2014/dla-114.wml39
-rw-r--r--english/lts/security/2014/dla-115.data9
-rw-r--r--english/lts/security/2014/dla-115.wml14
-rw-r--r--english/lts/security/2014/dla-116.data10
-rw-r--r--english/lts/security/2014/dla-116.wml47
-rw-r--r--english/lts/security/2014/dla-117.data10
-rw-r--r--english/lts/security/2014/dla-117.wml26
-rw-r--r--english/lts/security/2014/dla-118.data10
-rw-r--r--english/lts/security/2014/dla-118.wml44
-rw-r--r--english/lts/security/2014/dla-119.data10
-rw-r--r--english/lts/security/2014/dla-119.wml15
-rw-r--r--english/lts/security/2014/dla-120.data10
-rw-r--r--english/lts/security/2014/dla-120.wml18
-rw-r--r--english/lts/security/2014/dla-121.data10
-rw-r--r--english/lts/security/2014/dla-121.wml14
-rw-r--r--english/lts/security/2014/dla-122.data10
-rw-r--r--english/lts/security/2014/dla-122.wml10
-rw-r--r--english/lts/security/2014/dla-123.data10
-rw-r--r--english/lts/security/2014/dla-123.wml11
-rw-r--r--english/lts/security/2014/dla-124.data10
-rw-r--r--english/lts/security/2014/dla-124.wml15
-rw-r--r--english/lts/security/2014/dla-125.data10
-rw-r--r--english/lts/security/2014/dla-125.wml17
-rw-r--r--english/lts/security/2014/dla-126.data10
-rw-r--r--english/lts/security/2014/dla-126.wml22
-rw-r--r--english/lts/security/2014/dla-17.data9
-rw-r--r--english/lts/security/2014/dla-17.wml23
-rw-r--r--english/lts/security/2014/dla-20.data10
-rw-r--r--english/lts/security/2014/dla-20.wml21
-rw-r--r--english/lts/security/2014/dla-23.data10
-rw-r--r--english/lts/security/2014/dla-23.wml35
-rw-r--r--english/lts/security/2014/dla-24.data10
-rw-r--r--english/lts/security/2014/dla-24.wml12
-rw-r--r--english/lts/security/2014/dla-25-2.data9
-rw-r--r--english/lts/security/2014/dla-25-2.wml13
-rw-r--r--english/lts/security/2014/dla-25-3.data10
-rw-r--r--english/lts/security/2014/dla-25-3.wml12
-rw-r--r--english/lts/security/2014/dla-25.data10
-rw-r--r--english/lts/security/2014/dla-25.wml33
-rw-r--r--english/lts/security/2014/dla-26.data10
-rw-r--r--english/lts/security/2014/dla-26.wml11
-rw-r--r--english/lts/security/2014/dla-27.data10
-rw-r--r--english/lts/security/2014/dla-27.wml57
-rw-r--r--english/lts/security/2014/dla-28.data10
-rw-r--r--english/lts/security/2014/dla-28.wml13
-rw-r--r--english/lts/security/2014/dla-29.data10
-rw-r--r--english/lts/security/2014/dla-29.wml12
-rw-r--r--english/lts/security/2014/dla-30.data10
-rw-r--r--english/lts/security/2014/dla-30.wml12
-rw-r--r--english/lts/security/2014/dla-31.data10
-rw-r--r--english/lts/security/2014/dla-31.wml12
-rw-r--r--english/lts/security/2014/dla-32.data10
-rw-r--r--english/lts/security/2014/dla-32.wml13
-rw-r--r--english/lts/security/2014/dla-33.data10
-rw-r--r--english/lts/security/2014/dla-33.wml18
-rw-r--r--english/lts/security/2014/dla-34.data10
-rw-r--r--english/lts/security/2014/dla-34.wml14
-rw-r--r--english/lts/security/2014/dla-35.data10
-rw-r--r--english/lts/security/2014/dla-35.wml11
-rw-r--r--english/lts/security/2014/dla-36.data10
-rw-r--r--english/lts/security/2014/dla-36.wml10
-rw-r--r--english/lts/security/2014/dla-37.data10
-rw-r--r--english/lts/security/2014/dla-37.wml53
-rw-r--r--english/lts/security/2014/dla-38.data10
-rw-r--r--english/lts/security/2014/dla-38.wml25
-rw-r--r--english/lts/security/2014/dla-39.data10
-rw-r--r--english/lts/security/2014/dla-39.wml14
-rw-r--r--english/lts/security/2014/dla-40.data10
-rw-r--r--english/lts/security/2014/dla-40.wml16
-rw-r--r--english/lts/security/2014/dla-41.data10
-rw-r--r--english/lts/security/2014/dla-41.wml12
-rw-r--r--english/lts/security/2014/dla-42.data10
-rw-r--r--english/lts/security/2014/dla-42.wml13
-rw-r--r--english/lts/security/2014/dla-43.data10
-rw-r--r--english/lts/security/2014/dla-43.wml34
-rw-r--r--english/lts/security/2014/dla-44.data10
-rw-r--r--english/lts/security/2014/dla-44.wml11
-rw-r--r--english/lts/security/2014/dla-45.data10
-rw-r--r--english/lts/security/2014/dla-45.wml15
-rw-r--r--english/lts/security/2014/dla-46.data10
-rw-r--r--english/lts/security/2014/dla-46.wml14
-rw-r--r--english/lts/security/2014/dla-47.data10
-rw-r--r--english/lts/security/2014/dla-47.wml10
-rw-r--r--english/lts/security/2014/dla-48.data10
-rw-r--r--english/lts/security/2014/dla-48.wml13
-rw-r--r--english/lts/security/2014/dla-49.data10
-rw-r--r--english/lts/security/2014/dla-49.wml12
-rw-r--r--english/lts/security/2014/dla-50.data10
-rw-r--r--english/lts/security/2014/dla-50.wml32
-rw-r--r--english/lts/security/2014/dla-51.data10
-rw-r--r--english/lts/security/2014/dla-51.wml13
-rw-r--r--english/lts/security/2014/dla-52.data9
-rw-r--r--english/lts/security/2014/dla-52.wml12
-rw-r--r--english/lts/security/2014/dla-53.data10
-rw-r--r--english/lts/security/2014/dla-53.wml16
-rw-r--r--english/lts/security/2014/dla-54.data10
-rw-r--r--english/lts/security/2014/dla-54.wml15
-rw-r--r--english/lts/security/2014/dla-55.data10
-rw-r--r--english/lts/security/2014/dla-55.wml12
-rw-r--r--english/lts/security/2014/dla-56.data10
-rw-r--r--english/lts/security/2014/dla-56.wml14
-rw-r--r--english/lts/security/2014/dla-57.data10
-rw-r--r--english/lts/security/2014/dla-57.wml12
-rw-r--r--english/lts/security/2014/dla-58-2.data10
-rw-r--r--english/lts/security/2014/dla-58-2.wml18
-rw-r--r--english/lts/security/2014/dla-58-3.data10
-rw-r--r--english/lts/security/2014/dla-58-3.wml18
-rw-r--r--english/lts/security/2014/dla-58.data10
-rw-r--r--english/lts/security/2014/dla-58.wml37
-rw-r--r--english/lts/security/2014/dla-59.data10
-rw-r--r--english/lts/security/2014/dla-59.wml15
-rw-r--r--english/lts/security/2014/dla-60.data10
-rw-r--r--english/lts/security/2014/dla-60.wml14
-rw-r--r--english/lts/security/2014/dla-61.data10
-rw-r--r--english/lts/security/2014/dla-61.wml13
-rw-r--r--english/lts/security/2014/dla-62.data10
-rw-r--r--english/lts/security/2014/dla-62.wml20
-rw-r--r--english/lts/security/2014/dla-63.data10
-rw-r--r--english/lts/security/2014/dla-63.wml19
-rw-r--r--english/lts/security/2014/dla-64.data10
-rw-r--r--english/lts/security/2014/dla-64.wml16
-rw-r--r--english/lts/security/2014/dla-65.data10
-rw-r--r--english/lts/security/2014/dla-65.wml92
-rw-r--r--english/lts/security/2014/dla-66.data10
-rw-r--r--english/lts/security/2014/dla-66.wml21
-rw-r--r--english/lts/security/2014/dla-67.data10
-rw-r--r--english/lts/security/2014/dla-67.wml40
-rw-r--r--english/lts/security/2014/dla-68.data10
-rw-r--r--english/lts/security/2014/dla-68.wml32
-rw-r--r--english/lts/security/2014/dla-69.data10
-rw-r--r--english/lts/security/2014/dla-69.wml12
-rw-r--r--english/lts/security/2014/dla-70.data10
-rw-r--r--english/lts/security/2014/dla-70.wml13
-rw-r--r--english/lts/security/2014/dla-71.data10
-rw-r--r--english/lts/security/2014/dla-71.wml26
-rw-r--r--english/lts/security/2014/dla-72-2.data9
-rw-r--r--english/lts/security/2014/dla-72-2.wml12
-rw-r--r--english/lts/security/2014/dla-72.data10
-rw-r--r--english/lts/security/2014/dla-72.wml29
-rw-r--r--english/lts/security/2014/dla-73.data9
-rw-r--r--english/lts/security/2014/dla-73.wml13
-rw-r--r--english/lts/security/2014/dla-74.data10
-rw-r--r--english/lts/security/2014/dla-74.wml18
-rw-r--r--english/lts/security/2014/dla-75.data10
-rw-r--r--english/lts/security/2014/dla-75.wml32
-rw-r--r--english/lts/security/2014/dla-76.data10
-rw-r--r--english/lts/security/2014/dla-76.wml11
-rw-r--r--english/lts/security/2014/dla-77.data10
-rw-r--r--english/lts/security/2014/dla-77.wml13
-rw-r--r--english/lts/security/2014/dla-78.data10
-rw-r--r--english/lts/security/2014/dla-78.wml13
-rw-r--r--english/lts/security/2014/dla-79.data10
-rw-r--r--english/lts/security/2014/dla-79.wml30
-rw-r--r--english/lts/security/2014/dla-80.data10
-rw-r--r--english/lts/security/2014/dla-80.wml19
-rw-r--r--english/lts/security/2014/dla-81.data10
-rw-r--r--english/lts/security/2014/dla-81.wml52
-rw-r--r--english/lts/security/2014/dla-82.data10
-rw-r--r--english/lts/security/2014/dla-82.wml19
-rw-r--r--english/lts/security/2014/dla-83.data9
-rw-r--r--english/lts/security/2014/dla-83.wml17
-rw-r--r--english/lts/security/2014/dla-84.data10
-rw-r--r--english/lts/security/2014/dla-84.wml18
-rw-r--r--english/lts/security/2014/dla-85.data10
-rw-r--r--english/lts/security/2014/dla-85.wml13
-rw-r--r--english/lts/security/2014/dla-86.data10
-rw-r--r--english/lts/security/2014/dla-86.wml15
-rw-r--r--english/lts/security/2014/dla-87.data10
-rw-r--r--english/lts/security/2014/dla-87.wml32
-rw-r--r--english/lts/security/2014/dla-88.data10
-rw-r--r--english/lts/security/2014/dla-88.wml45
-rw-r--r--english/lts/security/2014/dla-89.data10
-rw-r--r--english/lts/security/2014/dla-89.wml15
-rw-r--r--english/lts/security/2014/dla-90.data10
-rw-r--r--english/lts/security/2014/dla-90.wml11
-rw-r--r--english/lts/security/2014/dla-91.data10
-rw-r--r--english/lts/security/2014/dla-91.wml48
-rw-r--r--english/lts/security/2014/dla-92.data9
-rw-r--r--english/lts/security/2014/dla-92.wml15
-rw-r--r--english/lts/security/2014/dla-93.data10
-rw-r--r--english/lts/security/2014/dla-93.wml13
-rw-r--r--english/lts/security/2014/dla-94.data10
-rw-r--r--english/lts/security/2014/dla-94.wml33
-rw-r--r--english/lts/security/2014/dla-95.data10
-rw-r--r--english/lts/security/2014/dla-95.wml20
-rw-r--r--english/lts/security/2014/dla-96.data10
-rw-r--r--english/lts/security/2014/dla-96.wml18
-rw-r--r--english/lts/security/2014/dla-97.data10
-rw-r--r--english/lts/security/2014/dla-97.wml38
-rw-r--r--english/lts/security/2014/dla-98.data10
-rw-r--r--english/lts/security/2014/dla-98.wml15
-rw-r--r--english/lts/security/2014/dla-99.data10
-rw-r--r--english/lts/security/2014/dla-99.wml29
-rw-r--r--english/lts/security/2014/index.wml11
-rw-r--r--english/lts/security/2015/Makefile25
-rw-r--r--english/lts/security/2015/dla-115-2.data9
-rw-r--r--english/lts/security/2015/dla-115-2.wml16
-rw-r--r--english/lts/security/2015/dla-120-2.data10
-rw-r--r--english/lts/security/2015/dla-120-2.wml21
-rw-r--r--english/lts/security/2015/dla-120.data10
-rw-r--r--english/lts/security/2015/dla-120.wml21
-rw-r--r--english/lts/security/2015/dla-127.data10
-rw-r--r--english/lts/security/2015/dla-127.wml13
-rw-r--r--english/lts/security/2015/dla-128.data10
-rw-r--r--english/lts/security/2015/dla-128.wml13
-rw-r--r--english/lts/security/2015/dla-129.data10
-rw-r--r--english/lts/security/2015/dla-129.wml11
-rw-r--r--english/lts/security/2015/dla-130.data10
-rw-r--r--english/lts/security/2015/dla-130.wml11
-rw-r--r--english/lts/security/2015/dla-131.data10
-rw-r--r--english/lts/security/2015/dla-131.wml40
-rw-r--r--english/lts/security/2015/dla-132.data10
-rw-r--r--english/lts/security/2015/dla-132.wml53
-rw-r--r--english/lts/security/2015/dla-133.data10
-rw-r--r--english/lts/security/2015/dla-133.wml25
-rw-r--r--english/lts/security/2015/dla-134.data10
-rw-r--r--english/lts/security/2015/dla-134.wml15
-rw-r--r--english/lts/security/2015/dla-135.data9
-rw-r--r--english/lts/security/2015/dla-135.wml13
-rw-r--r--english/lts/security/2015/dla-136.data10
-rw-r--r--english/lts/security/2015/dla-136.wml14
-rw-r--r--english/lts/security/2015/dla-137.data10
-rw-r--r--english/lts/security/2015/dla-137.wml14
-rw-r--r--english/lts/security/2015/dla-138.data10
-rw-r--r--english/lts/security/2015/dla-138.wml14
-rw-r--r--english/lts/security/2015/dla-139.data10
-rw-r--r--english/lts/security/2015/dla-139.wml30
-rw-r--r--english/lts/security/2015/dla-140.data10
-rw-r--r--english/lts/security/2015/dla-140.wml37
-rw-r--r--english/lts/security/2015/dla-141.data10
-rw-r--r--english/lts/security/2015/dla-141.wml19
-rw-r--r--english/lts/security/2015/dla-142.data10
-rw-r--r--english/lts/security/2015/dla-142.wml33
-rw-r--r--english/lts/security/2015/dla-143.data10
-rw-r--r--english/lts/security/2015/dla-143.wml82
-rw-r--r--english/lts/security/2015/dla-144.data10
-rw-r--r--english/lts/security/2015/dla-144.wml14
-rw-r--r--english/lts/security/2015/dla-145-2.data9
-rw-r--r--english/lts/security/2015/dla-145-2.wml19
-rw-r--r--english/lts/security/2015/dla-145.data10
-rw-r--r--english/lts/security/2015/dla-145.wml52
-rw-r--r--english/lts/security/2015/dla-146.data10
-rw-r--r--english/lts/security/2015/dla-146.wml34
-rw-r--r--english/lts/security/2015/dla-147.data10
-rw-r--r--english/lts/security/2015/dla-147.wml11
-rw-r--r--english/lts/security/2015/dla-148.data10
-rw-r--r--english/lts/security/2015/dla-148.wml14
-rw-r--r--english/lts/security/2015/dla-149.data10
-rw-r--r--english/lts/security/2015/dla-149.wml29
-rw-r--r--english/lts/security/2015/dla-150.data10
-rw-r--r--english/lts/security/2015/dla-150.wml17
-rw-r--r--english/lts/security/2015/dla-151.data10
-rw-r--r--english/lts/security/2015/dla-151.wml18
-rw-r--r--english/lts/security/2015/dla-152.data10
-rw-r--r--english/lts/security/2015/dla-152.wml44
-rw-r--r--english/lts/security/2015/dla-153.data10
-rw-r--r--english/lts/security/2015/dla-153.wml13
-rw-r--r--english/lts/security/2015/dla-154.data10
-rw-r--r--english/lts/security/2015/dla-154.wml26
-rw-r--r--english/lts/security/2015/dla-155.data10
-rw-r--r--english/lts/security/2015/dla-155.wml94
-rw-r--r--english/lts/security/2015/dla-156.data10
-rw-r--r--english/lts/security/2015/dla-156.wml19
-rw-r--r--english/lts/security/2015/dla-157.data10
-rw-r--r--english/lts/security/2015/dla-157.wml12
-rw-r--r--english/lts/security/2015/dla-158.data10
-rw-r--r--english/lts/security/2015/dla-158.wml38
-rw-r--r--english/lts/security/2015/dla-159.data10
-rw-r--r--english/lts/security/2015/dla-159.wml19
-rw-r--r--english/lts/security/2015/dla-160.data10
-rw-r--r--english/lts/security/2015/dla-160.wml40
-rw-r--r--english/lts/security/2015/dla-161.data9
-rw-r--r--english/lts/security/2015/dla-161.wml13
-rw-r--r--english/lts/security/2015/dla-162.data10
-rw-r--r--english/lts/security/2015/dla-162.wml23
-rw-r--r--english/lts/security/2015/dla-163.data10
-rw-r--r--english/lts/security/2015/dla-163.wml15
-rw-r--r--english/lts/security/2015/dla-164.data10
-rw-r--r--english/lts/security/2015/dla-164.wml14
-rw-r--r--english/lts/security/2015/dla-165.data10
-rw-r--r--english/lts/security/2015/dla-165.wml128
-rw-r--r--english/lts/security/2015/dla-166.data10
-rw-r--r--english/lts/security/2015/dla-166.wml12
-rw-r--r--english/lts/security/2015/dla-167.data10
-rw-r--r--english/lts/security/2015/dla-167.wml14
-rw-r--r--english/lts/security/2015/dla-168.data10
-rw-r--r--english/lts/security/2015/dla-168.wml11
-rw-r--r--english/lts/security/2015/dla-169.data10
-rw-r--r--english/lts/security/2015/dla-169.wml19
-rw-r--r--english/lts/security/2015/dla-170.data10
-rw-r--r--english/lts/security/2015/dla-170.wml14
-rw-r--r--english/lts/security/2015/dla-171.data10
-rw-r--r--english/lts/security/2015/dla-171.wml15
-rw-r--r--english/lts/security/2015/dla-172.data10
-rw-r--r--english/lts/security/2015/dla-172.wml11
-rw-r--r--english/lts/security/2015/dla-173.data10
-rw-r--r--english/lts/security/2015/dla-173.wml22
-rw-r--r--english/lts/security/2015/dla-174.data10
-rw-r--r--english/lts/security/2015/dla-174.wml29
-rw-r--r--english/lts/security/2015/dla-175.data10
-rw-r--r--english/lts/security/2015/dla-175.wml40
-rw-r--r--english/lts/security/2015/dla-176.data10
-rw-r--r--english/lts/security/2015/dla-176.wml30
-rw-r--r--english/lts/security/2015/dla-177.data10
-rw-r--r--english/lts/security/2015/dla-177.wml51
-rw-r--r--english/lts/security/2015/dla-178.data9
-rw-r--r--english/lts/security/2015/dla-178.wml29
-rw-r--r--english/lts/security/2015/dla-179.data9
-rw-r--r--english/lts/security/2015/dla-179.wml24
-rw-r--r--english/lts/security/2015/dla-180.data10
-rw-r--r--english/lts/security/2015/dla-180.wml31
-rw-r--r--english/lts/security/2015/dla-181.data10
-rw-r--r--english/lts/security/2015/dla-181.wml16
-rw-r--r--english/lts/security/2015/dla-182.data10
-rw-r--r--english/lts/security/2015/dla-182.wml14
-rw-r--r--english/lts/security/2015/dla-183.data10
-rw-r--r--english/lts/security/2015/dla-183.wml12
-rw-r--r--english/lts/security/2015/dla-184.data10
-rw-r--r--english/lts/security/2015/dla-184.wml14
-rw-r--r--english/lts/security/2015/dla-185.data10
-rw-r--r--english/lts/security/2015/dla-185.wml16
-rw-r--r--english/lts/security/2015/dla-186.data10
-rw-r--r--english/lts/security/2015/dla-186.wml14
-rw-r--r--english/lts/security/2015/dla-187.data10
-rw-r--r--english/lts/security/2015/dla-187.wml24
-rw-r--r--english/lts/security/2015/dla-188.data10
-rw-r--r--english/lts/security/2015/dla-188.wml36
-rw-r--r--english/lts/security/2015/dla-189.data10
-rw-r--r--english/lts/security/2015/dla-189.wml25
-rw-r--r--english/lts/security/2015/dla-190.data10
-rw-r--r--english/lts/security/2015/dla-190.wml25
-rw-r--r--english/lts/security/2015/dla-191.data10
-rw-r--r--english/lts/security/2015/dla-191.wml13
-rw-r--r--english/lts/security/2015/dla-192.data10
-rw-r--r--english/lts/security/2015/dla-192.wml48
-rw-r--r--english/lts/security/2015/dla-193.data10
-rw-r--r--english/lts/security/2015/dla-193.wml62
-rw-r--r--english/lts/security/2015/dla-194.data10
-rw-r--r--english/lts/security/2015/dla-194.wml12
-rw-r--r--english/lts/security/2015/dla-195.data10
-rw-r--r--english/lts/security/2015/dla-195.wml12
-rw-r--r--english/lts/security/2015/dla-196.data9
-rw-r--r--english/lts/security/2015/dla-196.wml11
-rw-r--r--english/lts/security/2015/dla-197.data10
-rw-r--r--english/lts/security/2015/dla-197.wml16
-rw-r--r--english/lts/security/2015/dla-198.data10
-rw-r--r--english/lts/security/2015/dla-198.wml37
-rw-r--r--english/lts/security/2015/dla-199.data10
-rw-r--r--english/lts/security/2015/dla-199.wml22
-rw-r--r--english/lts/security/2015/dla-200.data10
-rw-r--r--english/lts/security/2015/dla-200.wml25
-rw-r--r--english/lts/security/2015/dla-201.data9
-rw-r--r--english/lts/security/2015/dla-201.wml10
-rw-r--r--english/lts/security/2015/dla-202.data10
-rw-r--r--english/lts/security/2015/dla-202.wml15
-rw-r--r--english/lts/security/2015/dla-203.data10
-rw-r--r--english/lts/security/2015/dla-203.wml54
-rw-r--r--english/lts/security/2015/dla-204.data10
-rw-r--r--english/lts/security/2015/dla-204.wml19
-rw-r--r--english/lts/security/2015/dla-205.data10
-rw-r--r--english/lts/security/2015/dla-205.wml11
-rw-r--r--english/lts/security/2015/dla-206.data10
-rw-r--r--english/lts/security/2015/dla-206.wml11
-rw-r--r--english/lts/security/2015/dla-207.data10
-rw-r--r--english/lts/security/2015/dla-207.wml38
-rw-r--r--english/lts/security/2015/dla-208.data9
-rw-r--r--english/lts/security/2015/dla-208.wml11
-rw-r--r--english/lts/security/2015/dla-209.data10
-rw-r--r--english/lts/security/2015/dla-209.wml13
-rw-r--r--english/lts/security/2015/dla-210.data10
-rw-r--r--english/lts/security/2015/dla-210.wml24
-rw-r--r--english/lts/security/2015/dla-211.data10
-rw-r--r--english/lts/security/2015/dla-211.wml26
-rw-r--r--english/lts/security/2015/dla-212.data10
-rw-r--r--english/lts/security/2015/dla-212.wml70
-rw-r--r--english/lts/security/2015/dla-213.data10
-rw-r--r--english/lts/security/2015/dla-213.wml16
-rw-r--r--english/lts/security/2015/dla-214.data10
-rw-r--r--english/lts/security/2015/dla-214.wml13
-rw-r--r--english/lts/security/2015/dla-215.data10
-rw-r--r--english/lts/security/2015/dla-215.wml16
-rw-r--r--english/lts/security/2015/dla-216.data10
-rw-r--r--english/lts/security/2015/dla-216.wml19
-rw-r--r--english/lts/security/2015/dla-217.data10
-rw-r--r--english/lts/security/2015/dla-217.wml28
-rw-r--r--english/lts/security/2015/dla-218.data10
-rw-r--r--english/lts/security/2015/dla-218.wml14
-rw-r--r--english/lts/security/2015/dla-219.data10
-rw-r--r--english/lts/security/2015/dla-219.wml56
-rw-r--r--english/lts/security/2015/dla-220.data10
-rw-r--r--english/lts/security/2015/dla-220.wml23
-rw-r--r--english/lts/security/2015/dla-221.data10
-rw-r--r--english/lts/security/2015/dla-221.wml47
-rw-r--r--english/lts/security/2015/dla-222.data10
-rw-r--r--english/lts/security/2015/dla-222.wml32
-rw-r--r--english/lts/security/2015/dla-223.data10
-rw-r--r--english/lts/security/2015/dla-223.wml27
-rw-r--r--english/lts/security/2015/dla-224.data10
-rw-r--r--english/lts/security/2015/dla-224.wml17
-rw-r--r--english/lts/security/2015/dla-225.data10
-rw-r--r--english/lts/security/2015/dla-225.wml20
-rw-r--r--english/lts/security/2015/dla-226-2.data10
-rw-r--r--english/lts/security/2015/dla-226-2.wml19
-rw-r--r--english/lts/security/2015/dla-226.data10
-rw-r--r--english/lts/security/2015/dla-226.wml13
-rw-r--r--english/lts/security/2015/dla-227.data10
-rw-r--r--english/lts/security/2015/dla-227.wml43
-rw-r--r--english/lts/security/2015/dla-228.data10
-rw-r--r--english/lts/security/2015/dla-228.wml25
-rw-r--r--english/lts/security/2015/dla-229.data10
-rw-r--r--english/lts/security/2015/dla-229.wml14
-rw-r--r--english/lts/security/2015/dla-230.data10
-rw-r--r--english/lts/security/2015/dla-230.wml13
-rw-r--r--english/lts/security/2015/dla-231.data10
-rw-r--r--english/lts/security/2015/dla-231.wml15
-rw-r--r--english/lts/security/2015/dla-232.data10
-rw-r--r--english/lts/security/2015/dla-232.wml31
-rw-r--r--english/lts/security/2015/dla-233.data10
-rw-r--r--english/lts/security/2015/dla-233.wml22
-rw-r--r--english/lts/security/2015/dla-234.data10
-rw-r--r--english/lts/security/2015/dla-234.wml11
-rw-r--r--english/lts/security/2015/dla-235.data10
-rw-r--r--english/lts/security/2015/dla-235.wml52
-rw-r--r--english/lts/security/2015/dla-236.data10
-rw-r--r--english/lts/security/2015/dla-236.wml87
-rw-r--r--english/lts/security/2015/dla-237.data10
-rw-r--r--english/lts/security/2015/dla-237.wml25
-rw-r--r--english/lts/security/2015/dla-238.data10
-rw-r--r--english/lts/security/2015/dla-238.wml18
-rw-r--r--english/lts/security/2015/dla-239.data10
-rw-r--r--english/lts/security/2015/dla-239.wml37
-rw-r--r--english/lts/security/2015/dla-240.data10
-rw-r--r--english/lts/security/2015/dla-240.wml20
-rw-r--r--english/lts/security/2015/dla-241.data10
-rw-r--r--english/lts/security/2015/dla-241.wml18
-rw-r--r--english/lts/security/2015/dla-242.data10
-rw-r--r--english/lts/security/2015/dla-242.wml37
-rw-r--r--english/lts/security/2015/dla-243.data10
-rw-r--r--english/lts/security/2015/dla-243.wml21
-rw-r--r--english/lts/security/2015/dla-244.data10
-rw-r--r--english/lts/security/2015/dla-244.wml18
-rw-r--r--english/lts/security/2015/dla-245.data10
-rw-r--r--english/lts/security/2015/dla-245.wml18
-rw-r--r--english/lts/security/2015/dla-246-2.data10
-rw-r--r--english/lts/security/2015/dla-246-2.wml128
-rw-r--r--english/lts/security/2015/dla-246.data10
-rw-r--r--english/lts/security/2015/dla-246.wml126
-rw-r--r--english/lts/security/2015/dla-247.data10
-rw-r--r--english/lts/security/2015/dla-247.wml53
-rw-r--r--english/lts/security/2015/dla-248.data10
-rw-r--r--english/lts/security/2015/dla-248.wml28
-rw-r--r--english/lts/security/2015/dla-249.data10
-rw-r--r--english/lts/security/2015/dla-249.wml28
-rw-r--r--english/lts/security/2015/dla-250.data10
-rw-r--r--english/lts/security/2015/dla-250.wml18
-rw-r--r--english/lts/security/2015/dla-251-2.data10
-rw-r--r--english/lts/security/2015/dla-251-2.wml82
-rw-r--r--english/lts/security/2015/dla-251.data10
-rw-r--r--english/lts/security/2015/dla-251.wml80
-rw-r--r--english/lts/security/2015/dla-252.data9
-rw-r--r--english/lts/security/2015/dla-252.wml35
-rw-r--r--english/lts/security/2015/dla-253.data10
-rw-r--r--english/lts/security/2015/dla-253.wml24
-rw-r--r--english/lts/security/2015/dla-254.data10
-rw-r--r--english/lts/security/2015/dla-254.wml15
-rw-r--r--english/lts/security/2015/dla-255.data10
-rw-r--r--english/lts/security/2015/dla-255.wml37
-rw-r--r--english/lts/security/2015/dla-256.data10
-rw-r--r--english/lts/security/2015/dla-256.wml22
-rw-r--r--english/lts/security/2015/dla-257.data10
-rw-r--r--english/lts/security/2015/dla-257.wml24
-rw-r--r--english/lts/security/2015/dla-258.data10
-rw-r--r--english/lts/security/2015/dla-258.wml11
-rw-r--r--english/lts/security/2015/dla-259.data10
-rw-r--r--english/lts/security/2015/dla-259.wml16
-rw-r--r--english/lts/security/2015/dla-260.data10
-rw-r--r--english/lts/security/2015/dla-260.wml18
-rw-r--r--english/lts/security/2015/dla-261-2.data10
-rw-r--r--english/lts/security/2015/dla-261-2.wml13
-rw-r--r--english/lts/security/2015/dla-261.data10
-rw-r--r--english/lts/security/2015/dla-261.wml11
-rw-r--r--english/lts/security/2015/dla-262.data10
-rw-r--r--english/lts/security/2015/dla-262.wml12
-rw-r--r--english/lts/security/2015/dla-263.data10
-rw-r--r--english/lts/security/2015/dla-263.wml33
-rw-r--r--english/lts/security/2015/dla-264.data10
-rw-r--r--english/lts/security/2015/dla-264.wml48
-rw-r--r--english/lts/security/2015/dla-265-2.data10
-rw-r--r--english/lts/security/2015/dla-265-2.wml56
-rw-r--r--english/lts/security/2015/dla-265.data10
-rw-r--r--english/lts/security/2015/dla-265.wml47
-rw-r--r--english/lts/security/2015/dla-266.data10
-rw-r--r--english/lts/security/2015/dla-266.wml33
-rw-r--r--english/lts/security/2015/dla-267.data10
-rw-r--r--english/lts/security/2015/dla-267.wml19
-rw-r--r--english/lts/security/2015/dla-268.data10
-rw-r--r--english/lts/security/2015/dla-268.wml34
-rw-r--r--english/lts/security/2015/dla-269.data10
-rw-r--r--english/lts/security/2015/dla-269.wml16
-rw-r--r--english/lts/security/2015/dla-270.data10
-rw-r--r--english/lts/security/2015/dla-270.wml26
-rw-r--r--english/lts/security/2015/dla-271.data10
-rw-r--r--english/lts/security/2015/dla-271.wml8
-rw-r--r--english/lts/security/2015/dla-272.data10
-rw-r--r--english/lts/security/2015/dla-272.wml37
-rw-r--r--english/lts/security/2015/dla-273.data10
-rw-r--r--english/lts/security/2015/dla-273.wml28
-rw-r--r--english/lts/security/2015/dla-274.data10
-rw-r--r--english/lts/security/2015/dla-274.wml18
-rw-r--r--english/lts/security/2015/dla-275.data10
-rw-r--r--english/lts/security/2015/dla-275.wml17
-rw-r--r--english/lts/security/2015/dla-276.data10
-rw-r--r--english/lts/security/2015/dla-276.wml16
-rw-r--r--english/lts/security/2015/dla-277.data10
-rw-r--r--english/lts/security/2015/dla-277.wml20
-rw-r--r--english/lts/security/2015/dla-278-2.data9
-rw-r--r--english/lts/security/2015/dla-278-2.wml15
-rw-r--r--english/lts/security/2015/dla-278.data10
-rw-r--r--english/lts/security/2015/dla-278.wml30
-rw-r--r--english/lts/security/2015/dla-279.data10
-rw-r--r--english/lts/security/2015/dla-279.wml25
-rw-r--r--english/lts/security/2015/dla-280.data10
-rw-r--r--english/lts/security/2015/dla-280.wml10
-rw-r--r--english/lts/security/2015/dla-281.data10
-rw-r--r--english/lts/security/2015/dla-281.wml12
-rw-r--r--english/lts/security/2015/dla-282.data10
-rw-r--r--english/lts/security/2015/dla-282.wml10
-rw-r--r--english/lts/security/2015/dla-283.data10
-rw-r--r--english/lts/security/2015/dla-283.wml26
-rw-r--r--english/lts/security/2015/dla-284.data10
-rw-r--r--english/lts/security/2015/dla-284.wml25
-rw-r--r--english/lts/security/2015/dla-285.data10
-rw-r--r--english/lts/security/2015/dla-285.wml11
-rw-r--r--english/lts/security/2015/dla-286.data10
-rw-r--r--english/lts/security/2015/dla-286.wml14
-rw-r--r--english/lts/security/2015/dla-287.data9
-rw-r--r--english/lts/security/2015/dla-287.wml11
-rw-r--r--english/lts/security/2015/dla-288-2.data10
-rw-r--r--english/lts/security/2015/dla-288-2.wml29
-rw-r--r--english/lts/security/2015/dla-288.data10
-rw-r--r--english/lts/security/2015/dla-288.wml25
-rw-r--r--english/lts/security/2015/dla-289.data10
-rw-r--r--english/lts/security/2015/dla-289.wml12
-rw-r--r--english/lts/security/2015/dla-290-2.data10
-rw-r--r--english/lts/security/2015/dla-290-2.wml13
-rw-r--r--english/lts/security/2015/dla-290.data10
-rw-r--r--english/lts/security/2015/dla-290.wml11
-rw-r--r--english/lts/security/2015/dla-291.data9
-rw-r--r--english/lts/security/2015/dla-291.wml14
-rw-r--r--english/lts/security/2015/dla-292.data10
-rw-r--r--english/lts/security/2015/dla-292.wml13
-rw-r--r--english/lts/security/2015/dla-293.data10
-rw-r--r--english/lts/security/2015/dla-293.wml24
-rw-r--r--english/lts/security/2015/dla-294.data10
-rw-r--r--english/lts/security/2015/dla-294.wml43
-rw-r--r--english/lts/security/2015/dla-295.data10
-rw-r--r--english/lts/security/2015/dla-295.wml17
-rw-r--r--english/lts/security/2015/dla-296.data10
-rw-r--r--english/lts/security/2015/dla-296.wml11
-rw-r--r--english/lts/security/2015/dla-297.data10
-rw-r--r--english/lts/security/2015/dla-297.wml19
-rw-r--r--english/lts/security/2015/dla-298.data10
-rw-r--r--english/lts/security/2015/dla-298.wml27
-rw-r--r--english/lts/security/2015/dla-299.data10
-rw-r--r--english/lts/security/2015/dla-299.wml12
-rw-r--r--english/lts/security/2015/dla-300.data10
-rw-r--r--english/lts/security/2015/dla-300.wml12
-rw-r--r--english/lts/security/2015/dla-301.data10
-rw-r--r--english/lts/security/2015/dla-301.wml30
-rw-r--r--english/lts/security/2015/dla-302.data10
-rw-r--r--english/lts/security/2015/dla-302.wml14
-rw-r--r--english/lts/security/2015/dla-303.data10
-rw-r--r--english/lts/security/2015/dla-303.wml16
-rw-r--r--english/lts/security/2015/dla-304.data10
-rw-r--r--english/lts/security/2015/dla-304.wml34
-rw-r--r--english/lts/security/2015/dla-305.data10
-rw-r--r--english/lts/security/2015/dla-305.wml13
-rw-r--r--english/lts/security/2015/dla-306.data10
-rw-r--r--english/lts/security/2015/dla-306.wml16
-rw-r--r--english/lts/security/2015/dla-307.data10
-rw-r--r--english/lts/security/2015/dla-307.wml93
-rw-r--r--english/lts/security/2015/dla-308.data10
-rw-r--r--english/lts/security/2015/dla-308.wml12
-rw-r--r--english/lts/security/2015/dla-309.data10
-rw-r--r--english/lts/security/2015/dla-309.wml13
-rw-r--r--english/lts/security/2015/dla-310.data10
-rw-r--r--english/lts/security/2015/dla-310.wml71
-rw-r--r--english/lts/security/2015/dla-311.data10
-rw-r--r--english/lts/security/2015/dla-311.wml10
-rw-r--r--english/lts/security/2015/dla-312.data10
-rw-r--r--english/lts/security/2015/dla-312.wml15
-rw-r--r--english/lts/security/2015/dla-313.data10
-rw-r--r--english/lts/security/2015/dla-313.wml70
-rw-r--r--english/lts/security/2015/dla-314.data10
-rw-r--r--english/lts/security/2015/dla-314.wml15
-rw-r--r--english/lts/security/2015/dla-315.data10
-rw-r--r--english/lts/security/2015/dla-315.wml32
-rw-r--r--english/lts/security/2015/dla-316.data10
-rw-r--r--english/lts/security/2015/dla-316.wml46
-rw-r--r--english/lts/security/2015/dla-317.data10
-rw-r--r--english/lts/security/2015/dla-317.wml48
-rw-r--r--english/lts/security/2015/dla-318.data10
-rw-r--r--english/lts/security/2015/dla-318.wml10
-rw-r--r--english/lts/security/2015/dla-319.data10
-rw-r--r--english/lts/security/2015/dla-319.wml14
-rw-r--r--english/lts/security/2015/dla-320.data9
-rw-r--r--english/lts/security/2015/dla-320.wml27
-rw-r--r--english/lts/security/2015/dla-321.data10
-rw-r--r--english/lts/security/2015/dla-321.wml37
-rw-r--r--english/lts/security/2015/dla-322.data10
-rw-r--r--english/lts/security/2015/dla-322.wml14
-rw-r--r--english/lts/security/2015/dla-323.data10
-rw-r--r--english/lts/security/2015/dla-323.wml40
-rw-r--r--english/lts/security/2015/dla-324.data10
-rw-r--r--english/lts/security/2015/dla-324.wml45
-rw-r--r--english/lts/security/2015/dla-325.data10
-rw-r--r--english/lts/security/2015/dla-325.wml51
-rw-r--r--english/lts/security/2015/dla-326.data10
-rw-r--r--english/lts/security/2015/dla-326.wml14
-rw-r--r--english/lts/security/2015/dla-327.data10
-rw-r--r--english/lts/security/2015/dla-327.wml11
-rw-r--r--english/lts/security/2015/dla-328.data9
-rw-r--r--english/lts/security/2015/dla-328.wml21
-rw-r--r--english/lts/security/2015/dla-329.data9
-rw-r--r--english/lts/security/2015/dla-329.wml28
-rw-r--r--english/lts/security/2015/dla-330.data10
-rw-r--r--english/lts/security/2015/dla-330.wml13
-rw-r--r--english/lts/security/2015/dla-331.data10
-rw-r--r--english/lts/security/2015/dla-331.wml17
-rw-r--r--english/lts/security/2015/dla-332.data10
-rw-r--r--english/lts/security/2015/dla-332.wml12
-rw-r--r--english/lts/security/2015/dla-333.data9
-rw-r--r--english/lts/security/2015/dla-333.wml15
-rw-r--r--english/lts/security/2015/dla-334-2.data9
-rw-r--r--english/lts/security/2015/dla-334-2.wml15
-rw-r--r--english/lts/security/2015/dla-334.data10
-rw-r--r--english/lts/security/2015/dla-334.wml10
-rw-r--r--english/lts/security/2015/dla-335.data10
-rw-r--r--english/lts/security/2015/dla-335.wml152
-rw-r--r--english/lts/security/2015/dla-336.data10
-rw-r--r--english/lts/security/2015/dla-336.wml29
-rw-r--r--english/lts/security/2015/dla-337.data10
-rw-r--r--english/lts/security/2015/dla-337.wml13
-rw-r--r--english/lts/security/2015/dla-338.data10
-rw-r--r--english/lts/security/2015/dla-338.wml12
-rw-r--r--english/lts/security/2015/dla-339.data10
-rw-r--r--english/lts/security/2015/dla-339.wml13
-rw-r--r--english/lts/security/2015/dla-340.data10
-rw-r--r--english/lts/security/2015/dla-340.wml33
-rw-r--r--english/lts/security/2015/dla-341.data10
-rw-r--r--english/lts/security/2015/dla-341.wml60
-rw-r--r--english/lts/security/2015/dla-342.data10
-rw-r--r--english/lts/security/2015/dla-342.wml44
-rw-r--r--english/lts/security/2015/dla-343.data10
-rw-r--r--english/lts/security/2015/dla-343.wml21
-rw-r--r--english/lts/security/2015/dla-344.data10
-rw-r--r--english/lts/security/2015/dla-344.wml14
-rw-r--r--english/lts/security/2015/dla-345.data10
-rw-r--r--english/lts/security/2015/dla-345.wml20
-rw-r--r--english/lts/security/2015/dla-346.data10
-rw-r--r--english/lts/security/2015/dla-346.wml16
-rw-r--r--english/lts/security/2015/dla-347.data10
-rw-r--r--english/lts/security/2015/dla-347.wml16
-rw-r--r--english/lts/security/2015/dla-348.data10
-rw-r--r--english/lts/security/2015/dla-348.wml16
-rw-r--r--english/lts/security/2015/dla-349.data10
-rw-r--r--english/lts/security/2015/dla-349.wml23
-rw-r--r--english/lts/security/2015/dla-350.data10
-rw-r--r--english/lts/security/2015/dla-350.wml15
-rw-r--r--english/lts/security/2015/dla-351.data10
-rw-r--r--english/lts/security/2015/dla-351.wml15
-rw-r--r--english/lts/security/2015/dla-352.data9
-rw-r--r--english/lts/security/2015/dla-352.wml22
-rw-r--r--english/lts/security/2015/dla-353.data10
-rw-r--r--english/lts/security/2015/dla-353.wml14
-rw-r--r--english/lts/security/2015/dla-354.data10
-rw-r--r--english/lts/security/2015/dla-354.wml33
-rw-r--r--english/lts/security/2015/dla-355.data10
-rw-r--r--english/lts/security/2015/dla-355.wml30
-rw-r--r--english/lts/security/2015/dla-356.data10
-rw-r--r--english/lts/security/2015/dla-356.wml29
-rw-r--r--english/lts/security/2015/dla-357.data10
-rw-r--r--english/lts/security/2015/dla-357.wml15
-rw-r--r--english/lts/security/2015/dla-358.data10
-rw-r--r--english/lts/security/2015/dla-358.wml11
-rw-r--r--english/lts/security/2015/dla-359.data10
-rw-r--r--english/lts/security/2015/dla-359.wml49
-rw-r--r--english/lts/security/2015/dla-360.data10
-rw-r--r--english/lts/security/2015/dla-360.wml53
-rw-r--r--english/lts/security/2015/dla-361.data10
-rw-r--r--english/lts/security/2015/dla-361.wml17
-rw-r--r--english/lts/security/2015/dla-362.data10
-rw-r--r--english/lts/security/2015/dla-362.wml28
-rw-r--r--english/lts/security/2015/dla-363.data10
-rw-r--r--english/lts/security/2015/dla-363.wml12
-rw-r--r--english/lts/security/2015/dla-364.data10
-rw-r--r--english/lts/security/2015/dla-364.wml14
-rw-r--r--english/lts/security/2015/dla-365.data10
-rw-r--r--english/lts/security/2015/dla-365.wml13
-rw-r--r--english/lts/security/2015/dla-366.data10
-rw-r--r--english/lts/security/2015/dla-366.wml17
-rw-r--r--english/lts/security/2015/dla-367.data10
-rw-r--r--english/lts/security/2015/dla-367.wml18
-rw-r--r--english/lts/security/2015/dla-368.data10
-rw-r--r--english/lts/security/2015/dla-368.wml14
-rw-r--r--english/lts/security/2015/dla-369.data10
-rw-r--r--english/lts/security/2015/dla-369.wml12
-rw-r--r--english/lts/security/2015/dla-370.data10
-rw-r--r--english/lts/security/2015/dla-370.wml13
-rw-r--r--english/lts/security/2015/dla-371.data10
-rw-r--r--english/lts/security/2015/dla-371.wml20
-rw-r--r--english/lts/security/2015/dla-372.data9
-rw-r--r--english/lts/security/2015/dla-372.wml17
-rw-r--r--english/lts/security/2015/dla-373.data10
-rw-r--r--english/lts/security/2015/dla-373.wml37
-rw-r--r--english/lts/security/2015/dla-374-2.data9
-rw-r--r--english/lts/security/2015/dla-374-2.wml12
-rw-r--r--english/lts/security/2015/dla-374.data10
-rw-r--r--english/lts/security/2015/dla-374.wml12
-rw-r--r--english/lts/security/2015/dla-375.data10
-rw-r--r--english/lts/security/2015/dla-375.wml27
-rw-r--r--english/lts/security/2015/dla-376.data10
-rw-r--r--english/lts/security/2015/dla-376.wml13
-rw-r--r--english/lts/security/2015/dla-377.data9
-rw-r--r--english/lts/security/2015/dla-377.wml16
-rw-r--r--english/lts/security/2015/dla-91-2.data9
-rw-r--r--english/lts/security/2015/dla-91-2.wml11
-rw-r--r--english/lts/security/2015/dla-91.data9
-rw-r--r--english/lts/security/2015/dla-91.wml9
-rw-r--r--english/lts/security/2015/index.wml11
-rw-r--r--english/lts/security/2016/Makefile25
-rw-r--r--english/lts/security/2016/dla-374-3.data10
-rw-r--r--english/lts/security/2016/dla-374-3.wml13
-rw-r--r--english/lts/security/2016/dla-374.data10
-rw-r--r--english/lts/security/2016/dla-374.wml13
-rw-r--r--english/lts/security/2016/dla-375.data9
-rw-r--r--english/lts/security/2016/dla-375.wml11
-rw-r--r--english/lts/security/2016/dla-378.data10
-rw-r--r--english/lts/security/2016/dla-378.wml49
-rw-r--r--english/lts/security/2016/dla-379.data10
-rw-r--r--english/lts/security/2016/dla-379.wml36
-rw-r--r--english/lts/security/2016/dla-380.data9
-rw-r--r--english/lts/security/2016/dla-380.wml24
-rw-r--r--english/lts/security/2016/dla-381.data10
-rw-r--r--english/lts/security/2016/dla-381.wml13
-rw-r--r--english/lts/security/2016/dla-382.data10
-rw-r--r--english/lts/security/2016/dla-382.wml28
-rw-r--r--english/lts/security/2016/dla-383.data10
-rw-r--r--english/lts/security/2016/dla-383.wml32
-rw-r--r--english/lts/security/2016/dla-384.data10
-rw-r--r--english/lts/security/2016/dla-384.wml16
-rw-r--r--english/lts/security/2016/dla-385-2.data10
-rw-r--r--english/lts/security/2016/dla-385-2.wml41
-rw-r--r--english/lts/security/2016/dla-385.data10
-rw-r--r--english/lts/security/2016/dla-385.wml13
-rw-r--r--english/lts/security/2016/dla-386.data10
-rw-r--r--english/lts/security/2016/dla-386.wml13
-rw-r--r--english/lts/security/2016/dla-387.data10
-rw-r--r--english/lts/security/2016/dla-387.wml52
-rw-r--r--english/lts/security/2016/dla-388.data10
-rw-r--r--english/lts/security/2016/dla-388.wml12
-rw-r--r--english/lts/security/2016/dla-389.data10
-rw-r--r--english/lts/security/2016/dla-389.wml12
-rw-r--r--english/lts/security/2016/dla-390.data10
-rw-r--r--english/lts/security/2016/dla-390.wml18
-rw-r--r--english/lts/security/2016/dla-391.data10
-rw-r--r--english/lts/security/2016/dla-391.wml12
-rw-r--r--english/lts/security/2016/dla-392.data10
-rw-r--r--english/lts/security/2016/dla-392.wml18
-rw-r--r--english/lts/security/2016/dla-393.data10
-rw-r--r--english/lts/security/2016/dla-393.wml12
-rw-r--r--english/lts/security/2016/dla-394.data10
-rw-r--r--english/lts/security/2016/dla-394.wml13
-rw-r--r--english/lts/security/2016/dla-395.data10
-rw-r--r--english/lts/security/2016/dla-395.wml13
-rw-r--r--english/lts/security/2016/dla-396.data10
-rw-r--r--english/lts/security/2016/dla-396.wml10
-rw-r--r--english/lts/security/2016/dla-397.data10
-rw-r--r--english/lts/security/2016/dla-397.wml11
-rw-r--r--english/lts/security/2016/dla-398.data10
-rw-r--r--english/lts/security/2016/dla-398.wml19
-rw-r--r--english/lts/security/2016/dla-399.data10
-rw-r--r--english/lts/security/2016/dla-399.wml11
-rw-r--r--english/lts/security/2016/dla-400.data10
-rw-r--r--english/lts/security/2016/dla-400.wml57
-rw-r--r--english/lts/security/2016/dla-401.data10
-rw-r--r--english/lts/security/2016/dla-401.wml23
-rw-r--r--english/lts/security/2016/dla-402.data10
-rw-r--r--english/lts/security/2016/dla-402.wml15
-rw-r--r--english/lts/security/2016/dla-403.data10
-rw-r--r--english/lts/security/2016/dla-403.wml31
-rw-r--r--english/lts/security/2016/dla-404.data10
-rw-r--r--english/lts/security/2016/dla-404.wml15
-rw-r--r--english/lts/security/2016/dla-405.data10
-rw-r--r--english/lts/security/2016/dla-405.wml18
-rw-r--r--english/lts/security/2016/dla-406.data10
-rw-r--r--english/lts/security/2016/dla-406.wml25
-rw-r--r--english/lts/security/2016/dla-407.data10
-rw-r--r--english/lts/security/2016/dla-407.wml16
-rw-r--r--english/lts/security/2016/dla-408.data10
-rw-r--r--english/lts/security/2016/dla-408.wml23
-rw-r--r--english/lts/security/2016/dla-409.data10
-rw-r--r--english/lts/security/2016/dla-409.wml20
-rw-r--r--english/lts/security/2016/dla-410.data10
-rw-r--r--english/lts/security/2016/dla-410.wml86
-rw-r--r--english/lts/security/2016/dla-411-2.data10
-rw-r--r--english/lts/security/2016/dla-411-2.wml13
-rw-r--r--english/lts/security/2016/dla-411.data10
-rw-r--r--english/lts/security/2016/dla-411.wml39
-rw-r--r--english/lts/security/2016/dla-412.data10
-rw-r--r--english/lts/security/2016/dla-412.wml53
-rw-r--r--english/lts/security/2016/dla-413.data10
-rw-r--r--english/lts/security/2016/dla-413.wml11
-rw-r--r--english/lts/security/2016/dla-414.data10
-rw-r--r--english/lts/security/2016/dla-414.wml11
-rw-r--r--english/lts/security/2016/dla-415.data10
-rw-r--r--english/lts/security/2016/dla-415.wml12
-rw-r--r--english/lts/security/2016/dla-416.data10
-rw-r--r--english/lts/security/2016/dla-416.wml42
-rw-r--r--english/lts/security/2016/dla-417.data10
-rw-r--r--english/lts/security/2016/dla-417.wml13
-rw-r--r--english/lts/security/2016/dla-418.data10
-rw-r--r--english/lts/security/2016/dla-418.wml32
-rw-r--r--english/lts/security/2016/dla-419.data10
-rw-r--r--english/lts/security/2016/dla-419.wml13
-rw-r--r--english/lts/security/2016/dla-420.data10
-rw-r--r--english/lts/security/2016/dla-420.wml20
-rw-r--r--english/lts/security/2016/dla-421.data10
-rw-r--r--english/lts/security/2016/dla-421.wml26
-rw-r--r--english/lts/security/2016/dla-422.data10
-rw-r--r--english/lts/security/2016/dla-422.wml27
-rw-r--r--english/lts/security/2016/dla-423.data10
-rw-r--r--english/lts/security/2016/dla-423.wml25
-rw-r--r--english/lts/security/2016/dla-424.data10
-rw-r--r--english/lts/security/2016/dla-424.wml10
-rw-r--r--english/lts/security/2016/dla-425.data10
-rw-r--r--english/lts/security/2016/dla-425.wml19
-rw-r--r--english/lts/security/2016/dla-426.data10
-rw-r--r--english/lts/security/2016/dla-426.wml21
-rw-r--r--english/lts/security/2016/dla-427.data10
-rw-r--r--english/lts/security/2016/dla-427.wml16
-rw-r--r--english/lts/security/2016/dla-428.data10
-rw-r--r--english/lts/security/2016/dla-428.wml12
-rw-r--r--english/lts/security/2016/dla-429.data10
-rw-r--r--english/lts/security/2016/dla-429.wml12
-rw-r--r--english/lts/security/2016/dla-430.data10
-rw-r--r--english/lts/security/2016/dla-430.wml12
-rw-r--r--english/lts/security/2016/dla-431.data10
-rw-r--r--english/lts/security/2016/dla-431.wml12
-rw-r--r--english/lts/security/2016/dla-432.data9
-rw-r--r--english/lts/security/2016/dla-432.wml45
-rw-r--r--english/lts/security/2016/dla-433.data10
-rw-r--r--english/lts/security/2016/dla-433.wml12
-rw-r--r--english/lts/security/2016/dla-434.data10
-rw-r--r--english/lts/security/2016/dla-434.wml33
-rw-r--r--english/lts/security/2016/dla-435.data10
-rw-r--r--english/lts/security/2016/dla-435.wml73
-rw-r--r--english/lts/security/2016/dla-436.data9
-rw-r--r--english/lts/security/2016/dla-436.wml10
-rw-r--r--english/lts/security/2016/dla-437.data10
-rw-r--r--english/lts/security/2016/dla-437.wml25
-rw-r--r--english/lts/security/2016/dla-438.data10
-rw-r--r--english/lts/security/2016/dla-438.wml30
-rw-r--r--english/lts/security/2016/dla-439.data10
-rw-r--r--english/lts/security/2016/dla-439.wml56
-rw-r--r--english/lts/security/2016/dla-440.data10
-rw-r--r--english/lts/security/2016/dla-440.wml18
-rw-r--r--english/lts/security/2016/dla-441.data10
-rw-r--r--english/lts/security/2016/dla-441.wml22
-rw-r--r--english/lts/security/2016/dla-442.data10
-rw-r--r--english/lts/security/2016/dla-442.wml36
-rw-r--r--english/lts/security/2016/dla-443.data10
-rw-r--r--english/lts/security/2016/dla-443.wml27
-rw-r--r--english/lts/security/2016/dla-444.data10
-rw-r--r--english/lts/security/2016/dla-444.wml43
-rw-r--r--english/lts/security/2016/dla-445-2.data10
-rw-r--r--english/lts/security/2016/dla-445-2.wml17
-rw-r--r--english/lts/security/2016/dla-445.data10
-rw-r--r--english/lts/security/2016/dla-445.wml15
-rw-r--r--english/lts/security/2016/dla-446.data10
-rw-r--r--english/lts/security/2016/dla-446.wml12
-rw-r--r--english/lts/security/2016/dla-447.data10
-rw-r--r--english/lts/security/2016/dla-447.wml19
-rw-r--r--english/lts/security/2016/dla-448.data10
-rw-r--r--english/lts/security/2016/dla-448.wml29
-rw-r--r--english/lts/security/2016/dla-449-2.data10
-rw-r--r--english/lts/security/2016/dla-449-2.wml18
-rw-r--r--english/lts/security/2016/dla-449.data10
-rw-r--r--english/lts/security/2016/dla-449.wml64
-rw-r--r--english/lts/security/2016/dla-450.data10
-rw-r--r--english/lts/security/2016/dla-450.wml37
-rw-r--r--english/lts/security/2016/dla-451.data10
-rw-r--r--english/lts/security/2016/dla-451.wml20
-rw-r--r--english/lts/security/2016/dla-452.data10
-rw-r--r--english/lts/security/2016/dla-452.wml16
-rw-r--r--english/lts/security/2016/dla-453.data10
-rw-r--r--english/lts/security/2016/dla-453.wml12
-rw-r--r--english/lts/security/2016/dla-454.data10
-rw-r--r--english/lts/security/2016/dla-454.wml14
-rw-r--r--english/lts/security/2016/dla-455.data10
-rw-r--r--english/lts/security/2016/dla-455.wml67
-rw-r--r--english/lts/security/2016/dla-456.data10
-rw-r--r--english/lts/security/2016/dla-456.wml57
-rw-r--r--english/lts/security/2016/dla-457.data10
-rw-r--r--english/lts/security/2016/dla-457.wml12
-rw-r--r--english/lts/security/2016/dla-458.data10
-rw-r--r--english/lts/security/2016/dla-458.wml12
-rw-r--r--english/lts/security/2016/dla-459.data10
-rw-r--r--english/lts/security/2016/dla-459.wml16
-rw-r--r--english/lts/security/2016/dla-460.data10
-rw-r--r--english/lts/security/2016/dla-460.wml15
-rw-r--r--english/lts/security/2016/dla-461.data10
-rw-r--r--english/lts/security/2016/dla-461.wml17
-rw-r--r--english/lts/security/2016/dla-462.data10
-rw-r--r--english/lts/security/2016/dla-462.wml12
-rw-r--r--english/lts/security/2016/dla-463.data10
-rw-r--r--english/lts/security/2016/dla-463.wml15
-rw-r--r--english/lts/security/2016/dla-464.data10
-rw-r--r--english/lts/security/2016/dla-464.wml20
-rw-r--r--english/lts/security/2016/dla-465.data9
-rw-r--r--english/lts/security/2016/dla-465.wml23
-rw-r--r--english/lts/security/2016/dla-466.data10
-rw-r--r--english/lts/security/2016/dla-466.wml18
-rw-r--r--english/lts/security/2016/dla-467.data10
-rw-r--r--english/lts/security/2016/dla-467.wml12
-rw-r--r--english/lts/security/2016/dla-468.data10
-rw-r--r--english/lts/security/2016/dla-468.wml42
-rw-r--r--english/lts/security/2016/dla-469.data10
-rw-r--r--english/lts/security/2016/dla-469.wml15
-rw-r--r--english/lts/security/2016/dla-470.data10
-rw-r--r--english/lts/security/2016/dla-470.wml18
-rw-r--r--english/lts/security/2016/dla-471.data10
-rw-r--r--english/lts/security/2016/dla-471.wml18
-rw-r--r--english/lts/security/2016/dla-472-2.data10
-rw-r--r--english/lts/security/2016/dla-472-2.wml20
-rw-r--r--english/lts/security/2016/dla-472.data10
-rw-r--r--english/lts/security/2016/dla-472.wml15
-rw-r--r--english/lts/security/2016/dla-473.data10
-rw-r--r--english/lts/security/2016/dla-473.wml42
-rw-r--r--english/lts/security/2016/dla-474.data10
-rw-r--r--english/lts/security/2016/dla-474.wml15
-rw-r--r--english/lts/security/2016/dla-475.data10
-rw-r--r--english/lts/security/2016/dla-475.wml16
-rw-r--r--english/lts/security/2016/dla-476.data10
-rw-r--r--english/lts/security/2016/dla-476.wml16
-rw-r--r--english/lts/security/2016/dla-477.data10
-rw-r--r--english/lts/security/2016/dla-477.wml18
-rw-r--r--english/lts/security/2016/dla-478.data10
-rw-r--r--english/lts/security/2016/dla-478.wml51
-rw-r--r--english/lts/security/2016/dla-479.data10
-rw-r--r--english/lts/security/2016/dla-479.wml167
-rw-r--r--english/lts/security/2016/dla-480.data10
-rw-r--r--english/lts/security/2016/dla-480.wml55
-rw-r--r--english/lts/security/2016/dla-481-2.data10
-rw-r--r--english/lts/security/2016/dla-481-2.wml16
-rw-r--r--english/lts/security/2016/dla-481.data10
-rw-r--r--english/lts/security/2016/dla-481.wml47
-rw-r--r--english/lts/security/2016/dla-482.data10
-rw-r--r--english/lts/security/2016/dla-482.wml15
-rw-r--r--english/lts/security/2016/dla-483.data10
-rw-r--r--english/lts/security/2016/dla-483.wml23
-rw-r--r--english/lts/security/2016/dla-484.data10
-rw-r--r--english/lts/security/2016/dla-484.wml75
-rw-r--r--english/lts/security/2016/dla-485.data10
-rw-r--r--english/lts/security/2016/dla-485.wml24
-rw-r--r--english/lts/security/2016/dla-486.data10
-rw-r--r--english/lts/security/2016/dla-486.wml30
-rw-r--r--english/lts/security/2016/dla-487.data9
-rw-r--r--english/lts/security/2016/dla-487.wml34
-rw-r--r--english/lts/security/2016/dla-488.data10
-rw-r--r--english/lts/security/2016/dla-488.wml47
-rw-r--r--english/lts/security/2016/dla-489.data10
-rw-r--r--english/lts/security/2016/dla-489.wml32
-rw-r--r--english/lts/security/2016/dla-490.data10
-rw-r--r--english/lts/security/2016/dla-490.wml35
-rw-r--r--english/lts/security/2016/dla-491.data9
-rw-r--r--english/lts/security/2016/dla-491.wml81
-rw-r--r--english/lts/security/2016/dla-492.data10
-rw-r--r--english/lts/security/2016/dla-492.wml27
-rw-r--r--english/lts/security/2016/dla-493.data10
-rw-r--r--english/lts/security/2016/dla-493.wml37
-rw-r--r--english/lts/security/2016/dla-494.data10
-rw-r--r--english/lts/security/2016/dla-494.wml40
-rw-r--r--english/lts/security/2016/dla-495.data10
-rw-r--r--english/lts/security/2016/dla-495.wml27
-rw-r--r--english/lts/security/2016/dla-496.data10
-rw-r--r--english/lts/security/2016/dla-496.wml27
-rw-r--r--english/lts/security/2016/dla-497.data10
-rw-r--r--english/lts/security/2016/dla-497.wml21
-rw-r--r--english/lts/security/2016/dla-498.data10
-rw-r--r--english/lts/security/2016/dla-498.wml20
-rw-r--r--english/lts/security/2016/dla-499.data10
-rw-r--r--english/lts/security/2016/dla-499.wml105
-rw-r--r--english/lts/security/2016/dla-500.data10
-rw-r--r--english/lts/security/2016/dla-500.wml29
-rw-r--r--english/lts/security/2016/dla-501.data10
-rw-r--r--english/lts/security/2016/dla-501.wml24
-rw-r--r--english/lts/security/2016/dla-502.data10
-rw-r--r--english/lts/security/2016/dla-502.wml23
-rw-r--r--english/lts/security/2016/dla-503.data10
-rw-r--r--english/lts/security/2016/dla-503.wml22
-rw-r--r--english/lts/security/2016/dla-504.data10
-rw-r--r--english/lts/security/2016/dla-504.wml18
-rw-r--r--english/lts/security/2016/dla-505.data10
-rw-r--r--english/lts/security/2016/dla-505.wml23
-rw-r--r--english/lts/security/2016/dla-506.data10
-rw-r--r--english/lts/security/2016/dla-506.wml38
-rw-r--r--english/lts/security/2016/dla-507.data10
-rw-r--r--english/lts/security/2016/dla-507.wml34
-rw-r--r--english/lts/security/2016/dla-508.data10
-rw-r--r--english/lts/security/2016/dla-508.wml40
-rw-r--r--english/lts/security/2016/dla-509.data10
-rw-r--r--english/lts/security/2016/dla-509.wml21
-rw-r--r--english/lts/security/2016/dla-510.data10
-rw-r--r--english/lts/security/2016/dla-510.wml22
-rw-r--r--english/lts/security/2016/dla-511.data10
-rw-r--r--english/lts/security/2016/dla-511.wml22
-rw-r--r--english/lts/security/2016/dla-512.data10
-rw-r--r--english/lts/security/2016/dla-512.wml14
-rw-r--r--english/lts/security/2016/dla-513.data10
-rw-r--r--english/lts/security/2016/dla-513.wml14
-rw-r--r--english/lts/security/2016/dla-514.data10
-rw-r--r--english/lts/security/2016/dla-514.wml36
-rw-r--r--english/lts/security/2016/dla-515.data10
-rw-r--r--english/lts/security/2016/dla-515.wml16
-rw-r--r--english/lts/security/2016/dla-516.data10
-rw-r--r--english/lts/security/2016/dla-516.wml136
-rw-r--r--english/lts/security/2016/dla-517.data10
-rw-r--r--english/lts/security/2016/dla-517.wml25
-rw-r--r--english/lts/security/2016/dla-518.data10
-rw-r--r--english/lts/security/2016/dla-518.wml20
-rw-r--r--english/lts/security/2016/dla-519.data10
-rw-r--r--english/lts/security/2016/dla-519.wml23
-rw-r--r--english/lts/security/2016/dla-520.data10
-rw-r--r--english/lts/security/2016/dla-520.wml14
-rw-r--r--english/lts/security/2016/dla-521.data10
-rw-r--r--english/lts/security/2016/dla-521.wml38
-rw-r--r--english/lts/security/2016/dla-522.data10
-rw-r--r--english/lts/security/2016/dla-522.wml42
-rw-r--r--english/lts/security/2016/dla-523.data9
-rw-r--r--english/lts/security/2016/dla-523.wml19
-rw-r--r--english/lts/security/2016/dla-524.data10
-rw-r--r--english/lts/security/2016/dla-524.wml14
-rw-r--r--english/lts/security/2016/dla-525.data10
-rw-r--r--english/lts/security/2016/dla-525.wml15
-rw-r--r--english/lts/security/2016/dla-526.data10
-rw-r--r--english/lts/security/2016/dla-526.wml27
-rw-r--r--english/lts/security/2016/dla-527.data10
-rw-r--r--english/lts/security/2016/dla-527.wml18
-rw-r--r--english/lts/security/2016/dla-528.data10
-rw-r--r--english/lts/security/2016/dla-528.wml22
-rw-r--r--english/lts/security/2016/dla-529.data10
-rw-r--r--english/lts/security/2016/dla-529.wml26
-rw-r--r--english/lts/security/2016/dla-530.data9
-rw-r--r--english/lts/security/2016/dla-530.wml24
-rw-r--r--english/lts/security/2016/dla-531.data10
-rw-r--r--english/lts/security/2016/dla-531.wml21
-rw-r--r--english/lts/security/2016/dla-532.data10
-rw-r--r--english/lts/security/2016/dla-532.wml14
-rw-r--r--english/lts/security/2016/dla-533.data10
-rw-r--r--english/lts/security/2016/dla-533.wml58
-rw-r--r--english/lts/security/2016/dla-534.data10
-rw-r--r--english/lts/security/2016/dla-534.wml20
-rw-r--r--english/lts/security/2016/dla-535.data10
-rw-r--r--english/lts/security/2016/dla-535.wml25
-rw-r--r--english/lts/security/2016/dla-536.data10
-rw-r--r--english/lts/security/2016/dla-536.wml23
-rw-r--r--english/lts/security/2016/dla-537.data10
-rw-r--r--english/lts/security/2016/dla-537.wml25
-rw-r--r--english/lts/security/2016/dla-538.data10
-rw-r--r--english/lts/security/2016/dla-538.wml55
-rw-r--r--english/lts/security/2016/dla-539.data10
-rw-r--r--english/lts/security/2016/dla-539.wml36
-rw-r--r--english/lts/security/2016/dla-540.data10
-rw-r--r--english/lts/security/2016/dla-540.wml36
-rw-r--r--english/lts/security/2016/dla-541.data10
-rw-r--r--english/lts/security/2016/dla-541.wml19
-rw-r--r--english/lts/security/2016/dla-542.data10
-rw-r--r--english/lts/security/2016/dla-542.wml86
-rw-r--r--english/lts/security/2016/dla-543.data10
-rw-r--r--english/lts/security/2016/dla-543.wml23
-rw-r--r--english/lts/security/2016/dla-544.data10
-rw-r--r--english/lts/security/2016/dla-544.wml22
-rw-r--r--english/lts/security/2016/dla-545.data10
-rw-r--r--english/lts/security/2016/dla-545.wml35
-rw-r--r--english/lts/security/2016/dla-546-2.data9
-rw-r--r--english/lts/security/2016/dla-546-2.wml30
-rw-r--r--english/lts/security/2016/dla-546.data9
-rw-r--r--english/lts/security/2016/dla-546.wml23
-rw-r--r--english/lts/security/2016/dla-547.data10
-rw-r--r--english/lts/security/2016/dla-547.wml29
-rw-r--r--english/lts/security/2016/dla-548.data10
-rw-r--r--english/lts/security/2016/dla-548.wml19
-rw-r--r--english/lts/security/2016/dla-549.data10
-rw-r--r--english/lts/security/2016/dla-549.wml20
-rw-r--r--english/lts/security/2016/dla-550.data10
-rw-r--r--english/lts/security/2016/dla-550.wml19
-rw-r--r--english/lts/security/2016/dla-551.data10
-rw-r--r--english/lts/security/2016/dla-551.wml43
-rw-r--r--english/lts/security/2016/dla-552.data10
-rw-r--r--english/lts/security/2016/dla-552.wml54
-rw-r--r--english/lts/security/2016/dla-553.data10
-rw-r--r--english/lts/security/2016/dla-553.wml23
-rw-r--r--english/lts/security/2016/dla-554.data10
-rw-r--r--english/lts/security/2016/dla-554.wml23
-rw-r--r--english/lts/security/2016/dla-555.data10
-rw-r--r--english/lts/security/2016/dla-555.wml19
-rw-r--r--english/lts/security/2016/dla-556.data10
-rw-r--r--english/lts/security/2016/dla-556.wml21
-rw-r--r--english/lts/security/2016/dla-557.data10
-rw-r--r--english/lts/security/2016/dla-557.wml22
-rw-r--r--english/lts/security/2016/dla-558.data10
-rw-r--r--english/lts/security/2016/dla-558.wml28
-rw-r--r--english/lts/security/2016/dla-559.data10
-rw-r--r--english/lts/security/2016/dla-559.wml78
-rw-r--r--english/lts/security/2016/dla-560-2.data9
-rw-r--r--english/lts/security/2016/dla-560-2.wml20
-rw-r--r--english/lts/security/2016/dla-560.data10
-rw-r--r--english/lts/security/2016/dla-560.wml40
-rw-r--r--english/lts/security/2016/dla-561.data10
-rw-r--r--english/lts/security/2016/dla-561.wml41
-rw-r--r--english/lts/security/2016/dla-562.data10
-rw-r--r--english/lts/security/2016/dla-562.wml30
-rw-r--r--english/lts/security/2016/dla-563.data10
-rw-r--r--english/lts/security/2016/dla-563.wml23
-rw-r--r--english/lts/security/2016/dla-564.data10
-rw-r--r--english/lts/security/2016/dla-564.wml31
-rw-r--r--english/lts/security/2016/dla-565.data10
-rw-r--r--english/lts/security/2016/dla-565.wml61
-rw-r--r--english/lts/security/2016/dla-566.data10
-rw-r--r--english/lts/security/2016/dla-566.wml21
-rw-r--r--english/lts/security/2016/dla-567-2.data10
-rw-r--r--english/lts/security/2016/dla-567-2.wml29
-rw-r--r--english/lts/security/2016/dla-567.data10
-rw-r--r--english/lts/security/2016/dla-567.wml17
-rw-r--r--english/lts/security/2016/dla-568.data10
-rw-r--r--english/lts/security/2016/dla-568.wml60
-rw-r--r--english/lts/security/2016/dla-569.data10
-rw-r--r--english/lts/security/2016/dla-569.wml21
-rw-r--r--english/lts/security/2016/dla-570.data10
-rw-r--r--english/lts/security/2016/dla-570.wml20
-rw-r--r--english/lts/security/2016/dla-571.data10
-rw-r--r--english/lts/security/2016/dla-571.wml76
-rw-r--r--english/lts/security/2016/dla-572.data10
-rw-r--r--english/lts/security/2016/dla-572.wml19
-rw-r--r--english/lts/security/2016/dla-573.data10
-rw-r--r--english/lts/security/2016/dla-573.wml57
-rw-r--r--english/lts/security/2016/dla-574.data10
-rw-r--r--english/lts/security/2016/dla-574.wml56
-rw-r--r--english/lts/security/2016/dla-575-2.data10
-rw-r--r--english/lts/security/2016/dla-575-2.wml20
-rw-r--r--english/lts/security/2016/dla-575.data10
-rw-r--r--english/lts/security/2016/dla-575.wml26
-rw-r--r--english/lts/security/2016/dla-576.data10
-rw-r--r--english/lts/security/2016/dla-576.wml23
-rw-r--r--english/lts/security/2016/dla-577.data10
-rw-r--r--english/lts/security/2016/dla-577.wml14
-rw-r--r--english/lts/security/2016/dla-578.data10
-rw-r--r--english/lts/security/2016/dla-578.wml26
-rw-r--r--english/lts/security/2016/dla-579.data10
-rw-r--r--english/lts/security/2016/dla-579.wml19
-rw-r--r--english/lts/security/2016/dla-580.data9
-rw-r--r--english/lts/security/2016/dla-580.wml19
-rw-r--r--english/lts/security/2016/dla-581.data10
-rw-r--r--english/lts/security/2016/dla-581.wml19
-rw-r--r--english/lts/security/2016/dla-582.data10
-rw-r--r--english/lts/security/2016/dla-582.wml34
-rw-r--r--english/lts/security/2016/dla-583.data10
-rw-r--r--english/lts/security/2016/dla-583.wml21
-rw-r--r--english/lts/security/2016/dla-584.data10
-rw-r--r--english/lts/security/2016/dla-584.wml34
-rw-r--r--english/lts/security/2016/dla-585.data10
-rw-r--r--english/lts/security/2016/dla-585.wml21
-rw-r--r--english/lts/security/2016/dla-586.data10
-rw-r--r--english/lts/security/2016/dla-586.wml30
-rw-r--r--english/lts/security/2016/dla-587.data10
-rw-r--r--english/lts/security/2016/dla-587.wml20
-rw-r--r--english/lts/security/2016/dla-588-2.data10
-rw-r--r--english/lts/security/2016/dla-588-2.wml37
-rw-r--r--english/lts/security/2016/dla-588.data10
-rw-r--r--english/lts/security/2016/dla-588.wml30
-rw-r--r--english/lts/security/2016/dla-589.data10
-rw-r--r--english/lts/security/2016/dla-589.wml20
-rw-r--r--english/lts/security/2016/dla-590.data9
-rw-r--r--english/lts/security/2016/dla-590.wml15
-rw-r--r--english/lts/security/2016/dla-591.data10
-rw-r--r--english/lts/security/2016/dla-591.wml25
-rw-r--r--english/lts/security/2016/dla-592.data9
-rw-r--r--english/lts/security/2016/dla-592.wml35
-rw-r--r--english/lts/security/2016/dla-593.data10
-rw-r--r--english/lts/security/2016/dla-593.wml26
-rw-r--r--english/lts/security/2016/dla-594.data10
-rw-r--r--english/lts/security/2016/dla-594.wml29
-rw-r--r--english/lts/security/2016/dla-595.data10
-rw-r--r--english/lts/security/2016/dla-595.wml19
-rw-r--r--english/lts/security/2016/dla-596.data10
-rw-r--r--english/lts/security/2016/dla-596.wml18
-rw-r--r--english/lts/security/2016/dla-597.data10
-rw-r--r--english/lts/security/2016/dla-597.wml20
-rw-r--r--english/lts/security/2016/dla-598.data10
-rw-r--r--english/lts/security/2016/dla-598.wml20
-rw-r--r--english/lts/security/2016/dla-599.data10
-rw-r--r--english/lts/security/2016/dla-599.wml15
-rw-r--r--english/lts/security/2016/dla-600.data10
-rw-r--r--english/lts/security/2016/dla-600.wml33
-rw-r--r--english/lts/security/2016/dla-601.data10
-rw-r--r--english/lts/security/2016/dla-601.wml36
-rw-r--r--english/lts/security/2016/dla-602.data10
-rw-r--r--english/lts/security/2016/dla-602.wml53
-rw-r--r--english/lts/security/2016/dla-603.data10
-rw-r--r--english/lts/security/2016/dla-603.wml22
-rw-r--r--english/lts/security/2016/dla-604.data10
-rw-r--r--english/lts/security/2016/dla-604.wml69
-rw-r--r--english/lts/security/2016/dla-605.data10
-rw-r--r--english/lts/security/2016/dla-605.wml22
-rw-r--r--english/lts/security/2016/dla-606.data10
-rw-r--r--english/lts/security/2016/dla-606.wml18
-rw-r--r--english/lts/security/2016/dla-607.data10
-rw-r--r--english/lts/security/2016/dla-607.wml21
-rw-r--r--english/lts/security/2016/dla-608.data10
-rw-r--r--english/lts/security/2016/dla-608.wml15
-rw-r--r--english/lts/security/2016/dla-609.data10
-rw-r--r--english/lts/security/2016/dla-609.wml102
-rw-r--r--english/lts/security/2016/dla-610.data10
-rw-r--r--english/lts/security/2016/dla-610.wml23
-rw-r--r--english/lts/security/2016/dla-611.data10
-rw-r--r--english/lts/security/2016/dla-611.wml14
-rw-r--r--english/lts/security/2016/dla-612.data10
-rw-r--r--english/lts/security/2016/dla-612.wml21
-rw-r--r--english/lts/security/2016/dla-613.data10
-rw-r--r--english/lts/security/2016/dla-613.wml43
-rw-r--r--english/lts/security/2016/dla-614.data10
-rw-r--r--english/lts/security/2016/dla-614.wml40
-rw-r--r--english/lts/security/2016/dla-615.data10
-rw-r--r--english/lts/security/2016/dla-615.wml20
-rw-r--r--english/lts/security/2016/dla-616.data10
-rw-r--r--english/lts/security/2016/dla-616.wml20
-rw-r--r--english/lts/security/2016/dla-617.data10
-rw-r--r--english/lts/security/2016/dla-617.wml39
-rw-r--r--english/lts/security/2016/dla-618.data10
-rw-r--r--english/lts/security/2016/dla-618.wml22
-rw-r--r--english/lts/security/2016/dla-619.data10
-rw-r--r--english/lts/security/2016/dla-619.wml22
-rw-r--r--english/lts/security/2016/dla-620.data10
-rw-r--r--english/lts/security/2016/dla-620.wml14
-rw-r--r--english/lts/security/2016/dla-621.data10
-rw-r--r--english/lts/security/2016/dla-621.wml20
-rw-r--r--english/lts/security/2016/dla-622.data10
-rw-r--r--english/lts/security/2016/dla-622.wml25
-rw-r--r--english/lts/security/2016/dla-623.data10
-rw-r--r--english/lts/security/2016/dla-623.wml32
-rw-r--r--english/lts/security/2016/dla-624.data10
-rw-r--r--english/lts/security/2016/dla-624.wml29
-rw-r--r--english/lts/security/2016/dla-625.data10
-rw-r--r--english/lts/security/2016/dla-625.wml20
-rw-r--r--english/lts/security/2016/dla-626.data10
-rw-r--r--english/lts/security/2016/dla-626.wml115
-rw-r--r--english/lts/security/2016/dla-627.data10
-rw-r--r--english/lts/security/2016/dla-627.wml41
-rw-r--r--english/lts/security/2016/dla-628.data10
-rw-r--r--english/lts/security/2016/dla-628.wml146
-rw-r--r--english/lts/security/2016/dla-629.data10
-rw-r--r--english/lts/security/2016/dla-629.wml25
-rw-r--r--english/lts/security/2016/dla-630.data10
-rw-r--r--english/lts/security/2016/dla-630.wml23
-rw-r--r--english/lts/security/2016/dla-631.data10
-rw-r--r--english/lts/security/2016/dla-631.wml34
-rw-r--r--english/lts/security/2016/dla-632.data10
-rw-r--r--english/lts/security/2016/dla-632.wml19
-rw-r--r--english/lts/security/2016/dla-633.data10
-rw-r--r--english/lts/security/2016/dla-633.wml67
-rw-r--r--english/lts/security/2016/dla-634.data10
-rw-r--r--english/lts/security/2016/dla-634.wml26
-rw-r--r--english/lts/security/2016/dla-635.data10
-rw-r--r--english/lts/security/2016/dla-635.wml14
-rw-r--r--english/lts/security/2016/dla-636-2.data9
-rw-r--r--english/lts/security/2016/dla-636-2.wml18
-rw-r--r--english/lts/security/2016/dla-636.data10
-rw-r--r--english/lts/security/2016/dla-636.wml20
-rw-r--r--english/lts/security/2016/dla-637.data10
-rw-r--r--english/lts/security/2016/dla-637.wml67
-rw-r--r--english/lts/security/2016/dla-638.data10
-rw-r--r--english/lts/security/2016/dla-638.wml15
-rw-r--r--english/lts/security/2016/dla-639.data10
-rw-r--r--english/lts/security/2016/dla-639.wml25
-rw-r--r--english/lts/security/2016/dla-640.data10
-rw-r--r--english/lts/security/2016/dla-640.wml19
-rw-r--r--english/lts/security/2016/dla-641.data10
-rw-r--r--english/lts/security/2016/dla-641.wml20
-rw-r--r--english/lts/security/2016/dla-642.data10
-rw-r--r--english/lts/security/2016/dla-642.wml20
-rw-r--r--english/lts/security/2016/dla-643.data10
-rw-r--r--english/lts/security/2016/dla-643.wml32
-rw-r--r--english/lts/security/2016/dla-644.data10
-rw-r--r--english/lts/security/2016/dla-644.wml40
-rw-r--r--english/lts/security/2016/dla-645.data10
-rw-r--r--english/lts/security/2016/dla-645.wml30
-rw-r--r--english/lts/security/2016/dla-646.data10
-rw-r--r--english/lts/security/2016/dla-646.wml29
-rw-r--r--english/lts/security/2016/dla-647.data10
-rw-r--r--english/lts/security/2016/dla-647.wml16
-rw-r--r--english/lts/security/2016/dla-648.data10
-rw-r--r--english/lts/security/2016/dla-648.wml21
-rw-r--r--english/lts/security/2016/dla-649.data10
-rw-r--r--english/lts/security/2016/dla-649.wml19
-rw-r--r--english/lts/security/2016/dla-650.data10
-rw-r--r--english/lts/security/2016/dla-650.wml22
-rw-r--r--english/lts/security/2016/dla-651.data10
-rw-r--r--english/lts/security/2016/dla-651.wml40
-rw-r--r--english/lts/security/2016/dla-652.data10
-rw-r--r--english/lts/security/2016/dla-652.wml40
-rw-r--r--english/lts/security/2016/dla-653.data10
-rw-r--r--english/lts/security/2016/dla-653.wml40
-rw-r--r--english/lts/security/2016/dla-654.data10
-rw-r--r--english/lts/security/2016/dla-654.wml19
-rw-r--r--english/lts/security/2016/dla-655.data10
-rw-r--r--english/lts/security/2016/dla-655.wml37
-rw-r--r--english/lts/security/2016/dla-656.data10
-rw-r--r--english/lts/security/2016/dla-656.wml21
-rw-r--r--english/lts/security/2016/dla-657.data10
-rw-r--r--english/lts/security/2016/dla-657.wml19
-rw-r--r--english/lts/security/2016/dla-658.data10
-rw-r--r--english/lts/security/2016/dla-658.wml19
-rw-r--r--english/lts/security/2016/dla-659.data10
-rw-r--r--english/lts/security/2016/dla-659.wml21
-rw-r--r--english/lts/security/2016/dla-660.data10
-rw-r--r--english/lts/security/2016/dla-660.wml19
-rw-r--r--english/lts/security/2016/dla-661.data10
-rw-r--r--english/lts/security/2016/dla-661.wml42
-rw-r--r--english/lts/security/2016/dla-662.data10
-rw-r--r--english/lts/security/2016/dla-662.wml17
-rw-r--r--english/lts/security/2016/dla-663.data9
-rw-r--r--english/lts/security/2016/dla-663.wml27
-rw-r--r--english/lts/security/2016/dla-664.data10
-rw-r--r--english/lts/security/2016/dla-664.wml22
-rw-r--r--english/lts/security/2016/dla-665.data10
-rw-r--r--english/lts/security/2016/dla-665.wml29
-rw-r--r--english/lts/security/2016/dla-666.data10
-rw-r--r--english/lts/security/2016/dla-666.wml46
-rw-r--r--english/lts/security/2016/dla-667.data10
-rw-r--r--english/lts/security/2016/dla-667.wml22
-rw-r--r--english/lts/security/2016/dla-668.data10
-rw-r--r--english/lts/security/2016/dla-668.wml34
-rw-r--r--english/lts/security/2016/dla-669.data10
-rw-r--r--english/lts/security/2016/dla-669.wml63
-rw-r--r--english/lts/security/2016/dla-670.data10
-rw-r--r--english/lts/security/2016/dla-670.wml49
-rw-r--r--english/lts/security/2016/dla-671.data10
-rw-r--r--english/lts/security/2016/dla-671.wml26
-rw-r--r--english/lts/security/2016/dla-672.data10
-rw-r--r--english/lts/security/2016/dla-672.wml26
-rw-r--r--english/lts/security/2016/dla-673.data10
-rw-r--r--english/lts/security/2016/dla-673.wml21
-rw-r--r--english/lts/security/2016/dla-674-2.data10
-rw-r--r--english/lts/security/2016/dla-674-2.wml26
-rw-r--r--english/lts/security/2016/dla-674.data10
-rw-r--r--english/lts/security/2016/dla-674.wml20
-rw-r--r--english/lts/security/2016/dla-675.data10
-rw-r--r--english/lts/security/2016/dla-675.wml51
-rw-r--r--english/lts/security/2016/dla-676.data9
-rw-r--r--english/lts/security/2016/dla-676.wml26
-rw-r--r--english/lts/security/2016/dla-677.data9
-rw-r--r--english/lts/security/2016/dla-677.wml26
-rw-r--r--english/lts/security/2016/dla-678.data10
-rw-r--r--english/lts/security/2016/dla-678.wml45
-rw-r--r--english/lts/security/2016/dla-679.data10
-rw-r--r--english/lts/security/2016/dla-679.wml45
-rw-r--r--english/lts/security/2016/dla-680-2.data10
-rw-r--r--english/lts/security/2016/dla-680-2.wml52
-rw-r--r--english/lts/security/2016/dla-680.data10
-rw-r--r--english/lts/security/2016/dla-680.wml46
-rw-r--r--english/lts/security/2016/dla-681.data9
-rw-r--r--english/lts/security/2016/dla-681.wml29
-rw-r--r--english/lts/security/2016/dla-682.data9
-rw-r--r--english/lts/security/2016/dla-682.wml18
-rw-r--r--english/lts/security/2016/dla-683.data10
-rw-r--r--english/lts/security/2016/dla-683.wml50
-rw-r--r--english/lts/security/2016/dla-684.data10
-rw-r--r--english/lts/security/2016/dla-684.wml22
-rw-r--r--english/lts/security/2016/dla-685-2.data10
-rw-r--r--english/lts/security/2016/dla-685-2.wml18
-rw-r--r--english/lts/security/2016/dla-685.data10
-rw-r--r--english/lts/security/2016/dla-685.wml22
-rw-r--r--english/lts/security/2016/dla-686.data10
-rw-r--r--english/lts/security/2016/dla-686.wml22
-rw-r--r--english/lts/security/2016/dla-687.data10
-rw-r--r--english/lts/security/2016/dla-687.wml18
-rw-r--r--english/lts/security/2016/dla-688.data10
-rw-r--r--english/lts/security/2016/dla-688.wml15
-rw-r--r--english/lts/security/2016/dla-689.data10
-rw-r--r--english/lts/security/2016/dla-689.wml88
-rw-r--r--english/lts/security/2016/dla-690.data10
-rw-r--r--english/lts/security/2016/dla-690.wml18
-rw-r--r--english/lts/security/2016/dla-691.data10
-rw-r--r--english/lts/security/2016/dla-691.wml36
-rw-r--r--english/lts/security/2016/dla-692.data10
-rw-r--r--english/lts/security/2016/dla-692.wml18
-rw-r--r--english/lts/security/2016/dla-693.data10
-rw-r--r--english/lts/security/2016/dla-693.wml67
-rw-r--r--english/lts/security/2016/dla-694.data10
-rw-r--r--english/lts/security/2016/dla-694.wml19
-rw-r--r--english/lts/security/2016/dla-695.data10
-rw-r--r--english/lts/security/2016/dla-695.wml61
-rw-r--r--english/lts/security/2016/dla-696.data10
-rw-r--r--english/lts/security/2016/dla-696.wml21
-rw-r--r--english/lts/security/2016/dla-697.data10
-rw-r--r--english/lts/security/2016/dla-697.wml14
-rw-r--r--english/lts/security/2016/dla-698.data10
-rw-r--r--english/lts/security/2016/dla-698.wml90
-rw-r--r--english/lts/security/2016/dla-699.data10
-rw-r--r--english/lts/security/2016/dla-699.wml20
-rw-r--r--english/lts/security/2016/dla-700.data10
-rw-r--r--english/lts/security/2016/dla-700.wml18
-rw-r--r--english/lts/security/2016/dla-701.data10
-rw-r--r--english/lts/security/2016/dla-701.wml40
-rw-r--r--english/lts/security/2016/dla-702.data9
-rw-r--r--english/lts/security/2016/dla-702.wml25
-rw-r--r--english/lts/security/2016/dla-703.data9
-rw-r--r--english/lts/security/2016/dla-703.wml18
-rw-r--r--english/lts/security/2016/dla-704.data10
-rw-r--r--english/lts/security/2016/dla-704.wml20
-rw-r--r--english/lts/security/2016/dla-705.data10
-rw-r--r--english/lts/security/2016/dla-705.wml14
-rw-r--r--english/lts/security/2016/dla-706.data10
-rw-r--r--english/lts/security/2016/dla-706.wml18
-rw-r--r--english/lts/security/2016/dla-707.data10
-rw-r--r--english/lts/security/2016/dla-707.wml35
-rw-r--r--english/lts/security/2016/dla-708.data10
-rw-r--r--english/lts/security/2016/dla-708.wml32
-rw-r--r--english/lts/security/2016/dla-709.data9
-rw-r--r--english/lts/security/2016/dla-709.wml39
-rw-r--r--english/lts/security/2016/dla-710.data10
-rw-r--r--english/lts/security/2016/dla-710.wml22
-rw-r--r--english/lts/security/2016/dla-711.data10
-rw-r--r--english/lts/security/2016/dla-711.wml115
-rw-r--r--english/lts/security/2016/dla-712.data10
-rw-r--r--english/lts/security/2016/dla-712.wml32
-rw-r--r--english/lts/security/2016/dla-713.data10
-rw-r--r--english/lts/security/2016/dla-713.wml15
-rw-r--r--english/lts/security/2016/dla-714.data10
-rw-r--r--english/lts/security/2016/dla-714.wml39
-rw-r--r--english/lts/security/2016/dla-715.data10
-rw-r--r--english/lts/security/2016/dla-715.wml19
-rw-r--r--english/lts/security/2016/dla-716.data10
-rw-r--r--english/lts/security/2016/dla-716.wml34
-rw-r--r--english/lts/security/2016/dla-717.data10
-rw-r--r--english/lts/security/2016/dla-717.wml21
-rw-r--r--english/lts/security/2016/dla-718.data10
-rw-r--r--english/lts/security/2016/dla-718.wml20
-rw-r--r--english/lts/security/2016/dla-719.data10
-rw-r--r--english/lts/security/2016/dla-719.wml20
-rw-r--r--english/lts/security/2016/dla-720.data10
-rw-r--r--english/lts/security/2016/dla-720.wml61
-rw-r--r--english/lts/security/2016/dla-721.data10
-rw-r--r--english/lts/security/2016/dla-721.wml20
-rw-r--r--english/lts/security/2016/dla-722.data10
-rw-r--r--english/lts/security/2016/dla-722.wml29
-rw-r--r--english/lts/security/2016/dla-723.data10
-rw-r--r--english/lts/security/2016/dla-723.wml18
-rw-r--r--english/lts/security/2016/dla-724.data10
-rw-r--r--english/lts/security/2016/dla-724.wml16
-rw-r--r--english/lts/security/2016/dla-725.data9
-rw-r--r--english/lts/security/2016/dla-725.wml22
-rw-r--r--english/lts/security/2016/dla-726.data9
-rw-r--r--english/lts/security/2016/dla-726.wml18
-rw-r--r--english/lts/security/2016/dla-727.data10
-rw-r--r--english/lts/security/2016/dla-727.wml23
-rw-r--r--english/lts/security/2016/dla-728.data10
-rw-r--r--english/lts/security/2016/dla-728.wml31
-rw-r--r--english/lts/security/2016/dla-729.data10
-rw-r--r--english/lts/security/2016/dla-729.wml26
-rw-r--r--english/lts/security/2016/dla-730.data10
-rw-r--r--english/lts/security/2016/dla-730.wml27
-rw-r--r--english/lts/security/2016/dla-731-2.data10
-rw-r--r--english/lts/security/2016/dla-731-2.wml27
-rw-r--r--english/lts/security/2016/dla-731.data10
-rw-r--r--english/lts/security/2016/dla-731.wml22
-rw-r--r--english/lts/security/2016/dla-732-2.data10
-rw-r--r--english/lts/security/2016/dla-732-2.wml26
-rw-r--r--english/lts/security/2016/dla-732-3.data10
-rw-r--r--english/lts/security/2016/dla-732-3.wml27
-rw-r--r--english/lts/security/2016/dla-732.data10
-rw-r--r--english/lts/security/2016/dla-732.wml23
-rw-r--r--english/lts/security/2016/dla-733.data10
-rw-r--r--english/lts/security/2016/dla-733.wml18
-rw-r--r--english/lts/security/2016/dla-734.data10
-rw-r--r--english/lts/security/2016/dla-734.wml14
-rw-r--r--english/lts/security/2016/dla-735.data10
-rw-r--r--english/lts/security/2016/dla-735.wml17
-rw-r--r--english/lts/security/2016/dla-736.data10
-rw-r--r--english/lts/security/2016/dla-736.wml18
-rw-r--r--english/lts/security/2016/dla-737.data10
-rw-r--r--english/lts/security/2016/dla-737.wml18
-rw-r--r--english/lts/security/2016/dla-738.data10
-rw-r--r--english/lts/security/2016/dla-738.wml15
-rw-r--r--english/lts/security/2016/dla-739.data10
-rw-r--r--english/lts/security/2016/dla-739.wml56
-rw-r--r--english/lts/security/2016/dla-740.data10
-rw-r--r--english/lts/security/2016/dla-740.wml18
-rw-r--r--english/lts/security/2016/dla-741.data10
-rw-r--r--english/lts/security/2016/dla-741.wml19
-rw-r--r--english/lts/security/2016/dla-742.data10
-rw-r--r--english/lts/security/2016/dla-742.wml23
-rw-r--r--english/lts/security/2016/dla-743.data10
-rw-r--r--english/lts/security/2016/dla-743.wml20
-rw-r--r--english/lts/security/2016/dla-744.data10
-rw-r--r--english/lts/security/2016/dla-744.wml34
-rw-r--r--english/lts/security/2016/dla-745.data10
-rw-r--r--english/lts/security/2016/dla-745.wml20
-rw-r--r--english/lts/security/2016/dla-746-2.data10
-rw-r--r--english/lts/security/2016/dla-746-2.wml19
-rw-r--r--english/lts/security/2016/dla-746.data10
-rw-r--r--english/lts/security/2016/dla-746.wml21
-rw-r--r--english/lts/security/2016/dla-747.data10
-rw-r--r--english/lts/security/2016/dla-747.wml19
-rw-r--r--english/lts/security/2016/dla-748.data10
-rw-r--r--english/lts/security/2016/dla-748.wml19
-rw-r--r--english/lts/security/2016/dla-749.data10
-rw-r--r--english/lts/security/2016/dla-749.wml143
-rw-r--r--english/lts/security/2016/dla-750.data10
-rw-r--r--english/lts/security/2016/dla-750.wml18
-rw-r--r--english/lts/security/2016/dla-751.data10
-rw-r--r--english/lts/security/2016/dla-751.wml37
-rw-r--r--english/lts/security/2016/dla-752.data10
-rw-r--r--english/lts/security/2016/dla-752.wml21
-rw-r--r--english/lts/security/2016/dla-753.data10
-rw-r--r--english/lts/security/2016/dla-753.wml20
-rw-r--r--english/lts/security/2016/dla-754.data10
-rw-r--r--english/lts/security/2016/dla-754.wml21
-rw-r--r--english/lts/security/2016/dla-755.data10
-rw-r--r--english/lts/security/2016/dla-755.wml28
-rw-r--r--english/lts/security/2016/dla-756.data10
-rw-r--r--english/lts/security/2016/dla-756.wml21
-rw-r--r--english/lts/security/2016/dla-757.data10
-rw-r--r--english/lts/security/2016/dla-757.wml55
-rw-r--r--english/lts/security/2016/dla-758.data10
-rw-r--r--english/lts/security/2016/dla-758.wml25
-rw-r--r--english/lts/security/2016/dla-759.data10
-rw-r--r--english/lts/security/2016/dla-759.wml19
-rw-r--r--english/lts/security/2016/dla-760.data10
-rw-r--r--english/lts/security/2016/dla-760.wml37
-rw-r--r--english/lts/security/2016/dla-761.data10
-rw-r--r--english/lts/security/2016/dla-761.wml20
-rw-r--r--english/lts/security/2016/dla-762.data10
-rw-r--r--english/lts/security/2016/dla-762.wml20
-rw-r--r--english/lts/security/2016/dla-763.data10
-rw-r--r--english/lts/security/2016/dla-763.wml23
-rw-r--r--english/lts/security/2016/dla-764.data10
-rw-r--r--english/lts/security/2016/dla-764.wml38
-rw-r--r--english/lts/security/2016/dla-765.data10
-rw-r--r--english/lts/security/2016/dla-765.wml37
-rw-r--r--english/lts/security/2016/dla-766.data10
-rw-r--r--english/lts/security/2016/dla-766.wml20
-rw-r--r--english/lts/security/2016/dla-767.data10
-rw-r--r--english/lts/security/2016/dla-767.wml29
-rw-r--r--english/lts/security/2016/dla-768.data10
-rw-r--r--english/lts/security/2016/dla-768.wml31
-rw-r--r--english/lts/security/2016/dla-769.data10
-rw-r--r--english/lts/security/2016/dla-769.wml27
-rw-r--r--english/lts/security/2016/dla-770.data10
-rw-r--r--english/lts/security/2016/dla-770.wml24
-rw-r--r--english/lts/security/2016/dla-771.data10
-rw-r--r--english/lts/security/2016/dla-771.wml19
-rw-r--r--english/lts/security/2016/index.wml11
-rw-r--r--english/lts/security/2017/Makefile45
-rw-r--r--english/lts/security/2017/dla-1000.data10
-rw-r--r--english/lts/security/2017/dla-1000.wml22
-rw-r--r--english/lts/security/2017/dla-1001.data10
-rw-r--r--english/lts/security/2017/dla-1001.wml19
-rw-r--r--english/lts/security/2017/dla-1002.data10
-rw-r--r--english/lts/security/2017/dla-1002.wml24
-rw-r--r--english/lts/security/2017/dla-1003.data10
-rw-r--r--english/lts/security/2017/dla-1003.wml19
-rw-r--r--english/lts/security/2017/dla-1004.data10
-rw-r--r--english/lts/security/2017/dla-1004.wml22
-rw-r--r--english/lts/security/2017/dla-1005.data10
-rw-r--r--english/lts/security/2017/dla-1005.wml19
-rw-r--r--english/lts/security/2017/dla-1006.data10
-rw-r--r--english/lts/security/2017/dla-1006.wml37
-rw-r--r--english/lts/security/2017/dla-1007.data10
-rw-r--r--english/lts/security/2017/dla-1007.wml20
-rw-r--r--english/lts/security/2017/dla-1008.data10
-rw-r--r--english/lts/security/2017/dla-1008.wml48
-rw-r--r--english/lts/security/2017/dla-1009.data10
-rw-r--r--english/lts/security/2017/dla-1009.wml49
-rw-r--r--english/lts/security/2017/dla-1010.data10
-rw-r--r--english/lts/security/2017/dla-1010.wml41
-rw-r--r--english/lts/security/2017/dla-1011.data10
-rw-r--r--english/lts/security/2017/dla-1011.wml22
-rw-r--r--english/lts/security/2017/dla-1012.data10
-rw-r--r--english/lts/security/2017/dla-1012.wml23
-rw-r--r--english/lts/security/2017/dla-1013.data10
-rw-r--r--english/lts/security/2017/dla-1013.wml19
-rw-r--r--english/lts/security/2017/dla-1014.data10
-rw-r--r--english/lts/security/2017/dla-1014.wml18
-rw-r--r--english/lts/security/2017/dla-1015.data10
-rw-r--r--english/lts/security/2017/dla-1015.wml26
-rw-r--r--english/lts/security/2017/dla-1016.data10
-rw-r--r--english/lts/security/2017/dla-1016.wml15
-rw-r--r--english/lts/security/2017/dla-1017.data10
-rw-r--r--english/lts/security/2017/dla-1017.wml15
-rw-r--r--english/lts/security/2017/dla-1018.data10
-rw-r--r--english/lts/security/2017/dla-1018.wml16
-rw-r--r--english/lts/security/2017/dla-1019.data10
-rw-r--r--english/lts/security/2017/dla-1019.wml14
-rw-r--r--english/lts/security/2017/dla-1020.data10
-rw-r--r--english/lts/security/2017/dla-1020.wml19
-rw-r--r--english/lts/security/2017/dla-1021.data10
-rw-r--r--english/lts/security/2017/dla-1021.wml19
-rw-r--r--english/lts/security/2017/dla-1022.data10
-rw-r--r--english/lts/security/2017/dla-1022.wml33
-rw-r--r--english/lts/security/2017/dla-1023.data10
-rw-r--r--english/lts/security/2017/dla-1023.wml29
-rw-r--r--english/lts/security/2017/dla-1024.data10
-rw-r--r--english/lts/security/2017/dla-1024.wml16
-rw-r--r--english/lts/security/2017/dla-1025-2.data9
-rw-r--r--english/lts/security/2017/dla-1025-2.wml23
-rw-r--r--english/lts/security/2017/dla-1025.data10
-rw-r--r--english/lts/security/2017/dla-1025.wml39
-rw-r--r--english/lts/security/2017/dla-1026.data10
-rw-r--r--english/lts/security/2017/dla-1026.wml32
-rw-r--r--english/lts/security/2017/dla-1027.data10
-rw-r--r--english/lts/security/2017/dla-1027.wml24
-rw-r--r--english/lts/security/2017/dla-1028.data10
-rw-r--r--english/lts/security/2017/dla-1028.wml19
-rw-r--r--english/lts/security/2017/dla-1029.data10
-rw-r--r--english/lts/security/2017/dla-1029.wml42
-rw-r--r--english/lts/security/2017/dla-1030.data10
-rw-r--r--english/lts/security/2017/dla-1030.wml20
-rw-r--r--english/lts/security/2017/dla-1031.data10
-rw-r--r--english/lts/security/2017/dla-1031.wml20
-rw-r--r--english/lts/security/2017/dla-1032.data10
-rw-r--r--english/lts/security/2017/dla-1032.wml24
-rw-r--r--english/lts/security/2017/dla-1033.data10
-rw-r--r--english/lts/security/2017/dla-1033.wml20
-rw-r--r--english/lts/security/2017/dla-1034.data10
-rw-r--r--english/lts/security/2017/dla-1034.wml54
-rw-r--r--english/lts/security/2017/dla-1035.data10
-rw-r--r--english/lts/security/2017/dla-1035.wml105
-rw-r--r--english/lts/security/2017/dla-1036.data10
-rw-r--r--english/lts/security/2017/dla-1036.wml21
-rw-r--r--english/lts/security/2017/dla-1037.data10
-rw-r--r--english/lts/security/2017/dla-1037.wml20
-rw-r--r--english/lts/security/2017/dla-1038.data10
-rw-r--r--english/lts/security/2017/dla-1038.wml27
-rw-r--r--english/lts/security/2017/dla-1039.data10
-rw-r--r--english/lts/security/2017/dla-1039.wml30
-rw-r--r--english/lts/security/2017/dla-1040.data10
-rw-r--r--english/lts/security/2017/dla-1040.wml27
-rw-r--r--english/lts/security/2017/dla-1041.data10
-rw-r--r--english/lts/security/2017/dla-1041.wml39
-rw-r--r--english/lts/security/2017/dla-1042.data10
-rw-r--r--english/lts/security/2017/dla-1042.wml63
-rw-r--r--english/lts/security/2017/dla-1043.data10
-rw-r--r--english/lts/security/2017/dla-1043.wml28
-rw-r--r--english/lts/security/2017/dla-1044.data10
-rw-r--r--english/lts/security/2017/dla-1044.wml23
-rw-r--r--english/lts/security/2017/dla-1045.data10
-rw-r--r--english/lts/security/2017/dla-1045.wml20
-rw-r--r--english/lts/security/2017/dla-1046.data10
-rw-r--r--english/lts/security/2017/dla-1046.wml22
-rw-r--r--english/lts/security/2017/dla-1047.data10
-rw-r--r--english/lts/security/2017/dla-1047.wml20
-rw-r--r--english/lts/security/2017/dla-1048.data10
-rw-r--r--english/lts/security/2017/dla-1048.wml20
-rw-r--r--english/lts/security/2017/dla-1049.data10
-rw-r--r--english/lts/security/2017/dla-1049.wml16
-rw-r--r--english/lts/security/2017/dla-1050.data10
-rw-r--r--english/lts/security/2017/dla-1050.wml15
-rw-r--r--english/lts/security/2017/dla-1051.data10
-rw-r--r--english/lts/security/2017/dla-1051.wml35
-rw-r--r--english/lts/security/2017/dla-1052.data10
-rw-r--r--english/lts/security/2017/dla-1052.wml16
-rw-r--r--english/lts/security/2017/dla-1053.data10
-rw-r--r--english/lts/security/2017/dla-1053.wml21
-rw-r--r--english/lts/security/2017/dla-1054.data10
-rw-r--r--english/lts/security/2017/dla-1054.wml16
-rw-r--r--english/lts/security/2017/dla-1055.data10
-rw-r--r--english/lts/security/2017/dla-1055.wml23
-rw-r--r--english/lts/security/2017/dla-1056.data10
-rw-r--r--english/lts/security/2017/dla-1056.wml15
-rw-r--r--english/lts/security/2017/dla-1057.data10
-rw-r--r--english/lts/security/2017/dla-1057.wml19
-rw-r--r--english/lts/security/2017/dla-1058.data10
-rw-r--r--english/lts/security/2017/dla-1058.wml20
-rw-r--r--english/lts/security/2017/dla-1059.data10
-rw-r--r--english/lts/security/2017/dla-1059.wml22
-rw-r--r--english/lts/security/2017/dla-1060.data10
-rw-r--r--english/lts/security/2017/dla-1060.wml30
-rw-r--r--english/lts/security/2017/dla-1061.data10
-rw-r--r--english/lts/security/2017/dla-1061.wml22
-rw-r--r--english/lts/security/2017/dla-1062.data10
-rw-r--r--english/lts/security/2017/dla-1062.wml25
-rw-r--r--english/lts/security/2017/dla-1063.data10
-rw-r--r--english/lts/security/2017/dla-1063.wml26
-rw-r--r--english/lts/security/2017/dla-1064.data10
-rw-r--r--english/lts/security/2017/dla-1064.wml22
-rw-r--r--english/lts/security/2017/dla-1065.data10
-rw-r--r--english/lts/security/2017/dla-1065.wml19
-rw-r--r--english/lts/security/2017/dla-1066.data10
-rw-r--r--english/lts/security/2017/dla-1066.wml22
-rw-r--r--english/lts/security/2017/dla-1067.data10
-rw-r--r--english/lts/security/2017/dla-1067.wml20
-rw-r--r--english/lts/security/2017/dla-1068.data10
-rw-r--r--english/lts/security/2017/dla-1068.wml20
-rw-r--r--english/lts/security/2017/dla-1069.data10
-rw-r--r--english/lts/security/2017/dla-1069.wml20
-rw-r--r--english/lts/security/2017/dla-1070.data10
-rw-r--r--english/lts/security/2017/dla-1070.wml39
-rw-r--r--english/lts/security/2017/dla-1071.data10
-rw-r--r--english/lts/security/2017/dla-1071.wml39
-rw-r--r--english/lts/security/2017/dla-1072.data10
-rw-r--r--english/lts/security/2017/dla-1072.wml36
-rw-r--r--english/lts/security/2017/dla-1073.data10
-rw-r--r--english/lts/security/2017/dla-1073.wml21
-rw-r--r--english/lts/security/2017/dla-1074.data10
-rw-r--r--english/lts/security/2017/dla-1074.wml19
-rw-r--r--english/lts/security/2017/dla-1075.data10
-rw-r--r--english/lts/security/2017/dla-1075.wml18
-rw-r--r--english/lts/security/2017/dla-1076.data10
-rw-r--r--english/lts/security/2017/dla-1076.wml19
-rw-r--r--english/lts/security/2017/dla-1077.data10
-rw-r--r--english/lts/security/2017/dla-1077.wml20
-rw-r--r--english/lts/security/2017/dla-1078.data10
-rw-r--r--english/lts/security/2017/dla-1078.wml19
-rw-r--r--english/lts/security/2017/dla-1079.data10
-rw-r--r--english/lts/security/2017/dla-1079.wml43
-rw-r--r--english/lts/security/2017/dla-1080.data10
-rw-r--r--english/lts/security/2017/dla-1080.wml22
-rw-r--r--english/lts/security/2017/dla-1081.data10
-rw-r--r--english/lts/security/2017/dla-1081.wml23
-rw-r--r--english/lts/security/2017/dla-1082.data10
-rw-r--r--english/lts/security/2017/dla-1082.wml52
-rw-r--r--english/lts/security/2017/dla-1083.data10
-rw-r--r--english/lts/security/2017/dla-1083.wml20
-rw-r--r--english/lts/security/2017/dla-1084.data10
-rw-r--r--english/lts/security/2017/dla-1084.wml16
-rw-r--r--english/lts/security/2017/dla-1085.data10
-rw-r--r--english/lts/security/2017/dla-1085.wml16
-rw-r--r--english/lts/security/2017/dla-1086.data9
-rw-r--r--english/lts/security/2017/dla-1086.wml19
-rw-r--r--english/lts/security/2017/dla-1087-2.data9
-rw-r--r--english/lts/security/2017/dla-1087-2.wml24
-rw-r--r--english/lts/security/2017/dla-1087.data10
-rw-r--r--english/lts/security/2017/dla-1087.wml20
-rw-r--r--english/lts/security/2017/dla-1088.data10
-rw-r--r--english/lts/security/2017/dla-1088.wml31
-rw-r--r--english/lts/security/2017/dla-1089.data10
-rw-r--r--english/lts/security/2017/dla-1089.wml33
-rw-r--r--english/lts/security/2017/dla-1090.data10
-rw-r--r--english/lts/security/2017/dla-1090.wml19
-rw-r--r--english/lts/security/2017/dla-1091.data10
-rw-r--r--english/lts/security/2017/dla-1091.wml15
-rw-r--r--english/lts/security/2017/dla-1092.data10
-rw-r--r--english/lts/security/2017/dla-1092.wml15
-rw-r--r--english/lts/security/2017/dla-1093.data10
-rw-r--r--english/lts/security/2017/dla-1093.wml46
-rw-r--r--english/lts/security/2017/dla-1094.data10
-rw-r--r--english/lts/security/2017/dla-1094.wml22
-rw-r--r--english/lts/security/2017/dla-1095.data10
-rw-r--r--english/lts/security/2017/dla-1095.wml21
-rw-r--r--english/lts/security/2017/dla-1096.data10
-rw-r--r--english/lts/security/2017/dla-1096.wml14
-rw-r--r--english/lts/security/2017/dla-1097.data10
-rw-r--r--english/lts/security/2017/dla-1097.wml19
-rw-r--r--english/lts/security/2017/dla-1098.data10
-rw-r--r--english/lts/security/2017/dla-1098.wml39
-rw-r--r--english/lts/security/2017/dla-1099.data10
-rw-r--r--english/lts/security/2017/dla-1099.wml175
-rw-r--r--english/lts/security/2017/dla-1100.data10
-rw-r--r--english/lts/security/2017/dla-1100.wml19
-rw-r--r--english/lts/security/2017/dla-1101.data10
-rw-r--r--english/lts/security/2017/dla-1101.wml19
-rw-r--r--english/lts/security/2017/dla-1102.data10
-rw-r--r--english/lts/security/2017/dla-1102.wml19
-rw-r--r--english/lts/security/2017/dla-1103.data10
-rw-r--r--english/lts/security/2017/dla-1103.wml20
-rw-r--r--english/lts/security/2017/dla-1104.data10
-rw-r--r--english/lts/security/2017/dla-1104.wml21
-rw-r--r--english/lts/security/2017/dla-1105.data10
-rw-r--r--english/lts/security/2017/dla-1105.wml33
-rw-r--r--english/lts/security/2017/dla-1106.data10
-rw-r--r--english/lts/security/2017/dla-1106.wml20
-rw-r--r--english/lts/security/2017/dla-1107.data10
-rw-r--r--english/lts/security/2017/dla-1107.wml33
-rw-r--r--english/lts/security/2017/dla-1108.data10
-rw-r--r--english/lts/security/2017/dla-1108.wml20
-rw-r--r--english/lts/security/2017/dla-1109.data10
-rw-r--r--english/lts/security/2017/dla-1109.wml27
-rw-r--r--english/lts/security/2017/dla-1110.data10
-rw-r--r--english/lts/security/2017/dla-1110.wml31
-rw-r--r--english/lts/security/2017/dla-1111.data10
-rw-r--r--english/lts/security/2017/dla-1111.wml19
-rw-r--r--english/lts/security/2017/dla-1112.data10
-rw-r--r--english/lts/security/2017/dla-1112.wml30
-rw-r--r--english/lts/security/2017/dla-1113.data10
-rw-r--r--english/lts/security/2017/dla-1113.wml31
-rw-r--r--english/lts/security/2017/dla-1114.data10
-rw-r--r--english/lts/security/2017/dla-1114.wml50
-rw-r--r--english/lts/security/2017/dla-1115.data10
-rw-r--r--english/lts/security/2017/dla-1115.wml18
-rw-r--r--english/lts/security/2017/dla-1116.data10
-rw-r--r--english/lts/security/2017/dla-1116.wml38
-rw-r--r--english/lts/security/2017/dla-1117.data10
-rw-r--r--english/lts/security/2017/dla-1117.wml18
-rw-r--r--english/lts/security/2017/dla-1118.data10
-rw-r--r--english/lts/security/2017/dla-1118.wml21
-rw-r--r--english/lts/security/2017/dla-1119.data10
-rw-r--r--english/lts/security/2017/dla-1119.wml56
-rw-r--r--english/lts/security/2017/dla-1120.data10
-rw-r--r--english/lts/security/2017/dla-1120.wml22
-rw-r--r--english/lts/security/2017/dla-1121.data10
-rw-r--r--english/lts/security/2017/dla-1121.wml18
-rw-r--r--english/lts/security/2017/dla-1122.data10
-rw-r--r--english/lts/security/2017/dla-1122.wml27
-rw-r--r--english/lts/security/2017/dla-1123.data10
-rw-r--r--english/lts/security/2017/dla-1123.wml15
-rw-r--r--english/lts/security/2017/dla-1124.data10
-rw-r--r--english/lts/security/2017/dla-1124.wml21
-rw-r--r--english/lts/security/2017/dla-1125.data10
-rw-r--r--english/lts/security/2017/dla-1125.wml25
-rw-r--r--english/lts/security/2017/dla-1126.data10
-rw-r--r--english/lts/security/2017/dla-1126.wml28
-rw-r--r--english/lts/security/2017/dla-1127.data10
-rw-r--r--english/lts/security/2017/dla-1127.wml21
-rw-r--r--english/lts/security/2017/dla-1128.data10
-rw-r--r--english/lts/security/2017/dla-1128.wml35
-rw-r--r--english/lts/security/2017/dla-1129.data10
-rw-r--r--english/lts/security/2017/dla-1129.wml36
-rw-r--r--english/lts/security/2017/dla-1130.data10
-rw-r--r--english/lts/security/2017/dla-1130.wml50
-rw-r--r--english/lts/security/2017/dla-1131.data10
-rw-r--r--english/lts/security/2017/dla-1131.wml23
-rw-r--r--english/lts/security/2017/dla-1132.data10
-rw-r--r--english/lts/security/2017/dla-1132.wml87
-rw-r--r--english/lts/security/2017/dla-1133.data10
-rw-r--r--english/lts/security/2017/dla-1133.wml57
-rw-r--r--english/lts/security/2017/dla-1134.data10
-rw-r--r--english/lts/security/2017/dla-1134.wml17
-rw-r--r--english/lts/security/2017/dla-1135.data10
-rw-r--r--english/lts/security/2017/dla-1135.wml19
-rw-r--r--english/lts/security/2017/dla-1136.data10
-rw-r--r--english/lts/security/2017/dla-1136.wml19
-rw-r--r--english/lts/security/2017/dla-1137.data10
-rw-r--r--english/lts/security/2017/dla-1137.wml19
-rw-r--r--english/lts/security/2017/dla-1138.data10
-rw-r--r--english/lts/security/2017/dla-1138.wml22
-rw-r--r--english/lts/security/2017/dla-1139.data10
-rw-r--r--english/lts/security/2017/dla-1139.wml33
-rw-r--r--english/lts/security/2017/dla-1140.data10
-rw-r--r--english/lts/security/2017/dla-1140.wml33
-rw-r--r--english/lts/security/2017/dla-1141.data10
-rw-r--r--english/lts/security/2017/dla-1141.wml27
-rw-r--r--english/lts/security/2017/dla-1142.data10
-rw-r--r--english/lts/security/2017/dla-1142.wml45
-rw-r--r--english/lts/security/2017/dla-1143.data10
-rw-r--r--english/lts/security/2017/dla-1143.wml19
-rw-r--r--english/lts/security/2017/dla-1144.data10
-rw-r--r--english/lts/security/2017/dla-1144.wml23
-rw-r--r--english/lts/security/2017/dla-1145.data10
-rw-r--r--english/lts/security/2017/dla-1145.wml26
-rw-r--r--english/lts/security/2017/dla-1146.data10
-rw-r--r--english/lts/security/2017/dla-1146.wml21
-rw-r--r--english/lts/security/2017/dla-1147.data10
-rw-r--r--english/lts/security/2017/dla-1147.wml40
-rw-r--r--english/lts/security/2017/dla-1148.data10
-rw-r--r--english/lts/security/2017/dla-1148.wml26
-rw-r--r--english/lts/security/2017/dla-1149.data10
-rw-r--r--english/lts/security/2017/dla-1149.wml28
-rw-r--r--english/lts/security/2017/dla-1150.data10
-rw-r--r--english/lts/security/2017/dla-1150.wml84
-rw-r--r--english/lts/security/2017/dla-1151-2.data10
-rw-r--r--english/lts/security/2017/dla-1151-2.wml28
-rw-r--r--english/lts/security/2017/dla-1151.data10
-rw-r--r--english/lts/security/2017/dla-1151.wml78
-rw-r--r--english/lts/security/2017/dla-1152.data10
-rw-r--r--english/lts/security/2017/dla-1152.wml20
-rw-r--r--english/lts/security/2017/dla-1153.data10
-rw-r--r--english/lts/security/2017/dla-1153.wml24
-rw-r--r--english/lts/security/2017/dla-1154.data10
-rw-r--r--english/lts/security/2017/dla-1154.wml72
-rw-r--r--english/lts/security/2017/dla-1155.data9
-rw-r--r--english/lts/security/2017/dla-1155.wml28
-rw-r--r--english/lts/security/2017/dla-1156.data9
-rw-r--r--english/lts/security/2017/dla-1156.wml18
-rw-r--r--english/lts/security/2017/dla-1157.data10
-rw-r--r--english/lts/security/2017/dla-1157.wml31
-rw-r--r--english/lts/security/2017/dla-1158.data10
-rw-r--r--english/lts/security/2017/dla-1158.wml21
-rw-r--r--english/lts/security/2017/dla-1159.data10
-rw-r--r--english/lts/security/2017/dla-1159.wml43
-rw-r--r--english/lts/security/2017/dla-1160.data10
-rw-r--r--english/lts/security/2017/dla-1160.wml21
-rw-r--r--english/lts/security/2017/dla-1161.data10
-rw-r--r--english/lts/security/2017/dla-1161.wml18
-rw-r--r--english/lts/security/2017/dla-1162.data10
-rw-r--r--english/lts/security/2017/dla-1162.wml20
-rw-r--r--english/lts/security/2017/dla-1163.data10
-rw-r--r--english/lts/security/2017/dla-1163.wml17
-rw-r--r--english/lts/security/2017/dla-1164.data10
-rw-r--r--english/lts/security/2017/dla-1164.wml32
-rw-r--r--english/lts/security/2017/dla-1165.data10
-rw-r--r--english/lts/security/2017/dla-1165.wml21
-rw-r--r--english/lts/security/2017/dla-1166-2.data10
-rw-r--r--english/lts/security/2017/dla-1166-2.wml26
-rw-r--r--english/lts/security/2017/dla-1166.data10
-rw-r--r--english/lts/security/2017/dla-1166.wml23
-rw-r--r--english/lts/security/2017/dla-1167.data10
-rw-r--r--english/lts/security/2017/dla-1167.wml21
-rw-r--r--english/lts/security/2017/dla-1168.data10
-rw-r--r--english/lts/security/2017/dla-1168.wml28
-rw-r--r--english/lts/security/2017/dla-1169.data9
-rw-r--r--english/lts/security/2017/dla-1169.wml29
-rw-r--r--english/lts/security/2017/dla-1170.data10
-rw-r--r--english/lts/security/2017/dla-1170.wml34
-rw-r--r--english/lts/security/2017/dla-1171.data10
-rw-r--r--english/lts/security/2017/dla-1171.wml19
-rw-r--r--english/lts/security/2017/dla-1172.data10
-rw-r--r--english/lts/security/2017/dla-1172.wml20
-rw-r--r--english/lts/security/2017/dla-1173.data10
-rw-r--r--english/lts/security/2017/dla-1173.wml15
-rw-r--r--english/lts/security/2017/dla-1174.data10
-rw-r--r--english/lts/security/2017/dla-1174.wml14
-rw-r--r--english/lts/security/2017/dla-1175.data10
-rw-r--r--english/lts/security/2017/dla-1175.wml15
-rw-r--r--english/lts/security/2017/dla-1176.data10
-rw-r--r--english/lts/security/2017/dla-1176.wml39
-rw-r--r--english/lts/security/2017/dla-1177.data10
-rw-r--r--english/lts/security/2017/dla-1177.wml49
-rw-r--r--english/lts/security/2017/dla-1178.data10
-rw-r--r--english/lts/security/2017/dla-1178.wml20
-rw-r--r--english/lts/security/2017/dla-1179.data10
-rw-r--r--english/lts/security/2017/dla-1179.wml20
-rw-r--r--english/lts/security/2017/dla-1180.data10
-rw-r--r--english/lts/security/2017/dla-1180.wml22
-rw-r--r--english/lts/security/2017/dla-1181.data10
-rw-r--r--english/lts/security/2017/dla-1181.wml48
-rw-r--r--english/lts/security/2017/dla-1182.data10
-rw-r--r--english/lts/security/2017/dla-1182.wml29
-rw-r--r--english/lts/security/2017/dla-1183.data10
-rw-r--r--english/lts/security/2017/dla-1183.wml20
-rw-r--r--english/lts/security/2017/dla-1184.data10
-rw-r--r--english/lts/security/2017/dla-1184.wml20
-rw-r--r--english/lts/security/2017/dla-1185.data10
-rw-r--r--english/lts/security/2017/dla-1185.wml22
-rw-r--r--english/lts/security/2017/dla-1186.data10
-rw-r--r--english/lts/security/2017/dla-1186.wml19
-rw-r--r--english/lts/security/2017/dla-1187.data10
-rw-r--r--english/lts/security/2017/dla-1187.wml20
-rw-r--r--english/lts/security/2017/dla-1188.data10
-rw-r--r--english/lts/security/2017/dla-1188.wml18
-rw-r--r--english/lts/security/2017/dla-1189.data10
-rw-r--r--english/lts/security/2017/dla-1189.wml31
-rw-r--r--english/lts/security/2017/dla-1190.data10
-rw-r--r--english/lts/security/2017/dla-1190.wml31
-rw-r--r--english/lts/security/2017/dla-1191.data10
-rw-r--r--english/lts/security/2017/dla-1191.wml21
-rw-r--r--english/lts/security/2017/dla-1192.data10
-rw-r--r--english/lts/security/2017/dla-1192.wml33
-rw-r--r--english/lts/security/2017/dla-1193.data10
-rw-r--r--english/lts/security/2017/dla-1193.wml29
-rw-r--r--english/lts/security/2017/dla-1194.data10
-rw-r--r--english/lts/security/2017/dla-1194.wml32
-rw-r--r--english/lts/security/2017/dla-1195.data10
-rw-r--r--english/lts/security/2017/dla-1195.wml27
-rw-r--r--english/lts/security/2017/dla-1196.data10
-rw-r--r--english/lts/security/2017/dla-1196.wml21
-rw-r--r--english/lts/security/2017/dla-1197.data10
-rw-r--r--english/lts/security/2017/dla-1197.wml20
-rw-r--r--english/lts/security/2017/dla-1198.data10
-rw-r--r--english/lts/security/2017/dla-1198.wml21
-rw-r--r--english/lts/security/2017/dla-1199.data10
-rw-r--r--english/lts/security/2017/dla-1199.wml20
-rw-r--r--english/lts/security/2017/dla-1200.data10
-rw-r--r--english/lts/security/2017/dla-1200.wml227
-rw-r--r--english/lts/security/2017/dla-1201.data10
-rw-r--r--english/lts/security/2017/dla-1201.wml20
-rw-r--r--english/lts/security/2017/dla-1202.data10
-rw-r--r--english/lts/security/2017/dla-1202.wml19
-rw-r--r--english/lts/security/2017/dla-1203-2.data9
-rw-r--r--english/lts/security/2017/dla-1203-2.wml19
-rw-r--r--english/lts/security/2017/dla-1203.data10
-rw-r--r--english/lts/security/2017/dla-1203.wml20
-rw-r--r--english/lts/security/2017/dla-1204.data10
-rw-r--r--english/lts/security/2017/dla-1204.wml17
-rw-r--r--english/lts/security/2017/dla-1205.data10
-rw-r--r--english/lts/security/2017/dla-1205.wml62
-rw-r--r--english/lts/security/2017/dla-1206.data10
-rw-r--r--english/lts/security/2017/dla-1206.wml27
-rw-r--r--english/lts/security/2017/dla-1207.data10
-rw-r--r--english/lts/security/2017/dla-1207.wml22
-rw-r--r--english/lts/security/2017/dla-1208.data10
-rw-r--r--english/lts/security/2017/dla-1208.wml24
-rw-r--r--english/lts/security/2017/dla-1209.data10
-rw-r--r--english/lts/security/2017/dla-1209.wml17
-rw-r--r--english/lts/security/2017/dla-1210.data10
-rw-r--r--english/lts/security/2017/dla-1210.wml15
-rw-r--r--english/lts/security/2017/dla-1211.data10
-rw-r--r--english/lts/security/2017/dla-1211.wml25
-rw-r--r--english/lts/security/2017/dla-1212.data10
-rw-r--r--english/lts/security/2017/dla-1212.wml19
-rw-r--r--english/lts/security/2017/dla-1213.data10
-rw-r--r--english/lts/security/2017/dla-1213.wml25
-rw-r--r--english/lts/security/2017/dla-1214.data10
-rw-r--r--english/lts/security/2017/dla-1214.wml19
-rw-r--r--english/lts/security/2017/dla-1215.data10
-rw-r--r--english/lts/security/2017/dla-1215.wml21
-rw-r--r--english/lts/security/2017/dla-1216.data10
-rw-r--r--english/lts/security/2017/dla-1216.wml48
-rw-r--r--english/lts/security/2017/dla-1217.data10
-rw-r--r--english/lts/security/2017/dla-1217.wml19
-rw-r--r--english/lts/security/2017/dla-1218.data10
-rw-r--r--english/lts/security/2017/dla-1218.wml21
-rw-r--r--english/lts/security/2017/dla-1219.data10
-rw-r--r--english/lts/security/2017/dla-1219.wml21
-rw-r--r--english/lts/security/2017/dla-1220.data10
-rw-r--r--english/lts/security/2017/dla-1220.wml19
-rw-r--r--english/lts/security/2017/dla-1221.data10
-rw-r--r--english/lts/security/2017/dla-1221.wml34
-rw-r--r--english/lts/security/2017/dla-1222.data10
-rw-r--r--english/lts/security/2017/dla-1222.wml34
-rw-r--r--english/lts/security/2017/dla-1223.data10
-rw-r--r--english/lts/security/2017/dla-1223.wml19
-rw-r--r--english/lts/security/2017/dla-1224.data10
-rw-r--r--english/lts/security/2017/dla-1224.wml31
-rw-r--r--english/lts/security/2017/dla-1225.data10
-rw-r--r--english/lts/security/2017/dla-1225.wml33
-rw-r--r--english/lts/security/2017/dla-1226.data10
-rw-r--r--english/lts/security/2017/dla-1226.wml22
-rw-r--r--english/lts/security/2017/dla-547-2.data10
-rw-r--r--english/lts/security/2017/dla-547-2.wml23
-rw-r--r--english/lts/security/2017/dla-610-2.data10
-rw-r--r--english/lts/security/2017/dla-610-2.wml19
-rw-r--r--english/lts/security/2017/dla-613-2.data10
-rw-r--r--english/lts/security/2017/dla-613-2.wml21
-rw-r--r--english/lts/security/2017/dla-684-2.data9
-rw-r--r--english/lts/security/2017/dla-684-2.wml18
-rw-r--r--english/lts/security/2017/dla-693-2.data10
-rw-r--r--english/lts/security/2017/dla-693-2.wml24
-rw-r--r--english/lts/security/2017/dla-761-2.data10
-rw-r--r--english/lts/security/2017/dla-761-2.wml19
-rw-r--r--english/lts/security/2017/dla-770-2.data10
-rw-r--r--english/lts/security/2017/dla-770-2.wml24
-rw-r--r--english/lts/security/2017/dla-772.data10
-rw-r--r--english/lts/security/2017/dla-772.wml167
-rw-r--r--english/lts/security/2017/dla-773-2.data10
-rw-r--r--english/lts/security/2017/dla-773-2.wml18
-rw-r--r--english/lts/security/2017/dla-773-3.data10
-rw-r--r--english/lts/security/2017/dla-773-3.wml19
-rw-r--r--english/lts/security/2017/dla-773-4.data9
-rw-r--r--english/lts/security/2017/dla-773-4.wml17
-rw-r--r--english/lts/security/2017/dla-773.data10
-rw-r--r--english/lts/security/2017/dla-773.wml17
-rw-r--r--english/lts/security/2017/dla-774.data9
-rw-r--r--english/lts/security/2017/dla-774.wml35
-rw-r--r--english/lts/security/2017/dla-775.data10
-rw-r--r--english/lts/security/2017/dla-775.wml26
-rw-r--r--english/lts/security/2017/dla-776.data10
-rw-r--r--english/lts/security/2017/dla-776.wml22
-rw-r--r--english/lts/security/2017/dla-777.data10
-rw-r--r--english/lts/security/2017/dla-777.wml31
-rw-r--r--english/lts/security/2017/dla-778.data10
-rw-r--r--english/lts/security/2017/dla-778.wml15
-rw-r--r--english/lts/security/2017/dla-779.data10
-rw-r--r--english/lts/security/2017/dla-779.wml26
-rw-r--r--english/lts/security/2017/dla-780.data10
-rw-r--r--english/lts/security/2017/dla-780.wml33
-rw-r--r--english/lts/security/2017/dla-781-2.data10
-rw-r--r--english/lts/security/2017/dla-781-2.wml19
-rw-r--r--english/lts/security/2017/dla-781.data10
-rw-r--r--english/lts/security/2017/dla-781.wml41
-rw-r--r--english/lts/security/2017/dla-782.data10
-rw-r--r--english/lts/security/2017/dla-782.wml20
-rw-r--r--english/lts/security/2017/dla-783.data10
-rw-r--r--english/lts/security/2017/dla-783.wml33
-rw-r--r--english/lts/security/2017/dla-784.data9
-rw-r--r--english/lts/security/2017/dla-784.wml16
-rw-r--r--english/lts/security/2017/dla-785.data9
-rw-r--r--english/lts/security/2017/dla-785.wml20
-rw-r--r--english/lts/security/2017/dla-786.data10
-rw-r--r--english/lts/security/2017/dla-786.wml19
-rw-r--r--english/lts/security/2017/dla-787.data10
-rw-r--r--english/lts/security/2017/dla-787.wml23
-rw-r--r--english/lts/security/2017/dla-788.data10
-rw-r--r--english/lts/security/2017/dla-788.wml23
-rw-r--r--english/lts/security/2017/dla-789.data10
-rw-r--r--english/lts/security/2017/dla-789.wml43
-rw-r--r--english/lts/security/2017/dla-790.data10
-rw-r--r--english/lts/security/2017/dla-790.wml20
-rw-r--r--english/lts/security/2017/dla-791.data10
-rw-r--r--english/lts/security/2017/dla-791.wml18
-rw-r--r--english/lts/security/2017/dla-792.data10
-rw-r--r--english/lts/security/2017/dla-792.wml23
-rw-r--r--english/lts/security/2017/dla-793.data10
-rw-r--r--english/lts/security/2017/dla-793.wml19
-rw-r--r--english/lts/security/2017/dla-794.data10
-rw-r--r--english/lts/security/2017/dla-794.wml23
-rw-r--r--english/lts/security/2017/dla-795.data10
-rw-r--r--english/lts/security/2017/dla-795.wml124
-rw-r--r--english/lts/security/2017/dla-796.data10
-rw-r--r--english/lts/security/2017/dla-796.wml27
-rw-r--r--english/lts/security/2017/dla-797.data10
-rw-r--r--english/lts/security/2017/dla-797.wml27
-rw-r--r--english/lts/security/2017/dla-798.data10
-rw-r--r--english/lts/security/2017/dla-798.wml53
-rw-r--r--english/lts/security/2017/dla-799.data10
-rw-r--r--english/lts/security/2017/dla-799.wml51
-rw-r--r--english/lts/security/2017/dla-800.data10
-rw-r--r--english/lts/security/2017/dla-800.wml20
-rw-r--r--english/lts/security/2017/dla-801.data10
-rw-r--r--english/lts/security/2017/dla-801.wml19
-rw-r--r--english/lts/security/2017/dla-802.data9
-rw-r--r--english/lts/security/2017/dla-802.wml19
-rw-r--r--english/lts/security/2017/dla-803.data10
-rw-r--r--english/lts/security/2017/dla-803.wml18
-rw-r--r--english/lts/security/2017/dla-804.data10
-rw-r--r--english/lts/security/2017/dla-804.wml37
-rw-r--r--english/lts/security/2017/dla-805.data10
-rw-r--r--english/lts/security/2017/dla-805.wml43
-rw-r--r--english/lts/security/2017/dla-806.data10
-rw-r--r--english/lts/security/2017/dla-806.wml25
-rw-r--r--english/lts/security/2017/dla-807.data10
-rw-r--r--english/lts/security/2017/dla-807.wml22
-rw-r--r--english/lts/security/2017/dla-808.data10
-rw-r--r--english/lts/security/2017/dla-808.wml20
-rw-r--r--english/lts/security/2017/dla-809.data10
-rw-r--r--english/lts/security/2017/dla-809.wml188
-rw-r--r--english/lts/security/2017/dla-810.data10
-rw-r--r--english/lts/security/2017/dla-810.wml14
-rw-r--r--english/lts/security/2017/dla-811.data10
-rw-r--r--english/lts/security/2017/dla-811.wml29
-rw-r--r--english/lts/security/2017/dla-812.data10
-rw-r--r--english/lts/security/2017/dla-812.wml33
-rw-r--r--english/lts/security/2017/dla-813.data10
-rw-r--r--english/lts/security/2017/dla-813.wml86
-rw-r--r--english/lts/security/2017/dla-814.data10
-rw-r--r--english/lts/security/2017/dla-814.wml36
-rw-r--r--english/lts/security/2017/dla-815.data10
-rw-r--r--english/lts/security/2017/dla-815.wml20
-rw-r--r--english/lts/security/2017/dla-816.data10
-rw-r--r--english/lts/security/2017/dla-816.wml18
-rw-r--r--english/lts/security/2017/dla-817.data10
-rw-r--r--english/lts/security/2017/dla-817.wml15
-rw-r--r--english/lts/security/2017/dla-818.data10
-rw-r--r--english/lts/security/2017/dla-818.wml124
-rw-r--r--english/lts/security/2017/dla-819-2.data10
-rw-r--r--english/lts/security/2017/dla-819-2.wml26
-rw-r--r--english/lts/security/2017/dla-819.data10
-rw-r--r--english/lts/security/2017/dla-819.wml20
-rw-r--r--english/lts/security/2017/dla-820.data10
-rw-r--r--english/lts/security/2017/dla-820.wml19
-rw-r--r--english/lts/security/2017/dla-821.data10
-rw-r--r--english/lts/security/2017/dla-821.wml21
-rw-r--r--english/lts/security/2017/dla-822.data10
-rw-r--r--english/lts/security/2017/dla-822.wml22
-rw-r--r--english/lts/security/2017/dla-823-2.data10
-rw-r--r--english/lts/security/2017/dla-823-2.wml24
-rw-r--r--english/lts/security/2017/dla-823.data10
-rw-r--r--english/lts/security/2017/dla-823.wml19
-rw-r--r--english/lts/security/2017/dla-824.data10
-rw-r--r--english/lts/security/2017/dla-824.wml19
-rw-r--r--english/lts/security/2017/dla-825.data10
-rw-r--r--english/lts/security/2017/dla-825.wml38
-rw-r--r--english/lts/security/2017/dla-826.data10
-rw-r--r--english/lts/security/2017/dla-826.wml17
-rw-r--r--english/lts/security/2017/dla-827.data10
-rw-r--r--english/lts/security/2017/dla-827.wml19
-rw-r--r--english/lts/security/2017/dla-828.data10
-rw-r--r--english/lts/security/2017/dla-828.wml31
-rw-r--r--english/lts/security/2017/dla-829.data10
-rw-r--r--english/lts/security/2017/dla-829.wml19
-rw-r--r--english/lts/security/2017/dla-830.data10
-rw-r--r--english/lts/security/2017/dla-830.wml31
-rw-r--r--english/lts/security/2017/dla-831.data10
-rw-r--r--english/lts/security/2017/dla-831.wml36
-rw-r--r--english/lts/security/2017/dla-832.data10
-rw-r--r--english/lts/security/2017/dla-832.wml32
-rw-r--r--english/lts/security/2017/dla-833.data10
-rw-r--r--english/lts/security/2017/dla-833.wml76
-rw-r--r--english/lts/security/2017/dla-834.data10
-rw-r--r--english/lts/security/2017/dla-834.wml24
-rw-r--r--english/lts/security/2017/dla-835.data10
-rw-r--r--english/lts/security/2017/dla-835.wml23
-rw-r--r--english/lts/security/2017/dla-836-2.data10
-rw-r--r--english/lts/security/2017/dla-836-2.wml26
-rw-r--r--english/lts/security/2017/dla-836.data10
-rw-r--r--english/lts/security/2017/dla-836.wml21
-rw-r--r--english/lts/security/2017/dla-837.data10
-rw-r--r--english/lts/security/2017/dla-837.wml27
-rw-r--r--english/lts/security/2017/dla-838.data10
-rw-r--r--english/lts/security/2017/dla-838.wml21
-rw-r--r--english/lts/security/2017/dla-839-2.data10
-rw-r--r--english/lts/security/2017/dla-839-2.wml19
-rw-r--r--english/lts/security/2017/dla-839.data10
-rw-r--r--english/lts/security/2017/dla-839.wml45
-rw-r--r--english/lts/security/2017/dla-840.data10
-rw-r--r--english/lts/security/2017/dla-840.wml21
-rw-r--r--english/lts/security/2017/dla-841-2.data10
-rw-r--r--english/lts/security/2017/dla-841-2.wml21
-rw-r--r--english/lts/security/2017/dla-841.data10
-rw-r--r--english/lts/security/2017/dla-841.wml30
-rw-r--r--english/lts/security/2017/dla-842.data10
-rw-r--r--english/lts/security/2017/dla-842.wml68
-rw-r--r--english/lts/security/2017/dla-843.data10
-rw-r--r--english/lts/security/2017/dla-843.wml23
-rw-r--r--english/lts/security/2017/dla-844.data10
-rw-r--r--english/lts/security/2017/dla-844.wml20
-rw-r--r--english/lts/security/2017/dla-845.data10
-rw-r--r--english/lts/security/2017/dla-845.wml64
-rw-r--r--english/lts/security/2017/dla-846.data10
-rw-r--r--english/lts/security/2017/dla-846.wml20
-rw-r--r--english/lts/security/2017/dla-847.data10
-rw-r--r--english/lts/security/2017/dla-847.wml24
-rw-r--r--english/lts/security/2017/dla-848.data10
-rw-r--r--english/lts/security/2017/dla-848.wml18
-rw-r--r--english/lts/security/2017/dla-849.data10
-rw-r--r--english/lts/security/2017/dla-849.wml91
-rw-r--r--english/lts/security/2017/dla-850.data10
-rw-r--r--english/lts/security/2017/dla-850.wml36
-rw-r--r--english/lts/security/2017/dla-851.data10
-rw-r--r--english/lts/security/2017/dla-851.wml15
-rw-r--r--english/lts/security/2017/dla-852.data10
-rw-r--r--english/lts/security/2017/dla-852.wml20
-rw-r--r--english/lts/security/2017/dla-853.data10
-rw-r--r--english/lts/security/2017/dla-853.wml20
-rw-r--r--english/lts/security/2017/dla-854.data10
-rw-r--r--english/lts/security/2017/dla-854.wml40
-rw-r--r--english/lts/security/2017/dla-855.data10
-rw-r--r--english/lts/security/2017/dla-855.wml19
-rw-r--r--english/lts/security/2017/dla-856.data9
-rw-r--r--english/lts/security/2017/dla-856.wml24
-rw-r--r--english/lts/security/2017/dla-857.data9
-rw-r--r--english/lts/security/2017/dla-857.wml18
-rw-r--r--english/lts/security/2017/dla-858.data10
-rw-r--r--english/lts/security/2017/dla-858.wml21
-rw-r--r--english/lts/security/2017/dla-859.data10
-rw-r--r--english/lts/security/2017/dla-859.wml19
-rw-r--r--english/lts/security/2017/dla-860.data10
-rw-r--r--english/lts/security/2017/dla-860.wml37
-rw-r--r--english/lts/security/2017/dla-861.data10
-rw-r--r--english/lts/security/2017/dla-861.wml21
-rw-r--r--english/lts/security/2017/dla-862.data10
-rw-r--r--english/lts/security/2017/dla-862.wml21
-rw-r--r--english/lts/security/2017/dla-863.data10
-rw-r--r--english/lts/security/2017/dla-863.wml14
-rw-r--r--english/lts/security/2017/dla-864.data10
-rw-r--r--english/lts/security/2017/dla-864.wml15
-rw-r--r--english/lts/security/2017/dla-865.data10
-rw-r--r--english/lts/security/2017/dla-865.wml17
-rw-r--r--english/lts/security/2017/dla-866.data10
-rw-r--r--english/lts/security/2017/dla-866.wml19
-rw-r--r--english/lts/security/2017/dla-867.data10
-rw-r--r--english/lts/security/2017/dla-867.wml49
-rw-r--r--english/lts/security/2017/dla-868.data10
-rw-r--r--english/lts/security/2017/dla-868.wml20
-rw-r--r--english/lts/security/2017/dla-869.data10
-rw-r--r--english/lts/security/2017/dla-869.wml51
-rw-r--r--english/lts/security/2017/dla-870.data10
-rw-r--r--english/lts/security/2017/dla-870.wml21
-rw-r--r--english/lts/security/2017/dla-871.data10
-rw-r--r--english/lts/security/2017/dla-871.wml18
-rw-r--r--english/lts/security/2017/dla-872.data10
-rw-r--r--english/lts/security/2017/dla-872.wml21
-rw-r--r--english/lts/security/2017/dla-873.data10
-rw-r--r--english/lts/security/2017/dla-873.wml14
-rw-r--r--english/lts/security/2017/dla-874.data10
-rw-r--r--english/lts/security/2017/dla-874.wml26
-rw-r--r--english/lts/security/2017/dla-875.data10
-rw-r--r--english/lts/security/2017/dla-875.wml47
-rw-r--r--english/lts/security/2017/dla-876.data10
-rw-r--r--english/lts/security/2017/dla-876.wml14
-rw-r--r--english/lts/security/2017/dla-877.data10
-rw-r--r--english/lts/security/2017/dla-877.wml39
-rw-r--r--english/lts/security/2017/dla-878.data10
-rw-r--r--english/lts/security/2017/dla-878.wml60
-rw-r--r--english/lts/security/2017/dla-879.data10
-rw-r--r--english/lts/security/2017/dla-879.wml20
-rw-r--r--english/lts/security/2017/dla-880.data10
-rw-r--r--english/lts/security/2017/dla-880.wml64
-rw-r--r--english/lts/security/2017/dla-881.data10
-rw-r--r--english/lts/security/2017/dla-881.wml21
-rw-r--r--english/lts/security/2017/dla-882.data10
-rw-r--r--english/lts/security/2017/dla-882.wml14
-rw-r--r--english/lts/security/2017/dla-883.data10
-rw-r--r--english/lts/security/2017/dla-883.wml18
-rw-r--r--english/lts/security/2017/dla-884.data10
-rw-r--r--english/lts/security/2017/dla-884.wml18
-rw-r--r--english/lts/security/2017/dla-885.data10
-rw-r--r--english/lts/security/2017/dla-885.wml36
-rw-r--r--english/lts/security/2017/dla-886.data9
-rw-r--r--english/lts/security/2017/dla-886.wml21
-rw-r--r--english/lts/security/2017/dla-887.data9
-rw-r--r--english/lts/security/2017/dla-887.wml18
-rw-r--r--english/lts/security/2017/dla-888.data10
-rw-r--r--english/lts/security/2017/dla-888.wml20
-rw-r--r--english/lts/security/2017/dla-889.data10
-rw-r--r--english/lts/security/2017/dla-889.wml20
-rw-r--r--english/lts/security/2017/dla-890.data10
-rw-r--r--english/lts/security/2017/dla-890.wml22
-rw-r--r--english/lts/security/2017/dla-891.data10
-rw-r--r--english/lts/security/2017/dla-891.wml15
-rw-r--r--english/lts/security/2017/dla-892.data10
-rw-r--r--english/lts/security/2017/dla-892.wml17
-rw-r--r--english/lts/security/2017/dla-893.data10
-rw-r--r--english/lts/security/2017/dla-893.wml21
-rw-r--r--english/lts/security/2017/dla-894.data10
-rw-r--r--english/lts/security/2017/dla-894.wml21
-rw-r--r--english/lts/security/2017/dla-895.data10
-rw-r--r--english/lts/security/2017/dla-895.wml22
-rw-r--r--english/lts/security/2017/dla-896.data10
-rw-r--r--english/lts/security/2017/dla-896.wml29
-rw-r--r--english/lts/security/2017/dla-897.data10
-rw-r--r--english/lts/security/2017/dla-897.wml30
-rw-r--r--english/lts/security/2017/dla-898.data10
-rw-r--r--english/lts/security/2017/dla-898.wml44
-rw-r--r--english/lts/security/2017/dla-899.data10
-rw-r--r--english/lts/security/2017/dla-899.wml19
-rw-r--r--english/lts/security/2017/dla-900.data10
-rw-r--r--english/lts/security/2017/dla-900.wml19
-rw-r--r--english/lts/security/2017/dla-901.data10
-rw-r--r--english/lts/security/2017/dla-901.wml27
-rw-r--r--english/lts/security/2017/dla-902.data10
-rw-r--r--english/lts/security/2017/dla-902.wml19
-rw-r--r--english/lts/security/2017/dla-903.data9
-rw-r--r--english/lts/security/2017/dla-903.wml19
-rw-r--r--english/lts/security/2017/dla-904.data9
-rw-r--r--english/lts/security/2017/dla-904.wml19
-rw-r--r--english/lts/security/2017/dla-905.data10
-rw-r--r--english/lts/security/2017/dla-905.wml37
-rw-r--r--english/lts/security/2017/dla-906.data10
-rw-r--r--english/lts/security/2017/dla-906.wml20
-rw-r--r--english/lts/security/2017/dla-907.data10
-rw-r--r--english/lts/security/2017/dla-907.wml25
-rw-r--r--english/lts/security/2017/dla-908.data10
-rw-r--r--english/lts/security/2017/dla-908.wml19
-rw-r--r--english/lts/security/2017/dla-909.data10
-rw-r--r--english/lts/security/2017/dla-909.wml33
-rw-r--r--english/lts/security/2017/dla-910.data10
-rw-r--r--english/lts/security/2017/dla-910.wml32
-rw-r--r--english/lts/security/2017/dla-911.data10
-rw-r--r--english/lts/security/2017/dla-911.wml20
-rw-r--r--english/lts/security/2017/dla-912.data10
-rw-r--r--english/lts/security/2017/dla-912.wml20
-rw-r--r--english/lts/security/2017/dla-913.data10
-rw-r--r--english/lts/security/2017/dla-913.wml19
-rw-r--r--english/lts/security/2017/dla-914.data10
-rw-r--r--english/lts/security/2017/dla-914.wml24
-rw-r--r--english/lts/security/2017/dla-915.data10
-rw-r--r--english/lts/security/2017/dla-915.wml21
-rw-r--r--english/lts/security/2017/dla-916.data10
-rw-r--r--english/lts/security/2017/dla-916.wml27
-rw-r--r--english/lts/security/2017/dla-917.data10
-rw-r--r--english/lts/security/2017/dla-917.wml38
-rw-r--r--english/lts/security/2017/dla-918.data10
-rw-r--r--english/lts/security/2017/dla-918.wml21
-rw-r--r--english/lts/security/2017/dla-919.data10
-rw-r--r--english/lts/security/2017/dla-919.wml18
-rw-r--r--english/lts/security/2017/dla-920.data10
-rw-r--r--english/lts/security/2017/dla-920.wml38
-rw-r--r--english/lts/security/2017/dla-921.data10
-rw-r--r--english/lts/security/2017/dla-921.wml19
-rw-r--r--english/lts/security/2017/dla-922.data10
-rw-r--r--english/lts/security/2017/dla-922.wml133
-rw-r--r--english/lts/security/2017/dla-923.data10
-rw-r--r--english/lts/security/2017/dla-923.wml22
-rw-r--r--english/lts/security/2017/dla-924-2.data10
-rw-r--r--english/lts/security/2017/dla-924-2.wml19
-rw-r--r--english/lts/security/2017/dla-924.data10
-rw-r--r--english/lts/security/2017/dla-924.wml38
-rw-r--r--english/lts/security/2017/dla-925.data10
-rw-r--r--english/lts/security/2017/dla-925.wml24
-rw-r--r--english/lts/security/2017/dla-926.data10
-rw-r--r--english/lts/security/2017/dla-926.wml24
-rw-r--r--english/lts/security/2017/dla-927.data10
-rw-r--r--english/lts/security/2017/dla-927.wml24
-rw-r--r--english/lts/security/2017/dla-928.data10
-rw-r--r--english/lts/security/2017/dla-928.wml71
-rw-r--r--english/lts/security/2017/dla-929.data10
-rw-r--r--english/lts/security/2017/dla-929.wml21
-rw-r--r--english/lts/security/2017/dla-930.data10
-rw-r--r--english/lts/security/2017/dla-930.wml16
-rw-r--r--english/lts/security/2017/dla-931.data10
-rw-r--r--english/lts/security/2017/dla-931.wml18
-rw-r--r--english/lts/security/2017/dla-932.data10
-rw-r--r--english/lts/security/2017/dla-932.wml20
-rw-r--r--english/lts/security/2017/dla-933.data10
-rw-r--r--english/lts/security/2017/dla-933.wml19
-rw-r--r--english/lts/security/2017/dla-934.data10
-rw-r--r--english/lts/security/2017/dla-934.wml19
-rw-r--r--english/lts/security/2017/dla-935.data10
-rw-r--r--english/lts/security/2017/dla-935.wml16
-rw-r--r--english/lts/security/2017/dla-936.data10
-rw-r--r--english/lts/security/2017/dla-936.wml20
-rw-r--r--english/lts/security/2017/dla-937.data10
-rw-r--r--english/lts/security/2017/dla-937.wml20
-rw-r--r--english/lts/security/2017/dla-938.data10
-rw-r--r--english/lts/security/2017/dla-938.wml19
-rw-r--r--english/lts/security/2017/dla-939.data10
-rw-r--r--english/lts/security/2017/dla-939.wml56
-rw-r--r--english/lts/security/2017/dla-940.data10
-rw-r--r--english/lts/security/2017/dla-940.wml15
-rw-r--r--english/lts/security/2017/dla-941.data10
-rw-r--r--english/lts/security/2017/dla-941.wml19
-rw-r--r--english/lts/security/2017/dla-942.data10
-rw-r--r--english/lts/security/2017/dla-942.wml44
-rw-r--r--english/lts/security/2017/dla-943.data10
-rw-r--r--english/lts/security/2017/dla-943.wml14
-rw-r--r--english/lts/security/2017/dla-944.data10
-rw-r--r--english/lts/security/2017/dla-944.wml22
-rw-r--r--english/lts/security/2017/dla-945.data10
-rw-r--r--english/lts/security/2017/dla-945.wml20
-rw-r--r--english/lts/security/2017/dla-946.data10
-rw-r--r--english/lts/security/2017/dla-946.wml31
-rw-r--r--english/lts/security/2017/dla-947.data10
-rw-r--r--english/lts/security/2017/dla-947.wml21
-rw-r--r--english/lts/security/2017/dla-948.data10
-rw-r--r--english/lts/security/2017/dla-948.wml27
-rw-r--r--english/lts/security/2017/dla-949.data10
-rw-r--r--english/lts/security/2017/dla-949.wml15
-rw-r--r--english/lts/security/2017/dla-950.data10
-rw-r--r--english/lts/security/2017/dla-950.wml27
-rw-r--r--english/lts/security/2017/dla-951.data10
-rw-r--r--english/lts/security/2017/dla-951.wml20
-rw-r--r--english/lts/security/2017/dla-952.data10
-rw-r--r--english/lts/security/2017/dla-952.wml42
-rw-r--r--english/lts/security/2017/dla-953.data10
-rw-r--r--english/lts/security/2017/dla-953.wml22
-rw-r--r--english/lts/security/2017/dla-954.data10
-rw-r--r--english/lts/security/2017/dla-954.wml20
-rw-r--r--english/lts/security/2017/dla-955.data10
-rw-r--r--english/lts/security/2017/dla-955.wml18
-rw-r--r--english/lts/security/2017/dla-956.data10
-rw-r--r--english/lts/security/2017/dla-956.wml45
-rw-r--r--english/lts/security/2017/dla-957.data10
-rw-r--r--english/lts/security/2017/dla-957.wml42
-rw-r--r--english/lts/security/2017/dla-958.data10
-rw-r--r--english/lts/security/2017/dla-958.wml69
-rw-r--r--english/lts/security/2017/dla-959.data10
-rw-r--r--english/lts/security/2017/dla-959.wml15
-rw-r--r--english/lts/security/2017/dla-960.data10
-rw-r--r--english/lts/security/2017/dla-960.wml23
-rw-r--r--english/lts/security/2017/dla-961.data10
-rw-r--r--english/lts/security/2017/dla-961.wml29
-rw-r--r--english/lts/security/2017/dla-962.data10
-rw-r--r--english/lts/security/2017/dla-962.wml26
-rw-r--r--english/lts/security/2017/dla-963.data10
-rw-r--r--english/lts/security/2017/dla-963.wml18
-rw-r--r--english/lts/security/2017/dla-964.data10
-rw-r--r--english/lts/security/2017/dla-964.wml52
-rw-r--r--english/lts/security/2017/dla-965.data10
-rw-r--r--english/lts/security/2017/dla-965.wml73
-rw-r--r--english/lts/security/2017/dla-966.data10
-rw-r--r--english/lts/security/2017/dla-966.wml19
-rw-r--r--english/lts/security/2017/dla-967.data10
-rw-r--r--english/lts/security/2017/dla-967.wml21
-rw-r--r--english/lts/security/2017/dla-968.data10
-rw-r--r--english/lts/security/2017/dla-968.wml21
-rw-r--r--english/lts/security/2017/dla-969.data10
-rw-r--r--english/lts/security/2017/dla-969.wml20
-rw-r--r--english/lts/security/2017/dla-970.data10
-rw-r--r--english/lts/security/2017/dla-970.wml24
-rw-r--r--english/lts/security/2017/dla-971.data10
-rw-r--r--english/lts/security/2017/dla-971.wml27
-rw-r--r--english/lts/security/2017/dla-972.data10
-rw-r--r--english/lts/security/2017/dla-972.wml17
-rw-r--r--english/lts/security/2017/dla-973.data10
-rw-r--r--english/lts/security/2017/dla-973.wml37
-rw-r--r--english/lts/security/2017/dla-974.data10
-rw-r--r--english/lts/security/2017/dla-974.wml14
-rw-r--r--english/lts/security/2017/dla-975.data10
-rw-r--r--english/lts/security/2017/dla-975.wml52
-rw-r--r--english/lts/security/2017/dla-976.data10
-rw-r--r--english/lts/security/2017/dla-976.wml14
-rw-r--r--english/lts/security/2017/dla-977.data10
-rw-r--r--english/lts/security/2017/dla-977.wml47
-rw-r--r--english/lts/security/2017/dla-978.data10
-rw-r--r--english/lts/security/2017/dla-978.wml21
-rw-r--r--english/lts/security/2017/dla-979.data9
-rw-r--r--english/lts/security/2017/dla-979.wml25
-rw-r--r--english/lts/security/2017/dla-980.data10
-rw-r--r--english/lts/security/2017/dla-980.wml19
-rw-r--r--english/lts/security/2017/dla-981.data10
-rw-r--r--english/lts/security/2017/dla-981.wml20
-rw-r--r--english/lts/security/2017/dla-982.data10
-rw-r--r--english/lts/security/2017/dla-982.wml20
-rw-r--r--english/lts/security/2017/dla-983.data10
-rw-r--r--english/lts/security/2017/dla-983.wml24
-rw-r--r--english/lts/security/2017/dla-984.data10
-rw-r--r--english/lts/security/2017/dla-984.wml24
-rw-r--r--english/lts/security/2017/dla-985.data10
-rw-r--r--english/lts/security/2017/dla-985.wml15
-rw-r--r--english/lts/security/2017/dla-986.data10
-rw-r--r--english/lts/security/2017/dla-986.wml25
-rw-r--r--english/lts/security/2017/dla-987.data10
-rw-r--r--english/lts/security/2017/dla-987.wml58
-rw-r--r--english/lts/security/2017/dla-988.data10
-rw-r--r--english/lts/security/2017/dla-988.wml20
-rw-r--r--english/lts/security/2017/dla-989.data10
-rw-r--r--english/lts/security/2017/dla-989.wml19
-rw-r--r--english/lts/security/2017/dla-990.data10
-rw-r--r--english/lts/security/2017/dla-990.wml16
-rw-r--r--english/lts/security/2017/dla-991.data10
-rw-r--r--english/lts/security/2017/dla-991.wml24
-rw-r--r--english/lts/security/2017/dla-992.data10
-rw-r--r--english/lts/security/2017/dla-992.wml21
-rw-r--r--english/lts/security/2017/dla-993-2.data10
-rw-r--r--english/lts/security/2017/dla-993-2.wml47
-rw-r--r--english/lts/security/2017/dla-993.data10
-rw-r--r--english/lts/security/2017/dla-993.wml117
-rw-r--r--english/lts/security/2017/dla-994.data10
-rw-r--r--english/lts/security/2017/dla-994.wml61
-rw-r--r--english/lts/security/2017/dla-995.data10
-rw-r--r--english/lts/security/2017/dla-995.wml35
-rw-r--r--english/lts/security/2017/dla-996.data10
-rw-r--r--english/lts/security/2017/dla-996.wml27
-rw-r--r--english/lts/security/2017/dla-997.data10
-rw-r--r--english/lts/security/2017/dla-997.wml19
-rw-r--r--english/lts/security/2017/dla-998.data10
-rw-r--r--english/lts/security/2017/dla-998.wml27
-rw-r--r--english/lts/security/2017/dla-999.data10
-rw-r--r--english/lts/security/2017/dla-999.wml18
-rw-r--r--english/lts/security/2017/index.wml11
-rw-r--r--english/lts/security/2018/Makefile42
-rw-r--r--english/lts/security/2018/dla-1227.data10
-rw-r--r--english/lts/security/2018/dla-1227.wml21
-rw-r--r--english/lts/security/2018/dla-1228.data10
-rw-r--r--english/lts/security/2018/dla-1228.wml14
-rw-r--r--english/lts/security/2018/dla-1229.data10
-rw-r--r--english/lts/security/2018/dla-1229.wml25
-rw-r--r--english/lts/security/2018/dla-1230.data10
-rw-r--r--english/lts/security/2018/dla-1230.wml19
-rw-r--r--english/lts/security/2018/dla-1231.data10
-rw-r--r--english/lts/security/2018/dla-1231.wml21
-rw-r--r--english/lts/security/2018/dla-1232.data10
-rw-r--r--english/lts/security/2018/dla-1232.wml76
-rw-r--r--english/lts/security/2018/dla-1233.data10
-rw-r--r--english/lts/security/2018/dla-1233.wml17
-rw-r--r--english/lts/security/2018/dla-1234-2.data10
-rw-r--r--english/lts/security/2018/dla-1234-2.wml18
-rw-r--r--english/lts/security/2018/dla-1234.data10
-rw-r--r--english/lts/security/2018/dla-1234.wml15
-rw-r--r--english/lts/security/2018/dla-1235.data10
-rw-r--r--english/lts/security/2018/dla-1235.wml19
-rw-r--r--english/lts/security/2018/dla-1236.data10
-rw-r--r--english/lts/security/2018/dla-1236.wml20
-rw-r--r--english/lts/security/2018/dla-1237.data10
-rw-r--r--english/lts/security/2018/dla-1237.wml21
-rw-r--r--english/lts/security/2018/dla-1238.data10
-rw-r--r--english/lts/security/2018/dla-1238.wml19
-rw-r--r--english/lts/security/2018/dla-1239.data10
-rw-r--r--english/lts/security/2018/dla-1239.wml23
-rw-r--r--english/lts/security/2018/dla-1240.data10
-rw-r--r--english/lts/security/2018/dla-1240.wml40
-rw-r--r--english/lts/security/2018/dla-1241.data10
-rw-r--r--english/lts/security/2018/dla-1241.wml23
-rw-r--r--english/lts/security/2018/dla-1242.data10
-rw-r--r--english/lts/security/2018/dla-1242.wml22
-rw-r--r--english/lts/security/2018/dla-1243.data10
-rw-r--r--english/lts/security/2018/dla-1243.wml20
-rw-r--r--english/lts/security/2018/dla-1244.data10
-rw-r--r--english/lts/security/2018/dla-1244.wml24
-rw-r--r--english/lts/security/2018/dla-1245.data10
-rw-r--r--english/lts/security/2018/dla-1245.wml31
-rw-r--r--english/lts/security/2018/dla-1246.data10
-rw-r--r--english/lts/security/2018/dla-1246.wml20
-rw-r--r--english/lts/security/2018/dla-1247.data10
-rw-r--r--english/lts/security/2018/dla-1247.wml14
-rw-r--r--english/lts/security/2018/dla-1248.data10
-rw-r--r--english/lts/security/2018/dla-1248.wml15
-rw-r--r--english/lts/security/2018/dla-1249-2.data10
-rw-r--r--english/lts/security/2018/dla-1249-2.wml15
-rw-r--r--english/lts/security/2018/dla-1249.data10
-rw-r--r--english/lts/security/2018/dla-1249.wml17
-rw-r--r--english/lts/security/2018/dla-1250.data10
-rw-r--r--english/lts/security/2018/dla-1250.wml26
-rw-r--r--english/lts/security/2018/dla-1251.data10
-rw-r--r--english/lts/security/2018/dla-1251.wml20
-rw-r--r--english/lts/security/2018/dla-1252.data10
-rw-r--r--english/lts/security/2018/dla-1252.wml30
-rw-r--r--english/lts/security/2018/dla-1253.data10
-rw-r--r--english/lts/security/2018/dla-1253.wml20
-rw-r--r--english/lts/security/2018/dla-1254.data10
-rw-r--r--english/lts/security/2018/dla-1254.wml22
-rw-r--r--english/lts/security/2018/dla-1255.data10
-rw-r--r--english/lts/security/2018/dla-1255.wml22
-rw-r--r--english/lts/security/2018/dla-1256.data10
-rw-r--r--english/lts/security/2018/dla-1256.wml20
-rw-r--r--english/lts/security/2018/dla-1257.data10
-rw-r--r--english/lts/security/2018/dla-1257.wml18
-rw-r--r--english/lts/security/2018/dla-1258.data10
-rw-r--r--english/lts/security/2018/dla-1258.wml20
-rw-r--r--english/lts/security/2018/dla-1259.data10
-rw-r--r--english/lts/security/2018/dla-1259.wml29
-rw-r--r--english/lts/security/2018/dla-1260.data10
-rw-r--r--english/lts/security/2018/dla-1260.wml29
-rw-r--r--english/lts/security/2018/dla-1261.data10
-rw-r--r--english/lts/security/2018/dla-1261.wml89
-rw-r--r--english/lts/security/2018/dla-1262.data10
-rw-r--r--english/lts/security/2018/dla-1262.wml20
-rw-r--r--english/lts/security/2018/dla-1263.data9
-rw-r--r--english/lts/security/2018/dla-1263.wml27
-rw-r--r--english/lts/security/2018/dla-1264.data10
-rw-r--r--english/lts/security/2018/dla-1264.wml24
-rw-r--r--english/lts/security/2018/dla-1265.data10
-rw-r--r--english/lts/security/2018/dla-1265.wml63
-rw-r--r--english/lts/security/2018/dla-1266.data10
-rw-r--r--english/lts/security/2018/dla-1266.wml40
-rw-r--r--english/lts/security/2018/dla-1267.data10
-rw-r--r--english/lts/security/2018/dla-1267.wml33
-rw-r--r--english/lts/security/2018/dla-1268.data10
-rw-r--r--english/lts/security/2018/dla-1268.wml20
-rw-r--r--english/lts/security/2018/dla-1269.data10
-rw-r--r--english/lts/security/2018/dla-1269.wml15
-rw-r--r--english/lts/security/2018/dla-1270.data10
-rw-r--r--english/lts/security/2018/dla-1270.wml24
-rw-r--r--english/lts/security/2018/dla-1271.data10
-rw-r--r--english/lts/security/2018/dla-1271.wml28
-rw-r--r--english/lts/security/2018/dla-1272.data10
-rw-r--r--english/lts/security/2018/dla-1272.wml20
-rw-r--r--english/lts/security/2018/dla-1273.data10
-rw-r--r--english/lts/security/2018/dla-1273.wml50
-rw-r--r--english/lts/security/2018/dla-1274.data10
-rw-r--r--english/lts/security/2018/dla-1274.wml21
-rw-r--r--english/lts/security/2018/dla-1275.data10
-rw-r--r--english/lts/security/2018/dla-1275.wml20
-rw-r--r--english/lts/security/2018/dla-1276.data10
-rw-r--r--english/lts/security/2018/dla-1276.wml24
-rw-r--r--english/lts/security/2018/dla-1277.data10
-rw-r--r--english/lts/security/2018/dla-1277.wml21
-rw-r--r--english/lts/security/2018/dla-1278.data10
-rw-r--r--english/lts/security/2018/dla-1278.wml15
-rw-r--r--english/lts/security/2018/dla-1279.data10
-rw-r--r--english/lts/security/2018/dla-1279.wml28
-rw-r--r--english/lts/security/2018/dla-1280.data10
-rw-r--r--english/lts/security/2018/dla-1280.wml21
-rw-r--r--english/lts/security/2018/dla-1281.data10
-rw-r--r--english/lts/security/2018/dla-1281.wml21
-rw-r--r--english/lts/security/2018/dla-1282.data10
-rw-r--r--english/lts/security/2018/dla-1282.wml24
-rw-r--r--english/lts/security/2018/dla-1283-2.data9
-rw-r--r--english/lts/security/2018/dla-1283-2.wml40
-rw-r--r--english/lts/security/2018/dla-1283.data10
-rw-r--r--english/lts/security/2018/dla-1283.wml20
-rw-r--r--english/lts/security/2018/dla-1284.data10
-rw-r--r--english/lts/security/2018/dla-1284.wml23
-rw-r--r--english/lts/security/2018/dla-1285.data10
-rw-r--r--english/lts/security/2018/dla-1285.wml26
-rw-r--r--english/lts/security/2018/dla-1286.data10
-rw-r--r--english/lts/security/2018/dla-1286.wml62
-rw-r--r--english/lts/security/2018/dla-1287.data10
-rw-r--r--english/lts/security/2018/dla-1287.wml15
-rw-r--r--english/lts/security/2018/dla-1288.data10
-rw-r--r--english/lts/security/2018/dla-1288.wml18
-rw-r--r--english/lts/security/2018/dla-1289.data10
-rw-r--r--english/lts/security/2018/dla-1289.wml28
-rw-r--r--english/lts/security/2018/dla-1290.data10
-rw-r--r--english/lts/security/2018/dla-1290.wml24
-rw-r--r--english/lts/security/2018/dla-1291.data9
-rw-r--r--english/lts/security/2018/dla-1291.wml22
-rw-r--r--english/lts/security/2018/dla-1292.data9
-rw-r--r--english/lts/security/2018/dla-1292.wml18
-rw-r--r--english/lts/security/2018/dla-1293.data10
-rw-r--r--english/lts/security/2018/dla-1293.wml14
-rw-r--r--english/lts/security/2018/dla-1294.data10
-rw-r--r--english/lts/security/2018/dla-1294.wml19
-rw-r--r--english/lts/security/2018/dla-1295.data10
-rw-r--r--english/lts/security/2018/dla-1295.wml19
-rw-r--r--english/lts/security/2018/dla-1296.data10
-rw-r--r--english/lts/security/2018/dla-1296.wml21
-rw-r--r--english/lts/security/2018/dla-1297.data10
-rw-r--r--english/lts/security/2018/dla-1297.wml48
-rw-r--r--english/lts/security/2018/dla-1298.data10
-rw-r--r--english/lts/security/2018/dla-1298.wml37
-rw-r--r--english/lts/security/2018/dla-1299.data10
-rw-r--r--english/lts/security/2018/dla-1299.wml14
-rw-r--r--english/lts/security/2018/dla-1300.data10
-rw-r--r--english/lts/security/2018/dla-1300.wml19
-rw-r--r--english/lts/security/2018/dla-1301.data10
-rw-r--r--english/lts/security/2018/dla-1301.wml43
-rw-r--r--english/lts/security/2018/dla-1302.data10
-rw-r--r--english/lts/security/2018/dla-1302.wml37
-rw-r--r--english/lts/security/2018/dla-1303.data10
-rw-r--r--english/lts/security/2018/dla-1303.wml44
-rw-r--r--english/lts/security/2018/dla-1304.data10
-rw-r--r--english/lts/security/2018/dla-1304.wml36
-rw-r--r--english/lts/security/2018/dla-1305.data10
-rw-r--r--english/lts/security/2018/dla-1305.wml48
-rw-r--r--english/lts/security/2018/dla-1306.data10
-rw-r--r--english/lts/security/2018/dla-1306.wml18
-rw-r--r--english/lts/security/2018/dla-1307.data10
-rw-r--r--english/lts/security/2018/dla-1307.wml37
-rw-r--r--english/lts/security/2018/dla-1308.data10
-rw-r--r--english/lts/security/2018/dla-1308.wml19
-rw-r--r--english/lts/security/2018/dla-1309.data10
-rw-r--r--english/lts/security/2018/dla-1309.wml43
-rw-r--r--english/lts/security/2018/dla-1310.data10
-rw-r--r--english/lts/security/2018/dla-1310.wml61
-rw-r--r--english/lts/security/2018/dla-1311.data10
-rw-r--r--english/lts/security/2018/dla-1311.wml18
-rw-r--r--english/lts/security/2018/dla-1312.data10
-rw-r--r--english/lts/security/2018/dla-1312.wml21
-rw-r--r--english/lts/security/2018/dla-1313.data10
-rw-r--r--english/lts/security/2018/dla-1313.wml40
-rw-r--r--english/lts/security/2018/dla-1314.data10
-rw-r--r--english/lts/security/2018/dla-1314.wml22
-rw-r--r--english/lts/security/2018/dla-1315.data10
-rw-r--r--english/lts/security/2018/dla-1315.wml20
-rw-r--r--english/lts/security/2018/dla-1316.data10
-rw-r--r--english/lts/security/2018/dla-1316.wml20
-rw-r--r--english/lts/security/2018/dla-1317.data10
-rw-r--r--english/lts/security/2018/dla-1317.wml15
-rw-r--r--english/lts/security/2018/dla-1318.data10
-rw-r--r--english/lts/security/2018/dla-1318.wml17
-rw-r--r--english/lts/security/2018/dla-1319.data10
-rw-r--r--english/lts/security/2018/dla-1319.wml19
-rw-r--r--english/lts/security/2018/dla-1320.data10
-rw-r--r--english/lts/security/2018/dla-1320.wml32
-rw-r--r--english/lts/security/2018/dla-1321.data10
-rw-r--r--english/lts/security/2018/dla-1321.wml19
-rw-r--r--english/lts/security/2018/dla-1322.data10
-rw-r--r--english/lts/security/2018/dla-1322.wml62
-rw-r--r--english/lts/security/2018/dla-1323.data9
-rw-r--r--english/lts/security/2018/dla-1323.wml21
-rw-r--r--english/lts/security/2018/dla-1324.data9
-rw-r--r--english/lts/security/2018/dla-1324.wml18
-rw-r--r--english/lts/security/2018/dla-1325.data10
-rw-r--r--english/lts/security/2018/dla-1325.wml23
-rw-r--r--english/lts/security/2018/dla-1326.data10
-rw-r--r--english/lts/security/2018/dla-1326.wml19
-rw-r--r--english/lts/security/2018/dla-1327.data10
-rw-r--r--english/lts/security/2018/dla-1327.wml19
-rw-r--r--english/lts/security/2018/dla-1328.data10
-rw-r--r--english/lts/security/2018/dla-1328.wml23
-rw-r--r--english/lts/security/2018/dla-1329.data10
-rw-r--r--english/lts/security/2018/dla-1329.wml20
-rw-r--r--english/lts/security/2018/dla-1330.data10
-rw-r--r--english/lts/security/2018/dla-1330.wml21
-rw-r--r--english/lts/security/2018/dla-1331.data10
-rw-r--r--english/lts/security/2018/dla-1331.wml24
-rw-r--r--english/lts/security/2018/dla-1332.data10
-rw-r--r--english/lts/security/2018/dla-1332.wml20
-rw-r--r--english/lts/security/2018/dla-1333.data10
-rw-r--r--english/lts/security/2018/dla-1333.wml44
-rw-r--r--english/lts/security/2018/dla-1334.data10
-rw-r--r--english/lts/security/2018/dla-1334.wml31
-rw-r--r--english/lts/security/2018/dla-1335.data10
-rw-r--r--english/lts/security/2018/dla-1335.wml34
-rw-r--r--english/lts/security/2018/dla-1336.data10
-rw-r--r--english/lts/security/2018/dla-1336.wml44
-rw-r--r--english/lts/security/2018/dla-1337.data10
-rw-r--r--english/lts/security/2018/dla-1337.wml44
-rw-r--r--english/lts/security/2018/dla-1338.data10
-rw-r--r--english/lts/security/2018/dla-1338.wml14
-rw-r--r--english/lts/security/2018/dla-1339.data10
-rw-r--r--english/lts/security/2018/dla-1339.wml19
-rw-r--r--english/lts/security/2018/dla-1340.data10
-rw-r--r--english/lts/security/2018/dla-1340.wml20
-rw-r--r--english/lts/security/2018/dla-1341.data10
-rw-r--r--english/lts/security/2018/dla-1341.wml19
-rw-r--r--english/lts/security/2018/dla-1342.data10
-rw-r--r--english/lts/security/2018/dla-1342.wml30
-rw-r--r--english/lts/security/2018/dla-1343.data10
-rw-r--r--english/lts/security/2018/dla-1343.wml72
-rw-r--r--english/lts/security/2018/dla-1344.data10
-rw-r--r--english/lts/security/2018/dla-1344.wml20
-rw-r--r--english/lts/security/2018/dla-1345.data10
-rw-r--r--english/lts/security/2018/dla-1345.wml18
-rw-r--r--english/lts/security/2018/dla-1346.data10
-rw-r--r--english/lts/security/2018/dla-1346.wml20
-rw-r--r--english/lts/security/2018/dla-1347.data10
-rw-r--r--english/lts/security/2018/dla-1347.wml20
-rw-r--r--english/lts/security/2018/dla-1348.data10
-rw-r--r--english/lts/security/2018/dla-1348.wml18
-rw-r--r--english/lts/security/2018/dla-1349.data10
-rw-r--r--english/lts/security/2018/dla-1349.wml22
-rw-r--r--english/lts/security/2018/dla-1350.data10
-rw-r--r--english/lts/security/2018/dla-1350.wml21
-rw-r--r--english/lts/security/2018/dla-1351.data10
-rw-r--r--english/lts/security/2018/dla-1351.wml21
-rw-r--r--english/lts/security/2018/dla-1352.data10
-rw-r--r--english/lts/security/2018/dla-1352.wml20
-rw-r--r--english/lts/security/2018/dla-1353.data10
-rw-r--r--english/lts/security/2018/dla-1353.wml22
-rw-r--r--english/lts/security/2018/dla-1354.data10
-rw-r--r--english/lts/security/2018/dla-1354.wml36
-rw-r--r--english/lts/security/2018/dla-1355.data10
-rw-r--r--english/lts/security/2018/dla-1355.wml26
-rw-r--r--english/lts/security/2018/dla-1356.data10
-rw-r--r--english/lts/security/2018/dla-1356.wml19
-rw-r--r--english/lts/security/2018/dla-1357.data10
-rw-r--r--english/lts/security/2018/dla-1357.wml19
-rw-r--r--english/lts/security/2018/dla-1358.data10
-rw-r--r--english/lts/security/2018/dla-1358.wml86
-rw-r--r--english/lts/security/2018/dla-1359.data10
-rw-r--r--english/lts/security/2018/dla-1359.wml65
-rw-r--r--english/lts/security/2018/dla-1360.data10
-rw-r--r--english/lts/security/2018/dla-1360.wml15
-rw-r--r--english/lts/security/2018/dla-1361.data10
-rw-r--r--english/lts/security/2018/dla-1361.wml20
-rw-r--r--english/lts/security/2018/dla-1362.data9
-rw-r--r--english/lts/security/2018/dla-1362.wml17
-rw-r--r--english/lts/security/2018/dla-1363.data10
-rw-r--r--english/lts/security/2018/dla-1363.wml21
-rw-r--r--english/lts/security/2018/dla-1364.data10
-rw-r--r--english/lts/security/2018/dla-1364.wml26
-rw-r--r--english/lts/security/2018/dla-1365.data10
-rw-r--r--english/lts/security/2018/dla-1365.wml21
-rw-r--r--english/lts/security/2018/dla-1366.data10
-rw-r--r--english/lts/security/2018/dla-1366.wml34
-rw-r--r--english/lts/security/2018/dla-1367.data10
-rw-r--r--english/lts/security/2018/dla-1367.wml23
-rw-r--r--english/lts/security/2018/dla-1368.data10
-rw-r--r--english/lts/security/2018/dla-1368.wml48
-rw-r--r--english/lts/security/2018/dla-1369.data10
-rw-r--r--english/lts/security/2018/dla-1369.wml241
-rw-r--r--english/lts/security/2018/dla-1370.data10
-rw-r--r--english/lts/security/2018/dla-1370.wml19
-rw-r--r--english/lts/security/2018/dla-1371.data9
-rw-r--r--english/lts/security/2018/dla-1371.wml19
-rw-r--r--english/lts/security/2018/dla-1372.data9
-rw-r--r--english/lts/security/2018/dla-1372.wml18
-rw-r--r--english/lts/security/2018/dla-1373.data10
-rw-r--r--english/lts/security/2018/dla-1373.wml46
-rw-r--r--english/lts/security/2018/dla-1374.data10
-rw-r--r--english/lts/security/2018/dla-1374.wml22
-rw-r--r--english/lts/security/2018/dla-1375.data10
-rw-r--r--english/lts/security/2018/dla-1375.wml21
-rw-r--r--english/lts/security/2018/dla-1376.data10
-rw-r--r--english/lts/security/2018/dla-1376.wml19
-rw-r--r--english/lts/security/2018/dla-1377.data10
-rw-r--r--english/lts/security/2018/dla-1377.wml20
-rw-r--r--english/lts/security/2018/dla-1378.data10
-rw-r--r--english/lts/security/2018/dla-1378.wml20
-rw-r--r--english/lts/security/2018/dla-1379.data10
-rw-r--r--english/lts/security/2018/dla-1379.wml21
-rw-r--r--english/lts/security/2018/dla-1380.data10
-rw-r--r--english/lts/security/2018/dla-1380.wml19
-rw-r--r--english/lts/security/2018/dla-1381.data10
-rw-r--r--english/lts/security/2018/dla-1381.wml20
-rw-r--r--english/lts/security/2018/dla-1382.data10
-rw-r--r--english/lts/security/2018/dla-1382.wml19
-rw-r--r--english/lts/security/2018/dla-1383.data10
-rw-r--r--english/lts/security/2018/dla-1383.wml19
-rw-r--r--english/lts/security/2018/dla-1384.data10
-rw-r--r--english/lts/security/2018/dla-1384.wml21
-rw-r--r--english/lts/security/2018/dla-1385.data10
-rw-r--r--english/lts/security/2018/dla-1385.wml20
-rw-r--r--english/lts/security/2018/dla-1386.data10
-rw-r--r--english/lts/security/2018/dla-1386.wml53
-rw-r--r--english/lts/security/2018/dla-1387.data10
-rw-r--r--english/lts/security/2018/dla-1387.wml25
-rw-r--r--english/lts/security/2018/dla-1388.data10
-rw-r--r--english/lts/security/2018/dla-1388.wml23
-rw-r--r--english/lts/security/2018/dla-1389.data10
-rw-r--r--english/lts/security/2018/dla-1389.wml45
-rw-r--r--english/lts/security/2018/dla-1390.data10
-rw-r--r--english/lts/security/2018/dla-1390.wml54
-rw-r--r--english/lts/security/2018/dla-1391.data10
-rw-r--r--english/lts/security/2018/dla-1391.wml34
-rw-r--r--english/lts/security/2018/dla-1392.data10
-rw-r--r--english/lts/security/2018/dla-1392.wml52
-rw-r--r--english/lts/security/2018/dla-1393.data9
-rw-r--r--english/lts/security/2018/dla-1393.wml27
-rw-r--r--english/lts/security/2018/dla-1394.data10
-rw-r--r--english/lts/security/2018/dla-1394.wml21
-rw-r--r--english/lts/security/2018/dla-1395.data10
-rw-r--r--english/lts/security/2018/dla-1395.wml32
-rw-r--r--english/lts/security/2018/dla-1396.data10
-rw-r--r--english/lts/security/2018/dla-1396.wml28
-rw-r--r--english/lts/security/2018/dla-1397.data10
-rw-r--r--english/lts/security/2018/dla-1397.wml55
-rw-r--r--english/lts/security/2018/dla-1398.data10
-rw-r--r--english/lts/security/2018/dla-1398.wml19
-rw-r--r--english/lts/security/2018/dla-1399.data10
-rw-r--r--english/lts/security/2018/dla-1399.wml41
-rw-r--r--english/lts/security/2018/dla-1400-2.data10
-rw-r--r--english/lts/security/2018/dla-1400-2.wml21
-rw-r--r--english/lts/security/2018/dla-1400.data10
-rw-r--r--english/lts/security/2018/dla-1400.wml66
-rw-r--r--english/lts/security/2018/dla-1401.data10
-rw-r--r--english/lts/security/2018/dla-1401.wml20
-rw-r--r--english/lts/security/2018/dla-1402.data10
-rw-r--r--english/lts/security/2018/dla-1402.wml21
-rw-r--r--english/lts/security/2018/dla-1403.data10
-rw-r--r--english/lts/security/2018/dla-1403.wml25
-rw-r--r--english/lts/security/2018/dla-1404.data10
-rw-r--r--english/lts/security/2018/dla-1404.wml26
-rw-r--r--english/lts/security/2018/dla-1405.data10
-rw-r--r--english/lts/security/2018/dla-1405.wml18
-rw-r--r--english/lts/security/2018/dla-1406.data10
-rw-r--r--english/lts/security/2018/dla-1406.wml20
-rw-r--r--english/lts/security/2018/dla-1407.data10
-rw-r--r--english/lts/security/2018/dla-1407.wml26
-rw-r--r--english/lts/security/2018/dla-1408.data10
-rw-r--r--english/lts/security/2018/dla-1408.wml32
-rw-r--r--english/lts/security/2018/dla-1409.data10
-rw-r--r--english/lts/security/2018/dla-1409.wml29
-rw-r--r--english/lts/security/2018/dla-1410.data10
-rw-r--r--english/lts/security/2018/dla-1410.wml20
-rw-r--r--english/lts/security/2018/dla-1411.data10
-rw-r--r--english/lts/security/2018/dla-1411.wml69
-rw-r--r--english/lts/security/2018/dla-1412.data10
-rw-r--r--english/lts/security/2018/dla-1412.wml41
-rw-r--r--english/lts/security/2018/dla-1413.data10
-rw-r--r--english/lts/security/2018/dla-1413.wml20
-rw-r--r--english/lts/security/2018/dla-1414-2.data10
-rw-r--r--english/lts/security/2018/dla-1414-2.wml20
-rw-r--r--english/lts/security/2018/dla-1414.data10
-rw-r--r--english/lts/security/2018/dla-1414.wml61
-rw-r--r--english/lts/security/2018/dla-1415.data10
-rw-r--r--english/lts/security/2018/dla-1415.wml20
-rw-r--r--english/lts/security/2018/dla-1416.data10
-rw-r--r--english/lts/security/2018/dla-1416.wml19
-rw-r--r--english/lts/security/2018/dla-1417.data10
-rw-r--r--english/lts/security/2018/dla-1417.wml15
-rw-r--r--english/lts/security/2018/dla-1418.data10
-rw-r--r--english/lts/security/2018/dla-1418.wml81
-rw-r--r--english/lts/security/2018/dla-1419.data10
-rw-r--r--english/lts/security/2018/dla-1419.wml16
-rw-r--r--english/lts/security/2018/dla-1420.data10
-rw-r--r--english/lts/security/2018/dla-1420.wml18
-rw-r--r--english/lts/security/2018/dla-1421.data10
-rw-r--r--english/lts/security/2018/dla-1421.wml160
-rw-r--r--english/lts/security/2018/dla-1422-2.data10
-rw-r--r--english/lts/security/2018/dla-1422-2.wml155
-rw-r--r--english/lts/security/2018/dla-1422.data10
-rw-r--r--english/lts/security/2018/dla-1422.wml153
-rw-r--r--english/lts/security/2018/dla-1423.data10
-rw-r--r--english/lts/security/2018/dla-1423.wml169
-rw-r--r--english/lts/security/2018/dla-1424.data9
-rw-r--r--english/lts/security/2018/dla-1424.wml35
-rw-r--r--english/lts/security/2018/dla-1425.data10
-rw-r--r--english/lts/security/2018/dla-1425.wml19
-rw-r--r--english/lts/security/2018/dla-1426.data10
-rw-r--r--english/lts/security/2018/dla-1426.wml40
-rw-r--r--english/lts/security/2018/dla-1427.data10
-rw-r--r--english/lts/security/2018/dla-1427.wml26
-rw-r--r--english/lts/security/2018/dla-1428.data10
-rw-r--r--english/lts/security/2018/dla-1428.wml53
-rw-r--r--english/lts/security/2018/dla-1429.data10
-rw-r--r--english/lts/security/2018/dla-1429.wml21
-rw-r--r--english/lts/security/2018/dla-1430.data10
-rw-r--r--english/lts/security/2018/dla-1430.wml21
-rw-r--r--english/lts/security/2018/dla-1431.data10
-rw-r--r--english/lts/security/2018/dla-1431.wml21
-rw-r--r--english/lts/security/2018/dla-1432.data10
-rw-r--r--english/lts/security/2018/dla-1432.wml31
-rw-r--r--english/lts/security/2018/dla-1433.data10
-rw-r--r--english/lts/security/2018/dla-1433.wml29
-rw-r--r--english/lts/security/2018/dla-1434.data10
-rw-r--r--english/lts/security/2018/dla-1434.wml24
-rw-r--r--english/lts/security/2018/dla-1435.data10
-rw-r--r--english/lts/security/2018/dla-1435.wml21
-rw-r--r--english/lts/security/2018/dla-1436.data10
-rw-r--r--english/lts/security/2018/dla-1436.wml19
-rw-r--r--english/lts/security/2018/dla-1437-2.data10
-rw-r--r--english/lts/security/2018/dla-1437-2.wml18
-rw-r--r--english/lts/security/2018/dla-1437.data10
-rw-r--r--english/lts/security/2018/dla-1437.wml28
-rw-r--r--english/lts/security/2018/dla-1438.data10
-rw-r--r--english/lts/security/2018/dla-1438.wml20
-rw-r--r--english/lts/security/2018/dla-1439.data10
-rw-r--r--english/lts/security/2018/dla-1439.wml33
-rw-r--r--english/lts/security/2018/dla-1440.data10
-rw-r--r--english/lts/security/2018/dla-1440.wml22
-rw-r--r--english/lts/security/2018/dla-1441.data10
-rw-r--r--english/lts/security/2018/dla-1441.wml21
-rw-r--r--english/lts/security/2018/dla-1442-2.data10
-rw-r--r--english/lts/security/2018/dla-1442-2.wml19
-rw-r--r--english/lts/security/2018/dla-1442.data10
-rw-r--r--english/lts/security/2018/dla-1442.wml33
-rw-r--r--english/lts/security/2018/dla-1443.data10
-rw-r--r--english/lts/security/2018/dla-1443.wml16
-rw-r--r--english/lts/security/2018/dla-1444.data10
-rw-r--r--english/lts/security/2018/dla-1444.wml22
-rw-r--r--english/lts/security/2018/dla-1445-2.data9
-rw-r--r--english/lts/security/2018/dla-1445-2.wml20
-rw-r--r--english/lts/security/2018/dla-1445-3.data9
-rw-r--r--english/lts/security/2018/dla-1445-3.wml20
-rw-r--r--english/lts/security/2018/dla-1445.data10
-rw-r--r--english/lts/security/2018/dla-1445.wml91
-rw-r--r--english/lts/security/2018/dla-1446.data10
-rw-r--r--english/lts/security/2018/dla-1446.wml47
-rw-r--r--english/lts/security/2018/dla-1447.data10
-rw-r--r--english/lts/security/2018/dla-1447.wml21
-rw-r--r--english/lts/security/2018/dla-1448.data10
-rw-r--r--english/lts/security/2018/dla-1448.wml15
-rw-r--r--english/lts/security/2018/dla-1449.data10
-rw-r--r--english/lts/security/2018/dla-1449.wml35
-rw-r--r--english/lts/security/2018/dla-1450.data10
-rw-r--r--english/lts/security/2018/dla-1450.wml44
-rw-r--r--english/lts/security/2018/dla-1451.data10
-rw-r--r--english/lts/security/2018/dla-1451.wml28
-rw-r--r--english/lts/security/2018/dla-1452.data10
-rw-r--r--english/lts/security/2018/dla-1452.wml36
-rw-r--r--english/lts/security/2018/dla-1453.data10
-rw-r--r--english/lts/security/2018/dla-1453.wml18
-rw-r--r--english/lts/security/2018/dla-1454.data10
-rw-r--r--english/lts/security/2018/dla-1454.wml23
-rw-r--r--english/lts/security/2018/dla-1455.data10
-rw-r--r--english/lts/security/2018/dla-1455.wml21
-rw-r--r--english/lts/security/2018/dla-1456.data10
-rw-r--r--english/lts/security/2018/dla-1456.wml20
-rw-r--r--english/lts/security/2018/dla-1457.data10
-rw-r--r--english/lts/security/2018/dla-1457.wml20
-rw-r--r--english/lts/security/2018/dla-1458.data10
-rw-r--r--english/lts/security/2018/dla-1458.wml20
-rw-r--r--english/lts/security/2018/dla-1459.data10
-rw-r--r--english/lts/security/2018/dla-1459.wml14
-rw-r--r--english/lts/security/2018/dla-1460.data10
-rw-r--r--english/lts/security/2018/dla-1460.wml18
-rw-r--r--english/lts/security/2018/dla-1461.data10
-rw-r--r--english/lts/security/2018/dla-1461.wml35
-rw-r--r--english/lts/security/2018/dla-1462.data10
-rw-r--r--english/lts/security/2018/dla-1462.wml29
-rw-r--r--english/lts/security/2018/dla-1463.data10
-rw-r--r--english/lts/security/2018/dla-1463.wml34
-rw-r--r--english/lts/security/2018/dla-1464.data10
-rw-r--r--english/lts/security/2018/dla-1464.wml28
-rw-r--r--english/lts/security/2018/dla-1465.data10
-rw-r--r--english/lts/security/2018/dla-1465.wml20
-rw-r--r--english/lts/security/2018/dla-1466.data10
-rw-r--r--english/lts/security/2018/dla-1466.wml64
-rw-r--r--english/lts/security/2018/dla-1467.data10
-rw-r--r--english/lts/security/2018/dla-1467.wml19
-rw-r--r--english/lts/security/2018/dla-1468.data10
-rw-r--r--english/lts/security/2018/dla-1468.wml22
-rw-r--r--english/lts/security/2018/dla-1469.data10
-rw-r--r--english/lts/security/2018/dla-1469.wml15
-rw-r--r--english/lts/security/2018/dla-1470.data10
-rw-r--r--english/lts/security/2018/dla-1470.wml27
-rw-r--r--english/lts/security/2018/dla-1471.data10
-rw-r--r--english/lts/security/2018/dla-1471.wml23
-rw-r--r--english/lts/security/2018/dla-1472.data10
-rw-r--r--english/lts/security/2018/dla-1472.wml19
-rw-r--r--english/lts/security/2018/dla-1473.data10
-rw-r--r--english/lts/security/2018/dla-1473.wml19
-rw-r--r--english/lts/security/2018/dla-1474.data10
-rw-r--r--english/lts/security/2018/dla-1474.wml15
-rw-r--r--english/lts/security/2018/dla-1475.data10
-rw-r--r--english/lts/security/2018/dla-1475.wml21
-rw-r--r--english/lts/security/2018/dla-1476.data10
-rw-r--r--english/lts/security/2018/dla-1476.wml28
-rw-r--r--english/lts/security/2018/dla-1477.data10
-rw-r--r--english/lts/security/2018/dla-1477.wml37
-rw-r--r--english/lts/security/2018/dla-1478.data10
-rw-r--r--english/lts/security/2018/dla-1478.wml20
-rw-r--r--english/lts/security/2018/dla-1479.data10
-rw-r--r--english/lts/security/2018/dla-1479.wml18
-rw-r--r--english/lts/security/2018/dla-1480.data10
-rw-r--r--english/lts/security/2018/dla-1480.wml41
-rw-r--r--english/lts/security/2018/dla-1481.data10
-rw-r--r--english/lts/security/2018/dla-1481.wml27
-rw-r--r--english/lts/security/2018/dla-1482.data10
-rw-r--r--english/lts/security/2018/dla-1482.wml26
-rw-r--r--english/lts/security/2018/dla-1483.data10
-rw-r--r--english/lts/security/2018/dla-1483.wml39
-rw-r--r--english/lts/security/2018/dla-1484.data10
-rw-r--r--english/lts/security/2018/dla-1484.wml14
-rw-r--r--english/lts/security/2018/dla-1485.data10
-rw-r--r--english/lts/security/2018/dla-1485.wml24
-rw-r--r--english/lts/security/2018/dla-1486.data10
-rw-r--r--english/lts/security/2018/dla-1486.wml26
-rw-r--r--english/lts/security/2018/dla-1487.data10
-rw-r--r--english/lts/security/2018/dla-1487.wml23
-rw-r--r--english/lts/security/2018/dla-1488.data10
-rw-r--r--english/lts/security/2018/dla-1488.wml26
-rw-r--r--english/lts/security/2018/dla-1489.data10
-rw-r--r--english/lts/security/2018/dla-1489.wml32
-rw-r--r--english/lts/security/2018/dla-1490.data10
-rw-r--r--english/lts/security/2018/dla-1490.wml27
-rw-r--r--english/lts/security/2018/dla-1491.data10
-rw-r--r--english/lts/security/2018/dla-1491.wml33
-rw-r--r--english/lts/security/2018/dla-1492.data10
-rw-r--r--english/lts/security/2018/dla-1492.wml14
-rw-r--r--english/lts/security/2018/dla-1493.data10
-rw-r--r--english/lts/security/2018/dla-1493.wml19
-rw-r--r--english/lts/security/2018/dla-1494.data10
-rw-r--r--english/lts/security/2018/dla-1494.wml21
-rw-r--r--english/lts/security/2018/dla-1495.data10
-rw-r--r--english/lts/security/2018/dla-1495.wml48
-rw-r--r--english/lts/security/2018/dla-1496.data10
-rw-r--r--english/lts/security/2018/dla-1496.wml15
-rw-r--r--english/lts/security/2018/dla-1497.data10
-rw-r--r--english/lts/security/2018/dla-1497.wml218
-rw-r--r--english/lts/security/2018/dla-1498.data10
-rw-r--r--english/lts/security/2018/dla-1498.wml18
-rw-r--r--english/lts/security/2018/dla-1499.data10
-rw-r--r--english/lts/security/2018/dla-1499.wml20
-rw-r--r--english/lts/security/2018/dla-1500-2.data10
-rw-r--r--english/lts/security/2018/dla-1500-2.wml34
-rw-r--r--english/lts/security/2018/dla-1500.data10
-rw-r--r--english/lts/security/2018/dla-1500.wml99
-rw-r--r--english/lts/security/2018/dla-1501.data10
-rw-r--r--english/lts/security/2018/dla-1501.wml14
-rw-r--r--english/lts/security/2018/dla-1502.data10
-rw-r--r--english/lts/security/2018/dla-1502.wml21
-rw-r--r--english/lts/security/2018/dla-1503.data10
-rw-r--r--english/lts/security/2018/dla-1503.wml17
-rw-r--r--english/lts/security/2018/dla-1504.data10
-rw-r--r--english/lts/security/2018/dla-1504.wml21
-rw-r--r--english/lts/security/2018/dla-1505.data10
-rw-r--r--english/lts/security/2018/dla-1505.wml24
-rw-r--r--english/lts/security/2018/dla-1506.data10
-rw-r--r--english/lts/security/2018/dla-1506.wml33
-rw-r--r--english/lts/security/2018/dla-1507.data10
-rw-r--r--english/lts/security/2018/dla-1507.wml23
-rw-r--r--english/lts/security/2018/dla-1508.data10
-rw-r--r--english/lts/security/2018/dla-1508.wml22
-rw-r--r--english/lts/security/2018/dla-1509.data10
-rw-r--r--english/lts/security/2018/dla-1509.wml21
-rw-r--r--english/lts/security/2018/dla-1510.data10
-rw-r--r--english/lts/security/2018/dla-1510.wml29
-rw-r--r--english/lts/security/2018/dla-1511.data10
-rw-r--r--english/lts/security/2018/dla-1511.wml23
-rw-r--r--english/lts/security/2018/dla-1512.data10
-rw-r--r--english/lts/security/2018/dla-1512.wml22
-rw-r--r--english/lts/security/2018/dla-1513.data10
-rw-r--r--english/lts/security/2018/dla-1513.wml46
-rw-r--r--english/lts/security/2018/dla-1514.data10
-rw-r--r--english/lts/security/2018/dla-1514.wml23
-rw-r--r--english/lts/security/2018/dla-1515.data10
-rw-r--r--english/lts/security/2018/dla-1515.wml21
-rw-r--r--english/lts/security/2018/dla-1516.data10
-rw-r--r--english/lts/security/2018/dla-1516.wml21
-rw-r--r--english/lts/security/2018/dla-1517.data10
-rw-r--r--english/lts/security/2018/dla-1517.wml20
-rw-r--r--english/lts/security/2018/dla-1518.data10
-rw-r--r--english/lts/security/2018/dla-1518.wml69
-rw-r--r--english/lts/security/2018/dla-1519.data10
-rw-r--r--english/lts/security/2018/dla-1519.wml51
-rw-r--r--english/lts/security/2018/dla-1520.data10
-rw-r--r--english/lts/security/2018/dla-1520.wml51
-rw-r--r--english/lts/security/2018/dla-1521.data10
-rw-r--r--english/lts/security/2018/dla-1521.wml33
-rw-r--r--english/lts/security/2018/dla-1522.data10
-rw-r--r--english/lts/security/2018/dla-1522.wml35
-rw-r--r--english/lts/security/2018/dla-1523.data10
-rw-r--r--english/lts/security/2018/dla-1523.wml20
-rw-r--r--english/lts/security/2018/dla-1524.data10
-rw-r--r--english/lts/security/2018/dla-1524.wml33
-rw-r--r--english/lts/security/2018/dla-1525.data10
-rw-r--r--english/lts/security/2018/dla-1525.wml36
-rw-r--r--english/lts/security/2018/dla-1526.data10
-rw-r--r--english/lts/security/2018/dla-1526.wml21
-rw-r--r--english/lts/security/2018/dla-1527-2.data10
-rw-r--r--english/lts/security/2018/dla-1527-2.wml22
-rw-r--r--english/lts/security/2018/dla-1527.data10
-rw-r--r--english/lts/security/2018/dla-1527.wml24
-rw-r--r--english/lts/security/2018/dla-1528.data10
-rw-r--r--english/lts/security/2018/dla-1528.wml18
-rw-r--r--english/lts/security/2018/dla-1529.data10
-rw-r--r--english/lts/security/2018/dla-1529.wml255
-rw-r--r--english/lts/security/2018/dla-1530.data10
-rw-r--r--english/lts/security/2018/dla-1530.wml22
-rw-r--r--english/lts/security/2018/dla-1531.data10
-rw-r--r--english/lts/security/2018/dla-1531.wml153
-rw-r--r--english/lts/security/2018/dla-1532.data10
-rw-r--r--english/lts/security/2018/dla-1532.wml25
-rw-r--r--english/lts/security/2018/dla-1533.data10
-rw-r--r--english/lts/security/2018/dla-1533.wml20
-rw-r--r--english/lts/security/2018/dla-1534.data10
-rw-r--r--english/lts/security/2018/dla-1534.wml14
-rw-r--r--english/lts/security/2018/dla-1535.data10
-rw-r--r--english/lts/security/2018/dla-1535.wml20
-rw-r--r--english/lts/security/2018/dla-1536.data10
-rw-r--r--english/lts/security/2018/dla-1536.wml20
-rw-r--r--english/lts/security/2018/dla-1537.data10
-rw-r--r--english/lts/security/2018/dla-1537.wml20
-rw-r--r--english/lts/security/2018/dla-1538.data10
-rw-r--r--english/lts/security/2018/dla-1538.wml35
-rw-r--r--english/lts/security/2018/dla-1539.data10
-rw-r--r--english/lts/security/2018/dla-1539.wml34
-rw-r--r--english/lts/security/2018/dla-1540.data10
-rw-r--r--english/lts/security/2018/dla-1540.wml19
-rw-r--r--english/lts/security/2018/dla-1541.data10
-rw-r--r--english/lts/security/2018/dla-1541.wml22
-rw-r--r--english/lts/security/2018/dla-1542.data10
-rw-r--r--english/lts/security/2018/dla-1542.wml22
-rw-r--r--english/lts/security/2018/dla-1543.data10
-rw-r--r--english/lts/security/2018/dla-1543.wml19
-rw-r--r--english/lts/security/2018/dla-1544.data10
-rw-r--r--english/lts/security/2018/dla-1544.wml20
-rw-r--r--english/lts/security/2018/dla-1545.data10
-rw-r--r--english/lts/security/2018/dla-1545.wml20
-rw-r--r--english/lts/security/2018/dla-1546.data10
-rw-r--r--english/lts/security/2018/dla-1546.wml21
-rw-r--r--english/lts/security/2018/dla-1547.data10
-rw-r--r--english/lts/security/2018/dla-1547.wml17
-rw-r--r--english/lts/security/2018/dla-1548.data10
-rw-r--r--english/lts/security/2018/dla-1548.wml23
-rw-r--r--english/lts/security/2018/dla-1549.data10
-rw-r--r--english/lts/security/2018/dla-1549.wml19
-rw-r--r--english/lts/security/2018/dla-1550.data10
-rw-r--r--english/lts/security/2018/dla-1550.wml19
-rw-r--r--english/lts/security/2018/dla-1551.data10
-rw-r--r--english/lts/security/2018/dla-1551.wml26
-rw-r--r--english/lts/security/2018/dla-1552.data10
-rw-r--r--english/lts/security/2018/dla-1552.wml24
-rw-r--r--english/lts/security/2018/dla-1553.data10
-rw-r--r--english/lts/security/2018/dla-1553.wml32
-rw-r--r--english/lts/security/2018/dla-1554-2.data9
-rw-r--r--english/lts/security/2018/dla-1554-2.wml21
-rw-r--r--english/lts/security/2018/dla-1554.data10
-rw-r--r--english/lts/security/2018/dla-1554.wml20
-rw-r--r--english/lts/security/2018/dla-1555.data10
-rw-r--r--english/lts/security/2018/dla-1555.wml29
-rw-r--r--english/lts/security/2018/dla-1556.data10
-rw-r--r--english/lts/security/2018/dla-1556.wml31
-rw-r--r--english/lts/security/2018/dla-1557.data10
-rw-r--r--english/lts/security/2018/dla-1557.wml37
-rw-r--r--english/lts/security/2018/dla-1558.data10
-rw-r--r--english/lts/security/2018/dla-1558.wml29
-rw-r--r--english/lts/security/2018/dla-1559.data10
-rw-r--r--english/lts/security/2018/dla-1559.wml19
-rw-r--r--english/lts/security/2018/dla-1560.data10
-rw-r--r--english/lts/security/2018/dla-1560.wml82
-rw-r--r--english/lts/security/2018/dla-1561.data10
-rw-r--r--english/lts/security/2018/dla-1561.wml22
-rw-r--r--english/lts/security/2018/dla-1562-2.data10
-rw-r--r--english/lts/security/2018/dla-1562-2.wml39
-rw-r--r--english/lts/security/2018/dla-1562-3.data10
-rw-r--r--english/lts/security/2018/dla-1562-3.wml34
-rw-r--r--english/lts/security/2018/dla-1562.data10
-rw-r--r--english/lts/security/2018/dla-1562.wml66
-rw-r--r--english/lts/security/2018/dla-1563.data9
-rw-r--r--english/lts/security/2018/dla-1563.wml28
-rw-r--r--english/lts/security/2018/dla-1564.data10
-rw-r--r--english/lts/security/2018/dla-1564.wml36
-rw-r--r--english/lts/security/2018/dla-1565.data10
-rw-r--r--english/lts/security/2018/dla-1565.wml66
-rw-r--r--english/lts/security/2018/dla-1566.data10
-rw-r--r--english/lts/security/2018/dla-1566.wml29
-rw-r--r--english/lts/security/2018/dla-1567.data10
-rw-r--r--english/lts/security/2018/dla-1567.wml31
-rw-r--r--english/lts/security/2018/dla-1568.data10
-rw-r--r--english/lts/security/2018/dla-1568.wml57
-rw-r--r--english/lts/security/2018/dla-1569-2.data9
-rw-r--r--english/lts/security/2018/dla-1569-2.wml19
-rw-r--r--english/lts/security/2018/dla-1569.data9
-rw-r--r--english/lts/security/2018/dla-1569.wml18
-rw-r--r--english/lts/security/2018/dla-1570.data10
-rw-r--r--english/lts/security/2018/dla-1570.wml22
-rw-r--r--english/lts/security/2018/dla-1571.data10
-rw-r--r--english/lts/security/2018/dla-1571.wml19
-rw-r--r--english/lts/security/2018/dla-1572.data10
-rw-r--r--english/lts/security/2018/dla-1572.wml19
-rw-r--r--english/lts/security/2018/dla-1573.data10
-rw-r--r--english/lts/security/2018/dla-1573.wml66
-rw-r--r--english/lts/security/2018/dla-1574.data10
-rw-r--r--english/lts/security/2018/dla-1574.wml22
-rw-r--r--english/lts/security/2018/dla-1575.data10
-rw-r--r--english/lts/security/2018/dla-1575.wml28
-rw-r--r--english/lts/security/2018/dla-1576.data10
-rw-r--r--english/lts/security/2018/dla-1576.wml18
-rw-r--r--english/lts/security/2018/dla-1577.data10
-rw-r--r--english/lts/security/2018/dla-1577.wml19
-rw-r--r--english/lts/security/2018/dla-1578.data10
-rw-r--r--english/lts/security/2018/dla-1578.wml52
-rw-r--r--english/lts/security/2018/dla-1579.data10
-rw-r--r--english/lts/security/2018/dla-1579.wml36
-rw-r--r--english/lts/security/2018/dla-1580.data10
-rw-r--r--english/lts/security/2018/dla-1580.wml45
-rw-r--r--english/lts/security/2018/dla-1581.data10
-rw-r--r--english/lts/security/2018/dla-1581.wml40
-rw-r--r--english/lts/security/2018/dla-1582.data10
-rw-r--r--english/lts/security/2018/dla-1582.wml19
-rw-r--r--english/lts/security/2018/dla-1583.data10
-rw-r--r--english/lts/security/2018/dla-1583.wml55
-rw-r--r--english/lts/security/2018/dla-1584.data10
-rw-r--r--english/lts/security/2018/dla-1584.wml17
-rw-r--r--english/lts/security/2018/dla-1585.data10
-rw-r--r--english/lts/security/2018/dla-1585.wml17
-rw-r--r--english/lts/security/2018/dla-1586.data10
-rw-r--r--english/lts/security/2018/dla-1586.wml34
-rw-r--r--english/lts/security/2018/dla-1587.data10
-rw-r--r--english/lts/security/2018/dla-1587.wml22
-rw-r--r--english/lts/security/2018/dla-1588.data10
-rw-r--r--english/lts/security/2018/dla-1588.wml23
-rw-r--r--english/lts/security/2018/dla-1589.data10
-rw-r--r--english/lts/security/2018/dla-1589.wml21
-rw-r--r--english/lts/security/2018/dla-1590.data10
-rw-r--r--english/lts/security/2018/dla-1590.wml20
-rw-r--r--english/lts/security/2018/dla-1591-2.data10
-rw-r--r--english/lts/security/2018/dla-1591-2.wml22
-rw-r--r--english/lts/security/2018/dla-1591.data10
-rw-r--r--english/lts/security/2018/dla-1591.wml25
-rw-r--r--english/lts/security/2018/dla-1592.data10
-rw-r--r--english/lts/security/2018/dla-1592.wml40
-rw-r--r--english/lts/security/2018/dla-1593.data10
-rw-r--r--english/lts/security/2018/dla-1593.wml27
-rw-r--r--english/lts/security/2018/dla-1594.data9
-rw-r--r--english/lts/security/2018/dla-1594.wml24
-rw-r--r--english/lts/security/2018/dla-1595.data10
-rw-r--r--english/lts/security/2018/dla-1595.wml28
-rw-r--r--english/lts/security/2018/dla-1596.data10
-rw-r--r--english/lts/security/2018/dla-1596.wml22
-rw-r--r--english/lts/security/2018/dla-1597.data10
-rw-r--r--english/lts/security/2018/dla-1597.wml24
-rw-r--r--english/lts/security/2018/dla-1598.data10
-rw-r--r--english/lts/security/2018/dla-1598.wml21
-rw-r--r--english/lts/security/2018/dla-1599.data10
-rw-r--r--english/lts/security/2018/dla-1599.wml192
-rw-r--r--english/lts/security/2018/dla-1600.data10
-rw-r--r--english/lts/security/2018/dla-1600.wml21
-rw-r--r--english/lts/security/2018/dla-1601.data10
-rw-r--r--english/lts/security/2018/dla-1601.wml19
-rw-r--r--english/lts/security/2018/dla-1602.data10
-rw-r--r--english/lts/security/2018/dla-1602.wml32
-rw-r--r--english/lts/security/2018/dla-1603.data10
-rw-r--r--english/lts/security/2018/dla-1603.wml52
-rw-r--r--english/lts/security/2018/dla-1604.data10
-rw-r--r--english/lts/security/2018/dla-1604.wml17
-rw-r--r--english/lts/security/2018/dla-1605.data10
-rw-r--r--english/lts/security/2018/dla-1605.wml19
-rw-r--r--english/lts/security/2018/dla-1606.data10
-rw-r--r--english/lts/security/2018/dla-1606.wml17
-rw-r--r--english/lts/security/2018/dla-1607.data10
-rw-r--r--english/lts/security/2018/dla-1607.wml37
-rw-r--r--english/lts/security/2018/dla-1608.data10
-rw-r--r--english/lts/security/2018/dla-1608.wml46
-rw-r--r--english/lts/security/2018/dla-1609.data10
-rw-r--r--english/lts/security/2018/dla-1609.wml29
-rw-r--r--english/lts/security/2018/dla-1610.data10
-rw-r--r--english/lts/security/2018/dla-1610.wml22
-rw-r--r--english/lts/security/2018/dla-1611-2.data10
-rw-r--r--english/lts/security/2018/dla-1611-2.wml47
-rw-r--r--english/lts/security/2018/dla-1611.data10
-rw-r--r--english/lts/security/2018/dla-1611.wml191
-rw-r--r--english/lts/security/2018/dla-1612.data10
-rw-r--r--english/lts/security/2018/dla-1612.wml20
-rw-r--r--english/lts/security/2018/dla-1613.data10
-rw-r--r--english/lts/security/2018/dla-1613.wml22
-rw-r--r--english/lts/security/2018/dla-1614.data10
-rw-r--r--english/lts/security/2018/dla-1614.wml36
-rw-r--r--english/lts/security/2018/dla-1615.data10
-rw-r--r--english/lts/security/2018/dla-1615.wml56
-rw-r--r--english/lts/security/2018/dla-1616.data10
-rw-r--r--english/lts/security/2018/dla-1616.wml20
-rw-r--r--english/lts/security/2018/dla-1617.data10
-rw-r--r--english/lts/security/2018/dla-1617.wml72
-rw-r--r--english/lts/security/2018/dla-1618.data10
-rw-r--r--english/lts/security/2018/dla-1618.wml87
-rw-r--r--english/lts/security/2018/dla-1619.data10
-rw-r--r--english/lts/security/2018/dla-1619.wml41
-rw-r--r--english/lts/security/2018/dla-1620.data10
-rw-r--r--english/lts/security/2018/dla-1620.wml38
-rw-r--r--english/lts/security/2018/dla-1621.data10
-rw-r--r--english/lts/security/2018/dla-1621.wml19
-rw-r--r--english/lts/security/2018/dla-1622.data9
-rw-r--r--english/lts/security/2018/dla-1622.wml26
-rw-r--r--english/lts/security/2018/dla-1623.data10
-rw-r--r--english/lts/security/2018/dla-1623.wml19
-rw-r--r--english/lts/security/2018/index.wml11
-rw-r--r--english/lts/security/2019/Makefile42
-rw-r--r--english/lts/security/2019/dla-1624.data10
-rw-r--r--english/lts/security/2019/dla-1624.wml18
-rw-r--r--english/lts/security/2019/dla-1625.data9
-rw-r--r--english/lts/security/2019/dla-1625.wml26
-rw-r--r--english/lts/security/2019/dla-1626.data9
-rw-r--r--english/lts/security/2019/dla-1626.wml18
-rw-r--r--english/lts/security/2019/dla-1627.data10
-rw-r--r--english/lts/security/2019/dla-1627.wml36
-rw-r--r--english/lts/security/2019/dla-1628-2.data9
-rw-r--r--english/lts/security/2019/dla-1628-2.wml20
-rw-r--r--english/lts/security/2019/dla-1628.data10
-rw-r--r--english/lts/security/2019/dla-1628.wml20
-rw-r--r--english/lts/security/2019/dla-1629.data10
-rw-r--r--english/lts/security/2019/dla-1629.wml18
-rw-r--r--english/lts/security/2019/dla-1630.data10
-rw-r--r--english/lts/security/2019/dla-1630.wml111
-rw-r--r--english/lts/security/2019/dla-1631.data10
-rw-r--r--english/lts/security/2019/dla-1631.wml20
-rw-r--r--english/lts/security/2019/dla-1632.data10
-rw-r--r--english/lts/security/2019/dla-1632.wml20
-rw-r--r--english/lts/security/2019/dla-1633.data10
-rw-r--r--english/lts/security/2019/dla-1633.wml50
-rw-r--r--english/lts/security/2019/dla-1634.data10
-rw-r--r--english/lts/security/2019/dla-1634.wml22
-rw-r--r--english/lts/security/2019/dla-1635.data10
-rw-r--r--english/lts/security/2019/dla-1635.wml22
-rw-r--r--english/lts/security/2019/dla-1636.data10
-rw-r--r--english/lts/security/2019/dla-1636.wml20
-rw-r--r--english/lts/security/2019/dla-1637.data10
-rw-r--r--english/lts/security/2019/dla-1637.wml124
-rw-r--r--english/lts/security/2019/dla-1638.data10
-rw-r--r--english/lts/security/2019/dla-1638.wml55
-rw-r--r--english/lts/security/2019/dla-1639.data10
-rw-r--r--english/lts/security/2019/dla-1639.wml41
-rw-r--r--english/lts/security/2019/dla-1640.data10
-rw-r--r--english/lts/security/2019/dla-1640.wml20
-rw-r--r--english/lts/security/2019/dla-1641.data10
-rw-r--r--english/lts/security/2019/dla-1641.wml40
-rw-r--r--english/lts/security/2019/dla-1642.data9
-rw-r--r--english/lts/security/2019/dla-1642.wml18
-rw-r--r--english/lts/security/2019/dla-1643.data10
-rw-r--r--english/lts/security/2019/dla-1643.wml22
-rw-r--r--english/lts/security/2019/dla-1644.data10
-rw-r--r--english/lts/security/2019/dla-1644.wml34
-rw-r--r--english/lts/security/2019/dla-1645.data10
-rw-r--r--english/lts/security/2019/dla-1645.wml47
-rw-r--r--english/lts/security/2019/dla-1646.data10
-rw-r--r--english/lts/security/2019/dla-1646.wml42
-rw-r--r--english/lts/security/2019/dla-1647.data10
-rw-r--r--english/lts/security/2019/dla-1647.wml22
-rw-r--r--english/lts/security/2019/dla-1648.data10
-rw-r--r--english/lts/security/2019/dla-1648.wml19
-rw-r--r--english/lts/security/2019/dla-1649.data10
-rw-r--r--english/lts/security/2019/dla-1649.wml20
-rw-r--r--english/lts/security/2019/dla-1650.data10
-rw-r--r--english/lts/security/2019/dla-1650.wml24
-rw-r--r--english/lts/security/2019/dla-1651.data10
-rw-r--r--english/lts/security/2019/dla-1651.wml45
-rw-r--r--english/lts/security/2019/dla-1652.data10
-rw-r--r--english/lts/security/2019/dla-1652.wml37
-rw-r--r--english/lts/security/2019/dla-1653.data10
-rw-r--r--english/lts/security/2019/dla-1653.wml20
-rw-r--r--english/lts/security/2019/dla-1654.data10
-rw-r--r--english/lts/security/2019/dla-1654.wml67
-rw-r--r--english/lts/security/2019/dla-1655.data10
-rw-r--r--english/lts/security/2019/dla-1655.wml22
-rw-r--r--english/lts/security/2019/dla-1656.data10
-rw-r--r--english/lts/security/2019/dla-1656.wml21
-rw-r--r--english/lts/security/2019/dla-1657.data9
-rw-r--r--english/lts/security/2019/dla-1657.wml31
-rw-r--r--english/lts/security/2019/dla-1658.data10
-rw-r--r--english/lts/security/2019/dla-1658.wml39
-rw-r--r--english/lts/security/2019/dla-1659.data10
-rw-r--r--english/lts/security/2019/dla-1659.wml24
-rw-r--r--english/lts/security/2019/dla-1660-2.data9
-rw-r--r--english/lts/security/2019/dla-1660-2.wml23
-rw-r--r--english/lts/security/2019/dla-1660.data10
-rw-r--r--english/lts/security/2019/dla-1660.wml33
-rw-r--r--english/lts/security/2019/dla-1661.data10
-rw-r--r--english/lts/security/2019/dla-1661.wml22
-rw-r--r--english/lts/security/2019/dla-1662.data10
-rw-r--r--english/lts/security/2019/dla-1662.wml21
-rw-r--r--english/lts/security/2019/dla-1663.data10
-rw-r--r--english/lts/security/2019/dla-1663.wml53
-rw-r--r--english/lts/security/2019/dla-1664.data10
-rw-r--r--english/lts/security/2019/dla-1664.wml16
-rw-r--r--english/lts/security/2019/dla-1665.data10
-rw-r--r--english/lts/security/2019/dla-1665.wml18
-rw-r--r--english/lts/security/2019/dla-1666.data10
-rw-r--r--english/lts/security/2019/dla-1666.wml66
-rw-r--r--english/lts/security/2019/dla-1667.data10
-rw-r--r--english/lts/security/2019/dla-1667.wml18
-rw-r--r--english/lts/security/2019/dla-1668.data10
-rw-r--r--english/lts/security/2019/dla-1668.wml33
-rw-r--r--english/lts/security/2019/dla-1669.data10
-rw-r--r--english/lts/security/2019/dla-1669.wml19
-rw-r--r--english/lts/security/2019/dla-1670.data10
-rw-r--r--english/lts/security/2019/dla-1670.wml20
-rw-r--r--english/lts/security/2019/dla-1671.data10
-rw-r--r--english/lts/security/2019/dla-1671.wml45
-rw-r--r--english/lts/security/2019/dla-1672.data10
-rw-r--r--english/lts/security/2019/dla-1672.wml30
-rw-r--r--english/lts/security/2019/dla-1673.data10
-rw-r--r--english/lts/security/2019/dla-1673.wml61
-rw-r--r--english/lts/security/2019/dla-1674.data10
-rw-r--r--english/lts/security/2019/dla-1674.wml26
-rw-r--r--english/lts/security/2019/dla-1675.data10
-rw-r--r--english/lts/security/2019/dla-1675.wml28
-rw-r--r--english/lts/security/2019/dla-1676.data10
-rw-r--r--english/lts/security/2019/dla-1676.wml26
-rw-r--r--english/lts/security/2019/dla-1677.data10
-rw-r--r--english/lts/security/2019/dla-1677.wml19
-rw-r--r--english/lts/security/2019/dla-1678.data10
-rw-r--r--english/lts/security/2019/dla-1678.wml19
-rw-r--r--english/lts/security/2019/dla-1679.data9
-rw-r--r--english/lts/security/2019/dla-1679.wml25
-rw-r--r--english/lts/security/2019/dla-1680.data10
-rw-r--r--english/lts/security/2019/dla-1680.wml46
-rw-r--r--english/lts/security/2019/dla-1681.data10
-rw-r--r--english/lts/security/2019/dla-1681.wml16
-rw-r--r--english/lts/security/2019/dla-1682.data10
-rw-r--r--english/lts/security/2019/dla-1682.wml22
-rw-r--r--english/lts/security/2019/dla-1683.data10
-rw-r--r--english/lts/security/2019/dla-1683.wml19
-rw-r--r--english/lts/security/2019/dla-1684.data10
-rw-r--r--english/lts/security/2019/dla-1684.wml19
-rw-r--r--english/lts/security/2019/dla-1685.data10
-rw-r--r--english/lts/security/2019/dla-1685.wml21
-rw-r--r--english/lts/security/2019/dla-1686.data10
-rw-r--r--english/lts/security/2019/dla-1686.wml20
-rw-r--r--english/lts/security/2019/dla-1687.data10
-rw-r--r--english/lts/security/2019/dla-1687.wml19
-rw-r--r--english/lts/security/2019/dla-1688.data9
-rw-r--r--english/lts/security/2019/dla-1688.wml18
-rw-r--r--english/lts/security/2019/dla-1689.data10
-rw-r--r--english/lts/security/2019/dla-1689.wml83
-rw-r--r--english/lts/security/2019/dla-1690.data10
-rw-r--r--english/lts/security/2019/dla-1690.wml39
-rw-r--r--english/lts/security/2019/dla-1691.data10
-rw-r--r--english/lts/security/2019/dla-1691.wml48
-rw-r--r--english/lts/security/2019/dla-1692.data10
-rw-r--r--english/lts/security/2019/dla-1692.wml24
-rw-r--r--english/lts/security/2019/dla-1693.data10
-rw-r--r--english/lts/security/2019/dla-1693.wml23
-rw-r--r--english/lts/security/2019/dla-1694.data10
-rw-r--r--english/lts/security/2019/dla-1694.wml43
-rw-r--r--english/lts/security/2019/dla-1695.data10
-rw-r--r--english/lts/security/2019/dla-1695.wml49
-rw-r--r--english/lts/security/2019/dla-1696.data10
-rw-r--r--english/lts/security/2019/dla-1696.wml34
-rw-r--r--english/lts/security/2019/dla-1697.data10
-rw-r--r--english/lts/security/2019/dla-1697.wml33
-rw-r--r--english/lts/security/2019/dla-1698-2.data9
-rw-r--r--english/lts/security/2019/dla-1698-2.wml20
-rw-r--r--english/lts/security/2019/dla-1698.data10
-rw-r--r--english/lts/security/2019/dla-1698.wml18
-rw-r--r--english/lts/security/2019/dla-1699.data10
-rw-r--r--english/lts/security/2019/dla-1699.wml20
-rw-r--r--english/lts/security/2019/dla-1700.data10
-rw-r--r--english/lts/security/2019/dla-1700.wml27
-rw-r--r--english/lts/security/2019/dla-1701.data10
-rw-r--r--english/lts/security/2019/dla-1701.wml34
-rw-r--r--english/lts/security/2019/dla-1702.data10
-rw-r--r--english/lts/security/2019/dla-1702.wml36
-rw-r--r--english/lts/security/2019/dla-1703.data10
-rw-r--r--english/lts/security/2019/dla-1703.wml20
-rw-r--r--english/lts/security/2019/dla-1704.data10
-rw-r--r--english/lts/security/2019/dla-1704.wml33
-rw-r--r--english/lts/security/2019/dla-1705.data10
-rw-r--r--english/lts/security/2019/dla-1705.wml51
-rw-r--r--english/lts/security/2019/dla-1706.data10
-rw-r--r--english/lts/security/2019/dla-1706.wml56
-rw-r--r--english/lts/security/2019/dla-1707.data10
-rw-r--r--english/lts/security/2019/dla-1707.wml44
-rw-r--r--english/lts/security/2019/dla-1708.data10
-rw-r--r--english/lts/security/2019/dla-1708.wml40
-rw-r--r--english/lts/security/2019/dla-1709.data10
-rw-r--r--english/lts/security/2019/dla-1709.wml19
-rw-r--r--english/lts/security/2019/dla-1710.data10
-rw-r--r--english/lts/security/2019/dla-1710.wml19
-rw-r--r--english/lts/security/2019/dla-1711.data10
-rw-r--r--english/lts/security/2019/dla-1711.wml25
-rw-r--r--english/lts/security/2019/dla-1712.data10
-rw-r--r--english/lts/security/2019/dla-1712.wml24
-rw-r--r--english/lts/security/2019/dla-1713-2.data10
-rw-r--r--english/lts/security/2019/dla-1713-2.wml20
-rw-r--r--english/lts/security/2019/dla-1713.data10
-rw-r--r--english/lts/security/2019/dla-1713.wml19
-rw-r--r--english/lts/security/2019/dla-1714-2.data10
-rw-r--r--english/lts/security/2019/dla-1714-2.wml20
-rw-r--r--english/lts/security/2019/dla-1714.data10
-rw-r--r--english/lts/security/2019/dla-1714.wml20
-rw-r--r--english/lts/security/2019/dla-1715.data10
-rw-r--r--english/lts/security/2019/dla-1715.wml153
-rw-r--r--english/lts/security/2019/dla-1716.data10
-rw-r--r--english/lts/security/2019/dla-1716.wml65
-rw-r--r--english/lts/security/2019/dla-1717.data10
-rw-r--r--english/lts/security/2019/dla-1717.wml20
-rw-r--r--english/lts/security/2019/dla-1718.data10
-rw-r--r--english/lts/security/2019/dla-1718.wml34
-rw-r--r--english/lts/security/2019/dla-1719.data10
-rw-r--r--english/lts/security/2019/dla-1719.wml29
-rw-r--r--english/lts/security/2019/dla-1720.data10
-rw-r--r--english/lts/security/2019/dla-1720.wml21
-rw-r--r--english/lts/security/2019/dla-1721.data10
-rw-r--r--english/lts/security/2019/dla-1721.wml22
-rw-r--r--english/lts/security/2019/dla-1722.data10
-rw-r--r--english/lts/security/2019/dla-1722.wml19
-rw-r--r--english/lts/security/2019/dla-1723.data10
-rw-r--r--english/lts/security/2019/dla-1723.wml48
-rw-r--r--english/lts/security/2019/dla-1724.data10
-rw-r--r--english/lts/security/2019/dla-1724.wml19
-rw-r--r--english/lts/security/2019/dla-1725.data10
-rw-r--r--english/lts/security/2019/dla-1725.wml52
-rw-r--r--english/lts/security/2019/dla-1726.data10
-rw-r--r--english/lts/security/2019/dla-1726.wml32
-rw-r--r--english/lts/security/2019/dla-1727.data10
-rw-r--r--english/lts/security/2019/dla-1727.wml19
-rw-r--r--english/lts/security/2019/dla-1728.data10
-rw-r--r--english/lts/security/2019/dla-1728.wml51
-rw-r--r--english/lts/security/2019/dla-1729.data10
-rw-r--r--english/lts/security/2019/dla-1729.wml40
-rw-r--r--english/lts/security/2019/dla-1730-2.data10
-rw-r--r--english/lts/security/2019/dla-1730-2.wml25
-rw-r--r--english/lts/security/2019/dla-1730-3.data10
-rw-r--r--english/lts/security/2019/dla-1730-3.wml42
-rw-r--r--english/lts/security/2019/dla-1730-4.data10
-rw-r--r--english/lts/security/2019/dla-1730-4.wml29
-rw-r--r--english/lts/security/2019/dla-1730.data10
-rw-r--r--english/lts/security/2019/dla-1730.wml91
-rw-r--r--english/lts/security/2019/dla-1731-2.data10
-rw-r--r--english/lts/security/2019/dla-1731-2.wml206
-rw-r--r--english/lts/security/2019/dla-1731.data10
-rw-r--r--english/lts/security/2019/dla-1731.wml200
-rw-r--r--english/lts/security/2019/dla-1732.data10
-rw-r--r--english/lts/security/2019/dla-1732.wml19
-rw-r--r--english/lts/security/2019/dla-1733.data10
-rw-r--r--english/lts/security/2019/dla-1733.wml20
-rw-r--r--english/lts/security/2019/dla-1734.data10
-rw-r--r--english/lts/security/2019/dla-1734.wml23
-rw-r--r--english/lts/security/2019/dla-1735.data10
-rw-r--r--english/lts/security/2019/dla-1735.wml56
-rw-r--r--english/lts/security/2019/dla-1736.data10
-rw-r--r--english/lts/security/2019/dla-1736.wml22
-rw-r--r--english/lts/security/2019/dla-1737.data10
-rw-r--r--english/lts/security/2019/dla-1737.wml26
-rw-r--r--english/lts/security/2019/dla-1738.data10
-rw-r--r--english/lts/security/2019/dla-1738.wml20
-rw-r--r--english/lts/security/2019/dla-1739.data10
-rw-r--r--english/lts/security/2019/dla-1739.wml24
-rw-r--r--english/lts/security/2019/dla-1740.data10
-rw-r--r--english/lts/security/2019/dla-1740.wml57
-rw-r--r--english/lts/security/2019/dla-1741.data10
-rw-r--r--english/lts/security/2019/dla-1741.wml47
-rw-r--r--english/lts/security/2019/dla-1742.data10
-rw-r--r--english/lts/security/2019/dla-1742.wml40
-rw-r--r--english/lts/security/2019/dla-1743.data10
-rw-r--r--english/lts/security/2019/dla-1743.wml18
-rw-r--r--english/lts/security/2019/dla-1744.data9
-rw-r--r--english/lts/security/2019/dla-1744.wml25
-rw-r--r--english/lts/security/2019/dla-1745.data9
-rw-r--r--english/lts/security/2019/dla-1745.wml18
-rw-r--r--english/lts/security/2019/dla-1746.data10
-rw-r--r--english/lts/security/2019/dla-1746.wml19
-rw-r--r--english/lts/security/2019/dla-1747.data10
-rw-r--r--english/lts/security/2019/dla-1747.wml26
-rw-r--r--english/lts/security/2019/dla-1748.data10
-rw-r--r--english/lts/security/2019/dla-1748.wml37
-rw-r--r--english/lts/security/2019/dla-1749.data10
-rw-r--r--english/lts/security/2019/dla-1749.wml27
-rw-r--r--english/lts/security/2019/dla-1750.data10
-rw-r--r--english/lts/security/2019/dla-1750.wml27
-rw-r--r--english/lts/security/2019/dla-1751.data10
-rw-r--r--english/lts/security/2019/dla-1751.wml36
-rw-r--r--english/lts/security/2019/dla-1752.data10
-rw-r--r--english/lts/security/2019/dla-1752.wml22
-rw-r--r--english/lts/security/2019/dla-1753-2.data10
-rw-r--r--english/lts/security/2019/dla-1753-2.wml24
-rw-r--r--english/lts/security/2019/dla-1753-3.data10
-rw-r--r--english/lts/security/2019/dla-1753-3.wml20
-rw-r--r--english/lts/security/2019/dla-1753.data10
-rw-r--r--english/lts/security/2019/dla-1753.wml19
-rw-r--r--english/lts/security/2019/dla-1754.data10
-rw-r--r--english/lts/security/2019/dla-1754.wml56
-rw-r--r--english/lts/security/2019/dla-1755.data10
-rw-r--r--english/lts/security/2019/dla-1755.wml19
-rw-r--r--english/lts/security/2019/dla-1756.data10
-rw-r--r--english/lts/security/2019/dla-1756.wml36
-rw-r--r--english/lts/security/2019/dla-1757.data10
-rw-r--r--english/lts/security/2019/dla-1757.wml30
-rw-r--r--english/lts/security/2019/dla-1758.data9
-rw-r--r--english/lts/security/2019/dla-1758.wml24
-rw-r--r--english/lts/security/2019/dla-1759.data10
-rw-r--r--english/lts/security/2019/dla-1759.wml42
-rw-r--r--english/lts/security/2019/dla-1760.data10
-rw-r--r--english/lts/security/2019/dla-1760.wml24
-rw-r--r--english/lts/security/2019/dla-1761.data10
-rw-r--r--english/lts/security/2019/dla-1761.wml19
-rw-r--r--english/lts/security/2019/dla-1762-2.data9
-rw-r--r--english/lts/security/2019/dla-1762-2.wml26
-rw-r--r--english/lts/security/2019/dla-1762.data10
-rw-r--r--english/lts/security/2019/dla-1762.wml40
-rw-r--r--english/lts/security/2019/dla-1763.data10
-rw-r--r--english/lts/security/2019/dla-1763.wml22
-rw-r--r--english/lts/security/2019/dla-1764.data9
-rw-r--r--english/lts/security/2019/dla-1764.wml29
-rw-r--r--english/lts/security/2019/dla-1765.data10
-rw-r--r--english/lts/security/2019/dla-1765.wml21
-rw-r--r--english/lts/security/2019/dla-1766.data10
-rw-r--r--english/lts/security/2019/dla-1766.wml21
-rw-r--r--english/lts/security/2019/dla-1767.data10
-rw-r--r--english/lts/security/2019/dla-1767.wml33
-rw-r--r--english/lts/security/2019/dla-1768.data10
-rw-r--r--english/lts/security/2019/dla-1768.wml22
-rw-r--r--english/lts/security/2019/dla-1769.data10
-rw-r--r--english/lts/security/2019/dla-1769.wml23
-rw-r--r--english/lts/security/2019/dla-1770.data10
-rw-r--r--english/lts/security/2019/dla-1770.wml23
-rw-r--r--english/lts/security/2019/dla-1771.data10
-rw-r--r--english/lts/security/2019/dla-1771.wml140
-rw-r--r--english/lts/security/2019/dla-1772.data10
-rw-r--r--english/lts/security/2019/dla-1772.wml21
-rw-r--r--english/lts/security/2019/dla-1773.data10
-rw-r--r--english/lts/security/2019/dla-1773.wml19
-rw-r--r--english/lts/security/2019/dla-1774.data10
-rw-r--r--english/lts/security/2019/dla-1774.wml20
-rw-r--r--english/lts/security/2019/dla-1775.data10
-rw-r--r--english/lts/security/2019/dla-1775.wml21
-rw-r--r--english/lts/security/2019/dla-1776.data10
-rw-r--r--english/lts/security/2019/dla-1776.wml19
-rw-r--r--english/lts/security/2019/dla-1777-2.data10
-rw-r--r--english/lts/security/2019/dla-1777-2.wml19
-rw-r--r--english/lts/security/2019/dla-1777.data10
-rw-r--r--english/lts/security/2019/dla-1777.wml22
-rw-r--r--english/lts/security/2019/dla-1778.data10
-rw-r--r--english/lts/security/2019/dla-1778.wml67
-rw-r--r--english/lts/security/2019/dla-1779.data10
-rw-r--r--english/lts/security/2019/dla-1779.wml24
-rw-r--r--english/lts/security/2019/dla-1780.data10
-rw-r--r--english/lts/security/2019/dla-1780.wml26
-rw-r--r--english/lts/security/2019/dla-1781.data10
-rw-r--r--english/lts/security/2019/dla-1781.wml46
-rw-r--r--english/lts/security/2019/dla-1782.data10
-rw-r--r--english/lts/security/2019/dla-1782.wml20
-rw-r--r--english/lts/security/2019/dla-1783.data10
-rw-r--r--english/lts/security/2019/dla-1783.wml21
-rw-r--r--english/lts/security/2019/dla-1784.data9
-rw-r--r--english/lts/security/2019/dla-1784.wml22
-rw-r--r--english/lts/security/2019/dla-1785.data10
-rw-r--r--english/lts/security/2019/dla-1785.wml22
-rw-r--r--english/lts/security/2019/dla-1786.data10
-rw-r--r--english/lts/security/2019/dla-1786.wml45
-rw-r--r--english/lts/security/2019/dla-1787.data10
-rw-r--r--english/lts/security/2019/dla-1787.wml36
-rw-r--r--english/lts/security/2019/dla-1788.data10
-rw-r--r--english/lts/security/2019/dla-1788.wml19
-rw-r--r--english/lts/security/2019/dla-1789-2.data10
-rw-r--r--english/lts/security/2019/dla-1789-2.wml28
-rw-r--r--english/lts/security/2019/dla-1789.data10
-rw-r--r--english/lts/security/2019/dla-1789.wml28
-rw-r--r--english/lts/security/2019/dla-1790.data10
-rw-r--r--english/lts/security/2019/dla-1790.wml22
-rw-r--r--english/lts/security/2019/dla-1791.data10
-rw-r--r--english/lts/security/2019/dla-1791.wml34
-rw-r--r--english/lts/security/2019/dla-1792-2.data10
-rw-r--r--english/lts/security/2019/dla-1792-2.wml21
-rw-r--r--english/lts/security/2019/dla-1792.data10
-rw-r--r--english/lts/security/2019/dla-1792.wml21
-rw-r--r--english/lts/security/2019/dla-1793.data9
-rw-r--r--english/lts/security/2019/dla-1793.wml26
-rw-r--r--english/lts/security/2019/dla-1794.data10
-rw-r--r--english/lts/security/2019/dla-1794.wml21
-rw-r--r--english/lts/security/2019/dla-1795.data10
-rw-r--r--english/lts/security/2019/dla-1795.wml43
-rw-r--r--english/lts/security/2019/dla-1796.data10
-rw-r--r--english/lts/security/2019/dla-1796.wml84
-rw-r--r--english/lts/security/2019/dla-1797.data10
-rw-r--r--english/lts/security/2019/dla-1797.wml41
-rw-r--r--english/lts/security/2019/dla-1798.data10
-rw-r--r--english/lts/security/2019/dla-1798.wml25
-rw-r--r--english/lts/security/2019/dla-1799-2.data10
-rw-r--r--english/lts/security/2019/dla-1799-2.wml127
-rw-r--r--english/lts/security/2019/dla-1799.data10
-rw-r--r--english/lts/security/2019/dla-1799.wml122
-rw-r--r--english/lts/security/2019/dla-1800.data10
-rw-r--r--english/lts/security/2019/dla-1800.wml18
-rw-r--r--english/lts/security/2019/dla-1801.data9
-rw-r--r--english/lts/security/2019/dla-1801.wml27
-rw-r--r--english/lts/security/2019/dla-1802.data10
-rw-r--r--english/lts/security/2019/dla-1802.wml55
-rw-r--r--english/lts/security/2019/dla-1803.data10
-rw-r--r--english/lts/security/2019/dla-1803.wml21
-rw-r--r--english/lts/security/2019/dla-1804.data10
-rw-r--r--english/lts/security/2019/dla-1804.wml21
-rw-r--r--english/lts/security/2019/dla-1805.data9
-rw-r--r--english/lts/security/2019/dla-1805.wml26
-rw-r--r--english/lts/security/2019/dla-1806.data10
-rw-r--r--english/lts/security/2019/dla-1806.wml19
-rw-r--r--english/lts/security/2019/dla-1807.data10
-rw-r--r--english/lts/security/2019/dla-1807.wml22
-rw-r--r--english/lts/security/2019/dla-1808.data10
-rw-r--r--english/lts/security/2019/dla-1808.wml20
-rw-r--r--english/lts/security/2019/dla-1809.data10
-rw-r--r--english/lts/security/2019/dla-1809.wml35
-rw-r--r--english/lts/security/2019/dla-1810.data10
-rw-r--r--english/lts/security/2019/dla-1810.wml21
-rw-r--r--english/lts/security/2019/dla-1811.data10
-rw-r--r--english/lts/security/2019/dla-1811.wml23
-rw-r--r--english/lts/security/2019/dla-1812.data10
-rw-r--r--english/lts/security/2019/dla-1812.wml19
-rw-r--r--english/lts/security/2019/dla-1813.data10
-rw-r--r--english/lts/security/2019/dla-1813.wml31
-rw-r--r--english/lts/security/2019/dla-1814.data9
-rw-r--r--english/lts/security/2019/dla-1814.wml27
-rw-r--r--english/lts/security/2019/dla-1815.data10
-rw-r--r--english/lts/security/2019/dla-1815.wml20
-rw-r--r--english/lts/security/2019/dla-1816.data10
-rw-r--r--english/lts/security/2019/dla-1816.wml35
-rw-r--r--english/lts/security/2019/dla-1817.data10
-rw-r--r--english/lts/security/2019/dla-1817.wml20
-rw-r--r--english/lts/security/2019/dla-1818.data10
-rw-r--r--english/lts/security/2019/dla-1818.wml22
-rw-r--r--english/lts/security/2019/dla-1819.data9
-rw-r--r--english/lts/security/2019/dla-1819.wml26
-rw-r--r--english/lts/security/2019/dla-1820.data10
-rw-r--r--english/lts/security/2019/dla-1820.wml18
-rw-r--r--english/lts/security/2019/dla-1821.data10
-rw-r--r--english/lts/security/2019/dla-1821.wml20
-rw-r--r--english/lts/security/2019/dla-1822.data10
-rw-r--r--english/lts/security/2019/dla-1822.wml20
-rw-r--r--english/lts/security/2019/dla-1823.data10
-rw-r--r--english/lts/security/2019/dla-1823.wml85
-rw-r--r--english/lts/security/2019/dla-1824.data10
-rw-r--r--english/lts/security/2019/dla-1824.wml107
-rw-r--r--english/lts/security/2019/dla-1825.data10
-rw-r--r--english/lts/security/2019/dla-1825.wml26
-rw-r--r--english/lts/security/2019/dla-1826.data10
-rw-r--r--english/lts/security/2019/dla-1826.wml19
-rw-r--r--english/lts/security/2019/dla-1827.data10
-rw-r--r--english/lts/security/2019/dla-1827.wml24
-rw-r--r--english/lts/security/2019/dla-1828.data10
-rw-r--r--english/lts/security/2019/dla-1828.wml20
-rw-r--r--english/lts/security/2019/dla-1829.data10
-rw-r--r--english/lts/security/2019/dla-1829.wml19
-rw-r--r--english/lts/security/2019/dla-1830.data10
-rw-r--r--english/lts/security/2019/dla-1830.wml20
-rw-r--r--english/lts/security/2019/dla-1831.data10
-rw-r--r--english/lts/security/2019/dla-1831.wml22
-rw-r--r--english/lts/security/2019/dla-1832.data9
-rw-r--r--english/lts/security/2019/dla-1832.wml38
-rw-r--r--english/lts/security/2019/dla-1833-2.data10
-rw-r--r--english/lts/security/2019/dla-1833-2.wml22
-rw-r--r--english/lts/security/2019/dla-1833.data10
-rw-r--r--english/lts/security/2019/dla-1833.wml22
-rw-r--r--english/lts/security/2019/dla-1834.data10
-rw-r--r--english/lts/security/2019/dla-1834.wml80
-rw-r--r--english/lts/security/2019/dla-1835-2.data10
-rw-r--r--english/lts/security/2019/dla-1835-2.wml20
-rw-r--r--english/lts/security/2019/dla-1835.data10
-rw-r--r--english/lts/security/2019/dla-1835.wml57
-rw-r--r--english/lts/security/2019/dla-1836.data10
-rw-r--r--english/lts/security/2019/dla-1836.wml18
-rw-r--r--english/lts/security/2019/dla-1837-2.data10
-rw-r--r--english/lts/security/2019/dla-1837-2.wml24
-rw-r--r--english/lts/security/2019/dla-1837.data10
-rw-r--r--english/lts/security/2019/dla-1837.wml25
-rw-r--r--english/lts/security/2019/dla-1838.data10
-rw-r--r--english/lts/security/2019/dla-1838.wml42
-rw-r--r--english/lts/security/2019/dla-1839.data10
-rw-r--r--english/lts/security/2019/dla-1839.wml19
-rw-r--r--english/lts/security/2019/dla-1840.data10
-rw-r--r--english/lts/security/2019/dla-1840.wml25
-rw-r--r--english/lts/security/2019/dla-1841.data10
-rw-r--r--english/lts/security/2019/dla-1841.wml22
-rw-r--r--english/lts/security/2019/dla-1842.data9
-rw-r--r--english/lts/security/2019/dla-1842.wml26
-rw-r--r--english/lts/security/2019/dla-1843.data10
-rw-r--r--english/lts/security/2019/dla-1843.wml45
-rw-r--r--english/lts/security/2019/dla-1844.data9
-rw-r--r--english/lts/security/2019/dla-1844.wml29
-rw-r--r--english/lts/security/2019/dla-1845.data10
-rw-r--r--english/lts/security/2019/dla-1845.wml32
-rw-r--r--english/lts/security/2019/dla-1846-2.data10
-rw-r--r--english/lts/security/2019/dla-1846-2.wml24
-rw-r--r--english/lts/security/2019/dla-1846.data10
-rw-r--r--english/lts/security/2019/dla-1846.wml23
-rw-r--r--english/lts/security/2019/dla-1847.data9
-rw-r--r--english/lts/security/2019/dla-1847.wml26
-rw-r--r--english/lts/security/2019/dla-1848.data10
-rw-r--r--english/lts/security/2019/dla-1848.wml18
-rw-r--r--english/lts/security/2019/dla-1849.data10
-rw-r--r--english/lts/security/2019/dla-1849.wml24
-rw-r--r--english/lts/security/2019/dla-1850.data9
-rw-r--r--english/lts/security/2019/dla-1850.wml28
-rw-r--r--english/lts/security/2019/dla-1851.data10
-rw-r--r--english/lts/security/2019/dla-1851.wml33
-rw-r--r--english/lts/security/2019/dla-1852.data10
-rw-r--r--english/lts/security/2019/dla-1852.wml29
-rw-r--r--english/lts/security/2019/dla-1853.data10
-rw-r--r--english/lts/security/2019/dla-1853.wml53
-rw-r--r--english/lts/security/2019/dla-1854.data10
-rw-r--r--english/lts/security/2019/dla-1854.wml22
-rw-r--r--english/lts/security/2019/dla-1855.data9
-rw-r--r--english/lts/security/2019/dla-1855.wml30
-rw-r--r--english/lts/security/2019/dla-1856.data10
-rw-r--r--english/lts/security/2019/dla-1856.wml20
-rw-r--r--english/lts/security/2019/dla-1857.data10
-rw-r--r--english/lts/security/2019/dla-1857.wml41
-rw-r--r--english/lts/security/2019/dla-1858.data10
-rw-r--r--english/lts/security/2019/dla-1858.wml51
-rw-r--r--english/lts/security/2019/dla-1859.data10
-rw-r--r--english/lts/security/2019/dla-1859.wml22
-rw-r--r--english/lts/security/2019/dla-1860.data10
-rw-r--r--english/lts/security/2019/dla-1860.wml50
-rw-r--r--english/lts/security/2019/dla-1861.data10
-rw-r--r--english/lts/security/2019/dla-1861.wml54
-rw-r--r--english/lts/security/2019/dla-1862.data10
-rw-r--r--english/lts/security/2019/dla-1862.wml55
-rw-r--r--english/lts/security/2019/dla-1863.data10
-rw-r--r--english/lts/security/2019/dla-1863.wml20
-rw-r--r--english/lts/security/2019/dla-1864.data10
-rw-r--r--english/lts/security/2019/dla-1864.wml21
-rw-r--r--english/lts/security/2019/dla-1865.data10
-rw-r--r--english/lts/security/2019/dla-1865.wml59
-rw-r--r--english/lts/security/2019/dla-1866-2.data10
-rw-r--r--english/lts/security/2019/dla-1866-2.wml19
-rw-r--r--english/lts/security/2019/dla-1866.data10
-rw-r--r--english/lts/security/2019/dla-1866.wml46
-rw-r--r--english/lts/security/2019/dla-1867.data10
-rw-r--r--english/lts/security/2019/dla-1867.wml79
-rw-r--r--english/lts/security/2019/dla-1868.data10
-rw-r--r--english/lts/security/2019/dla-1868.wml22
-rw-r--r--english/lts/security/2019/dla-1869.data10
-rw-r--r--english/lts/security/2019/dla-1869.wml20
-rw-r--r--english/lts/security/2019/dla-1870.data10
-rw-r--r--english/lts/security/2019/dla-1870.wml20
-rw-r--r--english/lts/security/2019/dla-1871.data10
-rw-r--r--english/lts/security/2019/dla-1871.wml41
-rw-r--r--english/lts/security/2019/dla-1872.data9
-rw-r--r--english/lts/security/2019/dla-1872.wml55
-rw-r--r--english/lts/security/2019/dla-1873.data10
-rw-r--r--english/lts/security/2019/dla-1873.wml19
-rw-r--r--english/lts/security/2019/dla-1874.data10
-rw-r--r--english/lts/security/2019/dla-1874.wml37
-rw-r--r--english/lts/security/2019/dla-1875.data10
-rw-r--r--english/lts/security/2019/dla-1875.wml26
-rw-r--r--english/lts/security/2019/dla-1876.data10
-rw-r--r--english/lts/security/2019/dla-1876.wml24
-rw-r--r--english/lts/security/2019/dla-1877.data10
-rw-r--r--english/lts/security/2019/dla-1877.wml48
-rw-r--r--english/lts/security/2019/dla-1878.data10
-rw-r--r--english/lts/security/2019/dla-1878.wml18
-rw-r--r--english/lts/security/2019/dla-1879.data10
-rw-r--r--english/lts/security/2019/dla-1879.wml21
-rw-r--r--english/lts/security/2019/dla-1880.data10
-rw-r--r--english/lts/security/2019/dla-1880.wml20
-rw-r--r--english/lts/security/2019/dla-1881.data10
-rw-r--r--english/lts/security/2019/dla-1881.wml39
-rw-r--r--english/lts/security/2019/dla-1882.data10
-rw-r--r--english/lts/security/2019/dla-1882.wml39
-rw-r--r--english/lts/security/2019/dla-1883.data10
-rw-r--r--english/lts/security/2019/dla-1883.wml50
-rw-r--r--english/lts/security/2019/dla-1884.data10
-rw-r--r--english/lts/security/2019/dla-1884.wml111
-rw-r--r--english/lts/security/2019/dla-1885.data10
-rw-r--r--english/lts/security/2019/dla-1885.wml144
-rw-r--r--english/lts/security/2019/dla-1886-2.data10
-rw-r--r--english/lts/security/2019/dla-1886-2.wml30
-rw-r--r--english/lts/security/2019/dla-1886.data10
-rw-r--r--english/lts/security/2019/dla-1886.wml20
-rw-r--r--english/lts/security/2019/dla-1887.data10
-rw-r--r--english/lts/security/2019/dla-1887.wml20
-rw-r--r--english/lts/security/2019/dla-1888.data10
-rw-r--r--english/lts/security/2019/dla-1888.wml50
-rw-r--r--english/lts/security/2019/dla-1889.data10
-rw-r--r--english/lts/security/2019/dla-1889.wml22
-rw-r--r--english/lts/security/2019/dla-1890.data10
-rw-r--r--english/lts/security/2019/dla-1890.wml23
-rw-r--r--english/lts/security/2019/dla-1891.data10
-rw-r--r--english/lts/security/2019/dla-1891.wml45
-rw-r--r--english/lts/security/2019/dla-1892.data10
-rw-r--r--english/lts/security/2019/dla-1892.wml18
-rw-r--r--english/lts/security/2019/dla-1893.data10
-rw-r--r--english/lts/security/2019/dla-1893.wml23
-rw-r--r--english/lts/security/2019/dla-1894.data10
-rw-r--r--english/lts/security/2019/dla-1894.wml23
-rw-r--r--english/lts/security/2019/dla-1895.data10
-rw-r--r--english/lts/security/2019/dla-1895.wml22
-rw-r--r--english/lts/security/2019/dla-1896.data9
-rw-r--r--english/lts/security/2019/dla-1896.wml28
-rw-r--r--english/lts/security/2019/dla-1897.data10
-rw-r--r--english/lts/security/2019/dla-1897.wml22
-rw-r--r--english/lts/security/2019/dla-1898.data10
-rw-r--r--english/lts/security/2019/dla-1898.wml20
-rw-r--r--english/lts/security/2019/dla-1899.data10
-rw-r--r--english/lts/security/2019/dla-1899.wml53
-rw-r--r--english/lts/security/2019/dla-1900-2.data10
-rw-r--r--english/lts/security/2019/dla-1900-2.wml23
-rw-r--r--english/lts/security/2019/dla-1900.data10
-rw-r--r--english/lts/security/2019/dla-1900.wml31
-rw-r--r--english/lts/security/2019/dla-1901.data10
-rw-r--r--english/lts/security/2019/dla-1901.wml22
-rw-r--r--english/lts/security/2019/dla-1902.data10
-rw-r--r--english/lts/security/2019/dla-1902.wml23
-rw-r--r--english/lts/security/2019/dla-1903.data10
-rw-r--r--english/lts/security/2019/dla-1903.wml37
-rw-r--r--english/lts/security/2019/dla-1904.data10
-rw-r--r--english/lts/security/2019/dla-1904.wml24
-rw-r--r--english/lts/security/2019/dla-1905.data10
-rw-r--r--english/lts/security/2019/dla-1905.wml21
-rw-r--r--english/lts/security/2019/dla-1906.data10
-rw-r--r--english/lts/security/2019/dla-1906.wml21
-rw-r--r--english/lts/security/2019/dla-1907.data10
-rw-r--r--english/lts/security/2019/dla-1907.wml54
-rw-r--r--english/lts/security/2019/dla-1908.data9
-rw-r--r--english/lts/security/2019/dla-1908.wml24
-rw-r--r--english/lts/security/2019/dla-1909.data10
-rw-r--r--english/lts/security/2019/dla-1909.wml39
-rw-r--r--english/lts/security/2019/dla-1910.data10
-rw-r--r--english/lts/security/2019/dla-1910.wml20
-rw-r--r--english/lts/security/2019/dla-1911.data10
-rw-r--r--english/lts/security/2019/dla-1911.wml21
-rw-r--r--english/lts/security/2019/dla-1912.data9
-rw-r--r--english/lts/security/2019/dla-1912.wml31
-rw-r--r--english/lts/security/2019/dla-1913.data9
-rw-r--r--english/lts/security/2019/dla-1913.wml28
-rw-r--r--english/lts/security/2019/dla-1914.data10
-rw-r--r--english/lts/security/2019/dla-1914.wml45
-rw-r--r--english/lts/security/2019/dla-1915.data10
-rw-r--r--english/lts/security/2019/dla-1915.wml20
-rw-r--r--english/lts/security/2019/dla-1916.data10
-rw-r--r--english/lts/security/2019/dla-1916.wml23
-rw-r--r--english/lts/security/2019/dla-1917.data9
-rw-r--r--english/lts/security/2019/dla-1917.wml28
-rw-r--r--english/lts/security/2019/dla-1918.data10
-rw-r--r--english/lts/security/2019/dla-1918.wml20
-rw-r--r--english/lts/security/2019/dla-1919-2.data10
-rw-r--r--english/lts/security/2019/dla-1919-2.wml160
-rw-r--r--english/lts/security/2019/dla-1919.data10
-rw-r--r--english/lts/security/2019/dla-1919.wml154
-rw-r--r--english/lts/security/2019/dla-1920.data10
-rw-r--r--english/lts/security/2019/dla-1920.wml20
-rw-r--r--english/lts/security/2019/dla-1921.data10
-rw-r--r--english/lts/security/2019/dla-1921.wml21
-rw-r--r--english/lts/security/2019/dla-1922.data10
-rw-r--r--english/lts/security/2019/dla-1922.wml24
-rw-r--r--english/lts/security/2019/dla-1923.data10
-rw-r--r--english/lts/security/2019/dla-1923.wml48
-rw-r--r--english/lts/security/2019/dla-1924.data10
-rw-r--r--english/lts/security/2019/dla-1924.wml31
-rw-r--r--english/lts/security/2019/dla-1925.data10
-rw-r--r--english/lts/security/2019/dla-1925.wml31
-rw-r--r--english/lts/security/2019/dla-1926.data10
-rw-r--r--english/lts/security/2019/dla-1926.wml20
-rw-r--r--english/lts/security/2019/dla-1927.data10
-rw-r--r--english/lts/security/2019/dla-1927.wml71
-rw-r--r--english/lts/security/2019/dla-1928.data10
-rw-r--r--english/lts/security/2019/dla-1928.wml24
-rw-r--r--english/lts/security/2019/dla-1929.data10
-rw-r--r--english/lts/security/2019/dla-1929.wml21
-rw-r--r--english/lts/security/2019/dla-1930.data10
-rw-r--r--english/lts/security/2019/dla-1930.wml179
-rw-r--r--english/lts/security/2019/dla-1931.data9
-rw-r--r--english/lts/security/2019/dla-1931.wml26
-rw-r--r--english/lts/security/2019/dla-1932.data10
-rw-r--r--english/lts/security/2019/dla-1932.wml51
-rw-r--r--english/lts/security/2019/dla-1933.data10
-rw-r--r--english/lts/security/2019/dla-1933.wml18
-rw-r--r--english/lts/security/2019/dla-1934.data10
-rw-r--r--english/lts/security/2019/dla-1934.wml33
-rw-r--r--english/lts/security/2019/dla-1935.data10
-rw-r--r--english/lts/security/2019/dla-1935.wml22
-rw-r--r--english/lts/security/2019/dla-1936.data10
-rw-r--r--english/lts/security/2019/dla-1936.wml23
-rw-r--r--english/lts/security/2019/dla-1937.data10
-rw-r--r--english/lts/security/2019/dla-1937.wml23
-rw-r--r--english/lts/security/2019/dla-1938.data10
-rw-r--r--english/lts/security/2019/dla-1938.wml20
-rw-r--r--english/lts/security/2019/dla-1939.data10
-rw-r--r--english/lts/security/2019/dla-1939.wml38
-rw-r--r--english/lts/security/2019/dla-1940.data10
-rw-r--r--english/lts/security/2019/dla-1940.wml63
-rw-r--r--english/lts/security/2019/dla-1941.data10
-rw-r--r--english/lts/security/2019/dla-1941.wml20
-rw-r--r--english/lts/security/2019/dla-1942-2.data10
-rw-r--r--english/lts/security/2019/dla-1942-2.wml44
-rw-r--r--english/lts/security/2019/dla-1942.data10
-rw-r--r--english/lts/security/2019/dla-1942.wml34
-rw-r--r--english/lts/security/2019/dla-1943.data10
-rw-r--r--english/lts/security/2019/dla-1943.wml23
-rw-r--r--english/lts/security/2019/dla-1944.data9
-rw-r--r--english/lts/security/2019/dla-1944.wml27
-rw-r--r--english/lts/security/2019/dla-1945.data10
-rw-r--r--english/lts/security/2019/dla-1945.wml22
-rw-r--r--english/lts/security/2019/dla-1946.data10
-rw-r--r--english/lts/security/2019/dla-1946.wml20
-rw-r--r--english/lts/security/2019/dla-1947.data10
-rw-r--r--english/lts/security/2019/dla-1947.wml60
-rw-r--r--english/lts/security/2019/dla-1948.data10
-rw-r--r--english/lts/security/2019/dla-1948.wml21
-rw-r--r--english/lts/security/2019/dla-1949.data10
-rw-r--r--english/lts/security/2019/dla-1949.wml19
-rw-r--r--english/lts/security/2019/dla-1950.data10
-rw-r--r--english/lts/security/2019/dla-1950.wml23
-rw-r--r--english/lts/security/2019/dla-1951.data9
-rw-r--r--english/lts/security/2019/dla-1951.wml30
-rw-r--r--english/lts/security/2019/dla-1952.data9
-rw-r--r--english/lts/security/2019/dla-1952.wml57
-rw-r--r--english/lts/security/2019/dla-1953-2.data10
-rw-r--r--english/lts/security/2019/dla-1953-2.wml20
-rw-r--r--english/lts/security/2019/dla-1953.data10
-rw-r--r--english/lts/security/2019/dla-1953.wml38
-rw-r--r--english/lts/security/2019/dla-1954.data10
-rw-r--r--english/lts/security/2019/dla-1954.wml29
-rw-r--r--english/lts/security/2019/dla-1955.data10
-rw-r--r--english/lts/security/2019/dla-1955.wml20
-rw-r--r--english/lts/security/2019/dla-1956.data10
-rw-r--r--english/lts/security/2019/dla-1956.wml24
-rw-r--r--english/lts/security/2019/dla-1957.data9
-rw-r--r--english/lts/security/2019/dla-1957.wml24
-rw-r--r--english/lts/security/2019/dla-1958.data9
-rw-r--r--english/lts/security/2019/dla-1958.wml18
-rw-r--r--english/lts/security/2019/dla-1959.data9
-rw-r--r--english/lts/security/2019/dla-1959.wml41
-rw-r--r--english/lts/security/2019/dla-1960.data10
-rw-r--r--english/lts/security/2019/dla-1960.wml19
-rw-r--r--english/lts/security/2019/dla-1961.data10
-rw-r--r--english/lts/security/2019/dla-1961.wml39
-rw-r--r--english/lts/security/2019/dla-1962.data10
-rw-r--r--english/lts/security/2019/dla-1962.wml23
-rw-r--r--english/lts/security/2019/dla-1963-2.data10
-rw-r--r--english/lts/security/2019/dla-1963-2.wml19
-rw-r--r--english/lts/security/2019/dla-1963.data10
-rw-r--r--english/lts/security/2019/dla-1963.wml33
-rw-r--r--english/lts/security/2019/dla-1964.data10
-rw-r--r--english/lts/security/2019/dla-1964.wml26
-rw-r--r--english/lts/security/2019/dla-1965.data10
-rw-r--r--english/lts/security/2019/dla-1965.wml23
-rw-r--r--english/lts/security/2019/dla-1966.data10
-rw-r--r--english/lts/security/2019/dla-1966.wml19
-rw-r--r--english/lts/security/2019/dla-1967.data10
-rw-r--r--english/lts/security/2019/dla-1967.wml18
-rw-r--r--english/lts/security/2019/dla-1968.data10
-rw-r--r--english/lts/security/2019/dla-1968.wml47
-rw-r--r--english/lts/security/2019/dla-1969.data10
-rw-r--r--english/lts/security/2019/dla-1969.wml23
-rw-r--r--english/lts/security/2019/dla-1970.data10
-rw-r--r--english/lts/security/2019/dla-1970.wml24
-rw-r--r--english/lts/security/2019/dla-1971.data10
-rw-r--r--english/lts/security/2019/dla-1971.wml24
-rw-r--r--english/lts/security/2019/dla-1972.data10
-rw-r--r--english/lts/security/2019/dla-1972.wml46
-rw-r--r--english/lts/security/2019/dla-1973.data10
-rw-r--r--english/lts/security/2019/dla-1973.wml24
-rw-r--r--english/lts/security/2019/dla-1974.data10
-rw-r--r--english/lts/security/2019/dla-1974.wml24
-rw-r--r--english/lts/security/2019/dla-1975.data10
-rw-r--r--english/lts/security/2019/dla-1975.wml22
-rw-r--r--english/lts/security/2019/dla-1976.data10
-rw-r--r--english/lts/security/2019/dla-1976.wml19
-rw-r--r--english/lts/security/2019/dla-1977.data10
-rw-r--r--english/lts/security/2019/dla-1977.wml20
-rw-r--r--english/lts/security/2019/dla-1978.data10
-rw-r--r--english/lts/security/2019/dla-1978.wml20
-rw-r--r--english/lts/security/2019/dla-1979.data10
-rw-r--r--english/lts/security/2019/dla-1979.wml168
-rw-r--r--english/lts/security/2019/dla-1980.data10
-rw-r--r--english/lts/security/2019/dla-1980.wml45
-rw-r--r--english/lts/security/2019/dla-1981.data10
-rw-r--r--english/lts/security/2019/dla-1981.wml28
-rw-r--r--english/lts/security/2019/dla-1982.data10
-rw-r--r--english/lts/security/2019/dla-1982.wml39
-rw-r--r--english/lts/security/2019/dla-1983.data10
-rw-r--r--english/lts/security/2019/dla-1983.wml19
-rw-r--r--english/lts/security/2019/dla-1984.data10
-rw-r--r--english/lts/security/2019/dla-1984.wml19
-rw-r--r--english/lts/security/2019/dla-1985.data9
-rw-r--r--english/lts/security/2019/dla-1985.wml28
-rw-r--r--english/lts/security/2019/dla-1986.data10
-rw-r--r--english/lts/security/2019/dla-1986.wml21
-rw-r--r--english/lts/security/2019/dla-1987.data10
-rw-r--r--english/lts/security/2019/dla-1987.wml23
-rw-r--r--english/lts/security/2019/dla-1988.data10
-rw-r--r--english/lts/security/2019/dla-1988.wml40
-rw-r--r--english/lts/security/2019/dla-1989.data10
-rw-r--r--english/lts/security/2019/dla-1989.wml64
-rw-r--r--english/lts/security/2019/dla-1990.data10
-rw-r--r--english/lts/security/2019/dla-1990.wml99
-rw-r--r--english/lts/security/2019/dla-1991.data10
-rw-r--r--english/lts/security/2019/dla-1991.wml23
-rw-r--r--english/lts/security/2019/dla-1992.data10
-rw-r--r--english/lts/security/2019/dla-1992.wml21
-rw-r--r--english/lts/security/2019/dla-1993.data10
-rw-r--r--english/lts/security/2019/dla-1993.wml22
-rw-r--r--english/lts/security/2019/dla-1994.data10
-rw-r--r--english/lts/security/2019/dla-1994.wml26
-rw-r--r--english/lts/security/2019/dla-1995.data10
-rw-r--r--english/lts/security/2019/dla-1995.wml19
-rw-r--r--english/lts/security/2019/dla-1996.data10
-rw-r--r--english/lts/security/2019/dla-1996.wml23
-rw-r--r--english/lts/security/2019/dla-1997.data10
-rw-r--r--english/lts/security/2019/dla-1997.wml23
-rw-r--r--english/lts/security/2019/dla-1998.data9
-rw-r--r--english/lts/security/2019/dla-1998.wml31
-rw-r--r--english/lts/security/2019/dla-1999.data10
-rw-r--r--english/lts/security/2019/dla-1999.wml20
-rw-r--r--english/lts/security/2019/dla-2000.data10
-rw-r--r--english/lts/security/2019/dla-2000.wml20
-rw-r--r--english/lts/security/2019/dla-2001.data10
-rw-r--r--english/lts/security/2019/dla-2001.wml20
-rw-r--r--english/lts/security/2019/dla-2002.data10
-rw-r--r--english/lts/security/2019/dla-2002.wml22
-rw-r--r--english/lts/security/2019/dla-2003.data10
-rw-r--r--english/lts/security/2019/dla-2003.wml23
-rw-r--r--english/lts/security/2019/dla-2004.data10
-rw-r--r--english/lts/security/2019/dla-2004.wml22
-rw-r--r--english/lts/security/2019/dla-2005.data10
-rw-r--r--english/lts/security/2019/dla-2005.wml21
-rw-r--r--english/lts/security/2019/dla-2006.data10
-rw-r--r--english/lts/security/2019/dla-2006.wml22
-rw-r--r--english/lts/security/2019/dla-2007.data10
-rw-r--r--english/lts/security/2019/dla-2007.wml43
-rw-r--r--english/lts/security/2019/dla-2008.data10
-rw-r--r--english/lts/security/2019/dla-2008.wml20
-rw-r--r--english/lts/security/2019/dla-2009.data10
-rw-r--r--english/lts/security/2019/dla-2009.wml47
-rw-r--r--english/lts/security/2019/dla-2010.data10
-rw-r--r--english/lts/security/2019/dla-2010.wml24
-rw-r--r--english/lts/security/2019/dla-2011.data10
-rw-r--r--english/lts/security/2019/dla-2011.wml24
-rw-r--r--english/lts/security/2019/dla-2012.data10
-rw-r--r--english/lts/security/2019/dla-2012.wml36
-rw-r--r--english/lts/security/2019/dla-2013.data10
-rw-r--r--english/lts/security/2019/dla-2013.wml32
-rw-r--r--english/lts/security/2019/dla-2014.data10
-rw-r--r--english/lts/security/2019/dla-2014.wml55
-rw-r--r--english/lts/security/2019/dla-2015.data10
-rw-r--r--english/lts/security/2019/dla-2015.wml19
-rw-r--r--english/lts/security/2019/dla-2016.data10
-rw-r--r--english/lts/security/2019/dla-2016.wml53
-rw-r--r--english/lts/security/2019/dla-2017-2.data10
-rw-r--r--english/lts/security/2019/dla-2017-2.wml19
-rw-r--r--english/lts/security/2019/dla-2017.data10
-rw-r--r--english/lts/security/2019/dla-2017.wml36
-rw-r--r--english/lts/security/2019/dla-2018.data10
-rw-r--r--english/lts/security/2019/dla-2018.wml18
-rw-r--r--english/lts/security/2019/dla-2019.data10
-rw-r--r--english/lts/security/2019/dla-2019.wml19
-rw-r--r--english/lts/security/2019/dla-2020.data10
-rw-r--r--english/lts/security/2019/dla-2020.wml44
-rw-r--r--english/lts/security/2019/dla-2021.data10
-rw-r--r--english/lts/security/2019/dla-2021.wml53
-rw-r--r--english/lts/security/2019/dla-2022.data9
-rw-r--r--english/lts/security/2019/dla-2022.wml26
-rw-r--r--english/lts/security/2019/dla-2023.data10
-rw-r--r--english/lts/security/2019/dla-2023.wml23
-rw-r--r--english/lts/security/2019/dla-2024.data10
-rw-r--r--english/lts/security/2019/dla-2024.wml19
-rw-r--r--english/lts/security/2019/dla-2025.data10
-rw-r--r--english/lts/security/2019/dla-2025.wml34
-rw-r--r--english/lts/security/2019/dla-2026.data10
-rw-r--r--english/lts/security/2019/dla-2026.wml19
-rw-r--r--english/lts/security/2019/dla-2027.data10
-rw-r--r--english/lts/security/2019/dla-2027.wml20
-rw-r--r--english/lts/security/2019/dla-2028.data10
-rw-r--r--english/lts/security/2019/dla-2028.wml60
-rw-r--r--english/lts/security/2019/dla-2029.data10
-rw-r--r--english/lts/security/2019/dla-2029.wml19
-rw-r--r--english/lts/security/2019/dla-2030.data10
-rw-r--r--english/lts/security/2019/dla-2030.wml20
-rw-r--r--english/lts/security/2019/dla-2031.data10
-rw-r--r--english/lts/security/2019/dla-2031.wml34
-rw-r--r--english/lts/security/2019/dla-2032.data9
-rw-r--r--english/lts/security/2019/dla-2032.wml25
-rw-r--r--english/lts/security/2019/dla-2033.data10
-rw-r--r--english/lts/security/2019/dla-2033.wml20
-rw-r--r--english/lts/security/2019/dla-2034.data10
-rw-r--r--english/lts/security/2019/dla-2034.wml19
-rw-r--r--english/lts/security/2019/dla-2035.data10
-rw-r--r--english/lts/security/2019/dla-2035.wml23
-rw-r--r--english/lts/security/2019/dla-2036.data10
-rw-r--r--english/lts/security/2019/dla-2036.wml18
-rw-r--r--english/lts/security/2019/dla-2037.data10
-rw-r--r--english/lts/security/2019/dla-2037.wml33
-rw-r--r--english/lts/security/2019/dla-2038-2.data10
-rw-r--r--english/lts/security/2019/dla-2038-2.wml20
-rw-r--r--english/lts/security/2019/dla-2038.data10
-rw-r--r--english/lts/security/2019/dla-2038.wml19
-rw-r--r--english/lts/security/2019/dla-2039.data10
-rw-r--r--english/lts/security/2019/dla-2039.wml33
-rw-r--r--english/lts/security/2019/dla-2040.data10
-rw-r--r--english/lts/security/2019/dla-2040.wml22
-rw-r--r--english/lts/security/2019/dla-2041.data10
-rw-r--r--english/lts/security/2019/dla-2041.wml26
-rw-r--r--english/lts/security/2019/dla-2042.data9
-rw-r--r--english/lts/security/2019/dla-2042.wml56
-rw-r--r--english/lts/security/2019/dla-2043-2.data9
-rw-r--r--english/lts/security/2019/dla-2043-2.wml20
-rw-r--r--english/lts/security/2019/dla-2043.data10
-rw-r--r--english/lts/security/2019/dla-2043.wml54
-rw-r--r--english/lts/security/2019/dla-2044.data10
-rw-r--r--english/lts/security/2019/dla-2044.wml21
-rw-r--r--english/lts/security/2019/dla-2045.data10
-rw-r--r--english/lts/security/2019/dla-2045.wml94
-rw-r--r--english/lts/security/2019/dla-2046.data10
-rw-r--r--english/lts/security/2019/dla-2046.wml19
-rw-r--r--english/lts/security/2019/dla-2047.data10
-rw-r--r--english/lts/security/2019/dla-2047.wml22
-rw-r--r--english/lts/security/2019/dla-2048.data9
-rw-r--r--english/lts/security/2019/dla-2048.wml27
-rw-r--r--english/lts/security/2019/dla-2049.data10
-rw-r--r--english/lts/security/2019/dla-2049.wml36
-rw-r--r--english/lts/security/2019/dla-2050.data10
-rw-r--r--english/lts/security/2019/dla-2050.wml22
-rw-r--r--english/lts/security/2019/dla-2051.data10
-rw-r--r--english/lts/security/2019/dla-2051.wml21
-rw-r--r--english/lts/security/2019/dla-2052.data10
-rw-r--r--english/lts/security/2019/dla-2052.wml22
-rw-r--r--english/lts/security/2019/dla-2054.data10
-rw-r--r--english/lts/security/2019/dla-2054.wml34
-rw-r--r--english/lts/security/2019/dla-2055.data10
-rw-r--r--english/lts/security/2019/dla-2055.wml22
-rw-r--r--english/lts/security/2019/index.wml11
-rw-r--r--english/lts/security/2020/Makefile42
-rw-r--r--english/lts/security/2020/dla-1931-2.data9
-rw-r--r--english/lts/security/2020/dla-1931-2.wml30
-rw-r--r--english/lts/security/2020/dla-2053.data10
-rw-r--r--english/lts/security/2020/dla-2053.wml18
-rw-r--r--english/lts/security/2020/dla-2056.data9
-rw-r--r--english/lts/security/2020/dla-2056.wml38
-rw-r--r--english/lts/security/2020/dla-2057.data9
-rw-r--r--english/lts/security/2020/dla-2057.wml42
-rw-r--r--english/lts/security/2020/dla-2058.data10
-rw-r--r--english/lts/security/2020/dla-2058.wml19
-rw-r--r--english/lts/security/2020/dla-2059.data10
-rw-r--r--english/lts/security/2020/dla-2059.wml39
-rw-r--r--english/lts/security/2020/dla-2060.data10
-rw-r--r--english/lts/security/2020/dla-2060.wml21
-rw-r--r--english/lts/security/2020/dla-2061.data10
-rw-r--r--english/lts/security/2020/dla-2061.wml19
-rw-r--r--english/lts/security/2020/dla-2062.data10
-rw-r--r--english/lts/security/2020/dla-2062.wml23
-rw-r--r--english/lts/security/2020/dla-2063.data10
-rw-r--r--english/lts/security/2020/dla-2063.wml19
-rw-r--r--english/lts/security/2020/dla-2064.data9
-rw-r--r--english/lts/security/2020/dla-2064.wml31
-rw-r--r--english/lts/security/2020/dla-2065.data10
-rw-r--r--english/lts/security/2020/dla-2065.wml21
-rw-r--r--english/lts/security/2020/dla-2066.data10
-rw-r--r--english/lts/security/2020/dla-2066.wml21
-rw-r--r--english/lts/security/2020/dla-2067.data10
-rw-r--r--english/lts/security/2020/dla-2067.wml20
-rw-r--r--english/lts/security/2020/dla-2068.data10
-rw-r--r--english/lts/security/2020/dla-2068.wml267
-rw-r--r--english/lts/security/2020/dla-2069.data9
-rw-r--r--english/lts/security/2020/dla-2069.wml32
-rw-r--r--english/lts/security/2020/dla-2070.data10
-rw-r--r--english/lts/security/2020/dla-2070.wml21
-rw-r--r--english/lts/security/2020/dla-2071.data10
-rw-r--r--english/lts/security/2020/dla-2071.wml19
-rw-r--r--english/lts/security/2020/dla-2072.data10
-rw-r--r--english/lts/security/2020/dla-2072.wml75
-rw-r--r--english/lts/security/2020/dla-2073.data10
-rw-r--r--english/lts/security/2020/dla-2073.wml38
-rw-r--r--english/lts/security/2020/dla-2074.data10
-rw-r--r--english/lts/security/2020/dla-2074.wml33
-rw-r--r--english/lts/security/2020/dla-2075.data10
-rw-r--r--english/lts/security/2020/dla-2075.wml21
-rw-r--r--english/lts/security/2020/dla-2076.data10
-rw-r--r--english/lts/security/2020/dla-2076.wml23
-rw-r--r--english/lts/security/2020/dla-2077.data10
-rw-r--r--english/lts/security/2020/dla-2077.wml40
-rw-r--r--english/lts/security/2020/dla-2078.data10
-rw-r--r--english/lts/security/2020/dla-2078.wml24
-rw-r--r--english/lts/security/2020/dla-2079.data10
-rw-r--r--english/lts/security/2020/dla-2079.wml42
-rw-r--r--english/lts/security/2020/dla-2080.data10
-rw-r--r--english/lts/security/2020/dla-2080.wml24
-rw-r--r--english/lts/security/2020/dla-2081.data10
-rw-r--r--english/lts/security/2020/dla-2081.wml19
-rw-r--r--english/lts/security/2020/dla-2082.data10
-rw-r--r--english/lts/security/2020/dla-2082.wml22
-rw-r--r--english/lts/security/2020/dla-2083.data9
-rw-r--r--english/lts/security/2020/dla-2083.wml30
-rw-r--r--english/lts/security/2020/dla-2084.data10
-rw-r--r--english/lts/security/2020/dla-2084.wml22
-rw-r--r--english/lts/security/2020/dla-2085.data10
-rw-r--r--english/lts/security/2020/dla-2085.wml21
-rw-r--r--english/lts/security/2020/dla-2086.data10
-rw-r--r--english/lts/security/2020/dla-2086.wml21
-rw-r--r--english/lts/security/2020/dla-2087.data10
-rw-r--r--english/lts/security/2020/dla-2087.wml42
-rw-r--r--english/lts/security/2020/dla-2088.data10
-rw-r--r--english/lts/security/2020/dla-2088.wml20
-rw-r--r--english/lts/security/2020/dla-2089.data10
-rw-r--r--english/lts/security/2020/dla-2089.wml20
-rw-r--r--english/lts/security/2020/dla-2090.data10
-rw-r--r--english/lts/security/2020/dla-2090.wml21
-rw-r--r--english/lts/security/2020/dla-2091.data10
-rw-r--r--english/lts/security/2020/dla-2091.wml34
-rw-r--r--english/lts/security/2020/dla-2092.data10
-rw-r--r--english/lts/security/2020/dla-2092.wml20
-rw-r--r--english/lts/security/2020/dla-2093.data10
-rw-r--r--english/lts/security/2020/dla-2093.wml18
-rw-r--r--english/lts/security/2020/dla-2094.data10
-rw-r--r--english/lts/security/2020/dla-2094.wml22
-rw-r--r--english/lts/security/2020/dla-2095.data10
-rw-r--r--english/lts/security/2020/dla-2095.wml23
-rw-r--r--english/lts/security/2020/dla-2096.data10
-rw-r--r--english/lts/security/2020/dla-2096.wml19
-rw-r--r--english/lts/security/2020/dla-2097.data10
-rw-r--r--english/lts/security/2020/dla-2097.wml21
-rw-r--r--english/lts/security/2020/dla-2098.data10
-rw-r--r--english/lts/security/2020/dla-2098.wml20
-rw-r--r--english/lts/security/2020/dla-2099.data10
-rw-r--r--english/lts/security/2020/dla-2099.wml20
-rw-r--r--english/lts/security/2020/dla-2100.data10
-rw-r--r--english/lts/security/2020/dla-2100.wml20
-rw-r--r--english/lts/security/2020/dla-2101.data10
-rw-r--r--english/lts/security/2020/dla-2101.wml22
-rw-r--r--english/lts/security/2020/dla-2102.data10
-rw-r--r--english/lts/security/2020/dla-2102.wml19
-rw-r--r--english/lts/security/2020/dla-2103.data9
-rw-r--r--english/lts/security/2020/dla-2103.wml36
-rw-r--r--english/lts/security/2020/dla-2104.data10
-rw-r--r--english/lts/security/2020/dla-2104.wml18
-rw-r--r--english/lts/security/2020/dla-2105.data10
-rw-r--r--english/lts/security/2020/dla-2105.wml18
-rw-r--r--english/lts/security/2020/dla-2106.data10
-rw-r--r--english/lts/security/2020/dla-2106.wml21
-rw-r--r--english/lts/security/2020/dla-2107.data10
-rw-r--r--english/lts/security/2020/dla-2107.wml20
-rw-r--r--english/lts/security/2020/dla-2108.data10
-rw-r--r--english/lts/security/2020/dla-2108.wml19
-rw-r--r--english/lts/security/2020/dla-2109.data10
-rw-r--r--english/lts/security/2020/dla-2109.wml42
-rw-r--r--english/lts/security/2020/dla-2110.data10
-rw-r--r--english/lts/security/2020/dla-2110.wml60
-rw-r--r--english/lts/security/2020/dla-2111.data10
-rw-r--r--english/lts/security/2020/dla-2111.wml20
-rw-r--r--english/lts/security/2020/dla-2112.data10
-rw-r--r--english/lts/security/2020/dla-2112.wml19
-rw-r--r--english/lts/security/2020/dla-2113.data10
-rw-r--r--english/lts/security/2020/dla-2113.wml32
-rw-r--r--english/lts/security/2020/dla-2114.data10
-rw-r--r--english/lts/security/2020/dla-2114.wml371
-rw-r--r--english/lts/security/2020/dla-2115-2.data9
-rw-r--r--english/lts/security/2020/dla-2115-2.wml36
-rw-r--r--english/lts/security/2020/dla-2115.data9
-rw-r--r--english/lts/security/2020/dla-2115.wml34
-rw-r--r--english/lts/security/2020/dla-2116.data10
-rw-r--r--english/lts/security/2020/dla-2116.wml24
-rw-r--r--english/lts/security/2020/dla-2117.data10
-rw-r--r--english/lts/security/2020/dla-2117.wml20
-rw-r--r--english/lts/security/2020/dla-2118.data10
-rw-r--r--english/lts/security/2020/dla-2118.wml20
-rw-r--r--english/lts/security/2020/dla-2119.data10
-rw-r--r--english/lts/security/2020/dla-2119.wml19
-rw-r--r--english/lts/security/2020/dla-2120.data10
-rw-r--r--english/lts/security/2020/dla-2120.wml20
-rw-r--r--english/lts/security/2020/dla-2121.data10
-rw-r--r--english/lts/security/2020/dla-2121.wml19
-rw-r--r--english/lts/security/2020/dla-2122.data10
-rw-r--r--english/lts/security/2020/dla-2122.wml19
-rw-r--r--english/lts/security/2020/dla-2123.data10
-rw-r--r--english/lts/security/2020/dla-2123.wml20
-rw-r--r--english/lts/security/2020/dla-2124.data10
-rw-r--r--english/lts/security/2020/dla-2124.wml22
-rw-r--r--english/lts/security/2020/dla-2125.data10
-rw-r--r--english/lts/security/2020/dla-2125.wml21
-rw-r--r--english/lts/security/2020/dla-2126.data10
-rw-r--r--english/lts/security/2020/dla-2126.wml23
-rw-r--r--english/lts/security/2020/dla-2127.data10
-rw-r--r--english/lts/security/2020/dla-2127.wml20
-rw-r--r--english/lts/security/2020/dla-2128.data10
-rw-r--r--english/lts/security/2020/dla-2128.wml19
-rw-r--r--english/lts/security/2020/dla-2129.data10
-rw-r--r--english/lts/security/2020/dla-2129.wml23
-rw-r--r--english/lts/security/2020/dla-2130.data10
-rw-r--r--english/lts/security/2020/dla-2130.wml22
-rw-r--r--english/lts/security/2020/dla-2131-2.data10
-rw-r--r--english/lts/security/2020/dla-2131-2.wml24
-rw-r--r--english/lts/security/2020/dla-2131.data10
-rw-r--r--english/lts/security/2020/dla-2131.wml22
-rw-r--r--english/lts/security/2020/dla-2132.data9
-rw-r--r--english/lts/security/2020/dla-2132.wml30
-rw-r--r--english/lts/security/2020/dla-2133.data10
-rw-r--r--english/lts/security/2020/dla-2133.wml56
-rw-r--r--english/lts/security/2020/dla-2134.data9
-rw-r--r--english/lts/security/2020/dla-2134.wml29
-rw-r--r--english/lts/security/2020/dla-2135.data10
-rw-r--r--english/lts/security/2020/dla-2135.wml42
-rw-r--r--english/lts/security/2020/dla-2136.data9
-rw-r--r--english/lts/security/2020/dla-2136.wml25
-rw-r--r--english/lts/security/2020/dla-2137.data10
-rw-r--r--english/lts/security/2020/dla-2137.wml20
-rw-r--r--english/lts/security/2020/dla-2138.data10
-rw-r--r--english/lts/security/2020/dla-2138.wml21
-rw-r--r--english/lts/security/2020/dla-2139.data10
-rw-r--r--english/lts/security/2020/dla-2139.wml36
-rw-r--r--english/lts/security/2020/dla-2140.data10
-rw-r--r--english/lts/security/2020/dla-2140.wml19
-rw-r--r--english/lts/security/2020/dla-2141.data10
-rw-r--r--english/lts/security/2020/dla-2141.wml33
-rw-r--r--english/lts/security/2020/dla-2142.data9
-rw-r--r--english/lts/security/2020/dla-2142.wml30
-rw-r--r--english/lts/security/2020/dla-2143.data10
-rw-r--r--english/lts/security/2020/dla-2143.wml35
-rw-r--r--english/lts/security/2020/dla-2144.data10
-rw-r--r--english/lts/security/2020/dla-2144.wml19
-rw-r--r--english/lts/security/2020/dla-2145-2.data9
-rw-r--r--english/lts/security/2020/dla-2145-2.wml42
-rw-r--r--english/lts/security/2020/dla-2145.data9
-rw-r--r--english/lts/security/2020/dla-2145.wml42
-rw-r--r--english/lts/security/2020/dla-2146.data10
-rw-r--r--english/lts/security/2020/dla-2146.wml19
-rw-r--r--english/lts/security/2020/dla-2147.data10
-rw-r--r--english/lts/security/2020/dla-2147.wml20
-rw-r--r--english/lts/security/2020/dla-2148.data10
-rw-r--r--english/lts/security/2020/dla-2148.wml23
-rw-r--r--english/lts/security/2020/dla-2149.data10
-rw-r--r--english/lts/security/2020/dla-2149.wml22
-rw-r--r--english/lts/security/2020/dla-2150.data10
-rw-r--r--english/lts/security/2020/dla-2150.wml18
-rw-r--r--english/lts/security/2020/dla-2151.data10
-rw-r--r--english/lts/security/2020/dla-2151.wml19
-rw-r--r--english/lts/security/2020/dla-2152.data10
-rw-r--r--english/lts/security/2020/dla-2152.wml20
-rw-r--r--english/lts/security/2020/dla-2153.data10
-rw-r--r--english/lts/security/2020/dla-2153.wml35
-rw-r--r--english/lts/security/2020/dla-2154.data10
-rw-r--r--english/lts/security/2020/dla-2154.wml42
-rw-r--r--english/lts/security/2020/dla-2155.data10
-rw-r--r--english/lts/security/2020/dla-2155.wml23
-rw-r--r--english/lts/security/2020/dla-2156.data10
-rw-r--r--english/lts/security/2020/dla-2156.wml23
-rw-r--r--english/lts/security/2020/dla-2157.data10
-rw-r--r--english/lts/security/2020/dla-2157.wml23
-rw-r--r--english/lts/security/2020/dla-2158.data10
-rw-r--r--english/lts/security/2020/dla-2158.wml22
-rw-r--r--english/lts/security/2020/dla-2159.data10
-rw-r--r--english/lts/security/2020/dla-2159.wml20
-rw-r--r--english/lts/security/2020/dla-2160.data10
-rw-r--r--english/lts/security/2020/dla-2160.wml31
-rw-r--r--english/lts/security/2020/dla-2161.data10
-rw-r--r--english/lts/security/2020/dla-2161.wml31
-rw-r--r--english/lts/security/2020/dla-2162.data10
-rw-r--r--english/lts/security/2020/dla-2162.wml22
-rw-r--r--english/lts/security/2020/dla-2163.data10
-rw-r--r--english/lts/security/2020/dla-2163.wml40
-rw-r--r--english/lts/security/2020/dla-2164.data10
-rw-r--r--english/lts/security/2020/dla-2164.wml23
-rw-r--r--english/lts/security/2020/dla-2165.data10
-rw-r--r--english/lts/security/2020/dla-2165.wml23
-rw-r--r--english/lts/security/2020/dla-2166.data10
-rw-r--r--english/lts/security/2020/dla-2166.wml28
-rw-r--r--english/lts/security/2020/dla-2167.data10
-rw-r--r--english/lts/security/2020/dla-2167.wml21
-rw-r--r--english/lts/security/2020/dla-2168.data10
-rw-r--r--english/lts/security/2020/dla-2168.wml68
-rw-r--r--english/lts/security/2020/dla-2169.data10
-rw-r--r--english/lts/security/2020/dla-2169.wml39
-rw-r--r--english/lts/security/2020/dla-2170.data10
-rw-r--r--english/lts/security/2020/dla-2170.wml19
-rw-r--r--english/lts/security/2020/dla-2171.data9
-rw-r--r--english/lts/security/2020/dla-2171.wml27
-rw-r--r--english/lts/security/2020/dla-2172.data10
-rw-r--r--english/lts/security/2020/dla-2172.wml18
-rw-r--r--english/lts/security/2020/dla-2173.data10
-rw-r--r--english/lts/security/2020/dla-2173.wml21
-rw-r--r--english/lts/security/2020/dla-2174.data10
-rw-r--r--english/lts/security/2020/dla-2174.wml20
-rw-r--r--english/lts/security/2020/dla-2175.data10
-rw-r--r--english/lts/security/2020/dla-2175.wml21
-rw-r--r--english/lts/security/2020/dla-2176.data10
-rw-r--r--english/lts/security/2020/dla-2176.wml20
-rw-r--r--english/lts/security/2020/dla-2177.data10
-rw-r--r--english/lts/security/2020/dla-2177.wml21
-rw-r--r--english/lts/security/2020/dla-2178.data10
-rw-r--r--english/lts/security/2020/dla-2178.wml36
-rw-r--r--english/lts/security/2020/dla-2179.data10
-rw-r--r--english/lts/security/2020/dla-2179.wml67
-rw-r--r--english/lts/security/2020/dla-2180.data10
-rw-r--r--english/lts/security/2020/dla-2180.wml21
-rw-r--r--english/lts/security/2020/dla-2181.data9
-rw-r--r--english/lts/security/2020/dla-2181.wml28
-rw-r--r--english/lts/security/2020/dla-2182.data10
-rw-r--r--english/lts/security/2020/dla-2182.wml22
-rw-r--r--english/lts/security/2020/dla-2183.data10
-rw-r--r--english/lts/security/2020/dla-2183.wml24
-rw-r--r--english/lts/security/2020/dla-2184.data10
-rw-r--r--english/lts/security/2020/dla-2184.wml20
-rw-r--r--english/lts/security/2020/dla-2185.data10
-rw-r--r--english/lts/security/2020/dla-2185.wml23
-rw-r--r--english/lts/security/2020/dla-2186.data10
-rw-r--r--english/lts/security/2020/dla-2186.wml21
-rw-r--r--english/lts/security/2020/dla-2187.data10
-rw-r--r--english/lts/security/2020/dla-2187.wml21
-rw-r--r--english/lts/security/2020/dla-2188.data10
-rw-r--r--english/lts/security/2020/dla-2188.wml39
-rw-r--r--english/lts/security/2020/dla-2189.data10
-rw-r--r--english/lts/security/2020/dla-2189.wml21
-rw-r--r--english/lts/security/2020/dla-2190.data10
-rw-r--r--english/lts/security/2020/dla-2190.wml21
-rw-r--r--english/lts/security/2020/dla-2191.data10
-rw-r--r--english/lts/security/2020/dla-2191.wml20
-rw-r--r--english/lts/security/2020/dla-2192.data10
-rw-r--r--english/lts/security/2020/dla-2192.wml23
-rw-r--r--english/lts/security/2020/dla-2193.data10
-rw-r--r--english/lts/security/2020/dla-2193.wml20
-rw-r--r--english/lts/security/2020/dla-2194.data10
-rw-r--r--english/lts/security/2020/dla-2194.wml20
-rw-r--r--english/lts/security/2020/dla-2195.data10
-rw-r--r--english/lts/security/2020/dla-2195.wml37
-rw-r--r--english/lts/security/2020/dla-2196-2.data10
-rw-r--r--english/lts/security/2020/dla-2196-2.wml21
-rw-r--r--english/lts/security/2020/dla-2196.data10
-rw-r--r--english/lts/security/2020/dla-2196.wml25
-rw-r--r--english/lts/security/2020/dla-2197.data10
-rw-r--r--english/lts/security/2020/dla-2197.wml21
-rw-r--r--english/lts/security/2020/dla-2198.data10
-rw-r--r--english/lts/security/2020/dla-2198.wml40
-rw-r--r--english/lts/security/2020/dla-2199.data10
-rw-r--r--english/lts/security/2020/dla-2199.wml21
-rw-r--r--english/lts/security/2020/dla-2200.data10
-rw-r--r--english/lts/security/2020/dla-2200.wml24
-rw-r--r--english/lts/security/2020/dla-2201.data9
-rw-r--r--english/lts/security/2020/dla-2201.wml35
-rw-r--r--english/lts/security/2020/dla-2202.data10
-rw-r--r--english/lts/security/2020/dla-2202.wml61
-rw-r--r--english/lts/security/2020/dla-2203.data9
-rw-r--r--english/lts/security/2020/dla-2203.wml33
-rw-r--r--english/lts/security/2020/dla-2204.data9
-rw-r--r--english/lts/security/2020/dla-2204.wml29
-rw-r--r--english/lts/security/2020/dla-2205.data10
-rw-r--r--english/lts/security/2020/dla-2205.wml20
-rw-r--r--english/lts/security/2020/dla-2206.data10
-rw-r--r--english/lts/security/2020/dla-2206.wml20
-rw-r--r--english/lts/security/2020/dla-2207.data10
-rw-r--r--english/lts/security/2020/dla-2207.wml22
-rw-r--r--english/lts/security/2020/dla-2208.data10
-rw-r--r--english/lts/security/2020/dla-2208.wml45
-rw-r--r--english/lts/security/2020/dla-2209.data10
-rw-r--r--english/lts/security/2020/dla-2209.wml78
-rw-r--r--english/lts/security/2020/dla-2210.data10
-rw-r--r--english/lts/security/2020/dla-2210.wml22
-rw-r--r--english/lts/security/2020/dla-2211.data9
-rw-r--r--english/lts/security/2020/dla-2211.wml28
-rw-r--r--english/lts/security/2020/dla-2212.data10
-rw-r--r--english/lts/security/2020/dla-2212.wml20
-rw-r--r--english/lts/security/2020/dla-2213.data10
-rw-r--r--english/lts/security/2020/dla-2213.wml20
-rw-r--r--english/lts/security/2020/dla-2214.data10
-rw-r--r--english/lts/security/2020/dla-2214.wml56
-rw-r--r--english/lts/security/2020/dla-2215.data10
-rw-r--r--english/lts/security/2020/dla-2215.wml44
-rw-r--r--english/lts/security/2020/dla-2216.data10
-rw-r--r--english/lts/security/2020/dla-2216.wml24
-rw-r--r--english/lts/security/2020/dla-2217.data9
-rw-r--r--english/lts/security/2020/dla-2217.wml39
-rw-r--r--english/lts/security/2020/dla-2218.data10
-rw-r--r--english/lts/security/2020/dla-2218.wml21
-rw-r--r--english/lts/security/2020/dla-2219.data10
-rw-r--r--english/lts/security/2020/dla-2219.wml21
-rw-r--r--english/lts/security/2020/dla-2220.data10
-rw-r--r--english/lts/security/2020/dla-2220.wml21
-rw-r--r--english/lts/security/2020/dla-2221.data10
-rw-r--r--english/lts/security/2020/dla-2221.wml18
-rw-r--r--english/lts/security/2020/dla-2222.data10
-rw-r--r--english/lts/security/2020/dla-2222.wml45
-rw-r--r--english/lts/security/2020/dla-2223.data10
-rw-r--r--english/lts/security/2020/dla-2223.wml37
-rw-r--r--english/lts/security/2020/dla-2224.data10
-rw-r--r--english/lts/security/2020/dla-2224.wml21
-rw-r--r--english/lts/security/2020/dla-2225.data10
-rw-r--r--english/lts/security/2020/dla-2225.wml34
-rw-r--r--english/lts/security/2020/dla-2226.data10
-rw-r--r--english/lts/security/2020/dla-2226.wml21
-rw-r--r--english/lts/security/2020/dla-2227.data10
-rw-r--r--english/lts/security/2020/dla-2227.wml38
-rw-r--r--english/lts/security/2020/dla-2228-2.data10
-rw-r--r--english/lts/security/2020/dla-2228-2.wml23
-rw-r--r--english/lts/security/2020/dla-2228.data10
-rw-r--r--english/lts/security/2020/dla-2228.wml19
-rw-r--r--english/lts/security/2020/dla-2229.data10
-rw-r--r--english/lts/security/2020/dla-2229.wml22
-rw-r--r--english/lts/security/2020/dla-2230.data10
-rw-r--r--english/lts/security/2020/dla-2230.wml22
-rw-r--r--english/lts/security/2020/dla-2231.data10
-rw-r--r--english/lts/security/2020/dla-2231.wml18
-rw-r--r--english/lts/security/2020/dla-2232.data10
-rw-r--r--english/lts/security/2020/dla-2232.wml18
-rw-r--r--english/lts/security/2020/dla-2233-2.data9
-rw-r--r--english/lts/security/2020/dla-2233-2.wml37
-rw-r--r--english/lts/security/2020/dla-2233.data9
-rw-r--r--english/lts/security/2020/dla-2233.wml53
-rw-r--r--english/lts/security/2020/dla-2234.data10
-rw-r--r--english/lts/security/2020/dla-2234.wml59
-rw-r--r--english/lts/security/2020/dla-2235.data9
-rw-r--r--english/lts/security/2020/dla-2235.wml30
-rw-r--r--english/lts/security/2020/dla-2236.data10
-rw-r--r--english/lts/security/2020/dla-2236.wml20
-rw-r--r--english/lts/security/2020/dla-2237.data10
-rw-r--r--english/lts/security/2020/dla-2237.wml34
-rw-r--r--english/lts/security/2020/dla-2238.data10
-rw-r--r--english/lts/security/2020/dla-2238.wml18
-rw-r--r--english/lts/security/2020/dla-2239.data9
-rw-r--r--english/lts/security/2020/dla-2239.wml30
-rw-r--r--english/lts/security/2020/dla-2240.data10
-rw-r--r--english/lts/security/2020/dla-2240.wml34
-rw-r--r--english/lts/security/2020/dla-2241-2.data10
-rw-r--r--english/lts/security/2020/dla-2241-2.wml258
-rw-r--r--english/lts/security/2020/dla-2241.data10
-rw-r--r--english/lts/security/2020/dla-2241.wml255
-rw-r--r--english/lts/security/2020/dla-2242.data10
-rw-r--r--english/lts/security/2020/dla-2242.wml238
-rw-r--r--english/lts/security/2020/dla-2243.data10
-rw-r--r--english/lts/security/2020/dla-2243.wml22
-rw-r--r--english/lts/security/2020/dla-2244.data9
-rw-r--r--english/lts/security/2020/dla-2244.wml35
-rw-r--r--english/lts/security/2020/dla-2245.data10
-rw-r--r--english/lts/security/2020/dla-2245.wml21
-rw-r--r--english/lts/security/2020/dla-2246.data10
-rw-r--r--english/lts/security/2020/dla-2246.wml26
-rw-r--r--english/lts/security/2020/dla-2247.data10
-rw-r--r--english/lts/security/2020/dla-2247.wml22
-rw-r--r--english/lts/security/2020/dla-2248.data10
-rw-r--r--english/lts/security/2020/dla-2248.wml54
-rw-r--r--english/lts/security/2020/dla-2249.data10
-rw-r--r--english/lts/security/2020/dla-2249.wml37
-rw-r--r--english/lts/security/2020/dla-2250.data10
-rw-r--r--english/lts/security/2020/dla-2250.wml20
-rw-r--r--english/lts/security/2020/dla-2251.data10
-rw-r--r--english/lts/security/2020/dla-2251.wml52
-rw-r--r--english/lts/security/2020/dla-2252.data9
-rw-r--r--english/lts/security/2020/dla-2252.wml30
-rw-r--r--english/lts/security/2020/dla-2253.data9
-rw-r--r--english/lts/security/2020/dla-2253.wml32
-rw-r--r--english/lts/security/2020/dla-2254.data10
-rw-r--r--english/lts/security/2020/dla-2254.wml23
-rw-r--r--english/lts/security/2020/dla-2255.data10
-rw-r--r--english/lts/security/2020/dla-2255.wml21
-rw-r--r--english/lts/security/2020/dla-2256.data10
-rw-r--r--english/lts/security/2020/dla-2256.wml22
-rw-r--r--english/lts/security/2020/dla-2257.data10
-rw-r--r--english/lts/security/2020/dla-2257.wml22
-rw-r--r--english/lts/security/2020/dla-2258.data10
-rw-r--r--english/lts/security/2020/dla-2258.wml21
-rw-r--r--english/lts/security/2020/dla-2259.data10
-rw-r--r--english/lts/security/2020/dla-2259.wml20
-rw-r--r--english/lts/security/2020/dla-2260.data10
-rw-r--r--english/lts/security/2020/dla-2260.wml21
-rw-r--r--english/lts/security/2020/dla-2261.data10
-rw-r--r--english/lts/security/2020/dla-2261.wml29
-rw-r--r--english/lts/security/2020/dla-2262.data10
-rw-r--r--english/lts/security/2020/dla-2262.wml42
-rw-r--r--english/lts/security/2020/dla-2263.data10
-rw-r--r--english/lts/security/2020/dla-2263.wml21
-rw-r--r--english/lts/security/2020/dla-2264.data10
-rw-r--r--english/lts/security/2020/dla-2264.wml62
-rw-r--r--english/lts/security/2020/dla-2265.data10
-rw-r--r--english/lts/security/2020/dla-2265.wml19
-rw-r--r--english/lts/security/2020/dla-2266.data10
-rw-r--r--english/lts/security/2020/dla-2266.wml31
-rw-r--r--english/lts/security/2020/dla-2267.data10
-rw-r--r--english/lts/security/2020/dla-2267.wml20
-rw-r--r--english/lts/security/2020/dla-2268-2.data10
-rw-r--r--english/lts/security/2020/dla-2268-2.wml41
-rw-r--r--english/lts/security/2020/dla-2268.data10
-rw-r--r--english/lts/security/2020/dla-2268.wml34
-rw-r--r--english/lts/security/2020/dla-2269.data10
-rw-r--r--english/lts/security/2020/dla-2269.wml66
-rw-r--r--english/lts/security/2020/dla-2270.data10
-rw-r--r--english/lts/security/2020/dla-2270.wml53
-rw-r--r--english/lts/security/2020/dla-2271.data10
-rw-r--r--english/lts/security/2020/dla-2271.wml23
-rw-r--r--english/lts/security/2020/dla-2272.data9
-rw-r--r--english/lts/security/2020/dla-2272.wml47
-rw-r--r--english/lts/security/2020/dla-2273.data9
-rw-r--r--english/lts/security/2020/dla-2273.wml35
-rw-r--r--english/lts/security/2020/dla-2274.data9
-rw-r--r--english/lts/security/2020/dla-2274.wml28
-rw-r--r--english/lts/security/2020/dla-2275.data10
-rw-r--r--english/lts/security/2020/dla-2275.wml39
-rw-r--r--english/lts/security/2020/dla-2276.data10
-rw-r--r--english/lts/security/2020/dla-2276.wml35
-rw-r--r--english/lts/security/2020/dla-2277.data10
-rw-r--r--english/lts/security/2020/dla-2277.wml52
-rw-r--r--english/lts/security/2020/dla-2278-2.data10
-rw-r--r--english/lts/security/2020/dla-2278-2.wml27
-rw-r--r--english/lts/security/2020/dla-2278-3.data10
-rw-r--r--english/lts/security/2020/dla-2278-3.wml25
-rw-r--r--english/lts/security/2020/dla-2278.data10
-rw-r--r--english/lts/security/2020/dla-2278.wml25
-rw-r--r--english/lts/security/2020/dla-2279.data10
-rw-r--r--english/lts/security/2020/dla-2279.wml52
-rw-r--r--english/lts/security/2020/dla-2280.data10
-rw-r--r--english/lts/security/2020/dla-2280.wml142
-rw-r--r--english/lts/security/2020/dla-2281.data10
-rw-r--r--english/lts/security/2020/dla-2281.wml23
-rw-r--r--english/lts/security/2020/dla-2282.data10
-rw-r--r--english/lts/security/2020/dla-2282.wml47
-rw-r--r--english/lts/security/2020/dla-2283.data10
-rw-r--r--english/lts/security/2020/dla-2283.wml23
-rw-r--r--english/lts/security/2020/dla-2284.data10
-rw-r--r--english/lts/security/2020/dla-2284.wml28
-rw-r--r--english/lts/security/2020/dla-2285.data10
-rw-r--r--english/lts/security/2020/dla-2285.wml25
-rw-r--r--english/lts/security/2020/dla-2286.data10
-rw-r--r--english/lts/security/2020/dla-2286.wml40
-rw-r--r--english/lts/security/2020/dla-2287.data10
-rw-r--r--english/lts/security/2020/dla-2287.wml23
-rw-r--r--english/lts/security/2020/dla-2288.data10
-rw-r--r--english/lts/security/2020/dla-2288.wml104
-rw-r--r--english/lts/security/2020/dla-2289.data10
-rw-r--r--english/lts/security/2020/dla-2289.wml27
-rw-r--r--english/lts/security/2020/dla-2290.data10
-rw-r--r--english/lts/security/2020/dla-2290.wml27
-rw-r--r--english/lts/security/2020/dla-2291.data10
-rw-r--r--english/lts/security/2020/dla-2291.wml38
-rw-r--r--english/lts/security/2020/dla-2292.data10
-rw-r--r--english/lts/security/2020/dla-2292.wml42
-rw-r--r--english/lts/security/2020/dla-2293.data10
-rw-r--r--english/lts/security/2020/dla-2293.wml66
-rw-r--r--english/lts/security/2020/dla-2294.data10
-rw-r--r--english/lts/security/2020/dla-2294.wml28
-rw-r--r--english/lts/security/2020/dla-2295.data10
-rw-r--r--english/lts/security/2020/dla-2295.wml28
-rw-r--r--english/lts/security/2020/dla-2296.data10
-rw-r--r--english/lts/security/2020/dla-2296.wml26
-rw-r--r--english/lts/security/2020/dla-2297.data10
-rw-r--r--english/lts/security/2020/dla-2297.wml23
-rw-r--r--english/lts/security/2020/dla-2298.data10
-rw-r--r--english/lts/security/2020/dla-2298.wml48
-rw-r--r--english/lts/security/2020/dla-2299.data9
-rw-r--r--english/lts/security/2020/dla-2299.wml34
-rw-r--r--english/lts/security/2020/dla-2300.data9
-rw-r--r--english/lts/security/2020/dla-2300.wml29
-rw-r--r--english/lts/security/2020/dla-2301.data10
-rw-r--r--english/lts/security/2020/dla-2301.wml24
-rw-r--r--english/lts/security/2020/dla-2302.data10
-rw-r--r--english/lts/security/2020/dla-2302.wml45
-rw-r--r--english/lts/security/2020/dla-2303.data10
-rw-r--r--english/lts/security/2020/dla-2303.wml24
-rw-r--r--english/lts/security/2020/dla-2304.data10
-rw-r--r--english/lts/security/2020/dla-2304.wml27
-rw-r--r--english/lts/security/2020/dla-2305.data10
-rw-r--r--english/lts/security/2020/dla-2305.wml24
-rw-r--r--english/lts/security/2020/dla-2306.data10
-rw-r--r--english/lts/security/2020/dla-2306.wml27
-rw-r--r--english/lts/security/2020/dla-2307.data10
-rw-r--r--english/lts/security/2020/dla-2307.wml29
-rw-r--r--english/lts/security/2020/dla-2308.data10
-rw-r--r--english/lts/security/2020/dla-2308.wml25
-rw-r--r--english/lts/security/2020/dla-2309.data10
-rw-r--r--english/lts/security/2020/dla-2309.wml22
-rw-r--r--english/lts/security/2020/dla-2310.data10
-rw-r--r--english/lts/security/2020/dla-2310.wml23
-rw-r--r--english/lts/security/2020/dla-2311.data9
-rw-r--r--english/lts/security/2020/dla-2311.wml29
-rw-r--r--english/lts/security/2020/dla-2312.data10
-rw-r--r--english/lts/security/2020/dla-2312.wml23
-rw-r--r--english/lts/security/2020/dla-2313.data9
-rw-r--r--english/lts/security/2020/dla-2313.wml36
-rw-r--r--english/lts/security/2020/dla-2314.data10
-rw-r--r--english/lts/security/2020/dla-2314.wml44
-rw-r--r--english/lts/security/2020/dla-2315.data10
-rw-r--r--english/lts/security/2020/dla-2315.wml25
-rw-r--r--english/lts/security/2020/dla-2316.data10
-rw-r--r--english/lts/security/2020/dla-2316.wml21
-rw-r--r--english/lts/security/2020/dla-2317.data10
-rw-r--r--english/lts/security/2020/dla-2317.wml22
-rw-r--r--english/lts/security/2020/dla-2318.data10
-rw-r--r--english/lts/security/2020/dla-2318.wml41
-rw-r--r--english/lts/security/2020/dla-2319.data10
-rw-r--r--english/lts/security/2020/dla-2319.wml28
-rw-r--r--english/lts/security/2020/dla-2320.data10
-rw-r--r--english/lts/security/2020/dla-2320.wml21
-rw-r--r--english/lts/security/2020/dla-2321.data9
-rw-r--r--english/lts/security/2020/dla-2321.wml19
-rw-r--r--english/lts/security/2020/dla-2322.data10
-rw-r--r--english/lts/security/2020/dla-2322.wml23
-rw-r--r--english/lts/security/2020/dla-2323.data10
-rw-r--r--english/lts/security/2020/dla-2323.wml112
-rw-r--r--english/lts/security/2020/dla-2324.data9
-rw-r--r--english/lts/security/2020/dla-2324.wml40
-rw-r--r--english/lts/security/2020/dla-2325.data10
-rw-r--r--english/lts/security/2020/dla-2325.wml23
-rw-r--r--english/lts/security/2020/dla-2326.data10
-rw-r--r--english/lts/security/2020/dla-2326.wml21
-rw-r--r--english/lts/security/2020/dla-2327.data10
-rw-r--r--english/lts/security/2020/dla-2327.wml33
-rw-r--r--english/lts/security/2020/dla-2328.data10
-rw-r--r--english/lts/security/2020/dla-2328.wml41
-rw-r--r--english/lts/security/2020/dla-2329.data10
-rw-r--r--english/lts/security/2020/dla-2329.wml21
-rw-r--r--english/lts/security/2020/dla-2330.data10
-rw-r--r--english/lts/security/2020/dla-2330.wml65
-rw-r--r--english/lts/security/2020/dla-2331.data10
-rw-r--r--english/lts/security/2020/dla-2331.wml24
-rw-r--r--english/lts/security/2020/dla-2332-2.data10
-rw-r--r--english/lts/security/2020/dla-2332-2.wml23
-rw-r--r--english/lts/security/2020/dla-2332.data10
-rw-r--r--english/lts/security/2020/dla-2332.wml55
-rw-r--r--english/lts/security/2020/dla-2333.data10
-rw-r--r--english/lts/security/2020/dla-2333.wml25
-rw-r--r--english/lts/security/2020/dla-2334.data9
-rw-r--r--english/lts/security/2020/dla-2334.wml40
-rw-r--r--english/lts/security/2020/dla-2335.data10
-rw-r--r--english/lts/security/2020/dla-2335.wml23
-rw-r--r--english/lts/security/2020/dla-2336.data10
-rw-r--r--english/lts/security/2020/dla-2336.wml43
-rw-r--r--english/lts/security/2020/dla-2337.data10
-rw-r--r--english/lts/security/2020/dla-2337.wml95
-rw-r--r--english/lts/security/2020/dla-2338-2.data10
-rw-r--r--english/lts/security/2020/dla-2338-2.wml24
-rw-r--r--english/lts/security/2020/dla-2338.data10
-rw-r--r--english/lts/security/2020/dla-2338.wml26
-rw-r--r--english/lts/security/2020/dla-2339.data10
-rw-r--r--english/lts/security/2020/dla-2339.wml24
-rw-r--r--english/lts/security/2020/dla-2340-2.data10
-rw-r--r--english/lts/security/2020/dla-2340-2.wml23
-rw-r--r--english/lts/security/2020/dla-2340.data10
-rw-r--r--english/lts/security/2020/dla-2340.wml99
-rw-r--r--english/lts/security/2020/dla-2341.data10
-rw-r--r--english/lts/security/2020/dla-2341.wml23
-rw-r--r--english/lts/security/2020/dla-2342.data10
-rw-r--r--english/lts/security/2020/dla-2342.wml38
-rw-r--r--english/lts/security/2020/dla-2343.data10
-rw-r--r--english/lts/security/2020/dla-2343.wml23
-rw-r--r--english/lts/security/2020/dla-2344.data10
-rw-r--r--english/lts/security/2020/dla-2344.wml24
-rw-r--r--english/lts/security/2020/dla-2345.data10
-rw-r--r--english/lts/security/2020/dla-2345.wml23
-rw-r--r--english/lts/security/2020/dla-2346.data10
-rw-r--r--english/lts/security/2020/dla-2346.wml23
-rw-r--r--english/lts/security/2020/dla-2347.data10
-rw-r--r--english/lts/security/2020/dla-2347.wml71
-rw-r--r--english/lts/security/2020/dla-2348.data10
-rw-r--r--english/lts/security/2020/dla-2348.wml22
-rw-r--r--english/lts/security/2020/dla-2349.data10
-rw-r--r--english/lts/security/2020/dla-2349.wml22
-rw-r--r--english/lts/security/2020/dla-2350.data10
-rw-r--r--english/lts/security/2020/dla-2350.wml24
-rw-r--r--english/lts/security/2020/dla-2351.data10
-rw-r--r--english/lts/security/2020/dla-2351.wml22
-rw-r--r--english/lts/security/2020/dla-2352.data10
-rw-r--r--english/lts/security/2020/dla-2352.wml23
-rw-r--r--english/lts/security/2020/dla-2353.data10
-rw-r--r--english/lts/security/2020/dla-2353.wml25
-rw-r--r--english/lts/security/2020/dla-2354.data10
-rw-r--r--english/lts/security/2020/dla-2354.wml26
-rw-r--r--english/lts/security/2020/dla-2355.data10
-rw-r--r--english/lts/security/2020/dla-2355.wml38
-rw-r--r--english/lts/security/2020/dla-2356.data10
-rw-r--r--english/lts/security/2020/dla-2356.wml102
-rw-r--r--english/lts/security/2020/dla-2357.data10
-rw-r--r--english/lts/security/2020/dla-2357.wml21
-rw-r--r--english/lts/security/2020/dla-2358.data10
-rw-r--r--english/lts/security/2020/dla-2358.wml21
-rw-r--r--english/lts/security/2020/dla-2359.data10
-rw-r--r--english/lts/security/2020/dla-2359.wml26
-rw-r--r--english/lts/security/2020/dla-2360.data10
-rw-r--r--english/lts/security/2020/dla-2360.wml23
-rw-r--r--english/lts/security/2020/dla-2361.data10
-rw-r--r--english/lts/security/2020/dla-2361.wml23
-rw-r--r--english/lts/security/2020/dla-2362.data10
-rw-r--r--english/lts/security/2020/dla-2362.wml24
-rw-r--r--english/lts/security/2020/dla-2363.data10
-rw-r--r--english/lts/security/2020/dla-2363.wml24
-rw-r--r--english/lts/security/2020/dla-2364.data10
-rw-r--r--english/lts/security/2020/dla-2364.wml55
-rw-r--r--english/lts/security/2020/dla-2365.data10
-rw-r--r--english/lts/security/2020/dla-2365.wml45
-rw-r--r--english/lts/security/2020/dla-2366.data10
-rw-r--r--english/lts/security/2020/dla-2366.wml32
-rw-r--r--english/lts/security/2020/dla-2367.data10
-rw-r--r--english/lts/security/2020/dla-2367.wml26
-rw-r--r--english/lts/security/2020/dla-2368.data9
-rw-r--r--english/lts/security/2020/dla-2368.wml31
-rw-r--r--english/lts/security/2020/dla-2369.data10
-rw-r--r--english/lts/security/2020/dla-2369.wml70
-rw-r--r--english/lts/security/2020/dla-2370.data9
-rw-r--r--english/lts/security/2020/dla-2370.wml36
-rw-r--r--english/lts/security/2020/dla-2371.data10
-rw-r--r--english/lts/security/2020/dla-2371.wml61
-rw-r--r--english/lts/security/2020/dla-2372.data9
-rw-r--r--english/lts/security/2020/dla-2372.wml31
-rw-r--r--english/lts/security/2020/dla-2373.data10
-rw-r--r--english/lts/security/2020/dla-2373.wml59
-rw-r--r--english/lts/security/2020/dla-2374.data9
-rw-r--r--english/lts/security/2020/dla-2374.wml36
-rw-r--r--english/lts/security/2020/dla-2375.data10
-rw-r--r--english/lts/security/2020/dla-2375.wml39
-rw-r--r--english/lts/security/2020/dla-2376.data10
-rw-r--r--english/lts/security/2020/dla-2376.wml33
-rw-r--r--english/lts/security/2020/dla-2377.data10
-rw-r--r--english/lts/security/2020/dla-2377.wml56
-rw-r--r--english/lts/security/2020/dla-2378.data10
-rw-r--r--english/lts/security/2020/dla-2378.wml26
-rw-r--r--english/lts/security/2020/dla-2379-2.data10
-rw-r--r--english/lts/security/2020/dla-2379-2.wml24
-rw-r--r--english/lts/security/2020/dla-2379-3.data9
-rw-r--r--english/lts/security/2020/dla-2379-3.wml24
-rw-r--r--english/lts/security/2020/dla-2379.data10
-rw-r--r--english/lts/security/2020/dla-2379.wml25
-rw-r--r--english/lts/security/2020/dla-2380.data9
-rw-r--r--english/lts/security/2020/dla-2380.wml31
-rw-r--r--english/lts/security/2020/dla-2381.data10
-rw-r--r--english/lts/security/2020/dla-2381.wml24
-rw-r--r--english/lts/security/2020/dla-2382.data10
-rw-r--r--english/lts/security/2020/dla-2382.wml27
-rw-r--r--english/lts/security/2020/dla-2383.data10
-rw-r--r--english/lts/security/2020/dla-2383.wml26
-rw-r--r--english/lts/security/2020/dla-2384.data10
-rw-r--r--english/lts/security/2020/dla-2384.wml38
-rw-r--r--english/lts/security/2020/dla-2385.data10
-rw-r--r--english/lts/security/2020/dla-2385.wml155
-rw-r--r--english/lts/security/2020/dla-2386.data10
-rw-r--r--english/lts/security/2020/dla-2386.wml46
-rw-r--r--english/lts/security/2020/dla-2387-2.data9
-rw-r--r--english/lts/security/2020/dla-2387-2.wml22
-rw-r--r--english/lts/security/2020/dla-2387.data10
-rw-r--r--english/lts/security/2020/dla-2387.wml31
-rw-r--r--english/lts/security/2020/dla-2388.data10
-rw-r--r--english/lts/security/2020/dla-2388.wml80
-rw-r--r--english/lts/security/2020/dla-2389.data10
-rw-r--r--english/lts/security/2020/dla-2389.wml23
-rw-r--r--english/lts/security/2020/dla-2390.data10
-rw-r--r--english/lts/security/2020/dla-2390.wml25
-rw-r--r--english/lts/security/2020/dla-2391.data10
-rw-r--r--english/lts/security/2020/dla-2391.wml27
-rw-r--r--english/lts/security/2020/dla-2392.data10
-rw-r--r--english/lts/security/2020/dla-2392.wml27
-rw-r--r--english/lts/security/2020/dla-2393.data10
-rw-r--r--english/lts/security/2020/dla-2393.wml21
-rw-r--r--english/lts/security/2020/dla-2394.data10
-rw-r--r--english/lts/security/2020/dla-2394.wml59
-rw-r--r--english/lts/security/2020/dla-2395.data10
-rw-r--r--english/lts/security/2020/dla-2395.wml23
-rw-r--r--english/lts/security/2020/dla-2396.data10
-rw-r--r--english/lts/security/2020/dla-2396.wml25
-rw-r--r--english/lts/security/2020/dla-2397.data10
-rw-r--r--english/lts/security/2020/dla-2397.wml26
-rw-r--r--english/lts/security/2020/dla-2398.data10
-rw-r--r--english/lts/security/2020/dla-2398.wml43
-rw-r--r--english/lts/security/2020/dla-2399.data10
-rw-r--r--english/lts/security/2020/dla-2399.wml38
-rw-r--r--english/lts/security/2020/dla-2400.data10
-rw-r--r--english/lts/security/2020/dla-2400.wml27
-rw-r--r--english/lts/security/2020/dla-2401.data10
-rw-r--r--english/lts/security/2020/dla-2401.wml22
-rw-r--r--english/lts/security/2020/dla-2402.data10
-rw-r--r--english/lts/security/2020/dla-2402.wml50
-rw-r--r--english/lts/security/2020/dla-2403.data10
-rw-r--r--english/lts/security/2020/dla-2403.wml26
-rw-r--r--english/lts/security/2020/dla-2404.data10
-rw-r--r--english/lts/security/2020/dla-2404.wml25
-rw-r--r--english/lts/security/2020/dla-2405.data10
-rw-r--r--english/lts/security/2020/dla-2405.wml25
-rw-r--r--english/lts/security/2020/dla-2406.data9
-rw-r--r--english/lts/security/2020/dla-2406.wml23
-rw-r--r--english/lts/security/2020/dla-2407.data9
-rw-r--r--english/lts/security/2020/dla-2407.wml34
-rw-r--r--english/lts/security/2020/dla-2408.data10
-rw-r--r--english/lts/security/2020/dla-2408.wml32
-rw-r--r--english/lts/security/2020/dla-2409.data10
-rw-r--r--english/lts/security/2020/dla-2409.wml21
-rw-r--r--english/lts/security/2020/dla-2410.data9
-rw-r--r--english/lts/security/2020/dla-2410.wml30
-rw-r--r--english/lts/security/2020/dla-2411.data10
-rw-r--r--english/lts/security/2020/dla-2411.wml23
-rw-r--r--english/lts/security/2020/dla-2412-2.data9
-rw-r--r--english/lts/security/2020/dla-2412-2.wml22
-rw-r--r--english/lts/security/2020/dla-2412.data10
-rw-r--r--english/lts/security/2020/dla-2412.wml23
-rw-r--r--english/lts/security/2020/dla-2413.data10
-rw-r--r--english/lts/security/2020/dla-2413.wml46
-rw-r--r--english/lts/security/2020/dla-2414.data10
-rw-r--r--english/lts/security/2020/dla-2414.wml23
-rw-r--r--english/lts/security/2020/dla-2415.data10
-rw-r--r--english/lts/security/2020/dla-2415.wml25
-rw-r--r--english/lts/security/2020/dla-2416.data10
-rw-r--r--english/lts/security/2020/dla-2416.wml22
-rw-r--r--english/lts/security/2020/dla-2417.data10
-rw-r--r--english/lts/security/2020/dla-2417.wml63
-rw-r--r--english/lts/security/2020/dla-2418.data10
-rw-r--r--english/lts/security/2020/dla-2418.wml26
-rw-r--r--english/lts/security/2020/dla-2419.data10
-rw-r--r--english/lts/security/2020/dla-2419.wml25
-rw-r--r--english/lts/security/2020/dla-2420-2.data10
-rw-r--r--english/lts/security/2020/dla-2420-2.wml212
-rw-r--r--english/lts/security/2020/dla-2420.data10
-rw-r--r--english/lts/security/2020/dla-2420.wml209
-rw-r--r--english/lts/security/2020/dla-2421.data10
-rw-r--r--english/lts/security/2020/dla-2421.wml37
-rw-r--r--english/lts/security/2020/dla-2422.data10
-rw-r--r--english/lts/security/2020/dla-2422.wml23
-rw-r--r--english/lts/security/2020/dla-2423.data10
-rw-r--r--english/lts/security/2020/dla-2423.wml54
-rw-r--r--english/lts/security/2020/dla-2424.data9
-rw-r--r--english/lts/security/2020/dla-2424.wml18
-rw-r--r--english/lts/security/2020/dla-2425.data10
-rw-r--r--english/lts/security/2020/dla-2425.wml25
-rw-r--r--english/lts/security/2020/dla-2426.data10
-rw-r--r--english/lts/security/2020/dla-2426.wml21
-rw-r--r--english/lts/security/2020/dla-2427.data10
-rw-r--r--english/lts/security/2020/dla-2427.wml29
-rw-r--r--english/lts/security/2020/dla-2428.data10
-rw-r--r--english/lts/security/2020/dla-2428.wml28
-rw-r--r--english/lts/security/2020/dla-2429.data10
-rw-r--r--english/lts/security/2020/dla-2429.wml76
-rw-r--r--english/lts/security/2020/dla-2430.data10
-rw-r--r--english/lts/security/2020/dla-2430.wml23
-rw-r--r--english/lts/security/2020/dla-2431.data10
-rw-r--r--english/lts/security/2020/dla-2431.wml74
-rw-r--r--english/lts/security/2020/dla-2432.data10
-rw-r--r--english/lts/security/2020/dla-2432.wml42
-rw-r--r--english/lts/security/2020/dla-2433.data9
-rw-r--r--english/lts/security/2020/dla-2433.wml39
-rw-r--r--english/lts/security/2020/dla-2434.data9
-rw-r--r--english/lts/security/2020/dla-2434.wml28
-rw-r--r--english/lts/security/2020/dla-2435.data10
-rw-r--r--english/lts/security/2020/dla-2435.wml45
-rw-r--r--english/lts/security/2020/dla-2436.data9
-rw-r--r--english/lts/security/2020/dla-2436.wml34
-rw-r--r--english/lts/security/2020/dla-2437.data9
-rw-r--r--english/lts/security/2020/dla-2437.wml25
-rw-r--r--english/lts/security/2020/dla-2438.data9
-rw-r--r--english/lts/security/2020/dla-2438.wml31
-rw-r--r--english/lts/security/2020/dla-2439.data10
-rw-r--r--english/lts/security/2020/dla-2439.wml23
-rw-r--r--english/lts/security/2020/dla-2440.data10
-rw-r--r--english/lts/security/2020/dla-2440.wml23
-rw-r--r--english/lts/security/2020/dla-2441.data10
-rw-r--r--english/lts/security/2020/dla-2441.wml44
-rw-r--r--english/lts/security/2020/dla-2442.data10
-rw-r--r--english/lts/security/2020/dla-2442.wml37
-rw-r--r--english/lts/security/2020/dla-2443.data10
-rw-r--r--english/lts/security/2020/dla-2443.wml27
-rw-r--r--english/lts/security/2020/dla-2444.data10
-rw-r--r--english/lts/security/2020/dla-2444.wml26
-rw-r--r--english/lts/security/2020/dla-2445.data10
-rw-r--r--english/lts/security/2020/dla-2445.wml23
-rw-r--r--english/lts/security/2020/dla-2446.data10
-rw-r--r--english/lts/security/2020/dla-2446.wml37
-rw-r--r--english/lts/security/2020/dla-2447-2.data10
-rw-r--r--english/lts/security/2020/dla-2447-2.wml24
-rw-r--r--english/lts/security/2020/dla-2447.data10
-rw-r--r--english/lts/security/2020/dla-2447.wml23
-rw-r--r--english/lts/security/2020/dla-2448.data10
-rw-r--r--english/lts/security/2020/dla-2448.wml22
-rw-r--r--english/lts/security/2020/dla-2449.data10
-rw-r--r--english/lts/security/2020/dla-2449.wml22
-rw-r--r--english/lts/security/2020/dla-2450.data10
-rw-r--r--english/lts/security/2020/dla-2450.wml24
-rw-r--r--english/lts/security/2020/dla-2451.data10
-rw-r--r--english/lts/security/2020/dla-2451.wml26
-rw-r--r--english/lts/security/2020/dla-2452-2.data9
-rw-r--r--english/lts/security/2020/dla-2452-2.wml18
-rw-r--r--english/lts/security/2020/dla-2452.data9
-rw-r--r--english/lts/security/2020/dla-2452.wml18
-rw-r--r--english/lts/security/2020/dla-2453.data10
-rw-r--r--english/lts/security/2020/dla-2453.wml32
-rw-r--r--english/lts/security/2020/dla-2454.data10
-rw-r--r--english/lts/security/2020/dla-2454.wml37
-rw-r--r--english/lts/security/2020/dla-2455.data10
-rw-r--r--english/lts/security/2020/dla-2455.wml32
-rw-r--r--english/lts/security/2020/dla-2456.data10
-rw-r--r--english/lts/security/2020/dla-2456.wml36
-rw-r--r--english/lts/security/2020/dla-2457.data10
-rw-r--r--english/lts/security/2020/dla-2457.wml24
-rw-r--r--english/lts/security/2020/dla-2458.data10
-rw-r--r--english/lts/security/2020/dla-2458.wml48
-rw-r--r--english/lts/security/2020/dla-2459.data10
-rw-r--r--english/lts/security/2020/dla-2459.wml39
-rw-r--r--english/lts/security/2020/dla-2460.data10
-rw-r--r--english/lts/security/2020/dla-2460.wml43
-rw-r--r--english/lts/security/2020/dla-2461.data10
-rw-r--r--english/lts/security/2020/dla-2461.wml40
-rw-r--r--english/lts/security/2020/dla-2462.data10
-rw-r--r--english/lts/security/2020/dla-2462.wml22
-rw-r--r--english/lts/security/2020/dla-2463.data10
-rw-r--r--english/lts/security/2020/dla-2463.wml72
-rw-r--r--english/lts/security/2020/dla-2464.data10
-rw-r--r--english/lts/security/2020/dla-2464.wml22
-rw-r--r--english/lts/security/2020/dla-2465.data9
-rw-r--r--english/lts/security/2020/dla-2465.wml34
-rw-r--r--english/lts/security/2020/dla-2466.data10
-rw-r--r--english/lts/security/2020/dla-2466.wml23
-rw-r--r--english/lts/security/2020/dla-2467-2.data10
-rw-r--r--english/lts/security/2020/dla-2467-2.wml26
-rw-r--r--english/lts/security/2020/dla-2467.data10
-rw-r--r--english/lts/security/2020/dla-2467.wml32
-rw-r--r--english/lts/security/2020/dla-2468.data10
-rw-r--r--english/lts/security/2020/dla-2468.wml26
-rw-r--r--english/lts/security/2020/dla-2469.data10
-rw-r--r--english/lts/security/2020/dla-2469.wml26
-rw-r--r--english/lts/security/2020/dla-2470.data10
-rw-r--r--english/lts/security/2020/dla-2470.wml29
-rw-r--r--english/lts/security/2020/dla-2471.data10
-rw-r--r--english/lts/security/2020/dla-2471.wml26
-rw-r--r--english/lts/security/2020/dla-2472.data10
-rw-r--r--english/lts/security/2020/dla-2472.wml23
-rw-r--r--english/lts/security/2020/dla-2473.data10
-rw-r--r--english/lts/security/2020/dla-2473.wml22
-rw-r--r--english/lts/security/2020/dla-2474.data10
-rw-r--r--english/lts/security/2020/dla-2474.wml25
-rw-r--r--english/lts/security/2020/dla-2475.data10
-rw-r--r--english/lts/security/2020/dla-2475.wml36
-rw-r--r--english/lts/security/2020/dla-2476.data10
-rw-r--r--english/lts/security/2020/dla-2476.wml22
-rw-r--r--english/lts/security/2020/dla-2477.data9
-rw-r--r--english/lts/security/2020/dla-2477.wml35
-rw-r--r--english/lts/security/2020/dla-2478.data10
-rw-r--r--english/lts/security/2020/dla-2478.wml43
-rw-r--r--english/lts/security/2020/dla-2479.data10
-rw-r--r--english/lts/security/2020/dla-2479.wml23
-rw-r--r--english/lts/security/2020/dla-2480.data10
-rw-r--r--english/lts/security/2020/dla-2480.wml44
-rw-r--r--english/lts/security/2020/dla-2481.data10
-rw-r--r--english/lts/security/2020/dla-2481.wml26
-rw-r--r--english/lts/security/2020/dla-2482.data9
-rw-r--r--english/lts/security/2020/dla-2482.wml23
-rw-r--r--english/lts/security/2020/dla-2483.data10
-rw-r--r--english/lts/security/2020/dla-2483.wml170
-rw-r--r--english/lts/security/2020/dla-2484.data10
-rw-r--r--english/lts/security/2020/dla-2484.wml25
-rw-r--r--english/lts/security/2020/dla-2485.data10
-rw-r--r--english/lts/security/2020/dla-2485.wml41
-rw-r--r--english/lts/security/2020/dla-2486.data10
-rw-r--r--english/lts/security/2020/dla-2486.wml23
-rw-r--r--english/lts/security/2020/dla-2487.data10
-rw-r--r--english/lts/security/2020/dla-2487.wml24
-rw-r--r--english/lts/security/2020/dla-2488-2.data10
-rw-r--r--english/lts/security/2020/dla-2488-2.wml22
-rw-r--r--english/lts/security/2020/dla-2488.data10
-rw-r--r--english/lts/security/2020/dla-2488.wml23
-rw-r--r--english/lts/security/2020/dla-2489.data10
-rw-r--r--english/lts/security/2020/dla-2489.wml26
-rw-r--r--english/lts/security/2020/dla-2490.data10
-rw-r--r--english/lts/security/2020/dla-2490.wml27
-rw-r--r--english/lts/security/2020/dla-2491.data9
-rw-r--r--english/lts/security/2020/dla-2491.wml36
-rw-r--r--english/lts/security/2020/dla-2492.data10
-rw-r--r--english/lts/security/2020/dla-2492.wml22
-rw-r--r--english/lts/security/2020/dla-2493.data10
-rw-r--r--english/lts/security/2020/dla-2493.wml22
-rw-r--r--english/lts/security/2020/dla-2494.data10
-rw-r--r--english/lts/security/2020/dla-2494.wml141
-rw-r--r--english/lts/security/2020/dla-2495.data10
-rw-r--r--english/lts/security/2020/dla-2495.wml26
-rw-r--r--english/lts/security/2020/dla-2496.data10
-rw-r--r--english/lts/security/2020/dla-2496.wml23
-rw-r--r--english/lts/security/2020/dla-2497.data10
-rw-r--r--english/lts/security/2020/dla-2497.wml23
-rw-r--r--english/lts/security/2020/dla-2498.data10
-rw-r--r--english/lts/security/2020/dla-2498.wml31
-rw-r--r--english/lts/security/2020/dla-2499.data10
-rw-r--r--english/lts/security/2020/dla-2499.wml24
-rw-r--r--english/lts/security/2020/dla-2500.data10
-rw-r--r--english/lts/security/2020/dla-2500.wml93
-rw-r--r--english/lts/security/2020/dla-2501.data10
-rw-r--r--english/lts/security/2020/dla-2501.wml26
-rw-r--r--english/lts/security/2020/dla-2502.data10
-rw-r--r--english/lts/security/2020/dla-2502.wml23
-rw-r--r--english/lts/security/2020/dla-2503.data9
-rw-r--r--english/lts/security/2020/dla-2503.wml31
-rw-r--r--english/lts/security/2020/dla-2504.data10
-rw-r--r--english/lts/security/2020/dla-2504.wml51
-rw-r--r--english/lts/security/2020/dla-2505.data10
-rw-r--r--english/lts/security/2020/dla-2505.wml24
-rw-r--r--english/lts/security/2020/dla-2506.data10
-rw-r--r--english/lts/security/2020/dla-2506.wml25
-rw-r--r--english/lts/security/2020/dla-2507.data10
-rw-r--r--english/lts/security/2020/dla-2507.wml40
-rw-r--r--english/lts/security/2020/dla-2508.data10
-rw-r--r--english/lts/security/2020/dla-2508.wml23
-rw-r--r--english/lts/security/2020/dla-2509.data9
-rw-r--r--english/lts/security/2020/dla-2509.wml24
-rw-r--r--english/lts/security/2020/dla-2510.data9
-rw-r--r--english/lts/security/2020/dla-2510.wml22
-rw-r--r--english/lts/security/2020/dla-2511.data10
-rw-r--r--english/lts/security/2020/dla-2511.wml27
-rw-r--r--english/lts/security/2020/index.wml11
-rw-r--r--english/lts/security/2021/Makefile42
-rw-r--r--english/lts/security/2021/dla-2431-2.data10
-rw-r--r--english/lts/security/2021/dla-2431-2.wml34
-rw-r--r--english/lts/security/2021/dla-2512.data10
-rw-r--r--english/lts/security/2021/dla-2512.wml24
-rw-r--r--english/lts/security/2021/dla-2513.data10
-rw-r--r--english/lts/security/2021/dla-2513.wml35
-rw-r--r--english/lts/security/2021/dla-2514.data10
-rw-r--r--english/lts/security/2021/dla-2514.wml34
-rw-r--r--english/lts/security/2021/dla-2515.data9
-rw-r--r--english/lts/security/2021/dla-2515.wml32
-rw-r--r--english/lts/security/2021/dla-2516.data9
-rw-r--r--english/lts/security/2021/dla-2516.wml29
-rw-r--r--english/lts/security/2021/dla-2517.data9
-rw-r--r--english/lts/security/2021/dla-2517.wml35
-rw-r--r--english/lts/security/2021/dla-2518.data10
-rw-r--r--english/lts/security/2021/dla-2518.wml22
-rw-r--r--english/lts/security/2021/dla-2519.data10
-rw-r--r--english/lts/security/2021/dla-2519.wml45
-rw-r--r--english/lts/security/2021/dla-2520.data10
-rw-r--r--english/lts/security/2021/dla-2520.wml24
-rw-r--r--english/lts/security/2021/dla-2521.data10
-rw-r--r--english/lts/security/2021/dla-2521.wml22
-rw-r--r--english/lts/security/2021/dla-2522.data10
-rw-r--r--english/lts/security/2021/dla-2522.wml27
-rw-r--r--english/lts/security/2021/dla-2523.data10
-rw-r--r--english/lts/security/2021/dla-2523.wml115
-rw-r--r--english/lts/security/2021/dla-2524.data10
-rw-r--r--english/lts/security/2021/dla-2524.wml74
-rw-r--r--english/lts/security/2021/dla-2525.data10
-rw-r--r--english/lts/security/2021/dla-2525.wml23
-rw-r--r--english/lts/security/2021/dla-2526.data10
-rw-r--r--english/lts/security/2021/dla-2526.wml26
-rw-r--r--english/lts/security/2021/dla-2527.data10
-rw-r--r--english/lts/security/2021/dla-2527.wml37
-rw-r--r--english/lts/security/2021/dla-2528.data10
-rw-r--r--english/lts/security/2021/dla-2528.wml23
-rw-r--r--english/lts/security/2021/dla-2529.data10
-rw-r--r--english/lts/security/2021/dla-2529.wml28
-rw-r--r--english/lts/security/2021/dla-2530.data10
-rw-r--r--english/lts/security/2021/dla-2530.wml29
-rw-r--r--english/lts/security/2021/dla-2531.data10
-rw-r--r--english/lts/security/2021/dla-2531.wml30
-rw-r--r--english/lts/security/2021/dla-2532.data9
-rw-r--r--english/lts/security/2021/dla-2532.wml19
-rw-r--r--english/lts/security/2021/dla-2533.data9
-rw-r--r--english/lts/security/2021/dla-2533.wml33
-rw-r--r--english/lts/security/2021/dla-2534.data10
-rw-r--r--english/lts/security/2021/dla-2534.wml24
-rw-r--r--english/lts/security/2021/dla-2535.data10
-rw-r--r--english/lts/security/2021/dla-2535.wml56
-rw-r--r--english/lts/security/2021/dla-2536.data10
-rw-r--r--english/lts/security/2021/dla-2536.wml27
-rw-r--r--english/lts/security/2021/dla-2537.data10
-rw-r--r--english/lts/security/2021/dla-2537.wml36
-rw-r--r--english/lts/security/2021/dla-2538.data10
-rw-r--r--english/lts/security/2021/dla-2538.wml22
-rw-r--r--english/lts/security/2021/dla-2539.data10
-rw-r--r--english/lts/security/2021/dla-2539.wml23
-rw-r--r--english/lts/security/2021/dla-2540.data9
-rw-r--r--english/lts/security/2021/dla-2540.wml24
-rw-r--r--english/lts/security/2021/dla-2541.data10
-rw-r--r--english/lts/security/2021/dla-2541.wml23
-rw-r--r--english/lts/security/2021/dla-2542.data9
-rw-r--r--english/lts/security/2021/dla-2542.wml24
-rw-r--r--english/lts/security/2021/dla-2543.data9
-rw-r--r--english/lts/security/2021/dla-2543.wml22
-rw-r--r--english/lts/security/2021/dla-2544.data10
-rw-r--r--english/lts/security/2021/dla-2544.wml25
-rw-r--r--english/lts/security/2021/dla-2545.data10
-rw-r--r--english/lts/security/2021/dla-2545.wml36
-rw-r--r--english/lts/security/2021/dla-2546.data10
-rw-r--r--english/lts/security/2021/dla-2546.wml43
-rw-r--r--english/lts/security/2021/dla-2547.data10
-rw-r--r--english/lts/security/2021/dla-2547.wml89
-rw-r--r--english/lts/security/2021/dla-2548.data10
-rw-r--r--english/lts/security/2021/dla-2548.wml23
-rw-r--r--english/lts/security/2021/dla-2549.data10
-rw-r--r--english/lts/security/2021/dla-2549.wml38
-rw-r--r--english/lts/security/2021/dla-2550.data10
-rw-r--r--english/lts/security/2021/dla-2550.wml53
-rw-r--r--english/lts/security/2021/dla-2551.data10
-rw-r--r--english/lts/security/2021/dla-2551.wml39
-rw-r--r--english/lts/security/2021/dla-2552.data10
-rw-r--r--english/lts/security/2021/dla-2552.wml26
-rw-r--r--english/lts/security/2021/dla-2553-2.data10
-rw-r--r--english/lts/security/2021/dla-2553-2.wml30
-rw-r--r--english/lts/security/2021/dla-2553.data10
-rw-r--r--english/lts/security/2021/dla-2553.wml26
-rw-r--r--english/lts/security/2021/dla-2554.data10
-rw-r--r--english/lts/security/2021/dla-2554.wml24
-rw-r--r--english/lts/security/2021/dla-2555.data9
-rw-r--r--english/lts/security/2021/dla-2555.wml27
-rw-r--r--english/lts/security/2021/dla-2556.data10
-rw-r--r--english/lts/security/2021/dla-2556.wml46
-rw-r--r--english/lts/security/2021/dla-2557.data10
-rw-r--r--english/lts/security/2021/dla-2557.wml96
-rw-r--r--english/lts/security/2021/dla-2558-2.data10
-rw-r--r--english/lts/security/2021/dla-2558-2.wml24
-rw-r--r--english/lts/security/2021/dla-2558.data10
-rw-r--r--english/lts/security/2021/dla-2558.wml23
-rw-r--r--english/lts/security/2021/dla-2559.data10
-rw-r--r--english/lts/security/2021/dla-2559.wml95
-rw-r--r--english/lts/security/2021/dla-2560.data10
-rw-r--r--english/lts/security/2021/dla-2560.wml71
-rw-r--r--english/lts/security/2021/dla-2561.data10
-rw-r--r--english/lts/security/2021/dla-2561.wml27
-rw-r--r--english/lts/security/2021/dla-2562.data9
-rw-r--r--english/lts/security/2021/dla-2562.wml31
-rw-r--r--english/lts/security/2021/dla-2563.data9
-rw-r--r--english/lts/security/2021/dla-2563.wml49
-rw-r--r--english/lts/security/2021/dla-2564.data10
-rw-r--r--english/lts/security/2021/dla-2564.wml37
-rw-r--r--english/lts/security/2021/dla-2565.data9
-rw-r--r--english/lts/security/2021/dla-2565.wml50
-rw-r--r--english/lts/security/2021/dla-2566.data10
-rw-r--r--english/lts/security/2021/dla-2566.wml26
-rw-r--r--english/lts/security/2021/dla-2567.data10
-rw-r--r--english/lts/security/2021/dla-2567.wml40
-rw-r--r--english/lts/security/2021/dla-2568.data9
-rw-r--r--english/lts/security/2021/dla-2568.wml42
-rw-r--r--english/lts/security/2021/dla-2569.data9
-rw-r--r--english/lts/security/2021/dla-2569.wml40
-rw-r--r--english/lts/security/2021/dla-2570.data10
-rw-r--r--english/lts/security/2021/dla-2570.wml24
-rw-r--r--english/lts/security/2021/dla-2571.data10
-rw-r--r--english/lts/security/2021/dla-2571.wml62
-rw-r--r--english/lts/security/2021/dla-2572.data10
-rw-r--r--english/lts/security/2021/dla-2572.wml30
-rw-r--r--english/lts/security/2021/dla-2573.data10
-rw-r--r--english/lts/security/2021/dla-2573.wml24
-rw-r--r--english/lts/security/2021/dla-2574.data10
-rw-r--r--english/lts/security/2021/dla-2574.wml25
-rw-r--r--english/lts/security/2021/dla-2575.data10
-rw-r--r--english/lts/security/2021/dla-2575.wml23
-rw-r--r--english/lts/security/2021/dla-2576.data9
-rw-r--r--english/lts/security/2021/dla-2576.wml24
-rw-r--r--english/lts/security/2021/dla-2577.data10
-rw-r--r--english/lts/security/2021/dla-2577.wml45
-rw-r--r--english/lts/security/2021/dla-2578.data10
-rw-r--r--english/lts/security/2021/dla-2578.wml22
-rw-r--r--english/lts/security/2021/dla-2579.data9
-rw-r--r--english/lts/security/2021/dla-2579.wml23
-rw-r--r--english/lts/security/2021/dla-2580.data10
-rw-r--r--english/lts/security/2021/dla-2580.wml24
-rw-r--r--english/lts/security/2021/dla-2581.data10
-rw-r--r--english/lts/security/2021/dla-2581.wml24
-rw-r--r--english/lts/security/2021/dla-2582.data10
-rw-r--r--english/lts/security/2021/dla-2582.wml23
-rw-r--r--english/lts/security/2021/dla-2583.data10
-rw-r--r--english/lts/security/2021/dla-2583.wml51
-rw-r--r--english/lts/security/2021/dla-2584.data10
-rw-r--r--english/lts/security/2021/dla-2584.wml23
-rw-r--r--english/lts/security/2021/dla-2585.data10
-rw-r--r--english/lts/security/2021/dla-2585.wml24
-rw-r--r--english/lts/security/2021/dla-2586.data10
-rw-r--r--english/lts/security/2021/dla-2586.wml149
-rw-r--r--english/lts/security/2021/dla-2587.data10
-rw-r--r--english/lts/security/2021/dla-2587.wml46
-rw-r--r--english/lts/security/2021/dla-2588.data10
-rw-r--r--english/lts/security/2021/dla-2588.wml47
-rw-r--r--english/lts/security/2021/dla-2589-2.data9
-rw-r--r--english/lts/security/2021/dla-2589-2.wml23
-rw-r--r--english/lts/security/2021/dla-2589.data10
-rw-r--r--english/lts/security/2021/dla-2589.wml37
-rw-r--r--english/lts/security/2021/dla-2590.data10
-rw-r--r--english/lts/security/2021/dla-2590.wml22
-rw-r--r--english/lts/security/2021/dla-2591.data10
-rw-r--r--english/lts/security/2021/dla-2591.wml80
-rw-r--r--english/lts/security/2021/dla-2592.data10
-rw-r--r--english/lts/security/2021/dla-2592.wml80
-rw-r--r--english/lts/security/2021/dla-2593.data10
-rw-r--r--english/lts/security/2021/dla-2593.wml36
-rw-r--r--english/lts/security/2021/dla-2594.data10
-rw-r--r--english/lts/security/2021/dla-2594.wml50
-rw-r--r--english/lts/security/2021/dla-2595.data9
-rw-r--r--english/lts/security/2021/dla-2595.wml33
-rw-r--r--english/lts/security/2021/dla-2596.data10
-rw-r--r--english/lts/security/2021/dla-2596.wml47
-rw-r--r--english/lts/security/2021/dla-2597.data9
-rw-r--r--english/lts/security/2021/dla-2597.wml38
-rw-r--r--english/lts/security/2021/dla-2598.data10
-rw-r--r--english/lts/security/2021/dla-2598.wml26
-rw-r--r--english/lts/security/2021/dla-2599.data10
-rw-r--r--english/lts/security/2021/dla-2599.wml25
-rw-r--r--english/lts/security/2021/dla-2600.data9
-rw-r--r--english/lts/security/2021/dla-2600.wml35
-rw-r--r--english/lts/security/2021/dla-2601.data10
-rw-r--r--english/lts/security/2021/dla-2601.wml30
-rw-r--r--english/lts/security/2021/dla-2602.data10
-rw-r--r--english/lts/security/2021/dla-2602.wml23
-rw-r--r--english/lts/security/2021/dla-2603.data9
-rw-r--r--english/lts/security/2021/dla-2603.wml47
-rw-r--r--english/lts/security/2021/dla-2604.data10
-rw-r--r--english/lts/security/2021/dla-2604.wml24
-rw-r--r--english/lts/security/2021/dla-2605.data10
-rw-r--r--english/lts/security/2021/dla-2605.wml23
-rw-r--r--english/lts/security/2021/dla-2606.data10
-rw-r--r--english/lts/security/2021/dla-2606.wml27
-rw-r--r--english/lts/security/2021/dla-2607.data10
-rw-r--r--english/lts/security/2021/dla-2607.wml23
-rw-r--r--english/lts/security/2021/dla-2608.data10
-rw-r--r--english/lts/security/2021/dla-2608.wml22
-rw-r--r--english/lts/security/2021/dla-2609.data10
-rw-r--r--english/lts/security/2021/dla-2609.wml22
-rw-r--r--english/lts/security/2021/dla-2610.data10
-rw-r--r--english/lts/security/2021/dla-2610.wml112
-rw-r--r--english/lts/security/2021/dla-2611.data10
-rw-r--r--english/lts/security/2021/dla-2611.wml28
-rw-r--r--english/lts/security/2021/dla-2612.data10
-rw-r--r--english/lts/security/2021/dla-2612.wml27
-rw-r--r--english/lts/security/2021/dla-2613.data10
-rw-r--r--english/lts/security/2021/dla-2613.wml23
-rw-r--r--english/lts/security/2021/dla-2614.data10
-rw-r--r--english/lts/security/2021/dla-2614.wml23
-rw-r--r--english/lts/security/2021/dla-2615.data10
-rw-r--r--english/lts/security/2021/dla-2615.wml24
-rw-r--r--english/lts/security/2021/dla-2616.data10
-rw-r--r--english/lts/security/2021/dla-2616.wml38
-rw-r--r--english/lts/security/2021/dla-2617.data10
-rw-r--r--english/lts/security/2021/dla-2617.wml23
-rw-r--r--english/lts/security/2021/dla-2618-2.data10
-rw-r--r--english/lts/security/2021/dla-2618-2.wml22
-rw-r--r--english/lts/security/2021/dla-2618-3.data10
-rw-r--r--english/lts/security/2021/dla-2618-3.wml24
-rw-r--r--english/lts/security/2021/dla-2618.data10
-rw-r--r--english/lts/security/2021/dla-2618.wml43
-rw-r--r--english/lts/security/2021/dla-2619.data10
-rw-r--r--english/lts/security/2021/dla-2619.wml67
-rw-r--r--english/lts/security/2021/dla-2620.data9
-rw-r--r--english/lts/security/2021/dla-2620.wml29
-rw-r--r--english/lts/security/2021/dla-2621.data10
-rw-r--r--english/lts/security/2021/dla-2621.wml26
-rw-r--r--english/lts/security/2021/dla-2622.data9
-rw-r--r--english/lts/security/2021/dla-2622.wml34
-rw-r--r--english/lts/security/2021/dla-2623.data10
-rw-r--r--english/lts/security/2021/dla-2623.wml65
-rw-r--r--english/lts/security/2021/dla-2624.data10
-rw-r--r--english/lts/security/2021/dla-2624.wml23
-rw-r--r--english/lts/security/2021/dla-2625.data10
-rw-r--r--english/lts/security/2021/dla-2625.wml27
-rw-r--r--english/lts/security/2021/dla-2626.data10
-rw-r--r--english/lts/security/2021/dla-2626.wml29
-rw-r--r--english/lts/security/2021/dla-2627.data9
-rw-r--r--english/lts/security/2021/dla-2627.wml33
-rw-r--r--english/lts/security/2021/dla-2628.data10
-rw-r--r--english/lts/security/2021/dla-2628.wml58
-rw-r--r--english/lts/security/2021/dla-2629.data10
-rw-r--r--english/lts/security/2021/dla-2629.wml27
-rw-r--r--english/lts/security/2021/dla-2630.data10
-rw-r--r--english/lts/security/2021/dla-2630.wml39
-rw-r--r--english/lts/security/2021/dla-2631.data10
-rw-r--r--english/lts/security/2021/dla-2631.wml45
-rw-r--r--english/lts/security/2021/dla-2632.data10
-rw-r--r--english/lts/security/2021/dla-2632.wml24
-rw-r--r--english/lts/security/2021/dla-2633.data10
-rw-r--r--english/lts/security/2021/dla-2633.wml23
-rw-r--r--english/lts/security/2021/dla-2634.data10
-rw-r--r--english/lts/security/2021/dla-2634.wml22
-rw-r--r--english/lts/security/2021/dla-2635.data10
-rw-r--r--english/lts/security/2021/dla-2635.wml65
-rw-r--r--english/lts/security/2021/dla-2636.data10
-rw-r--r--english/lts/security/2021/dla-2636.wml26
-rw-r--r--english/lts/security/2021/dla-2637.data9
-rw-r--r--english/lts/security/2021/dla-2637.wml33
-rw-r--r--english/lts/security/2021/dla-2638.data10
-rw-r--r--english/lts/security/2021/dla-2638.wml136
-rw-r--r--english/lts/security/2021/dla-2639.data10
-rw-r--r--english/lts/security/2021/dla-2639.wml26
-rw-r--r--english/lts/security/2021/dla-2640.data10
-rw-r--r--english/lts/security/2021/dla-2640.wml24
-rw-r--r--english/lts/security/2021/dla-2641.data10
-rw-r--r--english/lts/security/2021/dla-2641.wml23
-rw-r--r--english/lts/security/2021/dla-2642.data10
-rw-r--r--english/lts/security/2021/dla-2642.wml23
-rw-r--r--english/lts/security/2021/dla-2643.data10
-rw-r--r--english/lts/security/2021/dla-2643.wml23
-rw-r--r--english/lts/security/2021/dla-2644.data10
-rw-r--r--english/lts/security/2021/dla-2644.wml23
-rw-r--r--english/lts/security/2021/dla-2645.data10
-rw-r--r--english/lts/security/2021/dla-2645.wml25
-rw-r--r--english/lts/security/2021/dla-2646.data10
-rw-r--r--english/lts/security/2021/dla-2646.wml32
-rw-r--r--english/lts/security/2021/dla-2647.data10
-rw-r--r--english/lts/security/2021/dla-2647.wml44
-rw-r--r--english/lts/security/2021/dla-2648-2.data10
-rw-r--r--english/lts/security/2021/dla-2648-2.wml24
-rw-r--r--english/lts/security/2021/dla-2648.data10
-rw-r--r--english/lts/security/2021/dla-2648.wml72
-rw-r--r--english/lts/security/2021/dla-2649.data10
-rw-r--r--english/lts/security/2021/dla-2649.wml46
-rw-r--r--english/lts/security/2021/dla-2650.data10
-rw-r--r--english/lts/security/2021/dla-2650.wml27
-rw-r--r--english/lts/security/2021/dla-2651.data9
-rw-r--r--english/lts/security/2021/dla-2651.wml31
-rw-r--r--english/lts/security/2021/dla-2652.data10
-rw-r--r--english/lts/security/2021/dla-2652.wml25
-rw-r--r--english/lts/security/2021/dla-2653.data10
-rw-r--r--english/lts/security/2021/dla-2653.wml24
-rw-r--r--english/lts/security/2021/dla-2654.data10
-rw-r--r--english/lts/security/2021/dla-2654.wml23
-rw-r--r--english/lts/security/2021/dla-2655.data10
-rw-r--r--english/lts/security/2021/dla-2655.wml38
-rw-r--r--english/lts/security/2021/dla-2656.data10
-rw-r--r--english/lts/security/2021/dla-2656.wml22
-rw-r--r--english/lts/security/2021/dla-2657.data9
-rw-r--r--english/lts/security/2021/dla-2657.wml28
-rw-r--r--english/lts/security/2021/dla-2658.data10
-rw-r--r--english/lts/security/2021/dla-2658.wml23
-rw-r--r--english/lts/security/2021/dla-2659.data10
-rw-r--r--english/lts/security/2021/dla-2659.wml37
-rw-r--r--english/lts/security/2021/dla-2660.data10
-rw-r--r--english/lts/security/2021/dla-2660.wml27
-rw-r--r--english/lts/security/2021/dla-2661.data10
-rw-r--r--english/lts/security/2021/dla-2661.wml84
-rw-r--r--english/lts/security/2021/dla-2662.data10
-rw-r--r--english/lts/security/2021/dla-2662.wml23
-rw-r--r--english/lts/security/2021/dla-2663.data10
-rw-r--r--english/lts/security/2021/dla-2663.wml24
-rw-r--r--english/lts/security/2021/dla-2664.data10
-rw-r--r--english/lts/security/2021/dla-2664.wml25
-rw-r--r--english/lts/security/2021/dla-2665.data10
-rw-r--r--english/lts/security/2021/dla-2665.wml27
-rw-r--r--english/lts/security/2021/dla-2666.data10
-rw-r--r--english/lts/security/2021/dla-2666.wml23
-rw-r--r--english/lts/security/2021/dla-2667.data10
-rw-r--r--english/lts/security/2021/dla-2667.wml24
-rw-r--r--english/lts/security/2021/dla-2668.data10
-rw-r--r--english/lts/security/2021/dla-2668.wml106
-rw-r--r--english/lts/security/2021/dla-2669.data10
-rw-r--r--english/lts/security/2021/dla-2669.wml29
-rw-r--r--english/lts/security/2021/dla-2670.data10
-rw-r--r--english/lts/security/2021/dla-2670.wml24
-rw-r--r--english/lts/security/2021/dla-2671.data10
-rw-r--r--english/lts/security/2021/dla-2671.wml23
-rw-r--r--english/lts/security/2021/dla-2672.data10
-rw-r--r--english/lts/security/2021/dla-2672.wml62
-rw-r--r--english/lts/security/2021/dla-2673.data10
-rw-r--r--english/lts/security/2021/dla-2673.wml23
-rw-r--r--english/lts/security/2021/dla-2674.data10
-rw-r--r--english/lts/security/2021/dla-2674.wml23
-rw-r--r--english/lts/security/2021/dla-2675.data10
-rw-r--r--english/lts/security/2021/dla-2675.wml23
-rw-r--r--english/lts/security/2021/dla-2676.data9
-rw-r--r--english/lts/security/2021/dla-2676.wml55
-rw-r--r--english/lts/security/2021/dla-2677.data10
-rw-r--r--english/lts/security/2021/dla-2677.wml86
-rw-r--r--english/lts/security/2021/dla-2678.data10
-rw-r--r--english/lts/security/2021/dla-2678.wml30
-rw-r--r--english/lts/security/2021/dla-2679.data10
-rw-r--r--english/lts/security/2021/dla-2679.wml23
-rw-r--r--english/lts/security/2021/dla-2680.data10
-rw-r--r--english/lts/security/2021/dla-2680.wml27
-rw-r--r--english/lts/security/2021/dla-2681.data10
-rw-r--r--english/lts/security/2021/dla-2681.wml23
-rw-r--r--english/lts/security/2021/dla-2682.data10
-rw-r--r--english/lts/security/2021/dla-2682.wml23
-rw-r--r--english/lts/security/2021/dla-2683.data10
-rw-r--r--english/lts/security/2021/dla-2683.wml23
-rw-r--r--english/lts/security/2021/dla-2684.data10
-rw-r--r--english/lts/security/2021/dla-2684.wml23
-rw-r--r--english/lts/security/2021/dla-2685.data10
-rw-r--r--english/lts/security/2021/dla-2685.wml68
-rw-r--r--english/lts/security/2021/dla-2686.data10
-rw-r--r--english/lts/security/2021/dla-2686.wml53
-rw-r--r--english/lts/security/2021/dla-2687-2.data10
-rw-r--r--english/lts/security/2021/dla-2687-2.wml24
-rw-r--r--english/lts/security/2021/dla-2687.data10
-rw-r--r--english/lts/security/2021/dla-2687.wml38
-rw-r--r--english/lts/security/2021/dla-2688.data10
-rw-r--r--english/lts/security/2021/dla-2688.wml25
-rw-r--r--english/lts/security/2021/dla-2689.data10
-rw-r--r--english/lts/security/2021/dla-2689.wml244
-rw-r--r--english/lts/security/2021/dla-2690.data10
-rw-r--r--english/lts/security/2021/dla-2690.wml219
-rw-r--r--english/lts/security/2021/dla-2691.data10
-rw-r--r--english/lts/security/2021/dla-2691.wml26
-rw-r--r--english/lts/security/2021/dla-2692.data10
-rw-r--r--english/lts/security/2021/dla-2692.wml29
-rw-r--r--english/lts/security/2021/dla-2693.data10
-rw-r--r--english/lts/security/2021/dla-2693.wml25
-rw-r--r--english/lts/security/2021/dla-2694.data10
-rw-r--r--english/lts/security/2021/dla-2694.wml25
-rw-r--r--english/lts/security/2021/dla-2695.data10
-rw-r--r--english/lts/security/2021/dla-2695.wml50
-rw-r--r--english/lts/security/2021/dla-2696.data9
-rw-r--r--english/lts/security/2021/dla-2696.wml30
-rw-r--r--english/lts/security/2021/dla-2697.data10
-rw-r--r--english/lts/security/2021/dla-2697.wml26
-rw-r--r--english/lts/security/2021/dla-2698.data10
-rw-r--r--english/lts/security/2021/dla-2698.wml26
-rw-r--r--english/lts/security/2021/dla-2699.data10
-rw-r--r--english/lts/security/2021/dla-2699.wml26
-rw-r--r--english/lts/security/2021/dla-2700.data10
-rw-r--r--english/lts/security/2021/dla-2700.wml24
-rw-r--r--english/lts/security/2021/dla-2701.data10
-rw-r--r--english/lts/security/2021/dla-2701.wml24
-rw-r--r--english/lts/security/2021/dla-2702.data10
-rw-r--r--english/lts/security/2021/dla-2702.wml23
-rw-r--r--english/lts/security/2021/dla-2703.data10
-rw-r--r--english/lts/security/2021/dla-2703.wml26
-rw-r--r--english/lts/security/2021/dla-2704.data10
-rw-r--r--english/lts/security/2021/dla-2704.wml28
-rw-r--r--english/lts/security/2021/dla-2705.data10
-rw-r--r--english/lts/security/2021/dla-2705.wml43
-rw-r--r--english/lts/security/2021/dla-2706.data10
-rw-r--r--english/lts/security/2021/dla-2706.wml23
-rw-r--r--english/lts/security/2021/dla-2707.data10
-rw-r--r--english/lts/security/2021/dla-2707.wml31
-rw-r--r--english/lts/security/2021/dla-2708.data10
-rw-r--r--english/lts/security/2021/dla-2708.wml56
-rw-r--r--english/lts/security/2021/dla-2709.data10
-rw-r--r--english/lts/security/2021/dla-2709.wml23
-rw-r--r--english/lts/security/2021/dla-2710-2.data9
-rw-r--r--english/lts/security/2021/dla-2710-2.wml24
-rw-r--r--english/lts/security/2021/dla-2710.data10
-rw-r--r--english/lts/security/2021/dla-2710.wml61
-rw-r--r--english/lts/security/2021/dla-2711.data10
-rw-r--r--english/lts/security/2021/dla-2711.wml30
-rw-r--r--english/lts/security/2021/dla-2712.data9
-rw-r--r--english/lts/security/2021/dla-2712.wml31
-rw-r--r--english/lts/security/2021/dla-2713-2.data10
-rw-r--r--english/lts/security/2021/dla-2713-2.wml59
-rw-r--r--english/lts/security/2021/dla-2713.data10
-rw-r--r--english/lts/security/2021/dla-2713.wml56
-rw-r--r--english/lts/security/2021/dla-2714.data10
-rw-r--r--english/lts/security/2021/dla-2714.wml60
-rw-r--r--english/lts/security/2021/dla-2715.data10
-rw-r--r--english/lts/security/2021/dla-2715.wml27
-rw-r--r--english/lts/security/2021/dla-2716.data10
-rw-r--r--english/lts/security/2021/dla-2716.wml71
-rw-r--r--english/lts/security/2021/dla-2717-2.data9
-rw-r--r--english/lts/security/2021/dla-2717-2.wml31
-rw-r--r--english/lts/security/2021/dla-2717.data9
-rw-r--r--english/lts/security/2021/dla-2717.wml26
-rw-r--r--english/lts/security/2021/dla-2718.data10
-rw-r--r--english/lts/security/2021/dla-2718.wml28
-rw-r--r--english/lts/security/2021/dla-2719.data10
-rw-r--r--english/lts/security/2021/dla-2719.wml24
-rw-r--r--english/lts/security/2021/dla-2720.data10
-rw-r--r--english/lts/security/2021/dla-2720.wml27
-rw-r--r--english/lts/security/2021/dla-2721.data10
-rw-r--r--english/lts/security/2021/dla-2721.wml35
-rw-r--r--english/lts/security/2021/dla-2722.data10
-rw-r--r--english/lts/security/2021/dla-2722.wml25
-rw-r--r--english/lts/security/2021/dla-2723.data10
-rw-r--r--english/lts/security/2021/dla-2723.wml27
-rw-r--r--english/lts/security/2021/dla-2724.data10
-rw-r--r--english/lts/security/2021/dla-2724.wml26
-rw-r--r--english/lts/security/2021/dla-2725.data10
-rw-r--r--english/lts/security/2021/dla-2725.wml24
-rw-r--r--english/lts/security/2021/dla-2726.data10
-rw-r--r--english/lts/security/2021/dla-2726.wml36
-rw-r--r--english/lts/security/2021/dla-2727.data9
-rw-r--r--english/lts/security/2021/dla-2727.wml31
-rw-r--r--english/lts/security/2021/dla-2728.data9
-rw-r--r--english/lts/security/2021/dla-2728.wml46
-rw-r--r--english/lts/security/2021/dla-2729.data9
-rw-r--r--english/lts/security/2021/dla-2729.wml34
-rw-r--r--english/lts/security/2021/dla-2730.data10
-rw-r--r--english/lts/security/2021/dla-2730.wml24
-rw-r--r--english/lts/security/2021/dla-2731.data10
-rw-r--r--english/lts/security/2021/dla-2731.wml23
-rw-r--r--english/lts/security/2021/dla-2732.data10
-rw-r--r--english/lts/security/2021/dla-2732.wml24
-rw-r--r--english/lts/security/2021/dla-2733.data10
-rw-r--r--english/lts/security/2021/dla-2733.wml42
-rw-r--r--english/lts/security/2021/dla-2734.data10
-rw-r--r--english/lts/security/2021/dla-2734.wml34
-rw-r--r--english/lts/security/2021/dla-2735.data10
-rw-r--r--english/lts/security/2021/dla-2735.wml60
-rw-r--r--english/lts/security/2021/dla-2736.data9
-rw-r--r--english/lts/security/2021/dla-2736.wml33
-rw-r--r--english/lts/security/2021/dla-2737.data10
-rw-r--r--english/lts/security/2021/dla-2737.wml26
-rw-r--r--english/lts/security/2021/dla-2738.data10
-rw-r--r--english/lts/security/2021/dla-2738.wml25
-rw-r--r--english/lts/security/2021/dla-2739.data10
-rw-r--r--english/lts/security/2021/dla-2739.wml24
-rw-r--r--english/lts/security/2021/dla-2740.data10
-rw-r--r--english/lts/security/2021/dla-2740.wml23
-rw-r--r--english/lts/security/2021/dla-2741.data10
-rw-r--r--english/lts/security/2021/dla-2741.wml26
-rw-r--r--english/lts/security/2021/dla-2742-2.data9
-rw-r--r--english/lts/security/2021/dla-2742-2.wml24
-rw-r--r--english/lts/security/2021/dla-2742.data10
-rw-r--r--english/lts/security/2021/dla-2742.wml114
-rw-r--r--english/lts/security/2021/dla-2743-2.data9
-rw-r--r--english/lts/security/2021/dla-2743-2.wml24
-rw-r--r--english/lts/security/2021/dla-2743.data10
-rw-r--r--english/lts/security/2021/dla-2743.wml26
-rw-r--r--english/lts/security/2021/dla-2744.data10
-rw-r--r--english/lts/security/2021/dla-2744.wml26
-rw-r--r--english/lts/security/2021/dla-2745.data10
-rw-r--r--english/lts/security/2021/dla-2745.wml22
-rw-r--r--english/lts/security/2021/dla-2746.data10
-rw-r--r--english/lts/security/2021/dla-2746.wml25
-rw-r--r--english/lts/security/2021/dla-2747.data10
-rw-r--r--english/lts/security/2021/dla-2747.wml25
-rw-r--r--english/lts/security/2021/dla-2748.data10
-rw-r--r--english/lts/security/2021/dla-2748.wml26
-rw-r--r--english/lts/security/2021/dla-2749.data10
-rw-r--r--english/lts/security/2021/dla-2749.wml27
-rw-r--r--english/lts/security/2021/dla-2750.data10
-rw-r--r--english/lts/security/2021/dla-2750.wml24
-rw-r--r--english/lts/security/2021/dla-2751.data10
-rw-r--r--english/lts/security/2021/dla-2751.wml29
-rw-r--r--english/lts/security/2021/dla-2752.data10
-rw-r--r--english/lts/security/2021/dla-2752.wml26
-rw-r--r--english/lts/security/2021/dla-2753-2.data10
-rw-r--r--english/lts/security/2021/dla-2753-2.wml24
-rw-r--r--english/lts/security/2021/dla-2753.data10
-rw-r--r--english/lts/security/2021/dla-2753.wml82
-rw-r--r--english/lts/security/2021/dla-2754.data10
-rw-r--r--english/lts/security/2021/dla-2754.wml21
-rw-r--r--english/lts/security/2021/dla-2755.data10
-rw-r--r--english/lts/security/2021/dla-2755.wml26
-rw-r--r--english/lts/security/2021/dla-2756.data10
-rw-r--r--english/lts/security/2021/dla-2756.wml23
-rw-r--r--english/lts/security/2021/dla-2757.data10
-rw-r--r--english/lts/security/2021/dla-2757.wml22
-rw-r--r--english/lts/security/2021/dla-2758.data10
-rw-r--r--english/lts/security/2021/dla-2758.wml27
-rw-r--r--english/lts/security/2021/dla-2759.data10
-rw-r--r--english/lts/security/2021/dla-2759.wml23
-rw-r--r--english/lts/security/2021/dla-2760.data10
-rw-r--r--english/lts/security/2021/dla-2760.wml25
-rw-r--r--english/lts/security/2021/dla-2761.data9
-rw-r--r--english/lts/security/2021/dla-2761.wml24
-rw-r--r--english/lts/security/2021/dla-2762.data10
-rw-r--r--english/lts/security/2021/dla-2762.wml25
-rw-r--r--english/lts/security/2021/dla-2763.data10
-rw-r--r--english/lts/security/2021/dla-2763.wml23
-rw-r--r--english/lts/security/2021/dla-2764.data10
-rw-r--r--english/lts/security/2021/dla-2764.wml24
-rw-r--r--english/lts/security/2021/dla-2765.data10
-rw-r--r--english/lts/security/2021/dla-2765.wml61
-rw-r--r--english/lts/security/2021/dla-2766.data10
-rw-r--r--english/lts/security/2021/dla-2766.wml25
-rw-r--r--english/lts/security/2021/dla-2767.data10
-rw-r--r--english/lts/security/2021/dla-2767.wml24
-rw-r--r--english/lts/security/2021/dla-2768-2.data10
-rw-r--r--english/lts/security/2021/dla-2768-2.wml24
-rw-r--r--english/lts/security/2021/dla-2768.data10
-rw-r--r--english/lts/security/2021/dla-2768.wml24
-rw-r--r--english/lts/security/2021/dla-2769.data10
-rw-r--r--english/lts/security/2021/dla-2769.wml37
-rw-r--r--english/lts/security/2021/dla-2770.data10
-rw-r--r--english/lts/security/2021/dla-2770.wml41
-rw-r--r--english/lts/security/2021/dla-2771.data10
-rw-r--r--english/lts/security/2021/dla-2771.wml39
-rw-r--r--english/lts/security/2021/dla-2772.data10
-rw-r--r--english/lts/security/2021/dla-2772.wml37
-rw-r--r--english/lts/security/2021/dla-2773.data10
-rw-r--r--english/lts/security/2021/dla-2773.wml40
-rw-r--r--english/lts/security/2021/dla-2774.data10
-rw-r--r--english/lts/security/2021/dla-2774.wml25
-rw-r--r--english/lts/security/2021/dla-2775.data10
-rw-r--r--english/lts/security/2021/dla-2775.wml24
-rw-r--r--english/lts/security/2021/dla-2776.data10
-rw-r--r--english/lts/security/2021/dla-2776.wml44
-rw-r--r--english/lts/security/2021/dla-2777.data10
-rw-r--r--english/lts/security/2021/dla-2777.wml38
-rw-r--r--english/lts/security/2021/dla-2778.data10
-rw-r--r--english/lts/security/2021/dla-2778.wml24
-rw-r--r--english/lts/security/2021/dla-2779.data10
-rw-r--r--english/lts/security/2021/dla-2779.wml23
-rw-r--r--english/lts/security/2021/dla-2780.data10
-rw-r--r--english/lts/security/2021/dla-2780.wml50
-rw-r--r--english/lts/security/2021/dla-2781.data9
-rw-r--r--english/lts/security/2021/dla-2781.wml30
-rw-r--r--english/lts/security/2021/dla-2782.data10
-rw-r--r--english/lts/security/2021/dla-2782.wml23
-rw-r--r--english/lts/security/2021/dla-2783.data9
-rw-r--r--english/lts/security/2021/dla-2783.wml38
-rw-r--r--english/lts/security/2021/dla-2784.data9
-rw-r--r--english/lts/security/2021/dla-2784.wml29
-rw-r--r--english/lts/security/2021/dla-2785.data10
-rw-r--r--english/lts/security/2021/dla-2785.wml179
-rw-r--r--english/lts/security/2021/dla-2786.data10
-rw-r--r--english/lts/security/2021/dla-2786.wml39
-rw-r--r--english/lts/security/2021/dla-2787.data10
-rw-r--r--english/lts/security/2021/dla-2787.wml23
-rw-r--r--english/lts/security/2021/dla-2788.data10
-rw-r--r--english/lts/security/2021/dla-2788.wml35
-rw-r--r--english/lts/security/2021/dla-2789.data10
-rw-r--r--english/lts/security/2021/dla-2789.wml27
-rw-r--r--english/lts/security/2021/dla-2790.data10
-rw-r--r--english/lts/security/2021/dla-2790.wml26
-rw-r--r--english/lts/security/2021/dla-2791.data9
-rw-r--r--english/lts/security/2021/dla-2791.wml34
-rw-r--r--english/lts/security/2021/dla-2792.data10
-rw-r--r--english/lts/security/2021/dla-2792.wml26
-rw-r--r--english/lts/security/2021/dla-2793.data10
-rw-r--r--english/lts/security/2021/dla-2793.wml23
-rw-r--r--english/lts/security/2021/dla-2794.data10
-rw-r--r--english/lts/security/2021/dla-2794.wml23
-rw-r--r--english/lts/security/2021/dla-2795.data10
-rw-r--r--english/lts/security/2021/dla-2795.wml24
-rw-r--r--english/lts/security/2021/dla-2796.data10
-rw-r--r--english/lts/security/2021/dla-2796.wml25
-rw-r--r--english/lts/security/2021/dla-2797.data9
-rw-r--r--english/lts/security/2021/dla-2797.wml25
-rw-r--r--english/lts/security/2021/dla-2798.data9
-rw-r--r--english/lts/security/2021/dla-2798.wml22
-rw-r--r--english/lts/security/2021/dla-2799.data10
-rw-r--r--english/lts/security/2021/dla-2799.wml24
-rw-r--r--english/lts/security/2021/dla-2800.data10
-rw-r--r--english/lts/security/2021/dla-2800.wml25
-rw-r--r--english/lts/security/2021/dla-2801.data10
-rw-r--r--english/lts/security/2021/dla-2801.wml46
-rw-r--r--english/lts/security/2021/dla-2802.data10
-rw-r--r--english/lts/security/2021/dla-2802.wml61
-rw-r--r--english/lts/security/2021/dla-2803.data10
-rw-r--r--english/lts/security/2021/dla-2803.wml32
-rw-r--r--english/lts/security/2021/dla-2804.data10
-rw-r--r--english/lts/security/2021/dla-2804.wml75
-rw-r--r--english/lts/security/2021/dla-2805.data10
-rw-r--r--english/lts/security/2021/dla-2805.wml23
-rw-r--r--english/lts/security/2021/dla-2806.data10
-rw-r--r--english/lts/security/2021/dla-2806.wml24
-rw-r--r--english/lts/security/2021/dla-2807.data10
-rw-r--r--english/lts/security/2021/dla-2807.wml40
-rw-r--r--english/lts/security/2021/dla-2808.data10
-rw-r--r--english/lts/security/2021/dla-2808.wml40
-rw-r--r--english/lts/security/2021/dla-2809.data10
-rw-r--r--english/lts/security/2021/dla-2809.wml24
-rw-r--r--english/lts/security/2021/dla-2810.data9
-rw-r--r--english/lts/security/2021/dla-2810.wml44
-rw-r--r--english/lts/security/2021/dla-2811.data10
-rw-r--r--english/lts/security/2021/dla-2811.wml27
-rw-r--r--english/lts/security/2021/dla-2812.data10
-rw-r--r--english/lts/security/2021/dla-2812.wml27
-rw-r--r--english/lts/security/2021/dla-2813.data10
-rw-r--r--english/lts/security/2021/dla-2813.wml41
-rw-r--r--english/lts/security/2021/dla-2814.data10
-rw-r--r--english/lts/security/2021/dla-2814.wml26
-rw-r--r--english/lts/security/2021/dla-2815.data10
-rw-r--r--english/lts/security/2021/dla-2815.wml25
-rw-r--r--english/lts/security/2021/dla-2816.data10
-rw-r--r--english/lts/security/2021/dla-2816.wml65
-rw-r--r--english/lts/security/2021/dla-2817.data10
-rw-r--r--english/lts/security/2021/dla-2817.wml22
-rw-r--r--english/lts/security/2021/dla-2818.data10
-rw-r--r--english/lts/security/2021/dla-2818.wml95
-rw-r--r--english/lts/security/2021/dla-2819.data10
-rw-r--r--english/lts/security/2021/dla-2819.wml23
-rw-r--r--english/lts/security/2021/dla-2820.data10
-rw-r--r--english/lts/security/2021/dla-2820.wml25
-rw-r--r--english/lts/security/2021/dla-2821.data10
-rw-r--r--english/lts/security/2021/dla-2821.wml25
-rw-r--r--english/lts/security/2021/dla-2822.data10
-rw-r--r--english/lts/security/2021/dla-2822.wml27
-rw-r--r--english/lts/security/2021/dla-2823-2.data10
-rw-r--r--english/lts/security/2021/dla-2823-2.wml23
-rw-r--r--english/lts/security/2021/dla-2823.data10
-rw-r--r--english/lts/security/2021/dla-2823.wml23
-rw-r--r--english/lts/security/2021/dla-2824.data10
-rw-r--r--english/lts/security/2021/dla-2824.wml27
-rw-r--r--english/lts/security/2021/dla-2825.data10
-rw-r--r--english/lts/security/2021/dla-2825.wml26
-rw-r--r--english/lts/security/2021/dla-2826.data10
-rw-r--r--english/lts/security/2021/dla-2826.wml23
-rw-r--r--english/lts/security/2021/dla-2827.data10
-rw-r--r--english/lts/security/2021/dla-2827.wml51
-rw-r--r--english/lts/security/2021/dla-2828.data10
-rw-r--r--english/lts/security/2021/dla-2828.wml35
-rw-r--r--english/lts/security/2021/dla-2829.data10
-rw-r--r--english/lts/security/2021/dla-2829.wml22
-rw-r--r--english/lts/security/2021/dla-2830.data10
-rw-r--r--english/lts/security/2021/dla-2830.wml22
-rw-r--r--english/lts/security/2021/dla-2831.data10
-rw-r--r--english/lts/security/2021/dla-2831.wml22
-rw-r--r--english/lts/security/2021/dla-2832.data10
-rw-r--r--english/lts/security/2021/dla-2832.wml49
-rw-r--r--english/lts/security/2021/dla-2833.data10
-rw-r--r--english/lts/security/2021/dla-2833.wml23
-rw-r--r--english/lts/security/2021/dla-2834.data10
-rw-r--r--english/lts/security/2021/dla-2834.wml23
-rw-r--r--english/lts/security/2021/dla-2835.data10
-rw-r--r--english/lts/security/2021/dla-2835.wml33
-rw-r--r--english/lts/security/2021/dla-2836-2.data10
-rw-r--r--english/lts/security/2021/dla-2836-2.wml24
-rw-r--r--english/lts/security/2021/dla-2836.data10
-rw-r--r--english/lts/security/2021/dla-2836.wml24
-rw-r--r--english/lts/security/2021/dla-2837.data10
-rw-r--r--english/lts/security/2021/dla-2837.wml24
-rw-r--r--english/lts/security/2021/dla-2838.data10
-rw-r--r--english/lts/security/2021/dla-2838.wml47
-rw-r--r--english/lts/security/2021/dla-2839.data10
-rw-r--r--english/lts/security/2021/dla-2839.wml25
-rw-r--r--english/lts/security/2021/dla-2840.data10
-rw-r--r--english/lts/security/2021/dla-2840.wml24
-rw-r--r--english/lts/security/2021/dla-2841.data9
-rw-r--r--english/lts/security/2021/dla-2841.wml30
-rw-r--r--english/lts/security/2021/dla-2842.data10
-rw-r--r--english/lts/security/2021/dla-2842.wml26
-rw-r--r--english/lts/security/2021/dla-2843.data10
-rw-r--r--english/lts/security/2021/dla-2843.wml216
-rw-r--r--english/lts/security/2021/dla-2844.data10
-rw-r--r--english/lts/security/2021/dla-2844.wml25
-rw-r--r--english/lts/security/2021/dla-2845.data10
-rw-r--r--english/lts/security/2021/dla-2845.wml25
-rw-r--r--english/lts/security/2021/dla-2846.data10
-rw-r--r--english/lts/security/2021/dla-2846.wml24
-rw-r--r--english/lts/security/2021/dla-2847.data10
-rw-r--r--english/lts/security/2021/dla-2847.wml27
-rw-r--r--english/lts/security/2021/dla-2848.data10
-rw-r--r--english/lts/security/2021/dla-2848.wml42
-rw-r--r--english/lts/security/2021/dla-2849.data10
-rw-r--r--english/lts/security/2021/dla-2849.wml61
-rw-r--r--english/lts/security/2021/dla-2850.data10
-rw-r--r--english/lts/security/2021/dla-2850.wml22
-rw-r--r--english/lts/security/2021/dla-2851.data10
-rw-r--r--english/lts/security/2021/dla-2851.wml22
-rw-r--r--english/lts/security/2021/dla-2852.data10
-rw-r--r--english/lts/security/2021/dla-2852.wml41
-rw-r--r--english/lts/security/2021/dla-2853.data10
-rw-r--r--english/lts/security/2021/dla-2853.wml23
-rw-r--r--english/lts/security/2021/dla-2854.data10
-rw-r--r--english/lts/security/2021/dla-2854.wml24
-rw-r--r--english/lts/security/2021/dla-2855.data10
-rw-r--r--english/lts/security/2021/dla-2855.wml34
-rw-r--r--english/lts/security/2021/dla-2856.data10
-rw-r--r--english/lts/security/2021/dla-2856.wml22
-rw-r--r--english/lts/security/2021/dla-2857-2.data9
-rw-r--r--english/lts/security/2021/dla-2857-2.wml22
-rw-r--r--english/lts/security/2021/dla-2857.data10
-rw-r--r--english/lts/security/2021/dla-2857.wml23
-rw-r--r--english/lts/security/2021/dla-2858.data10
-rw-r--r--english/lts/security/2021/dla-2858.wml26
-rw-r--r--english/lts/security/2021/dla-2859.data10
-rw-r--r--english/lts/security/2021/dla-2859.wml26
-rw-r--r--english/lts/security/2021/dla-2860.data10
-rw-r--r--english/lts/security/2021/dla-2860.wml37
-rw-r--r--english/lts/security/2021/dla-2861.data10
-rw-r--r--english/lts/security/2021/dla-2861.wml23
-rw-r--r--english/lts/security/2021/dla-2862.data10
-rw-r--r--english/lts/security/2021/dla-2862.wml40
-rw-r--r--english/lts/security/2021/dla-2863.data10
-rw-r--r--english/lts/security/2021/dla-2863.wml27
-rw-r--r--english/lts/security/2021/dla-2864.data10
-rw-r--r--english/lts/security/2021/dla-2864.wml25
-rw-r--r--english/lts/security/2021/dla-2865.data10
-rw-r--r--english/lts/security/2021/dla-2865.wml36
-rw-r--r--english/lts/security/2021/dla-2866.data10
-rw-r--r--english/lts/security/2021/dla-2866.wml24
-rw-r--r--english/lts/security/2021/dla-2867.data9
-rw-r--r--english/lts/security/2021/dla-2867.wml26
-rw-r--r--english/lts/security/2021/dla-2868.data10
-rw-r--r--english/lts/security/2021/dla-2868.wml41
-rw-r--r--english/lts/security/2021/dla-2869.data10
-rw-r--r--english/lts/security/2021/dla-2869.wml25
-rw-r--r--english/lts/security/2021/dla-2870.data10
-rw-r--r--english/lts/security/2021/dla-2870.wml26
-rw-r--r--english/lts/security/2021/dla-2871.data10
-rw-r--r--english/lts/security/2021/dla-2871.wml24
-rw-r--r--english/lts/security/2021/dla-2872.data10
-rw-r--r--english/lts/security/2021/dla-2872.wml22
-rw-r--r--english/lts/security/2021/dla-2873.data10
-rw-r--r--english/lts/security/2021/dla-2873.wml22
-rw-r--r--english/lts/security/2021/index.wml11
-rw-r--r--english/lts/security/2022/Makefile42
-rw-r--r--english/lts/security/2022/dla-2480-2.data10
-rw-r--r--english/lts/security/2022/dla-2480-2.wml46
-rw-r--r--english/lts/security/2022/dla-2874.data10
-rw-r--r--english/lts/security/2022/dla-2874.wml24
-rw-r--r--english/lts/security/2022/dla-2875.data9
-rw-r--r--english/lts/security/2022/dla-2875.wml23
-rw-r--r--english/lts/security/2022/dla-2876.data10
-rw-r--r--english/lts/security/2022/dla-2876.wml47
-rw-r--r--english/lts/security/2022/dla-2877.data10
-rw-r--r--english/lts/security/2022/dla-2877.wml23
-rw-r--r--english/lts/security/2022/dla-2878.data10
-rw-r--r--english/lts/security/2022/dla-2878.wml24
-rw-r--r--english/lts/security/2022/dla-2879.data10
-rw-r--r--english/lts/security/2022/dla-2879.wml24
-rw-r--r--english/lts/security/2022/dla-2880.data10
-rw-r--r--english/lts/security/2022/dla-2880.wml23
-rw-r--r--english/lts/security/2022/dla-2881.data10
-rw-r--r--english/lts/security/2022/dla-2881.wml22
-rw-r--r--english/lts/security/2022/dla-2882.data10
-rw-r--r--english/lts/security/2022/dla-2882.wml25
-rw-r--r--english/lts/security/2022/dla-2883-2.data9
-rw-r--r--english/lts/security/2022/dla-2883-2.wml28
-rw-r--r--english/lts/security/2022/dla-2883.data9
-rw-r--r--english/lts/security/2022/dla-2883.wml33
-rw-r--r--english/lts/security/2022/dla-2884.data10
-rw-r--r--english/lts/security/2022/dla-2884.wml24
-rw-r--r--english/lts/security/2022/dla-2885.data10
-rw-r--r--english/lts/security/2022/dla-2885.wml23
-rw-r--r--english/lts/security/2022/dla-2886.data10
-rw-r--r--english/lts/security/2022/dla-2886.wml49
-rw-r--r--english/lts/security/2022/dla-2887.data10
-rw-r--r--english/lts/security/2022/dla-2887.wml34
-rw-r--r--english/lts/security/2022/dla-2888.data10
-rw-r--r--english/lts/security/2022/dla-2888.wml23
-rw-r--r--english/lts/security/2022/dla-2889.data10
-rw-r--r--english/lts/security/2022/dla-2889.wml30
-rw-r--r--english/lts/security/2022/dla-2890.data10
-rw-r--r--english/lts/security/2022/dla-2890.wml25
-rw-r--r--english/lts/security/2022/dla-2891.data10
-rw-r--r--english/lts/security/2022/dla-2891.wml58
-rw-r--r--english/lts/security/2022/dla-2892.data10
-rw-r--r--english/lts/security/2022/dla-2892.wml58
-rw-r--r--english/lts/security/2022/dla-2893.data10
-rw-r--r--english/lts/security/2022/dla-2893.wml23
-rw-r--r--english/lts/security/2022/dla-2894.data10
-rw-r--r--english/lts/security/2022/dla-2894.wml24
-rw-r--r--english/lts/security/2022/dla-2895.data10
-rw-r--r--english/lts/security/2022/dla-2895.wml23
-rw-r--r--english/lts/security/2022/dla-2896.data9
-rw-r--r--english/lts/security/2022/dla-2896.wml48
-rw-r--r--english/lts/security/2022/dla-2897.data10
-rw-r--r--english/lts/security/2022/dla-2897.wml25
-rw-r--r--english/lts/security/2022/dla-2898.data10
-rw-r--r--english/lts/security/2022/dla-2898.wml23
-rw-r--r--english/lts/security/2022/dla-2899.data10
-rw-r--r--english/lts/security/2022/dla-2899.wml25
-rw-r--r--english/lts/security/2022/dla-2900.data10
-rw-r--r--english/lts/security/2022/dla-2900.wml26
-rw-r--r--english/lts/security/2022/dla-2901.data10
-rw-r--r--english/lts/security/2022/dla-2901.wml26
-rw-r--r--english/lts/security/2022/dla-2902.data10
-rw-r--r--english/lts/security/2022/dla-2902.wml25
-rw-r--r--english/lts/security/2022/dla-2903.data10
-rw-r--r--english/lts/security/2022/dla-2903.wml113
-rw-r--r--english/lts/security/2022/dla-2904.data10
-rw-r--r--english/lts/security/2022/dla-2904.wml23
-rw-r--r--english/lts/security/2022/dla-2905.data10
-rw-r--r--english/lts/security/2022/dla-2905.wml29
-rw-r--r--english/lts/security/2022/dla-2906.data9
-rw-r--r--english/lts/security/2022/dla-2906.wml42
-rw-r--r--english/lts/security/2022/dla-2907.data10
-rw-r--r--english/lts/security/2022/dla-2907.wml35
-rw-r--r--english/lts/security/2022/dla-2908.data10
-rw-r--r--english/lts/security/2022/dla-2908.wml23
-rw-r--r--english/lts/security/2022/dla-2909.data10
-rw-r--r--english/lts/security/2022/dla-2909.wml24
-rw-r--r--english/lts/security/2022/dla-2910.data9
-rw-r--r--english/lts/security/2022/dla-2910.wml47
-rw-r--r--english/lts/security/2022/dla-2911.data10
-rw-r--r--english/lts/security/2022/dla-2911.wml24
-rw-r--r--english/lts/security/2022/dla-2912.data10
-rw-r--r--english/lts/security/2022/dla-2912.wml25
-rw-r--r--english/lts/security/2022/dla-2913.data10
-rw-r--r--english/lts/security/2022/dla-2913.wml23
-rw-r--r--english/lts/security/2022/dla-2914.data10
-rw-r--r--english/lts/security/2022/dla-2914.wml26
-rw-r--r--english/lts/security/2022/dla-2915.data10
-rw-r--r--english/lts/security/2022/dla-2915.wml23
-rw-r--r--english/lts/security/2022/dla-2916.data10
-rw-r--r--english/lts/security/2022/dla-2916.wml23
-rw-r--r--english/lts/security/2022/dla-2917.data10
-rw-r--r--english/lts/security/2022/dla-2917.wml23
-rw-r--r--english/lts/security/2022/dla-2918.data10
-rw-r--r--english/lts/security/2022/dla-2918.wml27
-rw-r--r--english/lts/security/2022/dla-2919.data10
-rw-r--r--english/lts/security/2022/dla-2919.wml45
-rw-r--r--english/lts/security/2022/dla-2920.data10
-rw-r--r--english/lts/security/2022/dla-2920.wml24
-rw-r--r--english/lts/security/2022/dla-2921.data10
-rw-r--r--english/lts/security/2022/dla-2921.wml22
-rw-r--r--english/lts/security/2022/dla-2922.data10
-rw-r--r--english/lts/security/2022/dla-2922.wml24
-rw-r--r--english/lts/security/2022/dla-2923.data10
-rw-r--r--english/lts/security/2022/dla-2923.wml27
-rw-r--r--english/lts/security/2022/dla-2924.data9
-rw-r--r--english/lts/security/2022/dla-2924.wml41
-rw-r--r--english/lts/security/2022/dla-2925.data9
-rw-r--r--english/lts/security/2022/dla-2925.wml22
-rw-r--r--english/lts/security/2022/dla-2926.data10
-rw-r--r--english/lts/security/2022/dla-2926.wml25
-rw-r--r--english/lts/security/2022/dla-2927.data10
-rw-r--r--english/lts/security/2022/dla-2927.wml50
-rw-r--r--english/lts/security/2022/dla-2928.data10
-rw-r--r--english/lts/security/2022/dla-2928.wml44
-rw-r--r--english/lts/security/2022/dla-2929.data10
-rw-r--r--english/lts/security/2022/dla-2929.wml31
-rw-r--r--english/lts/security/2022/dla-2930.data10
-rw-r--r--english/lts/security/2022/dla-2930.wml22
-rw-r--r--english/lts/security/2022/dla-2931.data10
-rw-r--r--english/lts/security/2022/dla-2931.wml27
-rw-r--r--english/lts/security/2022/dla-2932.data10
-rw-r--r--english/lts/security/2022/dla-2932.wml44
-rw-r--r--english/lts/security/2022/dla-2933.data10
-rw-r--r--english/lts/security/2022/dla-2933.wml22
-rw-r--r--english/lts/security/2022/dla-2934.data10
-rw-r--r--english/lts/security/2022/dla-2934.wml22
-rw-r--r--english/lts/security/2022/dla-2935.data10
-rw-r--r--english/lts/security/2022/dla-2935.wml23
-rw-r--r--english/lts/security/2022/dla-2936.data10
-rw-r--r--english/lts/security/2022/dla-2936.wml72
-rw-r--r--english/lts/security/2022/dla-2937.data10
-rw-r--r--english/lts/security/2022/dla-2937.wml40
-rw-r--r--english/lts/security/2022/dla-2938.data9
-rw-r--r--english/lts/security/2022/dla-2938.wml35
-rw-r--r--english/lts/security/2022/dla-2939.data10
-rw-r--r--english/lts/security/2022/dla-2939.wml22
-rw-r--r--english/lts/security/2022/dla-2940.data10
-rw-r--r--english/lts/security/2022/dla-2940.wml231
-rw-r--r--english/lts/security/2022/dla-2941.data10
-rw-r--r--english/lts/security/2022/dla-2941.wml376
-rw-r--r--english/lts/security/2022/dla-2942.data10
-rw-r--r--english/lts/security/2022/dla-2942.wml23
-rw-r--r--english/lts/security/2022/dla-2943.data10
-rw-r--r--english/lts/security/2022/dla-2943.wml37
-rw-r--r--english/lts/security/2022/dla-2944.data9
-rw-r--r--english/lts/security/2022/dla-2944.wml35
-rw-r--r--english/lts/security/2022/dla-2945.data10
-rw-r--r--english/lts/security/2022/dla-2945.wml23
-rw-r--r--english/lts/security/2022/dla-2946.data10
-rw-r--r--english/lts/security/2022/dla-2946.wml23
-rw-r--r--english/lts/security/2022/dla-2947.data10
-rw-r--r--english/lts/security/2022/dla-2947.wml24
-rw-r--r--english/lts/security/2022/dla-2948.data9
-rw-r--r--english/lts/security/2022/dla-2948.wml20
-rw-r--r--english/lts/security/2022/dla-2949.data10
-rw-r--r--english/lts/security/2022/dla-2949.wml22
-rw-r--r--english/lts/security/2022/dla-2950.data10
-rw-r--r--english/lts/security/2022/dla-2950.wml23
-rw-r--r--english/lts/security/2022/dla-2951.data10
-rw-r--r--english/lts/security/2022/dla-2951.wml24
-rw-r--r--english/lts/security/2022/dla-2952.data10
-rw-r--r--english/lts/security/2022/dla-2952.wml26
-rw-r--r--english/lts/security/2022/dla-2953.data10
-rw-r--r--english/lts/security/2022/dla-2953.wml23
-rw-r--r--english/lts/security/2022/dla-2954.data9
-rw-r--r--english/lts/security/2022/dla-2954.wml42
-rw-r--r--english/lts/security/2022/dla-2955-2.data10
-rw-r--r--english/lts/security/2022/dla-2955-2.wml23
-rw-r--r--english/lts/security/2022/dla-2955.data10
-rw-r--r--english/lts/security/2022/dla-2955.wml24
-rw-r--r--english/lts/security/2022/dla-2956.data10
-rw-r--r--english/lts/security/2022/dla-2956.wml24
-rw-r--r--english/lts/security/2022/dla-2957.data10
-rw-r--r--english/lts/security/2022/dla-2957.wml24
-rw-r--r--english/lts/security/2022/dla-2958.data10
-rw-r--r--english/lts/security/2022/dla-2958.wml23
-rw-r--r--english/lts/security/2022/dla-2959.data9
-rw-r--r--english/lts/security/2022/dla-2959.wml30
-rw-r--r--english/lts/security/2022/dla-2960.data10
-rw-r--r--english/lts/security/2022/dla-2960.wml23
-rw-r--r--english/lts/security/2022/dla-2961.data10
-rw-r--r--english/lts/security/2022/dla-2961.wml22
-rw-r--r--english/lts/security/2022/dla-2962-2.data10
-rw-r--r--english/lts/security/2022/dla-2962-2.wml23
-rw-r--r--english/lts/security/2022/dla-2962.data10
-rw-r--r--english/lts/security/2022/dla-2962.wml134
-rw-r--r--english/lts/security/2022/dla-2963.data9
-rw-r--r--english/lts/security/2022/dla-2963.wml24
-rw-r--r--english/lts/security/2022/dla-2964.data9
-rw-r--r--english/lts/security/2022/dla-2964.wml22
-rw-r--r--english/lts/security/2022/dla-2965.data10
-rw-r--r--english/lts/security/2022/dla-2965.wml74
-rw-r--r--english/lts/security/2022/dla-2966.data10
-rw-r--r--english/lts/security/2022/dla-2966.wml27
-rw-r--r--english/lts/security/2022/dla-2967.data10
-rw-r--r--english/lts/security/2022/dla-2967.wml27
-rw-r--r--english/lts/security/2022/dla-2968.data10
-rw-r--r--english/lts/security/2022/dla-2968.wml25
-rw-r--r--english/lts/security/2022/dla-2969.data10
-rw-r--r--english/lts/security/2022/dla-2969.wml45
-rw-r--r--english/lts/security/2022/dla-2970.data10
-rw-r--r--english/lts/security/2022/dla-2970.wml23
-rw-r--r--english/lts/security/2022/dla-2971.data10
-rw-r--r--english/lts/security/2022/dla-2971.wml23
-rw-r--r--english/lts/security/2022/dla-2972.data10
-rw-r--r--english/lts/security/2022/dla-2972.wml57
-rw-r--r--english/lts/security/2022/dla-2973.data10
-rw-r--r--english/lts/security/2022/dla-2973.wml26
-rw-r--r--english/lts/security/2022/dla-2974.data10
-rw-r--r--english/lts/security/2022/dla-2974.wml41
-rw-r--r--english/lts/security/2022/dla-2975.data10
-rw-r--r--english/lts/security/2022/dla-2975.wml52
-rw-r--r--english/lts/security/2022/dla-2976.data10
-rw-r--r--english/lts/security/2022/dla-2976.wml22
-rw-r--r--english/lts/security/2022/dla-2977.data10
-rw-r--r--english/lts/security/2022/dla-2977.wml22
-rw-r--r--english/lts/security/2022/dla-2978.data10
-rw-r--r--english/lts/security/2022/dla-2978.wml22
-rw-r--r--english/lts/security/2022/dla-2979.data10
-rw-r--r--english/lts/security/2022/dla-2979.wml23
-rw-r--r--english/lts/security/2022/dla-2980.data10
-rw-r--r--english/lts/security/2022/dla-2980.wml25
-rw-r--r--english/lts/security/2022/dla-2981.data10
-rw-r--r--english/lts/security/2022/dla-2981.wml59
-rw-r--r--english/lts/security/2022/dla-2982.data9
-rw-r--r--english/lts/security/2022/dla-2982.wml31
-rw-r--r--english/lts/security/2022/dla-2983.data10
-rw-r--r--english/lts/security/2022/dla-2983.wml57
-rw-r--r--english/lts/security/2022/dla-2984.data10
-rw-r--r--english/lts/security/2022/dla-2984.wml28
-rw-r--r--english/lts/security/2022/dla-2985.data10
-rw-r--r--english/lts/security/2022/dla-2985.wml42
-rw-r--r--english/lts/security/2022/dla-2986.data10
-rw-r--r--english/lts/security/2022/dla-2986.wml42
-rw-r--r--english/lts/security/2022/dla-2987.data10
-rw-r--r--english/lts/security/2022/dla-2987.wml41
-rw-r--r--english/lts/security/2022/dla-2988.data10
-rw-r--r--english/lts/security/2022/dla-2988.wml26
-rw-r--r--english/lts/security/2022/dla-2989.data10
-rw-r--r--english/lts/security/2022/dla-2989.wml27
-rw-r--r--english/lts/security/2022/dla-2990.data10
-rw-r--r--english/lts/security/2022/dla-2990.wml24
-rw-r--r--english/lts/security/2022/dla-2991.data10
-rw-r--r--english/lts/security/2022/dla-2991.wml24
-rw-r--r--english/lts/security/2022/dla-2992.data10
-rw-r--r--english/lts/security/2022/dla-2992.wml26
-rw-r--r--english/lts/security/2022/dla-2993.data10
-rw-r--r--english/lts/security/2022/dla-2993.wml27
-rw-r--r--english/lts/security/2022/dla-2994.data10
-rw-r--r--english/lts/security/2022/dla-2994.wml23
-rw-r--r--english/lts/security/2022/dla-2995.data10
-rw-r--r--english/lts/security/2022/dla-2995.wml25
-rw-r--r--english/lts/security/2022/dla-2996.data10
-rw-r--r--english/lts/security/2022/dla-2996.wml49
-rw-r--r--english/lts/security/2022/dla-2997.data10
-rw-r--r--english/lts/security/2022/dla-2997.wml28
-rw-r--r--english/lts/security/2022/dla-2998.data10
-rw-r--r--english/lts/security/2022/dla-2998.wml53
-rw-r--r--english/lts/security/2022/dla-2999.data10
-rw-r--r--english/lts/security/2022/dla-2999.wml24
-rw-r--r--english/lts/security/2022/dla-3000.data10
-rw-r--r--english/lts/security/2022/dla-3000.wml75
-rw-r--r--english/lts/security/2022/dla-3001.data10
-rw-r--r--english/lts/security/2022/dla-3001.wml24
-rw-r--r--english/lts/security/2022/dla-3002.data9
-rw-r--r--english/lts/security/2022/dla-3002.wml32
-rw-r--r--english/lts/security/2022/dla-3003.data9
-rw-r--r--english/lts/security/2022/dla-3003.wml34
-rw-r--r--english/lts/security/2022/dla-3004.data9
-rw-r--r--english/lts/security/2022/dla-3004.wml34
-rw-r--r--english/lts/security/2022/dla-3005.data10
-rw-r--r--english/lts/security/2022/dla-3005.wml21
-rw-r--r--english/lts/security/2022/dla-3006.data10
-rw-r--r--english/lts/security/2022/dla-3006.wml22
-rw-r--r--english/lts/security/2022/dla-3007.data10
-rw-r--r--english/lts/security/2022/dla-3007.wml36
-rw-r--r--english/lts/security/2022/dla-3008.data10
-rw-r--r--english/lts/security/2022/dla-3008.wml25
-rw-r--r--english/lts/security/2022/dla-3009.data10
-rw-r--r--english/lts/security/2022/dla-3009.wml38
-rw-r--r--english/lts/security/2022/dla-3010.data9
-rw-r--r--english/lts/security/2022/dla-3010.wml21
-rw-r--r--english/lts/security/2022/dla-3011.data10
-rw-r--r--english/lts/security/2022/dla-3011.wml24
-rw-r--r--english/lts/security/2022/dla-3012.data10
-rw-r--r--english/lts/security/2022/dla-3012.wml24
-rw-r--r--english/lts/security/2022/dla-3013.data10
-rw-r--r--english/lts/security/2022/dla-3013.wml26
-rw-r--r--english/lts/security/2022/dla-3014.data10
-rw-r--r--english/lts/security/2022/dla-3014.wml28
-rw-r--r--english/lts/security/2022/dla-3015.data10
-rw-r--r--english/lts/security/2022/dla-3015.wml23
-rw-r--r--english/lts/security/2022/dla-3016.data10
-rw-r--r--english/lts/security/2022/dla-3016.wml41
-rw-r--r--english/lts/security/2022/dla-3017.data10
-rw-r--r--english/lts/security/2022/dla-3017.wml25
-rw-r--r--english/lts/security/2022/dla-3018.data10
-rw-r--r--english/lts/security/2022/dla-3018.wml25
-rw-r--r--english/lts/security/2022/dla-3019.data10
-rw-r--r--english/lts/security/2022/dla-3019.wml26
-rw-r--r--english/lts/security/2022/dla-3020.data10
-rw-r--r--english/lts/security/2022/dla-3020.wml22
-rw-r--r--english/lts/security/2022/dla-3021.data10
-rw-r--r--english/lts/security/2022/dla-3021.wml22
-rw-r--r--english/lts/security/2022/dla-3022.data10
-rw-r--r--english/lts/security/2022/dla-3022.wml24
-rw-r--r--english/lts/security/2022/dla-3023.data10
-rw-r--r--english/lts/security/2022/dla-3023.wml27
-rw-r--r--english/lts/security/2022/dla-3024.data9
-rw-r--r--english/lts/security/2022/dla-3024.wml34
-rw-r--r--english/lts/security/2022/dla-3025.data9
-rw-r--r--english/lts/security/2022/dla-3025.wml28
-rw-r--r--english/lts/security/2022/dla-3026.data10
-rw-r--r--english/lts/security/2022/dla-3026.wml23
-rw-r--r--english/lts/security/2022/dla-3027.data9
-rw-r--r--english/lts/security/2022/dla-3027.wml30
-rw-r--r--english/lts/security/2022/dla-3028.data10
-rw-r--r--english/lts/security/2022/dla-3028.wml26
-rw-r--r--english/lts/security/2022/dla-3029.data10
-rw-r--r--english/lts/security/2022/dla-3029.wml25
-rw-r--r--english/lts/security/2022/dla-3030.data10
-rw-r--r--english/lts/security/2022/dla-3030.wml25
-rw-r--r--english/lts/security/2022/dla-3031.data9
-rw-r--r--english/lts/security/2022/dla-3031.wml34
-rw-r--r--english/lts/security/2022/dla-3032.data10
-rw-r--r--english/lts/security/2022/dla-3032.wml24
-rw-r--r--english/lts/security/2022/dla-3033.data10
-rw-r--r--english/lts/security/2022/dla-3033.wml22
-rw-r--r--english/lts/security/2022/dla-3034.data10
-rw-r--r--english/lts/security/2022/dla-3034.wml26
-rw-r--r--english/lts/security/2022/dla-3035.data10
-rw-r--r--english/lts/security/2022/dla-3035.wml39
-rw-r--r--english/lts/security/2022/dla-3036.data10
-rw-r--r--english/lts/security/2022/dla-3036.wml37
-rw-r--r--english/lts/security/2022/dla-3037.data10
-rw-r--r--english/lts/security/2022/dla-3037.wml23
-rw-r--r--english/lts/security/2022/dla-3038.data9
-rw-r--r--english/lts/security/2022/dla-3038.wml51
-rw-r--r--english/lts/security/2022/dla-3039.data10
-rw-r--r--english/lts/security/2022/dla-3039.wml23
-rw-r--r--english/lts/security/2022/dla-3040.data10
-rw-r--r--english/lts/security/2022/dla-3040.wml23
-rw-r--r--english/lts/security/2022/dla-3041.data10
-rw-r--r--english/lts/security/2022/dla-3041.wml23
-rw-r--r--english/lts/security/2022/dla-3042.data10
-rw-r--r--english/lts/security/2022/dla-3042.wml22
-rw-r--r--english/lts/security/2022/dla-3043.data10
-rw-r--r--english/lts/security/2022/dla-3043.wml27
-rw-r--r--english/lts/security/2022/dla-3044.data10
-rw-r--r--english/lts/security/2022/dla-3044.wml48
-rw-r--r--english/lts/security/2022/dla-3045.data9
-rw-r--r--english/lts/security/2022/dla-3045.wml30
-rw-r--r--english/lts/security/2022/dla-3046.data9
-rw-r--r--english/lts/security/2022/dla-3046.wml31
-rw-r--r--english/lts/security/2022/dla-3047.data10
-rw-r--r--english/lts/security/2022/dla-3047.wml35
-rw-r--r--english/lts/security/2022/dla-3048.data10
-rw-r--r--english/lts/security/2022/dla-3048.wml23
-rw-r--r--english/lts/security/2022/dla-3049.data10
-rw-r--r--english/lts/security/2022/dla-3049.wml45
-rw-r--r--english/lts/security/2022/dla-3050.data10
-rw-r--r--english/lts/security/2022/dla-3050.wml23
-rw-r--r--english/lts/security/2022/dla-3051.data10
-rw-r--r--english/lts/security/2022/dla-3051.wml23
-rw-r--r--english/lts/security/2022/dla-3052.data10
-rw-r--r--english/lts/security/2022/dla-3052.wml25
-rw-r--r--english/lts/security/2022/dla-3053.data10
-rw-r--r--english/lts/security/2022/dla-3053.wml24
-rw-r--r--english/lts/security/2022/dla-3054.data10
-rw-r--r--english/lts/security/2022/dla-3054.wml63
-rw-r--r--english/lts/security/2022/dla-3055.data10
-rw-r--r--english/lts/security/2022/dla-3055.wml64
-rw-r--r--english/lts/security/2022/dla-3056.data9
-rw-r--r--english/lts/security/2022/dla-3056.wml29
-rw-r--r--english/lts/security/2022/dla-3057.data9
-rw-r--r--english/lts/security/2022/dla-3057.wml30
-rw-r--r--english/lts/security/2022/dla-3058.data10
-rw-r--r--english/lts/security/2022/dla-3058.wml40
-rw-r--r--english/lts/security/2022/dla-3059.data10
-rw-r--r--english/lts/security/2022/dla-3059.wml24
-rw-r--r--english/lts/security/2022/dla-3060.data10
-rw-r--r--english/lts/security/2022/dla-3060.wml48
-rw-r--r--english/lts/security/2022/dla-3061.data10
-rw-r--r--english/lts/security/2022/dla-3061.wml23
-rw-r--r--english/lts/security/2022/dla-3062.data10
-rw-r--r--english/lts/security/2022/dla-3062.wml26
-rw-r--r--english/lts/security/2022/dla-3063.data10
-rw-r--r--english/lts/security/2022/dla-3063.wml25
-rw-r--r--english/lts/security/2022/dla-3064.data10
-rw-r--r--english/lts/security/2022/dla-3064.wml23
-rw-r--r--english/lts/security/2022/dla-3065.data10
-rw-r--r--english/lts/security/2022/dla-3065.wml281
-rw-r--r--english/lts/security/2022/dla-3066.data10
-rw-r--r--english/lts/security/2022/dla-3066.wml23
-rw-r--r--english/lts/security/2022/dla-3067.data9
-rw-r--r--english/lts/security/2022/dla-3067.wml45
-rw-r--r--english/lts/security/2022/dla-3068.data10
-rw-r--r--english/lts/security/2022/dla-3068.wml24
-rw-r--r--english/lts/security/2022/dla-3069.data10
-rw-r--r--english/lts/security/2022/dla-3069.wml23
-rw-r--r--english/lts/security/2022/dla-3070.data10
-rw-r--r--english/lts/security/2022/dla-3070.wml24
-rw-r--r--english/lts/security/2022/dla-3071.data10
-rw-r--r--english/lts/security/2022/dla-3071.wml23
-rw-r--r--english/lts/security/2022/dla-3072.data10
-rw-r--r--english/lts/security/2022/dla-3072.wml23
-rw-r--r--english/lts/security/2022/dla-3073.data10
-rw-r--r--english/lts/security/2022/dla-3073.wml36
-rw-r--r--english/lts/security/2022/dla-3074.data10
-rw-r--r--english/lts/security/2022/dla-3074.wml23
-rw-r--r--english/lts/security/2022/dla-3075.data10
-rw-r--r--english/lts/security/2022/dla-3075.wml36
-rw-r--r--english/lts/security/2022/dla-3076.data10
-rw-r--r--english/lts/security/2022/dla-3076.wml22
-rw-r--r--english/lts/security/2022/dla-3077.data9
-rw-r--r--english/lts/security/2022/dla-3077.wml50
-rw-r--r--english/lts/security/2022/dla-3078.data10
-rw-r--r--english/lts/security/2022/dla-3078.wml55
-rw-r--r--english/lts/security/2022/dla-3079.data10
-rw-r--r--english/lts/security/2022/dla-3079.wml41
-rw-r--r--english/lts/security/2022/dla-3080.data10
-rw-r--r--english/lts/security/2022/dla-3080.wml23
-rw-r--r--english/lts/security/2022/dla-3081.data10
-rw-r--r--english/lts/security/2022/dla-3081.wml23
-rw-r--r--english/lts/security/2022/dla-3082.data10
-rw-r--r--english/lts/security/2022/dla-3082.wml24
-rw-r--r--english/lts/security/2022/dla-3083.data10
-rw-r--r--english/lts/security/2022/dla-3083.wml41
-rw-r--r--english/lts/security/2022/dla-3084.data10
-rw-r--r--english/lts/security/2022/dla-3084.wml36
-rw-r--r--english/lts/security/2022/dla-3085.data10
-rw-r--r--english/lts/security/2022/dla-3085.wml24
-rw-r--r--english/lts/security/2022/dla-3086.data10
-rw-r--r--english/lts/security/2022/dla-3086.wml24
-rw-r--r--english/lts/security/2022/dla-3087.data10
-rw-r--r--english/lts/security/2022/dla-3087.wml33
-rw-r--r--english/lts/security/2022/dla-3088.data10
-rw-r--r--english/lts/security/2022/dla-3088.wml25
-rw-r--r--english/lts/security/2022/dla-3089.data9
-rw-r--r--english/lts/security/2022/dla-3089.wml30
-rw-r--r--english/lts/security/2022/dla-3090.data9
-rw-r--r--english/lts/security/2022/dla-3090.wml30
-rw-r--r--english/lts/security/2022/dla-3091.data10
-rw-r--r--english/lts/security/2022/dla-3091.wml37
-rw-r--r--english/lts/security/2022/dla-3092.data10
-rw-r--r--english/lts/security/2022/dla-3092.wml24
-rw-r--r--english/lts/security/2022/dla-3093-2.data9
-rw-r--r--english/lts/security/2022/dla-3093-2.wml24
-rw-r--r--english/lts/security/2022/dla-3093.data10
-rw-r--r--english/lts/security/2022/dla-3093.wml60
-rw-r--r--english/lts/security/2022/dla-3094.data10
-rw-r--r--english/lts/security/2022/dla-3094.wml24
-rw-r--r--english/lts/security/2022/dla-3095.data10
-rw-r--r--english/lts/security/2022/dla-3095.wml36
-rw-r--r--english/lts/security/2022/dla-3096.data10
-rw-r--r--english/lts/security/2022/dla-3096.wml24
-rw-r--r--english/lts/security/2022/dla-3097.data10
-rw-r--r--english/lts/security/2022/dla-3097.wml22
-rw-r--r--english/lts/security/2022/dla-3098.data10
-rw-r--r--english/lts/security/2022/dla-3098.wml23
-rw-r--r--english/lts/security/2022/dla-3099.data10
-rw-r--r--english/lts/security/2022/dla-3099.wml165
-rw-r--r--english/lts/security/2022/dla-3100.data10
-rw-r--r--english/lts/security/2022/dla-3100.wml25
-rw-r--r--english/lts/security/2022/dla-3101.data10
-rw-r--r--english/lts/security/2022/dla-3101.wml23
-rw-r--r--english/lts/security/2022/dla-3102.data10
-rw-r--r--english/lts/security/2022/dla-3102.wml127
-rw-r--r--english/lts/security/2022/dla-3103.data10
-rw-r--r--english/lts/security/2022/dla-3103.wml24
-rw-r--r--english/lts/security/2022/dla-3104.data9
-rw-r--r--english/lts/security/2022/dla-3104.wml31
-rw-r--r--english/lts/security/2022/dla-3105.data9
-rw-r--r--english/lts/security/2022/dla-3105.wml35
-rw-r--r--english/lts/security/2022/dla-3106.data9
-rw-r--r--english/lts/security/2022/dla-3106.wml30
-rw-r--r--english/lts/security/2022/dla-3107.data9
-rw-r--r--english/lts/security/2022/dla-3107.wml23
-rw-r--r--english/lts/security/2022/dla-3108.data10
-rw-r--r--english/lts/security/2022/dla-3108.wml30
-rw-r--r--english/lts/security/2022/dla-3109.data10
-rw-r--r--english/lts/security/2022/dla-3109.wml25
-rw-r--r--english/lts/security/2022/dla-3110.data10
-rw-r--r--english/lts/security/2022/dla-3110.wml24
-rw-r--r--english/lts/security/2022/dla-3111.data10
-rw-r--r--english/lts/security/2022/dla-3111.wml25
-rw-r--r--english/lts/security/2022/dla-3112.data10
-rw-r--r--english/lts/security/2022/dla-3112.wml22
-rw-r--r--english/lts/security/2022/dla-3113.data10
-rw-r--r--english/lts/security/2022/dla-3113.wml51
-rw-r--r--english/lts/security/2022/dla-3114-2.data10
-rw-r--r--english/lts/security/2022/dla-3114-2.wml23
-rw-r--r--english/lts/security/2022/dla-3114.data10
-rw-r--r--english/lts/security/2022/dla-3114.wml27
-rw-r--r--english/lts/security/2022/dla-3115.data10
-rw-r--r--english/lts/security/2022/dla-3115.wml22
-rw-r--r--english/lts/security/2022/dla-3116.data10
-rw-r--r--english/lts/security/2022/dla-3116.wml22
-rw-r--r--english/lts/security/2022/dla-3117.data10
-rw-r--r--english/lts/security/2022/dla-3117.wml23
-rw-r--r--english/lts/security/2022/dla-3118.data10
-rw-r--r--english/lts/security/2022/dla-3118.wml23
-rw-r--r--english/lts/security/2022/dla-3119.data10
-rw-r--r--english/lts/security/2022/dla-3119.wml26
-rw-r--r--english/lts/security/2022/dla-3120.data10
-rw-r--r--english/lts/security/2022/dla-3120.wml23
-rw-r--r--english/lts/security/2022/dla-3121.data10
-rw-r--r--english/lts/security/2022/dla-3121.wml27
-rw-r--r--english/lts/security/2022/dla-3122.data10
-rw-r--r--english/lts/security/2022/dla-3122.wml37
-rw-r--r--english/lts/security/2022/dla-3123.data10
-rw-r--r--english/lts/security/2022/dla-3123.wml26
-rw-r--r--english/lts/security/2022/dla-3124.data10
-rw-r--r--english/lts/security/2022/dla-3124.wml32
-rw-r--r--english/lts/security/2022/dla-3125.data10
-rw-r--r--english/lts/security/2022/dla-3125.wml39
-rw-r--r--english/lts/security/2022/dla-3126.data10
-rw-r--r--english/lts/security/2022/dla-3126.wml28
-rw-r--r--english/lts/security/2022/dla-3127.data10
-rw-r--r--english/lts/security/2022/dla-3127.wml26
-rw-r--r--english/lts/security/2022/dla-3128.data10
-rw-r--r--english/lts/security/2022/dla-3128.wml25
-rw-r--r--english/lts/security/2022/dla-3129.data10
-rw-r--r--english/lts/security/2022/dla-3129.wml23
-rw-r--r--english/lts/security/2022/dla-3130.data10
-rw-r--r--english/lts/security/2022/dla-3130.wml25
-rw-r--r--english/lts/security/2022/dla-3131.data10
-rw-r--r--english/lts/security/2022/dla-3131.wml164
-rw-r--r--english/lts/security/2022/dla-3132.data10
-rw-r--r--english/lts/security/2022/dla-3132.wml23
-rw-r--r--english/lts/security/2022/dla-3133.data10
-rw-r--r--english/lts/security/2022/dla-3133.wml23
-rw-r--r--english/lts/security/2022/dla-3134.data9
-rw-r--r--english/lts/security/2022/dla-3134.wml26
-rw-r--r--english/lts/security/2022/dla-3135.data9
-rw-r--r--english/lts/security/2022/dla-3135.wml22
-rw-r--r--english/lts/security/2022/dla-3136.data10
-rw-r--r--english/lts/security/2022/dla-3136.wml22
-rw-r--r--english/lts/security/2022/dla-3137.data10
-rw-r--r--english/lts/security/2022/dla-3137.wml54
-rw-r--r--english/lts/security/2022/dla-3138.data10
-rw-r--r--english/lts/security/2022/dla-3138.wml47
-rw-r--r--english/lts/security/2022/dla-3139.data9
-rw-r--r--english/lts/security/2022/dla-3139.wml34
-rw-r--r--english/lts/security/2022/dla-3140.data9
-rw-r--r--english/lts/security/2022/dla-3140.wml51
-rw-r--r--english/lts/security/2022/dla-3141.data10
-rw-r--r--english/lts/security/2022/dla-3141.wml24
-rw-r--r--english/lts/security/2022/dla-3142.data10
-rw-r--r--english/lts/security/2022/dla-3142.wml23
-rw-r--r--english/lts/security/2022/dla-3143.data9
-rw-r--r--english/lts/security/2022/dla-3143.wml26
-rw-r--r--english/lts/security/2022/dla-3144.data10
-rw-r--r--english/lts/security/2022/dla-3144.wml26
-rw-r--r--english/lts/security/2022/dla-3145.data10
-rw-r--r--english/lts/security/2022/dla-3145.wml42
-rw-r--r--english/lts/security/2022/dla-3146.data10
-rw-r--r--english/lts/security/2022/dla-3146.wml41
-rw-r--r--english/lts/security/2022/dla-3147.data9
-rw-r--r--english/lts/security/2022/dla-3147.wml35
-rw-r--r--english/lts/security/2022/dla-3148.data10
-rw-r--r--english/lts/security/2022/dla-3148.wml37
-rw-r--r--english/lts/security/2022/dla-3149.data10
-rw-r--r--english/lts/security/2022/dla-3149.wml54
-rw-r--r--english/lts/security/2022/dla-3150.data10
-rw-r--r--english/lts/security/2022/dla-3150.wml26
-rw-r--r--english/lts/security/2022/dla-3151.data10
-rw-r--r--english/lts/security/2022/dla-3151.wml37
-rw-r--r--english/lts/security/2022/dla-3152.data10
-rw-r--r--english/lts/security/2022/dla-3152.wml142
-rw-r--r--english/lts/security/2022/dla-3153.data10
-rw-r--r--english/lts/security/2022/dla-3153.wml23
-rw-r--r--english/lts/security/2022/dla-3154.data10
-rw-r--r--english/lts/security/2022/dla-3154.wml22
-rw-r--r--english/lts/security/2022/dla-3155.data10
-rw-r--r--english/lts/security/2022/dla-3155.wml24
-rw-r--r--english/lts/security/2022/dla-3156.data10
-rw-r--r--english/lts/security/2022/dla-3156.wml25
-rw-r--r--english/lts/security/2022/dla-3157.data10
-rw-r--r--english/lts/security/2022/dla-3157.wml74
-rw-r--r--english/lts/security/2022/dla-3158.data10
-rw-r--r--english/lts/security/2022/dla-3158.wml24
-rw-r--r--english/lts/security/2022/dla-3159.data10
-rw-r--r--english/lts/security/2022/dla-3159.wml23
-rw-r--r--english/lts/security/2022/dla-3160.data10
-rw-r--r--english/lts/security/2022/dla-3160.wml50
-rw-r--r--english/lts/security/2022/dla-3161.data9
-rw-r--r--english/lts/security/2022/dla-3161.wml26
-rw-r--r--english/lts/security/2022/dla-3162.data9
-rw-r--r--english/lts/security/2022/dla-3162.wml22
-rw-r--r--english/lts/security/2022/dla-3163.data10
-rw-r--r--english/lts/security/2022/dla-3163.wml24
-rw-r--r--english/lts/security/2022/dla-3164.data9
-rw-r--r--english/lts/security/2022/dla-3164.wml56
-rw-r--r--english/lts/security/2022/dla-3165.data10
-rw-r--r--english/lts/security/2022/dla-3165.wml23
-rw-r--r--english/lts/security/2022/dla-3166.data10
-rw-r--r--english/lts/security/2022/dla-3166.wml24
-rw-r--r--english/lts/security/2022/dla-3167.data10
-rw-r--r--english/lts/security/2022/dla-3167.wml26
-rw-r--r--english/lts/security/2022/dla-3168.data10
-rw-r--r--english/lts/security/2022/dla-3168.wml28
-rw-r--r--english/lts/security/2022/dla-3169.data10
-rw-r--r--english/lts/security/2022/dla-3169.wml22
-rw-r--r--english/lts/security/2022/dla-3170.data10
-rw-r--r--english/lts/security/2022/dla-3170.wml22
-rw-r--r--english/lts/security/2022/dla-3171.data9
-rw-r--r--english/lts/security/2022/dla-3171.wml22
-rw-r--r--english/lts/security/2022/dla-3172.data10
-rw-r--r--english/lts/security/2022/dla-3172.wml40
-rw-r--r--english/lts/security/2022/dla-3173.data10
-rw-r--r--english/lts/security/2022/dla-3173.wml224
-rw-r--r--english/lts/security/2022/dla-3174.data10
-rw-r--r--english/lts/security/2022/dla-3174.wml22
-rw-r--r--english/lts/security/2022/dla-3175.data10
-rw-r--r--english/lts/security/2022/dla-3175.wml25
-rw-r--r--english/lts/security/2022/dla-3176.data10
-rw-r--r--english/lts/security/2022/dla-3176.wml76
-rw-r--r--english/lts/security/2022/dla-3177.data9
-rw-r--r--english/lts/security/2022/dla-3177.wml44
-rw-r--r--english/lts/security/2022/dla-3178.data9
-rw-r--r--english/lts/security/2022/dla-3178.wml23
-rw-r--r--english/lts/security/2022/dla-3179.data9
-rw-r--r--english/lts/security/2022/dla-3179.wml30
-rw-r--r--english/lts/security/2022/dla-3180.data10
-rw-r--r--english/lts/security/2022/dla-3180.wml22
-rw-r--r--english/lts/security/2022/dla-3181.data9
-rw-r--r--english/lts/security/2022/dla-3181.wml32
-rw-r--r--english/lts/security/2022/dla-3182.data10
-rw-r--r--english/lts/security/2022/dla-3182.wml23
-rw-r--r--english/lts/security/2022/dla-3183.data10
-rw-r--r--english/lts/security/2022/dla-3183.wml42
-rw-r--r--english/lts/security/2022/dla-3184.data10
-rw-r--r--english/lts/security/2022/dla-3184.wml23
-rw-r--r--english/lts/security/2022/dla-3185.data10
-rw-r--r--english/lts/security/2022/dla-3185.wml23
-rw-r--r--english/lts/security/2022/dla-3186.data10
-rw-r--r--english/lts/security/2022/dla-3186.wml35
-rw-r--r--english/lts/security/2022/dla-3187.data10
-rw-r--r--english/lts/security/2022/dla-3187.wml27
-rw-r--r--english/lts/security/2022/dla-3188.data10
-rw-r--r--english/lts/security/2022/dla-3188.wml44
-rw-r--r--english/lts/security/2022/dla-3189.data9
-rw-r--r--english/lts/security/2022/dla-3189.wml24
-rw-r--r--english/lts/security/2022/dla-3190-2.data10
-rw-r--r--english/lts/security/2022/dla-3190-2.wml31
-rw-r--r--english/lts/security/2022/dla-3190.data10
-rw-r--r--english/lts/security/2022/dla-3190.wml26
-rw-r--r--english/lts/security/2022/dla-3191.data9
-rw-r--r--english/lts/security/2022/dla-3191.wml40
-rw-r--r--english/lts/security/2022/dla-3192.data10
-rw-r--r--english/lts/security/2022/dla-3192.wml22
-rw-r--r--english/lts/security/2022/dla-3193.data10
-rw-r--r--english/lts/security/2022/dla-3193.wml22
-rw-r--r--english/lts/security/2022/dla-3194.data10
-rw-r--r--english/lts/security/2022/dla-3194.wml30
-rw-r--r--english/lts/security/2022/dla-3195.data10
-rw-r--r--english/lts/security/2022/dla-3195.wml23
-rw-r--r--english/lts/security/2022/dla-3196.data10
-rw-r--r--english/lts/security/2022/dla-3196.wml23
-rw-r--r--english/lts/security/2022/dla-3197.data10
-rw-r--r--english/lts/security/2022/dla-3197.wml24
-rw-r--r--english/lts/security/2022/dla-3198.data10
-rw-r--r--english/lts/security/2022/dla-3198.wml25
-rw-r--r--english/lts/security/2022/dla-3199.data10
-rw-r--r--english/lts/security/2022/dla-3199.wml24
-rw-r--r--english/lts/security/2022/dla-3200.data10
-rw-r--r--english/lts/security/2022/dla-3200.wml26
-rw-r--r--english/lts/security/2022/dla-3201.data10
-rw-r--r--english/lts/security/2022/dla-3201.wml26
-rw-r--r--english/lts/security/2022/dla-3202.data10
-rw-r--r--english/lts/security/2022/dla-3202.wml40
-rw-r--r--english/lts/security/2022/dla-3203.data10
-rw-r--r--english/lts/security/2022/dla-3203.wml42
-rw-r--r--english/lts/security/2022/dla-3204.data10
-rw-r--r--english/lts/security/2022/dla-3204.wml85
-rw-r--r--english/lts/security/2022/dla-3205.data10
-rw-r--r--english/lts/security/2022/dla-3205.wml50
-rw-r--r--english/lts/security/2022/dla-3206.data10
-rw-r--r--english/lts/security/2022/dla-3206.wml83
-rw-r--r--english/lts/security/2022/dla-3207.data10
-rw-r--r--english/lts/security/2022/dla-3207.wml44
-rw-r--r--english/lts/security/2022/dla-3208.data10
-rw-r--r--english/lts/security/2022/dla-3208.wml26
-rw-r--r--english/lts/security/2022/dla-3209.data10
-rw-r--r--english/lts/security/2022/dla-3209.wml23
-rw-r--r--english/lts/security/2022/dla-3210.data9
-rw-r--r--english/lts/security/2022/dla-3210.wml33
-rw-r--r--english/lts/security/2022/dla-3211.data9
-rw-r--r--english/lts/security/2022/dla-3211.wml29
-rw-r--r--english/lts/security/2022/dla-3212.data10
-rw-r--r--english/lts/security/2022/dla-3212.wml23
-rw-r--r--english/lts/security/2022/dla-3213.data9
-rw-r--r--english/lts/security/2022/dla-3213.wml29
-rw-r--r--english/lts/security/2022/dla-3214.data10
-rw-r--r--english/lts/security/2022/dla-3214.wml23
-rw-r--r--english/lts/security/2022/dla-3215.data10
-rw-r--r--english/lts/security/2022/dla-3215.wml22
-rw-r--r--english/lts/security/2022/dla-3216.data10
-rw-r--r--english/lts/security/2022/dla-3216.wml23
-rw-r--r--english/lts/security/2022/dla-3217.data10
-rw-r--r--english/lts/security/2022/dla-3217.wml24
-rw-r--r--english/lts/security/2022/dla-3218.data10
-rw-r--r--english/lts/security/2022/dla-3218.wml29
-rw-r--r--english/lts/security/2022/dla-3219.data10
-rw-r--r--english/lts/security/2022/dla-3219.wml25
-rw-r--r--english/lts/security/2022/dla-3220.data9
-rw-r--r--english/lts/security/2022/dla-3220.wml26
-rw-r--r--english/lts/security/2022/dla-3221.data10
-rw-r--r--english/lts/security/2022/dla-3221.wml40
-rw-r--r--english/lts/security/2022/dla-3222.data10
-rw-r--r--english/lts/security/2022/dla-3222.wml24
-rw-r--r--english/lts/security/2022/dla-3223.data10
-rw-r--r--english/lts/security/2022/dla-3223.wml39
-rw-r--r--english/lts/security/2022/dla-3224.data10
-rw-r--r--english/lts/security/2022/dla-3224.wml22
-rw-r--r--english/lts/security/2022/dla-3225.data10
-rw-r--r--english/lts/security/2022/dla-3225.wml23
-rw-r--r--english/lts/security/2022/dla-3226.data10
-rw-r--r--english/lts/security/2022/dla-3226.wml413
-rw-r--r--english/lts/security/2022/dla-3227.data10
-rw-r--r--english/lts/security/2022/dla-3227.wml23
-rw-r--r--english/lts/security/2022/dla-3228.data10
-rw-r--r--english/lts/security/2022/dla-3228.wml23
-rw-r--r--english/lts/security/2022/dla-3229.data10
-rw-r--r--english/lts/security/2022/dla-3229.wml25
-rw-r--r--english/lts/security/2022/dla-3230.data10
-rw-r--r--english/lts/security/2022/dla-3230.wml57
-rw-r--r--english/lts/security/2022/dla-3231.data10
-rw-r--r--english/lts/security/2022/dla-3231.wml43
-rw-r--r--english/lts/security/2022/dla-3232.data10
-rw-r--r--english/lts/security/2022/dla-3232.wml73
-rw-r--r--english/lts/security/2022/dla-3233.data10
-rw-r--r--english/lts/security/2022/dla-3233.wml22
-rw-r--r--english/lts/security/2022/dla-3234.data10
-rw-r--r--english/lts/security/2022/dla-3234.wml30
-rw-r--r--english/lts/security/2022/dla-3235.data10
-rw-r--r--english/lts/security/2022/dla-3235.wml24
-rw-r--r--english/lts/security/2022/dla-3236.data10
-rw-r--r--english/lts/security/2022/dla-3236.wml24
-rw-r--r--english/lts/security/2022/dla-3237.data10
-rw-r--r--english/lts/security/2022/dla-3237.wml49
-rw-r--r--english/lts/security/2022/dla-3238.data10
-rw-r--r--english/lts/security/2022/dla-3238.wml32
-rw-r--r--english/lts/security/2022/dla-3239-2.data9
-rw-r--r--english/lts/security/2022/dla-3239-2.wml72
-rw-r--r--english/lts/security/2022/dla-3239.data10
-rw-r--r--english/lts/security/2022/dla-3239.wml67
-rw-r--r--english/lts/security/2022/dla-3240.data10
-rw-r--r--english/lts/security/2022/dla-3240.wml64
-rw-r--r--english/lts/security/2022/dla-3241.data10
-rw-r--r--english/lts/security/2022/dla-3241.wml23
-rw-r--r--english/lts/security/2022/dla-3242.data10
-rw-r--r--english/lts/security/2022/dla-3242.wml23
-rw-r--r--english/lts/security/2022/dla-3243.data10
-rw-r--r--english/lts/security/2022/dla-3243.wml24
-rw-r--r--english/lts/security/2022/dla-3244.data10
-rw-r--r--english/lts/security/2022/dla-3244.wml173
-rw-r--r--english/lts/security/2022/dla-3245.data10
-rw-r--r--english/lts/security/2022/dla-3245.wml184
-rw-r--r--english/lts/security/2022/dla-3246.data9
-rw-r--r--english/lts/security/2022/dla-3246.wml39
-rw-r--r--english/lts/security/2022/dla-3247.data9
-rw-r--r--english/lts/security/2022/dla-3247.wml37
-rw-r--r--english/lts/security/2022/dla-3248.data10
-rw-r--r--english/lts/security/2022/dla-3248.wml23
-rw-r--r--english/lts/security/2022/dla-3249.data10
-rw-r--r--english/lts/security/2022/dla-3249.wml24
-rw-r--r--english/lts/security/2022/dla-3250.data10
-rw-r--r--english/lts/security/2022/dla-3250.wml53
-rw-r--r--english/lts/security/2022/dla-3251.data10
-rw-r--r--english/lts/security/2022/dla-3251.wml26
-rw-r--r--english/lts/security/2022/dla-3252.data10
-rw-r--r--english/lts/security/2022/dla-3252.wml57
-rw-r--r--english/lts/security/2022/dla-3253.data9
-rw-r--r--english/lts/security/2022/dla-3253.wml32
-rw-r--r--english/lts/security/2022/dla-3254.data9
-rw-r--r--english/lts/security/2022/dla-3254.wml34
-rw-r--r--english/lts/security/2022/dla-3255.data10
-rw-r--r--english/lts/security/2022/dla-3255.wml26
-rw-r--r--english/lts/security/2022/dla-3256.data10
-rw-r--r--english/lts/security/2022/dla-3256.wml25
-rw-r--r--english/lts/security/2022/dla-3257.data9
-rw-r--r--english/lts/security/2022/dla-3257.wml36
-rw-r--r--english/lts/security/2022/dla-3258.data10
-rw-r--r--english/lts/security/2022/dla-3258.wml22
-rw-r--r--english/lts/security/2022/dla-3259.data10
-rw-r--r--english/lts/security/2022/dla-3259.wml25
-rw-r--r--english/lts/security/2022/index.wml11
-rw-r--r--english/lts/security/2023/Makefile42
-rw-r--r--english/lts/security/2023/dla-3193-2.data10
-rw-r--r--english/lts/security/2023/dla-3193-2.wml23
-rw-r--r--english/lts/security/2023/dla-3260.data10
-rw-r--r--english/lts/security/2023/dla-3260.wml43
-rw-r--r--english/lts/security/2023/dla-3261.data9
-rw-r--r--english/lts/security/2023/dla-3261.wml27
-rw-r--r--english/lts/security/2023/dla-3262.data9
-rw-r--r--english/lts/security/2023/dla-3262.wml31
-rw-r--r--english/lts/security/2023/dla-3263.data9
-rw-r--r--english/lts/security/2023/dla-3263.wml27
-rw-r--r--english/lts/security/2023/dla-3264.data9
-rw-r--r--english/lts/security/2023/dla-3264.wml34
-rw-r--r--english/lts/security/2023/dla-3265.data10
-rw-r--r--english/lts/security/2023/dla-3265.wml198
-rw-r--r--english/lts/security/2023/dla-3266.data9
-rw-r--r--english/lts/security/2023/dla-3266.wml68
-rw-r--r--english/lts/security/2023/dla-3267.data10
-rw-r--r--english/lts/security/2023/dla-3267.wml27
-rw-r--r--english/lts/security/2023/dla-3268.data10
-rw-r--r--english/lts/security/2023/dla-3268.wml24
-rw-r--r--english/lts/security/2023/dla-3269.data10
-rw-r--r--english/lts/security/2023/dla-3269.wml24
-rw-r--r--english/lts/security/2023/dla-3270.data10
-rw-r--r--english/lts/security/2023/dla-3270.wml38
-rw-r--r--english/lts/security/2023/dla-3271.data10
-rw-r--r--english/lts/security/2023/dla-3271.wml24
-rw-r--r--english/lts/security/2023/dla-3272.data10
-rw-r--r--english/lts/security/2023/dla-3272.wml31
-rw-r--r--english/lts/security/2023/dla-3273.data10
-rw-r--r--english/lts/security/2023/dla-3273.wml23
-rw-r--r--english/lts/security/2023/dla-3274.data10
-rw-r--r--english/lts/security/2023/dla-3274.wml61
-rw-r--r--english/lts/security/2023/dla-3275.data10
-rw-r--r--english/lts/security/2023/dla-3275.wml23
-rw-r--r--english/lts/security/2023/dla-3276.data10
-rw-r--r--english/lts/security/2023/dla-3276.wml24
-rw-r--r--english/lts/security/2023/dla-3277.data10
-rw-r--r--english/lts/security/2023/dla-3277.wml29
-rw-r--r--english/lts/security/2023/dla-3278.data10
-rw-r--r--english/lts/security/2023/dla-3278.wml88
-rw-r--r--english/lts/security/2023/dla-3279.data10
-rw-r--r--english/lts/security/2023/dla-3279.wml49
-rw-r--r--english/lts/security/2023/dla-3280.data10
-rw-r--r--english/lts/security/2023/dla-3280.wml163
-rw-r--r--english/lts/security/2023/dla-3281.data10
-rw-r--r--english/lts/security/2023/dla-3281.wml22
-rw-r--r--english/lts/security/2023/dla-3282.data10
-rw-r--r--english/lts/security/2023/dla-3282.wml62
-rw-r--r--english/lts/security/2023/dla-3283.data10
-rw-r--r--english/lts/security/2023/dla-3283.wml44
-rw-r--r--english/lts/security/2023/dla-3284.data10
-rw-r--r--english/lts/security/2023/dla-3284.wml31
-rw-r--r--english/lts/security/2023/dla-3285.data10
-rw-r--r--english/lts/security/2023/dla-3285.wml31
-rw-r--r--english/lts/security/2023/dla-3286.data10
-rw-r--r--english/lts/security/2023/dla-3286.wml25
-rw-r--r--english/lts/security/2023/dla-3287.data10
-rw-r--r--english/lts/security/2023/dla-3287.wml52
-rw-r--r--english/lts/security/2023/dla-3288.data10
-rw-r--r--english/lts/security/2023/dla-3288.wml25
-rw-r--r--english/lts/security/2023/dla-3289.data10
-rw-r--r--english/lts/security/2023/dla-3289.wml35
-rw-r--r--english/lts/security/2023/dla-3290.data10
-rw-r--r--english/lts/security/2023/dla-3290.wml24
-rw-r--r--english/lts/security/2023/dla-3291.data10
-rw-r--r--english/lts/security/2023/dla-3291.wml42
-rw-r--r--english/lts/security/2023/dla-3292.data10
-rw-r--r--english/lts/security/2023/dla-3292.wml23
-rw-r--r--english/lts/security/2023/dla-3293.data10
-rw-r--r--english/lts/security/2023/dla-3293.wml118
-rw-r--r--english/lts/security/2023/dla-3294.data10
-rw-r--r--english/lts/security/2023/dla-3294.wml26
-rw-r--r--english/lts/security/2023/dla-3295.data10
-rw-r--r--english/lts/security/2023/dla-3295.wml44
-rw-r--r--english/lts/security/2023/dla-3296.data10
-rw-r--r--english/lts/security/2023/dla-3296.wml23
-rw-r--r--english/lts/security/2023/dla-3297.data10
-rw-r--r--english/lts/security/2023/dla-3297.wml23
-rw-r--r--english/lts/security/2023/dla-3298.data10
-rw-r--r--english/lts/security/2023/dla-3298.wml23
-rw-r--r--english/lts/security/2023/dla-3299.data10
-rw-r--r--english/lts/security/2023/dla-3299.wml26
-rw-r--r--english/lts/security/2023/dla-3300.data10
-rw-r--r--english/lts/security/2023/dla-3300.wml25
-rw-r--r--english/lts/security/2023/dla-3301.data10
-rw-r--r--english/lts/security/2023/dla-3301.wml25
-rw-r--r--english/lts/security/2023/dla-3302.data10
-rw-r--r--english/lts/security/2023/dla-3302.wml26
-rw-r--r--english/lts/security/2023/dla-3303.data10
-rw-r--r--english/lts/security/2023/dla-3303.wml25
-rw-r--r--english/lts/security/2023/dla-3304.data10
-rw-r--r--english/lts/security/2023/dla-3304.wml45
-rw-r--r--english/lts/security/2023/dla-3305.data10
-rw-r--r--english/lts/security/2023/dla-3305.wml78
-rw-r--r--english/lts/security/2023/dla-3306.data9
-rw-r--r--english/lts/security/2023/dla-3306.wml32
-rw-r--r--english/lts/security/2023/dla-3307.data10
-rw-r--r--english/lts/security/2023/dla-3307.wml22
-rw-r--r--english/lts/security/2023/dla-3308.data10
-rw-r--r--english/lts/security/2023/dla-3308.wml43
-rw-r--r--english/lts/security/2023/dla-3309.data9
-rw-r--r--english/lts/security/2023/dla-3309.wml51
-rw-r--r--english/lts/security/2023/dla-3310.data10
-rw-r--r--english/lts/security/2023/dla-3310.wml27
-rw-r--r--english/lts/security/2023/dla-3311.data10
-rw-r--r--english/lts/security/2023/dla-3311.wml25
-rw-r--r--english/lts/security/2023/dla-3312.data9
-rw-r--r--english/lts/security/2023/dla-3312.wml28
-rw-r--r--english/lts/security/2023/dla-3313.data10
-rw-r--r--english/lts/security/2023/dla-3313.wml63
-rw-r--r--english/lts/security/2023/dla-3314.data10
-rw-r--r--english/lts/security/2023/dla-3314.wml24
-rw-r--r--english/lts/security/2023/dla-3315-2.data10
-rw-r--r--english/lts/security/2023/dla-3315-2.wml23
-rw-r--r--english/lts/security/2023/dla-3315.data10
-rw-r--r--english/lts/security/2023/dla-3315.wml83
-rw-r--r--english/lts/security/2023/dla-3316.data10
-rw-r--r--english/lts/security/2023/dla-3316.wml33
-rw-r--r--english/lts/security/2023/dla-3317.data10
-rw-r--r--english/lts/security/2023/dla-3317.wml24
-rw-r--r--english/lts/security/2023/dla-3318.data10
-rw-r--r--english/lts/security/2023/dla-3318.wml23
-rw-r--r--english/lts/security/2023/dla-3319.data10
-rw-r--r--english/lts/security/2023/dla-3319.wml23
-rw-r--r--english/lts/security/2023/dla-3320.data10
-rw-r--r--english/lts/security/2023/dla-3320.wml33
-rw-r--r--english/lts/security/2023/dla-3321.data10
-rw-r--r--english/lts/security/2023/dla-3321.wml22
-rw-r--r--english/lts/security/2023/dla-3322.data10
-rw-r--r--english/lts/security/2023/dla-3322.wml27
-rw-r--r--english/lts/security/2023/dla-3323.data10
-rw-r--r--english/lts/security/2023/dla-3323.wml24
-rw-r--r--english/lts/security/2023/dla-3324.data10
-rw-r--r--english/lts/security/2023/dla-3324.wml22
-rw-r--r--english/lts/security/2023/dla-3325.data10
-rw-r--r--english/lts/security/2023/dla-3325.wml27
-rw-r--r--english/lts/security/2023/dla-3326.data10
-rw-r--r--english/lts/security/2023/dla-3326.wml22
-rw-r--r--english/lts/security/2023/dla-3327.data10
-rw-r--r--english/lts/security/2023/dla-3327.wml58
-rw-r--r--english/lts/security/2023/dla-3328.data10
-rw-r--r--english/lts/security/2023/dla-3328.wml23
-rw-r--r--english/lts/security/2023/dla-3329.data9
-rw-r--r--english/lts/security/2023/dla-3329.wml35
-rw-r--r--english/lts/security/2023/dla-3330.data9
-rw-r--r--english/lts/security/2023/dla-3330.wml28
-rw-r--r--english/lts/security/2023/dla-3331-2.data9
-rw-r--r--english/lts/security/2023/dla-3331-2.wml33
-rw-r--r--english/lts/security/2023/dla-3331.data9
-rw-r--r--english/lts/security/2023/dla-3331.wml28
-rw-r--r--english/lts/security/2023/dla-3332.data10
-rw-r--r--english/lts/security/2023/dla-3332.wml23
-rw-r--r--english/lts/security/2023/dla-3333.data10
-rw-r--r--english/lts/security/2023/dla-3333.wml24
-rw-r--r--english/lts/security/2023/dla-3334.data10
-rw-r--r--english/lts/security/2023/dla-3334.wml23
-rw-r--r--english/lts/security/2023/dla-3335.data10
-rw-r--r--english/lts/security/2023/dla-3335.wml24
-rw-r--r--english/lts/security/2023/dla-3336.data10
-rw-r--r--english/lts/security/2023/dla-3336.wml72
-rw-r--r--english/lts/security/2023/dla-3337.data10
-rw-r--r--english/lts/security/2023/dla-3337.wml27
-rw-r--r--english/lts/security/2023/dla-3338.data10
-rw-r--r--english/lts/security/2023/dla-3338.wml37
-rw-r--r--english/lts/security/2023/dla-3339.data10
-rw-r--r--english/lts/security/2023/dla-3339.wml22
-rw-r--r--english/lts/security/2023/dla-3340.data10
-rw-r--r--english/lts/security/2023/dla-3340.wml54
-rw-r--r--english/lts/security/2023/dla-3341.data10
-rw-r--r--english/lts/security/2023/dla-3341.wml22
-rw-r--r--english/lts/security/2023/dla-3342.data10
-rw-r--r--english/lts/security/2023/dla-3342.wml44
-rw-r--r--english/lts/security/2023/dla-3343.data10
-rw-r--r--english/lts/security/2023/dla-3343.wml23
-rw-r--r--english/lts/security/2023/dla-3344.data10
-rw-r--r--english/lts/security/2023/dla-3344.wml40
-rw-r--r--english/lts/security/2023/dla-3345.data10
-rw-r--r--english/lts/security/2023/dla-3345.wml57
-rw-r--r--english/lts/security/2023/dla-3346.data10
-rw-r--r--english/lts/security/2023/dla-3346.wml51
-rw-r--r--english/lts/security/2023/dla-3347-2.data9
-rw-r--r--english/lts/security/2023/dla-3347-2.wml22
-rw-r--r--english/lts/security/2023/dla-3347.data10
-rw-r--r--english/lts/security/2023/dla-3347.wml23
-rw-r--r--english/lts/security/2023/dla-3348.data10
-rw-r--r--english/lts/security/2023/dla-3348.wml23
-rw-r--r--english/lts/security/2023/dla-3349.data10
-rw-r--r--english/lts/security/2023/dla-3349.wml126
-rw-r--r--english/lts/security/2023/dla-3350.data10
-rw-r--r--english/lts/security/2023/dla-3350.wml25
-rw-r--r--english/lts/security/2023/dla-3351.data10
-rw-r--r--english/lts/security/2023/dla-3351.wml51
-rw-r--r--english/lts/security/2023/dla-3352.data10
-rw-r--r--english/lts/security/2023/dla-3352.wml89
-rw-r--r--english/lts/security/2023/dla-3353.data10
-rw-r--r--english/lts/security/2023/dla-3353.wml34
-rw-r--r--english/lts/security/2023/dla-3354.data10
-rw-r--r--english/lts/security/2023/dla-3354.wml22
-rw-r--r--english/lts/security/2023/dla-3355.data10
-rw-r--r--english/lts/security/2023/dla-3355.wml24
-rw-r--r--english/lts/security/2023/dla-3356.data10
-rw-r--r--english/lts/security/2023/dla-3356.wml15
-rw-r--r--english/lts/security/2023/dla-3357-2.data10
-rw-r--r--english/lts/security/2023/dla-3357-2.wml24
-rw-r--r--english/lts/security/2023/dla-3357.data10
-rw-r--r--english/lts/security/2023/dla-3357.wml239
-rw-r--r--english/lts/security/2023/dla-3358.data10
-rw-r--r--english/lts/security/2023/dla-3358.wml25
-rw-r--r--english/lts/security/2023/dla-3359.data10
-rw-r--r--english/lts/security/2023/dla-3359.wml38
-rw-r--r--english/lts/security/2023/dla-3360.data10
-rw-r--r--english/lts/security/2023/dla-3360.wml37
-rw-r--r--english/lts/security/2023/dla-3361.data9
-rw-r--r--english/lts/security/2023/dla-3361.wml32
-rw-r--r--english/lts/security/2023/dla-3362.data10
-rw-r--r--english/lts/security/2023/dla-3362.wml105
-rw-r--r--english/lts/security/2023/dla-3363.data10
-rw-r--r--english/lts/security/2023/dla-3363.wml48
-rw-r--r--english/lts/security/2023/dla-3364.data10
-rw-r--r--english/lts/security/2023/dla-3364.wml23
-rw-r--r--english/lts/security/2023/dla-3365.data10
-rw-r--r--english/lts/security/2023/dla-3365.wml23
-rw-r--r--english/lts/security/2023/dla-3366.data9
-rw-r--r--english/lts/security/2023/dla-3366.wml27
-rw-r--r--english/lts/security/2023/dla-3367.data9
-rw-r--r--english/lts/security/2023/dla-3367.wml22
-rw-r--r--english/lts/security/2023/dla-3368.data10
-rw-r--r--english/lts/security/2023/dla-3368.wml88
-rw-r--r--english/lts/security/2023/dla-3369.data10
-rw-r--r--english/lts/security/2023/dla-3369.wml66
-rw-r--r--english/lts/security/2023/dla-3370.data10
-rw-r--r--english/lts/security/2023/dla-3370.wml58
-rw-r--r--english/lts/security/2023/dla-3371.data10
-rw-r--r--english/lts/security/2023/dla-3371.wml69
-rw-r--r--english/lts/security/2023/dla-3372.data10
-rw-r--r--english/lts/security/2023/dla-3372.wml25
-rw-r--r--english/lts/security/2023/dla-3373.data10
-rw-r--r--english/lts/security/2023/dla-3373.wml43
-rw-r--r--english/lts/security/2023/dla-3374.data10
-rw-r--r--english/lts/security/2023/dla-3374.wml25
-rw-r--r--english/lts/security/2023/dla-3375.data9
-rw-r--r--english/lts/security/2023/dla-3375.wml38
-rw-r--r--english/lts/security/2023/dla-3376.data10
-rw-r--r--english/lts/security/2023/dla-3376.wml41
-rw-r--r--english/lts/security/2023/dla-3377.data10
-rw-r--r--english/lts/security/2023/dla-3377.wml22
-rw-r--r--english/lts/security/2023/dla-3378.data10
-rw-r--r--english/lts/security/2023/dla-3378.wml25
-rw-r--r--english/lts/security/2023/dla-3379.data10
-rw-r--r--english/lts/security/2023/dla-3379.wml72
-rw-r--r--english/lts/security/2023/dla-3380.data10
-rw-r--r--english/lts/security/2023/dla-3380.wml134
-rw-r--r--english/lts/security/2023/dla-3381.data9
-rw-r--r--english/lts/security/2023/dla-3381.wml33
-rw-r--r--english/lts/security/2023/dla-3382.data10
-rw-r--r--english/lts/security/2023/dla-3382.wml25
-rw-r--r--english/lts/security/2023/dla-3383.data9
-rw-r--r--english/lts/security/2023/dla-3383.wml42
-rw-r--r--english/lts/security/2023/dla-3384.data10
-rw-r--r--english/lts/security/2023/dla-3384.wml42
-rw-r--r--english/lts/security/2023/dla-3385.data10
-rw-r--r--english/lts/security/2023/dla-3385.wml23
-rw-r--r--english/lts/security/2023/dla-3386.data9
-rw-r--r--english/lts/security/2023/dla-3386.wml28
-rw-r--r--english/lts/security/2023/dla-3387-2.data10
-rw-r--r--english/lts/security/2023/dla-3387-2.wml22
-rw-r--r--english/lts/security/2023/dla-3387.data10
-rw-r--r--english/lts/security/2023/dla-3387.wml24
-rw-r--r--english/lts/security/2023/dla-3388.data10
-rw-r--r--english/lts/security/2023/dla-3388.wml24
-rw-r--r--english/lts/security/2023/dla-3389.data9
-rw-r--r--english/lts/security/2023/dla-3389.wml35
-rw-r--r--english/lts/security/2023/dla-3390.data10
-rw-r--r--english/lts/security/2023/dla-3390.wml98
-rw-r--r--english/lts/security/2023/dla-3391.data10
-rw-r--r--english/lts/security/2023/dla-3391.wml23
-rw-r--r--english/lts/security/2023/dla-3392.data10
-rw-r--r--english/lts/security/2023/dla-3392.wml34
-rw-r--r--english/lts/security/2023/dla-3393.data10
-rw-r--r--english/lts/security/2023/dla-3393.wml48
-rw-r--r--english/lts/security/2023/dla-3394.data10
-rw-r--r--english/lts/security/2023/dla-3394.wml27
-rw-r--r--english/lts/security/2023/dla-3395-2.data9
-rw-r--r--english/lts/security/2023/dla-3395-2.wml25
-rw-r--r--english/lts/security/2023/dla-3395.data10
-rw-r--r--english/lts/security/2023/dla-3395.wml80
-rw-r--r--english/lts/security/2023/dla-3396.data9
-rw-r--r--english/lts/security/2023/dla-3396.wml35
-rw-r--r--english/lts/security/2023/dla-3397.data9
-rw-r--r--english/lts/security/2023/dla-3397.wml35
-rw-r--r--english/lts/security/2023/dla-3398.data10
-rw-r--r--english/lts/security/2023/dla-3398.wml68
-rw-r--r--english/lts/security/2023/dla-3399.data10
-rw-r--r--english/lts/security/2023/dla-3399.wml83
-rw-r--r--english/lts/security/2023/dla-3400.data10
-rw-r--r--english/lts/security/2023/dla-3400.wml22
-rw-r--r--english/lts/security/2023/dla-3401.data10
-rw-r--r--english/lts/security/2023/dla-3401.wml49
-rw-r--r--english/lts/security/2023/dla-3402.data10
-rw-r--r--english/lts/security/2023/dla-3402.wml41
-rw-r--r--english/lts/security/2023/dla-3403.data10
-rw-r--r--english/lts/security/2023/dla-3403.wml304
-rw-r--r--english/lts/security/2023/dla-3404.data10
-rw-r--r--english/lts/security/2023/dla-3404.wml308
-rw-r--r--english/lts/security/2023/dla-3405.data10
-rw-r--r--english/lts/security/2023/dla-3405.wml39
-rw-r--r--english/lts/security/2023/dla-3406.data10
-rw-r--r--english/lts/security/2023/dla-3406.wml26
-rw-r--r--english/lts/security/2023/dla-3407.data10
-rw-r--r--english/lts/security/2023/dla-3407.wml22
-rw-r--r--english/lts/security/2023/dla-3408.data10
-rw-r--r--english/lts/security/2023/dla-3408.wml60
-rw-r--r--english/lts/security/2023/dla-3409.data10
-rw-r--r--english/lts/security/2023/dla-3409.wml50
-rw-r--r--english/lts/security/2023/dla-3410.data10
-rw-r--r--english/lts/security/2023/dla-3410.wml30
-rw-r--r--english/lts/security/2023/dla-3411.data9
-rw-r--r--english/lts/security/2023/dla-3411.wml23
-rw-r--r--english/lts/security/2023/dla-3412.data9
-rw-r--r--english/lts/security/2023/dla-3412.wml25
-rw-r--r--english/lts/security/2023/dla-3413.data9
-rw-r--r--english/lts/security/2023/dla-3413.wml22
-rw-r--r--english/lts/security/2023/dla-3414.data9
-rw-r--r--english/lts/security/2023/dla-3414.wml29
-rw-r--r--english/lts/security/2023/dla-3415.data9
-rw-r--r--english/lts/security/2023/dla-3415.wml43
-rw-r--r--english/lts/security/2023/dla-3416.data10
-rw-r--r--english/lts/security/2023/dla-3416.wml22
-rw-r--r--english/lts/security/2023/dla-3417.data10
-rw-r--r--english/lts/security/2023/dla-3417.wml23
-rw-r--r--english/lts/security/2023/dla-3418.data10
-rw-r--r--english/lts/security/2023/dla-3418.wml83
-rw-r--r--english/lts/security/2023/dla-3419.data10
-rw-r--r--english/lts/security/2023/dla-3419.wml53
-rw-r--r--english/lts/security/2023/dla-3420.data10
-rw-r--r--english/lts/security/2023/dla-3420.wml26
-rw-r--r--english/lts/security/2023/dla-3421.data10
-rw-r--r--english/lts/security/2023/dla-3421.wml22
-rw-r--r--english/lts/security/2023/dla-3422.data10
-rw-r--r--english/lts/security/2023/dla-3422.wml22
-rw-r--r--english/lts/security/2023/dla-3423.data9
-rw-r--r--english/lts/security/2023/dla-3423.wml36
-rw-r--r--english/lts/security/2023/dla-3424.data10
-rw-r--r--english/lts/security/2023/dla-3424.wml27
-rw-r--r--english/lts/security/2023/dla-3425.data10
-rw-r--r--english/lts/security/2023/dla-3425.wml23
-rw-r--r--english/lts/security/2023/dla-3426-2.data10
-rw-r--r--english/lts/security/2023/dla-3426-2.wml23
-rw-r--r--english/lts/security/2023/dla-3426-3.data10
-rw-r--r--english/lts/security/2023/dla-3426-3.wml28
-rw-r--r--english/lts/security/2023/dla-3426.data10
-rw-r--r--english/lts/security/2023/dla-3426.wml23
-rw-r--r--english/lts/security/2023/dla-3427-2.data10
-rw-r--r--english/lts/security/2023/dla-3427-2.wml34
-rw-r--r--english/lts/security/2023/dla-3427.data10
-rw-r--r--english/lts/security/2023/dla-3427.wml23
-rw-r--r--english/lts/security/2023/dla-3428.data10
-rw-r--r--english/lts/security/2023/dla-3428.wml26
-rw-r--r--english/lts/security/2023/dla-3429.data10
-rw-r--r--english/lts/security/2023/dla-3429.wml88
-rw-r--r--english/lts/security/2023/dla-3430.data10
-rw-r--r--english/lts/security/2023/dla-3430.wml25
-rw-r--r--english/lts/security/2023/dla-3431.data10
-rw-r--r--english/lts/security/2023/dla-3431.wml40
-rw-r--r--english/lts/security/2023/dla-3432.data10
-rw-r--r--english/lts/security/2023/dla-3432.wml97
-rw-r--r--english/lts/security/2023/dla-3433.data10
-rw-r--r--english/lts/security/2023/dla-3433.wml39
-rw-r--r--english/lts/security/2023/dla-3434.data10
-rw-r--r--english/lts/security/2023/dla-3434.wml43
-rw-r--r--english/lts/security/2023/dla-3435.data10
-rw-r--r--english/lts/security/2023/dla-3435.wml39
-rw-r--r--english/lts/security/2023/dla-3436-2.data9
-rw-r--r--english/lts/security/2023/dla-3436-2.wml29
-rw-r--r--english/lts/security/2023/dla-3436.data10
-rw-r--r--english/lts/security/2023/dla-3436.wml72
-rw-r--r--english/lts/security/2023/dla-3437.data10
-rw-r--r--english/lts/security/2023/dla-3437.wml44
-rw-r--r--english/lts/security/2023/dla-3438.data9
-rw-r--r--english/lts/security/2023/dla-3438.wml27
-rw-r--r--english/lts/security/2023/dla-3439.data9
-rw-r--r--english/lts/security/2023/dla-3439.wml26
-rw-r--r--english/lts/security/2023/dla-3440.data10
-rw-r--r--english/lts/security/2023/dla-3440.wml27
-rw-r--r--english/lts/security/2023/dla-3441.data9
-rw-r--r--english/lts/security/2023/dla-3441.wml41
-rw-r--r--english/lts/security/2023/dla-3442.data10
-rw-r--r--english/lts/security/2023/dla-3442.wml56
-rw-r--r--english/lts/security/2023/dla-3443.data10
-rw-r--r--english/lts/security/2023/dla-3443.wml41
-rw-r--r--english/lts/security/2023/dla-3444.data10
-rw-r--r--english/lts/security/2023/dla-3444.wml37
-rw-r--r--english/lts/security/2023/dla-3445.data10
-rw-r--r--english/lts/security/2023/dla-3445.wml34
-rw-r--r--english/lts/security/2023/dla-3446.data10
-rw-r--r--english/lts/security/2023/dla-3446.wml50
-rw-r--r--english/lts/security/2023/dla-3447.data9
-rw-r--r--english/lts/security/2023/dla-3447.wml40
-rw-r--r--english/lts/security/2023/dla-3448.data10
-rw-r--r--english/lts/security/2023/dla-3448.wml23
-rw-r--r--english/lts/security/2023/dla-3449.data10
-rw-r--r--english/lts/security/2023/dla-3449.wml52
-rw-r--r--english/lts/security/2023/dla-3450.data10
-rw-r--r--english/lts/security/2023/dla-3450.wml40
-rw-r--r--english/lts/security/2023/dla-3451.data10
-rw-r--r--english/lts/security/2023/dla-3451.wml23
-rw-r--r--english/lts/security/2023/dla-3452.data10
-rw-r--r--english/lts/security/2023/dla-3452.wml22
-rw-r--r--english/lts/security/2023/dla-3453.data10
-rw-r--r--english/lts/security/2023/dla-3453.wml23
-rw-r--r--english/lts/security/2023/dla-3454.data10
-rw-r--r--english/lts/security/2023/dla-3454.wml23
-rw-r--r--english/lts/security/2023/dla-3455.data10
-rw-r--r--english/lts/security/2023/dla-3455.wml70
-rw-r--r--english/lts/security/2023/dla-3456.data10
-rw-r--r--english/lts/security/2023/dla-3456.wml29
-rw-r--r--english/lts/security/2023/dla-3457.data10
-rw-r--r--english/lts/security/2023/dla-3457.wml38
-rw-r--r--english/lts/security/2023/dla-3458.data10
-rw-r--r--english/lts/security/2023/dla-3458.wml24
-rw-r--r--english/lts/security/2023/dla-3459.data10
-rw-r--r--english/lts/security/2023/dla-3459.wml51
-rw-r--r--english/lts/security/2023/dla-3460.data10
-rw-r--r--english/lts/security/2023/dla-3460.wml25
-rw-r--r--english/lts/security/2023/dla-3461.data10
-rw-r--r--english/lts/security/2023/dla-3461.wml25
-rw-r--r--english/lts/security/2023/dla-3462.data10
-rw-r--r--english/lts/security/2023/dla-3462.wml28
-rw-r--r--english/lts/security/2023/dla-3463.data10
-rw-r--r--english/lts/security/2023/dla-3463.wml61
-rw-r--r--english/lts/security/2023/dla-3464.data10
-rw-r--r--english/lts/security/2023/dla-3464.wml22
-rw-r--r--english/lts/security/2023/dla-3465.data10
-rw-r--r--english/lts/security/2023/dla-3465.wml25
-rw-r--r--english/lts/security/2023/dla-3466.data10
-rw-r--r--english/lts/security/2023/dla-3466.wml26
-rw-r--r--english/lts/security/2023/dla-3467.data10
-rw-r--r--english/lts/security/2023/dla-3467.wml28
-rw-r--r--english/lts/security/2023/dla-3468.data10
-rw-r--r--english/lts/security/2023/dla-3468.wml28
-rw-r--r--english/lts/security/2023/dla-3469.data10
-rw-r--r--english/lts/security/2023/dla-3469.wml41
-rw-r--r--english/lts/security/2023/dla-3470.data10
-rw-r--r--english/lts/security/2023/dla-3470.wml23
-rw-r--r--english/lts/security/2023/dla-3471.data10
-rw-r--r--english/lts/security/2023/dla-3471.wml40
-rw-r--r--english/lts/security/2023/dla-3472.data10
-rw-r--r--english/lts/security/2023/dla-3472.wml23
-rw-r--r--english/lts/security/2023/dla-3473.data10
-rw-r--r--english/lts/security/2023/dla-3473.wml27
-rw-r--r--english/lts/security/2023/dla-3474.data10
-rw-r--r--english/lts/security/2023/dla-3474.wml25
-rw-r--r--english/lts/security/2023/dla-3475.data10
-rw-r--r--english/lts/security/2023/dla-3475.wml38
-rw-r--r--english/lts/security/2023/dla-3476.data10
-rw-r--r--english/lts/security/2023/dla-3476.wml27
-rw-r--r--english/lts/security/2023/dla-3477.data10
-rw-r--r--english/lts/security/2023/dla-3477.wml55
-rw-r--r--english/lts/security/2023/dla-3478.data10
-rw-r--r--english/lts/security/2023/dla-3478.wml23
-rw-r--r--english/lts/security/2023/dla-3479.data10
-rw-r--r--english/lts/security/2023/dla-3479.wml40
-rw-r--r--english/lts/security/2023/dla-3480.data10
-rw-r--r--english/lts/security/2023/dla-3480.wml24
-rw-r--r--english/lts/security/2023/dla-3481.data10
-rw-r--r--english/lts/security/2023/dla-3481.wml21
-rw-r--r--english/lts/security/2023/dla-3482.data9
-rw-r--r--english/lts/security/2023/dla-3482.wml23
-rw-r--r--english/lts/security/2023/dla-3483.data10
-rw-r--r--english/lts/security/2023/dla-3483.wml23
-rw-r--r--english/lts/security/2023/dla-3484.data10
-rw-r--r--english/lts/security/2023/dla-3484.wml23
-rw-r--r--english/lts/security/2023/dla-3485.data10
-rw-r--r--english/lts/security/2023/dla-3485.wml80
-rw-r--r--english/lts/security/2023/dla-3486.data9
-rw-r--r--english/lts/security/2023/dla-3486.wml37
-rw-r--r--english/lts/security/2023/dla-3487.data10
-rw-r--r--english/lts/security/2023/dla-3487.wml43
-rw-r--r--english/lts/security/2023/dla-3488.data10
-rw-r--r--english/lts/security/2023/dla-3488.wml24
-rw-r--r--english/lts/security/2023/dla-3489.data10
-rw-r--r--english/lts/security/2023/dla-3489.wml23
-rw-r--r--english/lts/security/2023/dla-3490.data10
-rw-r--r--english/lts/security/2023/dla-3490.wml22
-rw-r--r--english/lts/security/2023/dla-3491.data10
-rw-r--r--english/lts/security/2023/dla-3491.wml30
-rw-r--r--english/lts/security/2023/dla-3492.data10
-rw-r--r--english/lts/security/2023/dla-3492.wml49
-rw-r--r--english/lts/security/2023/dla-3493.data10
-rw-r--r--english/lts/security/2023/dla-3493.wml59
-rw-r--r--english/lts/security/2023/dla-3494.data9
-rw-r--r--english/lts/security/2023/dla-3494.wml34
-rw-r--r--english/lts/security/2023/dla-3495-2.data10
-rw-r--r--english/lts/security/2023/dla-3495-2.wml31
-rw-r--r--english/lts/security/2023/dla-3495.data10
-rw-r--r--english/lts/security/2023/dla-3495.wml36
-rw-r--r--english/lts/security/2023/dla-3496.data10
-rw-r--r--english/lts/security/2023/dla-3496.wml33
-rw-r--r--english/lts/security/2023/dla-3497.data10
-rw-r--r--english/lts/security/2023/dla-3497.wml23
-rw-r--r--english/lts/security/2023/dla-3498.data9
-rw-r--r--english/lts/security/2023/dla-3498.wml27
-rw-r--r--english/lts/security/2023/dla-3499.data10
-rw-r--r--english/lts/security/2023/dla-3499.wml39
-rw-r--r--english/lts/security/2023/dla-3500.data9
-rw-r--r--english/lts/security/2023/dla-3500.wml34
-rw-r--r--english/lts/security/2023/dla-3501.data10
-rw-r--r--english/lts/security/2023/dla-3501.wml45
-rw-r--r--english/lts/security/2023/dla-3502.data10
-rw-r--r--english/lts/security/2023/dla-3502.wml24
-rw-r--r--english/lts/security/2023/dla-3503.data10
-rw-r--r--english/lts/security/2023/dla-3503.wml26
-rw-r--r--english/lts/security/2023/dla-3504.data10
-rw-r--r--english/lts/security/2023/dla-3504.wml26
-rw-r--r--english/lts/security/2023/dla-3505.data10
-rw-r--r--english/lts/security/2023/dla-3505.wml26
-rw-r--r--english/lts/security/2023/dla-3506.data10
-rw-r--r--english/lts/security/2023/dla-3506.wml23
-rw-r--r--english/lts/security/2023/dla-3507.data10
-rw-r--r--english/lts/security/2023/dla-3507.wml45
-rw-r--r--english/lts/security/2023/dla-3508.data10
-rw-r--r--english/lts/security/2023/dla-3508.wml159
-rw-r--r--english/lts/security/2023/dla-3509.data10
-rw-r--r--english/lts/security/2023/dla-3509.wml24
-rw-r--r--english/lts/security/2023/dla-3510.data10
-rw-r--r--english/lts/security/2023/dla-3510.wml22
-rw-r--r--english/lts/security/2023/dla-3511.data10
-rw-r--r--english/lts/security/2023/dla-3511.wml38
-rw-r--r--english/lts/security/2023/dla-3512.data10
-rw-r--r--english/lts/security/2023/dla-3512.wml78
-rw-r--r--english/lts/security/2023/dla-3513.data10
-rw-r--r--english/lts/security/2023/dla-3513.wml58
-rw-r--r--english/lts/security/2023/dla-3514.data9
-rw-r--r--english/lts/security/2023/dla-3514.wml32
-rw-r--r--english/lts/security/2023/dla-3515.data10
-rw-r--r--english/lts/security/2023/dla-3515.wml30
-rw-r--r--english/lts/security/2023/dla-3516.data10
-rw-r--r--english/lts/security/2023/dla-3516.wml45
-rw-r--r--english/lts/security/2023/dla-3517.data10
-rw-r--r--english/lts/security/2023/dla-3517.wml23
-rw-r--r--english/lts/security/2023/dla-3518.data10
-rw-r--r--english/lts/security/2023/dla-3518.wml25
-rw-r--r--english/lts/security/2023/dla-3519.data10
-rw-r--r--english/lts/security/2023/dla-3519.wml22
-rw-r--r--english/lts/security/2023/dla-3520.data10
-rw-r--r--english/lts/security/2023/dla-3520.wml25
-rw-r--r--english/lts/security/2023/dla-3521.data10
-rw-r--r--english/lts/security/2023/dla-3521.wml22
-rw-r--r--english/lts/security/2023/dla-3522.data10
-rw-r--r--english/lts/security/2023/dla-3522.wml24
-rw-r--r--english/lts/security/2023/dla-3523.data10
-rw-r--r--english/lts/security/2023/dla-3523.wml23
-rw-r--r--english/lts/security/2023/dla-3524.data10
-rw-r--r--english/lts/security/2023/dla-3524.wml29
-rw-r--r--english/lts/security/2023/dla-3525.data10
-rw-r--r--english/lts/security/2023/dla-3525.wml50
-rw-r--r--english/lts/security/2023/dla-3526.data10
-rw-r--r--english/lts/security/2023/dla-3526.wml58
-rw-r--r--english/lts/security/2023/dla-3527.data10
-rw-r--r--english/lts/security/2023/dla-3527.wml27
-rw-r--r--english/lts/security/2023/dla-3528.data10
-rw-r--r--english/lts/security/2023/dla-3528.wml34
-rw-r--r--english/lts/security/2023/dla-3529.data10
-rw-r--r--english/lts/security/2023/dla-3529.wml25
-rw-r--r--english/lts/security/2023/dla-3530.data10
-rw-r--r--english/lts/security/2023/dla-3530.wml35
-rw-r--r--english/lts/security/2023/dla-3531.data10
-rw-r--r--english/lts/security/2023/dla-3531.wml27
-rw-r--r--english/lts/security/2023/dla-3532.data10
-rw-r--r--english/lts/security/2023/dla-3532.wml30
-rw-r--r--english/lts/security/2023/dla-3533.data10
-rw-r--r--english/lts/security/2023/dla-3533.wml23
-rw-r--r--english/lts/security/2023/dla-3534.data10
-rw-r--r--english/lts/security/2023/dla-3534.wml23
-rw-r--r--english/lts/security/2023/dla-3535.data10
-rw-r--r--english/lts/security/2023/dla-3535.wml22
-rw-r--r--english/lts/security/2023/dla-3536.data10
-rw-r--r--english/lts/security/2023/dla-3536.wml24
-rw-r--r--english/lts/security/2023/dla-3537.data10
-rw-r--r--english/lts/security/2023/dla-3537.wml46
-rw-r--r--english/lts/security/2023/dla-3538-2.data10
-rw-r--r--english/lts/security/2023/dla-3538-2.wml31
-rw-r--r--english/lts/security/2023/dla-3538.data10
-rw-r--r--english/lts/security/2023/dla-3538.wml115
-rw-r--r--english/lts/security/2023/dla-3539.data10
-rw-r--r--english/lts/security/2023/dla-3539.wml64
-rw-r--r--english/lts/security/2023/dla-3540.data10
-rw-r--r--english/lts/security/2023/dla-3540.wml29
-rw-r--r--english/lts/security/2023/dla-3541.data10
-rw-r--r--english/lts/security/2023/dla-3541.wml24
-rw-r--r--english/lts/security/2023/dla-3542.data10
-rw-r--r--english/lts/security/2023/dla-3542.wml25
-rw-r--r--english/lts/security/2023/dla-3543.data10
-rw-r--r--english/lts/security/2023/dla-3543.wml25
-rw-r--r--english/lts/security/2023/dla-3544.data10
-rw-r--r--english/lts/security/2023/dla-3544.wml24
-rw-r--r--english/lts/security/2023/dla-3545.data10
-rw-r--r--english/lts/security/2023/dla-3545.wml29
-rw-r--r--english/lts/security/2023/dla-3546.data9
-rw-r--r--english/lts/security/2023/dla-3546.wml35
-rw-r--r--english/lts/security/2023/dla-3547.data9
-rw-r--r--english/lts/security/2023/dla-3547.wml23
-rw-r--r--english/lts/security/2023/dla-3548.data10
-rw-r--r--english/lts/security/2023/dla-3548.wml28
-rw-r--r--english/lts/security/2023/dla-3549.data10
-rw-r--r--english/lts/security/2023/dla-3549.wml26
-rw-r--r--english/lts/security/2023/dla-3550.data9
-rw-r--r--english/lts/security/2023/dla-3550.wml21
-rw-r--r--english/lts/security/2023/dla-3551.data10
-rw-r--r--english/lts/security/2023/dla-3551.wml325
-rw-r--r--english/lts/security/2023/dla-3552.data10
-rw-r--r--english/lts/security/2023/dla-3552.wml22
-rw-r--r--english/lts/security/2023/dla-3553.data10
-rw-r--r--english/lts/security/2023/dla-3553.wml23
-rw-r--r--english/lts/security/2023/dla-3554.data10
-rw-r--r--english/lts/security/2023/dla-3554.wml22
-rw-r--r--english/lts/security/2023/dla-3555.data10
-rw-r--r--english/lts/security/2023/dla-3555.wml50
-rw-r--r--english/lts/security/2023/dla-3556.data10
-rw-r--r--english/lts/security/2023/dla-3556.wml24
-rw-r--r--english/lts/security/2023/dla-3557.data9
-rw-r--r--english/lts/security/2023/dla-3557.wml32
-rw-r--r--english/lts/security/2023/dla-3558.data9
-rw-r--r--english/lts/security/2023/dla-3558.wml28
-rw-r--r--english/lts/security/2023/dla-3559.data10
-rw-r--r--english/lts/security/2023/dla-3559.wml51
-rw-r--r--english/lts/security/2023/dla-3560.data10
-rw-r--r--english/lts/security/2023/dla-3560.wml22
-rw-r--r--english/lts/security/2023/dla-3561.data9
-rw-r--r--english/lts/security/2023/dla-3561.wml31
-rw-r--r--english/lts/security/2023/dla-3562.data10
-rw-r--r--english/lts/security/2023/dla-3562.wml29
-rw-r--r--english/lts/security/2023/dla-3563.data10
-rw-r--r--english/lts/security/2023/dla-3563.wml87
-rw-r--r--english/lts/security/2023/dla-3564.data9
-rw-r--r--english/lts/security/2023/dla-3564.wml38
-rw-r--r--english/lts/security/2023/dla-3565.data10
-rw-r--r--english/lts/security/2023/dla-3565.wml47
-rw-r--r--english/lts/security/2023/dla-3566.data10
-rw-r--r--english/lts/security/2023/dla-3566.wml57
-rw-r--r--english/lts/security/2023/dla-3567.data10
-rw-r--r--english/lts/security/2023/dla-3567.wml34
-rw-r--r--english/lts/security/2023/dla-3568.data10
-rw-r--r--english/lts/security/2023/dla-3568.wml22
-rw-r--r--english/lts/security/2023/dla-3569.data10
-rw-r--r--english/lts/security/2023/dla-3569.wml22
-rw-r--r--english/lts/security/2023/dla-3570.data10
-rw-r--r--english/lts/security/2023/dla-3570.wml22
-rw-r--r--english/lts/security/2023/dla-3571.data10
-rw-r--r--english/lts/security/2023/dla-3571.wml24
-rw-r--r--english/lts/security/2023/dla-3572.data10
-rw-r--r--english/lts/security/2023/dla-3572.wml23
-rw-r--r--english/lts/security/2023/dla-3573.data10
-rw-r--r--english/lts/security/2023/dla-3573.wml24
-rw-r--r--english/lts/security/2023/dla-3574.data10
-rw-r--r--english/lts/security/2023/dla-3574.wml24
-rw-r--r--english/lts/security/2023/dla-3575.data10
-rw-r--r--english/lts/security/2023/dla-3575.wml81
-rw-r--r--english/lts/security/2023/dla-3576.data10
-rw-r--r--english/lts/security/2023/dla-3576.wml25
-rw-r--r--english/lts/security/2023/dla-3577.data10
-rw-r--r--english/lts/security/2023/dla-3577.wml24
-rw-r--r--english/lts/security/2023/dla-3578.data10
-rw-r--r--english/lts/security/2023/dla-3578.wml24
-rw-r--r--english/lts/security/2023/dla-3579.data10
-rw-r--r--english/lts/security/2023/dla-3579.wml26
-rw-r--r--english/lts/security/2023/dla-3580.data10
-rw-r--r--english/lts/security/2023/dla-3580.wml30
-rw-r--r--english/lts/security/2023/dla-3581.data10
-rw-r--r--english/lts/security/2023/dla-3581.wml24
-rw-r--r--english/lts/security/2023/dla-3582.data10
-rw-r--r--english/lts/security/2023/dla-3582.wml39
-rw-r--r--english/lts/security/2023/dla-3583.data10
-rw-r--r--english/lts/security/2023/dla-3583.wml43
-rw-r--r--english/lts/security/2023/dla-3584.data10
-rw-r--r--english/lts/security/2023/dla-3584.wml29
-rw-r--r--english/lts/security/2023/dla-3585.data10
-rw-r--r--english/lts/security/2023/dla-3585.wml168
-rw-r--r--english/lts/security/2023/dla-3586.data10
-rw-r--r--english/lts/security/2023/dla-3586.wml24
-rw-r--r--english/lts/security/2023/dla-3587.data10
-rw-r--r--english/lts/security/2023/dla-3587.wml31
-rw-r--r--english/lts/security/2023/dla-3588.data10
-rw-r--r--english/lts/security/2023/dla-3588.wml33
-rw-r--r--english/lts/security/2023/dla-3589.data10
-rw-r--r--english/lts/security/2023/dla-3589.wml32
-rw-r--r--english/lts/security/2023/dla-3590.data10
-rw-r--r--english/lts/security/2023/dla-3590.wml43
-rw-r--r--english/lts/security/2023/dla-3591.data10
-rw-r--r--english/lts/security/2023/dla-3591.wml23
-rw-r--r--english/lts/security/2023/dla-3592.data10
-rw-r--r--english/lts/security/2023/dla-3592.wml67
-rw-r--r--english/lts/security/2023/dla-3593.data10
-rw-r--r--english/lts/security/2023/dla-3593.wml38
-rw-r--r--english/lts/security/2023/dla-3594.data10
-rw-r--r--english/lts/security/2023/dla-3594.wml46
-rw-r--r--english/lts/security/2023/dla-3595.data10
-rw-r--r--english/lts/security/2023/dla-3595.wml24
-rw-r--r--english/lts/security/2023/dla-3596.data10
-rw-r--r--english/lts/security/2023/dla-3596.wml89
-rw-r--r--english/lts/security/2023/dla-3597.data10
-rw-r--r--english/lts/security/2023/dla-3597.wml24
-rw-r--r--english/lts/security/2023/dla-3598.data10
-rw-r--r--english/lts/security/2023/dla-3598.wml24
-rw-r--r--english/lts/security/2023/dla-3599.data10
-rw-r--r--english/lts/security/2023/dla-3599.wml23
-rw-r--r--english/lts/security/2023/dla-3600.data10
-rw-r--r--english/lts/security/2023/dla-3600.wml26
-rw-r--r--english/lts/security/2023/dla-3601.data10
-rw-r--r--english/lts/security/2023/dla-3601.wml26
-rw-r--r--english/lts/security/2023/dla-3602.data10
-rw-r--r--english/lts/security/2023/dla-3602.wml44
-rw-r--r--english/lts/security/2023/dla-3603.data10
-rw-r--r--english/lts/security/2023/dla-3603.wml49
-rw-r--r--english/lts/security/2023/dla-3604.data10
-rw-r--r--english/lts/security/2023/dla-3604.wml42
-rw-r--r--english/lts/security/2023/dla-3605.data10
-rw-r--r--english/lts/security/2023/dla-3605.wml23
-rw-r--r--english/lts/security/2023/dla-3606.data10
-rw-r--r--english/lts/security/2023/dla-3606.wml416
-rw-r--r--english/lts/security/2023/dla-3607.data9
-rw-r--r--english/lts/security/2023/dla-3607.wml26
-rw-r--r--english/lts/security/2023/dla-3608.data10
-rw-r--r--english/lts/security/2023/dla-3608.wml26
-rw-r--r--english/lts/security/2023/dla-3609.data10
-rw-r--r--english/lts/security/2023/dla-3609.wml28
-rw-r--r--english/lts/security/2023/dla-3610.data10
-rw-r--r--english/lts/security/2023/dla-3610.wml67
-rw-r--r--english/lts/security/2023/dla-3611.data10
-rw-r--r--english/lts/security/2023/dla-3611.wml42
-rw-r--r--english/lts/security/2023/dla-3612.data10
-rw-r--r--english/lts/security/2023/dla-3612.wml24
-rw-r--r--english/lts/security/2023/dla-3613.data10
-rw-r--r--english/lts/security/2023/dla-3613.wml36
-rw-r--r--english/lts/security/2023/dla-3614.data10
-rw-r--r--english/lts/security/2023/dla-3614.wml54
-rw-r--r--english/lts/security/2023/dla-3615.data10
-rw-r--r--english/lts/security/2023/dla-3615.wml25
-rw-r--r--english/lts/security/2023/dla-3616.data9
-rw-r--r--english/lts/security/2023/dla-3616.wml32
-rw-r--r--english/lts/security/2023/dla-3617-2.data10
-rw-r--r--english/lts/security/2023/dla-3617-2.wml23
-rw-r--r--english/lts/security/2023/dla-3617.data10
-rw-r--r--english/lts/security/2023/dla-3617.wml60
-rw-r--r--english/lts/security/2023/dla-3618.data10
-rw-r--r--english/lts/security/2023/dla-3618.wml25
-rw-r--r--english/lts/security/2023/dla-3619.data10
-rw-r--r--english/lts/security/2023/dla-3619.wml64
-rw-r--r--english/lts/security/2023/dla-3620.data10
-rw-r--r--english/lts/security/2023/dla-3620.wml38
-rw-r--r--english/lts/security/2023/dla-3621.data10
-rw-r--r--english/lts/security/2023/dla-3621.wml36
-rw-r--r--english/lts/security/2023/dla-3622.data10
-rw-r--r--english/lts/security/2023/dla-3622.wml25
-rw-r--r--english/lts/security/2023/dla-3623.data10
-rw-r--r--english/lts/security/2023/dla-3623.wml322
-rw-r--r--english/lts/security/2023/dla-3624.data9
-rw-r--r--english/lts/security/2023/dla-3624.wml36
-rw-r--r--english/lts/security/2023/dla-3625.data10
-rw-r--r--english/lts/security/2023/dla-3625.wml23
-rw-r--r--english/lts/security/2023/dla-3626.data10
-rw-r--r--english/lts/security/2023/dla-3626.wml23
-rw-r--r--english/lts/security/2023/dla-3627.data9
-rw-r--r--english/lts/security/2023/dla-3627.wml42
-rw-r--r--english/lts/security/2023/dla-3628.data10
-rw-r--r--english/lts/security/2023/dla-3628.wml23
-rw-r--r--english/lts/security/2023/dla-3629.data10
-rw-r--r--english/lts/security/2023/dla-3629.wml117
-rw-r--r--english/lts/security/2023/dla-3630.data10
-rw-r--r--english/lts/security/2023/dla-3630.wml26
-rw-r--r--english/lts/security/2023/dla-3631.data10
-rw-r--r--english/lts/security/2023/dla-3631.wml25
-rw-r--r--english/lts/security/2023/dla-3632.data10
-rw-r--r--english/lts/security/2023/dla-3632.wml23
-rw-r--r--english/lts/security/2023/dla-3633.data10
-rw-r--r--english/lts/security/2023/dla-3633.wml26
-rw-r--r--english/lts/security/2023/dla-3634.data10
-rw-r--r--english/lts/security/2023/dla-3634.wml38
-rw-r--r--english/lts/security/2023/dla-3635.data10
-rw-r--r--english/lts/security/2023/dla-3635.wml24
-rw-r--r--english/lts/security/2023/dla-3636.data10
-rw-r--r--english/lts/security/2023/dla-3636.wml22
-rw-r--r--english/lts/security/2023/dla-3637.data10
-rw-r--r--english/lts/security/2023/dla-3637.wml22
-rw-r--r--english/lts/security/2023/dla-3638.data10
-rw-r--r--english/lts/security/2023/dla-3638.wml34
-rw-r--r--english/lts/security/2023/dla-3639.data9
-rw-r--r--english/lts/security/2023/dla-3639.wml25
-rw-r--r--english/lts/security/2023/dla-3640.data9
-rw-r--r--english/lts/security/2023/dla-3640.wml26
-rw-r--r--english/lts/security/2023/dla-3641.data10
-rw-r--r--english/lts/security/2023/dla-3641.wml37
-rw-r--r--english/lts/security/2023/dla-3642.data10
-rw-r--r--english/lts/security/2023/dla-3642.wml38
-rw-r--r--english/lts/security/2023/dla-3643.data9
-rw-r--r--english/lts/security/2023/dla-3643.wml29
-rw-r--r--english/lts/security/2023/dla-3644.data9
-rw-r--r--english/lts/security/2023/dla-3644.wml34
-rw-r--r--english/lts/security/2023/dla-3645.data10
-rw-r--r--english/lts/security/2023/dla-3645.wml34
-rw-r--r--english/lts/security/2023/dla-3646.data10
-rw-r--r--english/lts/security/2023/dla-3646.wml41
-rw-r--r--english/lts/security/2023/dla-3647.data10
-rw-r--r--english/lts/security/2023/dla-3647.wml27
-rw-r--r--english/lts/security/2023/dla-3648.data9
-rw-r--r--english/lts/security/2023/dla-3648.wml32
-rw-r--r--english/lts/security/2023/dla-3649.data10
-rw-r--r--english/lts/security/2023/dla-3649.wml26
-rw-r--r--english/lts/security/2023/dla-3650.data10
-rw-r--r--english/lts/security/2023/dla-3650.wml38
-rw-r--r--english/lts/security/2023/dla-3651.data10
-rw-r--r--english/lts/security/2023/dla-3651.wml42
-rw-r--r--english/lts/security/2023/dla-3652.data9
-rw-r--r--english/lts/security/2023/dla-3652.wml42
-rw-r--r--english/lts/security/2023/dla-3653.data10
-rw-r--r--english/lts/security/2023/dla-3653.wml23
-rw-r--r--english/lts/security/2023/dla-3654.data10
-rw-r--r--english/lts/security/2023/dla-3654.wml92
-rw-r--r--english/lts/security/2023/dla-3655.data10
-rw-r--r--english/lts/security/2023/dla-3655.wml24
-rw-r--r--english/lts/security/2023/dla-3656.data10
-rw-r--r--english/lts/security/2023/dla-3656.wml24
-rw-r--r--english/lts/security/2023/dla-3657.data10
-rw-r--r--english/lts/security/2023/dla-3657.wml49
-rw-r--r--english/lts/security/2023/dla-3658.data10
-rw-r--r--english/lts/security/2023/dla-3658.wml25
-rw-r--r--english/lts/security/2023/dla-3659.data10
-rw-r--r--english/lts/security/2023/dla-3659.wml38
-rw-r--r--english/lts/security/2023/dla-3660.data10
-rw-r--r--english/lts/security/2023/dla-3660.wml25
-rw-r--r--english/lts/security/2023/dla-3661.data10
-rw-r--r--english/lts/security/2023/dla-3661.wml23
-rw-r--r--english/lts/security/2023/dla-3662.data10
-rw-r--r--english/lts/security/2023/dla-3662.wml37
-rw-r--r--english/lts/security/2023/dla-3663.data9
-rw-r--r--english/lts/security/2023/dla-3663.wml34
-rw-r--r--english/lts/security/2023/dla-3664.data10
-rw-r--r--english/lts/security/2023/dla-3664.wml24
-rw-r--r--english/lts/security/2023/dla-3665.data10
-rw-r--r--english/lts/security/2023/dla-3665.wml22
-rw-r--r--english/lts/security/2023/dla-3666.data9
-rw-r--r--english/lts/security/2023/dla-3666.wml24
-rw-r--r--english/lts/security/2023/dla-3667.data9
-rw-r--r--english/lts/security/2023/dla-3667.wml24
-rw-r--r--english/lts/security/2023/dla-3668.data10
-rw-r--r--english/lts/security/2023/dla-3668.wml64
-rw-r--r--english/lts/security/2023/dla-3669.data10
-rw-r--r--english/lts/security/2023/dla-3669.wml26
-rw-r--r--english/lts/security/2023/dla-3670.data10
-rw-r--r--english/lts/security/2023/dla-3670.wml25
-rw-r--r--english/lts/security/2023/dla-3671.data10
-rw-r--r--english/lts/security/2023/dla-3671.wml46
-rw-r--r--english/lts/security/2023/dla-3672.data9
-rw-r--r--english/lts/security/2023/dla-3672.wml24
-rw-r--r--english/lts/security/2023/dla-3673.data10
-rw-r--r--english/lts/security/2023/dla-3673.wml26
-rw-r--r--english/lts/security/2023/dla-3674.data10
-rw-r--r--english/lts/security/2023/dla-3674.wml22
-rw-r--r--english/lts/security/2023/dla-3675.data10
-rw-r--r--english/lts/security/2023/dla-3675.wml44
-rw-r--r--english/lts/security/2023/dla-3676.data10
-rw-r--r--english/lts/security/2023/dla-3676.wml44
-rw-r--r--english/lts/security/2023/dla-3677.data10
-rw-r--r--english/lts/security/2023/dla-3677.wml22
-rw-r--r--english/lts/security/2023/dla-3678.data10
-rw-r--r--english/lts/security/2023/dla-3678.wml23
-rw-r--r--english/lts/security/2023/dla-3679.data10
-rw-r--r--english/lts/security/2023/dla-3679.wml34
-rw-r--r--english/lts/security/2023/dla-3680.data10
-rw-r--r--english/lts/security/2023/dla-3680.wml27
-rw-r--r--english/lts/security/2023/dla-3681.data10
-rw-r--r--english/lts/security/2023/dla-3681.wml55
-rw-r--r--english/lts/security/2023/dla-3682.data10
-rw-r--r--english/lts/security/2023/dla-3682.wml47
-rw-r--r--english/lts/security/2023/dla-3683.data10
-rw-r--r--english/lts/security/2023/dla-3683.wml25
-rw-r--r--english/lts/security/2023/dla-3684.data10
-rw-r--r--english/lts/security/2023/dla-3684.wml23
-rw-r--r--english/lts/security/2023/dla-3685.data9
-rw-r--r--english/lts/security/2023/dla-3685.wml34
-rw-r--r--english/lts/security/2023/dla-3686-2.data10
-rw-r--r--english/lts/security/2023/dla-3686-2.wml25
-rw-r--r--english/lts/security/2023/dla-3686.data10
-rw-r--r--english/lts/security/2023/dla-3686.wml25
-rw-r--r--english/lts/security/2023/dla-3687.data10
-rw-r--r--english/lts/security/2023/dla-3687.wml24
-rw-r--r--english/lts/security/2023/dla-3688.data9
-rw-r--r--english/lts/security/2023/dla-3688.wml37
-rw-r--r--english/lts/security/2023/dla-3689.data9
-rw-r--r--english/lts/security/2023/dla-3689.wml26
-rw-r--r--english/lts/security/2023/dla-3690.data10
-rw-r--r--english/lts/security/2023/dla-3690.wml27
-rw-r--r--english/lts/security/2023/dla-3691.data9
-rw-r--r--english/lts/security/2023/dla-3691.wml22
-rw-r--r--english/lts/security/2023/dla-3692.data10
-rw-r--r--english/lts/security/2023/dla-3692.wml36
-rw-r--r--english/lts/security/2023/dla-3693.data10
-rw-r--r--english/lts/security/2023/dla-3693.wml24
-rw-r--r--english/lts/security/2023/dla-3697.data10
-rw-r--r--english/lts/security/2023/dla-3697.wml23
-rw-r--r--english/lts/security/2023/dla-3698.data10
-rw-r--r--english/lts/security/2023/dla-3698.wml23
-rw-r--r--english/lts/security/2023/index.wml11
7766 files changed, 0 insertions, 166407 deletions
diff --git a/english/lts/security/2014/Makefile b/english/lts/security/2014/Makefile
deleted file mode 100644
index 4ce34b172b1..00000000000
--- a/english/lts/security/2014/Makefile
+++ /dev/null
@@ -1,25 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2014
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-
-index.$(LANGUAGE).html: index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
diff --git a/english/lts/security/2014/dla-0001.data b/english/lts/security/2014/dla-0001.data
deleted file mode 100644
index 4e8b7ce44a0..00000000000
--- a/english/lts/security/2014/dla-0001.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0001-1 gnutls26</define-tag>
-<define-tag report_date>2014-6-2</define-tag>
-<define-tag secrefs>CVE-2014-3466</define-tag>
-<define-tag packages>gnutls26</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0001.wml b/english/lts/security/2014/dla-0001.wml
deleted file mode 100644
index f8029f640f7..00000000000
--- a/english/lts/security/2014/dla-0001.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Joonas Kuorilehto discovered that GNU TLS performed insufficient
-validation of session IDs during TLS/SSL handshakes. A malicious
-server could use this to execute arbitrary code or perform denial
-or service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gnutls26 version 2.8.6-1+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0001.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0002.data b/english/lts/security/2014/dla-0002.data
deleted file mode 100644
index 547bbfdf6aa..00000000000
--- a/english/lts/security/2014/dla-0002.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0002-1 chkrootkit</define-tag>
-<define-tag report_date>2014-6-4</define-tag>
-<define-tag secrefs>CVE-2014-0476</define-tag>
-<define-tag packages>chkrootkit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0002.wml b/english/lts/security/2014/dla-0002.wml
deleted file mode 100644
index b2d1d7fb565..00000000000
--- a/english/lts/security/2014/dla-0002.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Thomas Stangner discovered a vulnerability in chkrootkit, a rootkit
-detector, which may allow local attackers to gain root access when /tmp
-is mounted without the noexec option.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in chkrootkit version 0.49-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0002.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0003.data b/english/lts/security/2014/dla-0003.data
deleted file mode 100644
index 861435aee51..00000000000
--- a/english/lts/security/2014/dla-0003.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0003-1 openssl</define-tag>
-<define-tag report_date>2014-6-5</define-tag>
-<define-tag secrefs>CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-3470 CVE-2014-0224</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0003.wml b/english/lts/security/2014/dla-0003.wml
deleted file mode 100644
index 0d63c581e0c..00000000000
--- a/english/lts/security/2014/dla-0003.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0195">CVE-2014-0195</a>
-
- <p>Jueri Aedla discovered that a buffer overflow in processing DTLS
- fragments could lead to the execution of arbitrary code or denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0221">CVE-2014-0221</a>
-
- <p>Imre Rad discovered the processing of DTLS hello packets is
- susceptible to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0224">CVE-2014-0224</a>
-
- <p>KIKUCHI Masashi discovered that carefully crafted handshakes can
- force the use of weak keys, resulting in potential man-in-the-middle
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3470">CVE-2014-3470</a>
-
- <p>Felix Groebert and Ivan Fratric discovered that the implementation of
- anonymous ECDH ciphersuites is suspectible to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0076">CVE-2014-0076</a>
-
- <p>Fix for the attack described in the paper "Recovering
- OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
- Reported by Yuval Yarom and Naomi Benger.</p></li>
-
-</ul>
-
-<p>Additional information can be found at
-<a href="http://www.openssl.org/news/secadv_20140605.txt">http://www.openssl.org/news/secadv_20140605.txt</a></p>
-
-<p>All applications linked to openssl need to be restarted. You can
-use the tool checkrestart from the package debian-goodies to
-detect affected programs or reboot your system.</p>
-
-<p>It's important that you upgrade the libssl0.9.8 package and not
-just the openssl package.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze15</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0003.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0004.data b/english/lts/security/2014/dla-0004.data
deleted file mode 100644
index 0cb4f77aa84..00000000000
--- a/english/lts/security/2014/dla-0004.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0004-1 dovecot</define-tag>
-<define-tag report_date>2014-6-11</define-tag>
-<define-tag secrefs>CVE-2014-3430 Bug#747549</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0004.wml b/english/lts/security/2014/dla-0004.wml
deleted file mode 100644
index ea49f69a186..00000000000
--- a/english/lts/security/2014/dla-0004.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Dovecot email server is vulnerable to a
-denial of service attack against imap/pop3-login processes due to
-incorrect handling of the closure of inactive SSL/TLS connections.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dovecot version 1:1.2.15-7+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0004.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0005.data b/english/lts/security/2014/dla-0005.data
deleted file mode 100644
index 5ebd2546054..00000000000
--- a/english/lts/security/2014/dla-0005.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0005-1 apt</define-tag>
-<define-tag report_date>2014-6-12</define-tag>
-<define-tag secrefs>CVE-2011-3634 CVE-2014-0478 Bug#749795</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0005.wml b/english/lts/security/2014/dla-0005.wml
deleted file mode 100644
index 8ee04409051..00000000000
--- a/english/lts/security/2014/dla-0005.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jakub Wilk discovered that APT, the high level package manager,
-did not properly perform authentication checks for source packages
-downloaded via "apt-get source". This only affects use cases where
-source packages are downloaded via this command; it does not
-affect regular Debian package installation and upgrading.
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-0478">CVE-2014-0478</a>)</p>
-
-<p>It was discovered that APT incorrectly handled the Verify-Host
-configuration option. If a remote attacker were able to perform a
-man-in-the-middle attack, this flaw could potentially be used to steal
-repository credentials. This only relevant for systems that use APT
-sources on https connections (requires the apt-transport-https package
-to be installed). (<a href="https://security-tracker.debian.org/tracker/CVE-2011-3634">CVE-2011-3634</a>)</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apt version 0.8.10.3+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0005.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0006.data b/english/lts/security/2014/dla-0006.data
deleted file mode 100644
index 2f205802769..00000000000
--- a/english/lts/security/2014/dla-0006.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0006-1 scheme48</define-tag>
-<define-tag report_date>2014-6-16</define-tag>
-<define-tag secrefs>CVE-2014-4150 Bug#748766</define-tag>
-<define-tag packages>scheme48</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0006.wml b/english/lts/security/2014/dla-0006.wml
deleted file mode 100644
index 428b9aa638f..00000000000
--- a/english/lts/security/2014/dla-0006.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The function `scheme48-send-definition` in cmuscheme48.el blindly
-overwrites the file /tmp/s48lose.tmp prior to sending it to the
-inferior scheme process.</p>
-
-<p>This action will blindly overwrite files the user has permission
-to modify, causing data-loss.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in scheme48 version 1.8+dfsg-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0006.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0007.data b/english/lts/security/2014/dla-0007.data
deleted file mode 100644
index 78c547f0cb4..00000000000
--- a/english/lts/security/2014/dla-0007.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0007-1 linux-2.6</define-tag>
-<define-tag report_date>2014-6-18</define-tag>
-<define-tag secrefs>CVE-2014-3153 CVE-2014-1438</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0007.wml b/english/lts/security/2014/dla-0007.wml
deleted file mode 100644
index 83b5953eb4a..00000000000
--- a/english/lts/security/2014/dla-0007.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3153">CVE-2014-3153</a>:
-
-<p>Pinkie Pie discovered an issue in the futex subsystem that
-allows a local user to gain ring 0 control via the futex syscall. An
-unprivileged user could use this flaw to crash the kernel (resulting in
-denial of service) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1438">CVE-2014-1438</a>:
-
-<p>The restore_fpu_checking function in
-arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the
-AMD K7 and K8 platforms does not clear pending exceptions before proceeding
-to an EMMS instruction, which allows local users to cause a denial of
-service (task kill) or possibly gain privileges via a crafted application.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in linux-2.6 version 2.6.32-48squeeze7</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0007.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0008.data b/english/lts/security/2014/dla-0008.data
deleted file mode 100644
index 2f4f18e045a..00000000000
--- a/english/lts/security/2014/dla-0008.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0008-1 openssl</define-tag>
-<define-tag report_date>2014-6-20</define-tag>
-<define-tag secrefs>CVE-2014-0224 CVE-2012-4929</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0008.wml b/english/lts/security/2014/dla-0008.wml
deleted file mode 100644
index efd176a755a..00000000000
--- a/english/lts/security/2014/dla-0008.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0224">CVE-2014-0224</a>
-
- <p>This update updates the upstream fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-0224">CVE-2014-0224</a> to address
- problems with renegotiation under some conditions.</p>
-
- <p>original text:
- KIKUCHI Masashi discovered that carefully crafted handshakes can
- force the use of weak keys, resulting in potential man-in-the-middle
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4929">CVE-2012-4929</a>
-
- <p>ZLIB compression is now disabled by default. If you need
- to re-enable it for some reason, you can set the environment
- variable OPENSSL_NO_DEFAULT_ZLIB.</p></li>
-
-</ul>
-
-<p>It's important that you upgrade the libssl0.9.8 package and not
-just the openssl package.</p>
-
-<p>All applications linked to openssl need to be restarted. You can
-use the tool checkrestart from the package debian-goodies to
-detect affected programs or reboot your system.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze16</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0008.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0009.data b/english/lts/security/2014/dla-0009.data
deleted file mode 100644
index 1cfed4246df..00000000000
--- a/english/lts/security/2014/dla-0009.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0009-1 lxml</define-tag>
-<define-tag report_date>2014-6-26</define-tag>
-<define-tag secrefs>CVE-2014-3146 Bug##746812</define-tag>
-<define-tag packages>lxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0009.wml b/english/lts/security/2014/dla-0009.wml
deleted file mode 100644
index d4e8fc177a1..00000000000
--- a/english/lts/security/2014/dla-0009.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that clean_html() function of lxml (pythonic bindings
-for the libxml2 and libxslt libraries) performed insufficient sanitisation
-for some non-printable characters. This could lead to cross-site
-scripting.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in lxml version 2.2.8-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0009.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0010.data b/english/lts/security/2014/dla-0010.data
deleted file mode 100644
index 1c1459fa18f..00000000000
--- a/english/lts/security/2014/dla-0010.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0010-1 php5</define-tag>
-<define-tag report_date>2014-6-27</define-tag>
-<define-tag secrefs>CVE-2014-4049</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0010.wml b/english/lts/security/2014/dla-0010.wml
deleted file mode 100644
index 3e1c96fa70b..00000000000
--- a/english/lts/security/2014/dla-0010.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that PHP, a general-purpose scripting
-language commonly used for web application development, is
-vulnerable to a heap-based buffer overflow in the DNS TXT
-record parsing. A malicious server or man-in-the-middle
-attacker could possibly use this flaw to execute arbitrary
-code as the PHP interpreter if a PHP application uses
-dns_get_record() to perform a DNS query.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze20</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0010.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0011.data b/english/lts/security/2014/dla-0011.data
deleted file mode 100644
index e2a0ced0df9..00000000000
--- a/english/lts/security/2014/dla-0011.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0011-1 libemail-address-perl</define-tag>
-<define-tag report_date>2014-6-29</define-tag>
-<define-tag secrefs>CVE-2014-0477</define-tag>
-<define-tag packages>libemail-address-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0011.wml b/english/lts/security/2014/dla-0011.wml
deleted file mode 100644
index 84228212029..00000000000
--- a/english/lts/security/2014/dla-0011.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Bastian Blank reported a denial of service vulnerability in
-Email::Address, a Perl module for RFC 2822 address parsing and creation.
-Email::Address::parse used significant time on parsing empty quoted
-strings. A remote attacker able to supply specifically crafted input to
-an application using Email::Address for parsing, could use this flaw to
-mount a denial of service attack against the application.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libemail-address-perl version 1.889-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0011.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0012.data b/english/lts/security/2014/dla-0012.data
deleted file mode 100644
index 52408dd46e9..00000000000
--- a/english/lts/security/2014/dla-0012.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0012-1 gnupg</define-tag>
-<define-tag report_date>2014-6-30</define-tag>
-<define-tag secrefs>CVE-2014-4617 Bug#752497</define-tag>
-<define-tag packages>gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0012.wml b/english/lts/security/2014/dla-0012.wml
deleted file mode 100644
index 793e3232f38..00000000000
--- a/english/lts/security/2014/dla-0012.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jean-Rene Reinhard, Olivier Levillain and Florian Maury reported that
-GnuPG, the GNU Privacy Guard, did not properly parse certain garbled
-compressed data packets. A remote attacker could use this flaw to mount
-a denial of service against GnuPG by triggering an infinite loop.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gnupg version 1.4.10-4+squeeze5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0012.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0013.data b/english/lts/security/2014/dla-0013.data
deleted file mode 100644
index 3e3ac26cc1a..00000000000
--- a/english/lts/security/2014/dla-0013.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0013-1 tiff</define-tag>
-<define-tag report_date>2014-7-1</define-tag>
-<define-tag secrefs>CVE-2013-4243 Bug##742917</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0013.wml b/english/lts/security/2014/dla-0013.wml
deleted file mode 100644
index 702b1a00769..00000000000
--- a/english/lts/security/2014/dla-0013.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Murray McAllister discovered a heap-based buffer overflow in the gif2tiff
-command line tool. Executing gif2tiff on a malicious tiff image could
-result in arbitrary code execution.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tiff version 3.9.4-5+squeeze11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0013.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0014.data b/english/lts/security/2014/dla-0014.data
deleted file mode 100644
index cbc45a79a0a..00000000000
--- a/english/lts/security/2014/dla-0014.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0014-1 phpmyadmin</define-tag>
-<define-tag report_date>2014-7-9</define-tag>
-<define-tag secrefs>CVE-2013-3239 CVE-2013-4995 CVE-2013-4996 CVE-2013-5003</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0014.wml b/english/lts/security/2014/dla-0014.wml
deleted file mode 100644
index bcd66060993..00000000000
--- a/english/lts/security/2014/dla-0014.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in phpMyAdmin, a tool to
-administer MySQL over the web. The Common Vulnerabilities and Exposures
-project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-3239">CVE-2013-3239</a>
-
- <p>Authenticated users could execute arbitrary code, when a SaveDir
- directory is configured and Apache HTTP Server has the mod_mime
- module enabled, by employing double filename extensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4995">CVE-2013-4995</a>
-
- <p>Authenticatd users could inject arbitrary web script or HTML
- via a crafted SQL query.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4996">CVE-2013-4996</a>
-
- <p>Cross site scripting was possible via a crafted logo URL in
- the navigation panel or a crafted entry in the Trusted Proxy list.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-5003">CVE-2013-5003</a>
-
- <p>Authenticated users could execute arbitrary SQL commands as
- the phpMyAdmin <q>control user</q> via the scale parameter of PMD PDF
- export.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in phpmyadmin version 4:3.3.7-8</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0014.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0015.data b/english/lts/security/2014/dla-0015.data
deleted file mode 100644
index ceab7df4492..00000000000
--- a/english/lts/security/2014/dla-0015.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0015-1 linux-2.6</define-tag>
-<define-tag report_date>2014-7-12</define-tag>
-<define-tag secrefs>CVE-2013-4387 CVE-2013-4470 CVE-2014-0203 CVE-2014-2678 CVE-2014-3122 CVE-2014-3144 CVE-2014-3917 CVE-2014-4652 CVE-2014-4699 CVE-2015-3145 CVE-2014-4656 CVE-2014-4667</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0015.wml b/english/lts/security/2014/dla-0015.wml
deleted file mode 100644
index 56390f4f477..00000000000
--- a/english/lts/security/2014/dla-0015.wml
+++ /dev/null
@@ -1,82 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes several remote and local denial of service attacks and other
-issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4387">CVE-2013-4387</a>:
-
-<p>ipv6: udp packets following an UFO enqueued packet need
-also be handled by UFO to prevent remote attackers to cause a denial of
-service
-(memory corruption and system crash) or possibly have unspecified other impact
-via network traffic that triggers a large response packet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4470">CVE-2013-4470</a>:
-
-<p>inet: fix possible memory corruption with UDP_CORK and UFO to
-prevent local users to cause a denial of service (memory corruption and system
-crash) or possibly gain privileges via a crafted application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0203">CVE-2014-0203</a>:
-
-<p>fix autofs/afs/etc. magic mountpoint breakage, preventing
-denial
-of service attacks by local users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2678">CVE-2014-2678</a>:
-
-<p>rds: prevent dereference of a NULL device in rds_iw_laddr_check
-to prevent local denial of service attacks (system crash or possibly have
-unspecified other impact).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3122">CVE-2014-3122</a>
-
-<p>: Incorrect locking of memory can result in local denial of
-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3144">CVE-2014-3144</a>
-
-<p>/ <a href="https://security-tracker.debian.org/tracker/CVE-2014-3145">CVE-2014-3145</a>: A local user can cause a denial of service
-(system crash) via crafted BPF instructions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3917">CVE-2014-3917</a>:
-
-<p>auditsc: audit_krule mask accesses need bounds checking to
-prevent a local denial of service attack (OOPS) or possibly leaking sensitive
-single-bit
-values from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4652">CVE-2014-4652</a>:
-
-<p>ALSA: control: Protect user controls against concurrent access,
-resulting in a race condition, possibly allowing local users access to
-sensitive
-information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4656">CVE-2014-4656</a>:
-
-<p>ALSA: control: Make sure that id->index does not overflow, to
-prevent a denial of service of the sound system by local users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4667">CVE-2014-4667</a>:
-
-<p>sctp: Fix sk_ack_backlog wrap-around problem, preventing denial
-of service (socket outage) via a crafted SCTP packet by remote attackers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4699">CVE-2014-4699</a>:
-
-<p>Andy Lutomirski discovered that the ptrace syscall was not
-verifying the RIP register to be valid in the ptrace API on x86_64 processors.
-An unprivileged user could use this flaw to crash the kernel (resulting in
-denial of service) or for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in linux-2.6 version 2.6.32-48squeeze8</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0015.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-0016.data b/english/lts/security/2014/dla-0016.data
deleted file mode 100644
index bbbc0f6c273..00000000000
--- a/english/lts/security/2014/dla-0016.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0016-1 libxml2</define-tag>
-<define-tag report_date>2014-7-19</define-tag>
-<define-tag secrefs>CVE-2014-0191 Bug##747309</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0016.wml b/english/lts/security/2014/dla-0016.wml
deleted file mode 100644
index 2a1c33a7569..00000000000
--- a/english/lts/security/2014/dla-0016.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Daniel P. Berrange discovered a denial of service vulnerability in
-libxml2 entity substitution.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxml2 version 2.7.8.dfsg-2+squeeze9</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0016.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-0018.data b/english/lts/security/2014/dla-0018.data
deleted file mode 100644
index 939bfd56ca8..00000000000
--- a/english/lts/security/2014/dla-0018.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0018-1 php5</define-tag>
-<define-tag report_date>2014-7-23</define-tag>
-<define-tag secrefs>CVE-2014-3515 CVE-2014-0207 CVE-2014-3480 CVE-2014-4721</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0018.wml b/english/lts/security/2014/dla-0018.wml
deleted file mode 100644
index e1eb06d55ef..00000000000
--- a/english/lts/security/2014/dla-0018.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-3515">CVE-2014-3515</a>]:
-<p>fix unserialize() SPL ArrayObject / SPLObjectStorage Type Confusion</p></li>
-
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-0207">CVE-2014-0207</a>]:
-<p>fileinfo: cdf_read_short_sector insufficient boundary check</p></li>
-
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-3480">CVE-2014-3480</a>]:
-<p>fileinfo: cdf_count_chain insufficient boundary check</p></li>
-
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-4721">CVE-2014-4721</a>]:
-<p>The phpinfo implementation in ext/standard/info.c in
- PHP before 5.4.30 and 5.5.x before 5.5.14 does not
- ensure use of the string data type for the PHP_AUTH_PW,
- PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables,
- which might allow context-dependent attackers to obtain
- sensitive information from process memory by using the
- integer data type with crafted values, related to a
- <q>type confusion</q> vulnerability, as demonstrated by
- reading a private SSL key in an Apache HTTP Server
- web-hosting environment with mod_ssl and a
- PHP 5.3.x mod_php.</p></li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze20</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0018.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-0019.data b/english/lts/security/2014/dla-0019.data
deleted file mode 100644
index bd43ec8d3db..00000000000
--- a/english/lts/security/2014/dla-0019.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0019-1 postgresql-8.4</define-tag>
-<define-tag report_date>2014-7-29</define-tag>
-<define-tag secrefs>CVE-2014-0067</define-tag>
-<define-tag packages>postgresql-8.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0019.wml b/english/lts/security/2014/dla-0019.wml
deleted file mode 100644
index 37cf0819a67..00000000000
--- a/english/lts/security/2014/dla-0019.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>New upstream minor release. Users should upgrade to this version at their next
-scheduled maintenance window.</p>
-
-<p>Noteworthy change:</p>
-
- <p>Secure Unix-domain sockets of temporary postmasters started during make
- check (Noah Misch)</p>
-
- <p>Any local user able to access the socket file could connect as the server's
- bootstrap superuser, then proceed to execute arbitrary code as the
- operating-system user running the test, as we previously noted in
- <a href="https://security-tracker.debian.org/tracker/CVE-2014-0067">CVE-2014-0067</a>. This change defends against that risk by placing the server's
- socket in a temporary, mode 0700 subdirectory of /tmp.</p>
-
-<p>8.4.22 marks the end of life of the PostgreSQL 8.4 branch. No further
-releases will be made by the PostgreSQL Global Development Group.</p>
-
-<p>Users of PostgreSQL 8.4 should look into upgrading to a newer PostgreSQL
-release. Options are:</p>
-
-<ul>
-<li>Upgrading to Debian 7 (Wheezy), providing postgresql-9.1.</li>
-
-<li><p>The use of the apt.postgresql.org repository, providing packages for all
- active PostgreSQL branches (9.0 up to 9.4 at the time of writing).</p>
-
- <p>See <a href="https://wiki.postgresql.org/wiki/Apt">https://wiki.postgresql.org/wiki/Apt</a> for more information about the
- repository.</p>
-
- <p>A helper script to activate the repository is provided in
- /usr/share/doc/postgresql-8.4/examples/apt.postgresql.org.sh.</p>
-</li>
-<li>An LTS version of 8.4 is in planning that will cover the lifetime of
- squeeze-lts. Updates will probably made on a best-effort basis. Users can
- take advantage of this, but should still consider upgrading to newer
- PostgreSQL versions over the next months.</li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in postgresql-8.4 version 8.4.22-0+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0019.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-0021.data b/english/lts/security/2014/dla-0021.data
deleted file mode 100644
index fdbddaa939c..00000000000
--- a/english/lts/security/2014/dla-0021.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0021-1 fail2ban</define-tag>
-<define-tag report_date>2014-7-26</define-tag>
-<define-tag secrefs>CVE-2013-7176 CVE-2013-7177</define-tag>
-<define-tag packages>fail2ban</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0021.wml b/english/lts/security/2014/dla-0021.wml
deleted file mode 100644
index 312604d2b60..00000000000
--- a/english/lts/security/2014/dla-0021.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
- <li>Use anchored failregex for filters to avoid possible DoS. Manually
- picked up from the current status of 0.8 branch (as of
- 0.8.13-29-g09b2016):
- <ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7176">CVE-2013-7176</a>: postfix.conf - anchored on the front, expects
- "postfix/smtpd" prefix in the log line</li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7177">CVE-2013-7177</a>: cyrus-imap.conf - anchored on the front, and
- refactored to have a single failregex</li>
- <li>couriersmtp.conf - anchored on both sides</li>
- <li>exim.conf - front-anchored versions picked up from exim.conf
- and exim-spam.conf</li>
- <li>lighttpd-fastcgi.conf - front-anchored picked up from suhosin.conf
- (copied from the Wheezy version)</li>
- </ul></li>
- <li>Catch also failed logins via secured (imaps/pop3s) for cyrus-imap.
- Regression was introduced while strengthening failregex in 0.8.11 (bd175f)
- Debian bug #755173</li>
- <li>cyrus-imap: catch <q>user not found</q> attempts</li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in fail2ban version 0.8.4-3+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0021.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-0022.data b/english/lts/security/2014/dla-0022.data
deleted file mode 100644
index bbb6757a37c..00000000000
--- a/english/lts/security/2014/dla-0022.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-0022-1 cups</define-tag>
-<define-tag report_date>2014-7-31</define-tag>
-<define-tag secrefs>CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-0022.wml b/english/lts/security/2014/dla-0022.wml
deleted file mode 100644
index f35739158f7..00000000000
--- a/english/lts/security/2014/dla-0022.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the web interface in CUPS, the Common UNIX
-Printing System, incorrectly validated permissions on rss files and
-directory index files. A local attacker could possibly use this issue
-to bypass file permissions and read arbitrary files, possibly leading
-to a privilege escalation.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in cups version 1.4.4-7+squeeze6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-0022.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-100.data b/english/lts/security/2014/dla-100.data
deleted file mode 100644
index fa0fe8d1222..00000000000
--- a/english/lts/security/2014/dla-100.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-100-1 mutt</define-tag>
-<define-tag report_date>2014-12-5</define-tag>
-<define-tag secrefs>CVE-2014-0467 Bug#771125</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-100.wml b/english/lts/security/2014/dla-100.wml
deleted file mode 100644
index 6bcaa4435b5..00000000000
--- a/english/lts/security/2014/dla-100.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in mutt, a text-based mailreader. A specially
-crafted mail header could cause mutt to crash, leading to a denial of
-service condition.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mutt version 1.5.20-9+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-100.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-101.data b/english/lts/security/2014/dla-101.data
deleted file mode 100644
index f0f6533ea7d..00000000000
--- a/english/lts/security/2014/dla-101.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-101-1 jasper</define-tag>
-<define-tag report_date>2014-12-6</define-tag>
-<define-tag secrefs>CVE-2014-9029</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-101.wml b/english/lts/security/2014/dla-101.wml
deleted file mode 100644
index 86056657ac2..00000000000
--- a/english/lts/security/2014/dla-101.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Josh Duart of the Google Security Team discovered heap-based buffer
-overflow flaws in JasPer, a library for manipulating JPEG-2000 files,
-which could lead to denial of service (application crash) or the
-execution of arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in jasper version 1.900.1-7+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-101.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-102.data b/english/lts/security/2014/dla-102.data
deleted file mode 100644
index 1d8391745db..00000000000
--- a/english/lts/security/2014/dla-102.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-102-1 tcpdump</define-tag>
-<define-tag report_date>2014-12-8</define-tag>
-<define-tag secrefs>CVE-2014-8767 CVE-2014-8769 CVE-2014-9140 Bug#770424 Bug#770434</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-102.wml b/english/lts/security/2014/dla-102.wml
deleted file mode 100644
index 259da54e0fc..00000000000
--- a/english/lts/security/2014/dla-102.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in tcpdump, a command-line
-network traffic analyzer. These vulnerabilities might result in denial
-of service, leaking sensitive information from memory or, potentially,
-execution of arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tcpdump version 4.1.1-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-102.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-103.data b/english/lts/security/2014/dla-103.data
deleted file mode 100644
index 863401553ad..00000000000
--- a/english/lts/security/2014/dla-103.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-103-1 linux-2.6</define-tag>
-<define-tag report_date>2014-12-9</define-tag>
-<define-tag secrefs>CVE-2012-6657 CVE-2013-0228 CVE-2013-7266 CVE-2014-4157 CVE-2014-4508 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4943 CVE-2014-5077 CVE-2014-5471 CVE-2014-5472</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-103.wml b/english/lts/security/2014/dla-103.wml
deleted file mode 100644
index 64a5853403a..00000000000
--- a/english/lts/security/2014/dla-103.wml
+++ /dev/null
@@ -1,78 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security upload has been prepared in cooperation of the Debian Kernel,
-Security and LTS Teams and features the upstream stable release 2.6.32.64 (see
-<a href="https://lkml.org/lkml/2014/11/23/181">https://lkml.org/lkml/2014/11/23/181</a> for more information for that). It fixes
-the CVEs described below.
-<p><b>Note</b>: if you are using the openvz flavors, please consider three things: a.)
-we haven't got any feedback on them (while we have for all other flavors) b.)
-so do your test before deploying them and c.) once you have done so, please
-give feedback to debian-lts@lists.debian.org.</p>
-
-<p>If you are not using openvz flavors, please still consider b+c :-)</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6657">CVE-2012-6657</a>
-
-<p>Fix the sock_setsockopt function to prevent local users from being able to
-cause a denial of service (system crash) attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-0228">CVE-2013-0228</a>
-
-<p>Fix a XEN priviledge escalation, which allowed guest OS users to gain guest OS
-priviledges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7266">CVE-2013-7266</a>
-
-<p>Fix the mISDN_sock_recvmsg function to prevent local users from obtaining
-sensitive information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4157">CVE-2014-4157</a>
-
-<p>MIPS platform: prevent local users from bypassing intended PR_SET_SECCOMP
-restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4508">CVE-2014-4508</a>
-
-<p>Prevent local users from causing a denial of service (OOPS and system crash)
-when syscall auditing is enabled .</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4653">CVE-2014-4653</a>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-4654">CVE-2014-4654</a>
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-4655">CVE-2014-4655</a></p>
-
-<p>Fix the ALSA control implementation to prevent local users from causing a
-denial of service attack and from obtaining sensitive information from kernel
-memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4943">CVE-2014-4943</a>
-
-<p>Fix PPPoL2TP feature to prevent local users to from gaining privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5077">CVE-2014-5077</a>
-
-<p>Prevent remote attackers from causing a denial of service attack involving
-SCTP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5471">CVE-2014-5471</a>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-5472">CVE-2014-5472</a></p>
-
-<p>Fix the parse_rock_ridge_inode_internal function to prevent local users from
-causing a denial of service attack via a crafted iso9660 images.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9090">CVE-2014-9090</a>
-
-<p>Fix the do_double_fault function to prevent local users from causing a denial
-of service (panic) attack.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in linux-2.6 version 2.6.32-48squeeze9</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-103.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-104.data b/english/lts/security/2014/dla-104.data
deleted file mode 100644
index 15ba1c0eec9..00000000000
--- a/english/lts/security/2014/dla-104.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-104-1 pdns-recursor</define-tag>
-<define-tag report_date>2014-12-11</define-tag>
-<define-tag secrefs>CVE-2014-8601</define-tag>
-<define-tag packages>pdns-recursor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-104.wml b/english/lts/security/2014/dla-104.wml
deleted file mode 100644
index 483cd885d7c..00000000000
--- a/english/lts/security/2014/dla-104.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Florian Maury from ANSSI discovered a flaw in pdns-recursor, a
-recursive DNS server : a remote attacker controlling
-maliciously-constructed zones or a rogue server could affect the
-performance of pdns-recursor, thus leading to resource exhaustion and
-a potential denial-of-service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in pdns-recursor version 3.2-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-104.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-105.data b/english/lts/security/2014/dla-105.data
deleted file mode 100644
index 6582ed6db4a..00000000000
--- a/english/lts/security/2014/dla-105.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-105-1 graphviz</define-tag>
-<define-tag report_date>2014-12-11</define-tag>
-<define-tag secrefs>CVE-2014-9157 Bug#772648</define-tag>
-<define-tag packages>graphviz</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-105.wml b/english/lts/security/2014/dla-105.wml
deleted file mode 100644
index cfae05ae8d5..00000000000
--- a/english/lts/security/2014/dla-105.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Joshua Rogers discovered a format string vulnerability in the yyerror
-function in lib/cgraph/scan.l in Graphviz, a rich set of graph drawing
-tools. An attacker could use this flaw to cause graphviz to crash or
-possibly execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in graphviz version 2.26.3-5+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-105.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-106.data b/english/lts/security/2014/dla-106.data
deleted file mode 100644
index fe370537d83..00000000000
--- a/english/lts/security/2014/dla-106.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-106-1 getmail4</define-tag>
-<define-tag report_date>2014-12-12</define-tag>
-<define-tag secrefs>CVE-2014-7273 CVE-2014-7274 CVE-2014-7275 Bug#766670</define-tag>
-<define-tag packages>getmail4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-106.wml b/english/lts/security/2014/dla-106.wml
deleted file mode 100644
index 92512852048..00000000000
--- a/english/lts/security/2014/dla-106.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in getmail4, a mail retriever
-with support for POP3, IMAP4 and SDPS, that could allow man-in-the-middle
-attacks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7273">CVE-2014-7273</a>
-
- <p>The IMAP-over-SSL implementation in getmail 4.0.0 through 4.43.0 does
- not verify X.509 certificates from SSL servers, which allows
- man-in-the-middle attackers to spoof IMAP servers and obtain sensitive
- information via a crafted certificate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7274">CVE-2014-7274</a>
-
- <p>The IMAP-over-SSL implementation in getmail 4.44.0 does not verify
- that the server hostname matches a domain name in the subject's Common
- Name (CN) field of the X.509 certificate, which allows
- man-in-the-middle attackers to spoof IMAP servers and obtain sensitive
- information via a crafted certificate from a recognized Certification
- Authority.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7275">CVE-2014-7275</a>
-
- <p>The POP3-over-SSL implementation in getmail 4.0.0 through 4.44.0 does
- not verify X.509 certificates from SSL servers, which allows
- man-in-the-middle attackers to spoof POP3 servers and obtain sensitive
- information via a crafted certificate.</p>
-
-</ul>
-
-<p>For the squeeze distribution, those problems have been fixed by importing
-a new upstream version: 4.46.0-1~deb6u1. The updated package has been
-prepared by Osamu Aoki.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-106.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-107.data b/english/lts/security/2014/dla-107.data
deleted file mode 100644
index 7c9278566ac..00000000000
--- a/english/lts/security/2014/dla-107.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-107-1 unbound</define-tag>
-<define-tag report_date>2014-12-12</define-tag>
-<define-tag secrefs>CVE-2014-8602 Bug#772622</define-tag>
-<define-tag packages>unbound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-107.wml b/english/lts/security/2014/dla-107.wml
deleted file mode 100644
index 0eb0fcd4003..00000000000
--- a/english/lts/security/2014/dla-107.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Florian Maury from ANSSI discovered that unbound, a validating,
-recursive, and caching DNS resolver, was prone to a denial of service
-vulnerability. An attacker crafting a malicious zone and able to emit
-(or make emit) queries to the server can trick the resolver into
-following an endless series of delegations, leading to resource
-exhaustion and huge network usage.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unbound version 1.4.6-1+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-107.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-108.data b/english/lts/security/2014/dla-108.data
deleted file mode 100644
index e7534ed61ae..00000000000
--- a/english/lts/security/2014/dla-108.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-108-1 nfs-utils</define-tag>
-<define-tag report_date>2014-12-13</define-tag>
-<define-tag secrefs>CVE-2012-3541</define-tag>
-<define-tag packages>nfs-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-108.wml b/english/lts/security/2014/dla-108.wml
deleted file mode 100644
index dc134be3580..00000000000
--- a/english/lts/security/2014/dla-108.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In the past, rpc.statd posted SM_NOTIFY requests using the same socket it used
-for sending downcalls to the kernel. To receive replies from remote hosts, the
-socket was bound to INADDR_ANY. To prevent unwanted data injection, bind this
-socket to the loopback address.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nfs-utils version 1:1.2.2-4squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-108.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-109.data b/english/lts/security/2014/dla-109.data
deleted file mode 100644
index 64ace8c2ee9..00000000000
--- a/english/lts/security/2014/dla-109.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-109-1 libyaml-libyaml-perl</define-tag>
-<define-tag report_date>2014-12-14</define-tag>
-<define-tag secrefs>CVE-2014-9130 Bug#771365</define-tag>
-<define-tag packages>libyaml-libyaml-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-109.wml b/english/lts/security/2014/dla-109.wml
deleted file mode 100644
index 03c0ac119ab..00000000000
--- a/english/lts/security/2014/dla-109.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jonathan Gray and Stanislaw Pitucha found an assertion failure in the
-way wrapped strings are parsed in LibYAML, a fast YAML 1.1 parser and
-emitter library. An attacker able to load specially crafted YAML input
-into an application using libyaml could cause the application to crash.</p>
-
-<p>This update corrects this flaw in the copy that is embedded in the
-libyaml-libyaml-perl package.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libyaml-libyaml-perl version 0.33-1+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-109.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-110.data b/english/lts/security/2014/dla-110.data
deleted file mode 100644
index 5e974c64ac9..00000000000
--- a/english/lts/security/2014/dla-110.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-110-1 libyaml</define-tag>
-<define-tag report_date>2014-12-14</define-tag>
-<define-tag secrefs>CVE-2014-9130 Bug#771366</define-tag>
-<define-tag packages>libyaml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-110.wml b/english/lts/security/2014/dla-110.wml
deleted file mode 100644
index 59a37e44ebc..00000000000
--- a/english/lts/security/2014/dla-110.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jonathan Gray and Stanislaw Pitucha found an assertion failure in the
-way wrapped strings are parsed in LibYAML, a fast YAML 1.1 parser and
-emitter library. An attacker able to load specially crafted YAML input
-into an application using libyaml could cause the application to crash.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libyaml version 0.1.3-1+deb6u5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-110.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-111.data b/english/lts/security/2014/dla-111.data
deleted file mode 100644
index e999130c34e..00000000000
--- a/english/lts/security/2014/dla-111.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-111-1 cpio</define-tag>
-<define-tag report_date>2014-12-15</define-tag>
-<define-tag secrefs>CVE-2014-9112 Bug#772793</define-tag>
-<define-tag packages>cpio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-111.wml b/english/lts/security/2014/dla-111.wml
deleted file mode 100644
index 79799088354..00000000000
--- a/english/lts/security/2014/dla-111.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been identified in cpio, including a buffer overflow
-and multiple NULL pointer dereference, resulting at least in a denial of
-service and possibly also in an unwanted code execution.</p>
-
-<p>This has been fixed in Debian 6 Squeeze with version 2.11-4+deb6u1 by
-applying the upstream patches.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-111.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-112.data b/english/lts/security/2014/dla-112.data
deleted file mode 100644
index 220760fb2a4..00000000000
--- a/english/lts/security/2014/dla-112.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-112-1 bind9</define-tag>
-<define-tag report_date>2014-12-15</define-tag>
-<define-tag secrefs>CVE-2014-8500 Bug#772610</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-112.wml b/english/lts/security/2014/dla-112.wml
deleted file mode 100644
index 409a186e53c..00000000000
--- a/english/lts/security/2014/dla-112.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a denial of service vulnerability in BIND, a DNS server.</p>
-
-<p>By making use of maliciously-constructed zones or a rogue server, an attacker
-could exploit an oversight in the code BIND 9 used to follow delegations in
-the Domain Name Service, causing BIND to issue unlimited queries in an attempt
-to follow the delegation.</p>
-
-<p>This can lead to resource exhaustion and denial of service (up to and
-including termination of the named server process).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bind9 version 9.7.3.dfsg-1~squeeze13</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-112.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-113.data b/english/lts/security/2014/dla-113.data
deleted file mode 100644
index 00022392b3a..00000000000
--- a/english/lts/security/2014/dla-113.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-113-1 bsd-mailx</define-tag>
-<define-tag report_date>2014-12-17</define-tag>
-<define-tag secrefs>CVE-2014-7844</define-tag>
-<define-tag packages>bsd-mailx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-113.wml b/english/lts/security/2014/dla-113.wml
deleted file mode 100644
index 1456f434ffb..00000000000
--- a/english/lts/security/2014/dla-113.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that bsd-mailx, an implementation of the <q>mail</q>
-command, had an undocumented feature which treats syntactically valid
-email addresses as shell commands to execute.</p>
-
-<p>Users who need this feature can re-enable it using the <q>expandaddr</q> in
-an appropriate mailrc file. This update also removes the obsolete -T
-option. An older security vulnerability, <a href="https://security-tracker.debian.org/tracker/CVE-2004-2771">CVE-2004-2771</a>, had already
-been addressed in the Debian's bsd-mailx package.</p>
-
-<p>Note that this security update does not remove all mailx facilities
-for command execution, though. Scripts which send mail to addresses
-obtained from an untrusted source (such as a web form) should use the
-"--" separator before the email addresses (which was fixed to work
-properly in this update), or they should be changed to invoke
-"mail -t" or "sendmail -i -t" instead, passing the recipient addresses
-as part of the mail header.</p>
-
-<p>For the oldstable distribution (squeeze), this problem has been fixed in
-version 8.1.2-0.20100314cvs-1+deb6u1.</p>
-
-<p>We recommend that you upgrade your bsd-mailx packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-113.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-114.data b/english/lts/security/2014/dla-114.data
deleted file mode 100644
index 9fead23cb89..00000000000
--- a/english/lts/security/2014/dla-114.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-114-1 heirloom-mailx</define-tag>
-<define-tag report_date>2014-12-17</define-tag>
-<define-tag secrefs>CVE-2004-2771 CVE-2014-7844</define-tag>
-<define-tag packages>heirloom-mailx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-114.wml b/english/lts/security/2014/dla-114.wml
deleted file mode 100644
index acab51e80e2..00000000000
--- a/english/lts/security/2014/dla-114.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in Heirloom mailx, an
-implementation of the <q>mail</q> command:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2004-2771">CVE-2004-2771</a>
-
- <p>mailx interprets shell meta-characters in certain email
- addresses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7844">CVE-2014-7844</a>
-
- <p>An unexpected feature of mailx treats syntactically valid email
- addresses as shell commands to execute.</p>
-
-<p>Shell command execution can be re-enabled using the <q>expandaddr</q>
-option.</p>
-
-<p>Note that this security update does not remove all mailx facilities
-for command execution, though. Scripts which send mail to addresses
-obtained from an untrusted source (such as a web form) should use the
-"--" separator before the email addresses (which was fixed to work
-properly in this update), or they should be changed to invoke
-"mail -t" or "sendmail -i -t" instead, passing the recipient addresses
-as part of the mail header.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed in
-version 12.4-2+deb6u1.</p>
-
-<p>We recommend that you upgrade your heirloom-mailx packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-114.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-115.data b/english/lts/security/2014/dla-115.data
deleted file mode 100644
index 206aee0fc15..00000000000
--- a/english/lts/security/2014/dla-115.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-115-1 gosa</define-tag>
-<define-tag report_date>2014-12-18</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-115.wml b/english/lts/security/2014/dla-115.wml
deleted file mode 100644
index e4281f2af1b..00000000000
--- a/english/lts/security/2014/dla-115.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>Fix XSS issue during login.</p>
-
- <p>Fix authentication of GOsa² against the underlying LDAP server(s)
- via the gosa-admin DN (See <a href="http://bugs.debian.org/768509">#768509</a>).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gosa
-version 2.6.11-3+squeeze3.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-115.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-116.data b/english/lts/security/2014/dla-116.data
deleted file mode 100644
index 222ff08eb87..00000000000
--- a/english/lts/security/2014/dla-116.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-116-1 ntp</define-tag>
-<define-tag report_date>2014-12-20</define-tag>
-<define-tag secrefs>CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-9296 Bug#773576</define-tag>
-<define-tag packages>ntp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-116.wml b/english/lts/security/2014/dla-116.wml
deleted file mode 100644
index ef7825ff927..00000000000
--- a/english/lts/security/2014/dla-116.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the ntp package, an
-implementation of the Network Time Protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9293">CVE-2014-9293</a>
-
- <p>ntpd generated a weak key for its internal use, with full
- administrative privileges. Attackers could use this key to
- reconfigure ntpd (or to exploit other vulnerabilities).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9294">CVE-2014-9294</a>
-
- <p>The ntp-keygen utility generated weak MD5 keys with insufficient
- entropy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9295">CVE-2014-9295</a>
-
- <p>ntpd had several buffer overflows (both on the stack and in the
- data section), allowing remote authenticated attackers to crash
- ntpd or potentially execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9296">CVE-2014-9296</a>
-
- <p>The general packet processing function in ntpd did not handle an
- error case correctly.</p></li>
-
-</ul>
-
-<p>The default ntpd configuration in Debian restricts access to localhost
-(and possible the adjacent network in case of IPv6).</p>
-
-<p>Keys explicitly generated by "ntp-keygen -M" should be regenerated.</p><
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed in
-version 4.2.6.p2+dfsg-1+deb6u1.</p>
-
-<p>We recommend that you upgrade your heirloom-mailx packages.</p>
-
-<p>Thanks to the Florian Weimer for the Red Hat security update.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-116.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-117.data b/english/lts/security/2014/dla-117.data
deleted file mode 100644
index 14b88b55fd3..00000000000
--- a/english/lts/security/2014/dla-117.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-117-1 qt4-x11</define-tag>
-<define-tag report_date>2014-12-21</define-tag>
-<define-tag secrefs>CVE-2011-3193 CVE-2011-3194</define-tag>
-<define-tag packages>qt4-x11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-117.wml b/english/lts/security/2014/dla-117.wml
deleted file mode 100644
index 68c62642f4e..00000000000
--- a/english/lts/security/2014/dla-117.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3193">CVE-2011-3193</a>
-
- <p>Check for buffer overflow in Lookup_MarkMarkPos that may cause crash
- in this function with certain fonts.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3194">CVE-2011-3194</a>
-
- <p>Fix tiff reader to handle TIFFTAG_SAMPLESPERPIXEL for grayscale
- images. The reader uses QImage::Format_Indexed8, but since the samples
- per pixel value this should be (non-existent) QImage::Format_Indexed16,
- causing memory corruption. The fix falls back to the <q>normal</q> way of
- reading tiff images.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in qt4-x11 version 4:4.6.3-4+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-117.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-118.data b/english/lts/security/2014/dla-118.data
deleted file mode 100644
index a9019a35c9c..00000000000
--- a/english/lts/security/2014/dla-118.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-118-1 linux-2.6</define-tag>
-<define-tag report_date>2014-12-21</define-tag>
-<define-tag secrefs>CVE-2014-3185 CVE-2014-3687 CVE-2014-3688 CVE-2014-6410 CVE-2014-7841 CVE-2014-8709 CVE-2014-8884</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-118.wml b/english/lts/security/2014/dla-118.wml
deleted file mode 100644
index 805b420d550..00000000000
--- a/english/lts/security/2014/dla-118.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Non-maintainer upload by the Squeeze LTS and Kernel Teams.</p>
-
-<p>New upstream stable release 2.6.32.65, see
-<a href="http://lkml.org/lkml/2014/12/13/81">http://lkml.org/lkml/2014/12/13/81</a> for more information.</p>
-
-<p>The stable release 2.6.32.65 includes the following new commits compared
-to the previous 2.6.32-48squeeze9 package:</p>
-
-<ul>
- <li>USB: whiteheat: Added bounds checking for bulk command response
- (<a href="https://security-tracker.debian.org/tracker/CVE-2014-3185">CVE-2014-3185</a>)</li>
- <li>net: sctp: fix panic on duplicate ASCONF chunks (<a href="https://security-tracker.debian.org/tracker/CVE-2014-3687">CVE-2014-3687</a>)</li>
- <li>net: sctp: fix remote memory pressure from excessive queueing
- (<a href="https://security-tracker.debian.org/tracker/CVE-2014-3688">CVE-2014-3688</a>)</li>
- <li>udf: Avoid infinite loop when processing indirect ICBs (<a href="https://security-tracker.debian.org/tracker/CVE-2014-6410">CVE-2014-6410</a>)</li>
- <li>net: sctp: fix NULL pointer dereference in af->from_addr_param on
- malformed packet (<a href="https://security-tracker.debian.org/tracker/CVE-2014-7841">CVE-2014-7841</a>)</li>
- <li>mac80211: fix fragmentation code, particularly for encryption
- (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8709">CVE-2014-8709</a>)</li>
- <li>ttusb-dec: buffer overflow in ioctl (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8884">CVE-2014-8884</a>)</li>
-</ul>
-
-<p>We recommend that you upgrade your linux-2.6 packages.</p>
-
-<p>We apologize for a minor cosmetic glitch:</p>
-
-<p>The following commits were already included in 2.6.32-48squeeze9 despite
-claims in debian/changelog they were only fixed in 2.6.32-48squeez10:</p>
-
-<ul>
- <li>vlan: Don't propagate flag changes on down interfaces.</li>
- <li>sctp: Fix double-free introduced by bad backport in 2.6.32.62</li>
- <li>md/raid6: Fix misapplied backport in 2.6.32.64</li>
- <li>block: add missing blk_queue_dead() checks</li>
- <li>block: Fix blk_execute_rq_nowait() dead queue handling</li>
- <li>proc connector: Delete spurious memset in proc_exit_connector()</li>
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-118.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-119.data b/english/lts/security/2014/dla-119.data
deleted file mode 100644
index e4c27fc4ac7..00000000000
--- a/english/lts/security/2014/dla-119.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-119-1 subversion</define-tag>
-<define-tag report_date>2014-12-21</define-tag>
-<define-tag secrefs>CVE-2014-3580 Bug#773263</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-119.wml b/english/lts/security/2014/dla-119.wml
deleted file mode 100644
index 93298f45d50..00000000000
--- a/english/lts/security/2014/dla-119.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Evgeny Kotkov discovered a NULL pointer dereference while processing
-REPORT requests in mod_dav_svn, the Subversion component which is used
-to serve repositories with the Apache web server. A remote attacker
-could abuse this vulnerability for a denial of service.</p>
-
-<p>We recommend that you upgrade your subversion packages.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in subversion version 1.6.12dfsg-7+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-119.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-120.data b/english/lts/security/2014/dla-120.data
deleted file mode 100644
index 35a7ad67c3a..00000000000
--- a/english/lts/security/2014/dla-120.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-120-1 xorg-server</define-tag>
-<define-tag report_date>2014-12-22</define-tag>
-<define-tag secrefs>CVE-2014-8091 CVE-2014-8092 CVE-2014-8093 CVE-2014-8094 CVE-2014-8095 CVE-2014-8096 CVE-2014-8097 CVE-2014-8098 CVE-2014-8099 CVE-2014-8100 CVE-2014-8101 CVE-2014-8102</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-120.wml b/english/lts/security/2014/dla-120.wml
deleted file mode 100644
index 04e68912d58..00000000000
--- a/english/lts/security/2014/dla-120.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This advisory has been superseded by <a href="../2015/dla-120">DLA-120-2</a>.
-For reference, the original advisory text follows.</p>
-
-<p>Ilja van Sprundel of IOActive discovered several security issues in the
-X.org X server, which may lead to privilege escalation or denial of
-service.</p>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed in
-version 2:1.7.7-18+deb6u1.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-120.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-121.data b/english/lts/security/2014/dla-121.data
deleted file mode 100644
index 21a6b89eaa7..00000000000
--- a/english/lts/security/2014/dla-121.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-121-1 jasper</define-tag>
-<define-tag report_date>2014-12-22</define-tag>
-<define-tag secrefs>CVE-2014-8137 CVE-2014-8138</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-121.wml b/english/lts/security/2014/dla-121.wml
deleted file mode 100644
index 42b984366ac..00000000000
--- a/english/lts/security/2014/dla-121.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jose Duart of the Google Security Team discovered a double free flaw
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8137">CVE-2014-8137</a>) and a heap-based buffer overflow flaw (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8138">CVE-2014-8138</a>)
-in JasPer, a library for manipulating JPEG-2000 files. A specially
-crafted file could cause an application using JasPer to crash or,
-possibly, execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in jasper version 1.900.1-7+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-121.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-122.data b/english/lts/security/2014/dla-122.data
deleted file mode 100644
index a98c3ab7fa3..00000000000
--- a/english/lts/security/2014/dla-122.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-122-1 eglibc</define-tag>
-<define-tag report_date>2014-12-23</define-tag>
-<define-tag secrefs>CVE-2014-9402</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-122.wml b/english/lts/security/2014/dla-122.wml
deleted file mode 100644
index dfd40beacc2..00000000000
--- a/english/lts/security/2014/dla-122.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Avoid infinite loop in nss_dns getnetbyname [BZ #17630]</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version 2.11.3-4+deb6u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-122.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-123.data b/english/lts/security/2014/dla-123.data
deleted file mode 100644
index f9aac14101b..00000000000
--- a/english/lts/security/2014/dla-123.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-123-1 firebird2.5</define-tag>
-<define-tag report_date>2014-12-23</define-tag>
-<define-tag secrefs>CVE-2014-9323 Bug#772880</define-tag>
-<define-tag packages>firebird2.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-123.wml b/english/lts/security/2014/dla-123.wml
deleted file mode 100644
index 2e855e52d6c..00000000000
--- a/english/lts/security/2014/dla-123.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apply patch from upstream revision 60322 fixing an unauthenticated remote
-null-pointer dereference crash.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in firebird2.5 version 2.5.0.26054~ReleaseCandidate3.ds2-1+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-123.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-124.data b/english/lts/security/2014/dla-124.data
deleted file mode 100644
index 7b789589946..00000000000
--- a/english/lts/security/2014/dla-124.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-124-1 unzip</define-tag>
-<define-tag report_date>2014-12-28</define-tag>
-<define-tag secrefs>CVE-2014-8139 CVE-2014-8140 CVE-2014-8141 Bug#773722</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-124.wml b/english/lts/security/2014/dla-124.wml
deleted file mode 100644
index 789a330b350..00000000000
--- a/english/lts/security/2014/dla-124.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Michele Spagnuolo of the Google Security Team discovered that unzip, an
-extraction utility for archives compressed in .zip format, is affected
-by heap-based buffer overflows within the CRC32 verification function
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8139">CVE-2014-8139</a>), the test_compr_eb() function (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8140">CVE-2014-8140</a>) and the
-getZip64Data() function (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8141">CVE-2014-8141</a>), which may lead to the execution
-of arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unzip version 6.0-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-124.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-125.data b/english/lts/security/2014/dla-125.data
deleted file mode 100644
index baffa1b1285..00000000000
--- a/english/lts/security/2014/dla-125.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-125-1 mime-support</define-tag>
-<define-tag report_date>2014-12-29</define-tag>
-<define-tag secrefs>CVE-2014-7209</define-tag>
-<define-tag packages>mime-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-125.wml b/english/lts/security/2014/dla-125.wml
deleted file mode 100644
index be4173da091..00000000000
--- a/english/lts/security/2014/dla-125.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Timothy D. Morgan discovered that run-mailcap, an utility to execute
-programs via entries in the mailcap file, is prone to shell command
-injection via shell meta-characters in filenames. In specific scenarios
-this flaw could allow an attacker to remotely execute arbitrary code.</p>
-
-<p>For the oldstable distribution (squeeze), this problem has been fixed in
-version 3.48-1+deb6u1.</p>
-
-<p>We recommend that you upgrade your mime-support packages.</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-125.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-126.data b/english/lts/security/2014/dla-126.data
deleted file mode 100644
index 14b296e1cf8..00000000000
--- a/english/lts/security/2014/dla-126.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-126-1 ettercap</define-tag>
-<define-tag report_date>2014-12-29</define-tag>
-<define-tag secrefs>CVE-2014-9380 CVE-2014-9381 Bug#773416</define-tag>
-<define-tag packages>ettercap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-126.wml b/english/lts/security/2014/dla-126.wml
deleted file mode 100644
index 664b7b27ce2..00000000000
--- a/english/lts/security/2014/dla-126.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Patches a bunch of security vulnerabilities:</p>
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9380">CVE-2014-9380</a> (Buffer over-read)</li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9381">CVE-2014-9381</a> (Signedness error)</li>
-</ul>
-<p>See: <a href="https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/">https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/</a>
- Patches taken from upstream</p>
-<ul>
-<li>6b196e011fa456499ed4650a360961a2f1323818 pull/608</li>
-<li>31b937298c8067e6b0c3217c95edceb983dfc4a2 pull/609</li>
-</ul>
-<p>Thanks to Nick Sampanis who is responsible for
- both finding and repairing these issues.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ettercap version 1:0.7.3-2.1+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-126.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-17.data b/english/lts/security/2014/dla-17.data
deleted file mode 100644
index 511bd7ad2be..00000000000
--- a/english/lts/security/2014/dla-17.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-17-1 tor</define-tag>
-<define-tag report_date>2014-7-31</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-17.wml b/english/lts/security/2014/dla-17.wml
deleted file mode 100644
index 4e159e4c9fb..00000000000
--- a/english/lts/security/2014/dla-17.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Tor version previously in Debian squeeze, 0.2.2.39, is no longer
-supported by upstream.</p>
-
-<p>This update brings the currently stable version of Tor, 0.2.4.23, to
-Debian squeeze.</p>
-
-<p>Changes include use of stronger cryptographic primitives, always
-clearing bignums before freeing them to avoid leaving key material in
-memory, mitigating several linkability vectors such as by disabling
-client-side DNS caches, blacklisting authority signing keys potentially
-compromised due to heartbleed, updating the list of directory
-authorities, and much more.</p>
-
-<p>We recommend that you upgrade your tor packages.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tor version 0.2.4.23-1~deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-17.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-20.data b/english/lts/security/2014/dla-20.data
deleted file mode 100644
index befe8f03c52..00000000000
--- a/english/lts/security/2014/dla-20.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-20-1 munin</define-tag>
-<define-tag report_date>2014-8-7</define-tag>
-<define-tag secrefs>CVE-2012-3512 CVE-2013-6048 CVE-2013-6359</define-tag>
-<define-tag packages>munin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-20.wml b/english/lts/security/2014/dla-20.wml
deleted file mode 100644
index 31963e95432..00000000000
--- a/english/lts/security/2014/dla-20.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>[ Christoph Biedl ]</p>
-<ul>
-<li>munin-node: more secure state file handling, introducing a new plugin
- state directory root, owned by uid 0. Then each plugin runs in its own
- UID plugin state directory, owned by that UID. (Closes: #684075),
- (Closes: #679897), closes <a href="https://security-tracker.debian.org/tracker/CVE-2012-3512">CVE-2012-3512</a>.</li>
-<li>plugins: use runtime $ENV{MUNIN_PLUGSTATE}. So all properly written
- plugins will use /var/lib/munin-node/plugin-state/$uid/$some_file now please report plugins that are still using /var/lib/munin/plugin-state/ as those might pose a security risk!</li>
-<li>Don't abort data collection for a node due to malicious node, fixing
- munin#1397, <a href="https://security-tracker.debian.org/tracker/CVE-2013-6048">CVE-2013-6048</a>.</li>
-<li>Validate multigraph plugin name, <a href="https://security-tracker.debian.org/tracker/CVE-2013-6359">CVE-2013-6359</a>.</li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in munin version 1.4.5-3+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-20.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-23.data b/english/lts/security/2014/dla-23.data
deleted file mode 100644
index ac46e83f450..00000000000
--- a/english/lts/security/2014/dla-23.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-23-1 nss</define-tag>
-<define-tag report_date>2014-7-31</define-tag>
-<define-tag secrefs>CVE-2013-1741 CVE-2013-5606 CVE-2014-1491 CVE-2014-1492</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-23.wml b/english/lts/security/2014/dla-23.wml
deleted file mode 100644
index 6c46f9801b0..00000000000
--- a/english/lts/security/2014/dla-23.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1741">CVE-2013-1741</a>
-
- <p>Runaway memset in certificate parsing on 64-bit computers leading to
- a crash by attempting to write 4Gb of nulls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-5606">CVE-2013-5606</a>
-
- <p>Certificate validation with the verifylog mode did not return
- validation errors, but instead expected applications to determine
- the status by looking at the log.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1491">CVE-2014-1491</a>
-
- <p>Ticket handling protection mechanisms bypass due to the lack of
- restriction of public values in Diffie-Hellman key exchanges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1492">CVE-2014-1492</a>
-
- <p>Incorrect IDNA domain name matching for wildcard certificates could
- allow specially-crafted invalid certificates to be considered as
- valid.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nss version 3.12.8-1+squeeze8</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-23.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-24.data b/english/lts/security/2014/dla-24.data
deleted file mode 100644
index 41d8e72b194..00000000000
--- a/english/lts/security/2014/dla-24.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-24-1 poppler</define-tag>
-<define-tag report_date>2014-7-31</define-tag>
-<define-tag secrefs>CVE-2010-5110 Bug#722705</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-24.wml b/english/lts/security/2014/dla-24.wml
deleted file mode 100644
index bf97e3c827a..00000000000
--- a/english/lts/security/2014/dla-24.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that poppler did return program execution to the
-libjpeg library under error conditions, which is not expected by the
-library and results in application crash and possibly code execution.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in poppler version 0.12.4-1.2+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-24.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-25-2.data b/english/lts/security/2014/dla-25-2.data
deleted file mode 100644
index a35d11132e1..00000000000
--- a/english/lts/security/2014/dla-25-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-25-2 python2.6</define-tag>
-<define-tag report_date>2014-8-5</define-tag>
-<define-tag packages>python2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-25-2.wml b/english/lts/security/2014/dla-25-2.wml
deleted file mode 100644
index dfaa7c15359..00000000000
--- a/english/lts/security/2014/dla-25-2.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression has been identified in the python2.6 update of DLA-25-1,
-which may cause python applications to abort if they were running during
-the upgrade but they had not already imported the <q>os</q> module, and do so
-after the upgrade. This update fixes this upgrade scenario.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python2.6 version 2.6.6-8+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-25-2.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-25-3.data b/english/lts/security/2014/dla-25-3.data
deleted file mode 100644
index 6571d9c8207..00000000000
--- a/english/lts/security/2014/dla-25-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-25-3 python2.6</define-tag>
-<define-tag report_date>2014-8-13</define-tag>
-<define-tag secrefs>Bug#757776</define-tag>
-<define-tag packages>python2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-25-3.wml b/english/lts/security/2014/dla-25-3.wml
deleted file mode 100644
index cabfd365b11..00000000000
--- a/english/lts/security/2014/dla-25-3.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The python2.6 packages distributed for squeeze-lts lacked some modules
-due to the package being built on systems running a 3.x version of the
-linux kernel.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python2.6 version 2.6.6-8+deb6u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-25-3.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-25.data b/english/lts/security/2014/dla-25.data
deleted file mode 100644
index 7ab471cd6dc..00000000000
--- a/english/lts/security/2014/dla-25.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-25-2 python2.6</define-tag>
-<define-tag report_date>2014-7-31, 2014-8-5</define-tag>
-<define-tag secrefs>CVE-2011-1015 CVE-2011-1521 CVE-2011-4940 CVE-2011-4944 CVE-2012-0845 CVE-2012-1150 CVE-2013-4238 CVE-2014-1912</define-tag>
-<define-tag packages>python2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-25.wml b/english/lts/security/2014/dla-25.wml
deleted file mode 100644
index 7eeb766ece6..00000000000
--- a/english/lts/security/2014/dla-25.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression has been identified in the python2.6 update of DLA-25-1,
-which may cause python applications to abort if they were running during
-the upgrade but they had not already imported the 'os' module, and do so
-after the upgrade. This update fixes this upgrade scenario.</p>
-
-<p>For reference, the original advisory text follows.</p>
-
-<p>Multiple vulnerabilities were discovered in python2.6. The more
-relevant are:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4238">CVE-2013-4238</a>
-
- <p>Incorrect handling of NUL bytes in certificate hostnames may allow
- server spoofing via specially-crafted certificates signed by
- a trusted Certification Authority.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1912">CVE-2014-1912</a>
-
- <p>Buffer overflow in socket.recvfrom_into leading to application
- crash and possibly code execution.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python2.6 version 2.6.6-8+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-25.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-26.data b/english/lts/security/2014/dla-26.data
deleted file mode 100644
index 741d01d8278..00000000000
--- a/english/lts/security/2014/dla-26.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-26-1 python-scipy</define-tag>
-<define-tag report_date>2014-7-31</define-tag>
-<define-tag secrefs>CVE-2013-4251 Bug#726093</define-tag>
-<define-tag packages>python-scipy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-26.wml b/english/lts/security/2014/dla-26.wml
deleted file mode 100644
index 9f077047d46..00000000000
--- a/english/lts/security/2014/dla-26.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that python-scipy did not correctly handle temporary
-directories, which may allow arbitrary code execution.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python-scipy version 0.7.2+dfsg1-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-26.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-27.data b/english/lts/security/2014/dla-27.data
deleted file mode 100644
index 1f5881070c3..00000000000
--- a/english/lts/security/2014/dla-27.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-27-1 file</define-tag>
-<define-tag report_date>2014-7-31</define-tag>
-<define-tag secrefs>CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-27.wml b/english/lts/security/2014/dla-27.wml
deleted file mode 100644
index e1d9aed9fcf..00000000000
--- a/english/lts/security/2014/dla-27.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fix various denial of service attacks:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3487">CVE-2014-3487</a>
-
- <p>The cdf_read_property_info function does not properly validate a stream
- offset, which allows remote attackers to cause a denial of service
- (application crash) via a crafted CDF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3480">CVE-2014-3480</a>
-
- <p>The cdf_count_chain function in cdf.c in does not properly validate
- sector-count data, which allows remote attackers to cause a denial of
-service
- (application crash) via a crafted CDF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3479">CVE-2014-3479</a>
-
- <p>The cdf_check_stream_offset function in cdf.c relies on incorrect
- sector-size data, which allows remote attackers to cause a denial of service
- (application crash) via a crafted stream offset in a CDF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3478">CVE-2014-3478</a>
-
- <p>Buffer overflow in the mconvert function in softmagic.c allows remote
- attackers to cause a denial of service (application crash) via a crafted
- Pascal string in a FILE_PSTRING conversion.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0238">CVE-2014-0238</a>
-
- <p>The cdf_read_property_info function in cdf.c allows remote attackers to
- cause a denial of service (infinite loop or out-of-bounds memory access) via
- a vector that (1) has zero length or (2) is too long.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0237">CVE-2014-0237</a>
-
- <p>The cdf_unpack_summary_info function in cdf.c allows remote attackers to
- cause a denial of service (performance degradation) by triggering many
- file_printf calls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0207">CVE-2014-0207</a>
-
- <p>The cdf_read_short_sector function in cdf.c allows remote attackers to
- cause a denial of service (assertion failure and application exit) via a
- crafted CDF file.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in file version 5.04-5+squeeze6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-27.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-28.data b/english/lts/security/2014/dla-28.data
deleted file mode 100644
index 888324b97f6..00000000000
--- a/english/lts/security/2014/dla-28.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-28-1 augeas</define-tag>
-<define-tag report_date>2014-8-01</define-tag>
-<define-tag secrefs>CVE-2012-0786 CVE-2012-0787 CVE-2013-6412 Bug#731111 Bug#731132</define-tag>
-<define-tag packages>augeas</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-28.wml b/english/lts/security/2014/dla-28.wml
deleted file mode 100644
index e9126141366..00000000000
--- a/english/lts/security/2014/dla-28.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple race conditions were discovered in augeas when saving
-configuration files which expose it to symlink attacks.
-Write access to the directory where the configuration file is located
-is required by the attacker.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in augeas version 0.7.2-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-28.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-29.data b/english/lts/security/2014/dla-29.data
deleted file mode 100644
index 1778e36e30a..00000000000
--- a/english/lts/security/2014/dla-29.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-29-1 puppet</define-tag>
-<define-tag report_date>2014-8-01</define-tag>
-<define-tag secrefs>CVE-2012-6120</define-tag>
-<define-tag packages>puppet</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-29.wml b/english/lts/security/2014/dla-29.wml
deleted file mode 100644
index 25f07e44cfa..00000000000
--- a/english/lts/security/2014/dla-29.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the puppet package did not restrict the
-permissions and ownership of the /var/log/puppet directory, which
-may expose sensitive information.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in puppet version 2.6.2-5+squeeze10</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-29.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-30.data b/english/lts/security/2014/dla-30.data
deleted file mode 100644
index 2d2b392356e..00000000000
--- a/english/lts/security/2014/dla-30.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-30-1 acpi-support</define-tag>
-<define-tag report_date>2014-8-05</define-tag>
-<define-tag secrefs>CVE-2014-1419</define-tag>
-<define-tag packages>acpi-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-30.wml b/english/lts/security/2014/dla-30.wml
deleted file mode 100644
index 45f96bb0e49..00000000000
--- a/english/lts/security/2014/dla-30.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>CESG discovered a race condition in acpi-support which may allow
-an unprivileged user to execute arbitrary code as a different user,
-including root.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in acpi-support version 0.137-5+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-30.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-31.data b/english/lts/security/2014/dla-31.data
deleted file mode 100644
index c4839346416..00000000000
--- a/english/lts/security/2014/dla-31.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-31-1 reportbug</define-tag>
-<define-tag report_date>2014-8-7</define-tag>
-<define-tag secrefs>CVE-2014-0479</define-tag>
-<define-tag packages>reportbug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-31.wml b/english/lts/security/2014/dla-31.wml
deleted file mode 100644
index d408556266e..00000000000
--- a/english/lts/security/2014/dla-31.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fix <a href="https://security-tracker.debian.org/tracker/CVE-2014-0479">CVE-2014-0479</a>: Arbitrary code execution in compare_versions.
-A man-in-the-middle attacker could put shell metacharacters in the
-version number, causing execution of code of their choice.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in reportbug version 4.12.6+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-31.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-32.data b/english/lts/security/2014/dla-32.data
deleted file mode 100644
index 23cb6f1f5d7..00000000000
--- a/english/lts/security/2014/dla-32.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-32-1 nspr</define-tag>
-<define-tag report_date>2014-8-7</define-tag>
-<define-tag secrefs>CVE-2014-1545</define-tag>
-<define-tag packages>nspr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-32.wml b/english/lts/security/2014/dla-32.wml
deleted file mode 100644
index d9cca0dc210..00000000000
--- a/english/lts/security/2014/dla-32.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Abhiskek Arya discovered an out of bounds write in the cvt_t() function of the
-NetScape Portable Runtime Library which could result in the execution of
-arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nspr version 4.8.6-1+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-32.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-33.data b/english/lts/security/2014/dla-33.data
deleted file mode 100644
index 78397273430..00000000000
--- a/english/lts/security/2014/dla-33.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-33-1 openssl</define-tag>
-<define-tag report_date>2014-8-7</define-tag>
-<define-tag secrefs>CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3510</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-33.wml b/english/lts/security/2014/dla-33.wml
deleted file mode 100644
index 8042089d4ad..00000000000
--- a/english/lts/security/2014/dla-33.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Detailed descriptions of the vulnerabilities can be found at:
-<a href="https://www.openssl.org/news/secadv_20140806.txt">https://www.openssl.org/news/secadv_20140806.txt</a></p>
-
-<p>It's important that you upgrade the libssl0.9.8 package and not just
-the openssl package.</p>
-
-<p>All applications linked to openssl need to be restarted. You can use
-the <q>checkrestart</q> tool from the debian-goodies package to detect
-affected programs. Alternatively, you may reboot your system.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze17</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-33.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-34.data b/english/lts/security/2014/dla-34.data
deleted file mode 100644
index 23cbb9b48a3..00000000000
--- a/english/lts/security/2014/dla-34.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-34-1 libapache-mod-security</define-tag>
-<define-tag report_date>2014-8-9</define-tag>
-<define-tag secrefs>CVE-2013-5705</define-tag>
-<define-tag packages>libapache-mod-security</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-34.wml b/english/lts/security/2014/dla-34.wml
deleted file mode 100644
index 94f65b1f6d9..00000000000
--- a/english/lts/security/2014/dla-34.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Martin Holst Swende discovered a flaw in the way mod_security handled chunked
-requests. A remote attacker could use this flaw to bypass intended mod_security
-restrictions, allowing them to send requests containing content that should
-have been removed by mod_security.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libapache-mod-security version 2.5.12-1+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-34.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-35.data b/english/lts/security/2014/dla-35.data
deleted file mode 100644
index 3163e0f0ad1..00000000000
--- a/english/lts/security/2014/dla-35.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-35-1 lzo2</define-tag>
-<define-tag report_date>2014-8-11</define-tag>
-<define-tag secrefs>CVE-2014-4607 Bug##752861</define-tag>
-<define-tag packages>lzo2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-35.wml b/english/lts/security/2014/dla-35.wml
deleted file mode 100644
index 5f9a47a761e..00000000000
--- a/english/lts/security/2014/dla-35.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fix integer overflow in lzo1x_decompress_safe() allowing denial of service or
-code execution.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in lzo2 version 2.03-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-35.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-36.data b/english/lts/security/2014/dla-36.data
deleted file mode 100644
index 127dc57220e..00000000000
--- a/english/lts/security/2014/dla-36.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-36-1 polarssl</define-tag>
-<define-tag report_date>2014-8-11</define-tag>
-<define-tag secrefs>CVE-2014-4911 Bug##754655</define-tag>
-<define-tag packages>polarssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-36.wml b/english/lts/security/2014/dla-36.wml
deleted file mode 100644
index 415e3f6694b..00000000000
--- a/english/lts/security/2014/dla-36.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Denial of Service against GCM enabled servers (and clients).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in polarssl version 1.2.9-1~deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-36.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-37.data b/english/lts/security/2014/dla-37.data
deleted file mode 100644
index 1cd8ba67790..00000000000
--- a/english/lts/security/2014/dla-37.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-37-1 krb5</define-tag>
-<define-tag report_date>2014-8-18</define-tag>
-<define-tag secrefs>CVE-2014-4341 CVE-2014-4342 CVE-2014-4343 CVE-2014-4344 CVE-2014-4345 Bug##753624 Bug##753625 Bug##755520 Bug##755521 Bug##757416</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-37.wml b/english/lts/security/2014/dla-37.wml
deleted file mode 100644
index edb0211aa95..00000000000
--- a/english/lts/security/2014/dla-37.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in krb5, the MIT implementation
-of Kerberos. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4341">CVE-2014-4341</a>
-
- <p>An unauthenticated remote attacker with the ability to inject
- packets into a legitimately established GSSAPI application session
- can cause a program crash due to invalid memory references when
- attempting to read beyond the end of a buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4342">CVE-2014-4342</a>
-
- <p>An unauthenticated remote attacker with the ability to inject
- packets into a legitimately established GSSAPI application session
- can cause a program crash due to invalid memory references when
- reading beyond the end of a buffer or by causing a null pointer
- dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4343">CVE-2014-4343</a>
-
- <p>An unauthenticated remote attacker with the ability to spoof packets
- appearing to be from a GSSAPI acceptor can cause a double-free
- condition in GSSAPI initiators (clients) which are using the SPNEGO
- mechanism, by returning a different underlying mechanism than was
- proposed by the initiator. A remote attacker could exploit this flaw
- to cause an application crash or potentially execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4344">CVE-2014-4344</a>
-
- <p>An unauthenticated or partially authenticated remote attacker can
- cause a NULL dereference and application crash during a SPNEGO
- negotiation by sending an empty token as the second or later context
- token from initiator to acceptor.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4345">CVE-2014-4345</a>
-
- <p>When kadmind is configured to use LDAP for the KDC database, an
- authenticated remote attacker can cause it to perform an
- out-of-bounds write (buffer overflow).</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in krb5 version 1.8.3+dfsg-4squeeze8</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-37.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-38.data b/english/lts/security/2014/dla-38.data
deleted file mode 100644
index 05ae0d5ee46..00000000000
--- a/english/lts/security/2014/dla-38.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-38-1 wireshark</define-tag>
-<define-tag report_date>2014-8-20</define-tag>
-<define-tag secrefs>CVE-2014-5161 CVE-2014-5162 CVE-2014-5163</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-38.wml b/english/lts/security/2014/dla-38.wml
deleted file mode 100644
index a7f326eebb1..00000000000
--- a/english/lts/security/2014/dla-38.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5161">CVE-2014-5161</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2014-5162">CVE-2014-5162</a>
-
- <p>The Catapult DCT2000 and IrDA dissectors could underrun a buffer.
- It may be possible to make Wireshark crash by injecting a malformed packet onto
- the wire or by convincing someone to read a malformed packet trace file.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5163">CVE-2014-5163</a>
-
- <p>The GSM Management dissector could crash.
- It may be possible to make Wireshark crash by injecting a malformed packet onto
- the wire or by convincing someone to read a malformed packet trace file.</p></li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in wireshark version 1.2.11-6+squeeze15</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-38.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-39.data b/english/lts/security/2014/dla-39.data
deleted file mode 100644
index 482ce43ad93..00000000000
--- a/english/lts/security/2014/dla-39.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-39-1 gpgme1.0</define-tag>
-<define-tag report_date>2014-8-20</define-tag>
-<define-tag secrefs>CVE-2014-3564 Bug#756651</define-tag>
-<define-tag packages>gpgme1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-39.wml b/english/lts/security/2014/dla-39.wml
deleted file mode 100644
index 2cfbdcbec52..00000000000
--- a/english/lts/security/2014/dla-39.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tomas Trnka discovered a heap-based buffer overflow within the gpgsm
-status handler of GPGME, a library designed to make access to GnuPG
-easier for applications. An attacker could use this issue to cause an
-application using GPGME to crash (denial of service) or possibly to
-execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gpgme1.0 version 1.2.0-1.2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-39.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-40.data b/english/lts/security/2014/dla-40.data
deleted file mode 100644
index 464c1874814..00000000000
--- a/english/lts/security/2014/dla-40.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-40-1 cacti</define-tag>
-<define-tag report_date>2014-8-22</define-tag>
-<define-tag secrefs>CVE-2014-5025 CVE-2014-5026 CVE-2014-5261 CVE-2014-5262 Bug#755032</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-40.wml b/english/lts/security/2014/dla-40.wml
deleted file mode 100644
index c42f3793507..00000000000
--- a/english/lts/security/2014/dla-40.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues (cross-site scripting, missing input sanitizing
-and SQL injection) have been discovered in Cacti, a web interface for
-graphing of monitoring systems.</p>
-
-<p>Furthermore, the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-4002">CVE-2014-4002</a> in the previous security update
-has been brought in-line with the upstream fix as it caused a
-regression for people using the plug-in system.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in cacti version 0.8.7g-1+squeeze5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-40.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-41.data b/english/lts/security/2014/dla-41.data
deleted file mode 100644
index 0f581423736..00000000000
--- a/english/lts/security/2014/dla-41.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-41-1 python-imaging</define-tag>
-<define-tag report_date>2014-8-24</define-tag>
-<define-tag secrefs>CVE-2014-3589</define-tag>
-<define-tag packages>python-imaging</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-41.wml b/english/lts/security/2014/dla-41.wml
deleted file mode 100644
index 99921238e49..00000000000
--- a/english/lts/security/2014/dla-41.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andrew Drake discovered that missing input sanitising in the icns decoder
-of the Python Imaging Library could result in denial of service if a
-malformed image is processed.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python-imaging version 1.1.7-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-41.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-42.data b/english/lts/security/2014/dla-42.data
deleted file mode 100644
index 552a01329e5..00000000000
--- a/english/lts/security/2014/dla-42.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-42-1 live-config</define-tag>
-<define-tag report_date>2014-8-29</define-tag>
-<define-tag secrefs>Bug#741678</define-tag>
-<define-tag packages>live-config</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-42.wml b/english/lts/security/2014/dla-42.wml
deleted file mode 100644
index 6362c26fcf3..00000000000
--- a/english/lts/security/2014/dla-42.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability against Debian Live, the live systems project, was reported. The
-default, the live images include a SSH server allowing for log in with default
-user and password. This fix set PasswordAuthentication in /etc/ssh/sshd_config
-as <q>no</q>.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in live-config version 2.0.15-1.1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-42.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-43.data b/english/lts/security/2014/dla-43.data
deleted file mode 100644
index 3cde6029378..00000000000
--- a/english/lts/security/2014/dla-43.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-43-1 eglibc</define-tag>
-<define-tag report_date>2014-9-2</define-tag>
-<define-tag secrefs>CVE-2014-0475 CVE-2014-5119</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-43.wml b/english/lts/security/2014/dla-43.wml
deleted file mode 100644
index 868d554e168..00000000000
--- a/english/lts/security/2014/dla-43.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0475">CVE-2014-0475</a>
-
- <p>Stephane Chazelas discovered that the GNU C library, glibc, processed
- ".." path segments in locale-related environment variables, possibly
- allowing attackers to circumvent intended restrictions, such as
- ForceCommand in OpenSSH, assuming that they can supply crafted locale
- settings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5119">CVE-2014-5119</a>
-
- <p>Tavis Ormandy discovered a heap-based buffer overflow in the
- transliteration module loading code in eglibc, Debian's version of the
- GNU C Library. As a result, an attacker who can supply a crafted
- destination character set argument to iconv-related character
- conversation functions could achieve arbitrary code execution.</p>
-
- <p>This update removes support of loadable gconv transliteration modules.
- Besides the security vulnerability, the module loading code had
- functionality defects which prevented it from working for the intended
- purpose.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version 2.11.3-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-43.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-44.data b/english/lts/security/2014/dla-44.data
deleted file mode 100644
index 3ce889cfcb1..00000000000
--- a/english/lts/security/2014/dla-44.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-44-1 libwpd</define-tag>
-<define-tag report_date>2014-9-3</define-tag>
-<define-tag secrefs>CVE-2012-2149</define-tag>
-<define-tag packages>libwpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-44.wml b/english/lts/security/2014/dla-44.wml
deleted file mode 100644
index c3d5044daeb..00000000000
--- a/english/lts/security/2014/dla-44.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fix arbitrary code execution by remote attackers via crafted Wordperfect .WPD
-documents.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libwpd version 0.8.14-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-44.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-45.data b/english/lts/security/2014/dla-45.data
deleted file mode 100644
index f58f6addf84..00000000000
--- a/english/lts/security/2014/dla-45.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-45-1 squid3</define-tag>
-<define-tag report_date>2014-9-4</define-tag>
-<define-tag secrefs>CVE-2014-3609</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-45.wml b/english/lts/security/2014/dla-45.wml
deleted file mode 100644
index 0164cc595f2..00000000000
--- a/english/lts/security/2014/dla-45.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-3609">CVE-2014-3609</a>: Denial of Service in Range header processing.</p>
-
-<p>Ignore Range headers with unidentifiable byte-range values. If squid is
-unable to determine the byte value for ranges, treat the header as
-invalid.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in squid3 version 3.1.6-1.2+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-45.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-46.data b/english/lts/security/2014/dla-46.data
deleted file mode 100644
index 61a1f313cc0..00000000000
--- a/english/lts/security/2014/dla-46.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-46-1 procmail</define-tag>
-<define-tag report_date>2014-9-5</define-tag>
-<define-tag secrefs>CVE-2014-3618 Bug#704675 Bug#760443</define-tag>
-<define-tag packages>procmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-46.wml b/english/lts/security/2014/dla-46.wml
deleted file mode 100644
index de7dbd82ba4..00000000000
--- a/english/lts/security/2014/dla-46.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Boris <q>pi</q> Piwinger and Tavis Ormandy reported a heap overflow
-vulnerability in procmail's formail utility when processing
-specially-crafted email headers. A remote attacker could use this flaw
-to cause formail to crash, resulting in a denial of service or data
-loss, or possibly execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in procmail version 3.22-19+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-46.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-47.data b/english/lts/security/2014/dla-47.data
deleted file mode 100644
index bb4b33395e7..00000000000
--- a/english/lts/security/2014/dla-47.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-47-1 lua5.1</define-tag>
-<define-tag report_date>2014-9-5</define-tag>
-<define-tag secrefs>CVE-2014-5461</define-tag>
-<define-tag packages>lua5.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-47.wml b/english/lts/security/2014/dla-47.wml
deleted file mode 100644
index 9e353febf19..00000000000
--- a/english/lts/security/2014/dla-47.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fix stack overflow in vararg functions.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in lua5.1 version 5.1.4-5+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-47.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-48.data b/english/lts/security/2014/dla-48.data
deleted file mode 100644
index 5f914d0cb88..00000000000
--- a/english/lts/security/2014/dla-48.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-48-1 bind9</define-tag>
-<define-tag report_date>2014-9-5</define-tag>
-<define-tag secrefs>CVE-2014-0591 Bug#735190</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-48.wml b/english/lts/security/2014/dla-48.wml
deleted file mode 100644
index af92130a302..00000000000
--- a/english/lts/security/2014/dla-48.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fix denial of service attack when processing NSEC3-signed zone
-queries, fixed by not calling memcpy with overlapping ranges in
-bin/named/query.c. - patch backported from 9.8.6-P2 by Marc Deslauriers
-from the Ubuntu Security team for USN-2081-1.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bind9 version 9.7.3.dfsg-1~squeeze12</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-48.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-49.data b/english/lts/security/2014/dla-49.data
deleted file mode 100644
index 6ca7116e615..00000000000
--- a/english/lts/security/2014/dla-49.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-49-1 acpi-support</define-tag>
-<define-tag report_date>2014-9-17</define-tag>
-<define-tag secrefs>CVE-2014-0484</define-tag>
-<define-tag packages>acpi-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-49.wml b/english/lts/security/2014/dla-49.wml
deleted file mode 100644
index 96424486a20..00000000000
--- a/english/lts/security/2014/dla-49.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>During a review for EDF, Raphael Geissert discovered that the
-acpi-support package did not properly handle data obtained from a
-user's environment.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in acpi-support version 0.137-5+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-49.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-50.data b/english/lts/security/2014/dla-50.data
deleted file mode 100644
index 4683b1312f3..00000000000
--- a/english/lts/security/2014/dla-50.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-50-1 file</define-tag>
-<define-tag report_date>2014-9-10</define-tag>
-<define-tag secrefs>CVE-2014-3538 CVE-2014-3587 Bug#-</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-50.wml b/english/lts/security/2014/dla-50.wml
deleted file mode 100644
index 34762b09e0e..00000000000
--- a/english/lts/security/2014/dla-50.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3538">CVE-2014-3538</a>
-
- <p>file does not properly restrict the amount of data read during
- a regex search, which allows remote attackers to cause a
- denial of service (CPU consumption).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3587">CVE-2014-3587</a>
-
- <p>Integer overflow in the cdf_read_property_info function in
- cdf.c allows remote attackers to cause a denial of service
- (application crash).</p></li>
-
-</ul>
-
-<p><b>Note</b>: The other seven issues for wheezy, fixed in 5.11-2+deb7u4
-(<a href="./dsa-3021">DSA-3021-1</a>), were already handled in 5.04-5+squeeze6 (<a href="./dla-27">DLA 27-1</a>) in
-July 2014. Also, as an amendment, as a side effect of the changes
-done back then, the MIME type detection of some files had
-improved from "application/octet-stream" to something more specific
-like "application/x-dosexec" or "application/x-iso9660-image".</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in file version 5.04-5+squeeze7</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-50.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-51.data b/english/lts/security/2014/dla-51.data
deleted file mode 100644
index 7a8bd6d149f..00000000000
--- a/english/lts/security/2014/dla-51.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-51-1 gnupg2</define-tag>
-<define-tag report_date>2014-9-10</define-tag>
-<define-tag secrefs>CVE-2014-4617 Bug#752498</define-tag>
-<define-tag packages>gnupg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-51.wml b/english/lts/security/2014/dla-51.wml
deleted file mode 100644
index 504a8de1431..00000000000
--- a/english/lts/security/2014/dla-51.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jean-Rene Reinhard, Olivier Levillain and Florian Maury reported that
-GnuPG, the GNU Privacy Guard, did not properly parse certain garbled
-compressed data packets. A remote attacker could use this flaw to mount
-a denial of service against GnuPG by triggering an infinite loop.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gnupg2 version 2.0.14-2+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-51.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-52.data b/english/lts/security/2014/dla-52.data
deleted file mode 100644
index 1f5b3bd0445..00000000000
--- a/english/lts/security/2014/dla-52.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-52-1 ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag report_date>2014-9-11</define-tag>
-<define-tag packages>ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-52.wml b/english/lts/security/2014/dla-52.wml
deleted file mode 100644
index 4c877854e7d..00000000000
--- a/english/lts/security/2014/dla-52.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs and ia32-libs-gtk packages contain 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the start of Squeeze LTS.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ia32-libs, ia32-libs-gtk version 20140911</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-52.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-53.data b/english/lts/security/2014/dla-53.data
deleted file mode 100644
index e21e964c34e..00000000000
--- a/english/lts/security/2014/dla-53.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-53-1 apt</define-tag>
-<define-tag report_date>2014-9-3</define-tag>
-<define-tag secrefs>CVE-2014-0487 CVE-2014-0488 CVE-2014-0489</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-53.wml b/english/lts/security/2014/dla-53.wml
deleted file mode 100644
index 86e67609409..00000000000
--- a/english/lts/security/2014/dla-53.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that APT, the high level package manager, does not
-properly invalidate unauthenticated data (<a
-href="https://security-tracker.debian.org/tracker/CVE-2014-0488">CVE-2014-0488</a>),
-performs incorrect verification of 304 replies (<a
-href="https://security-tracker.debian.org/tracker/CVE-2014-0487">CVE-2014-0487</a>)
-and does not perform the checksum check when the Acquire::GzipIndexes option is used
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-0489">CVE-2014-0489</a>).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apt version 0.8.10.3+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-53.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-54.data b/english/lts/security/2014/dla-54.data
deleted file mode 100644
index 6df83b846d2..00000000000
--- a/english/lts/security/2014/dla-54.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-54-1 gnupg</define-tag>
-<define-tag report_date>2014-9-14</define-tag>
-<define-tag secrefs>CVE-2014-5270</define-tag>
-<define-tag packages>gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-54.wml b/english/lts/security/2014/dla-54.wml
deleted file mode 100644
index 4c07a5c61b3..00000000000
--- a/english/lts/security/2014/dla-54.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Genkin, Pipman and Tromer discovered a side-channel attack on Elgamal
-encryption subkeys (<a href="https://security-tracker.debian.org/tracker/CVE-2014-5270">CVE-2014-5270</a>).</p>
-
-<p>In addition, this update hardens GnuPG's behaviour when treating keyserver
-responses; GnuPG now filters keyserver responses to only accepts those
-keyids actually requested by the user.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gnupg version 1.4.10-4+squeeze6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-54.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-55.data b/english/lts/security/2014/dla-55.data
deleted file mode 100644
index ad4642b2d0b..00000000000
--- a/english/lts/security/2014/dla-55.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-55-1 nginx</define-tag>
-<define-tag report_date>2014-9-17</define-tag>
-<define-tag secrefs>CVE-2014-3616</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-55.wml b/english/lts/security/2014/dla-55.wml
deleted file mode 100644
index 7f942e525dc..00000000000
--- a/english/lts/security/2014/dla-55.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Antoine Delignat-Lavaud discovered that it was possible to reuse SSL
-sessions in unrelated contexts if a shared SSL session cache or the same TLS
-session ticket key was used for multiple <q>server</q> blocks.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nginx version 0.7.67-3+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-55.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-56.data b/english/lts/security/2014/dla-56.data
deleted file mode 100644
index 813eda1d8e7..00000000000
--- a/english/lts/security/2014/dla-56.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-56-1 wordpress</define-tag>
-<define-tag report_date>2014-9-17</define-tag>
-<define-tag secrefs>CVE-2014-2053 CVE-2014-5204 CVE-2014-5205 CVE-2014-5240 CVE-2014-5265 CVE-2014-5266</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-56.wml b/english/lts/security/2014/dla-56.wml
deleted file mode 100644
index 5f830d00ef8..00000000000
--- a/english/lts/security/2014/dla-56.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been discovered in Wordpress, a web
-blogging tool, resulting in denial of service or information disclosure.</p>
-
-<p>More information can be found in the upstream advisory at
-<a href="https://wordpress.org/news/2014/08/wordpress-3-9-2/">https://wordpress.org/news/2014/08/wordpress-3-9-2/</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in wordpress version 3.6.1+dfsg-1~deb6u5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-56.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-57.data b/english/lts/security/2014/dla-57.data
deleted file mode 100644
index fcee7bcab8e..00000000000
--- a/english/lts/security/2014/dla-57.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-57-1 libstruts1.2-java</define-tag>
-<define-tag report_date>2014-9-17</define-tag>
-<define-tag secrefs>CVE-2014-0114</define-tag>
-<define-tag packages>libstruts1.2-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-57.wml b/english/lts/security/2014/dla-57.wml
deleted file mode 100644
index 4c6e525e890..00000000000
--- a/english/lts/security/2014/dla-57.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that missing access checks in the Struts ActionForm object
-could result in the execution of arbitrary code. This update fixes this
-problem.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libstruts1.2-java version 1.2.9-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-57.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-58-2.data b/english/lts/security/2014/dla-58-2.data
deleted file mode 100644
index 13536168080..00000000000
--- a/english/lts/security/2014/dla-58-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-58-2 apt</define-tag>
-<define-tag report_date>2014-10-14</define-tag>
-<define-tag secrefs>CVE-2014-6273</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-58-2.wml b/english/lts/security/2014/dla-58-2.wml
deleted file mode 100644
index 03a27f8c575..00000000000
--- a/english/lts/security/2014/dla-58-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a regression introduced in 0.8.10.3+squeeze5 where
-apt would send invalid HTTP requests when sending If-Range queries.</p>
-
-<p>Thanks to Steven McDonald who reported[1] the regression and to Michael
-Vogt for having uploaded a fixed package.</p>
-
-<p>[1] <a href="https://lists.debian.org/debian-lts/2014/10/msg00023.html">https://lists.debian.org/debian-lts/2014/10/msg00023.html</a>
-<br>
-[2] <a href="https://tracker.debian.org/news/577677">https://tracker.debian.org/news/577677</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apt version 0.8.10.3+squeeze6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-58-2.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-58-3.data b/english/lts/security/2014/dla-58-3.data
deleted file mode 100644
index 3e6ab7977a6..00000000000
--- a/english/lts/security/2014/dla-58-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-58-3 apt</define-tag>
-<define-tag report_date>2014-10-28</define-tag>
-<define-tag secrefs>Bug#710924</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-58-3.wml b/english/lts/security/2014/dla-58-3.wml
deleted file mode 100644
index 917d5df4ebd..00000000000
--- a/english/lts/security/2014/dla-58-3.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The recent security updates to apt make apt bug #710924 [1] much
-easier to trigger. Affected users see <q>416 Requested Range Not
-Satisfiable</q> errors during a apt-get update operation. With the
-0.8.10.3+squeeze7 upload the fix for this error that was originally
-introduced in version 0.9.12 [2] is now backported.</p>
-
-<p>[1] <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bugq0924">https://bugs.debian.org/cgi-bin/bugreport.cgi?bugq0924</a>
-<br>
-[2] <a href="http://anonscm.debian.org/cgit/apt/apt.git/commit/?id31e8396ee5a4f2e7d276eddc54749b2a13dd789">http://anonscm.debian.org/cgit/apt/apt.git/commit/?id31e8396ee5a4f2e7d276eddc54749b2a13dd789</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apt version 0.8.10.3+squeeze7</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-58-3.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-58.data b/english/lts/security/2014/dla-58.data
deleted file mode 100644
index 59468d45000..00000000000
--- a/english/lts/security/2014/dla-58.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-58-2 apt</define-tag>
-<define-tag report_date>2014-9-23, 2014-10-14</define-tag>
-<define-tag secrefs>CVE-2014-6273</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-58.wml b/english/lts/security/2014/dla-58.wml
deleted file mode 100644
index fbefc86f73f..00000000000
--- a/english/lts/security/2014/dla-58.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a regression introduced in 0.8.10.3+squeeze5 where
-apt would send invalid HTTP requests when sending If-Range queries.</p>
-
-<p>For reference, the original advisory text follows.</p>
-
-<p>The Google Security Team discovered a buffer overflow vulnerability in
-the HTTP transport code in apt-get. An attacker able to
-man-in-the-middle a HTTP request to an apt repository can trigger the
-buffer overflow, leading to a crash of the <q>http</q> apt method binary, or
-potentially to arbitrary code execution.</p>
-
-<p>The following regression fixes were included in this update:</p>
-
-<ul>
-
- <li>Fix regression from the previous update in <a href="dla-53">DLA-53-1</a>
- when the custom apt configuration option for Dir::state::lists is set to a
- relative path (#762160).</li>
-
- <li>Fix regression in the reverificaiton handling of cdrom: sources that
- may lead to incorrect hashsum warnings. Affected users need to run
- "apt-cdrom add" again after the update was applied.</li>
-
- <li>Fix regression from the previous update in <a href="dla-53">DLA-53-1</a>
- when file:/// sources are used and those are on a different partition than
- the apt state directory.</li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apt version 0.8.10.3+squeeze6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-58.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-59.data b/english/lts/security/2014/dla-59.data
deleted file mode 100644
index 74eee02bdf1..00000000000
--- a/english/lts/security/2014/dla-59.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-59-1 bash</define-tag>
-<define-tag report_date>2014-9-24</define-tag>
-<define-tag secrefs>CVE-2014-6271</define-tag>
-<define-tag packages>bash</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-59.wml b/english/lts/security/2014/dla-59.wml
deleted file mode 100644
index 70f18e5b9da..00000000000
--- a/english/lts/security/2014/dla-59.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Stephane Chazelas discovered a vulnerability in bash, the GNU
-Bourne-Again Shell, related to how environment variables are
-processed. In many common configurations, this vulnerability is
-exploitable over the network, especially if bash has been configured
-as the system shell.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bash version 4.1-3+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-59.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-60.data b/english/lts/security/2014/dla-60.data
deleted file mode 100644
index b80dd731758..00000000000
--- a/english/lts/security/2014/dla-60.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-60-1 icinga</define-tag>
-<define-tag report_date>2014-9-24</define-tag>
-<define-tag secrefs>CVE-2013-7108 CVE-2014-1878</define-tag>
-<define-tag packages>icinga</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-60.wml b/english/lts/security/2014/dla-60.wml
deleted file mode 100644
index dd29ecde80b..00000000000
--- a/english/lts/security/2014/dla-60.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two fixes for the Classic UI:</p>
-<ul>
- <li>fix off-by-one memory access in process_cgivars() (<a href="https://security-tracker.debian.org/tracker/CVE-2013-7108">CVE-2013-7108</a>)</li>
- <li>prevent possible buffer overflows in cmd.cgi (<a href="https://security-tracker.debian.org/tracker/CVE-2014-1878">CVE-2014-1878</a>)</li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in icinga version 1.0.2-2+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-60.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-61.data b/english/lts/security/2014/dla-61.data
deleted file mode 100644
index 1b5179d0403..00000000000
--- a/english/lts/security/2014/dla-61.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-61-1 libplack-perl</define-tag>
-<define-tag report_date>2014-9-24</define-tag>
-<define-tag secrefs>CVE-2014-5269</define-tag>
-<define-tag packages>libplack-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-61.wml b/english/lts/security/2014/dla-61.wml
deleted file mode 100644
index 1e6913ff47a..00000000000
--- a/english/lts/security/2014/dla-61.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apply fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-5269">CVE-2014-5269</a>: Plack::App::File would previously strip trailing
-slashes off provided paths. This could under specific circumstances lead to
-the unintended delivery of files. For details see
-<a href="https://github.com/plack/Plack/pull/446">https://github.com/plack/Plack/pull/446</a> .</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libplack-perl version 0.9941-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-61.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-62.data b/english/lts/security/2014/dla-62.data
deleted file mode 100644
index 4ae448370cf..00000000000
--- a/english/lts/security/2014/dla-62.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-62-1 nss</define-tag>
-<define-tag report_date>2014-9-25</define-tag>
-<define-tag secrefs>CVE-2014-1568</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-62.wml b/english/lts/security/2014/dla-62.wml
deleted file mode 100644
index 87fb548990b..00000000000
--- a/english/lts/security/2014/dla-62.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Antoine Delignat-Lavaud from Inria discovered an issue in the way NSS
-(the Mozilla Network Security Service library) was parsing ASN.1 data
-used in signatures, making it vulnerable to a signature forgery attack.</p>
-
-<p>An attacker could craft ASN.1 data to forge RSA certificates with a
-valid certification chain to a trusted CA.</p>
-
-<p>This update fixes this issue for the NSS libraries.</p>
-
-<p>Note that iceweasel, which is also affected by <a href="https://security-tracker.debian.org/tracker/CVE-2014-1568">CVE-2014-1568</a>, however
-has reached end-of-life in Squeeze(-LTS) and thus has not been fixed.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nss version 3.12.8-1+squeeze9</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-62.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-63.data b/english/lts/security/2014/dla-63.data
deleted file mode 100644
index c784f770ae9..00000000000
--- a/english/lts/security/2014/dla-63.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-63-1 bash</define-tag>
-<define-tag report_date>2014-9-26</define-tag>
-<define-tag secrefs>CVE-2014-7169 Bug#762760 Bug#762761</define-tag>
-<define-tag packages>bash</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-63.wml b/english/lts/security/2014/dla-63.wml
deleted file mode 100644
index 3996a3cf1aa..00000000000
--- a/english/lts/security/2014/dla-63.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that the patch applied to fix <a href="https://security-tracker.debian.org/tracker/CVE-2014-6271">CVE-2014-6271</a>
-released in <a href="dla-59">DLA-59-1</a> for bash, the GNU Bourne-Again Shell,
-was incomplete and could still allow some characters to be injected into
-another environment (<a href="https://security-tracker.debian.org/tracker/CVE-2014-7169">CVE-2014-7169</a>). With this update prefix and suffix
-for environment variable names which contain shell functions are added
-as hardening measure.</p>
-
-<p>Additionally two out-of-bounds array accesses in the bash parser are
-fixed which were revealed in Red Hat's internal analysis for these
-issues and also independently reported by Todd Sabin.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bash version 4.1-3+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-63.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-64.data b/english/lts/security/2014/dla-64.data
deleted file mode 100644
index c8490ebde5a..00000000000
--- a/english/lts/security/2014/dla-64.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-64-1 curl</define-tag>
-<define-tag report_date>2014-9-26</define-tag>
-<define-tag secrefs>CVE-2014-3613</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-64.wml b/english/lts/security/2014/dla-64.wml
deleted file mode 100644
index 1d9393bf80b..00000000000
--- a/english/lts/security/2014/dla-64.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-3613">CVE-2014-3613</a></p>
-
- <p>By not detecting and rejecting domain names for partial literal IP
- addresses properly when parsing received HTTP cookies, libcurl can
- be fooled to both sending cookies to wrong sites and into allowing
- arbitrary sites to set cookies for others.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in curl version 7.21.0-2.1+squeeze9</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-64.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-65.data b/english/lts/security/2014/dla-65.data
deleted file mode 100644
index cc811422ac1..00000000000
--- a/english/lts/security/2014/dla-65.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-65-1 python-django</define-tag>
-<define-tag report_date>2014-9-29</define-tag>
-<define-tag secrefs>CVE-2014-0480 CVE-2014-0481 CVE-2014-0482 CVE-2014-0483</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-65.wml b/english/lts/security/2014/dla-65.wml
deleted file mode 100644
index 3afe3d2fc3f..00000000000
--- a/english/lts/security/2014/dla-65.wml
+++ /dev/null
@@ -1,92 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update address an issue with reverse() generating external URLs; a
-denial of service involving file uploads; a potential session hijacking
-issue in the remote-user middleware; and a data leak in the administrative
-interface.</p>
-
-<p>This update has been brought to you thanks to the Debian LTS sponsors:
-<a href="http://www.freexian.com/services/debian-lts.html">http://www.freexian.com/services/debian-lts.html</a></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0480">CVE-2014-0480</a>
-
- <p>Django includes the helper function django.core.urlresolvers.reverse,
- typically used to generate a URL from a reference to a view function or
- URL pattern name. However, when presented with input beginning with two
- forward-slash characters (//), reverse() could generate scheme-relative
- URLs to other hosts, allowing an attacker who is aware of unsafe use of
- reverse() (i.e., in a situation where an end user can control the target
- of a redirect, to take a common example) to generate links to sites of
- their choice, enabling phishing and other attacks.</p>
-
- <p>To remedy this, URL reversing now ensures that no URL starts with two
- slashes (//), replacing the second slash with its URL encoded counterpart
- (%2F). This approach ensures that semantics stay the same, while making
- the URL relative to the domain and not to the scheme.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0481">CVE-2014-0481</a>
-
- <p>In the default configuration, when Django's file upload handling system is
- presented with a file that would have the same on-disk path and name as an
- existing file, it attempts to generate a new unique filename by appending
- an underscore and an integer to the end of the (as stored on disk)
- filename, incrementing the integer (i.e., _1, _2, etc.) until it has
- generated a name which does not conflict with any existing file.</p>
-
- <p>An attacker with knowledge of this can exploit the sequential behavior of
- filename generation by uploading many tiny files which all share a
- filename; Django will, in processing them, generate ever-increasing
- numbers of os.stat() calls as it attempts to generate a unique filename.
- As a result, even a relatively small number of such uploads can
- significantly degrade performance.</p>
-
- <p>To remedy this, Django's file-upload system will no longer use sequential
- integer names to avoid filename conflicts on disk; instead, a short random
- alphanumeric string will be appended, removing the ability to reliably
- generate many repeatedly-conflicting filenames.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0482">CVE-2014-0482</a>
-
- <p>Django provides a middleware django.contrib.auth.middleware.RemoteUserMiddleware -- and an
- authentication backend, django.contrib.auth.backends.RemoteUserBackend,
- which use the REMOTE_USER header for authentication purposes.</p>
-
- <p>In some circumstances, use of this middleware and backend could result in
- one user receiving another user's session, if a change to the REMOTE_USER
- header occurred without corresponding logout/login actions.</p>
-
- <p>To remedy this, the middleware will now ensure that a change to
- REMOTE_USER without an explicit logout will force a logout and subsequent
- login prior to accepting the new REMOTE_USER.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0483">CVE-2014-0483</a>
-
- <p>Django's administrative interface, django.contrib.admin, offers a feature
- whereby related objects can be displayed for selection in a popup window.
- The mechanism for this relies on placing values in the URL and querystring
- which specify the related model to display and the field through which the
- relationship is implemented. This mechanism does perform permission checks
- at the level of the model class as a whole.</p>
-
- <p>This mechanism did not, however, verify that the specified field actually
- represents a relationship between models. Thus a user with access to the
- admin interface, and with sufficient knowledge of model structure and the
- appropriate URLs, could construct popup views which would display the
- values of non-relationship fields, including fields the application
- developer had not intended to expose in such a fashion.</p>
-
- <p>To remedy this, the admin interface will now, in addition to its normal
- permission checks, verify that the specified field does indeed represent a
- relationship, to a model registered with the admin, and will raise an
- exception if either condition is not true.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python-django version 1.2.3-3+squeeze11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-65.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-66.data b/english/lts/security/2014/dla-66.data
deleted file mode 100644
index 411c2337875..00000000000
--- a/english/lts/security/2014/dla-66.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-66-1 apache2</define-tag>
-<define-tag report_date>2014-9-29</define-tag>
-<define-tag secrefs>CVE-2013-6438 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-66.wml b/english/lts/security/2014/dla-66.wml
deleted file mode 100644
index 5fb8f3d8d75..00000000000
--- a/english/lts/security/2014/dla-66.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0231">CVE-2014-0231</a>
-<p>prevent denial of service in mod_cgid.</p></li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0226">CVE-2014-0226</a>
-<p>prevent denial of service via race in mod_status.</p></li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0118">CVE-2014-0118</a>
-<p>fix resource consumption via mod_deflate body decompression.</p></li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-6438">CVE-2013-6438</a>
-<p>prevent denial of service via mod_dav incorrect end of string</p></li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apache2 version 2.2.16-6+squeeze13</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-66.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-67.data b/english/lts/security/2014/dla-67.data
deleted file mode 100644
index 942e7ffaaa4..00000000000
--- a/english/lts/security/2014/dla-67.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-67-1 php5</define-tag>
-<define-tag report_date>2014-9-30</define-tag>
-<define-tag secrefs>CVE-2014-3538 CVE-2014-3587 CVE-2014-3597</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-67.wml b/english/lts/security/2014/dla-67.wml
deleted file mode 100644
index 9a63b733220..00000000000
--- a/english/lts/security/2014/dla-67.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3538">CVE-2014-3538</a>
-
- <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2013-7345">CVE-2013-7345</a> did not
- sufficiently address the problem. A remote attacker could still
- cause a denial of service (CPU consumption) via a specially-crafted
- input file that triggers backtracking during processing of an awk
- regular expression rule.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3587">CVE-2014-3587</a>
-
- <p>It was discovered that the CDF parser of the fileinfo module does
- not properly process malformed files in the Composite Document File
- (CDF) format, leading to crashes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3597">CVE-2014-3597</a>
-
- <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-4049">CVE-2014-4049</a> did not
- completely address the issue. A malicious server or
- man-in-the-middle attacker could cause a denial of service (crash)
- and possibly execute arbitrary code via a crafted DNS TXT record.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4670">CVE-2014-4670</a>
-
- <p>It was discovered that PHP incorrectly handled certain SPL
- Iterators. A local attacker could use this flaw to cause PHP to
- crash, resulting in a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze22</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-67.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-68.data b/english/lts/security/2014/dla-68.data
deleted file mode 100644
index f7948834dc4..00000000000
--- a/english/lts/security/2014/dla-68.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-68-1 fex</define-tag>
-<define-tag report_date>2014-9-30</define-tag>
-<define-tag secrefs>CVE-2014-3875 CVE-2014-3876 CVE-2014-3877</define-tag>
-<define-tag packages>fex</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-68.wml b/english/lts/security/2014/dla-68.wml
deleted file mode 100644
index 2d9b7121870..00000000000
--- a/english/lts/security/2014/dla-68.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-3875">CVE-2014-3875</a>]
-
- <p>When inserting encoded newline characters into a request to rup,
- additional HTTP headers can be injected into the reply, as well
- as new HTML code on the top of the website.</p></li>
-
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-3876">CVE-2014-3876</a>]
- <p>The parameter akey is reflected unfiltered as part of the HTML
- page. Some characters are forbidden in the GET parameter due
- to filtering of the URL, but this can be circumvented by using
- a POST parameter.
- Nevertheless, this issue is exploitable via the GET parameter
- alone, with some user interaction.</p></li>
-
-<li>[<a href="https://security-tracker.debian.org/tracker/CVE-2014-3877">CVE-2014-3877</a>]
- <p>The parameter addto is reflected only slightly filtered back to
- the user as part of the HTML page. Some characters are forbidden
- in the GET parameter due to filtering of the URL, but this can
- be circumvented by using a POST parameter. Nevertheless, this
- issue is exploitable via the GET parameter alone, with some user
- interaction.</p></li>
-
-</ul>
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in fex version 20100208+debian1-1+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-68.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-69.data b/english/lts/security/2014/dla-69.data
deleted file mode 100644
index 20160c86c51..00000000000
--- a/english/lts/security/2014/dla-69.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-69-1 exuberant-ctags</define-tag>
-<define-tag report_date>2014-10-3</define-tag>
-<define-tag secrefs>CVE-2014-7204 Bug#742605</define-tag>
-<define-tag packages>exuberant-ctags</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-69.wml b/english/lts/security/2014/dla-69.wml
deleted file mode 100644
index dfac91d4a0f..00000000000
--- a/english/lts/security/2014/dla-69.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Stefano Zacchiroli discovered that certain JavaScript input files cause
-ctags to enter an infinite loop until it runs out of disk space. This
-update fixes the JavaScript parser.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in exuberant-ctags version 1:5.8-3squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-69.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-70.data b/english/lts/security/2014/dla-70.data
deleted file mode 100644
index 6baa293ecd2..00000000000
--- a/english/lts/security/2014/dla-70.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-70-1 tryton-server</define-tag>
-<define-tag report_date>2014-10-5</define-tag>
-<define-tag secrefs>CVE-2014-6633</define-tag>
-<define-tag packages>tryton-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-70.wml b/english/lts/security/2014/dla-70.wml
deleted file mode 100644
index 545dfdae9a2..00000000000
--- a/english/lts/security/2014/dla-70.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>duesenfranz discovered, that safe_eval in trytond could be used to execute
-arbitrary commands, mainly via the webdav interface. The patches applied do not
-allow double underscores in safe_eval and avoid double evaluation from inherit
-with a different model.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tryton-server version 1.6.1-2+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-70.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-71.data b/english/lts/security/2014/dla-71.data
deleted file mode 100644
index c4a3f0ced67..00000000000
--- a/english/lts/security/2014/dla-71.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-71-1 apache2</define-tag>
-<define-tag report_date>2014-10-16</define-tag>
-<define-tag secrefs>CVE-2013-5704 CVE-2014-3581</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-71.wml b/english/lts/security/2014/dla-71.wml
deleted file mode 100644
index 2b8787925b7..00000000000
--- a/english/lts/security/2014/dla-71.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes two security issues with apache2.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-5704">CVE-2013-5704</a>
-
- <p>Disable the possibility to replace HTTP headers with HTTP trailers
- as this could be used to circumvent earlier header operations made by
- other modules. This can be restored with a new MergeTrailers
- directive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3581">CVE-2014-3581</a>
-
- <p>Fix denial of service where Apache can segfault when mod_cache is used
- and when the cached request contains an empty Content-Type header.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apache2 version 2.2.16-6+squeeze14</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-71.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-72-2.data b/english/lts/security/2014/dla-72-2.data
deleted file mode 100644
index 42c0b5aab40..00000000000
--- a/english/lts/security/2014/dla-72-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-72-2 rsyslog</define-tag>
-<define-tag report_date>2014-10-20</define-tag>
-<define-tag packages>rsyslog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-72-2.wml b/english/lts/security/2014/dla-72-2.wml
deleted file mode 100644
index fe53cfa8254..00000000000
--- a/english/lts/security/2014/dla-72-2.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Wheezy patch left an unresolved symbol in the imklog module of the
-Squeeze version. rsyslog worked fine except that messages from the kernel
-couldn't be submitted any longer. This update fixes this issue.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in rsyslog version 4.6.4-2+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-72-2.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-72.data b/english/lts/security/2014/dla-72.data
deleted file mode 100644
index 2ea0fe74f05..00000000000
--- a/english/lts/security/2014/dla-72.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-72-2 rsyslog</define-tag>
-<define-tag report_date>2014-10-19, 2014-10-20</define-tag>
-<define-tag secrefs>CVE-2014-3634 CVE-2014-3683</define-tag>
-<define-tag packages>rsyslog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-72.wml b/english/lts/security/2014/dla-72.wml
deleted file mode 100644
index b4afd675ab4..00000000000
--- a/english/lts/security/2014/dla-72.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Wheezy patch left an unresolved symbol in the imklog module of
-the Squeeze version. rsyslog worked fine except that messages from the
-kernel couldn't be submitted any longer. This update fixes this issue.</p>
-
-<p>For reference, the original advisory text follows.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3634">CVE-2014-3634</a>
-
- <p>Fix remote syslog vulnerability due to improper handling
- of invalid PRI values.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3683">CVE-2014-3683</a>
-
- <p>Followup fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-3634">CVE-2014-3634</a>. The initial patch was incomplete.
- It did not cover cases where PRI values &gt; MAX_INT caused integer
- overflows resulting in negative values.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in rsyslog version 4.6.4-2+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-72.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-73.data b/english/lts/security/2014/dla-73.data
deleted file mode 100644
index b178c053727..00000000000
--- a/english/lts/security/2014/dla-73.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-73-1 tzdata</define-tag>
-<define-tag report_date>2014-10-21</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-73.wml b/english/lts/security/2014/dla-73.wml
deleted file mode 100644
index c3c58943cc1..00000000000
--- a/english/lts/security/2014/dla-73.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 2014h.</p>
-
-<p>Changes since 2014e-0squeeze1 currently in squeeze are adjustments to
-the DST rules of Russia and a timezone change for Turks &amp; Caicos.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tzdata version 2014h-0squeeze1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-73.data"
-# $Id: $
diff --git a/english/lts/security/2014/dla-74.data b/english/lts/security/2014/dla-74.data
deleted file mode 100644
index 4fdec0addf4..00000000000
--- a/english/lts/security/2014/dla-74.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-74-1 ppp</define-tag>
-<define-tag report_date>2014-10-21</define-tag>
-<define-tag secrefs>CVE-2014-3158 Bug#762789</define-tag>
-<define-tag packages>ppp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-74.wml b/english/lts/security/2014/dla-74.wml
deleted file mode 100644
index 5ec4f11f5d4..00000000000
--- a/english/lts/security/2014/dla-74.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This updates fixes a potential integer overflow in option parsing.</p>
-
-<p>A user in the group <q>dip</q> could provide a specially crafted
-configuration file of more than 2G and generate an integer overflow.
-This may enable an attacker to overwrite the heap and thereby corrupt
-security-relevant variables.</p>
-
-<p>See details in the upstream commit:
-<a href="https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb">https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ppp version 2.4.5-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-74.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-75.data b/english/lts/security/2014/dla-75.data
deleted file mode 100644
index 0df015fccff..00000000000
--- a/english/lts/security/2014/dla-75.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-75-1 mysql-5.1</define-tag>
-<define-tag report_date>2014-10-22</define-tag>
-<define-tag secrefs>CVE-2013-2162 CVE-2014-0001 CVE-2014-4274</define-tag>
-<define-tag packages>mysql-5.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-75.wml b/english/lts/security/2014/dla-75.wml
deleted file mode 100644
index 04190643f9a..00000000000
--- a/english/lts/security/2014/dla-75.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes one important vulnerability (<a href="https://security-tracker.debian.org/tracker/CVE-2014-4274">CVE-2014-4274</a>) and batches
-together two other minor fixes (<a href="https://security-tracker.debian.org/tracker/CVE-2013-2162">CVE-2013-2162</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2014-0001">CVE-2014-0001</a>).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4274">CVE-2014-4274</a>
-
- <p>Insecure handling of a temporary file that could lead to execution
- of arbitrary code through the creation of a mysql configuration file
- pointing to an attacker-controlled plugin_dir.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2162">CVE-2013-2162</a>
-
- <p>Insecure creation of the debian.cnf credential file. Credentials could
- be stolen by a local user monitoring that file while the package gets
- installed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0001">CVE-2014-0001</a>
-
- <p>Buffer overrun in the MySQL client when the server sends a version
- string that is too big for the allocated buffer.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mysql-5.1 version 5.1.73-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-75.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-76.data b/english/lts/security/2014/dla-76.data
deleted file mode 100644
index 3bb9c06ba07..00000000000
--- a/english/lts/security/2014/dla-76.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-76-1 kde4libs</define-tag>
-<define-tag report_date>2014-10-24</define-tag>
-<define-tag secrefs>CVE-2014-5033</define-tag>
-<define-tag packages>kde4libs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-76.wml b/english/lts/security/2014/dla-76.wml
deleted file mode 100644
index d4dbec98dd8..00000000000
--- a/english/lts/security/2014/dla-76.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that KAuth, part of kdelibs, uses polkit in a way
-that is prone to a race condition that may allow authorization bypass.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in kde4libs version 4:4.4.5-2+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-76.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-77.data b/english/lts/security/2014/dla-77.data
deleted file mode 100644
index 26fd0f4c564..00000000000
--- a/english/lts/security/2014/dla-77.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-77-1 libtasn1-3</define-tag>
-<define-tag report_date>2014-10-26</define-tag>
-<define-tag secrefs>CVE-2014-3467 CVE-2014-3468 CVE-2014-3469</define-tag>
-<define-tag packages>libtasn1-3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-77.wml b/english/lts/security/2014/dla-77.wml
deleted file mode 100644
index 73ddffa974d..00000000000
--- a/english/lts/security/2014/dla-77.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libtasn1-3, a library that
-manages ASN1 (Abstract Syntax Notation One) structures. An attacker
-could use those to cause a denial-of-service via out-of-bounds access
-or NULL pointer dereference.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libtasn1-3 version 2.7-1+squeeze+2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-77.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-78.data b/english/lts/security/2014/dla-78.data
deleted file mode 100644
index f805d692f7f..00000000000
--- a/english/lts/security/2014/dla-78.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-78-1 torque</define-tag>
-<define-tag report_date>2014-10-27</define-tag>
-<define-tag secrefs>CVE-2014-3684</define-tag>
-<define-tag packages>torque</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-78.wml b/english/lts/security/2014/dla-78.wml
deleted file mode 100644
index cda6bde6a95..00000000000
--- a/english/lts/security/2014/dla-78.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chad Vizino reported a vulnerability in torque, a PBS-derived batch
-processing queueing system. A non-root user could exploit the flaw in
-the tm_adopt() library call to kill any process, including root-owned
-ones on any node in a job.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in torque version 2.4.8+dfsg-9squeeze5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-78.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-79.data b/english/lts/security/2014/dla-79.data
deleted file mode 100644
index 6829eddc34d..00000000000
--- a/english/lts/security/2014/dla-79.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-79-1 dokuwiki</define-tag>
-<define-tag report_date>2014-10-29</define-tag>
-<define-tag secrefs>CVE-2014-8763 CVE-2014-8764 Bug#766545</define-tag>
-<define-tag packages>dokuwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-79.wml b/english/lts/security/2014/dla-79.wml
deleted file mode 100644
index f0fcd789400..00000000000
--- a/english/lts/security/2014/dla-79.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This fixes a possibility of bypassing the wiki authentication when an Active
-Directory is used for LDAP authentication. These two CVE are almost the same,
-one apparently being a superset of the other. They are fixed together.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8763">CVE-2014-8763</a>
-
- <p>DokuWiki before 2014-05-05b, when using Active Directory for LDAP
- authentication, allows remote attackers to bypass authentication via a
- password starting with a null (\0) character and a valid user name, which
- triggers an unauthenticated bind.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8764">CVE-2014-8764</a>
-
- <p>DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP
- authentication, allows remote attackers to bypass authentication via a
- user name and password starting with a null (\0) character, which triggers
- an anonymous bind.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dokuwiki version 0.0.20091225c-10+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-79.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-80.data b/english/lts/security/2014/dla-80.data
deleted file mode 100644
index 3ea6a76064e..00000000000
--- a/english/lts/security/2014/dla-80.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-80-1 libxml2</define-tag>
-<define-tag report_date>2014-10-29</define-tag>
-<define-tag secrefs>CVE-2014-0191 CVE-2014-3660</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-80.wml b/english/lts/security/2014/dla-80.wml
deleted file mode 100644
index c0482523eb6..00000000000
--- a/english/lts/security/2014/dla-80.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sogeti found a denial of service flaw in libxml2, a library providing
-support to read, modify and write XML and HTML files. A remote attacker
-could provide a specially crafted XML file that, when processed by an
-application using libxml2, would lead to excessive CPU consumption
-(denial of service) based on excessive entity substitutions, even if
-entity substitution was disabled, which is the parser default behavior.
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-3660">CVE-2014-3660</a>)</p>
-
-<p>In addition, this update addresses a misapplied chunk for a patch
-released the previous version (#762864).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxml2 version 2.7.8.dfsg-2+squeeze10</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-80.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-81.data b/english/lts/security/2014/dla-81.data
deleted file mode 100644
index c96c0461e72..00000000000
--- a/english/lts/security/2014/dla-81.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-81-1 openssl</define-tag>
-<define-tag report_date>2014-11-1</define-tag>
-<define-tag secrefs>CVE-2014-3567 CVE-2014-3568 CVE-2014-3569</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-81.wml b/english/lts/security/2014/dla-81.wml
deleted file mode 100644
index 0cbc88ba997..00000000000
--- a/english/lts/security/2014/dla-81.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in OpenSSL.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3566">CVE-2014-3566</a>
-
-<p>("POODLE")</p>
-
- <p>A flaw was found in the way SSL 3.0 handled padding bytes when
- decrypting messages encrypted using block ciphers in cipher block
- chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM)
- attacker to decrypt a selected byte of a cipher text in as few as 256
- tries if they are able to force a victim application to repeatedly
- send the same data over newly created SSL 3.0 connections.</p>
-
- <p>This update adds support for Fallback SCSV to mitigate this issue.
- This does not fix the issue. The proper way to fix this is to
- disable SSL 3.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3567">CVE-2014-3567</a>
-
- <p>A memory leak flaw was found in the way an OpenSSL handled failed
- session ticket integrity checks. A remote attacker could exhaust all
- available memory of an SSL/TLS or DTLS server by sending a large number
- of invalid session tickets to that server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3568">CVE-2014-3568</a>
-
- <p>When OpenSSL is configured with "no-ssl3" as a build option, servers
- could accept and complete a SSL 3.0 handshake, and clients could be
- configured to send them.</p>
-
- <p>Note that the package is Debian is not build with this option.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3569">CVE-2014-3569</a>
-
- <p>When OpenSSL is build with the "no-ssl3" option and a SSL v3 Client
- Hello is received the ssl method would be set to NULL which could
- later result in a NULL pointer dereference.</p>
-
- <p>Note that the package is Debian is not build with this option.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze18</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-81.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-82.data b/english/lts/security/2014/dla-82.data
deleted file mode 100644
index cb3454a8d7b..00000000000
--- a/english/lts/security/2014/dla-82.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-82-1 wget</define-tag>
-<define-tag report_date>2014-11-3</define-tag>
-<define-tag secrefs>CVE-2014-4877</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-82.wml b/english/lts/security/2014/dla-82.wml
deleted file mode 100644
index 83e7c467fcc..00000000000
--- a/english/lts/security/2014/dla-82.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>HD Moore of Rapid7 discovered a symlink attack in Wget, a command-line
-utility to retrieve files via HTTP, HTTPS, and FTP. The vulnerability
-allows to create arbitrary files on the user's system when Wget runs in
-recursive mode against a malicious FTP server. Arbitrary file creation
-may override content of user's files or permit remote code execution with
-the user privilege.</p>
-
-<p>This update changes the default setting in Wget such that it no longer
-creates local symbolic links, but rather traverses them and retrieves the
-pointed-to file in such a retrieval.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in wget version 1.12-2.1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-82.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-83.data b/english/lts/security/2014/dla-83.data
deleted file mode 100644
index 5b93f98a1a4..00000000000
--- a/english/lts/security/2014/dla-83.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-83-1 ffmpeg</define-tag>
-<define-tag report_date>2014-11-07</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-83.wml b/english/lts/security/2014/dla-83.wml
deleted file mode 100644
index ed8504fb374..00000000000
--- a/english/lts/security/2014/dla-83.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update to ffmpeg disables support for over 100 codecs, decoders,
-and formats that are rarely used nowadays, for which the support
-available in squeeze is most likely insufficient, etc.</p>
-
-<p>This update is only meant to reduce the attack surface.</p>
-
-<p>ffmpeg is otherwise unsupported in squeeze-lts, and any use of it with
-untrusted data is highly discouraged.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ffmpeg version 4:0.5.10-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-83.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-84.data b/english/lts/security/2014/dla-84.data
deleted file mode 100644
index dbe45916aa4..00000000000
--- a/english/lts/security/2014/dla-84.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-84-1 curl</define-tag>
-<define-tag report_date>2014-11-9</define-tag>
-<define-tag secrefs>CVE-2014-3707</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-84.wml b/english/lts/security/2014/dla-84.wml
deleted file mode 100644
index a11ceab7685..00000000000
--- a/english/lts/security/2014/dla-84.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Symeon Paraschoudis discovered that the curl_easy_duphandle() function
-in cURL, an URL transfer library, has a bug that can lead to libcurl
-eventually sending off sensitive data that was not intended for sending,
-while performing a HTTP POST operation.</p>
-
-<p>This bug requires CURLOPT_COPYPOSTFIELDS and curl_easy_duphandle() to be
-used in that order, and then the duplicate handle must be used to
-perform the HTTP POST. The curl command line tool is not affected by
-this problem as it does not use this sequence.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in curl version 7.21.0-2.1+squeeze10</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-84.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-85.data b/english/lts/security/2014/dla-85.data
deleted file mode 100644
index 70b8aba2e81..00000000000
--- a/english/lts/security/2014/dla-85.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-85-1 libxml-security-java</define-tag>
-<define-tag report_date>2014-11-9</define-tag>
-<define-tag secrefs>CVE-2013-2172</define-tag>
-<define-tag packages>libxml-security-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-85.wml b/english/lts/security/2014/dla-85.wml
deleted file mode 100644
index 48f8b65f743..00000000000
--- a/english/lts/security/2014/dla-85.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>James Forshaw discovered that, in Apache Santuario XML Security for
-Java, CanonicalizationMethod parameters were incorrectly validated:
-by specifying an arbitrary weak canonicalization algorithm, an
-attacker could spoof XML signatures.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxml-security-java version 1.4.3-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-85.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-86.data b/english/lts/security/2014/dla-86.data
deleted file mode 100644
index 18bbf303c66..00000000000
--- a/english/lts/security/2014/dla-86.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-86-1 file</define-tag>
-<define-tag report_date>2014-11-12</define-tag>
-<define-tag secrefs>CVE-2014-3710 Bug#768806</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-86.wml b/english/lts/security/2014/dla-86.wml
deleted file mode 100644
index b905c155454..00000000000
--- a/english/lts/security/2014/dla-86.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Francisco Alonso of Red Hat Product Security found an issue in the file
-utility: when checking ELF files, note headers are incorrectly checked,
-thus potentially allowing attackers to cause a denial of service
-(out-of-bounds read and application crash) by supplying a specially
-crafted ELF file.</p>
-
-<p>For the long-term stable distribution (squeeze-lts), this problem has been
-fixed in version 5.04-5+squeeze8.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-86.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-87.data b/english/lts/security/2014/dla-87.data
deleted file mode 100644
index dacf5dda50e..00000000000
--- a/english/lts/security/2014/dla-87.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-87-1 dbus</define-tag>
-<define-tag report_date>2014-11-20</define-tag>
-<define-tag secrefs>CVE-2014-3477 CVE-2014-3638 CVE-2014-3639</define-tag>
-<define-tag packages>dbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-87.wml b/english/lts/security/2014/dla-87.wml
deleted file mode 100644
index 53f873a1eab..00000000000
--- a/english/lts/security/2014/dla-87.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This updates fixes multiple (local) denial of services discovered by Alban
-Crequy and Simon McVittie.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3477">CVE-2014-3477</a>
-
- <p>Fix a denial of service (failure to obtain bus name) in
- newly-activated system services that not all users are allowed to
- access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3638">CVE-2014-3638</a>
-
- <p>Reduce maximum number of pending replies per connection to avoid
- algorithmic complexity denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3639">CVE-2014-3639</a>
-
- <p>The daemon now limits the number of unauthenticated connection slots
- so that malicious processes cannot prevent new connections to the
- system bus.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dbus version 1.2.24-4+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-87.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-88.data b/english/lts/security/2014/dla-88.data
deleted file mode 100644
index b597f6ad7c5..00000000000
--- a/english/lts/security/2014/dla-88.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-88-1 ruby1.8</define-tag>
-<define-tag report_date>2014-11-21</define-tag>
-<define-tag secrefs>CVE-2011-0188 CVE-2011-2686 CVE-2011-2705 CVE-2011-4815 CVE-2014-8080 CVE-2014-8090</define-tag>
-<define-tag packages>ruby1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-88.wml b/english/lts/security/2014/dla-88.wml
deleted file mode 100644
index cab1a5060bc..00000000000
--- a/english/lts/security/2014/dla-88.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes multiple local and remote denial of service and remote code
-execute problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0188">CVE-2011-0188</a>
-
-<p>Properly allocate memory, to prevent arbitrary code execution or application
-crash. Reported by Drew Yao.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2686">CVE-2011-2686</a>
-
-<p>Reinitialize the random seed when forking to prevent <a href="https://security-tracker.debian.org/tracker/CVE-2003-0900">CVE-2003-0900</a> like
-situations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2705">CVE-2011-2705</a>
-
-<p>Modify PRNG state to prevent random number sequence repeatation at forked
-child process which has same pid. Reported by Eric Wong.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4815">CVE-2011-4815</a>
-
-<p>Fix a problem with predictable hash collisions resulting in denial of service
-(CPU consumption) attacks. Reported by Alexander Klink and Julian Waelde.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>
-
-<p>Fix REXML parser to prevent memory consumption denial of service via crafted
-XML documents. Reported by Willis Vandevanter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8090">CVE-2014-8090</a>
-
-<p>Add REXML::Document#document to complement the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>.
-Reported by Tomas Hoger.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ruby1.8 version 1.8.7.302-2squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-88.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-89.data b/english/lts/security/2014/dla-89.data
deleted file mode 100644
index 4646b26a6ad..00000000000
--- a/english/lts/security/2014/dla-89.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-89-1 nss</define-tag>
-<define-tag report_date>2014-11-22</define-tag>
-<define-tag secrefs>CVE-2014-1544</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-89.wml b/english/lts/security/2014/dla-89.wml
deleted file mode 100644
index d39ccc81bc6..00000000000
--- a/english/lts/security/2014/dla-89.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In nss, a set of libraries designed to support cross-platform development of
-security-enabled client and server applications, Tyson Smith and Jesse
-Schwartzentruber discovered a use-after-free vulnerability that allows remote
-attackers to execute arbitrary code by triggering the improper removal of an
-NSSCertificate structure from a trust domain.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nss version 3.12.8-1+squeeze10</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-89.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-90.data b/english/lts/security/2014/dla-90.data
deleted file mode 100644
index 4c89bc2a6e1..00000000000
--- a/english/lts/security/2014/dla-90.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-90-1 imagemagick</define-tag>
-<define-tag report_date>2014-11-22</define-tag>
-<define-tag secrefs>CVE-2014-8716 Bug#768494</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-90.wml b/english/lts/security/2014/dla-90.wml
deleted file mode 100644
index 328396ea1dc..00000000000
--- a/english/lts/security/2014/dla-90.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some special crafted JPEG file could lead to dos due to missing check in
-embeded EXIF properties (EXIF directory offsets must be greater than 0).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in imagemagick version 8:6.6.0.4-3+squeeze5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-90.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-91.data b/english/lts/security/2014/dla-91.data
deleted file mode 100644
index 0cd78632f3d..00000000000
--- a/english/lts/security/2014/dla-91.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-91-1 tomcat6</define-tag>
-<define-tag report_date>2014-11-23</define-tag>
-<define-tag secrefs>CVE-2012-3439 CVE-2013-1571 CVE-2013-4286 CVE-2013-4322 CVE-2013-4590 CVE-2014-0033 Bug#299635 Bug#608286 Bug#654136 Bug#659748 Bug#664072 Bug#665393 Bug#666256 Bug#668761</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-91.wml b/english/lts/security/2014/dla-91.wml
deleted file mode 100644
index c53b2e8490c..00000000000
--- a/english/lts/security/2014/dla-91.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is an upgrade from tomcat 6.0.35 (the version previously available
-in squeeze) to 6.0.41, the full list of changes between these versions
-can be see in the upstream changelog, which is available online at
-<a href="http://tomcat.apache.org/tomcat-6.0-doc/changelog.html">http://tomcat.apache.org/tomcat-6.0-doc/changelog.html</a></p>
-
-<p>This update fixes the following security issues previously not available
-for squeeze:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0033">CVE-2014-0033</a>
-
-<p>Prevent remote attackers from conducting session fixation attacks via crafted
-URLs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4590">CVE-2013-4590</a>
-
-<p>Prevent <q>Tomcat internals</q> information leaks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4322">CVE-2013-4322</a>
-
-<p>Prevent remote attackers from doing denial of service attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4286">CVE-2013-4286</a>
-
-<p>Reject requests with multiple content-length headers or with a content-length
-header when chunked encoding is being used.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1571">CVE-2013-1571</a>
-
-<p>Avoid <a href="https://security-tracker.debian.org/tracker/CVE-2013-1571">CVE-2013-1571</a> when generating Javadoc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3439">CVE-2012-3439</a>
-
-<p>Various improvements to the DIGEST authenticator.</p></li>
-
-</ul>
-
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tomcat6 version 6.0.41-2+squeeze5</p>
-<p>Thanks to Tony Mancill for doing the vast amount of the work for this update!</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-91.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-92.data b/english/lts/security/2014/dla-92.data
deleted file mode 100644
index d6251e41a71..00000000000
--- a/english/lts/security/2014/dla-92.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-92-1 tomcat-native</define-tag>
-<define-tag report_date>2014-11-24</define-tag>
-<define-tag packages>tomcat-native</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-92.wml b/english/lts/security/2014/dla-92.wml
deleted file mode 100644
index c242bac1a63..00000000000
--- a/english/lts/security/2014/dla-92.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is an upgrade from tomcat-native 1.1.20 (the version previously available
-in squeeze) to 1.1.31, the full list of changes between these versions can be
-seen in the upstream changelog, which is available online at
-<a href="http://tomcat.apache.org/native-doc/miscellaneous/changelog.html">http://tomcat.apache.org/native-doc/miscellaneous/changelog.html</a></p>
-
-<p>This update itself fixes no security issues but is needed for libtcnative-1
-users as version 1.1.20 from Squeeze does not work with tomcat6 6.0.41 from
-Squeeze LTS.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-92.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-93.data b/english/lts/security/2014/dla-93.data
deleted file mode 100644
index 710c741ec15..00000000000
--- a/english/lts/security/2014/dla-93.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-93-1 libgcrypt11</define-tag>
-<define-tag report_date>2014-11-25</define-tag>
-<define-tag secrefs>CVE-2014-5270</define-tag>
-<define-tag packages>libgcrypt11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-93.wml b/english/lts/security/2014/dla-93.wml
deleted file mode 100644
index 30e9dae029b..00000000000
--- a/english/lts/security/2014/dla-93.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Daniel Genkin, Itamar Pipman and Eran Tromer discovered that Elgamal
-encryption subkeys in applications using the libgcrypt11 library, for
-example GnuPG 2.x, could be leaked via a side-channel attack (see
-<a href="http://www.cs.tau.ac.il/~tromer/handsoff/">http://www.cs.tau.ac.il/~tromer/handsoff/</a>).</p>
-
-<p>This is fixed in Squeeze in version 1.4.5-2+squeeze2.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-93.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-94.data b/english/lts/security/2014/dla-94.data
deleted file mode 100644
index 1cd0e53d9d4..00000000000
--- a/english/lts/security/2014/dla-94.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-94-1 php5</define-tag>
-<define-tag report_date>2014-11-25</define-tag>
-<define-tag secrefs>CVE-2014-3668 CVE-2014-3669 CVE-2014-3670 CVE-2014-3710</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-94.wml b/english/lts/security/2014/dla-94.wml
deleted file mode 100644
index 41d778d2669..00000000000
--- a/english/lts/security/2014/dla-94.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3668">CVE-2014-3668</a>
-
- <p>Fix bug #68027 - fix date parsing in XMLRPC lib</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3669">CVE-2014-3669</a>
-
- <p>Fix bug #68044: Integer overflow in unserialize() (32-bits only)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3670">CVE-2014-3670</a>
-
- <p>Fix bug #68113 (Heap corruption in exif_thumbnail())</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3710">CVE-2014-3710</a>
-
- <p>Fix bug #68283: fileinfo: out-of-bounds read in elf note headers</p></li>
-
-</ul>
-
-<p>Additional bugfix</p>
-
- <p>Fix null byte handling in LDAP bindings in ldap-fix.patch</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze23</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-94.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-95.data b/english/lts/security/2014/dla-95.data
deleted file mode 100644
index 680555b31dd..00000000000
--- a/english/lts/security/2014/dla-95.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-95-1 clamav</define-tag>
-<define-tag report_date>2014-12-02</define-tag>
-<define-tag secrefs>CVE-2014-9050 CVE-2013-6497 Bug##770985</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-95.wml b/english/lts/security/2014/dla-95.wml
deleted file mode 100644
index e6de8e39c18..00000000000
--- a/english/lts/security/2014/dla-95.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two bugs were discovered in clamav and are fixed by this release.</p>
-
-<p>One issue is in clamscan, the command line anti-virus scanner included
-in the package, which could lead to crashes when scanning certain files
-(<a href="https://security-tracker.debian.org/tracker/CVE-2013-6497">CVE-2013-6497</a>).
-The second issue is in libclamav which caused a heap buffer overflow
-when scanning a specially crafted y0da Crypter obfuscated PE file
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-9050">CVE-2014-9050</a>). Note that this is remotely exploitable when ClamAV is
-used as a mail gateway scanner.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in clamav version 0.98.1+dfsg-1+deb6u4</p>
-
-<p>If you use clamav, we highly recommend that you upgrade to this version.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-95.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-96.data b/english/lts/security/2014/dla-96.data
deleted file mode 100644
index 90015c41e4f..00000000000
--- a/english/lts/security/2014/dla-96.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-96-1 openjdk-6</define-tag>
-<define-tag report_date>2014-11-28</define-tag>
-<define-tag secrefs>CVE-2014-2490 CVE-2014-4209 CVE-2014-4216 CVE-2014-4218 CVE-2014-4219 CVE-2014-4244 CVE-2014-4252 CVE-2014-4262 CVE-2014-4263 CVE-2014-4266 CVE-2014-4268 CVE-2014-6457 CVE-2014-6502 CVE-2014-6504 CVE-2014-6506 CVE-2014-6511 CVE-2014-6512 CVE-2014-6517 CVE-2014-6519 CVE-2014-6531 CVE-2014-6558</define-tag>
-<define-tag packages>openjdk-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-96.wml b/english/lts/security/2014/dla-96.wml
deleted file mode 100644
index 14212f8c0bd..00000000000
--- a/english/lts/security/2014/dla-96.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an implementation
-of the Oracle Java platform, resulting in the execution of arbitrary code,
-breakouts of the Java sandbox, information disclosure or denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-6b33-1.13.5-2~deb6u1.</p>
-
-<p>We recommend that you upgrade your openjdk-6 packages and that you
-subscribe to <a href="https://lists.debian.org/debian-lts/">https://lists.debian.org/debian-lts/</a> to help test updated
-packages before we release them.</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-96.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-97.data b/english/lts/security/2014/dla-97.data
deleted file mode 100644
index 420d200dd8c..00000000000
--- a/english/lts/security/2014/dla-97.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-97-1 eglibc</define-tag>
-<define-tag report_date>2014-11-29</define-tag>
-<define-tag secrefs>CVE-2012-6656 CVE-2014-6040 CVE-2014-7817</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-97.wml b/english/lts/security/2014/dla-97.wml
deleted file mode 100644
index d5df257f4db..00000000000
--- a/english/lts/security/2014/dla-97.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6656">CVE-2012-6656</a>
-
- <p>Fix validation check when converting from ibm930 to utf.
- When converting IBM930 code with iconv(), if IBM930 code which
- includes invalid multibyte character <q>0xffff</q> is specified, then
- iconv() segfaults.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6040">CVE-2014-6040</a>
-
- <p>Crashes on invalid input in IBM gconv modules [BZ #17325]
- These changes are based on the fix for BZ #14134 in commit
- 6e230d11837f3ae7b375ea69d7905f0d18eb79e5.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7817">CVE-2014-7817</a>
-
- <p>The function wordexp() fails to properly handle the WRDE_NOCMD
- flag when processing arithmetic inputs in the form of "$((... ``))"
- where "..." can be anything valid. The backticks in the arithmetic
- epxression are evaluated by in a shell even if WRDE_NOCMD forbade
- command substitution. This allows an attacker to attempt to pass
- dangerous commands via constructs of the above form, and bypass
- the WRDE_NOCMD flag. This patch fixes this by checking for WRDE_NOCMD
- in exec_comm(), the only place that can execute a shell. All other
- checks for WRDE_NOCMD are superfluous and removed.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version 2.11.3-4+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-97.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-98.data b/english/lts/security/2014/dla-98.data
deleted file mode 100644
index 6c9886b3435..00000000000
--- a/english/lts/security/2014/dla-98.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-98-1 openvpn</define-tag>
-<define-tag report_date>2014-12-02</define-tag>
-<define-tag secrefs>CVE-2014-8104</define-tag>
-<define-tag packages>openvpn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-98.wml b/english/lts/security/2014/dla-98.wml
deleted file mode 100644
index 6d2a609ffad..00000000000
--- a/english/lts/security/2014/dla-98.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dragana Damjanovic discovered that an authenticated client could crash
-an OpenVPN server by sending a control packet containing less than
-four bytes as payload.</p>
-
-<p>For the oldstable distribution (squeeze), this problem has been fixed in
-version 2.1.3-2+squeeze3 in squeeze-lts.</p>
-
-<p>We recommend that you upgrade your openvpn packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-98.data"
-# $Id$
diff --git a/english/lts/security/2014/dla-99.data b/english/lts/security/2014/dla-99.data
deleted file mode 100644
index e001cd459ce..00000000000
--- a/english/lts/security/2014/dla-99.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-99-1 flac</define-tag>
-<define-tag report_date>2014-12-5</define-tag>
-<define-tag secrefs>CVE-2014-8962 CVE-2014-9028</define-tag>
-<define-tag packages>flac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2014/dla-99.wml b/english/lts/security/2014/dla-99.wml
deleted file mode 100644
index 2652aafd807..00000000000
--- a/english/lts/security/2014/dla-99.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Michele Spagnuolo, of Google Security Team, and Miroslav Lichvar, of
-Red Hat, discovered two issues in flac, a library handling Free
-Lossless Audio Codec media: by providing a specially crafted FLAC
-file, an attacker could execute arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8962">CVE-2014-8962</a>
-
- <p>Heap-based buffer overflow in stream_decoder.c, allowing
- remote attackers to execute arbitrary code via a specially
- crafted .flac file.</p> </li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9028">CVE-2014-9028</a>
-
- <p>Stack-based buffer overflow in stream_decoder.c, allowing
- remote attackers to execute arbitrary code via a specially
- crafted .flac file.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in flac version 1.2.1-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2014/dla-99.data"
-# $Id$
diff --git a/english/lts/security/2014/index.wml b/english/lts/security/2014/index.wml
deleted file mode 100644
index 24a726244f4..00000000000
--- a/english/lts/security/2014/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2014</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2014' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2015/Makefile b/english/lts/security/2015/Makefile
deleted file mode 100644
index 99c2c3cf430..00000000000
--- a/english/lts/security/2015/Makefile
+++ /dev/null
@@ -1,25 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2015
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-
-index.$(LANGUAGE).html: index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
diff --git a/english/lts/security/2015/dla-115-2.data b/english/lts/security/2015/dla-115-2.data
deleted file mode 100644
index 642ba3459a0..00000000000
--- a/english/lts/security/2015/dla-115-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-115-2 gosa</define-tag>
-<define-tag report_date>2015-03-11</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-115-2.wml b/english/lts/security/2015/dla-115-2.wml
deleted file mode 100644
index a609ca3f782..00000000000
--- a/english/lts/security/2015/dla-115-2.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>Fix regression from DLA-115-1.</p>
-
- <p>After installing the security update, you cannot login to
- gosa, and an error is displayed that set_post is an undefined
- function. See <a href="http://bugs.debian.org/775816">#775816</a>.
- </p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gosa
-version 2.6.11-3+squeeze4.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-115-2.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-120-2.data b/english/lts/security/2015/dla-120-2.data
deleted file mode 100644
index 901f4f4a3eb..00000000000
--- a/english/lts/security/2015/dla-120-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-120-2 xorg-server</define-tag>
-<define-tag report_date>2015-5-4</define-tag>
-<define-tag secrefs>CVE-2015-3418 Bug##774308</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-120-2.wml b/english/lts/security/2015/dla-120-2.wml
deleted file mode 100644
index d1dcd9b435f..00000000000
--- a/english/lts/security/2015/dla-120-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andreas Cord-Landwehr reported an issue where the X.Org Xserver would
-often crash with an arithmetic exception when maximizing application
-windows.</p>
-
-<p>This issue (<a href="https://security-tracker.debian.org/tracker/CVE-2015-3418">CVE-2015-3418</a>) is a regression which got introduced by fixing
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-8092">CVE-2014-8092</a>. The above referenced version of xorg-server in Debian
-squeeze-lts fixes this regression in the following way:</p>
-
-<p>The length checking code validates PutImage height and byte width by
-making sure that byte-width >= INT32_MAX / height. If height is zero,
-this generates a divide by zero exception. Allow zero height requests
-explicitly, bypassing the INT32_MAX check (in dix/dispatch.c).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in xorg-server version 2:1.7.7-18+deb6u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-120-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-120.data b/english/lts/security/2015/dla-120.data
deleted file mode 100644
index 901f4f4a3eb..00000000000
--- a/english/lts/security/2015/dla-120.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-120-2 xorg-server</define-tag>
-<define-tag report_date>2015-5-4</define-tag>
-<define-tag secrefs>CVE-2015-3418 Bug##774308</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-120.wml b/english/lts/security/2015/dla-120.wml
deleted file mode 100644
index 1eaffa4ef23..00000000000
--- a/english/lts/security/2015/dla-120.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andreas Cord-Landwehr reported an issue where the X.Org Xserver would
-often crash with an arithmetic exception when maximizing application
-windows.</p>
-
-<p>This issue (<a href="https://security-tracker.debian.org/tracker/CVE-2015-3418">CVE-2015-3418</a>) is a regression which got introduced by fixing
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-8092">CVE-2014-8092</a>. The above referenced version of xorg-server in Debian
-squeeze-lts fixes this regression in the following way:</p>
-
-<p>The length checking code validates PutImage height and byte width by
-making sure that <tt>byte-width &gt;= INT32_MAX / height</tt>. If height is zero,
-this generates a divide by zero exception. Allow zero height requests
-explicitly, bypassing the INT32_MAX check (in dix/dispatch.c).</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in xorg-server version 2:1.7.7-18+deb6u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-120.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-127.data b/english/lts/security/2015/dla-127.data
deleted file mode 100644
index 022390a24e7..00000000000
--- a/english/lts/security/2015/dla-127.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-127-1 pyyaml</define-tag>
-<define-tag report_date>2015-1-3</define-tag>
-<define-tag secrefs>CVE-2014-9130 Bug#772815</define-tag>
-<define-tag packages>pyyaml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-127.wml b/english/lts/security/2015/dla-127.wml
deleted file mode 100644
index 19a795c75eb..00000000000
--- a/english/lts/security/2015/dla-127.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jonathan Gray and Stanislaw Pitucha found an assertion failure in the
-way wrapped strings are parsed in Python-YAML, a YAML parser and emitter
-for Python. An attacker able to load specially crafted YAML input into an
-application using python-yaml could cause the application to crash.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in pyyaml version 3.09-5+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-127.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-128.data b/english/lts/security/2015/dla-128.data
deleted file mode 100644
index 7edb84085da..00000000000
--- a/english/lts/security/2015/dla-128.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-128-1 sox</define-tag>
-<define-tag report_date>2015-1-3</define-tag>
-<define-tag secrefs>CVE-2014-8145 Bug#773720</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-128.wml b/english/lts/security/2015/dla-128.wml
deleted file mode 100644
index 42633fa3f6a..00000000000
--- a/english/lts/security/2015/dla-128.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Michele Spagnuolo of the Google Security Team dicovered two heap-based
-buffer overflows in SoX, the Swiss Army knife of sound processing
-programs. A specially crafted wav file could cause an application using
-SoX to crash or, possibly, execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in sox version 14.3.1-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-128.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-129.data b/english/lts/security/2015/dla-129.data
deleted file mode 100644
index 9dd551f1073..00000000000
--- a/english/lts/security/2015/dla-129.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-129-1 polarssl</define-tag>
-<define-tag report_date>2015-1-3</define-tag>
-<define-tag secrefs>CVE-2014-8628</define-tag>
-<define-tag packages>polarssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-129.wml b/english/lts/security/2015/dla-129.wml
deleted file mode 100644
index 97744cdb3a4..00000000000
--- a/english/lts/security/2015/dla-129.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that a memory leak in parsing X.509 certificates may
-result in denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in polarssl version 1.2.9-1~deb6u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-129.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-130.data b/english/lts/security/2015/dla-130.data
deleted file mode 100644
index 8af86c1b55e..00000000000
--- a/english/lts/security/2015/dla-130.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-130-1 firebird2.1</define-tag>
-<define-tag report_date>2015-1-8</define-tag>
-<define-tag secrefs>CVE-2014-9323</define-tag>
-<define-tag packages>firebird2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-130.wml b/english/lts/security/2015/dla-130.wml
deleted file mode 100644
index 5608438c0fc..00000000000
--- a/english/lts/security/2015/dla-130.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Segfault in server caused by malformed network packet.
-See: <a href="http://tracker.firebirdsql.org/browse/CORE-4630">http://tracker.firebirdsql.org/browse/CORE-4630</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in firebird2.1 version 2.1.3.18185-0.ds1-11+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-130.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-131.data b/english/lts/security/2015/dla-131.data
deleted file mode 100644
index af720a974f7..00000000000
--- a/english/lts/security/2015/dla-131.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-131-1 file</define-tag>
-<define-tag report_date>2015-1-9</define-tag>
-<define-tag secrefs>CVE-2014-8116 CVE-2014-8117 Bug#773148</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-131.wml b/english/lts/security/2015/dla-131.wml
deleted file mode 100644
index b450d7b4155..00000000000
--- a/english/lts/security/2015/dla-131.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in file, a tool/library to
-determine a file type. Processing a malformed file could result in
-denial of service. Most of the changes are related to parsing ELF
-files.</p>
-
-<p>As part of the fixes, several limits on aspects of the detection were
-added or tightened, sometimes resulting in messages like <q>recursion
-limit exceeded</q> or <q>too many program header sections</q>.</p>
-
-<p>To mitigate such shortcomings, these limits are controllable by a new
-"-R"/"--recursion" parameter in the file program. Note: A future
-upgrade for file in squeeze-lts might replace this with the "-P"
-parameter to keep usage consistent across all distributions.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8116">CVE-2014-8116</a>
-
- <p>The ELF parser (readelf.c) allows remote attackers to cause a
- denial of service (CPU consumption or crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8117">CVE-2014-8117</a>
-
- <p>softmagic.c does not properly limit recursion, which allows remote
- attackers to cause a denial of service (CPU consumption or crash).</p>
-
-<p>(no identifier has been assigned so far)</p>
-
- <p>out-of-bounds memory access</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in file version 5.04-5+squeeze9</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-131.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-132.data b/english/lts/security/2015/dla-132.data
deleted file mode 100644
index 7cd11c38ecd..00000000000
--- a/english/lts/security/2015/dla-132.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-132-1 openssl</define-tag>
-<define-tag report_date>2015-1-11</define-tag>
-<define-tag secrefs>CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-8275 CVE-2015-0204</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-132.wml b/english/lts/security/2015/dla-132.wml
deleted file mode 100644
index 09a7a179c58..00000000000
--- a/english/lts/security/2015/dla-132.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in OpenSSL, a Secure
-Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
-identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3570">CVE-2014-3570</a>
-
- <p>Pieter Wuille of Blockstream reported that the bignum squaring
- (BN_sqr) may produce incorrect results on some platforms, which
- might make it easier for remote attackers to defeat cryptographic
- protection mechanisms.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3571">CVE-2014-3571</a>
-
- <p>Markus Stenberg of Cisco Systems, Inc. reported that a carefully
- crafted DTLS message can cause a segmentation fault in OpenSSL due
- to a NULL pointer dereference. A remote attacker could use this flaw
- to mount a denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3572">CVE-2014-3572</a>
-
- <p>Karthikeyan Bhargavan of the PROSECCO team at INRIA reported that an
- OpenSSL client would accept a handshake using an ephemeral ECDH
- ciphersuite if the server key exchange message is omitted. This
- allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks
- and trigger a loss of forward secrecy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8275">CVE-2014-8275</a>
-
- <p>Antti Karjalainen and Tuomo Untinen of the Codenomicon CROSS project
- and Konrad Kraszewski of Google reported various certificate
- fingerprint issues, which allow remote attackers to defeat a
- fingerprint-based certificate-blacklist protection mechanism.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0204">CVE-2015-0204</a>
-
- <p>Karthikeyan Bhargavan of the PROSECCO team at INRIA reported that
- an OpenSSL client will accept the use of an ephemeral RSA key in a
- non-export RSA key exchange ciphersuite, violating the TLS
- standard. This allows remote SSL servers to downgrade the security
- of the session.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze19</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-132.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-133.data b/english/lts/security/2015/dla-133.data
deleted file mode 100644
index 29175e1a7b4..00000000000
--- a/english/lts/security/2015/dla-133.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-133-1 unrtf</define-tag>
-<define-tag report_date>2015-1-14</define-tag>
-<define-tag secrefs>CVE-2014-9274 CVE-2014-9275 Bug#772811</define-tag>
-<define-tag packages>unrtf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-133.wml b/english/lts/security/2015/dla-133.wml
deleted file mode 100644
index f200f1eee65..00000000000
--- a/english/lts/security/2015/dla-133.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9274">CVE-2014-9274</a>
-
- <p>check that accesses to color table stay within bounds
- Patches taken from upstream commits:
- - <a href="https://security-tracker.debian.org/tracker/CVE-2014-9274">CVE-2014-9274</a>: b0cef89a170a66bc48f8dd288ce562ea8ca91f7a</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9275">CVE-2014-9275</a>
-
- <p>various crashes
- - <a href="https://security-tracker.debian.org/tracker/CVE-2014-9275">CVE-2014-9275</a>: 1df886f2e65f7c512a6217588ae8d94d4bcbc63d
- 3c7ff3f888de0f0d957fe67b6bd4bec9c0d475f3</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unrtf version 0.19.3-1.1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-133.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-134.data b/english/lts/security/2015/dla-134.data
deleted file mode 100644
index 1c62b8acbc3..00000000000
--- a/english/lts/security/2015/dla-134.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-134-1 curl</define-tag>
-<define-tag report_date>2015-1-15</define-tag>
-<define-tag secrefs>CVE-2014-8150</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-134.wml b/english/lts/security/2015/dla-134.wml
deleted file mode 100644
index f1183917363..00000000000
--- a/english/lts/security/2015/dla-134.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andrey Labunets of Facebook discovered that cURL, an URL transfer
-library, fails to properly handle URLs with embedded end-of-line
-characters. An attacker able to make an application using libcurl to
-access a specially crafted URL via an HTTP proxy could use this flaw to
-do additional requests in a way that was not intended, or insert
-additional request headers into the request.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in curl version 7.21.0-2.1+squeeze11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-134.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-135.data b/english/lts/security/2015/dla-135.data
deleted file mode 100644
index fdb5b1ce84c..00000000000
--- a/english/lts/security/2015/dla-135.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-135-1 ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag report_date>2015-1-16</define-tag>
-<define-tag packages>ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-135.wml b/english/lts/security/2015/dla-135.wml
deleted file mode 100644
index c793b51ba60..00000000000
--- a/english/lts/security/2015/dla-135.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs and ia32-libs-gtk packages contain 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the previous update of ia32-libs and
-ia32-libs-gtk in Squeeze LTS.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ia32-libs, ia32-libs-gtk version 20150116</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-135.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-136.data b/english/lts/security/2015/dla-136.data
deleted file mode 100644
index 89a744867ef..00000000000
--- a/english/lts/security/2015/dla-136.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-136-1 websvn</define-tag>
-<define-tag report_date>2015-1-24</define-tag>
-<define-tag secrefs>CVE-2013-6892 Bug#775682</define-tag>
-<define-tag packages>websvn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-136.wml b/english/lts/security/2015/dla-136.wml
deleted file mode 100644
index ec6a63faae5..00000000000
--- a/english/lts/security/2015/dla-136.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>James Clawson discovered that websvn, a web viewer for Subversion
-repositories, would follow symlinks in a repository when presenting a
-file for download. An attacker with repository write access could
-thereby access any file on disk readable by the user the webserver
-runs as.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in websvn version 2.3.3-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-136.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-137.data b/english/lts/security/2015/dla-137.data
deleted file mode 100644
index 5e8f7885811..00000000000
--- a/english/lts/security/2015/dla-137.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-137-1 libevent</define-tag>
-<define-tag report_date>2015-1-26</define-tag>
-<define-tag secrefs>CVE-2014-6272 Bug#774645</define-tag>
-<define-tag packages>libevent</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-137.wml b/english/lts/security/2015/dla-137.wml
deleted file mode 100644
index c780ce41457..00000000000
--- a/english/lts/security/2015/dla-137.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The libevent library was vulnerable to a potential heap overflow in
-the buffer/bufferevent APIs.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libevent version 1.4.13-stable-1+deb6u1</p>
-
-<p>This update was prepared by Nguyen Cong who used the upstream-provided
-patch. Thanks to them!</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-137.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-138.data b/english/lts/security/2015/dla-138.data
deleted file mode 100644
index f84ec408b68..00000000000
--- a/english/lts/security/2015/dla-138.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-138-1 jasper</define-tag>
-<define-tag report_date>2015-1-28</define-tag>
-<define-tag secrefs>CVE-2014-8157 CVE-2014-8158 Bug#775970</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-138.wml b/english/lts/security/2015/dla-138.wml
deleted file mode 100644
index 488bea9fbda..00000000000
--- a/english/lts/security/2015/dla-138.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An off-by-one flaw, leading to a heap-based buffer overflow
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8157">CVE-2014-8157</a>), and an unrestricted stack memory use flaw
-(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8158">CVE-2014-8158</a>) were found in JasPer, a library for manipulating
-JPEG-2000 files. A specially crafted file could cause an application
-using JasPer to crash or, possibly, execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in jasper version 1.900.1-7+squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-138.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-139.data b/english/lts/security/2015/dla-139.data
deleted file mode 100644
index e08ae04dbe4..00000000000
--- a/english/lts/security/2015/dla-139.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-139-1 eglibc</define-tag>
-<define-tag report_date>2015-1-28</define-tag>
-<define-tag secrefs>CVE-2015-0235</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-139.wml b/english/lts/security/2015/dla-139.wml
deleted file mode 100644
index 353417bffbc..00000000000
--- a/english/lts/security/2015/dla-139.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been fixed in eglibc, Debian's version of the GNU C
-library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0235">CVE-2015-0235</a>
-
- <p>Qualys discovered that the gethostbyname and gethostbyname2
- functions were subject to a buffer overflow if provided with a
- crafted IP address argument. This could be used by an attacker to
- execute arbitrary code in processes which called the affected
- functions.</p></li>
-
-</ul>
-
-<p>The original glibc bug was reported by Peter Klotz.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in eglibc version 2.11.3-4+deb6u4</p>
-
-<p>We recommend that you upgrade your eglibc packages.</p>
-
-<p>The other three CVEs fixed in Debian wheezy via <a href="./dsa-3142">DSA 3142-1</a> have already been
-fixed in squeeze LTS via DLA <a href="../2014/dla-97">DLA 97-1</a>.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-139.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-140.data b/english/lts/security/2015/dla-140.data
deleted file mode 100644
index 2b71cd2413e..00000000000
--- a/english/lts/security/2015/dla-140.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-140-1 rpm</define-tag>
-<define-tag report_date>2015-1-28</define-tag>
-<define-tag secrefs>CVE-2012-0060 CVE-2012-0061 CVE-2012-0815 CVE-2013-6435 CVE-2014-8118</define-tag>
-<define-tag packages>rpm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-140.wml b/english/lts/security/2015/dla-140.wml
deleted file mode 100644
index 6ed62cc9d19..00000000000
--- a/english/lts/security/2015/dla-140.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in rpm:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8118">CVE-2014-8118</a>
-
- <p>Fix integer overflow which allowed remote attackers to execute arbitrary
- code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-6435">CVE-2013-6435</a>
-
- <p>Prevent remote attackers from executing arbitrary code via crafted
- RPM files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0815">CVE-2012-0815</a>
-
- <p>Fix denial of service and possible code execution via negative value in
- region offset in crafted RPM files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0060">CVE-2012-0060</a>
-
-<p>and <a href="https://security-tracker.debian.org/tracker/CVE-2012-0061">CVE-2012-0061</a></p>
-
- <p>Prevent denial of service (crash) and possibly execute arbitrary code
- execution via an invalid region tag in RPM files.</p></li>
-
-</ul>
-
-<p>We recommend that you upgrade your rpm packages.</p>
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in rpm version 4.8.1-6+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-140.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-141.data b/english/lts/security/2015/dla-141.data
deleted file mode 100644
index 11e1be2be25..00000000000
--- a/english/lts/security/2015/dla-141.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-141-1 libksba</define-tag>
-<define-tag report_date>2015-1-29</define-tag>
-<define-tag secrefs>CVE-2014-9087</define-tag>
-<define-tag packages>libksba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-141.wml b/english/lts/security/2015/dla-141.wml
deleted file mode 100644
index 4feec52e0a6..00000000000
--- a/english/lts/security/2015/dla-141.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been fixed in the libksba X.509 and CMS support library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9087">CVE-2014-9087</a>
-
- <p>Fix buffer overflow in ksba_oid_to_str reported by Hanno Böck.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in libksba version 1.0.7-2+deb6u1</p>
-<p>We recommend that you upgrade your libksba packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-141.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-142.data b/english/lts/security/2015/dla-142.data
deleted file mode 100644
index acbd7da2f78..00000000000
--- a/english/lts/security/2015/dla-142.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-142-1 privoxy</define-tag>
-<define-tag report_date>2015-1-29</define-tag>
-<define-tag secrefs>CVE-2015-1031 CVE-2015-1381 CVE-2015-1382</define-tag>
-<define-tag packages>privoxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-142.wml b/english/lts/security/2015/dla-142.wml
deleted file mode 100644
index 89e3664c344..00000000000
--- a/english/lts/security/2015/dla-142.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in privoxy, a privacy enhancing
-HTTP proxy:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1031">CVE-2015-1031</a>, CID66394
-
- <p>unmap(): Prevent use-after-free if the map only consists of one item.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1031">CVE-2015-1031</a>, CID66376 and CID66391
-
- <p>pcrs_execute(): Consistently set *result to NULL in case of errors.
- Should make use-after-free in the caller less likely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1381">CVE-2015-1381</a>
-
- <p>Fix multiple segmentation faults and memory leaks in the pcrs code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1382">CVE-2015-1382</a>
-
- <p>Fix invalid read to prevent potential crashes.</p></li>
-
-</ul>
-
-<p>We recommend that you upgrade your privoxy packages.</p>
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in privoxy version 3.0.16-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-142.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-143.data b/english/lts/security/2015/dla-143.data
deleted file mode 100644
index fb3464098ab..00000000000
--- a/english/lts/security/2015/dla-143.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-143-1 python-django</define-tag>
-<define-tag report_date>2015-1-29</define-tag>
-<define-tag secrefs>CVE-2015-0219 CVE-2015-0220 CVE-2015-0221</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-143.wml b/english/lts/security/2015/dla-143.wml
deleted file mode 100644
index 86c59f153eb..00000000000
--- a/english/lts/security/2015/dla-143.wml
+++ /dev/null
@@ -1,82 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Django:
-<a href="https://www.djangoproject.com/weblog/2015/jan/13/security/">https://www.djangoproject.com/weblog/2015/jan/13/security/</a></p>
-
-<p>For Debian 6 Squeeeze, they have been fixed in version 1.2.3-3+squeeze12
-of python-django. Here is what the upstream developers have to say about
-those issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0219">CVE-2015-0219</a>
-
-<p>- WSGI header spoofing via underscore/dash conflation</p>
-
- <p>When HTTP headers are placed into the WSGI environ, they are
- normalized by converting to uppercase, converting all dashes to
- underscores, and prepending HTTP_. For instance, a header X-Auth-User
- would become HTTP_X_AUTH_USER in the WSGI environ (and thus also in
- Django's request.META dictionary).</p>
-
- <p>Unfortunately, this means that the WSGI environ cannot distinguish
- between headers containing dashes and headers containing underscores:
- X-Auth-User and X-Auth_User both become HTTP_X_AUTH_USER. This means
- that if a header is used in a security-sensitive way (for instance,
- passing authentication information along from a front-end proxy), even
- if the proxy carefully strips any incoming value for X-Auth-User, an
- attacker may be able to provide an X-Auth_User header (with
- underscore) and bypass this protection.</p>
-
- <p>In order to prevent such attacks, both Nginx and Apache 2.4+ strip
- all headers containing underscores from incoming requests by
- default. Django's built-in development server now does the same.
- Django's development server is not recommended for production use,
- but matching the behavior of common production servers reduces the
- surface area for behavior changes during deployment.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0220">CVE-2015-0220</a>
-
-<p>- Possible XSS attack via user-supplied redirect URLs</p>
-
- <p>Django relies on user input in some cases (e.g.
- django.contrib.auth.views.login() and i18n) to redirect the user to an
- <q>on success</q> URL. The security checks for these redirects (namely
- django.util.http.is_safe_url()) didn't strip leading whitespace on the
- tested URL and as such considered URLs like "\njavascript:..." safe. If
- a developer relied on is_safe_url() to provide safe redirect targets
- and put such a URL into a link, they could suffer from a XSS attack.
- This bug doesn't affect Django currently, since we only put this URL
- into the Location response header and browsers seem to ignore
- JavaScript there.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0221">CVE-2015-0221</a>
-
-<p>- Denial-of-service attack against django.views.static.serve</p>
-
- <p>In older versions of Django, the django.views.static.serve() view read
- the files it served one line at a time. Therefore, a big file with no
- newlines would result in memory usage equal to the size of that file.
- An attacker could exploit this and launch a denial-of-service attack
- by simultaneously requesting many large files. This view now reads the
- file in chunks to prevent large memory usage.</p>
-
- <p>Note, however, that this view has always carried a warning that it is
- not hardened for production use and should be used only as a
- development aid. Now may be a good time to audit your project and
- serve your files in production using a real front-end web server if
- you are not doing so.</p></li>
-
-</ul>
-
-<p>Note that the version of Django in use in Debian 6 Squeeze was not
-affected by <a href="https://security-tracker.debian.org/tracker/CVE-2015-0222">CVE-2015-0222</a> (Database denial-of-service with
-ModelMultipleChoiceField) since that feature does not exist
-in this version.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in python-django version 1.2.3-3+squeeze12</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-143.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-144.data b/english/lts/security/2015/dla-144.data
deleted file mode 100644
index 0fd9559effa..00000000000
--- a/english/lts/security/2015/dla-144.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-144-1 polarssl</define-tag>
-<define-tag report_date>2015-1-29</define-tag>
-<define-tag secrefs>CVE-2015-1182</define-tag>
-<define-tag packages>polarssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-144.wml b/english/lts/security/2015/dla-144.wml
deleted file mode 100644
index 020a00ddc02..00000000000
--- a/english/lts/security/2015/dla-144.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in PolarSSL, a lightweight crypto and
-SSL/TLS library. A remote attacker could exploit this flaw using
-specially crafted certificates to mount a denial of service against an
-application linked against the library (application crash), or
-potentially, to execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in polarssl version 1.2.9-1~deb6u4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-144.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-145-2.data b/english/lts/security/2015/dla-145-2.data
deleted file mode 100644
index 62cd216432d..00000000000
--- a/english/lts/security/2015/dla-145-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-145-2 php5</define-tag>
-<define-tag report_date>2015-2-02</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-145-2.wml b/english/lts/security/2015/dla-145-2.wml
deleted file mode 100644
index 7c52d974059..00000000000
--- a/english/lts/security/2015/dla-145-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<p>The DLA-145-1 security update included a fix for PHP bug 68739 which was a
-null pointer dereference.</p>
-
-<p>Unfortunately this fix broke cookie handling. For more details see the
-<a href="https://lists.debian.org/debian-lts/2015/02/msg00007.html">email</a>.
-</p>
-
-<p>This patch has been removed to restore functionality.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze25</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-145-2.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-145.data b/english/lts/security/2015/dla-145.data
deleted file mode 100644
index 0d321653239..00000000000
--- a/english/lts/security/2015/dla-145.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-145-1 php5</define-tag>
-<define-tag report_date>2015-1-31</define-tag>
-<define-tag secrefs>CVE-2014-0237 CVE-2014-0238 CVE-2014-2270 CVE-2014-8117</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-145.wml b/english/lts/security/2015/dla-145.wml
deleted file mode 100644
index a4ad581542a..00000000000
--- a/english/lts/security/2015/dla-145.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0237">CVE-2014-0237</a>
-
- <p>The cdf_unpack_summary_info function in cdf.c in the Fileinfo
- component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows
- remote attackers to cause a denial of service (performance
- degradation) by triggering many file_printf calls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0238">CVE-2014-0238</a>
-
- <p>The cdf_read_property_info function in cdf.c in the Fileinfo
- component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows
- remote attackers to cause a denial of service (infinite loop
- or out-of-bounds memory access) via a vector that (1) has zero
- length or (2) is too long.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2270">CVE-2014-2270</a>
-
- <p>softmagic.c in file before 5.17 and libmagic allows context
- dependent attackers to cause a denial of service (out-of-bounds
- memory access and crash) via crafted offsets in the softmagic
- of a PE executable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8117">CVE-2014-8117</a>
-
- <ul>
- <li>Stop reporting bad capabilities after the first few.</li>
- <li>limit the number of program and section header number of sections</li>
- <li>limit recursion level</li>
- </ul></li>
-
-<li>CVE-2015-TEMP (no official CVE number available yet)
-
- <ul>
- <li>null pointer deference (PHP bugs: 68739 68740)</li>
- <li>out-of-bounds memory access (file bug: 398)
- additional patches from <a href="https://security-tracker.debian.org/tracker/CVE-2014-3478">CVE-2014-3478</a> added</li>
- </ul></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze24</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-145.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-146.data b/english/lts/security/2015/dla-146.data
deleted file mode 100644
index 06d7f340b52..00000000000
--- a/english/lts/security/2015/dla-146.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-146-1 krb5</define-tag>
-<define-tag report_date>2015-2-7</define-tag>
-<define-tag secrefs>CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-146.wml b/english/lts/security/2015/dla-146.wml
deleted file mode 100644
index b7273e562eb..00000000000
--- a/english/lts/security/2015/dla-146.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiples vulnerabilities have been found in krb5, the MIT
-implementation of Kerberos:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5352">CVE-2014-5352</a>
-
- <p>Incorrect memory management in the libgssapi_krb5 library might
- result in denial of service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9421">CVE-2014-9421</a>
-
- <p>Incorrect memory management in kadmind's processing of XDR data
- might result in denial of service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9422">CVE-2014-9422</a>
-
- <p>Incorrect processing of two-component server principals might result
- in impersonation attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9423">CVE-2014-9423</a>
-
- <p>An information leak in the libgssrpc library.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in krb5 version 1.8.3+dfsg-4squeeze9</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-146.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-147.data b/english/lts/security/2015/dla-147.data
deleted file mode 100644
index cf951c85d99..00000000000
--- a/english/lts/security/2015/dla-147.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-147-1 wpasupplicant</define-tag>
-<define-tag report_date>2015-2-07</define-tag>
-<define-tag secrefs>CVE-2014-3686</define-tag>
-<define-tag packages>wpasupplicant</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-147.wml b/english/lts/security/2015/dla-147.wml
deleted file mode 100644
index 6f2d71533de..00000000000
--- a/english/lts/security/2015/dla-147.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that wpasupplicant could be tricked into executing
-arbitrary commands when calling action scripts.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in wpasupplicant version 0.6.10-2.1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-147.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-148.data b/english/lts/security/2015/dla-148.data
deleted file mode 100644
index 79178eafa11..00000000000
--- a/english/lts/security/2015/dla-148.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-148-1 sympa</define-tag>
-<define-tag report_date>2015-2-7</define-tag>
-<define-tag secrefs>CVE-2015-1306</define-tag>
-<define-tag packages>sympa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-148.wml b/english/lts/security/2015/dla-148.wml
deleted file mode 100644
index 215e0e5def1..00000000000
--- a/english/lts/security/2015/dla-148.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been discovered in the web interface of sympa, a
-mailing list manager. An attacker could take advantage of this flaw in
-the newsletter posting area, which allows sending to a list, or to
-oneself, any file located on the server filesystem and readable by the
-sympa user.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in sympa version 6.0.1+dfsg-4+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-148.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-149.data b/english/lts/security/2015/dla-149.data
deleted file mode 100644
index 3af34e0177f..00000000000
--- a/english/lts/security/2015/dla-149.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-149-1 ntp</define-tag>
-<define-tag report_date>2015-2-7</define-tag>
-<define-tag secrefs>CVE-2014-9297 CVE-2014-9298</define-tag>
-<define-tag packages>ntp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-149.wml b/english/lts/security/2015/dla-149.wml
deleted file mode 100644
index 4b25ec4513b..00000000000
--- a/english/lts/security/2015/dla-149.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the ntp package, an
-implementation of the Network Time Protocol. The Common Vulnerabilities
-and Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9297">CVE-2014-9297</a>
-
- <p>Stephen Roettger of the Google Security Team, Sebastian Krahmer of
- the SUSE Security Team and Harlan Stenn of Network Time Foundation
- discovered that the length value in extension fields is not properly
- validated in several code paths in ntp_crypto.c, which could lead to
- information leakage or denial of service (ntpd crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9298">CVE-2014-9298</a>
-
- <p>Stephen Roettger of the Google Security Team reported that ACLs
- based on IPv6 ::1 addresses can be bypassed.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ntp version 1:4.2.6.p2+dfsg-1+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-149.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-150.data b/english/lts/security/2015/dla-150.data
deleted file mode 100644
index 6269c2bc909..00000000000
--- a/english/lts/security/2015/dla-150.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-150-1 unzip</define-tag>
-<define-tag report_date>2015-2-7</define-tag>
-<define-tag secrefs>CVE-2014-8139 CVE-2014-9636 Bug#775640 Bug#776589</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-150.wml b/english/lts/security/2015/dla-150.wml
deleted file mode 100644
index 02e89d3f982..00000000000
--- a/english/lts/security/2015/dla-150.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in the test_compr_eb() function allowing out-of-bounds
-read and write access to memory locations. By carefully crafting a
-corrupt ZIP archive an attacker can trigger a heap overflow, resulting
-in application crash or possibly having other unspecified impact.</p>
-
-
-<p>Additionally this update corrects a defective patch applied to address
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-8139">CVE-2014-8139</a>, which caused a regression with executable jar files.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unzip version 6.0-4+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-150.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-151.data b/english/lts/security/2015/dla-151.data
deleted file mode 100644
index 012f1fec3d6..00000000000
--- a/english/lts/security/2015/dla-151.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-151-1 libxml2</define-tag>
-<define-tag report_date>2015-2-7</define-tag>
-<define-tag secrefs>CVE-2014-0191 CVE-2014-3660 Bug#768089</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-151.wml b/english/lts/security/2015/dla-151.wml
deleted file mode 100644
index 0523f23d7e7..00000000000
--- a/english/lts/security/2015/dla-151.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the update released for libxml2 in <a href="../2014/dsa-2978">DSA 2978</a> fixing
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-0191">CVE-2014-0191</a> was incomplete. This caused libxml2 to still fetch external
-entities regardless of whether entity substitution or validation is
-enabled.</p>
-
-<p>In addition, this update addresses a regression introduced in <a href="../2014/dsa-3057">DSA 3057</a> by
-the patch fixing <a href="https://security-tracker.debian.org/tracker/CVE-2014-3660">CVE-2014-3660</a>. This caused libxml2 to not parse an
-entity when it's used first in another entity referenced from an
-attribute value.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxml2 version 2.7.8.dfsg-2+squeeze11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-151.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-152.data b/english/lts/security/2015/dla-152.data
deleted file mode 100644
index 8965d2a6b50..00000000000
--- a/english/lts/security/2015/dla-152.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-152-1 postgresql-8.4</define-tag>
-<define-tag report_date>2015-2-12</define-tag>
-<define-tag secrefs>CVE-2014-8161 CVE-2015-0241 CVE-2015-0243 CVE-2015-0244</define-tag>
-<define-tag packages>postgresql-8.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-152.wml b/english/lts/security/2015/dla-152.wml
deleted file mode 100644
index 3592a21fd11..00000000000
--- a/english/lts/security/2015/dla-152.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in PostgreSQL, a relational
-database server system. The 8.4 branch is EOLed upstream, but still
-present in Debian squeeze. This new LTS minor version contains the
-fixes that were applied upstream to the 9.0.19 version, backported to
-8.4.22 which was the last version officially released by the PostgreSQL
-developers. This LTS effort for squeeze-lts is a community project
-sponsored by credativ GmbH.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8161">CVE-2014-8161</a>
-
-<p>Information leak
-A user with limited clearance on a table might have access to information
-in columns without SELECT rights on through server error messages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0241">CVE-2015-0241</a>
-
-<p>Out of boundaries read/write
-The function to_char() might read/write past the end of a buffer. This
-might crash the server when a formatting template is processed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0243">CVE-2015-0243</a>
-
-<p>Buffer overruns in contrib/pgcrypto
-The pgcrypto module is vulnerable to stack buffer overrun that might
-crash the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0244">CVE-2015-0244</a>
-
-<p>SQL command injection
-Emil Lenngren reported that an attacker can inject SQL commands when the
-synchronization between client and server is lost.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in postgresql-8.4 version 8.4.22lts1-0+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-152.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-153.data b/english/lts/security/2015/dla-153.data
deleted file mode 100644
index cfc9f8c2b9c..00000000000
--- a/english/lts/security/2015/dla-153.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-153-1 e2fsprogs</define-tag>
-<define-tag report_date>2015-2-16</define-tag>
-<define-tag secrefs>CVE-2015-0247</define-tag>
-<define-tag packages>e2fsprogs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-153.wml b/english/lts/security/2015/dla-153.wml
deleted file mode 100644
index fe188351213..00000000000
--- a/english/lts/security/2015/dla-153.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A broken (or maliciously crafted) file system could trigger a buffer
-overflow in e2fsprogs.</p>
-
-<p>This update has been prepared by Nguyen Cong.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in e2fsprogs version 1.41.12-4+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-153.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-154.data b/english/lts/security/2015/dla-154.data
deleted file mode 100644
index 637c17095f1..00000000000
--- a/english/lts/security/2015/dla-154.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-154-1 nss</define-tag>
-<define-tag report_date>2015-2-16</define-tag>
-<define-tag secrefs>CVE-2011-3389 CVE-2014-1569 Bug#773625</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-154.wml b/english/lts/security/2015/dla-154.wml
deleted file mode 100644
index de6e9a47ed2..00000000000
--- a/english/lts/security/2015/dla-154.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>nss 3.12.8-1+squeeze11 fixes two security issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3389">CVE-2011-3389</a>
-
- <p>SSL 3.0 and TLS 1.0 connections were vulnerable to some chosen
- plaintext attacks which allowed man-in-the middle attackers to obtain
- plaintext HTTP headers on an HTTPS session. This issue is known as
- the <q>BEAST</q> attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1569">CVE-2014-1569</a>
-
- <p>Possible information leak with too-permissive ASN.1 DER decoding of
- length.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nss version 3.12.8-1+squeeze11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-154.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-155.data b/english/lts/security/2015/dla-155.data
deleted file mode 100644
index 12ffaefcdbd..00000000000
--- a/english/lts/security/2015/dla-155.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-155-1 linux-2.6</define-tag>
-<define-tag report_date>2015-2-18</define-tag>
-<define-tag secrefs>CVE-2013-6885 CVE-2014-7822 CVE-2014-8133 CVE-2014-8134 CVE-2014-8160 CVE-2014-9420 CVE-2014-9584 CVE-2014-9585 CVE-2015-1421 CVE-2015-1593</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-155.wml b/english/lts/security/2015/dla-155.wml
deleted file mode 100644
index a6da5d4abac..00000000000
--- a/english/lts/security/2015/dla-155.wml
+++ /dev/null
@@ -1,94 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<p>A further issue, <a href="https://security-tracker.debian.org/tracker/CVE-2014-9419">CVE-2014-9419</a>, was considered, but appears to require
-extensive changes with a consequent high risk of regression. It is
-now unlikely to be fixed in squeeze-lts.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-6885">CVE-2013-6885</a>
-
- <p>It was discovered that under specific circumstances, a combination
- of write operations to write-combined memory and locked CPU
- instructions may cause a core hang on AMD 16h 00h through 0Fh
- processors. A local user can use this flaw to mount a denial of
- service (system hang) via a crafted application.</p>
-
- <p>For more information please refer to the AMD CPU erratum 793 in
- <a href="http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf">http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7822">CVE-2014-7822</a>
-
- <p>It was found that the splice() system call did not validate the
- given file offset and length. A local unprivileged user can use
- this flaw to cause filesystem corruption on ext4 filesystems, or
- possibly other effects.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8133">CVE-2014-8133</a>
-
- <p>It was found that the espfix functionality can be bypassed by
- installing a 16-bit RW data segment into GDT instead of LDT (which
- espfix checks for) and using it for stack. A local unprivileged user
- could potentially use this flaw to leak kernel stack addresses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8134">CVE-2014-8134</a>
-
- <p>It was found that the espfix functionality is wrongly disabled in
- a 32-bit KVM guest. A local unprivileged user could potentially
- use this flaw to leak kernel stack addresses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8160">CVE-2014-8160</a>
-
- <p>It was found that a netfilter (iptables or ip6tables) rule
- accepting packets to a specific SCTP, DCCP, GRE or UDPlite
- port/endpoint could result in incorrect connection tracking state.
- If only the generic connection tracking module (nf_conntrack) was
- loaded, and not the protocol-specific connection tracking module,
- this would allow access to any port/endpoint of the specified
- protocol.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9420">CVE-2014-9420</a>
-
- <p>It was found that the ISO-9660 filesystem implementation (isofs)
- follows arbitrarily long chains, including loops, of Continuation
- Entries (CEs). This allows local users to mount a denial of
- service via a crafted disc image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9584">CVE-2014-9584</a>
-
- <p>It was found that the ISO-9660 filesystem implementation (isofs)
- does not validate a length value in the Extensions Reference (ER)
- System Use Field, which allows local users to obtain sensitive
- information from kernel memory via a crafted disc image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9585">CVE-2014-9585</a>
-
- <p>It was discovered that address randomisation for the vDSO in
- 64-bit processes is extremely biassed. A local unprivileged user
- could potentially use this flaw to bypass the ASLR protection
- mechanism.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1421">CVE-2015-1421</a>
-
- <p>It was found that the SCTP implementation could free
- authentication state while it was still in use, resulting in heap
- corruption. This could allow remote users to cause a denial of
- service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1593">CVE-2015-1593</a>
-
- <p>It was found that address randomisation for the initial stack in
- 64-bit processes was limited to 20 rather than 22 bits of entropy.
- A local unprivileged user could potentially use this flaw to
- bypass the ASLR protection mechanism.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in linux-2.6 version 2.6.32-48squeeze11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-155.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-156.data b/english/lts/security/2015/dla-156.data
deleted file mode 100644
index 3f3a64450f8..00000000000
--- a/english/lts/security/2015/dla-156.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-156-1 samba</define-tag>
-<define-tag report_date>2015-2-23</define-tag>
-<define-tag secrefs>CVE-2015-0240 Bug#779033</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-156.wml b/english/lts/security/2015/dla-156.wml
deleted file mode 100644
index 899f7e937b3..00000000000
--- a/english/lts/security/2015/dla-156.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Richard van Eeden of Microsoft Vulnerability Research discovered that
-Samba, a SMB/CIFS file, print, and login server for Unix, contains a
-flaw in the netlogon server code which allows remote code execution with
-root privileges from an unauthenticated connection.</p>
-
-<p>For the oldstable distribution (squeeze), this problem has been fixed in
-version 2:3.5.6~dfsg-3squeeze12.</p>
-
-<p>For the stable distribution (wheezy), this problem has been fixed in
-version 2:3.6.6-6+deb7u5.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-156.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-157.data b/english/lts/security/2015/dla-157.data
deleted file mode 100644
index a08ae31e856..00000000000
--- a/english/lts/security/2015/dla-157.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-157-1 openjdk-6</define-tag>
-<define-tag report_date>2015-2-24</define-tag>
-<define-tag secrefs>CVE-2014-3566 CVE-2014-6585 CVE-2014-6587 CVE-2014-6591 CVE-2014-6593 CVE-2014-6601 CVE-2015-0383 CVE-2015-0395 CVE-2015-0407 CVE-2015-0408 CVE-2015-0410 CVE-2015-0412</define-tag>
-<define-tag packages>openjdk-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-157.wml b/english/lts/security/2015/dla-157.wml
deleted file mode 100644
index bccf99dd1de..00000000000
--- a/english/lts/security/2015/dla-157.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in the execution
-of arbitrary code, information disclosure or denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openjdk-6 version 6b34-1.13.6-1~deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-157.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-158.data b/english/lts/security/2015/dla-158.data
deleted file mode 100644
index e4c8b4dc794..00000000000
--- a/english/lts/security/2015/dla-158.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-158-1 request-tracker3.8</define-tag>
-<define-tag report_date>2015-2-27</define-tag>
-<define-tag secrefs>CVE-2014-9472 CVE-2015-1165 CVE-2015-1464</define-tag>
-<define-tag packages>request-tracker3.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-158.wml b/english/lts/security/2015/dla-158.wml
deleted file mode 100644
index 19946571229..00000000000
--- a/english/lts/security/2015/dla-158.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Request Tracker, an
-extensible trouble-ticket tracking system. The Common Vulnerabilities
-and Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9472">CVE-2014-9472</a>
-
- <p>Christian Loos discovered a remote denial of service vulnerability,
- exploitable via the email gateway and affecting any installation
- which accepts mail from untrusted sources. Depending on RT's
- logging configuration, a remote attacker can take advantage of
- this flaw to cause CPU and excessive disk usage.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1165">CVE-2015-1165</a>
-
- <p>Christian Loos discovered an information disclosure flaw which may
- reveal RSS feeds URLs, and thus ticket data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1464">CVE-2015-1464</a>
-
- <p>It was discovered that RSS feed URLs can be leveraged to perform
- session hijacking, allowing a user with the URL to log in as the
- user that created the feed.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed
-in version 3.8.8-7+squeeze9.</p>
-
-<p>We recommend that you upgrade your request-tracker3.8 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-158.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-159.data b/english/lts/security/2015/dla-159.data
deleted file mode 100644
index 819c085b6d4..00000000000
--- a/english/lts/security/2015/dla-159.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-159-1 cups</define-tag>
-<define-tag report_date>2015-2-27</define-tag>
-<define-tag secrefs>CVE-2014-9679 Bug##778387</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-159.wml b/english/lts/security/2015/dla-159.wml
deleted file mode 100644
index 390f64ac29a..00000000000
--- a/english/lts/security/2015/dla-159.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Peter De Wachter discovered that CUPS, the Common UNIX Printing
-System, did not correctly parse compressed raster files. By submitting
-a specially crafted raster file, a remote attacker could use this
-vulnerability to trigger a buffer overflow.</p>
-
-<p>For the oldstable distribution (squeeze), this problem has been fixed in
-version 1.4.4-7+squeeze7.</p>
-
-<p>For the stable distribution (wheezy), this problem has been fixed in
-version 1.5.3-5+deb7u5.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-159.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-160.data b/english/lts/security/2015/dla-160.data
deleted file mode 100644
index c9b35caa289..00000000000
--- a/english/lts/security/2015/dla-160.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-160-1 sudo</define-tag>
-<define-tag report_date>2015-2-27</define-tag>
-<define-tag secrefs>CVE-2014-0106 CVE-2014-9680 Bug##772707</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-160.wml b/english/lts/security/2015/dla-160.wml
deleted file mode 100644
index afd8377d7b2..00000000000
--- a/english/lts/security/2015/dla-160.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0106">CVE-2014-0106</a>
-
- <p>Todd C. Miller reported that if the env_reset option is disabled
- in the sudoers file, the env_delete option is not correctly
- applied to environment variables specified on the command line. A
- malicious user with sudo permissions may be able to run arbitrary
- commands with elevated privileges by manipulating the environment
- of a command the user is legitimately allowed to run.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9680">CVE-2014-9680</a>
-
- <p>Jakub Wilk reported that sudo preserves the TZ variable from a
- user's environment without any sanitization. A user with sudo
- access may take advantage of this to exploit bugs in the C library
- functions which parse the TZ environment variable or to open files
- that the user would not otherwise be able to open. The latter
- could potentially cause changes in system behavior when reading
- certain device special files or cause the program run via sudo to
- block.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed
-in version 1.7.4p4-2.squeeze.5.</p>
-
-<p>For the stable distribution (wheezy), they have been fixed in version
-1.8.5p2-1+nmu2.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-160.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-161.data b/english/lts/security/2015/dla-161.data
deleted file mode 100644
index 3a04883bd6a..00000000000
--- a/english/lts/security/2015/dla-161.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-161-1 libgtk2-perl</define-tag>
-<define-tag report_date>2015-2-28</define-tag>
-<define-tag packages>libgtk2-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-161.wml b/english/lts/security/2015/dla-161.wml
deleted file mode 100644
index 8505489bfbc..00000000000
--- a/english/lts/security/2015/dla-161.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libgtk2-perl, a Perl interface to the 2.x series
-of the Gimp Toolkit library, incorrectly frees memory which GTK+ still
-holds onto and might access later, leading to denial of service
-(application crash) or, potentially, to arbitrary code execution.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libgtk2-perl version 2:1.222-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-161.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-162.data b/english/lts/security/2015/dla-162.data
deleted file mode 100644
index 6ee41b33627..00000000000
--- a/english/lts/security/2015/dla-162.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-162-1 e2fsprogs</define-tag>
-<define-tag report_date>2015-2-28</define-tag>
-<define-tag secrefs>CVE-2015-1572 Bug#778948</define-tag>
-<define-tag packages>e2fsprogs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-162.wml b/english/lts/security/2015/dla-162.wml
deleted file mode 100644
index af50a7eb0c5..00000000000
--- a/english/lts/security/2015/dla-162.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jose Duart of the Google Security Team discovered a buffer overflow
-in e2fsprogs, a set of utilities for the ext2, ext3, and ext4 file
-systems. This issue can possibly lead to arbitrary code execution if
-a malicious device is plugged in, the system is configured to
-automatically mount it, and the mounting process chooses to run fsck
-on the device's malicious filesystem.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1572">CVE-2015-1572</a>
-
- <p>Incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-0247">CVE-2015-0247</a>.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in e2fsprogs version 1.41.12-4+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-162.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-163.data b/english/lts/security/2015/dla-163.data
deleted file mode 100644
index 01d204a6190..00000000000
--- a/english/lts/security/2015/dla-163.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-163-1 bind9</define-tag>
-<define-tag report_date>2015-3-1</define-tag>
-<define-tag secrefs>CVE-2015-1349 Bug#778733</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-163.wml b/english/lts/security/2015/dla-163.wml
deleted file mode 100644
index e48cc615732..00000000000
--- a/english/lts/security/2015/dla-163.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jan-Piet Mens discovered that the BIND DNS server would crash when
-processing an invalid DNSSEC key rollover, either due to an error on
-the zone operator's part, or due to interference with network traffic
-by an attacker. This issue affects configurations with the directives
-"dnssec-validation auto;" (as enabled in the Debian default
-configuration) or "dnssec-lookaside auto;".</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bind9 version 1:9.7.3.dfsg-1~squeeze14</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-163.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-164.data b/english/lts/security/2015/dla-164.data
deleted file mode 100644
index 7acc187127e..00000000000
--- a/english/lts/security/2015/dla-164.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-164-1 unace</define-tag>
-<define-tag report_date>2015-3-3</define-tag>
-<define-tag secrefs>CVE-2015-2063 Bug#775003</define-tag>
-<define-tag packages>unace</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-164.wml b/english/lts/security/2015/dla-164.wml
deleted file mode 100644
index 27b6b051bba..00000000000
--- a/english/lts/security/2015/dla-164.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jakub Wilk discovered that unace, an utility to extract, test and view
-.ace archives, contained an integer overflow leading to a buffer
-overflow. If a user or automated system were tricked into processing a
-specially crafted ace archive, an attacker could cause a denial of
-service (application crash) or, possibly, execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unace version 1.2b-7+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-164.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-165.data b/english/lts/security/2015/dla-165.data
deleted file mode 100644
index f7beb61f133..00000000000
--- a/english/lts/security/2015/dla-165.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-165-1 eglibc</define-tag>
-<define-tag report_date>2015-3-06</define-tag>
-<define-tag secrefs>CVE-2012-3405 CVE-2012-3406 CVE-2012-3480 CVE-2012-4412 CVE-2012-4424 CVE-2013-0242 CVE-2013-1914 CVE-2013-4237 CVE-2013-4332 CVE-2013-4357 CVE-2013-4458 CVE-2013-4788 CVE-2013-7423 CVE-2013-7424 CVE-2014-4043 CVE-2015-1472 CVE-2015-1473 Bug#553206 Bug#681473 Bug#681888 Bug#684889 Bug#687530 Bug#689423 Bug#699399 Bug#704623</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-165.wml b/english/lts/security/2015/dla-165.wml
deleted file mode 100644
index 478a4cddc37..00000000000
--- a/english/lts/security/2015/dla-165.wml
+++ /dev/null
@@ -1,128 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in eglibc, Debian's version of
-the GNU C library.</p>
-
-<ul>
-
-<li>#553206,
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-1472">CVE-2015-1472</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-1473">CVE-2015-1473</a>
-
- <p>The scanf family of functions do not properly limit stack
- allocation, which allows context-dependent attackers to cause a
- denial of service (crash) or possibly execute arbitrary code.</p>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3405">CVE-2012-3405</a>
-
- <p>The printf family of functions do not properly calculate a buffer
- length, which allows context-dependent attackers to bypass the
- FORTIFY_SOURCE format-string protection mechanism and cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3406">CVE-2012-3406</a>
-
- <p>The printf family of functions do not properly limit stack
- allocation, which allows context-dependent attackers to bypass the
- FORTIFY_SOURCE format-string protection mechanism and cause a
- denial of service (crash) or possibly execute arbitrary code via a
- crafted format string.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3480">CVE-2012-3480</a>
-
- <p>Multiple integer overflows in the strtod, strtof, strtold,
- strtod_l, and other related functions allow local users to cause a
- denial of service (application crash) and possibly execute
- arbitrary code via a long string, which triggers a stack-based
- buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4412">CVE-2012-4412</a>
-
- <p>Integer overflow in the strcoll and wcscoll functions allows
- context-dependent attackers to cause a denial of service (crash)
- or possibly execute arbitrary code via a long string, which
- triggers a heap-based buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4424">CVE-2012-4424</a>
-
- <p>Stack-based buffer overflow in the strcoll and wcscoll functions
- allows context-dependent attackers to cause a denial of service
- (crash) or possibly execute arbitrary code via a long string that
- triggers a malloc failure and use of the alloca function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-0242">CVE-2013-0242</a>
-
- <p>Buffer overflow in the extend_buffers function in the regular
- expression matcher allows context-dependent attackers to cause a
- denial of service (memory corruption and crash) via crafted
- multibyte characters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1914">CVE-2013-1914</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2013-4458">CVE-2013-4458</a>
-
- <p>Stack-based buffer overflow in the getaddrinfo function allows
- remote attackers to cause a denial of service (crash) via a
- hostname or IP address that triggers a large number of domain
- conversion results.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4237">CVE-2013-4237</a>
-
- <p>readdir_r allows context-dependent attackers to cause a denial of
- service (out-of-bounds write and crash) or possibly execute
- arbitrary code via a malicious NTFS image or CIFS service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4332">CVE-2013-4332</a>
-
- <p>Multiple integer overflows in malloc/malloc.c allow
- context-dependent attackers to cause a denial of service (heap
- corruption) via a large value to the pvalloc, valloc,
- posix_memalign, memalign, or aligned_alloc functions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4357">CVE-2013-4357</a>
-
- <p>The getaliasbyname, getaliasbyname_r, getaddrinfo, getservbyname,
- getservbyname_r, getservbyport, getservbyport_r, and glob
- functions do not properly limit stack allocation, which allows
- context-dependent attackers to cause a denial of service (crash)
- or possibly execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4788">CVE-2013-4788</a>
-
- <p>When the GNU C library is statically linked into an executable,
- the PTR_MANGLE implementation does not initialize the random value
- for the pointer guard, so that various hardening mechanisms are not
- effective.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7423">CVE-2013-7423</a>
-
- <p>The send_dg function in resolv/res_send.c does not properly reuse
- file descriptors, which allows remote attackers to send DNS
- queries to unintended locations via a large number of requests that
- trigger a call to the getaddrinfo function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7424">CVE-2013-7424</a>
-
- <p>The getaddrinfo function may attempt to free an invalid pointer
- when handling IDNs (Internationalised Domain Names), which allows
- remote attackers to cause a denial of service (crash) or possibly
- execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4043">CVE-2014-4043</a>
-
- <p>The posix_spawn_file_actions_addopen function does not copy its
- path argument in accordance with the POSIX specification, which
- allows context-dependent attackers to trigger use-after-free
- vulnerabilities.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed
-in version 2.11.3-4+deb6u5.</p>
-
-<p>For the stable distribution (wheezy), these problems were fixed in
-version 2.13-38+deb7u8 or earlier.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-165.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-166.data b/english/lts/security/2015/dla-166.data
deleted file mode 100644
index 0b2ee25243b..00000000000
--- a/english/lts/security/2015/dla-166.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-166-1 libarchive</define-tag>
-<define-tag report_date>2015-3-7</define-tag>
-<define-tag secrefs>not yet assigned Bug#778266</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-166.wml b/english/lts/security/2015/dla-166.wml
deleted file mode 100644
index 5aededb68a1..00000000000
--- a/english/lts/security/2015/dla-166.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alexander Cherepanov discovered that bsdcpio, an implementation of the
-<q>cpio</q> program part of the libarchive project, is susceptible to a
-directory traversal vulnerability via absolute paths.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libarchive version 2.8.4.forreal-1+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-166.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-167.data b/english/lts/security/2015/dla-167.data
deleted file mode 100644
index e9a1429a551..00000000000
--- a/english/lts/security/2015/dla-167.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-167-1 redcloth</define-tag>
-<define-tag report_date>2015-3-7</define-tag>
-<define-tag secrefs>CVE-2012-6684 Bug#774748</define-tag>
-<define-tag packages>redcloth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-167.wml b/english/lts/security/2015/dla-167.wml
deleted file mode 100644
index 55867fd6e94..00000000000
--- a/english/lts/security/2015/dla-167.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Kousuke Ebihara discovered that redcloth, a Ruby module used to
-convert Textile markup to HTML, did not properly sanitize its
-input. This allowed a remote attacker to perform a cross-site
-scripting attack by injecting arbitrary JavaScript code into the
-generated HTML.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in redcloth version 4.2.2-1.1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-167.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-168.data b/english/lts/security/2015/dla-168.data
deleted file mode 100644
index b5823742247..00000000000
--- a/english/lts/security/2015/dla-168.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-168-1 konversation</define-tag>
-<define-tag report_date>2015-3-7</define-tag>
-<define-tag secrefs>CVE-2014-8483 Bug#768191</define-tag>
-<define-tag packages>konversation</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-168.wml b/english/lts/security/2015/dla-168.wml
deleted file mode 100644
index bf2d3d1d250..00000000000
--- a/english/lts/security/2015/dla-168.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Konversation, an IRC client for KDE, could by
-crashed when receiving malformed messages using FiSH encryption.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in konversation version 1.3.1-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-168.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-169.data b/english/lts/security/2015/dla-169.data
deleted file mode 100644
index b7e7ef77d5f..00000000000
--- a/english/lts/security/2015/dla-169.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-169-1 axis</define-tag>
-<define-tag report_date>2015-3-10</define-tag>
-<define-tag secrefs>CVE-2012-5784 CVE-2014-3596 Bug#762444</define-tag>
-<define-tag packages>axis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-169.wml b/english/lts/security/2015/dla-169.wml
deleted file mode 100644
index 9d1d5658882..00000000000
--- a/english/lts/security/2015/dla-169.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>A vulnerability was fixed in axis, a SOAP implementation in Java:</p>
-
- <p>The getCN function in Apache Axis 1.4 and earlier does not properly verify
- that the server hostname matches a domain name in the subject's Common Name
- (CN) or subjectAltName field of the X.509 certificate, which allows
- man-in-the-middle attackers to spoof SSL servers via a certificate with a
- subject that specifies a common name in a field that is not the CN field.</p>
-
- <p>Thanks to Markus Koschany for providing the fixed package and David Jorm
- and Arun Neelicattu (Red Hat Product Security) for providing the patch.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in axis version 1.4-12+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-169.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-170.data b/english/lts/security/2015/dla-170.data
deleted file mode 100644
index ea2f00611f6..00000000000
--- a/english/lts/security/2015/dla-170.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-170-1 mod-gnutls</define-tag>
-<define-tag report_date>2015-3-14</define-tag>
-<define-tag secrefs>CVE-2015-2091 Bug#578663</define-tag>
-<define-tag packages>mod-gnutls</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-170.wml b/english/lts/security/2015/dla-170.wml
deleted file mode 100644
index 0182be0e0e7..00000000000
--- a/english/lts/security/2015/dla-170.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Thomas Klute discovered that in mod-gnutls, an Apache module providing
-SSL and TLS encryption with GnuTLS, a bug caused the server's client
-verify mode not to be considered at all, in case the directory's
-configuration was unset. Clients with invalid certificates were then
-able to leverage this flaw in order to get access to that directory.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mod-gnutls version 0.5.6-1+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-170.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-171.data b/english/lts/security/2015/dla-171.data
deleted file mode 100644
index 2a54a5495a1..00000000000
--- a/english/lts/security/2015/dla-171.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-171-1 libssh2</define-tag>
-<define-tag report_date>2015-3-14</define-tag>
-<define-tag secrefs>CVE-2015-1782 Bug#780249</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-171.wml b/english/lts/security/2015/dla-171.wml
deleted file mode 100644
index abd781dc9ae..00000000000
--- a/english/lts/security/2015/dla-171.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mariusz Ziulek reported that libssh2, a SSH2 client-side library, was
-reading and using the SSH_MSG_KEXINIT packet without doing sufficient
-range checks when negotiating a new SSH session with a remote server. A
-malicious attacker could man in the middle a real server and cause a
-client using the libssh2 library to crash (denial of service) or
-otherwise read and use unintended memory areas in this process.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libssh2 version 1.2.6-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-171.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-172.data b/english/lts/security/2015/dla-172.data
deleted file mode 100644
index ae2c41590b4..00000000000
--- a/english/lts/security/2015/dla-172.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-172-1 libextlib-ruby</define-tag>
-<define-tag report_date>2015-3-14</define-tag>
-<define-tag secrefs>CVE-2013-0156 Bug#697895</define-tag>
-<define-tag packages>libextlib-ruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-172.wml b/english/lts/security/2015/dla-172.wml
deleted file mode 100644
index 4e93e25ed63..00000000000
--- a/english/lts/security/2015/dla-172.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Import patches 633974b2759d9b92 and 4540e7102b803624 from uptream to
-remove symbol and YAML coercion from the XML parser.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libextlib-ruby version 0.9.13-2+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-172.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-173.data b/english/lts/security/2015/dla-173.data
deleted file mode 100644
index 46e880a8c8b..00000000000
--- a/english/lts/security/2015/dla-173.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-173-1 putty</define-tag>
-<define-tag report_date>2015-3-15</define-tag>
-<define-tag secrefs>CVE-2015-2157 Bug#779488</define-tag>
-<define-tag packages>putty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-173.wml b/english/lts/security/2015/dla-173.wml
deleted file mode 100644
index 3c25c3dacab..00000000000
--- a/english/lts/security/2015/dla-173.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>MATTA-2015-002</p>
-
- <p>Florent Daigniere discovered that PuTTY did not enforce an
- acceptable range for the Diffie-Hellman server value, as required by
- RFC 4253, potentially allowing an eavesdroppable connection to be
- established in the event of a server weakness.</p>
-
-<p>#779488,
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-2157">CVE-2015-2157</a></p>
-
- <p>Patrick Coleman discovered that PuTTY did not clear SSH-2 private
- key information from memory when loading and saving key files, which
- could result in disclosure of private key material.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in putty version 0.60+2010-02-20-1+squeeze3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-173.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-174.data b/english/lts/security/2015/dla-174.data
deleted file mode 100644
index e851b248830..00000000000
--- a/english/lts/security/2015/dla-174.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-174-1 tcpdump</define-tag>
-<define-tag report_date>2015-3-17</define-tag>
-<define-tag secrefs>CVE-2015-0261 CVE-2015-2154 CVE-2015-2155</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-174.wml b/english/lts/security/2015/dla-174.wml
deleted file mode 100644
index 2a6c591b745..00000000000
--- a/english/lts/security/2015/dla-174.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered with tcpdump in the way it
-handled some printer protocols. Those issues can lead to denial
-of service, or, potentially, execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0261">CVE-2015-0261</a>
-
- <p>Missing bounds checks in IPv6 Mobility printer</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2154">CVE-2015-2154</a>
-
- <p>Missing bounds checks in ISOCLNS printer</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2155">CVE-2015-2155</a>
-
- <p>Missing bounds checks in ForCES printer</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tcpdump version tcpdump_4.1.1-1+deb6u2</p>
-<p>Thanks to Romain Françoise who prepared this update.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-174.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-175.data b/english/lts/security/2015/dla-175.data
deleted file mode 100644
index 84b78d2b1e4..00000000000
--- a/english/lts/security/2015/dla-175.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-175-1 gnupg</define-tag>
-<define-tag report_date>2015-3-17</define-tag>
-<define-tag secrefs>CVE-2014-3591 CVE-2015-0837 CVE-2015-1606 Bug#778652</define-tag>
-<define-tag packages>gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-175.wml b/english/lts/security/2015/dla-175.wml
deleted file mode 100644
index ebff99de14b..00000000000
--- a/english/lts/security/2015/dla-175.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy Guard:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3591">CVE-2014-3591</a>
-
- <p>The Elgamal decryption routine was susceptible to a side-channel
- attack discovered by researchers of Tel Aviv University. Ciphertext
- blinding was enabled to counteract it. Note that this may have a quite
- noticeable impact on Elgamal decryption performance.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0837">CVE-2015-0837</a>
-
- <p>The modular exponentiation routine mpi_powm() was susceptible to a
- side-channel attack caused by data-dependent timing variations when
- accessing its internal pre-computed table.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1606">CVE-2015-1606</a>
-
- <p>The keyring parsing code did not properly reject certain packet types
- not belonging in a keyring, which caused an access to memory already
- freed. This could allow remote attackers to cause a denial of service
- (crash) via crafted keyring files.</p></li>
-
-</ul>
-
-<p>For the oldstable distribution (squeeze), those problems have been fixed in
-version 1.4.10-4+squeeze7.</p>
-
-<p>For the stable distribution (wheezy), these problems have been fixed in
-version 1.4.12-7+deb7u7.</p>
-
-<p>We recommend that you upgrade your gnupg packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-175.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-176.data b/english/lts/security/2015/dla-176.data
deleted file mode 100644
index 36cc65933d6..00000000000
--- a/english/lts/security/2015/dla-176.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-176-1 mono</define-tag>
-<define-tag report_date>2015-3-19</define-tag>
-<define-tag secrefs>CVE-2015-2318 CVE-2015-2319 CVE-2015-2320 Bug#780751</define-tag>
-<define-tag packages>mono</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-176.wml b/english/lts/security/2015/dla-176.wml
deleted file mode 100644
index 65de6cc5cf5..00000000000
--- a/english/lts/security/2015/dla-176.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three issues with Mono's TLS stack are addressed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2318">CVE-2015-2318</a>
-
- <p>Mono's implementation of the SSL/TLS stack failed to check
- the order of the handshake messages. Which would allow
- various attacks on the protocol to succeed. ("SKIP-TLS")</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2319">CVE-2015-2319</a>
-
- <p>Mono's implementation of SSL/TLS also contained support for
- the weak EXPORT cyphers and was susceptible to the FREAK attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2320">CVE-2015-2320</a>
-
- <p>Mono contained SSLv2 fallback code, which is no longer needed
- and can be considered insecure.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mono version 2.6.7-5.1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-176.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-177.data b/english/lts/security/2015/dla-177.data
deleted file mode 100644
index 8b11589851f..00000000000
--- a/english/lts/security/2015/dla-177.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-177-1 openssl</define-tag>
-<define-tag report_date>2015-3-20</define-tag>
-<define-tag secrefs>CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-177.wml b/english/lts/security/2015/dla-177.wml
deleted file mode 100644
index d2aeb7da299..00000000000
--- a/english/lts/security/2015/dla-177.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in OpenSSL, a Secure
-Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
-identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0209">CVE-2015-0209</a>
-
- <p>It was discovered that a malformed EC private key might result in
- memory corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0286">CVE-2015-0286</a>
-
- <p>Stephen Henson discovered that the ASN1_TYPE_cmp() function
- can be crashed, resulting in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0287">CVE-2015-0287</a>
-
- <p>Emilia Kaesper discovered a memory corruption in ASN.1 parsing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0288">CVE-2015-0288</a>
-
- <p>It was discovered that missing input sanitising in the
- X509_to_X509_REQ() function might result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0289">CVE-2015-0289</a>
-
- <p>Michal Zalewski discovered a NULL pointer dereference in the
- PKCS#7 parsing code, resulting in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0292">CVE-2015-0292</a>
-
- <p>It was discovered that missing input sanitising in base64 decoding
- might result in memory corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0293">CVE-2015-0293</a>
-
- <p>A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
- servers that both support SSLv2 and enable export cipher suites by sending
- a specially crafted SSLv2 CLIENT-MASTER-KEY message.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze20</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-177.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-178.data b/english/lts/security/2015/dla-178.data
deleted file mode 100644
index 1ed31cf5f0c..00000000000
--- a/english/lts/security/2015/dla-178.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-178-1 tor</define-tag>
-<define-tag report_date>2015-3-22</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-178.wml b/english/lts/security/2015/dla-178.wml
deleted file mode 100644
index 5fc82a28a67..00000000000
--- a/english/lts/security/2015/dla-178.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered and fixed in Tor, a connection-based
-low-latency anonymous communication system.</p>
-
- <p>o Jowr discovered that very high DNS query load on a relay could
- trigger an assertion error.</p>
-
- <p>o A relay could crash with an assertion error if a buffer of exactly
- the wrong layout was passed to buf_pullup() at exactly the wrong
- time.</p>
-
- <p>o When sending the address of the chosen rendezvous point to a hidden
- service clients were leaking to the hidden service they were on a
- little-endian or big-endian systems.</p>
-
-<p>Furthermore, this update disables support for SSLv3 in Tor. All
-versions of OpenSSL in use with Tor today support TLS 1.0 or later.</p>
-
-<p>Additionally, this release updates the geoIP database used by Tor as
-well as the list of directory authority servers, which Tor clients use
-to bootstrap and trust to sign the Tor directory consensus document.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tor version 0.2.4.26-1~deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-178.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-179.data b/english/lts/security/2015/dla-179.data
deleted file mode 100644
index 3967b026456..00000000000
--- a/english/lts/security/2015/dla-179.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-179-1 tzdata</define-tag>
-<define-tag report_date>2015-3-22</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-179.wml b/english/lts/security/2015/dla-179.wml
deleted file mode 100644
index acb4262b0bb..00000000000
--- a/english/lts/security/2015/dla-179.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 2015b.</p>
-
-<p>Changes since 2014h-0squeeze1 currently in squeeze-lts are the following:</p>
-
-<ul>
-<li>New leap second 2015-06-30 23:59:60 UTC.</li>
-<li>New DST for Mongolia.</li>
-<li>New DST for Palestine.</li>
-<li>New DST for Cancun (Mexico).</li>
-<li>New DST for Chile.</li>
-<li>New DST for Fiji.</li>
-<li>Timezone change for Turks &amp; Caicos.</li>
-<li>New timezone for Bougainville (Papua New Guinea).</li>
-<li>New timezone abbreviation for Belarus.</li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tzdata version 2015b-0squeeze1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-179.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-180.data b/english/lts/security/2015/dla-180.data
deleted file mode 100644
index 8f14b314812..00000000000
--- a/english/lts/security/2015/dla-180.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-180-1 gnutls26</define-tag>
-<define-tag report_date>2015-3-25</define-tag>
-<define-tag secrefs>CVE-2014-8155 CVE-2015-0282 CVE-2015-0294</define-tag>
-<define-tag packages>gnutls26</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-180.wml b/english/lts/security/2015/dla-180.wml
deleted file mode 100644
index 54f191268e3..00000000000
--- a/english/lts/security/2015/dla-180.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in GnuTLS, a library
-implementing the TLS and SSL protocols. The Common Vulnerabilities and
-Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8155">CVE-2014-8155</a>
-
- <p>Missing date/time checks on CA certificates</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0282">CVE-2015-0282</a>
-
- <p>GnuTLS does not verify the RSA PKCS #1 signature algorithm to match
- the signature algorithm in the certificate, leading to a potential
- downgrade to a disallowed algorithm without detecting it.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0294">CVE-2015-0294</a>
-
- <p>GnuTLS does not check whether the two signature algorithms match on
- certificate import.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gnutls26 version 2.8.6-1+squeeze5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-180.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-181.data b/english/lts/security/2015/dla-181.data
deleted file mode 100644
index 74b7fd616bb..00000000000
--- a/english/lts/security/2015/dla-181.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-181-1 xerces-c</define-tag>
-<define-tag report_date>2015-3-27</define-tag>
-<define-tag secrefs>CVE-2015-0252 Bug#780827</define-tag>
-<define-tag packages>xerces-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-181.wml b/english/lts/security/2015/dla-181.wml
deleted file mode 100644
index e24e5a6e414..00000000000
--- a/english/lts/security/2015/dla-181.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Anton Rager and Jonathan Brossard from the Salesforce.com Product
-Security Team and Ben Laurie of Google discovered a denial of service
-vulnerability in xerces-c, a validating XML parser library for C++. The
-parser mishandles certain kinds of malformed input documents, resulting
-in a segmentation fault during a parse operation. An unauthenticated
-attacker could use this flaw to cause an application using the
-xerces-c library to crash.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in xerces-c version 3.1.1-1+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-181.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-182.data b/english/lts/security/2015/dla-182.data
deleted file mode 100644
index fdc59bd5c51..00000000000
--- a/english/lts/security/2015/dla-182.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-182-1 batik</define-tag>
-<define-tag report_date>2015-3-27</define-tag>
-<define-tag secrefs>CVE-2015-0250 Bug#780897</define-tag>
-<define-tag packages>batik</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-182.wml b/english/lts/security/2015/dla-182.wml
deleted file mode 100644
index c7b4d6f688a..00000000000
--- a/english/lts/security/2015/dla-182.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nicolas Gregoire and Kevin Schaller discovered that Batik, a toolkit
-for processing SVG images, would load XML external entities by
-default. If a user or automated system were tricked into opening a
-specially crafted SVG file, an attacker could possibly obtain access
-to arbitrary files or cause resource consumption.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in batik version 1.7-6+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-182.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-183.data b/english/lts/security/2015/dla-183.data
deleted file mode 100644
index 30d50bfc2df..00000000000
--- a/english/lts/security/2015/dla-183.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-183-1 libxfont</define-tag>
-<define-tag report_date>2015-3-28</define-tag>
-<define-tag secrefs>CVE-2015-1802 CVE-2015-1803 CVE-2015-1804</define-tag>
-<define-tag packages>libxfont</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-183.wml b/english/lts/security/2015/dla-183.wml
deleted file mode 100644
index b2e5bf59ef5..00000000000
--- a/english/lts/security/2015/dla-183.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ilja van Sprundel, Alan Coopersmith and William Robinet discovered
-multiple issues in libxfont's code to process BDF fonts, which might
-result in privilege escalation.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxfont version 1:1.4.1-5+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-183.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-184.data b/english/lts/security/2015/dla-184.data
deleted file mode 100644
index 27247dc6f39..00000000000
--- a/english/lts/security/2015/dla-184.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-184-1 binutils</define-tag>
-<define-tag report_date>2015-3-28</define-tag>
-<define-tag secrefs>CVE-2014-8484 CVE-2014-8485 CVE-2014-8501 CVE-2014-8502 CVE-2014-8503 CVE-2014-8504 CVE-2014-8737 CVE-2014-8738</define-tag>
-<define-tag packages>binutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-184.wml b/english/lts/security/2015/dla-184.wml
deleted file mode 100644
index 1a861dfea39..00000000000
--- a/english/lts/security/2015/dla-184.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in binutils, a toolbox for
-binary file manipulation. These vulnerabilities include multiple memory
-safety errors, buffer overflows, use-after-frees and other implementation
-errors may lead to the execution of arbitrary code, the bypass of security
-restrictions, path traversal attack or denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in binutils version 2.20.1-16+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-184.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-185.data b/english/lts/security/2015/dla-185.data
deleted file mode 100644
index f8291001945..00000000000
--- a/english/lts/security/2015/dla-185.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-185-1 freetype</define-tag>
-<define-tag report_date>2015-4-01</define-tag>
-<define-tag secrefs>CVE-2014-9656 CVE-2014-9657 CVE-2014-9658 CVE-2014-9660 CVE-2014-9661 CVE-2014-9663 CVE-2014-9664 CVE-2014-9665 CVE-2014-9666 CVE-2014-9667 CVE-2014-9669 CVE-2014-9670 CVE-2014-9671 CVE-2014-9672 CVE-2014-9673 CVE-2014-9674 CVE-2014-9675 Bug#777656</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-185.wml b/english/lts/security/2015/dla-185.wml
deleted file mode 100644
index fa2619bff9f..00000000000
--- a/english/lts/security/2015/dla-185.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening
-malformed fonts may result in denial of service or the execution of
-arbitrary code.</p>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed
-in version 2.4.2-2.1+squeeze5.</p>
-
-<p>For the stable distribution (wheezy), these problems were fixed in
-version 2.4.9-1.1+deb7u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-185.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-186.data b/english/lts/security/2015/dla-186.data
deleted file mode 100644
index a5c5a3348e1..00000000000
--- a/english/lts/security/2015/dla-186.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-186-1 mailman</define-tag>
-<define-tag report_date>2015-4-6</define-tag>
-<define-tag secrefs>CVE-2015-2775 Bug#781626</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-186.wml b/english/lts/security/2015/dla-186.wml
deleted file mode 100644
index e1824b48e08..00000000000
--- a/english/lts/security/2015/dla-186.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A path traversal vulnerability was discovered in Mailman, the mailing
-list manager. Installations using a transport script (such as
-postfix-to-mailman.py) to interface with their MTA instead of static
-aliases were vulnerable to a path traversal attack. To successfully
-exploit this, an attacker needs write access on the local file system.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mailman version 1:2.1.13-6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-186.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-187.data b/english/lts/security/2015/dla-187.data
deleted file mode 100644
index 584348dc8d1..00000000000
--- a/english/lts/security/2015/dla-187.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-187-1 tor</define-tag>
-<define-tag report_date>2015-4-7</define-tag>
-<define-tag secrefs>CVE-2015-2928 CVE-2015-2929</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-187.wml b/english/lts/security/2015/dla-187.wml
deleted file mode 100644
index 3a08b9a6936..00000000000
--- a/english/lts/security/2015/dla-187.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several hidden service related denial-of-service issues have been
-discovered in Tor, a connection-based low-latency anonymous
-communication system.</p>
-
-<p><q>disgleirio</q> discovered that a malicious client could trigger an
- assertion failure in a Tor instance providing a hidden service, thus
- rendering the service inaccessible.
- [<a href="https://security-tracker.debian.org/tracker/CVE-2015-2928">CVE-2015-2928</a>]</p>
-
-<p><q>DonnchaC</q> discovered that Tor clients would crash with an assertion
- failure upon parsing specially crafted hidden service descriptors.
- [<a href="https://security-tracker.debian.org/tracker/CVE-2015-2929">CVE-2015-2929</a>]</p>
-
-<p>Introduction points would accept multiple INTRODUCE1 cells on one
- circuit, making it inexpensive for an attacker to overload a hidden
- service with introductions. Introduction points no longer allow
- multiple such cells on the same circuit.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-187.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-188.data b/english/lts/security/2015/dla-188.data
deleted file mode 100644
index 4d72ce3c3d0..00000000000
--- a/english/lts/security/2015/dla-188.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-188-1 arj</define-tag>
-<define-tag report_date>2015-4-8</define-tag>
-<define-tag secrefs>CVE-2015-0556 CVE-2015-0557 CVE-2015-2782 Bug#774015 Bug#774434 Bug#774435</define-tag>
-<define-tag packages>arj</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-188.wml b/english/lts/security/2015/dla-188.wml
deleted file mode 100644
index 77a96bc3144..00000000000
--- a/english/lts/security/2015/dla-188.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in arj, an open source
-version of the arj archiver. The Common Vulnerabilities and Exposures
-project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0556">CVE-2015-0556</a>
-
- <p>Jakub Wilk discovered that arj follows symlinks created during
- unpacking of an arj archive. A remote attacker could use this flaw
- to perform a directory traversal attack if a user or automated
- system were tricked into processing a specially crafted arj archive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0557">CVE-2015-0557</a>
-
- <p>Jakub Wilk discovered that arj does not sufficiently protect from
- directory traversal while unpacking an arj archive containing file
- paths with multiple leading slashes. A remote attacker could use
- this flaw to write to arbitrary files if a user or automated system
- were tricked into processing a specially crafted arj archive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2782">CVE-2015-2782</a>
-
- <p>Jakub Wilk and Guillem Jover discovered a buffer overflow
- vulnerability in arj. A remote attacker could use this flaw to cause
- an application crash or, possibly, execute arbitrary code with the
- privileges of the user running arj.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-188.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-189.data b/english/lts/security/2015/dla-189.data
deleted file mode 100644
index 0d45951d901..00000000000
--- a/english/lts/security/2015/dla-189.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-189-1 libgd2</define-tag>
-<define-tag report_date>2015-4-8</define-tag>
-<define-tag secrefs>CVE-2014-2497 CVE-2014-9709 Bug#744719</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-189.wml b/english/lts/security/2015/dla-189.wml
deleted file mode 100644
index 969214dee12..00000000000
--- a/english/lts/security/2015/dla-189.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in libgd2, a graphics library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2497">CVE-2014-2497</a>
-
- <p>The gdImageCreateFromXpm() function would try to dereference a NULL
- pointer when reading an XPM file with a special color table. This
- could allow remote attackers to cause a denial of service (crash) via
- crafted XPM files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9709">CVE-2014-9709</a>
-
- <p>Importing an invalid GIF file using the gdImageCreateFromGif() function
- would cause a read buffer overflow that could allow remote attackers to
- cause a denial of service (crash) via crafted GIF files.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-189.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-190.data b/english/lts/security/2015/dla-190.data
deleted file mode 100644
index 222d02730f2..00000000000
--- a/english/lts/security/2015/dla-190.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-190-1 libgcrypt11</define-tag>
-<define-tag report_date>2015-4-9</define-tag>
-<define-tag secrefs>CVE-2014-3591 CVE-2015-0837</define-tag>
-<define-tag packages>libgcrypt11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-190.wml b/english/lts/security/2015/dla-190.wml
deleted file mode 100644
index 3f37a86d99b..00000000000
--- a/english/lts/security/2015/dla-190.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in libgcrypt:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3591">CVE-2014-3591</a>
-
- <p>The Elgamal decryption routine was susceptible to a side-channel
- attack discovered by researchers of Tel Aviv University. Ciphertext
- blinding was enabled to counteract it. Note that this may have a
- quite noticeable impact on Elgamal decryption performance.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0837">CVE-2015-0837</a>
-
- <p>The modular exponentiation routine mpi_powm() was susceptible to a
- side-channel attack caused by data-dependent timing variations when
- accessing its internal pre-computed table.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-190.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-191.data b/english/lts/security/2015/dla-191.data
deleted file mode 100644
index 51fe0950891..00000000000
--- a/english/lts/security/2015/dla-191.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-191-1 checkpw</define-tag>
-<define-tag report_date>2015-4-9</define-tag>
-<define-tag secrefs>CVE-2015-0885</define-tag>
-<define-tag packages>checkpw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-191.wml b/english/lts/security/2015/dla-191.wml
deleted file mode 100644
index 98e4b232f72..00000000000
--- a/english/lts/security/2015/dla-191.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hiroya Ito of GMO Pepabo, Inc. reported that checkpw, a password
-authentication program, has a flaw in processing account names which
-contain double dashes. A remote attacker can use this flaw to cause a
-denial of service (infinite loop).</p>
-
-<p>Thanks to Markus Koschany who prepared the Debian package.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-191.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-192.data b/english/lts/security/2015/dla-192.data
deleted file mode 100644
index 4eac05f9232..00000000000
--- a/english/lts/security/2015/dla-192.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-192-1 ntp</define-tag>
-<define-tag report_date>2015-4-10</define-tag>
-<define-tag secrefs>CVE-2015-1798 CVE-2015-1799 Bug##782095</define-tag>
-<define-tag packages>ntp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-192.wml b/english/lts/security/2015/dla-192.wml
deleted file mode 100644
index ab5d14319f1..00000000000
--- a/english/lts/security/2015/dla-192.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1798">CVE-2015-1798</a>
-
- <p>When ntpd is configured to use a symmetric key to authenticate a remote NTP
- server/peer, it checks if the NTP message authentication code (MAC) in received
- packets is valid, but not if there actually is any MAC included. Packets without
- a MAC are accepted as if they had a valid MAC. This allows a MITM attacker to
- send false packets that are accepted by the client/peer without having to know
- the symmetric key. The attacker needs to know the transmit timestamp of the
- client to match it in the forged reply and the false reply needs to reach the
- client before the genuine reply from the server. The attacker doesn't
- necessarily need to be relaying the packets between the client and the server.</p>
-
- <p>Authentication using autokey doesn't have this problem as there is a check that
- requires the key ID to be larger than NTP_MAXKEY, which fails for packets
- without a MAC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1799">CVE-2015-1799</a>
-
- <p>An attacker knowing that NTP hosts A and B are peering with each other
- (symmetric association) can send a packet to host A with source address of B
- which will set the NTP state variables on A to the values sent by the attacker.
- Host A will then send on its next poll to B a packet with originate timestamp
- that doesn't match the transmit timestamp of B and the packet will be dropped.
- If the attacker does this periodically for both hosts, they won't be able to
- synchronize to each other. This is a known denial-of-service attack, described
- at <a href="https://www.eecis.udel.edu/~mills/onwire.html">https://www.eecis.udel.edu/~mills/onwire.html</a> .</p>
-
- <p>According to the document the NTP authentication is supposed to protect
- symmetric associations against this attack, but that doesn't seem to be the
- case. The state variables are updated even when authentication fails and the
- peers are sending packets with originate timestamps that don't match the
- transmit timestamps on the receiving side.</p>
-
-<p>ntp-keygen on big endian hosts</p>
-
- <p>Using ntp-keygen to generate an MD5 key on big endian hosts resulted in
- either an infite loop or an key of only 93 possible keys.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-192.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-193.data b/english/lts/security/2015/dla-193.data
deleted file mode 100644
index 22ea0c40f2a..00000000000
--- a/english/lts/security/2015/dla-193.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-193-1 chrony</define-tag>
-<define-tag report_date>2015-4-12</define-tag>
-<define-tag secrefs>CVE-2015-1821 CVE-2015-1822 CVE-2015-1853 Bug#782160</define-tag>
-<define-tag packages>chrony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-193.wml b/english/lts/security/2015/dla-193.wml
deleted file mode 100644
index 6841aab4057..00000000000
--- a/english/lts/security/2015/dla-193.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1853">CVE-2015-1853</a>
-
- <p>Protect authenticated symmetric NTP associations against DoS attacks.</p>
-
- <p>An attacker knowing that NTP hosts A and B are peering with each other
- (symmetric association) can send a packet with random timestamps to host
- A with source address of B which will set the NTP state variables on A
- to the values sent by the attacker. Host A will then send on its next
- poll to B a packet with originate timestamp that doesn't match the
- transmit timestamp of B and the packet will be dropped. If the attacker
- does this periodically for both hosts, they won't be able to synchronize
- to each other. It is a denial-of-service attack.</p>
-
- <p>According to <a href="https://www.eecis.udel.edu/~mills/onwire.html">https://www.eecis.udel.edu/~mills/onwire.html</a>, NTP authentication is supposed to protect symmetric
- associations against this attack, but in the NTPv3 (RFC 1305) and NTPv4
- (RFC 5905) specifications the state variables are updated before the
- authentication check is performed, which means the association is
- vulnerable to the attack even when authentication is enabled.</p>
-
- <p>To fix this problem, save the originate and local timestamps only when
- the authentication check (test5) passed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1821">CVE-2015-1821</a>
-
- <p>Fix access configuration with subnet size indivisible by 4.</p>
-
- <p>When NTP or cmdmon access was configured (from chrony.conf or via
- authenticated cmdmon) with a subnet size that is indivisible by 4 and
- an address that has nonzero bits in the 4-bit subnet remainder (e.g.
- 192.168.15.0/22 or f000::/3), the new setting was written to an
- incorrect location, possibly outside the allocated array.</p>
-
- <p>An attacker that has the command key and is allowed to access cmdmon
- (only localhost is allowed by default) could exploit this to crash
- chronyd or possibly execute arbitrary code with the privileges of the
- chronyd process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1822">CVE-2015-1822</a>
-
- <p>Fix initialization of reply slots for authenticated commands.</p>
-
- <p>When allocating memory to save unacknowledged replies to authenticated
- command requests, the last <q>next</q> pointer was not initialized to NULL.
- When all allocated reply slots were used, the next reply could be
- written to an invalid memory instead of allocating a new slot for it.</p>
-
- <p>An attacker that has the command key and is allowed to access cmdmon
- (only localhost is allowed by default) could exploit this to crash
- chronyd or possibly execute arbitrary code with the privileges of the
- chronyd process.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-193.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-194.data b/english/lts/security/2015/dla-194.data
deleted file mode 100644
index b039f7bc891..00000000000
--- a/english/lts/security/2015/dla-194.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-194-1 das-watchdog</define-tag>
-<define-tag report_date>2015-4-12</define-tag>
-<define-tag secrefs>CVE-2015-2831 Bug#781806</define-tag>
-<define-tag packages>das-watchdog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-194.wml b/english/lts/security/2015/dla-194.wml
deleted file mode 100644
index 6130d1cef17..00000000000
--- a/english/lts/security/2015/dla-194.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Adam Sampson discovered a buffer overflow in the handling of the
-XAUTHORITY environment variable in das-watchdog, a watchdog daemon to
-ensure a realtime process won't hang the machine. A local user can
-exploit this flaw to escalate his privileges and execute arbitrary
-code as root.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-194.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-195.data b/english/lts/security/2015/dla-195.data
deleted file mode 100644
index 82ee4c82928..00000000000
--- a/english/lts/security/2015/dla-195.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-195-1 libtasn1-3</define-tag>
-<define-tag report_date>2015-4-12</define-tag>
-<define-tag secrefs>CVE-2015-2806</define-tag>
-<define-tag packages>libtasn1-3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-195.wml b/english/lts/security/2015/dla-195.wml
deleted file mode 100644
index aa8012b3a47..00000000000
--- a/english/lts/security/2015/dla-195.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hanno Boeck discovered a stack-based buffer overflow in the
-asn1_der_decoding function in Libtasn1, a library to manage ASN.1
-structures. A remote attacker could take advantage of this flaw to cause
-an application using the Libtasn1 library to crash, or potentially to
-execute arbitrary code.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-195.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-196.data b/english/lts/security/2015/dla-196.data
deleted file mode 100644
index bd2fa0d0fa9..00000000000
--- a/english/lts/security/2015/dla-196.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-196-1 ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag report_date>2015-4-13</define-tag>
-<define-tag packages>ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-196.wml b/english/lts/security/2015/dla-196.wml
deleted file mode 100644
index 720c8d7755e..00000000000
--- a/english/lts/security/2015/dla-196.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs and ia32-libs-gtk packages contain 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the previous update of ia32-libs and
-ia32-libs-gtk in Squeeze LTS.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-196.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-197.data b/english/lts/security/2015/dla-197.data
deleted file mode 100644
index 0cac48d79de..00000000000
--- a/english/lts/security/2015/dla-197.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-197-1 libvncserver</define-tag>
-<define-tag report_date>2015-4-14</define-tag>
-<define-tag secrefs>CVE-2014-6051 CVE-2014-6052 CVE-2014-6053 CVE-2014-6054 CVE-2014-6055 Bug#762745</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-197.wml b/english/lts/security/2015/dla-197.wml
deleted file mode 100644
index fe94aae06f6..00000000000
--- a/english/lts/security/2015/dla-197.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in libvncserver, a library to
-implement VNC server functionality. These vulnerabilities might result in
-the execution of arbitrary code or denial of service in both the client
-and the server side.</p>
-
-<p>For the oldstable distribution (squeeze), these problems have been fixed in
-version 0.9.7-2+deb6u1.</p>
-
-<p>This update has been prepared by Nguyen Cong.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-197.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-198.data b/english/lts/security/2015/dla-198.data
deleted file mode 100644
index 15e5e114ade..00000000000
--- a/english/lts/security/2015/dla-198.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-198-1 wireshark</define-tag>
-<define-tag report_date>2015-4-22</define-tag>
-<define-tag secrefs>CVE-2015-2191 CVE-2015-2188 CVE-2015-0564 CVE-2015-0562 CVE-2014-8714 CVE-2014-8713 CVE-2014-8712 CVE-2014-8711 CVE-2014-8710 CVE-2014-6432 CVE-2014-6431 CVE-2014-6430 CVE-2014-6429 CVE-2014-6428 CVE-2014-6423 CVE-2014-6422</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-198.wml b/english/lts/security/2015/dla-198.wml
deleted file mode 100644
index c4eada9fef6..00000000000
--- a/english/lts/security/2015/dla-198.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities were discovered in the Squeeze's Wireshark
-version:</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2188">CVE-2015-2188</a> The WCP dissector could crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0564">CVE-2015-0564</a> Wireshark could crash while decypting TLS/SSL sessions</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0562">CVE-2015-0562</a> The DEC DNA Routing Protocol dissector could crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8714">CVE-2014-8714</a> TN5250 infinite loops</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8713">CVE-2014-8713</a> NCP crashes</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8712">CVE-2014-8712</a> NCP crashes</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8711">CVE-2014-8711</a> AMQP crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8710">CVE-2014-8710</a> SigComp UDVM buffer overflow</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6432">CVE-2014-6432</a> Sniffer file parser crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6431">CVE-2014-6431</a> Sniffer file parser crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6430">CVE-2014-6430</a> Sniffer file parser crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6429">CVE-2014-6429</a> Sniffer file parser crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6428">CVE-2014-6428</a> SES dissector crash</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6423">CVE-2014-6423</a> MEGACO dissector infinite loop</li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6422">CVE-2014-6422</a> RTP dissector crash</li>
-</ul>
-
-<p>Since back-porting upstream patches to 1.2.11-6+squeeze15 did not fix
-all the outstanding issues and some issues are not even tracked publicly
-the LTS Team decided to sync squeeze-lts's wireshark package with
-wheezy-security to provide the best possible security support.</p>
-
-<p>Note that upgrading Wireshark from 1.2.x to 1.8.x introduces
-several backward-incompatible changes in package structure, shared
-library API/ABI, availability of dissectors and in syntax of command
-line parameters.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-198.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-199.data b/english/lts/security/2015/dla-199.data
deleted file mode 100644
index b7b694c43fe..00000000000
--- a/english/lts/security/2015/dla-199.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-199-1 libx11</define-tag>
-<define-tag report_date>2015-4-14</define-tag>
-<define-tag secrefs>CVE-2013-7439</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-199.wml b/english/lts/security/2015/dla-199.wml
deleted file mode 100644
index e0c1bc7d67e..00000000000
--- a/english/lts/security/2015/dla-199.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Abhishek Arya discovered a buffer overflow in the MakeBigReq macro
-provided by libx11, which could result in denial of service or the
-execution of arbitrary code.</p>
-
-<p>Several other xorg packages (e.g. libxrender) will be recompiled against
-the fixed package after the release of this update. For detailed
-information on the status of recompiled packages please refer to the
-Debian Security Tracker at
-<a href="https://security-tracker.debian.org/tracker/CVE-2013-7439">CVE-2013-7439</a></p>
-
-<p>For the oldstable distribution (squeeze), this problem has been fixed
-in version 2:1.3.3-4+squeeze2.</p>
-
-<p>For the stable distribution (wheezy), this problem has been fixed in
-version 2:1.5.0-1+deb7u2.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-199.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-200.data b/english/lts/security/2015/dla-200.data
deleted file mode 100644
index 56c48d9a765..00000000000
--- a/english/lts/security/2015/dla-200.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-200-1 ruby1.9.1</define-tag>
-<define-tag report_date>2015-4-15</define-tag>
-<define-tag secrefs>CVE-2014-4975 CVE-2014-8080 CVE-2014-8090</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-200.wml b/english/lts/security/2015/dla-200.wml
deleted file mode 100644
index 25ba2eaa74e..00000000000
--- a/english/lts/security/2015/dla-200.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4975">CVE-2014-4975</a>
-
- <p>The encodes() function in pack.c had an off-by-one error that could
- lead to a stack-based buffer overflow. This could allow remote
- attackers to cause a denial of service (crash) or arbitrary code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2014-8090">CVE-2014-8090</a>
-
- <p>The REXML parser could be coerced into allocating large string
- objects that could consume all available memory on the system. This
- could allow remote attackers to cause a denial of service (crash).</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-200.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-201.data b/english/lts/security/2015/dla-201.data
deleted file mode 100644
index 9a59daae7d8..00000000000
--- a/english/lts/security/2015/dla-201.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-201-1 tzdata</define-tag>
-<define-tag report_date>2015-4-16</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-201.wml b/english/lts/security/2015/dla-201.wml
deleted file mode 100644
index e5b8372433d..00000000000
--- a/english/lts/security/2015/dla-201.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 2015c, fixing the DST rule for Egypt.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tzdata version 2015c-0+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-201.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-202.data b/english/lts/security/2015/dla-202.data
deleted file mode 100644
index ddbd420673c..00000000000
--- a/english/lts/security/2015/dla-202.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-202-1 wesnoth-1.8</define-tag>
-<define-tag report_date>2015-4-17</define-tag>
-<define-tag secrefs>CVE-2015-0844</define-tag>
-<define-tag packages>wesnoth-1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-202.wml b/english/lts/security/2015/dla-202.wml
deleted file mode 100644
index b21aa9f0df5..00000000000
--- a/english/lts/security/2015/dla-202.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ignacio R. Morelle discovered that missing path restrictions in the
-<q>Battle of Wesnoth</q> game could result in the disclosure of arbitrary
-files in the user's home directory if malicious campaigns/maps are
-loaded.</p>
-
-<p>For the oldstable distribution (squeeze), this problem has been
-fixed in version 1:1.8.5-1+deb6u1. See <a href="./dsa-3218">DSA-3218-1</a> for the versions of
-the other releases.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-202.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-203.data b/english/lts/security/2015/dla-203.data
deleted file mode 100644
index 28b3cea1605..00000000000
--- a/english/lts/security/2015/dla-203.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-203-1 openldap</define-tag>
-<define-tag report_date>2015-4-18</define-tag>
-<define-tag secrefs>CVE-2012-1164 CVE-2013-4449 CVE-2014-9713 CVE-2015-1545 Bug#663644 Bug#729367 Bug#761406 Bug#776988</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-203.wml b/english/lts/security/2015/dla-203.wml
deleted file mode 100644
index 08e0d21c5a1..00000000000
--- a/english/lts/security/2015/dla-203.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in OpenLDAP, a free implementation
-of the Lightweight Directory Access Protocol.</p>
-
-<p>Please carefully check whether you are affected by <a href="https://security-tracker.debian.org/tracker/CVE-2014-9713">CVE-2014-9713</a>: if you
-are, you will need to manually upgrade your configuration! See below for
-more details on this. Just upgrading the packages might not be enough!</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1164">CVE-2012-1164</a>
-
- <p>Fix a crash when doing an attrsOnly search of a database configured
- with both the rwm and translucent overlays.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4449">CVE-2013-4449</a>
-
- <p>Michael Vishchers from Seven Principles AG discovered a denial of
- service vulnerability in slapd, the directory server implementation.
- When the server is configured to used the RWM overlay, an attacker
- can make it crash by unbinding just after connecting, because of an
- issue with reference counting.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9713">CVE-2014-9713</a>
-
- <p>The default Debian configuration of the directory database allows
- every users to edit their own attributes. When LDAP directories are
- used for access control, and this is done using user attributes, an
- authenticated user can leverage this to gain access to unauthorized
- resources.</p>
-
- <p>Please note this is a Debian specific vulnerability.</p>
-
- <p>The new package won't use the unsafe access control rule for new
- databases, but existing configurations won't be automatically
- modified. Administrators are incited to look at the README.Debian
- file provided by the updated package if they need to fix the access
- control rule.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1545">CVE-2015-1545</a>
-
- <p>Ryan Tandy discovered a denial of service vulnerability in slapd.
- When using the deref overlay, providing an empty attribute list in
- a query makes the daemon crashes.</p></li>
-
-</ul>
-
-<p>Thanks to Ryan Tandy for preparing this update.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-203.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-204.data b/english/lts/security/2015/dla-204.data
deleted file mode 100644
index 3139295e75d..00000000000
--- a/english/lts/security/2015/dla-204.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-204-1 file</define-tag>
-<define-tag report_date>2015-4-19</define-tag>
-<define-tag secrefs>CVE-2014-9653 Bug#777585</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-204.wml b/english/lts/security/2015/dla-204.wml
deleted file mode 100644
index f39d34834b2..00000000000
--- a/english/lts/security/2015/dla-204.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the following issue in the file package:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9653">CVE-2014-9653</a>
-
- <p>readelf.c does not consider that pread calls sometimes read only
- a subset of the available data, which allows remote attackers to
- cause a denial of service (uninitialized memory access) or
- possibly have unspecified other impact via a crafted ELF file.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-204.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-205.data b/english/lts/security/2015/dla-205.data
deleted file mode 100644
index 73e082e354f..00000000000
--- a/english/lts/security/2015/dla-205.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-205-1 ppp</define-tag>
-<define-tag report_date>2015-4-19</define-tag>
-<define-tag secrefs>CVE-2015-3310 Bug#782450</define-tag>
-<define-tag packages>ppp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-205.wml b/english/lts/security/2015/dla-205.wml
deleted file mode 100644
index f5101e38f60..00000000000
--- a/english/lts/security/2015/dla-205.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Emanuele Rocca discovered that ppp, a daemon implementing the
-Point-to-Point Protocol, was subject to a buffer overflow when
-communicating with a RADIUS server. This would allow unauthenticated
-users to cause a denial-of-service by crashing the daemon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-205.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-206.data b/english/lts/security/2015/dla-206.data
deleted file mode 100644
index 8c77e8345de..00000000000
--- a/english/lts/security/2015/dla-206.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-206-1 python-django-markupfield</define-tag>
-<define-tag report_date>2015-4-20</define-tag>
-<define-tag secrefs>CVE-2015-0846</define-tag>
-<define-tag packages>python-django-markupfield</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-206.wml b/english/lts/security/2015/dla-206.wml
deleted file mode 100644
index fe2a019e511..00000000000
--- a/english/lts/security/2015/dla-206.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>James P. Turk discovered that the ReST renderer in django-markupfield,
-a custom Django field for easy use of markup in text fields, didn't
-disable the ..raw directive, allowing remote attackers to include
-arbitrary files.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-206.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-207.data b/english/lts/security/2015/dla-207.data
deleted file mode 100644
index 63286824565..00000000000
--- a/english/lts/security/2015/dla-207.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-207-1 subversion</define-tag>
-<define-tag report_date>2015-4-24</define-tag>
-<define-tag secrefs>CVE-2013-1845 CVE-2013-1846 CVE-2013-1847 CVE-2013-1849 CVE-2014-0032 CVE-2015-0248 CVE-2015-0251 Bug#704940 Bug#737815</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-207.wml b/english/lts/security/2015/dla-207.wml
deleted file mode 100644
index 887bf0efb05..00000000000
--- a/english/lts/security/2015/dla-207.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Subversion, a version control
-system. The Common Vulnerabilities and Exposures project identifies the
-following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0248">CVE-2015-0248</a>
-
- <p>Subversion mod_dav_svn and svnserve were vulnerable to a remotely
- triggerable assertion DoS vulnerability for certain requests with
- dynamically evaluated revision numbers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0251">CVE-2015-0251</a>
-
- <p>Subversion HTTP servers allow spoofing svn:author property values for
- new revisions via specially crafted v1 HTTP protocol request
- sequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1845">CVE-2013-1845</a>
-
- <p>Subversion mod_dav_svn was vulnerable to a denial of service attack
- through a remotely triggered memory exhaustion.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1846">CVE-2013-1846</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1847">CVE-2013-1847</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1849">CVE-2013-1849</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-0032">CVE-2014-0032</a>
-
- <p>Subversion mod_dav_svn was vulnerable to multiple remotely triggered
- crashes.</p></li>
-
-</ul>
-
-<p>This update has been prepared by James McCoy.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-207.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-208.data b/english/lts/security/2015/dla-208.data
deleted file mode 100644
index b45e79ac6e1..00000000000
--- a/english/lts/security/2015/dla-208.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-208-1 tzdata</define-tag>
-<define-tag report_date>2015-4-28</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-208.wml b/english/lts/security/2015/dla-208.wml
deleted file mode 100644
index 1f13a236e9a..00000000000
--- a/english/lts/security/2015/dla-208.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 2015d, removing the DST rule for Egypt
-starting in 2015.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tzdata version 2015d-0+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-208.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-209.data b/english/lts/security/2015/dla-209.data
deleted file mode 100644
index 76837fd4751..00000000000
--- a/english/lts/security/2015/dla-209.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-209-1 jruby</define-tag>
-<define-tag report_date>2015-4-29</define-tag>
-<define-tag secrefs>CVE-2011-4838 Bug#686867</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-209.wml b/english/lts/security/2015/dla-209.wml
deleted file mode 100644
index 7642377f596..00000000000
--- a/english/lts/security/2015/dla-209.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>JRuby before 1.6.5.1 computes hash values without restricting the ability to
-trigger hash collisions predictably, which allows context-dependent attackers
-to cause a denial of service (CPU consumption) via crafted input to an
-application that maintains a hash table. Note: This update includes
-corrections to the original fix for later Debian releases to avoid the issues
-identified in <a href="https://security-tracker.debian.org/tracker/CVE-2012-5370">CVE-2012-5370</a>.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-209.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-210.data b/english/lts/security/2015/dla-210.data
deleted file mode 100644
index c77b9c9d664..00000000000
--- a/english/lts/security/2015/dla-210.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-210-1 qt4-x11</define-tag>
-<define-tag report_date>2015-4-30</define-tag>
-<define-tag secrefs>CVE-2013-0254 CVE-2015-0295 CVE-2015-1858 CVE-2015-1859 CVE-2015-1860 Bug#779550 Bug#783133</define-tag>
-<define-tag packages>qt4-x11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-210.wml b/english/lts/security/2015/dla-210.wml
deleted file mode 100644
index 004bdd48ec8..00000000000
--- a/english/lts/security/2015/dla-210.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes multiple security issues in the Qt library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-0254">CVE-2013-0254</a>
-
- <p>The QSharedMemory class uses weak permissions (world-readable and
- world-writable) for shared memory segments, which allows local users
- to read sensitive information or modify critical program data, as
- demonstrated by reading a pixmap being sent to an X server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0295">CVE-2015-0295</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-1858">CVE-2015-1858</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-1859">CVE-2015-1859</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-1860">CVE-2015-1860</a>
-
- <p>Denial of service (via segmentation faults) through crafted
- images (BMP, GIF, ICO).</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-210.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-211.data b/english/lts/security/2015/dla-211.data
deleted file mode 100644
index d45f459413a..00000000000
--- a/english/lts/security/2015/dla-211.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-211-1 curl</define-tag>
-<define-tag report_date>2015-4-29</define-tag>
-<define-tag secrefs>CVE-2015-3143 CVE-2015-3148</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-211.wml b/english/lts/security/2015/dla-211.wml
deleted file mode 100644
index c8e1349993d..00000000000
--- a/english/lts/security/2015/dla-211.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in cURL, an URL transfer library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3143">CVE-2015-3143</a>
-
- <p>NTLM-authenticated connections could be wrongly reused for requests
- without any credentials set, leading to HTTP requests being sent
- over the connection authenticated as a different user. This is
- similar to the issue fixed in DSA-2849-1.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3148">CVE-2015-3148</a>
-
- <p>When doing HTTP requests using the Negotiate authentication method
- along with NTLM, the connection used would not be marked as
- authenticated, making it possible to reuse it and send requests for
- one user over the connection authenticated as a different user.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-211.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-212.data b/english/lts/security/2015/dla-212.data
deleted file mode 100644
index 79c42c31f66..00000000000
--- a/english/lts/security/2015/dla-212.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-212-1 php5</define-tag>
-<define-tag report_date>2015-4-29</define-tag>
-<define-tag secrefs>CVE-2014-9705 CVE-2015-0232 CVE-2015-2301 CVE-2015-2331 CVE-2015-2783 CVE-2015-2787 CVE-2015-3329 CVE-2015-3330</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-212.wml b/english/lts/security/2015/dla-212.wml
deleted file mode 100644
index 063d3a32a12..00000000000
--- a/english/lts/security/2015/dla-212.wml
+++ /dev/null
@@ -1,70 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9705">CVE-2014-9705</a>
-
- <p>Heap-based buffer overflow in the enchant_broker_request_dict
- function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x
- before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers
- to execute arbitrary code via vectors that trigger creation of
- multiple dictionaries.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0232">CVE-2015-0232</a>
-
- <p>The exif_process_unicode function in ext/exif/exif.c in PHP
- before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5
- allows remote attackers to execute arbitrary code or cause a
- denial of service (uninitialized pointer free and application
- crash) via crafted EXIF data in a JPEG image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2301">CVE-2015-2301</a>
-
- <p>Use-after-free vulnerability in the phar_rename_archive function
- in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6
- allows remote attackers to cause a denial of service or possibly
- have unspecified other impact via vectors that trigger an attempted
- renaming of a Phar archive to the name of an existing file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2331">CVE-2015-2331</a>
-
- <p>Integer overflow in the _zip_cdir_new function in zip_dirent.c
- in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP
- before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and
- other products, allows remote attackers to cause a denial of
- service (application crash) or possibly execute arbitrary code
- via a ZIP archive that contains many entries, leading to a
- heap-based buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2783">CVE-2015-2783</a>
-
- <p>Buffer Over-read in unserialize when parsing Phar</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2787">CVE-2015-2787</a>
-
- <p>Use-after-free vulnerability in the process_nested_data function
- in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x
- before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to
- execute arbitrary code via a crafted unserialize call that
- leverages use of the unset function within an __wakeup function,
- a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2015-0231">CVE-2015-0231</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3329">CVE-2015-3329</a>
-
- <p>Buffer Overflow when parsing tar/zip/phar in phar_set_inode</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3330">CVE-2015-3330</a>
-
- <p>PHP potential remote code execution with apache 2.4 apache2handler</p>
-
-<li>CVE-2015-temp-68819
-
- <p>Denial of service when processing a crafted file with Fileinfo</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-212.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-213.data b/english/lts/security/2015/dla-213.data
deleted file mode 100644
index 4694be76390..00000000000
--- a/english/lts/security/2015/dla-213.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-213-1 openjdk-6</define-tag>
-<define-tag report_date>2015-4-30</define-tag>
-<define-tag secrefs>CVE-2015-0460 CVE-2015-0469 CVE-2015-0470 CVE-2015-0477 CVE-2015-0478 CVE-2015-0480 CVE-2015-0488</define-tag>
-<define-tag packages>openjdk-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-213.wml b/english/lts/security/2015/dla-213.wml
deleted file mode 100644
index b62ab5fc8b4..00000000000
--- a/english/lts/security/2015/dla-213.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in the execution
-of arbitrary code, breakouts of the Java sandbox, information
-disclosure or denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-6b35-1.13.7-1~deb6u1.</p>
-
-<p>We recommend that you upgrade your openjdk-6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-213.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-214.data b/english/lts/security/2015/dla-214.data
deleted file mode 100644
index 9288548e204..00000000000
--- a/english/lts/security/2015/dla-214.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-214-1 libxml-libxml-perl</define-tag>
-<define-tag report_date>2015-4-30</define-tag>
-<define-tag secrefs>CVE-2015-3451 Bug#783443</define-tag>
-<define-tag packages>libxml-libxml-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-214.wml b/english/lts/security/2015/dla-214.wml
deleted file mode 100644
index 1a4c1b01373..00000000000
--- a/english/lts/security/2015/dla-214.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In some cases, XML::LibXML did not respect the request to disable entities
-expansion. Applications handling untrusted XML files can then be tricked
-into disclosing the content of local files.</p>
-
-<p>In Debian 6 <q>Squeeze</q>, this issue has been fixed in libxml-libxml-perl
-version 1.70.ds-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-214.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-215.data b/english/lts/security/2015/dla-215.data
deleted file mode 100644
index 3c7643a0dbf..00000000000
--- a/english/lts/security/2015/dla-215.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-215-1 libjson-ruby</define-tag>
-<define-tag report_date>2015-4-30</define-tag>
-<define-tag secrefs>CVE-2013-0269</define-tag>
-<define-tag packages>libjson-ruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-215.wml b/english/lts/security/2015/dla-215.wml
deleted file mode 100644
index e6a6f408d98..00000000000
--- a/english/lts/security/2015/dla-215.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The JSON gem for Ruby allowed remote attackers to cause a denial of
-service (resource consumption) or bypass the mass assignment protection
-mechanism via a crafted JSON document that triggers the creation of
-arbitrary Ruby symbols or certain internal objects, as demonstrated by
-conducting a SQL injection attack against Ruby on Rails, aka "Unsafe
-Object Creation Vulnerability."</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in libjson-ruby
-version 1.1.9-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-215.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-216.data b/english/lts/security/2015/dla-216.data
deleted file mode 100644
index 4eeb442e4dd..00000000000
--- a/english/lts/security/2015/dla-216.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-216-1 squid</define-tag>
-<define-tag report_date>2015-5-1</define-tag>
-<define-tag secrefs>CVE-2014-3609</define-tag>
-<define-tag packages>squid</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-216.wml b/english/lts/security/2015/dla-216.wml
deleted file mode 100644
index 9e9e6fb6346..00000000000
--- a/english/lts/security/2015/dla-216.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3609">CVE-2014-3609</a>
-
-<p>Denial of Service in Range header processing.</p>
-
-<p>Ignore Range headers with unidentifiable byte-range values. If squid is
-unable to determine the byte value for ranges, treat the header as
-invalid.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-216.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-217.data b/english/lts/security/2015/dla-217.data
deleted file mode 100644
index b93dea1c0f6..00000000000
--- a/english/lts/security/2015/dla-217.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-217-1 xdg-utils</define-tag>
-<define-tag report_date>2015-5-1</define-tag>
-<define-tag secrefs>CVE-2014-9622 CVE-2015-1877</define-tag>
-<define-tag packages>xdg-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-217.wml b/english/lts/security/2015/dla-217.wml
deleted file mode 100644
index 9526771e080..00000000000
--- a/english/lts/security/2015/dla-217.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The two below CVE issues have recently been fixed in Debian squeeze-lts:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9622">CVE-2014-9622</a>
-
- <p>John Houwer discovered a way to cause xdg-open, a tool that automatically
- opens URLs in a user's preferred application, to execute arbitrary
- commands remotely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1877">CVE-2015-1877</a>
-
- <p>Jiri Horner discovered a way to cause xdg-open, a tool that automatically
- opens URLs in a user's preferred application, to execute arbitrary
- commands remotely.</p>
-
- <p>This problem only affects /bin/sh implementations that don't sanitize
- local variables. Dash, which is the default /bin/sh in Debian is
- affected. Bash as /bin/sh is known to be unaffected.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-217.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-218.data b/english/lts/security/2015/dla-218.data
deleted file mode 100644
index b05dacda0e0..00000000000
--- a/english/lts/security/2015/dla-218.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-218-1 xorg-server</define-tag>
-<define-tag report_date>2015-5-1</define-tag>
-<define-tag secrefs>CVE-2015-0255</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-218.wml b/english/lts/security/2015/dla-218.wml
deleted file mode 100644
index 03842a3370d..00000000000
--- a/english/lts/security/2015/dla-218.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Olivier Fourdan discovered that missing input validation in the Xserver's
-handling of XkbSetGeometry requests may result in an information leak or
-denial of service.</p>
-
-<p>This upload to Debian squeeze-lts fixes the issue by not swapping
-XkbSetGeometry data in the input buffer any more and checking strings'
-length against request size.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-218.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-219.data b/english/lts/security/2015/dla-219.data
deleted file mode 100644
index 88aecf2808c..00000000000
--- a/english/lts/security/2015/dla-219.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-219-1 icu</define-tag>
-<define-tag report_date>2015-5-14</define-tag>
-<define-tag secrefs>CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2419 CVE-2014-6585 CVE-2014-6591 CVE-2014-7923 CVE-2014-7926 CVE-2014-7940 CVE-2014-9654</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-219.wml b/english/lts/security/2015/dla-219.wml
deleted file mode 100644
index becac580c8d..00000000000
--- a/english/lts/security/2015/dla-219.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the International Components
-for Unicode (ICU) library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1569">CVE-2013-1569</a>
-
- <p>Glyph table issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2383">CVE-2013-2383</a>
-
- <p>Glyph table issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2384">CVE-2013-2384</a>
-
- <p>Font layout issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2419">CVE-2013-2419</a>
-
- <p>Font processing issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6585">CVE-2014-6585</a>
-
- <p>Out-of-bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6591">CVE-2014-6591</a>
-
- <p>Additional out-of-bounds reads.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7923">CVE-2014-7923</a>
-
- <p>Memory corruption in regular expression comparison.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7926">CVE-2014-7926</a>
-
- <p>Memory corruption in regular expression comparison.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7940">CVE-2014-7940</a>
-
- <p>Uninitialized memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9654">CVE-2014-9654</a>
-
- <p>More regular expression flaws.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in icu version
-4.4.1-8+squeeze3.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-219.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-220.data b/english/lts/security/2015/dla-220.data
deleted file mode 100644
index e9a07eff8d1..00000000000
--- a/english/lts/security/2015/dla-220.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-220-1 dpkg</define-tag>
-<define-tag report_date>2015-5-15</define-tag>
-<define-tag secrefs>CVE-2015-0840 Bug#617923 Bug#695919</define-tag>
-<define-tag packages>dpkg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-220.wml b/english/lts/security/2015/dla-220.wml
deleted file mode 100644
index 7d1934748b8..00000000000
--- a/english/lts/security/2015/dla-220.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn discovered that the source package integrity verification in
-dpkg-source can be bypassed via a specially crafted Debian source
-control file (.dsc). Note that this flaw only affects extraction of
-local Debian source packages via dpkg-source but not the installation of
-packages from the Debian archive.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 1.15.12. This also fixes a similar bug discovered
-by Ansgar Burchardt and a bug in the same area discovered by Roger
-Leigh.</p>
-
-<p>For the oldstable distribution (wheezy), this problem was fixed in
-version 1.16.16.</p>
-
-<p>The stable distribution (jessie) was not affected by this problem as
-it was fixed before release.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-220.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-221.data b/english/lts/security/2015/dla-221.data
deleted file mode 100644
index 4b96f678ae3..00000000000
--- a/english/lts/security/2015/dla-221.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-221-1 tiff</define-tag>
-<define-tag report_date>2015-5-16</define-tag>
-<define-tag secrefs>CVE-2014-8128 CVE-2014-8129 CVE-2014-9330 CVE-2014-9655 Bug#773987</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-221.wml b/english/lts/security/2015/dla-221.wml
deleted file mode 100644
index e778aae7dd5..00000000000
--- a/english/lts/security/2015/dla-221.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the LibTIFF library
-and utilities for the Tag Image File Format. These could lead to a
-denial of service, information disclosure or privilege escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8128">CVE-2014-8128</a>
-
- <p>William Robinet discovered that out-of-bounds writes are triggered
- in several of the LibTIFF utilities when processing crafted TIFF
- files. Other applications using LibTIFF are also likely to be
- affected in the same way.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8129">CVE-2014-8129</a>
-
- <p>William Robinet discovered that out-of-bounds reads and writes are
- triggered in tiff2pdf when processing crafted TIFF files. Other
- applications using LibTIFF are also likely to be affected in the same
- way.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9330">CVE-2014-9330</a>
-
- <p>Paris Zoumpouloglou discovered that out-of-bounds reads and writes are
- triggered in bmp2tiff when processing crafted BMP files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9655">CVE-2014-9655</a>
-
- <p>Michal Zalewski discovered that out-of-bounds reads and writes are
- triggered in LibTIFF when processing crafted TIFF files.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 3.9.4-5+squeeze12.</p>
-
-<p>For the oldstable distribution (wheezy), these problems will be fixed
-soon.</p>
-
-<p>The stable distribution (jessie) was not affected by these problems as
-they were fixed before release.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-221.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-222.data b/english/lts/security/2015/dla-222.data
deleted file mode 100644
index 14ab4927956..00000000000
--- a/english/lts/security/2015/dla-222.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-222-1 commons-httpclient</define-tag>
-<define-tag report_date>2015-5-19</define-tag>
-<define-tag secrefs>CVE-2012-5783 CVE-2012-6153 CVE-2014-3577</define-tag>
-<define-tag packages>commons-httpclient</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-222.wml b/english/lts/security/2015/dla-222.wml
deleted file mode 100644
index 478a7861ca8..00000000000
--- a/english/lts/security/2015/dla-222.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-5783">CVE-2012-5783</a>
-
-<p>and <a href="https://security-tracker.debian.org/tracker/CVE-2012-6153">CVE-2012-6153</a>
- Apache Commons HttpClient 3.1 did not verify that the server hostname
- matches a domain name in the subject's Common Name (CN) or subjectAltName
- field of the X.509 certificate, which allows man-in-the-middle attackers to
- spoof SSL servers via an arbitrary valid certificate.
- Thanks to Alberto Fernandez Martinez for the patch.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3577">CVE-2014-3577</a>
-
- <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2012-6153">CVE-2012-6153</a> was incomplete: the code added
- to check that the server hostname matches the domain name in a subject's
- Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle
- attacker could use this flaw to spoof an SSL server using a specially
- crafted X.509 certificate. The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2012-6153">CVE-2012-6153</a> was intended to address
- the incomplete patch for <a href="https://security-tracker.debian.org/tracker/CVE-2012-5783">CVE-2012-5783</a>. The issue is now completely resolved
- by applying this patch and the one for the previous CVEs</p></li>
-
-</ul>
-
-<p>This upload was prepared by Markus Koschany.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-222.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-223.data b/english/lts/security/2015/dla-223.data
deleted file mode 100644
index 15a9bc14bd0..00000000000
--- a/english/lts/security/2015/dla-223.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-223-1 nbd</define-tag>
-<define-tag report_date>2015-5-17</define-tag>
-<define-tag secrefs>CVE-2015-0847 Bug#784657</define-tag>
-<define-tag packages>nbd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-223.wml b/english/lts/security/2015/dla-223.wml
deleted file mode 100644
index f29912de770..00000000000
--- a/english/lts/security/2015/dla-223.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been discovered in nbd-server, the server for the
-Linux Network Block Device.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0847">CVE-2015-0847</a>
-
- <p>Tuomas Räsänen discovered that unsafe signal handling is present in
- nbd-server. This vulnerability could be exploited by a remote client
- to cause a denial of service.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 1:2.9.16-8+squeeze2.</p>
-
-<p>For the oldstable, stable, and testing distributions, these problems
-will be fixed soon.</p>
-
-<p>We recommend that you upgrade your nbd-server packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-223.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-224.data b/english/lts/security/2015/dla-224.data
deleted file mode 100644
index 25a8513c98a..00000000000
--- a/english/lts/security/2015/dla-224.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-224-1 ruby1.8</define-tag>
-<define-tag report_date>2015-5-18</define-tag>
-<define-tag secrefs>CVE-2015-1855</define-tag>
-<define-tag packages>ruby1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-224.wml b/english/lts/security/2015/dla-224.wml
deleted file mode 100644
index 10690cc3e1c..00000000000
--- a/english/lts/security/2015/dla-224.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Ruby OpenSSL extension, part of the
-interpreter for the Ruby language, did not properly implement hostname
-matching, in violation of RFC 6125. This could allow remote attackers to
-perform a man-in-the-middle attack via crafted SSL certificates.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 1.8.7.302-2squeeze4.</p>
-
-<p>For the oldstable distribution (wheezy), this problem was fixed in
-version 1.8.7.358-7.1+deb7u3.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-224.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-225.data b/english/lts/security/2015/dla-225.data
deleted file mode 100644
index e1cbed1749a..00000000000
--- a/english/lts/security/2015/dla-225.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-225-1 dnsmasq</define-tag>
-<define-tag report_date>2015-5-20</define-tag>
-<define-tag secrefs>CVE-2015-3294 Bug#783459</define-tag>
-<define-tag packages>dnsmasq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-225.wml b/english/lts/security/2015/dla-225.wml
deleted file mode 100644
index 995c619af32..00000000000
--- a/english/lts/security/2015/dla-225.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerability vulnerability was found in dnsmasq:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3294">CVE-2015-3294</a>
-
- <p>Remote attackers could read process memory and cause DoS via
- malformed DNS requests.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dnsmasq version
-2.55-2+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-225.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-226-2.data b/english/lts/security/2015/dla-226-2.data
deleted file mode 100644
index 23655159e0c..00000000000
--- a/english/lts/security/2015/dla-226-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-226-2 ntfs-3g</define-tag>
-<define-tag report_date>2015-5-26</define-tag>
-<define-tag secrefs>CVE-2015-3202</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-226-2.wml b/english/lts/security/2015/dla-226-2.wml
deleted file mode 100644
index 966e218c4e5..00000000000
--- a/english/lts/security/2015/dla-226-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The patch applied for ntfs-3g to fix <a href="https://security-tracker.debian.org/tracker/CVE-2015-3202">CVE-2015-3202</a> in DLA 226-1 was
-incomplete. This update corrects that problem. For reference the
-original advisory text follows.</p>
-
-<p>Tavis Ormandy discovered that NTFS-3G, a read-write NTFS driver for
-FUSE, does not scrub the environment before executing mount or umount
-with elevated privileges. A local user can take advantage of this flaw
-to overwrite arbitrary files and gain elevated privileges by accessing
-debugging features via the environment that would not normally be safe
-for unprivileged users.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ntfs-3g version 1:2010.3.6-1+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-226-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-226.data b/english/lts/security/2015/dla-226.data
deleted file mode 100644
index 0fd16093ff0..00000000000
--- a/english/lts/security/2015/dla-226.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-226-1 ntfs-3g</define-tag>
-<define-tag report_date>2015-5-25</define-tag>
-<define-tag secrefs>CVE-2015-3202</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-226.wml b/english/lts/security/2015/dla-226.wml
deleted file mode 100644
index 1b78afc1cde..00000000000
--- a/english/lts/security/2015/dla-226.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that NTFS-3G, a read-write NTFS driver for
-FUSE, does not scrub the environment before executing mount or umount
-with elevated privileges. A local user can take advantage of this flaw
-to overwrite arbitrary files and gain elevated privileges by accessing
-debugging features via the environment that would not normally be safe
-for unprivileged users.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-226.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-227.data b/english/lts/security/2015/dla-227.data
deleted file mode 100644
index 0bf8eff9746..00000000000
--- a/english/lts/security/2015/dla-227.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-227-1 postgresql-8.4</define-tag>
-<define-tag report_date>2015-5-29</define-tag>
-<define-tag secrefs>CVE-2015-3165 CVE-2015-3166 CVE-2015-3167</define-tag>
-<define-tag packages>postgresql-8.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-227.wml b/english/lts/security/2015/dla-227.wml
deleted file mode 100644
index a8d25745375..00000000000
--- a/english/lts/security/2015/dla-227.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in PostgreSQL, a relational
-database server system. The 8.4 branch is EOLed upstream, but still
-present in Debian squeeze. This new LTS minor version contains the
-fixes that were applied upstream to the 9.0.20 version, backported to
-8.4.22 which was the last version officially released by the PostgreSQL
-developers. This LTS effort for squeeze-lts is a community project
-sponsored by credativ GmbH.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3165">CVE-2015-3165</a>
-
-<p>Remote crash
-SSL clients disconnecting just before the authentication timeout expires
-can cause the server to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3166">CVE-2015-3166</a>
-
-<p>Information exposure
-The replacement implementation of snprintf() failed to check for errors
-reported by the underlying system library calls; the main case that
-might be missed is out-of-memory situations. In the worst case this
-might lead to information exposure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3167">CVE-2015-3167</a>
-
-<p>Possible side-channel key exposure
-In contrib/pgcrypto, some cases of decryption with an incorrect key
-could report other error message texts. Fix by using a one-size-fits-all
-message.</p>
-
-<p>Note that the next round of minor releases for PostgreSQL have already
-been scheduled for early June 2015. There will be a corresponding
-8.4.22lts3 update at the same time.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-227.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-228.data b/english/lts/security/2015/dla-228.data
deleted file mode 100644
index 18bd9306478..00000000000
--- a/english/lts/security/2015/dla-228.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-228-1 exactimage</define-tag>
-<define-tag report_date>2015-5-28</define-tag>
-<define-tag secrefs>CVE-2015-3885 Bug#786785</define-tag>
-<define-tag packages>exactimage</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-228.wml b/english/lts/security/2015/dla-228.wml
deleted file mode 100644
index 89cb110c592..00000000000
--- a/english/lts/security/2015/dla-228.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been discovered in the ExactImage image manipulation
-programs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3885">CVE-2015-3885</a>
-
- <p>Eduardo Castellanos discovered an Integer overflow in the dcraw version
- included in ExactImage. This vulnerability allows remote attackers to
- cause a denial of service (crash) via a crafted image.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been fixed in
-version 0.8.1-3+deb6u4.</p>
-
-<p>For the oldstable, stable, and testing distributions, these problems will be
-fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-228.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-229.data b/english/lts/security/2015/dla-229.data
deleted file mode 100644
index 67126e3caf4..00000000000
--- a/english/lts/security/2015/dla-229.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-229-1 libnokogiri-ruby</define-tag>
-<define-tag report_date>2015-5-27</define-tag>
-<define-tag secrefs>CVE-2012-6685</define-tag>
-<define-tag packages>libnokogiri-ruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-229.wml b/english/lts/security/2015/dla-229.wml
deleted file mode 100644
index 1389b4fd1bc..00000000000
--- a/english/lts/security/2015/dla-229.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An XML eXternal Entity (XXE) flaw was found in Nokogiri, a Ruby gem for
-parsing HTML, XML, and SAX. Using external XML entities, a remote attacker
-could specify a URL in a specially crafted XML that, when parsed, would
-cause a connection to that URL to be opened.</p>
-
-<p>This update enables the <q>nonet</q> option by default (and provides new
-methods to disable default options if needed).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-229.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-230.data b/english/lts/security/2015/dla-230.data
deleted file mode 100644
index 1061c094029..00000000000
--- a/english/lts/security/2015/dla-230.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-230-1 eglibc</define-tag>
-<define-tag report_date>2015-5-27</define-tag>
-<define-tag secrefs>CVE-2015-1781</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-230.wml b/english/lts/security/2015/dla-230.wml
deleted file mode 100644
index fe0ad61a26b..00000000000
--- a/english/lts/security/2015/dla-230.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Arjun Shankar of Red Hat discovered that gethostbyname_r and related
-functions compute the size of an input buffer incorrectly if the passed-in
-buffer is misaligned. This results in a buffer overflow.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 2.11.3-4+deb6u6.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-230.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-231.data b/english/lts/security/2015/dla-231.data
deleted file mode 100644
index 013205c12d4..00000000000
--- a/english/lts/security/2015/dla-231.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-231-1 dulwich</define-tag>
-<define-tag report_date>2015-5-27</define-tag>
-<define-tag secrefs>CVE-2015-0838</define-tag>
-<define-tag packages>dulwich</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-231.wml b/english/lts/security/2015/dla-231.wml
deleted file mode 100644
index 6f4c5c97d09..00000000000
--- a/english/lts/security/2015/dla-231.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ivan Fratric of the Google Security Team has found a buffer overflow in
-the C implementation of the apply_delta() function, used when accessing
-Git objects in pack files. An attacker could take advantage of this flaw
-to cause the execution of arbitrary code with the privileges of the user
-running a Git server or client based on Dulwich.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 0.6.1-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-231.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-232.data b/english/lts/security/2015/dla-232.data
deleted file mode 100644
index 065c41cf019..00000000000
--- a/english/lts/security/2015/dla-232.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-232-1 tomcat6</define-tag>
-<define-tag report_date>2015-5-28</define-tag>
-<define-tag secrefs>CVE-2014-0227 CVE-2014-0230 CVE-2014-7810 Bug#787010 Bug#785312 Bug#785316</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-232.wml b/english/lts/security/2015/dla-232.wml
deleted file mode 100644
index 298be8f573c..00000000000
--- a/english/lts/security/2015/dla-232.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities were found in Apache Tomcat 6:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0227">CVE-2014-0227</a>
-
- <p>The Tomcat security team identified that it was possible to conduct HTTP
- request smuggling attacks or cause a DoS by streaming malformed data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0230">CVE-2014-0230</a>
-
- <p>AntBean@secdig, from the Baidu Security Team, disclosed that it was
- possible to cause a limited DoS attack by feeding data by aborting an
- upload.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7810">CVE-2014-7810</a>
-
- <p>The Tomcat security team identified that malicious web applications could
- bypass the Security Manager by the use of expression language.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tomcat6 version
-6.0.41-2+squeeze7.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-232.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-233.data b/english/lts/security/2015/dla-233.data
deleted file mode 100644
index 0c51512713a..00000000000
--- a/english/lts/security/2015/dla-233.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-233-1 clamav</define-tag>
-<define-tag report_date>2015-5-28</define-tag>
-<define-tag secrefs>CVE-2014-9328 CVE-2015-1461 CVE-2015-1462 CVE-2015-1463 CVE-2015-2170 CVE-2015-2221 CVE-2015-2222 CVE-2015-2668</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-233.wml b/english/lts/security/2015/dla-233.wml
deleted file mode 100644
index 8c9ad81cc6b..00000000000
--- a/english/lts/security/2015/dla-233.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 0.98.7. This update updates sqeeze-lts to the
-latest upstream release in line with the approach used for other Debian
-releases.</p>
-
-<p>The changes are not strictly required for operation, but users of the previous
-version in Squeeze may not be able to make use of all current virus signatures
-and might get warnings.</p>
-
-<p>The bug fixes that are part of this release include security fixes related
-to packed or crypted files (<a href="https://security-tracker.debian.org/tracker/CVE-2014-9328">CVE-2014-9328</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-1461">CVE-2015-1461</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-1462">CVE-2015-1462</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-1463">CVE-2015-1463</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-2170">CVE-2015-2170</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-2221">CVE-2015-2221</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-2222">CVE-2015-2222</a>, and <a href="https://security-tracker.debian.org/tracker/CVE-2015-2668">CVE-2015-2668</a>)
-and several fixes to the embedded libmspack library, including a potential
-infinite loop in the Quantum decoder (<a href="https://security-tracker.debian.org/tracker/CVE-2014-9556">CVE-2014-9556</a>).</p>
-
-<p>If you use clamav, we strongly recommend that you upgrade to this version.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-233.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-234.data b/english/lts/security/2015/dla-234.data
deleted file mode 100644
index ace8ac88214..00000000000
--- a/english/lts/security/2015/dla-234.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-234-1 ipsec-tools</define-tag>
-<define-tag report_date>2015-5-30</define-tag>
-<define-tag secrefs>CVE-2015-4047 Bug#785778</define-tag>
-<define-tag packages>ipsec-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-234.wml b/english/lts/security/2015/dla-234.wml
deleted file mode 100644
index a76e6293e69..00000000000
--- a/english/lts/security/2015/dla-234.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Javantea discovered a NULL pointer dereference flaw in racoon, the
-Internet Key Exchange daemon of ipsec-tools. A remote attacker can use
-this flaw to cause the IKE daemon to crash via specially crafted UDP
-packets, resulting in a denial of service.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-234.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-235.data b/english/lts/security/2015/dla-235.data
deleted file mode 100644
index 8f9080b2bbf..00000000000
--- a/english/lts/security/2015/dla-235.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-235-1 ruby1.9.1</define-tag>
-<define-tag report_date>2015-5-30</define-tag>
-<define-tag secrefs>CVE-2011-0188 CVE-2011-2705 CVE-2012-4522 CVE-2013-0256 CVE-2013-2065 CVE-2015-1855</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-235.wml b/english/lts/security/2015/dla-235.wml
deleted file mode 100644
index 284eed84737..00000000000
--- a/english/lts/security/2015/dla-235.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0188">CVE-2011-0188</a>
-
- <p>The VpMemAlloc function in bigdecimal.c in the BigDecimal class in
- Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7
- and other platforms, does not properly allocate memory, which allows
- context-dependent attackers to execute arbitrary code or cause a
- denial of service (application crash) via vectors involving creation
- of a large BigDecimal value within a 64-bit process, related to an
- "integer truncation issue."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2705">CVE-2011-2705</a>
-
- <p>use upstream SVN r32050 to modify PRNG state to prevent random number
- sequence repeatation at forked child process which has same pid.
- Reported by Eric Wong.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4522">CVE-2012-4522</a>
-
- <p>The rb_get_path_check function in file.c in Ruby 1.9.3 before
- patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent
- attackers to create files in unexpected locations or with unexpected
- names via a NUL byte in a file path.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-0256">CVE-2013-0256</a>
-
- <p>darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before
- 4.0.0.preview2.1, as used in Ruby, does not properly generate
- documents, which allows remote attackers to conduct cross-site
- scripting (XSS) attacks via a crafted URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2065">CVE-2013-2065</a>
-
- <p>(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426,
- and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for
- native functions, which allows context-dependent attackers to bypass
- intended $SAFE level restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1855">CVE-2015-1855</a>
-
- <p>OpenSSL extension hostname matching implementation violates RFC 6125</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-235.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-236.data b/english/lts/security/2015/dla-236.data
deleted file mode 100644
index 22c6e30c29d..00000000000
--- a/english/lts/security/2015/dla-236.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-236-1 wordpress</define-tag>
-<define-tag report_date>2015-6-1</define-tag>
-<define-tag secrefs>CVE-2014-9031 CVE-2014-9033 CVE-2014-9034 CVE-2014-9035 CVE-2014-9036 CVE-2014-9037 CVE-2014-9038 CVE-2014-9039 CVE-2015-3438 CVE-2015-3439 CVE-2015-3440 Bug##783347 Bug##783554 Bug##770425</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-236.wml b/english/lts/security/2015/dla-236.wml
deleted file mode 100644
index 0a5a33309ff..00000000000
--- a/english/lts/security/2015/dla-236.wml
+++ /dev/null
@@ -1,87 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In the Debian squeeze-lts version of Wordpress, multiple security issues
-have been fixed:</p>
-
- <p>Remote attackers could...</p>
- <ul>
- <li> ... upload files with invalid or unsafe names</li>
- <li> ... mount social engineering attacks</li>
- <li> ... compromise a site via cross-site scripting</li>
- <li> ... inject SQL commands</li>
- <li> ... cause denial of service or information disclosure</li>
- </ul>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9031">CVE-2014-9031</a>
-
- <p>Jouko Pynnonen discovered an unauthenticated cross site scripting
- vulnerability (XSS) in wptexturize(), exploitable via comments or
- posts.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9033">CVE-2014-9033</a>
-
- <p>Cross site request forgery (CSRF) vulnerability in the password
- changing process, which could be used by an attacker to trick an user
- into changing her password.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9034">CVE-2014-9034</a>
-
- <p>Javier Nieto Arevalo and Andres Rojas Guerrero reported a potential
- denial of service in the way the phpass library is used to handle
- passwords, since no maximum password length was set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9035">CVE-2014-9035</a>
-
- <p>John Blackbourn reported an XSS in the <q>Press This</q> function (used
- for quick publishing using a browser <q>bookmarklet</q>).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9036">CVE-2014-9036</a>
-
- <p>Robert Chapin reported an XSS in the HTML filtering of CSS in posts.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9037">CVE-2014-9037</a>
-
- <p>David Anderson reported a hash comparison vulnerability for passwords
- stored using the old-style MD5 scheme. While unlikely, this could be
- exploited to compromise an account, if the user had not logged in
- after a Wordpress 2.5 update (uploaded to Debian on 2 Apr, 2008) and
- the password MD5 hash could be collided with due to PHP dynamic
- comparison.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9038">CVE-2014-9038</a>
-
- <p>Ben Bidner reported a server side request forgery (SSRF) in the core
- HTTP layer which unsufficiently blocked the loopback IP address
- space.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9039">CVE-2014-9039</a>
-
- <p>Momen Bassel, Tanoy Bose, and Bojan Slavkovic reported a
- vulnerability in the password reset process: an email address change
- would not invalidate a previous password reset email.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3438">CVE-2015-3438</a>
-
- <p>Cedric Van Bockhaven reported and Gary Pendergast, Mike Adams, and Andrew Nacin of the
- WordPress security team fixed a cross-site-scripting vulnerabilitity, which could enable anonymous users
- to compromise a site.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3439">CVE-2015-3439</a>
-
- <p>Jakub Zoczek discovered a very limited cross-site scripting
- vulnerability, that could be used as part of a social engineering
- attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3440">CVE-2015-3440</a>
-
- <p>Jouko Pynnönen discovered a cross-site scripting vulnerability,
- which could enable commenters to compromise a site.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-236.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-237.data b/english/lts/security/2015/dla-237.data
deleted file mode 100644
index 82cc37f229b..00000000000
--- a/english/lts/security/2015/dla-237.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-237-1 mercurial</define-tag>
-<define-tag report_date>2015-6-4</define-tag>
-<define-tag secrefs>CVE-2014-9390 CVE-2014-9462</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-237.wml b/english/lts/security/2015/dla-237.wml
deleted file mode 100644
index ccfb271636b..00000000000
--- a/english/lts/security/2015/dla-237.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9462">CVE-2014-9462</a>
-
- <p>Jesse Hertz of Matasano Security discovered that Mercurial, a
- distributed version control system, is prone to a command injection
- vulnerability via a crafted repository name in a clone command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9390">CVE-2014-9390</a>
-
- <p>There is a security vulnerability that affects mercurial repositories in a
- case-insensitive filesystem (eg. VFAT or HFS+). It allows for remote
- code execution of a specially crafted repository. This is less
- severe for the average Debian installation as they are usually set
- up with case-sensitive filesystems.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-237.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-238.data b/english/lts/security/2015/dla-238.data
deleted file mode 100644
index dfd0327c944..00000000000
--- a/english/lts/security/2015/dla-238.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-238-1 fuse</define-tag>
-<define-tag report_date>2015-6-07</define-tag>
-<define-tag secrefs>CVE-2015-3202 Bug##786439</define-tag>
-<define-tag packages>fuse</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-238.wml b/english/lts/security/2015/dla-238.wml
deleted file mode 100644
index 4869c10647d..00000000000
--- a/english/lts/security/2015/dla-238.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that FUSE, a Filesystem in USErspace, does not
-scrub the environment before executing mount or umount with elevated
-privileges. A local user can take advantage of this flaw to overwrite
-arbitrary files and gain elevated privileges by accessing debugging
-features via the environment that would not normally be safe for
-unprivileged users.</p>
-
-<p>For the old-oldstable distribution (squeeze-lts), this problem has been
-fixed in version 2.8.4-1.1+deb6u1.</p>
-
-<p>We recommend that you upgrade your fuse packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-238.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-239.data b/english/lts/security/2015/dla-239.data
deleted file mode 100644
index 0f935d5c88d..00000000000
--- a/english/lts/security/2015/dla-239.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-239-1 cups</define-tag>
-<define-tag report_date>2015-6-09</define-tag>
-<define-tag secrefs>CVE-2015-1158 CVE-2015-1159</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-239.wml b/english/lts/security/2015/dla-239.wml
deleted file mode 100644
index c57f099e769..00000000000
--- a/english/lts/security/2015/dla-239.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two critical vulnerabilities have been found in the CUPS printing
-system:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1158">CVE-2015-1158</a>
-
-<p>- Improper Update of Reference Count
- Cupsd uses reference-counted strings with global scope. When parsing
- a print job request, cupsd over-decrements the reference count for a
- string from the request. As a result, an attacker can prematurely
- free an arbitrary string of global scope. They can use this to
- dismantle ACL’s protecting privileged operations, and upload a
- replacement configuration file, and subsequently run arbitrary code
- on a target machine.</p>
-
- <p>This bug is exploitable in default configurations, and does not
- require any special permissions other than the basic ability to
- print.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1159">CVE-2015-1159</a>
-
-<p>- Cross-Site Scripting
- A cross-site scripting bug in the CUPS templating engine allows the
- above bug to be exploited when a user browses the web. This XSS is
- reachable in the default configuration for Linux instances of CUPS,
- and allows an attacker to bypass default configuration settings that
- bind the CUPS scheduler to the ‘localhost’ or loopback interface.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-239.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-240.data b/english/lts/security/2015/dla-240.data
deleted file mode 100644
index 1c52e90699f..00000000000
--- a/english/lts/security/2015/dla-240.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-240-1 libapache-mod-jk</define-tag>
-<define-tag report_date>2015-6-9</define-tag>
-<define-tag secrefs>CVE-2014-8111 Bug#783233</define-tag>
-<define-tag packages>libapache-mod-jk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-240.wml b/english/lts/security/2015/dla-240.wml
deleted file mode 100644
index 7683374d864..00000000000
--- a/english/lts/security/2015/dla-240.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An information disclosure flaw due to incorrect JkMount/JkUnmount
-directives processing was found in the Apache 2 module mod_jk to forward
-requests from the Apache web server to Tomcat. A JkUnmount rule for a subtree
-of a previous JkMount rule could be ignored. This could allow a remote attacker
-to potentially access a private artifact in a tree that would otherwise not be
-accessible to them.</p>
-
-<p>For the squeeze distribution, this problem has been fixed in version
-1:1.2.30-1squeeze2.</p>
-
-<p>We recommend that you upgrade your libapache-mod-jk packages.</p>
-
-<p>This update has been prepared by Markus Koschany.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-240.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-241.data b/english/lts/security/2015/dla-241.data
deleted file mode 100644
index 17effd8e7a9..00000000000
--- a/english/lts/security/2015/dla-241.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-241-1 wireshark</define-tag>
-<define-tag report_date>2015-6-10</define-tag>
-<define-tag secrefs>CVE-2015-3811</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-241.wml b/english/lts/security/2015/dla-241.wml
deleted file mode 100644
index 6cdae146006..00000000000
--- a/english/lts/security/2015/dla-241.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following vulnerabilities were discovered in the Squeeze LTS's
-prior Wireshark version:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3811">CVE-2015-3811</a>
-
-<p>The WCP dissector could crash while decompressing data.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-241.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-242.data b/english/lts/security/2015/dla-242.data
deleted file mode 100644
index fd9909a34a0..00000000000
--- a/english/lts/security/2015/dla-242.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-242-1 imagemagick</define-tag>
-<define-tag report_date>2015-6-11</define-tag>
-<define-tag secrefs>CVE-2012-3437 CVE-2014-8354 CVE-2014-8355 CVE-2014-8562 Bug##773834 Bug##767240 Bug##683285 Bug##692367</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-242.wml b/english/lts/security/2015/dla-242.wml
deleted file mode 100644
index 574f6d367c4..00000000000
--- a/english/lts/security/2015/dla-242.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a large number of potential security problems due to
-insufficient data validation when parsing different input
-formats. Most of those potential security problems do not have a CVE
-number assigned.</p>
-
-<p>While the security implications of all of these problems are not all
-fully known, it is highly recommended to update.</p>
-
-<p>The update fixes the following identified vulnerabilities:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3437">CVE-2012-3437</a>
-
- <p>Incorrect validation of PNG buffer size, leading to DoS using
-specially crafted PNG files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8354">CVE-2014-8354</a>
-
- <p>Out of bounds memory access in resize</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8355">CVE-2014-8355</a>
-
- <p>Buffer overflow in PCX reader</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8562">CVE-2014-8562</a>
-
- <p>Buffer overflow in DCM readers</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-242.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-243.data b/english/lts/security/2015/dla-243.data
deleted file mode 100644
index 31c480863f9..00000000000
--- a/english/lts/security/2015/dla-243.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-243-1 libraw</define-tag>
-<define-tag report_date>2015-6-10</define-tag>
-<define-tag secrefs>CVE-2015-3885 Bug#786788</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-243.wml b/english/lts/security/2015/dla-243.wml
deleted file mode 100644
index 4e14c58f01b..00000000000
--- a/english/lts/security/2015/dla-243.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>[This DLA supersedes my wrong announcement using DLA 241-1]</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3885">CVE-2015-3885</a>
-
- <p>Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier
- allows remote attackers to cause a denial of service (crash) via a
- crafted image, which triggers a buffer overflow, related to the len
- variable.</p></li>
-
-</ul>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-243.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-244.data b/english/lts/security/2015/dla-244.data
deleted file mode 100644
index b37f182b89d..00000000000
--- a/english/lts/security/2015/dla-244.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-244-1 strongswan</define-tag>
-<define-tag report_date>2015-6-12</define-tag>
-<define-tag secrefs>CVE-2015-4171</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-244.wml b/english/lts/security/2015/dla-244.wml
deleted file mode 100644
index e98538dad67..00000000000
--- a/english/lts/security/2015/dla-244.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec
-suite used to establish IPsec protected links.</p>
-
-<p>When a client authenticate the server with certificates and the client
-authenticates using pre-shared key or EAP, the constraints on the server
-certificate are only enforced by the client after all authentication
-steps are completed successfully. A rogue server which can authenticate
-using a valid certificate issued by any CA trusted by the client could
-trick the user into continuing the authentication, revealing the
-username and password digest (for EAP) or even the cleartext password
-(if EAP-GTC is accepted).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-244.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-245.data b/english/lts/security/2015/dla-245.data
deleted file mode 100644
index 734b2a41711..00000000000
--- a/english/lts/security/2015/dla-245.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-245-1 p7zip</define-tag>
-<define-tag report_date>2015-6-14</define-tag>
-<define-tag secrefs>CVE-2015-1038 Bug#774660</define-tag>
-<define-tag packages>p7zip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-245.wml b/english/lts/security/2015/dla-245.wml
deleted file mode 100644
index 81ba9828890..00000000000
--- a/english/lts/security/2015/dla-245.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alexander Cherepanov discovered that p7zip is susceptible to a
-directory traversal vulnerability. While extracting an archive, it
-will extract symlinks and then follow them if they are referenced in
-further entries. This can be exploited by a rogue archive to write
-files outside the current directory.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 9.04~dfsg.1-1+deb6u1.</p>
-
-<p>For the oldstable distribution (wheezy) and stable distribution
-(jessie), this problem will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-245.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-246-2.data b/english/lts/security/2015/dla-246-2.data
deleted file mode 100644
index 085a3e874c1..00000000000
--- a/english/lts/security/2015/dla-246-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-246-2 linux-2.6</define-tag>
-<define-tag report_date>2015-6-17</define-tag>
-<define-tag secrefs>CVE-2011-5321 CVE-2012-6689 CVE-2014-3184 CVE-2014-8159 CVE-2014-9683 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2015-1805 CVE-2015-2041 CVE-2015-2042 CVE-2015-2830 CVE-2015-2922 CVE-2015-3339 CVE-2015-4167 Bug#789037</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-246-2.wml b/english/lts/security/2015/dla-246-2.wml
deleted file mode 100644
index ab5f91dda9f..00000000000
--- a/english/lts/security/2015/dla-246-2.wml
+++ /dev/null
@@ -1,128 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The linux-2.6 update issued as DLA-246-1 caused regressions. This
-update corrects the defective patches applied in that update causing
-these problems. For reference the original advisory text follows.</p>
-
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-5321">CVE-2011-5321</a>
-
- <p>Jiri Slaby discovered that tty_driver_lookup_tty() may leak a
- reference to the tty driver. A local user could use this flaw
- to crash the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6689">CVE-2012-6689</a>
-
- <p>Pablo Neira Ayuso discovered that non-root user-space processes
- can send forged Netlink notifications to other processes. A local
- user could use this flaw for denial of service or privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3184">CVE-2014-3184</a>
-
- <p>Ben Hawkes discovered that various HID drivers may over-read the
- report descriptor buffer, possibly resulting in a crash if a HID
- with a crafted descriptor is plugged in.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8159">CVE-2014-8159</a>
-
- <p>It was found that the Linux kernel's InfiniBand/RDMA subsystem did
- not properly sanitize input parameters while registering memory
- regions from user space via the (u)verbs API. A local user with
- access to a /dev/infiniband/uverbsX device could use this flaw to
- crash the system or, potentially, escalate their privileges on the
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9683">CVE-2014-9683</a>
-
- <p>Dmitry Chernenkov discovered that eCryptfs writes past the end of
- the allocated buffer during encrypted filename decoding, resulting
- in local denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9728">CVE-2014-9728</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2014-9729">CVE-2014-9729</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2014-9730">CVE-2014-9730</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2014-9731">CVE-2014-9731</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167">CVE-2015-4167</a>
-
- <p>Carl Henrik Lunde discovered that the UDF implementation is
- missing several necessary length checks. A local user that can
- mount devices could use these various flaws to crash the system,
- to leak information from the kernel, or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a>
-
- <p>Red Hat discovered that the pipe iovec read and write
- implementations may iterate over the iovec twice but will modify
- the iovec such that the second iteration accesses the wrong
- memory. A local user could use this flaw to crash the system or
- possibly for privilege escalation. This may also result in data
- corruption and information leaks in pipes between non-malicious
- processes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2041">CVE-2015-2041</a>
-
- <p>Sasha Levin discovered that the LLC subsystem exposed some
- variables as sysctls with the wrong type. On a 64-bit kernel, this
- possibly allows privilege escalation from a process with
- CAP_NET_ADMIN capability; it also results in a trivial information
- leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2042">CVE-2015-2042</a>
-
- <p>Sasha Levin discovered that the RDS subsystem exposed some
- variables as sysctls with the wrong type. On a 64-bit kernel, this
- results in a trivial information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2830">CVE-2015-2830</a>
-
- <p>Andrew Lutomirski discovered that when a 64-bit task on an amd64
- kernel makes a fork(2) or clone(2) system call using int $0x80,
- the 32-bit compatibility flag is set (correctly) but is not
- cleared on return. As a result, both seccomp and audit will
- misinterpret the following system call by the task(s), possibly
- leading to a violation of security policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2922">CVE-2015-2922</a>
-
- <p>Modio AB discovered that the IPv6 subsystem would process a router
- advertisement that specifies no route but only a hop limit, which
- would then be applied to the interface that received it. This can
- result in loss of IPv6 connectivity beyond the local network.</p>
-
- <p>This may be mitigated by disabling processing of IPv6 router
- advertisements if they are not needed:<br>
- sysctl net.ipv6.conf.default.accept_ra=0<br>
- sysctl net.ipv6.conf.&lt;interface&gt;.accept_ra=0</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3339">CVE-2015-3339</a>
-
- <p>It was found that the execve(2) system call can race with inode
- attribute changes made by chown(2). Although chown(2) clears the
- setuid/setgid bits of a file if it changes the respective owner ID,
- this race condition could result in execve(2) setting effective
- uid/gid to the new owner ID, a privilege escalation.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze12.</p>
-
-<p>For the oldstable distribution (wheezy), these problems were fixed in
-linux version 3.2.68-1+deb7u1 or earlier, except for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a> and
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-4167">CVE-2015-4167</a> which will be fixed soon.</p>
-
-<p>For the stable distribution (jessie), these problems were fixed in
-linux version 3.16.7-ckt11-1 or earlier, except for <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167">CVE-2015-4167</a> which
-will be fixed later.</p>
-
-<p>We recommend that you upgrade your linux-2.6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-246-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-246.data b/english/lts/security/2015/dla-246.data
deleted file mode 100644
index 085a3e874c1..00000000000
--- a/english/lts/security/2015/dla-246.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-246-2 linux-2.6</define-tag>
-<define-tag report_date>2015-6-17</define-tag>
-<define-tag secrefs>CVE-2011-5321 CVE-2012-6689 CVE-2014-3184 CVE-2014-8159 CVE-2014-9683 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2015-1805 CVE-2015-2041 CVE-2015-2042 CVE-2015-2830 CVE-2015-2922 CVE-2015-3339 CVE-2015-4167 Bug#789037</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-246.wml b/english/lts/security/2015/dla-246.wml
deleted file mode 100644
index f1bf10d5d13..00000000000
--- a/english/lts/security/2015/dla-246.wml
+++ /dev/null
@@ -1,126 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The linux-2.6 update issued as DLA-246-1 caused regressions. This
-update corrects the defective patches applied in that update causing
-these problems. For reference the original advisory text follows.</p>
-
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-5321">CVE-2011-5321</a>
-
- <p>Jiri Slaby discovered that tty_driver_lookup_tty() may leak a
- reference to the tty driver. A local user could use this flaw
- to crash the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6689">CVE-2012-6689</a>
-
- <p>Pablo Neira Ayuso discovered that non-root user-space processes
- can send forged Netlink notifications to other processes. A local
- user could use this flaw for denial of service or privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3184">CVE-2014-3184</a>
-
- <p>Ben Hawkes discovered that various HID drivers may over-read the
- report descriptor buffer, possibly resulting in a crash if a HID
- with a crafted descriptor is plugged in.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8159">CVE-2014-8159</a>
-
- <p>It was found that the Linux kernel's InfiniBand/RDMA subsystem did
- not properly sanitize input parameters while registering memory
- regions from user space via the (u)verbs API. A local user with
- access to a /dev/infiniband/uverbsX device could use this flaw to
- crash the system or, potentially, escalate their privileges on the
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9683">CVE-2014-9683</a>
-
- <p>Dmitry Chernenkov discovered that eCryptfs writes past the end of
- the allocated buffer during encrypted filename decoding, resulting
- in local denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9728">CVE-2014-9728</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-9729">CVE-2014-9729</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-9730">CVE-2014-9730</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-9731">CVE-2014-9731</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167">CVE-2015-4167</a>
-
- <p>Carl Henrik Lunde discovered that the UDF implementation is
- missing several necessary length checks. A local user that can
- mount devices could use these various flaws to crash the system,
- to leak information from the kernel, or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a>
-
- <p>Red Hat discovered that the pipe iovec read and write
- implementations may iterate over the iovec twice but will modify
- the iovec such that the second iteration accesses the wrong
- memory. A local user could use this flaw to crash the system or
- possibly for privilege escalation. This may also result in data
- corruption and information leaks in pipes between non-malicious
- processes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2041">CVE-2015-2041</a>
-
- <p>Sasha Levin discovered that the LLC subsystem exposed some
- variables as sysctls with the wrong type. On a 64-bit kernel, this
- possibly allows privilege escalation from a process with
- CAP_NET_ADMIN capability; it also results in a trivial information
- leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2042">CVE-2015-2042</a>
-
- <p>Sasha Levin discovered that the RDS subsystem exposed some
- variables as sysctls with the wrong type. On a 64-bit kernel, this
- results in a trivial information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2830">CVE-2015-2830</a>
-
- <p>Andrew Lutomirski discovered that when a 64-bit task on an amd64
- kernel makes a fork(2) or clone(2) system call using int $0x80,
- the 32-bit compatibility flag is set (correctly) but is not
- cleared on return. As a result, both seccomp and audit will
- misinterpret the following system call by the task(s), possibly
- leading to a violation of security policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2922">CVE-2015-2922</a>
-
- <p>Modio AB discovered that the IPv6 subsystem would process a router
- advertisement that specifies no route but only a hop limit, which
- would then be applied to the interface that received it. This can
- result in loss of IPv6 connectivity beyond the local network.</p>
-
- <p>This may be mitigated by disabling processing of IPv6 router
- advertisements if they are not needed:</p>
-<pre>
- sysctl net.ipv6.conf.default.accept_ra=0
- sysctl net.ipv6.conf.&lt;interface&gt;.accept_ra=0
-</pre></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3339">CVE-2015-3339</a>
-
- <p>It was found that the execve(2) system call can race with inode
- attribute changes made by chown(2). Although chown(2) clears the
- setuid/setgid bits of a file if it changes the respective owner ID,
- this race condition could result in execve(2) setting effective
- uid/gid to the new owner ID, a privilege escalation.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze12.</p>
-
-<p>For the oldstable distribution (wheezy), these problems were fixed in
-linux version 3.2.68-1+deb7u1 or earlier, except for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a> and
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-4167">CVE-2015-4167</a> which will be fixed soon.</p>
-
-<p>For the stable distribution (jessie), these problems were fixed in
-linux version 3.16.7-ckt11-1 or earlier, except for <a href="https://security-tracker.debian.org/tracker/CVE-2015-4167">CVE-2015-4167</a> which
-will be fixed later.</p>
-
-<p>We recommend that you upgrade your linux-2.6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-246.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-247.data b/english/lts/security/2015/dla-247.data
deleted file mode 100644
index a9b9ae3ec8c..00000000000
--- a/english/lts/security/2015/dla-247.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-247-1 openssl</define-tag>
-<define-tag report_date>2015-6-17</define-tag>
-<define-tag secrefs>CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-4000</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-247.wml b/english/lts/security/2015/dla-247.wml
deleted file mode 100644
index 339b956c8ad..00000000000
--- a/english/lts/security/2015/dla-247.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets
-Layer toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8176">CVE-2014-8176</a>
-
- <p>Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered
- that an invalid memory free could be triggered when buffering DTLS
- data. This could allow remote attackers to cause a denial of service
- (crash) or potentially execute arbitrary code. This issue only
- affected the oldstable distribution (wheezy).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1789">CVE-2015-1789</a>
-
- <p>Robert Swiecki and Hanno Böck discovered that the X509_cmp_time
- function could read a few bytes out of bounds. This could allow remote
- attackers to cause a denial of service (crash) via crafted
- certificates and CRLs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1790">CVE-2015-1790</a>
-
- <p>Michal Zalewski discovered that the PKCS#7 parsing code did not
- properly handle missing content which could lead to a NULL pointer
- dereference. This could allow remote attackers to cause a denial of
- service (crash) via crafted ASN.1-encoded PKCS#7 blobs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1791">CVE-2015-1791</a>
-
- <p>Emilia Käsper discovered that a race condition could occur due to
- incorrect handling of NewSessionTicket in a multi-threaded client,
- leading to a double free. This could allow remote attackers to cause
- a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1792">CVE-2015-1792</a>
-
- <p>Johannes Bauer discovered that the CMS code could enter an infinite
- loop when verifying a signedData message, if presented with an
- unknown hash function OID. This could allow remote attackers to cause
- a denial of service.</p></li>
-
-</ul>
-
-<p>Additionally OpenSSL will now reject handshakes using DH parameters
-shorter than 768 bits as a countermeasure against the Logjam attack
-(<a href="https://security-tracker.debian.org/tracker/CVE-2015-4000">CVE-2015-4000</a>).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-247.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-248.data b/english/lts/security/2015/dla-248.data
deleted file mode 100644
index 20fc9275b21..00000000000
--- a/english/lts/security/2015/dla-248.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-248-1 qemu</define-tag>
-<define-tag report_date>2015-6-19</define-tag>
-<define-tag secrefs>CVE-2015-3456</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-248.wml b/english/lts/security/2015/dla-248.wml
deleted file mode 100644
index 367b25f235b..00000000000
--- a/english/lts/security/2015/dla-248.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in the qemu virtualisation solution:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456">CVE-2015-3456</a>
-
- <p>Jason Geffner discovered a buffer overflow in the emulated floppy
- disk drive, resulting in the potential execution of arbitrary code.</p>
-
-<p>Despite the end-of-life of qemu support in the old-oldstable
-distribution (squeeze-lts), this problem has been fixed in version
-0.12.5+dfsg-3squeeze4 of the qemu source package due to its severity
-(the so-called VENOM vulnerability).</p>
-
-<p>Further problems may still be present in the qemu package in the
-old-oldstable distribution (squeeze-lts) and users who need to rely on
-qemu are encouraged to upgrade to a newer version of Debian.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-248.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-249.data b/english/lts/security/2015/dla-249.data
deleted file mode 100644
index 29495a853a7..00000000000
--- a/english/lts/security/2015/dla-249.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-249-1 qemu-kvm</define-tag>
-<define-tag report_date>2015-6-19</define-tag>
-<define-tag secrefs>CVE-2015-3456</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-249.wml b/english/lts/security/2015/dla-249.wml
deleted file mode 100644
index 6505862971d..00000000000
--- a/english/lts/security/2015/dla-249.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in the qemu virtualisation solution:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456">CVE-2015-3456</a>
-
- <p>Jason Geffner discovered a buffer overflow in the emulated floppy
- disk drive, resulting in the potential execution of arbitrary code.</p>
-
-<p>Despite the end-of-life of qemu-kvm support in the old-oldstable
-distribution (squeeze-lts), this problem has been fixed in version
-0.12.5+dfsg-5+squeeze11 of the qemu-kvm source package due to its
-severity (the so-called VENOM vulnerability).</p>
-
-<p>Further problems may still be present in the qemu-kvm package in the
-old-oldstable distribution (squeeze-lts) and users who need to rely on
-qemu-kvm are encouraged to upgrade to a newer version of Debian.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-249.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-250.data b/english/lts/security/2015/dla-250.data
deleted file mode 100644
index 4ebdf25b470..00000000000
--- a/english/lts/security/2015/dla-250.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-250-1 libclamunrar</define-tag>
-<define-tag report_date>2015-6-19</define-tag>
-<define-tag secrefs>Bug#770647</define-tag>
-<define-tag packages>libclamunrar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-250.wml b/english/lts/security/2015/dla-250.wml
deleted file mode 100644
index 8254b5be9b5..00000000000
--- a/english/lts/security/2015/dla-250.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 0.98.5. This update updates sqeeze-lts to the
-latest upstream release in line with the approach used for other Debian
-releases.</p>
-
-<p>This update corrects a double-free error that existed within the
-"unrar_extract_next_prepare()" function (libclamunrar_iface/unrar_iface.c)
-when parsing a RAR file. While no CVE was assigned, this issue does have
-potential security implications.</p>
-
-<p>If you use libclamunrar, we strongly recommend that you upgrade to this
-version.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-250.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-251-2.data b/english/lts/security/2015/dla-251-2.data
deleted file mode 100644
index 05a47993548..00000000000
--- a/english/lts/security/2015/dla-251-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-251-2 zendframework</define-tag>
-<define-tag report_date>2015-6-23</define-tag>
-<define-tag secrefs>CVE-2012-6531 CVE-2012-6532 CVE-2014-2681 CVE-2014-2682 CVE-2014-2683 CVE-2014-2684 CVE-2014-2685 CVE-2014-4914 CVE-2014-8088 CVE-2014-8089 CVE-2015-3154 Bug#743175 Bug#754201</define-tag>
-<define-tag packages>zendframework</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-251-2.wml b/english/lts/security/2015/dla-251-2.wml
deleted file mode 100644
index 2b73e73bede..00000000000
--- a/english/lts/security/2015/dla-251-2.wml
+++ /dev/null
@@ -1,82 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous zendframework upload incorrectly fixes <a href="https://security-tracker.debian.org/tracker/CVE-2015-3154">CVE-2015-3154</a>,
-causing a regression. This update corrects this problem. Thanks to
-Евгений Смолин (Evgeny Smolin) &lt;esmolin@inbox.ru&gt;.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6531">CVE-2012-6531</a>
-
- <p>Pádraic Brady identified a weakness to handle the SimpleXMLElement
- zendframework class, allowing to remote attackers to read arbitrary
- files or create TCP connections via an XML external entity (XXE)
- injection attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6532">CVE-2012-6532</a>
-
- <p>Pádraic Brady found that remote attackers could cause a denial of
- service by CPU consumption, via recursive or circular references
- through an XML entity expansion (XEE) attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2681">CVE-2014-2681</a>
-
- <p>Lukas Reschke reported a lack of protection against XML External
- Entity injection attacks in some functions. This fix extends the
- incomplete one from <a href="https://security-tracker.debian.org/tracker/CVE-2012-5657">CVE-2012-5657</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2682">CVE-2014-2682</a>
-
- <p>Lukas Reschke reported a failure to consider that the
- libxml_disable_entity_loader setting is shared among threads in the
- PHP-FPM case. This fix extends the incomplete one from
- <a href="https://security-tracker.debian.org/tracker/CVE-2012-5657">CVE-2012-5657</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2683">CVE-2014-2683</a>
-
- <p>Lukas Reschke reported a lack of protection against XML Entity
- Expansion attacks in some functions. This fix extends the incomplete
- one from <a href="https://security-tracker.debian.org/tracker/CVE-2012-6532">CVE-2012-6532</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2684">CVE-2014-2684</a>
-
- <p>Christian Mainka and Vladislav Mladenov from the Ruhr-University
- Bochum reported an error in the consumer's verify method that lead
- to acceptance of wrongly sourced tokens.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2685">CVE-2014-2685</a>
-
- <p>Christian Mainka and Vladislav Mladenov from the Ruhr-University
- Bochum reported a specification violation in which signing of a
- single parameter is incorrectly considered sufficient.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4914">CVE-2014-4914</a>
-
- <p>Cassiano Dal Pizzol discovered that the implementation of the ORDER
- BY SQL statement in Zend_Db_Select contains a potential SQL
- injection when the query string passed contains parentheses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8088">CVE-2014-8088</a>
-
- <p>Yury Dyachenko at Positive Research Center identified potential XML
- eXternal Entity injection vectors due to insecure usage of PHP's DOM
- extension.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8089">CVE-2014-8089</a>
-
- <p>Jonas Sandström discovered an SQL injection vector when manually
- quoting value for sqlsrv extension, using null byte.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3154">CVE-2015-3154</a>
-
- <p>Filippo Tessarotto and Maks3w reported potential CRLF injection
- attacks in mail and HTTP headers.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in zendframework version 1.10.6-1squeeze4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-251-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-251.data b/english/lts/security/2015/dla-251.data
deleted file mode 100644
index 05a47993548..00000000000
--- a/english/lts/security/2015/dla-251.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-251-2 zendframework</define-tag>
-<define-tag report_date>2015-6-23</define-tag>
-<define-tag secrefs>CVE-2012-6531 CVE-2012-6532 CVE-2014-2681 CVE-2014-2682 CVE-2014-2683 CVE-2014-2684 CVE-2014-2685 CVE-2014-4914 CVE-2014-8088 CVE-2014-8089 CVE-2015-3154 Bug#743175 Bug#754201</define-tag>
-<define-tag packages>zendframework</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-251.wml b/english/lts/security/2015/dla-251.wml
deleted file mode 100644
index 82a63f391dd..00000000000
--- a/english/lts/security/2015/dla-251.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous zendframework upload incorrectly fixes <a href="https://security-tracker.debian.org/tracker/CVE-2015-3154">CVE-2015-3154</a>,
-causing a regression. This update corrects this problem. Thanks to
-Евгений Смолин (Evgeny Smolin).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6531">CVE-2012-6531</a>
-
- <p>Pádraic Brady identified a weakness to handle the SimpleXMLElement
- zendframework class, allowing to remote attackers to read arbitrary
- files or create TCP connections via an XML external entity (XXE)
- injection attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6532">CVE-2012-6532</a>
-
- <p>Pádraic Brady found that remote attackers could cause a denial of
- service by CPU consumption, via recursive or circular references
- through an XML entity expansion (XEE) attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2681">CVE-2014-2681</a>
-
- <p>Lukas Reschke reported a lack of protection against XML External
- Entity injection attacks in some functions. This fix extends the
- incomplete one from <a href="https://security-tracker.debian.org/tracker/CVE-2012-5657">CVE-2012-5657</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2682">CVE-2014-2682</a>
-
- <p>Lukas Reschke reported a failure to consider that the
- libxml_disable_entity_loader setting is shared among threads in the
- PHP-FPM case. This fix extends the incomplete one from
- <a href="https://security-tracker.debian.org/tracker/CVE-2012-5657">CVE-2012-5657</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2683">CVE-2014-2683</a>
-
- <p>Lukas Reschke reported a lack of protection against XML Entity
- Expansion attacks in some functions. This fix extends the incomplete
- one from <a href="https://security-tracker.debian.org/tracker/CVE-2012-6532">CVE-2012-6532</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2684">CVE-2014-2684</a>
-
- <p>Christian Mainka and Vladislav Mladenov from the Ruhr-University
- Bochum reported an error in the consumer's verify method that lead
- to acceptance of wrongly sourced tokens.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2685">CVE-2014-2685</a>
-
- <p>Christian Mainka and Vladislav Mladenov from the Ruhr-University
- Bochum reported a specification violation in which signing of a
- single parameter is incorrectly considered sufficient.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4914">CVE-2014-4914</a>
-
- <p>Cassiano Dal Pizzol discovered that the implementation of the ORDER
- BY SQL statement in Zend_Db_Select contains a potential SQL
- injection when the query string passed contains parentheses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8088">CVE-2014-8088</a>
-
- <p>Yury Dyachenko at Positive Research Center identified potential XML
- eXternal Entity injection vectors due to insecure usage of PHP's DOM
- extension.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8089">CVE-2014-8089</a>
-
- <p>Jonas Sandström discovered an SQL injection vector when manually
- quoting value for sqlsrv extension, using null byte.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3154">CVE-2015-3154</a>
-
- <p>Filippo Tessarotto and Maks3w reported potential CRLF injection
- attacks in mail and HTTP headers.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-251.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-252.data b/english/lts/security/2015/dla-252.data
deleted file mode 100644
index a49bf56419d..00000000000
--- a/english/lts/security/2015/dla-252.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-252-1 postgresql-8.4</define-tag>
-<define-tag report_date>2015-6-23</define-tag>
-<define-tag packages>postgresql-8.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-252.wml b/english/lts/security/2015/dla-252.wml
deleted file mode 100644
index 7c82bf4d739..00000000000
--- a/english/lts/security/2015/dla-252.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several bugs were discovered in PostgreSQL, a relational database server
-system. The 8.4 branch is EOLed upstream, but still present in Debian squeeze.
-This new LTS minor version contains the fixes that were applied upstream to the
-9.0.22 version, backported to 8.4.22 which was the last version officially
-released by the PostgreSQL developers. This LTS effort for squeeze-lts is a
-community project sponsored by credativ GmbH.</p>
-
-<p>## Migration to Version 8.4.22lts4</p>
-
-<p>A dump/restore is not required for those running 8.4.X. However, if you are
-upgrading from a version earlier than 8.4.22, see the relevant release notes.</p>
-
-<p>## Changes</p>
-
-<ul>
-
-<li>Fix rare failure to invalidate relation cache init file (Tom Lane)
-
- <p>With just the wrong timing of concurrent activity, a VACUUM FULL
- on a system catalog might fail to update the init file that's used to
- avoid cache-loading work for new sessions. This would result in
- later sessions being unable to access that catalog at all.
- This is a very ancient bug, but it's so hard to trigger that no
- reproducible case had been seen until recently.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in postgresql-8.4 version 8.4.22lts4-0+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-252.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-253.data b/english/lts/security/2015/dla-253.data
deleted file mode 100644
index 36f7ac6ed7d..00000000000
--- a/english/lts/security/2015/dla-253.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-253-1 libwmf</define-tag>
-<define-tag report_date>2015-6-26</define-tag>
-<define-tag secrefs>CVE-2015-0848 CVE-2015-4588 Bug##787644</define-tag>
-<define-tag packages>libwmf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-253.wml b/english/lts/security/2015/dla-253.wml
deleted file mode 100644
index 2b5baa9f49e..00000000000
--- a/english/lts/security/2015/dla-253.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities were discovered in the Windows Metafile
-conversion library when reading BMP images embedded into WMF files:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0848">CVE-2015-0848</a>
-
- <p>A heap overflow when decoding embedded BMP images that don't use 8 bits per
- pixel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4588">CVE-2015-4588</a>
-
- <p>A missing check in the RLE decoding of embedded BMP images.</p></li>
-
-</ul>
-
-<p>We recommend that you update your libwmf packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-253.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-254.data b/english/lts/security/2015/dla-254.data
deleted file mode 100644
index 60c5c865988..00000000000
--- a/english/lts/security/2015/dla-254.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-254-1 librack-ruby</define-tag>
-<define-tag report_date>2015-6-26</define-tag>
-<define-tag secrefs>CVE-2015-3225</define-tag>
-<define-tag packages>librack-ruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-254.wml b/english/lts/security/2015/dla-254.wml
deleted file mode 100644
index eb5b187d439..00000000000
--- a/english/lts/security/2015/dla-254.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There is a potential denial of service vulnerability in Rack, a modular
-Ruby webserver interface.</p>
-
-<p>Carefully crafted requests can cause a `SystemStackError` and cause a
-denial of service attack by exploiting the lack of a sensible depth
-check when doing parameter normalization.</p>
-
-<p>We recommend that you update your librack-ruby packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-254.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-255.data b/english/lts/security/2015/dla-255.data
deleted file mode 100644
index f768fe1edf1..00000000000
--- a/english/lts/security/2015/dla-255.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-255-1 cacti</define-tag>
-<define-tag report_date>2015-6-27</define-tag>
-<define-tag secrefs>CVE-2015-2665 CVE-2015-4342 CVE-2015-4454</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-255.wml b/english/lts/security/2015/dla-255.wml
deleted file mode 100644
index 75d0b331874..00000000000
--- a/english/lts/security/2015/dla-255.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities (cross-site scripting and SQL injection) have
-been discovered in Cacti, a web interface for graphing of monitoring
-systems.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2665">CVE-2015-2665</a>
-
- <p>Cross-site scripting (XSS) vulnerability in Cacti before 0.8.8d
- allows remote attackers to inject arbitrary web script or HTML via
- unspecified vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4342">CVE-2015-4342</a>
-
- <p>SQL Injection and Location header injection from cdef id</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4454">CVE-2015-4454</a>
-
- <p>SQL injection vulnerability in the get_hash_graph_template function
- in lib/functions.php in Cacti before 0.8.8d allows remote attackers
- to execute arbitrary SQL commands via the graph_template_id
- parameter to graph_templates.php</p>
-
-<li>Unassigned CVE SQL injection VN:JVN#78187936 / TN:JPCERT#98968540
-
- <p>SQL injection vulnerability in the settings page</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-255.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-256.data b/english/lts/security/2015/dla-256.data
deleted file mode 100644
index 4a8c9daf1ff..00000000000
--- a/english/lts/security/2015/dla-256.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-256-1 t1utils</define-tag>
-<define-tag report_date>2015-6-29</define-tag>
-<define-tag secrefs>CVE-2015-3905 Bug#779274</define-tag>
-<define-tag packages>t1utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-256.wml b/english/lts/security/2015/dla-256.wml
deleted file mode 100644
index c75801f1733..00000000000
--- a/english/lts/security/2015/dla-256.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jakub Wilk found a vulnerability in the Type 1 font manipulation
-programs, t1utils:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3905">CVE-2015-3905</a>
-
- <p>Buffer overflow in the set_cs_start function in t1disasm.c in t1utils
- before 1.39 allows remote attackers to cause a denial of service (crash)
- and possibly execute arbitrary code via a crafted font file.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in t1utils version
-1.36-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-256.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-257.data b/english/lts/security/2015/dla-257.data
deleted file mode 100644
index 8814c87c3cd..00000000000
--- a/english/lts/security/2015/dla-257.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-257-1 libwmf</define-tag>
-<define-tag report_date>2015-6-29</define-tag>
-<define-tag secrefs>CVE-2015-4695 CVE-2015-4696 Bug#784192 Bug#784205</define-tag>
-<define-tag packages>libwmf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-257.wml b/english/lts/security/2015/dla-257.wml
deleted file mode 100644
index 60fac2103d9..00000000000
--- a/english/lts/security/2015/dla-257.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libwmf is vulnerable to two denial of service due to invalid read
-operations when processing specially crafted WMF files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4695">CVE-2015-4695</a>
-
- <p>Heap buffer overread in libwmf</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4696">CVE-2015-4696</a>
-
- <p>Read after free() in wmf2gd/wmf2eps</p></li>
-
-</ul>
-
-<p>For the squeeze distribution, those issues have been fixed in libwmf
-0.2.8.4-6.2+deb6u2. We recommend that you upgrade your libwmf packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-257.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-258.data b/english/lts/security/2015/dla-258.data
deleted file mode 100644
index 0a9f7db8d46..00000000000
--- a/english/lts/security/2015/dla-258.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-258-1 jqueryui</define-tag>
-<define-tag report_date>2015-6-29</define-tag>
-<define-tag secrefs>CVE-2010-5312</define-tag>
-<define-tag packages>jqueryui</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-258.wml b/english/lts/security/2015/dla-258.wml
deleted file mode 100644
index 1a17dd6dabc..00000000000
--- a/english/lts/security/2015/dla-258.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Shadowman131 discovered that jqueryui, a JavaScript UI library for
-dynamic web applications, failed to properly sanitize its <q>title</q>
-option. This would allow a remote attacker to inject arbitrary code
-through cross-site scripting.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-258.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-259.data b/english/lts/security/2015/dla-259.data
deleted file mode 100644
index dd2ecb23011..00000000000
--- a/english/lts/security/2015/dla-259.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-259-1 shibboleth-sp2</define-tag>
-<define-tag report_date>2015-6-30</define-tag>
-<define-tag secrefs>CVE-2015-2684</define-tag>
-<define-tag packages>shibboleth-sp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-259.wml b/english/lts/security/2015/dla-259.wml
deleted file mode 100644
index c02d858e646..00000000000
--- a/english/lts/security/2015/dla-259.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A denial of service vulnerability was found in the Shibboleth (an
-federated identity framework) Service Provider. When processing certain
-malformed SAML message generated by an authenticated attacker, the daemon
-could crash.</p>
-
-<p>For the Debian 6 <q>Squeeze</q> distribution, this problem has been fixed in
-version 2.3.1+dfsg-5+deb6u1.</p>
-
-<p>We recommend that you upgrade your shibboleth-sp2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-259.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-260.data b/english/lts/security/2015/dla-260.data
deleted file mode 100644
index ea314875e62..00000000000
--- a/english/lts/security/2015/dla-260.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-260-1 hostapd</define-tag>
-<define-tag report_date>2015-6-30</define-tag>
-<define-tag secrefs>CVE-2015-4142</define-tag>
-<define-tag packages>hostapd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-260.wml b/english/lts/security/2015/dla-260.wml
deleted file mode 100644
index fcfb16145c5..00000000000
--- a/english/lts/security/2015/dla-260.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in WMM Action frame processing in a case where
-hostapd is used to implement AP mode MLME/SME functionality (i.e., Host AP
-driver of a mac80211-based driver on Linux).</p>
-
-<p>This vulnerability can be used to perform denial of service attacks by
-an attacker that is within radio range of the AP that uses hostapd for
-MLME/SME operations.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this vulnerability has been fixed in version
-1:0.6.10-2+squeeze2 of hostapd. We recommend that you upgrade your
-hostapd package.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-260.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-261-2.data b/english/lts/security/2015/dla-261-2.data
deleted file mode 100644
index 99dd03773d6..00000000000
--- a/english/lts/security/2015/dla-261-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-261-2 aptdaemon</define-tag>
-<define-tag report_date>2015-7-6</define-tag>
-<define-tag secrefs>Bug#791469</define-tag>
-<define-tag packages>aptdaemon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-261-2.wml b/english/lts/security/2015/dla-261-2.wml
deleted file mode 100644
index fe094049d91..00000000000
--- a/english/lts/security/2015/dla-261-2.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was reported that version 0.31+bzr413-1.1+deb6u1 of aptdaemon (which
-fixed <a href="https://security-tracker.debian.org/tracker/CVE-2015-1323">CVE-2015-1323</a>) was not installable if you have Python 2.5 installed.</p>
-
-<p>This has been fixed in version 0.31+bzr413-1.1+deb6u2.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in aptdaemon version 0.31+bzr413-1.1+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-261-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-261.data b/english/lts/security/2015/dla-261.data
deleted file mode 100644
index 99dd03773d6..00000000000
--- a/english/lts/security/2015/dla-261.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-261-2 aptdaemon</define-tag>
-<define-tag report_date>2015-7-6</define-tag>
-<define-tag secrefs>Bug#791469</define-tag>
-<define-tag packages>aptdaemon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-261.wml b/english/lts/security/2015/dla-261.wml
deleted file mode 100644
index adf5873d2d7..00000000000
--- a/english/lts/security/2015/dla-261.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was reported that version 0.31+bzr413-1.1+deb6u1 of aptdaemon (which
-fixed <a href="https://security-tracker.debian.org/tracker/CVE-2015-1323">CVE-2015-1323</a>) was not installable if you have Python 2.5 installed.</p>
-
-<p>This has been fixed in version 0.31+bzr413-1.1+deb6u2.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-261.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-262.data b/english/lts/security/2015/dla-262.data
deleted file mode 100644
index 7c5438c0953..00000000000
--- a/english/lts/security/2015/dla-262.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-262-1 libcrypto++</define-tag>
-<define-tag report_date>2015-6-30</define-tag>
-<define-tag secrefs>CVE-2015-2141</define-tag>
-<define-tag packages>libcrypto++</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-262.wml b/english/lts/security/2015/dla-262.wml
deleted file mode 100644
index 368a4ed9b9d..00000000000
--- a/english/lts/security/2015/dla-262.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Evgeny Sidorov discovered that libcrypto++, a general purpose C++
-cryptographic library, did not properly implement blinding to mask
-private key operations for the Rabin-Williams digital signature
-algorithm. This could allow remote attackers to mount a timing attack
-and retrieve the user's private key.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-262.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-263.data b/english/lts/security/2015/dla-263.data
deleted file mode 100644
index 0a35bc8b240..00000000000
--- a/english/lts/security/2015/dla-263.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-263-1 ruby1.9.1</define-tag>
-<define-tag report_date>2015-7-1</define-tag>
-<define-tag secrefs>CVE-2012-5371 CVE-2013-0269 Bug#693024 Bug#700471</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-263.wml b/english/lts/security/2015/dla-263.wml
deleted file mode 100644
index f60fd12a828..00000000000
--- a/english/lts/security/2015/dla-263.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were identified in the Ruby language interpreter,
-version 1.9.1.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-5371">CVE-2012-5371</a>
-
- <p>Jean-Philippe Aumasson identified that Ruby computed hash values
- without properly restricting the ability to trigger hash collisions
- predictably, allowing context-dependent attackers to cause a denial
- of service (CPU consumption). This is a different vulnerability than
- <a href="https://security-tracker.debian.org/tracker/CVE-2011-4815">CVE-2011-4815</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-0269">CVE-2013-0269</a>
-
- <p>Thomas Hollstegge and Ben Murphy found that the JSON gem for Ruby
- allowed remote attackers to cause a denial of service (resource
- consumption) or bypass the mass assignment protection mechanism via
- a crafted JSON document that triggers the creation of arbitrary Ruby
- symbols or certain internal objects.</p></li>
-
-</ul>
-
-<p>For the squeeze distribution, theses vulnerabilities have been fixed in
-version 1.9.2.0-2+deb6u5 of ruby1.9.1. We recommend that you upgrade
-your ruby1.9.1 package.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-263.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-264.data b/english/lts/security/2015/dla-264.data
deleted file mode 100644
index 51fea8cffa4..00000000000
--- a/english/lts/security/2015/dla-264.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-264-1 libmodule-signature-perl</define-tag>
-<define-tag report_date>2015-7-1</define-tag>
-<define-tag secrefs>CVE-2015-3406 CVE-2015-3407 CVE-2015-3408 CVE-2015-3409 Bug#783451</define-tag>
-<define-tag packages>libmodule-signature-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-264.wml b/english/lts/security/2015/dla-264.wml
deleted file mode 100644
index db85272e62a..00000000000
--- a/english/lts/security/2015/dla-264.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>John Lightsey discovered multiple vulnerabilities in Module::Signature,
-a Perl module to manipulate CPAN SIGNATURE files. The Common
-Vulnerabilities and Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3406">CVE-2015-3406</a>
-
- <p>Module::Signature could parse the unsigned portion of the SIGNATURE
- file as the signed portion due to incorrect handling of PGP signature
- boundaries.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3407">CVE-2015-3407</a>
-
- <p>Module::Signature incorrectly handled files that are not listed in
- the SIGNATURE file. This includes some files in the t/ directory
- that would execute when tests are run.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3408">CVE-2015-3408</a>
-
- <p>Module::Signature used two argument open() calls to read the files
- when generating checksums from the signed manifest. This allowed to
- embed arbitrary shell commands into the SIGNATURE file that would be
- executed during the signature verification process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3409">CVE-2015-3409</a>
-
- <p>Module::Signature incorrectly handled module loading, allowing to
- load modules from relative paths in @INC. A remote attacker
- providing a malicious module could use this issue to execute
- arbitrary code during signature verification.</p></li>
-
-</ul>
-
-<p>For the squeeze distribution, these issues have been fixed in version
-0.63-1+squeeze2 of libmodule-signature-perl. Please note that the
-libtest-signature-perl package was also updated for compatibility with
-the <a href="https://security-tracker.debian.org/tracker/CVE-2015-3407">CVE-2015-3407</a> fix.</p>
-
-<p>We recommend that you upgrade your libmodule-signature-perl and
-libtest-signature-perl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-264.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-265-2.data b/english/lts/security/2015/dla-265-2.data
deleted file mode 100644
index f9dfd821ad2..00000000000
--- a/english/lts/security/2015/dla-265-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-265-2 pykerberos</define-tag>
-<define-tag report_date>2015-8-26</define-tag>
-<define-tag secrefs>CVE-2015-3206</define-tag>
-<define-tag packages>pykerberos</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-265-2.wml b/english/lts/security/2015/dla-265-2.wml
deleted file mode 100644
index 724ae88fb4a..00000000000
--- a/english/lts/security/2015/dla-265-2.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the original fix did not disable KDC
-verification support by default and changed checkPassowrd()'s
-signature. This update corrects this.</p>
-
-<p>This was the text of the original advisiory:</p>
-
-<p>Martin Prpic has reported the possibility of a man-in-the-middle attack
-in the pykerberos code to the Red Hat Bugzilla (Fedora bug tracker). The
-original issue has earlier been reported upstream [1]. We are quoting the
-upstream bug reported partially below:</p>
-
-<p>The python-kerberos checkPassword() method has been badly insecure in
-previous releases. It used to do (and still does by default) a kinit
-(AS-REQ) to ask a KDC for a TGT for the given user principal, and
-interprets the success or failure of that as indicating whether the
-password is correct. It does not, however, verify that it actually spoke
-to a trusted KDC: an attacker may simply reply instead with an AS-REP
-which matches the password he just gave you.</p>
-
-<p>Imagine you were verifying a password using LDAP authentication rather
-than Kerberos: you would, of course, use TLS in conjunction with LDAP to
-make sure you were talking to a real, trusted LDAP server. The same
-requirement applies here. kinit is not a password-verification service.</p>
-
-<p>The usual way of doing this is to take the TGT you've obtained with the
-user's password, and then obtain a ticket for a principal for which the
-verifier has keys (e.g. a web server processing a username/password form
-login might get a ticket for its own HTTP/host@REALM principal), which
-it can then verify. Note that this requires that the verifier has its
-own Kerberos identity, which is mandated by the symmetric nature of
-Kerberos (whereas in the LDAP case, the use of public-key cryptography
-allows anonymous verification).</p>
-
-<p>With this version of the pykerberos package a new option is introduced
-for the checkPassword() method. Setting verify to True when using
-checkPassword() will perform a KDC verification. For this to work, you
-need to provide a krb5.keytab file containing service principal keys for
-the service you intend to use.</p>
-
-<p>As the default krb5.keytab file in /etc is normally not accessible by
-non-root users/processes, you have to make sure a custom krb5.keytab
-file containing the correct principal keys is provided to your
-application using the KRB5_KTNAME environment variable.
-<p><b>Note</b>: In Debian squeeze(-lts), KDC verification support is disabled by
-default in order not to break existing setups.</p>
-
-<p>[1] <a href="https://www.calendarserver.org/ticket/833">https://www.calendarserver.org/ticket/833</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in pykerberos version 1.1+svn4895-1+deb6u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-265-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-265.data b/english/lts/security/2015/dla-265.data
deleted file mode 100644
index 383a425aee4..00000000000
--- a/english/lts/security/2015/dla-265.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-265-1 pykerberos</define-tag>
-<define-tag report_date>2015-7-3</define-tag>
-<define-tag secrefs>CVE-2015-3206</define-tag>
-<define-tag packages>pykerberos</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-265.wml b/english/lts/security/2015/dla-265.wml
deleted file mode 100644
index 96b501523e6..00000000000
--- a/english/lts/security/2015/dla-265.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Martin Prpic has reported the possibility of a man-in-the-middle attack
-in the pykerberos code to the Red Hat Bugzilla (Fedora bug tracker). The
-original issue has earlier been <a href="https://www.calendarserver.org/ticket/833">reported upstream</a>. We are quoting the
-upstream bug reported partially below:</p>
-
-<p>The python-kerberos checkPassword() method has been badly insecure in
-previous releases. It used to do (and still does by default) a kinit
-(AS-REQ) to ask a KDC for a TGT for the given user principal, and
-interprets the success or failure of that as indicating whether the
-password is correct. It does not, however, verify that it actually spoke
-to a trusted KDC: an attacker may simply reply instead with an AS-REP
-which matches the password he just gave you.</p>
-
-<p>Imagine you were verifying a password using LDAP authentication rather
-than Kerberos: you would, of course, use TLS in conjunction with LDAP to
-make sure you were talking to a real, trusted LDAP server. The same
-requirement applies here. kinit is not a password-verification service.</p>
-
-<p>The usual way of doing this is to take the TGT you've obtained with the
-user's password, and then obtain a ticket for a principal for which the
-verifier has keys (e.g. a web server processing a username/password form
-login might get a ticket for its own HTTP/host@REALM principal), which
-it can then verify. Note that this requires that the verifier has its
-own Kerberos identity, which is mandated by the symmetric nature of
-Kerberos (whereas in the LDAP case, the use of public-key cryptography
-allows anonymous verification).</p>
-
-<p>With this version of the pykerberos package a new option is introduced
-for the checkPassword() method. Setting verify to True when using
-checkPassword() will perform a KDC verification. For this to work, you
-need to provide a krb5.keytab file containing service principal keys for
-the service you intend to use.</p>
-
-<p>As the default krb5.keytab file in /etc is normally not accessible by
-non-root users/processes, you have to make sure a custom krb5.keytab
-file containing the correct principal keys is provided to your
-application using the KRB5_KTNAME environment variable.</p>
-
-<p><b>Note</b>: In Debian squeeze(-lts), KDC verification support is disabled by
-default in order not to break existing setups.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-265.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-266.data b/english/lts/security/2015/dla-266.data
deleted file mode 100644
index 55e752eeede..00000000000
--- a/english/lts/security/2015/dla-266.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-266-1 libxml2</define-tag>
-<define-tag report_date>2015-7-3</define-tag>
-<define-tag secrefs>CVE-2015-1819 Bug##782782 Bug##782985 Bug##783010</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-266.wml b/english/lts/security/2015/dla-266.wml
deleted file mode 100644
index 10783009388..00000000000
--- a/english/lts/security/2015/dla-266.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This upload to Debian squeeze-lts fixes three issues found in the libxml2
-package.</p>
-
-<p>(1) <a href="https://security-tracker.debian.org/tracker/CVE-2015-1819">CVE-2015-1819</a> / #782782</p>
-
-<p>Florian Weimer from Red Hat reported an issue against libxml2, where a
-parser which uses libxml2 chokes on a crafted XML document, allocating
-gigabytes of data. This is a fine line issue between API misuse and a bug
-in libxml2. This issue got addressed in libxml2 upstream and the patch
-has been backported to libxml2 in squeeze-lts.</p>
-
-<p>(2) #782985</p>
-
-<p>Jun Kokatsu reported an out-of-bounds memory access in libxml2. By
-entering an unclosed html comment the libxml2 parser didn't stop parsing
-at the end of the buffer, causing random memory to be included in the
-parsed comment that was returned to the evoking application.</p>
-
-<p>In the Shopify application (where this issue was originally discovered),
-this caused ruby objects from previous http requests to be disclosed in
-the rendered page.</p>
-
-<p>(3) #783010</p>
-
-<p>Michal Zalewski reported another out-of-bound reads issue in libxml2 that
-did not cause any crashes but could be detected under ASAN and Valgrind.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-266.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-267.data b/english/lts/security/2015/dla-267.data
deleted file mode 100644
index 3991d659734..00000000000
--- a/english/lts/security/2015/dla-267.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-267-1 unattended-upgrades</define-tag>
-<define-tag report_date>2015-7-2</define-tag>
-<define-tag secrefs>CVE-2015-1330</define-tag>
-<define-tag packages>unattended-upgrades</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-267.wml b/english/lts/security/2015/dla-267.wml
deleted file mode 100644
index 9d04952e4da..00000000000
--- a/english/lts/security/2015/dla-267.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that unattended-upgrades, a script for automatic
-installation of security upgrades, did not properly authenticate
-downloaded packages when the force-confold or force-confnew dpkg
-options were enabled via the DPkg::Options::* apt configuration.</p>
-
-<p>We recommend that you upgrade your unattended-upgrades package.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unattended-upgrades version 0.62.2+squeeze1</p>
-
-<p>Note: This DLA was originally was published as DLA-265-1, but due
-to an error that id was reused.</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-267.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-268.data b/english/lts/security/2015/dla-268.data
deleted file mode 100644
index 54888cdc7e1..00000000000
--- a/english/lts/security/2015/dla-268.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-268-1 virtualbox-ose</define-tag>
-<define-tag report_date>2015-7-6</define-tag>
-<define-tag secrefs>CVE-2015-0377 CVE-2015-0418 CVE-2015-3456 Bug##775888 Bug##785424</define-tag>
-<define-tag packages>virtualbox-ose</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-268.wml b/english/lts/security/2015/dla-268.wml
deleted file mode 100644
index f29c15a4b37..00000000000
--- a/english/lts/security/2015/dla-268.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three vulnerabilities have been fixed in the Debian squeeze-lts version of
-VirtualBox (package name: virtualbox-ose), a x86 virtualisation solution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0377">CVE-2015-0377</a>
-
- <p>Avoid VirtualBox allowing local users to affect availability via
- unknown vectors related to Core, which might result in denial of
- service. (Other issue than <a href="https://security-tracker.debian.org/tracker/CVE-2015-0418">CVE-2015-0418</a>).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0418">CVE-2015-0418</a>
-
- <p>Avoid VirtualBox allowing local users to affect availability via
- unknown vectors related to Core, which might result in denial of
- service. (Other issue than <a href="https://security-tracker.debian.org/tracker/CVE-2015-0377">CVE-2015-0377</a>).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456">CVE-2015-3456</a>
-
- <p>The Floppy Disk Controller (FDC) in QEMU, also used in VirtualBox and
- other virtualization products, allowed local guest users to cause a
- denial of service (out-of-bounds write and guest crash) or possibly
- execute arbitrary code via the (1) FD_CMD_READ_ID, (2)
- FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands,
- aka VENOM.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-268.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-269.data b/english/lts/security/2015/dla-269.data
deleted file mode 100644
index 22ec91cedd5..00000000000
--- a/english/lts/security/2015/dla-269.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-269-1 linux-ftpd-ssl</define-tag>
-<define-tag report_date>2015-7-7</define-tag>
-<define-tag secrefs>Bug#788331</define-tag>
-<define-tag packages>linux-ftpd-ssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-269.wml b/english/lts/security/2015/dla-269.wml
deleted file mode 100644
index b98a6a24e8e..00000000000
--- a/english/lts/security/2015/dla-269.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The issue is due to a case of missing brackets in the
-patch '500-ssl.diff', which causes the execution of
-'fclose(NULL)' and thus displays as a segmentation fault.
-The error appears while transmogrifying 'linux-ftpd' into
-'linux-ftpd-ssl'.</p>
-
-<p>There is no CVE assigned to this issue.</p>
-
-<p>The patch was created by Mats Erik Andersson.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-269.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-270.data b/english/lts/security/2015/dla-270.data
deleted file mode 100644
index a3a53b1b55f..00000000000
--- a/english/lts/security/2015/dla-270.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-270-1 bind9</define-tag>
-<define-tag report_date>2015-7-11</define-tag>
-<define-tag secrefs>CVE-2015-4620 Bug#791715</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-270.wml b/english/lts/security/2015/dla-270.wml
deleted file mode 100644
index 871173b7468..00000000000
--- a/english/lts/security/2015/dla-270.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in the Internet Domain Name Server bind9:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4620">CVE-2015-4620</a>
-
- <p>Breno Silveira Soares of Servico Federal de Processamento de Dados (SERPRO)
- discovered that the BIND DNS server is prone to a denial of service
- vulnerability. A remote attacker who can cause a validating resolver
- to query a zone containing specifically constructed contents can
- cause the resolver to terminate with an assertion failure, resulting
- in a denial of service to clients relying on the resolver.</p></li>
-
-</ul>
-
-<p>For the squeeze distribution, these issues have been fixed in version
-9.7.3.dfsg-1~squeeze15 of bind9.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-270.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-271.data b/english/lts/security/2015/dla-271.data
deleted file mode 100644
index a0f9dd50e5f..00000000000
--- a/english/lts/security/2015/dla-271.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-271-1 libunwind</define-tag>
-<define-tag report_date>2015-7-12</define-tag>
-<define-tag secrefs>CVE-2015-3239</define-tag>
-<define-tag packages>libunwind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-271.wml b/english/lts/security/2015/dla-271.wml
deleted file mode 100644
index 76dac4a8af6..00000000000
--- a/english/lts/security/2015/dla-271.wml
+++ /dev/null
@@ -1,8 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Invalid dwarf opcodes can cause references beyond the end of the array.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-271.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-272.data b/english/lts/security/2015/dla-272.data
deleted file mode 100644
index 9651aae598a..00000000000
--- a/english/lts/security/2015/dla-272.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-272-1 python-django</define-tag>
-<define-tag report_date>2015-7-16</define-tag>
-<define-tag secrefs>CVE-2015-2317 CVE-2015-5143 CVE-2015-5144</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-272.wml b/english/lts/security/2015/dla-272.wml
deleted file mode 100644
index 7802bf710e8..00000000000
--- a/english/lts/security/2015/dla-272.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Django, a high-level Python web
-development framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2317">CVE-2015-2317</a>
-
- <p>Daniel Chatfield discovered that python-django, a high-level Python
- web development framework, incorrectly handled user-supplied redirect
- URLs. A remote attacker could use this flaw to perform a cross-site
- scripting attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5143">CVE-2015-5143</a>
-
- <p>Eric Peterson and Lin Hua Cheng discovered that a new empty record
- used to be created in the session storage every time a session was
- accessed and an unknown session key was provided in the request
- cookie. This could allow remote attackers to saturate the session
- store or cause other users' session records to be evicted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5144">CVE-2015-5144</a>
-
- <p>Sjoerd Job Postmus discovered that some built-in validators did not
- properly reject newlines in input values. This could allow remote
- attackers to inject headers in emails and HTTP responses.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been fixed in
-version 1.2.3-3+squeeze13.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-272.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-273.data b/english/lts/security/2015/dla-273.data
deleted file mode 100644
index baed95f604b..00000000000
--- a/english/lts/security/2015/dla-273.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-273-1 tidy</define-tag>
-<define-tag report_date>2015-7-18</define-tag>
-<define-tag secrefs>CVE-2015-5522 CVE-2015-5523 Bug#792571</define-tag>
-<define-tag packages>tidy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-273.wml b/english/lts/security/2015/dla-273.wml
deleted file mode 100644
index 32299eee210..00000000000
--- a/english/lts/security/2015/dla-273.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fernando Muñoz discovered a security issue on the HTML syntax checker and
-reformatter tidy. Tidy did not properly process specific character sequences,
-and a remote attacker could exploit this flaw to cause a DoS, or probably,
-execute arbitrary code. Two different CVEs were assigned to this issue.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5522">CVE-2015-5522</a>
-
- <p>Malformed html documents could lead to a heap-buffer-overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5523">CVE-2015-5523</a>
-
- <p>Malformed html documents could lead to allocate 4Gb of memory.</p></li>
-
-</ul>
-
-<p>For the Squeeze distribution, this issue has been fixed in the
-20091223cvs-1+deb6u1 version of tidy.</p>
-
-<p>We recommend that you upgrade your tidy packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-273.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-274.data b/english/lts/security/2015/dla-274.data
deleted file mode 100644
index 5bbbc44ade4..00000000000
--- a/english/lts/security/2015/dla-274.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-274-1 groovy</define-tag>
-<define-tag report_date>2015-7-20</define-tag>
-<define-tag secrefs>CVE-2015-3253</define-tag>
-<define-tag packages>groovy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-274.wml b/english/lts/security/2015/dla-274.wml
deleted file mode 100644
index 72457191dd0..00000000000
--- a/english/lts/security/2015/dla-274.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>cpnrodzc7, working with HP's Zero Day Initiative, discovered that
-Java applications using standard Java serialization mechanisms to
-decode untrusted data, and that have Groovy on their classpath, can
-be passed a serialized object that will cause the application to
-execute arbitrary code.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 1.7.0-4+deb6u1.</p>
-
-<p>For the oldstable distribution (wheezy) and stable distribution
-(jessie), this problem will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-274.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-275.data b/english/lts/security/2015/dla-275.data
deleted file mode 100644
index f9e18115637..00000000000
--- a/english/lts/security/2015/dla-275.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-275-1 ruby1.9.1</define-tag>
-<define-tag report_date>2015-7-20</define-tag>
-<define-tag secrefs>CVE-2014-6438</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-275.wml b/english/lts/security/2015/dla-275.wml
deleted file mode 100644
index 236d33a068e..00000000000
--- a/english/lts/security/2015/dla-275.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the uri package in the Ruby standard library
-uses regular expressions that may result in excessive backtracking.
-Ruby applications that parse untrusted URIs using this library were
-susceptible to denial-of-service attacks by passing crafted URIs.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 1.9.2.0-2+deb6u6.</p>
-
-<p>The oldstable distribution (wheezy) and stable distribution (jessie)
-were not affected by this problem as it was fixed before release.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-275.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-276.data b/english/lts/security/2015/dla-276.data
deleted file mode 100644
index cd4cd454d5e..00000000000
--- a/english/lts/security/2015/dla-276.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-276-1 inspircd</define-tag>
-<define-tag report_date>2015-7-18</define-tag>
-<define-tag secrefs>Bug#780880</define-tag>
-<define-tag packages>inspircd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-276.wml b/english/lts/security/2015/dla-276.wml
deleted file mode 100644
index e934bda1bec..00000000000
--- a/english/lts/security/2015/dla-276.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Adam, upstream author of inspircd found the Debian
-patch that fixed <a href="https://security-tracker.debian.org/tracker/CVE-2012-1836">CVE-2012-1836</a> was incomplete. Furthermore, it
-introduced an issue, since invalid dns packets caused an infinite loop.
-This upload corrects these problems.</p>
-
-<p>As of today, no CVEs has been assigned to these Debian-specific flaws.</p>
-
-<p>For the Squeeze distribution, these issues have been fixed in version
-1.1.22+dfsg-4+squeeze2 of inspircd.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-276.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-277.data b/english/lts/security/2015/dla-277.data
deleted file mode 100644
index 4c92da55379..00000000000
--- a/english/lts/security/2015/dla-277.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-277-1 libidn</define-tag>
-<define-tag report_date>2015-7-20</define-tag>
-<define-tag secrefs>CVE-2015-2059</define-tag>
-<define-tag packages>libidn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-277.wml b/english/lts/security/2015/dla-277.wml
deleted file mode 100644
index 8119b99d8b7..00000000000
--- a/english/lts/security/2015/dla-277.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Thijs Alkemade discovered that the Jabber server may pass an invalid
-UTF-8 string to libidn, the GNU library for Internationalized Domain
-Names (IDNs). In the case of the Jabber server, this results in
-information disclosure, and it is likely that some other applications
-using libidn have similar vulnerabilities. This update changes libidn
-to check for invalid strings rather than assuming that the application
-has done so.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 1.15-2+deb6u1.</p>
-
-<p>For the oldstable distribution (wheezy) and stable distribution
-(jessie), this problem will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-277.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-278-2.data b/english/lts/security/2015/dla-278-2.data
deleted file mode 100644
index f311758912f..00000000000
--- a/english/lts/security/2015/dla-278-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-278-2 cacti</define-tag>
-<define-tag report_date>2015-7-20</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-278-2.wml b/english/lts/security/2015/dla-278-2.wml
deleted file mode 100644
index df9fa0d8b3a..00000000000
--- a/english/lts/security/2015/dla-278-2.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The last update of cacti in squeeze-lts, version 0.8.7g-1+squeeze7, had
-two regressions that caused certain output of scripts to not be
-processed and caused the save button of graphs.php to not save the
-changes.</p>
-
-<p>The regressions have been fixed in 0.8.7g-1+squeeze8.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in cacti version 0.8.7g-1+squeeze8</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-278-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-278.data b/english/lts/security/2015/dla-278.data
deleted file mode 100644
index 8770d38a861..00000000000
--- a/english/lts/security/2015/dla-278.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-278-1 cacti</define-tag>
-<define-tag report_date>2015-7-20</define-tag>
-<define-tag secrefs>CVE-2015-4634 Bug#NA</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-278.wml b/english/lts/security/2015/dla-278.wml
deleted file mode 100644
index 73d9232210b..00000000000
--- a/english/lts/security/2015/dla-278.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several SQL injection vulnerabilities were discovered in cacti, a
-frontend to rrdtool for monitoring systems and service:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4634">CVE-2015-4634</a>
-
- <p>SQL injection vulnerability in Cacti before 0.8.8e allows remote
- attackers to execute arbitrary SQL commands in graphs.php</p>
-
-<p>Currently unknown or unassigned CVE's
- SQL injection vulnerability in Cacti before 0.8.8e allows remote
- attackers to execute arbitrary SQL commands in cdef.php, color.php,
- data_input.php, data_queries.php, data_sources.php,
- data_templates.php, gprint_presets.php, graph_templates.php,
- graph_templates_items.php, graphs_items.php, host.php,
- host_templates.php, lib/functions.php, rra.php, tree.php and
- user_admin.php</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 0.8.7g-1+squeeze7.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-278.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-279.data b/english/lts/security/2015/dla-279.data
deleted file mode 100644
index e6853ea49fe..00000000000
--- a/english/lts/security/2015/dla-279.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-279-1 python-tornado</define-tag>
-<define-tag report_date>2015-7-22</define-tag>
-<define-tag secrefs>CVE-2014-9720</define-tag>
-<define-tag packages>python-tornado</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-279.wml b/english/lts/security/2015/dla-279.wml
deleted file mode 100644
index 666c6b23d06..00000000000
--- a/english/lts/security/2015/dla-279.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in python-tornado, a Python scalable, nonblocking web server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9720">CVE-2014-9720</a>
-
-<p>CSRF cookie allows side-channel attack against TLS (BREACH)</p>
-
-<p>Security Fix</p>
-
-<p>The XSRF token is now encoded with a random mask on each request. This makes
-it safe to include in compressed pages without being vulnerable to the BREACH
-attack.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been fixed in
-version 1.0.1-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-279.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-280.data b/english/lts/security/2015/dla-280.data
deleted file mode 100644
index 8aaf7a064a9..00000000000
--- a/english/lts/security/2015/dla-280.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-280-1 ghostscript</define-tag>
-<define-tag report_date>2015-7-25</define-tag>
-<define-tag secrefs>CVE-2015-3228 Bug#793489</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-280.wml b/english/lts/security/2015/dla-280.wml
deleted file mode 100644
index 5b0e933705e..00000000000
--- a/english/lts/security/2015/dla-280.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>In gs_heap_alloc_bytes(), add a sanity check to ensure we don't
- overflow the variable holding the actual number of bytes we
- allocate.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-280.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-281.data b/english/lts/security/2015/dla-281.data
deleted file mode 100644
index e9dea11389e..00000000000
--- a/english/lts/security/2015/dla-281.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-281-1 expat</define-tag>
-<define-tag report_date>2015-7-25</define-tag>
-<define-tag secrefs>CVE-2015-1283</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-281.wml b/english/lts/security/2015/dla-281.wml
deleted file mode 100644
index 28f9919b0e1..00000000000
--- a/english/lts/security/2015/dla-281.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>Multiple integer overflows in the XML_GetBuffer function in Expat
- through 2.1.0, as used in Google Chrome before 44.0.2403.89 and
- other products, allow remote attackers to cause a denial of service
- (heap-based buffer overflow) or possibly have unspecified other
- impact via crafted XML data, a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2015-2716">CVE-2015-2716</a>.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-281.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-282.data b/english/lts/security/2015/dla-282.data
deleted file mode 100644
index 896af644d38..00000000000
--- a/english/lts/security/2015/dla-282.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-282-1 lighttpd</define-tag>
-<define-tag report_date>2015-7-25</define-tag>
-<define-tag secrefs>CVE-2014-3566 Bug##765702</define-tag>
-<define-tag packages>lighttpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-282.wml b/english/lts/security/2015/dla-282.wml
deleted file mode 100644
index e85666395f6..00000000000
--- a/english/lts/security/2015/dla-282.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update allows to disable SSLv3 in lighttpd in order to protect
-against the POODLE attack. SSLv3 is now disabled by default and can be
-reenabled (if needed) using the ssl.use-sslv3 option.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-282.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-283.data b/english/lts/security/2015/dla-283.data
deleted file mode 100644
index 18285bb4d96..00000000000
--- a/english/lts/security/2015/dla-283.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-283-1 icu</define-tag>
-<define-tag report_date>2015-7-28</define-tag>
-<define-tag secrefs>CVE-2015-4760</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-283.wml b/english/lts/security/2015/dla-283.wml
deleted file mode 100644
index da59933a446..00000000000
--- a/english/lts/security/2015/dla-283.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in the International Components
-for Unicode (ICU) library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4760">CVE-2015-4760</a>
-
- <p>It was discovered that ICU Layout Engine was missing multiple
- boundary checks. These could lead to buffer overflows and memory
- corruption. A specially crafted file could cause an application
- using ICU to parse untrusted font files to crash and, possibly,
- execute arbitrary code.</p></li>
-
-</ul>
-
-<p>For the squeeze distribution, these issues have been fixed in version
-4.4.1-8+squeeze4 of icu.</p>
-
-<p>We recommend to upgrade your icu packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-283.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-284.data b/english/lts/security/2015/dla-284.data
deleted file mode 100644
index 2bb1cd0e696..00000000000
--- a/english/lts/security/2015/dla-284.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-284-1 apache2</define-tag>
-<define-tag report_date>2015-7-28</define-tag>
-<define-tag secrefs>CVE-2015-3183</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-284.wml b/english/lts/security/2015/dla-284.wml
deleted file mode 100644
index d5975a76eab..00000000000
--- a/english/lts/security/2015/dla-284.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in the Apache HTTP Server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3183">CVE-2015-3183</a>
-
- <p>Apache HTTP Server did not properly parse chunk headers, which
- allowed remote attackers to conduct HTTP request smuggling via a
- crafted request. This flaw relates to mishandling of large
- chunk-size values and invalid chunk-extension characters in
- modules/http/http_filters.c.</p></li>
-
-</ul>
-
-<p>For the squeeze distribution, these issues have been fixed in version
-2.2.16-6+squeeze15 of apache2.</p>
-
-<p>We recommend you to upgrade your apache2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-284.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-285.data b/english/lts/security/2015/dla-285.data
deleted file mode 100644
index fa00d3b3917..00000000000
--- a/english/lts/security/2015/dla-285.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-285-1 bind9</define-tag>
-<define-tag report_date>2015-7-28</define-tag>
-<define-tag secrefs>CVE-2015-5477</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-285.wml b/english/lts/security/2015/dla-285.wml
deleted file mode 100644
index dca546e245c..00000000000
--- a/english/lts/security/2015/dla-285.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jonathan Foote discovered that the BIND DNS server does not properly
-handle TKEY queries. A remote attacker can take advantage of this flaw
-to mount a denial of service via a specially crafted query triggering an
-assertion failure and causing BIND to exit.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-285.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-286.data b/english/lts/security/2015/dla-286.data
deleted file mode 100644
index 071627b5258..00000000000
--- a/english/lts/security/2015/dla-286.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-286-1 squid3</define-tag>
-<define-tag report_date>2015-7-30</define-tag>
-<define-tag secrefs>CVE-2015-5400 Bug#793128</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-286.wml b/english/lts/security/2015/dla-286.wml
deleted file mode 100644
index e035a39008d..00000000000
--- a/english/lts/security/2015/dla-286.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alex Rousskov discovered that Squid configured with cache_peer and
-operating on explicit proxy traffic does not correctly handle CONNECT
-method peer responses. In some configurations, it allows remote clients to
-bypass security in an explicit gateway proxy.</p>
-
-<p>For Debian 6 Squeeze, this problem has been fixed in squid3 version
-3.1.6-1.2+squeeze5. We recommend that you upgrade your squid3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-286.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-287.data b/english/lts/security/2015/dla-287.data
deleted file mode 100644
index 2a149fcd813..00000000000
--- a/english/lts/security/2015/dla-287.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-287-1 ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag report_date>2015-8-4</define-tag>
-<define-tag packages>ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-287.wml b/english/lts/security/2015/dla-287.wml
deleted file mode 100644
index e30e092a327..00000000000
--- a/english/lts/security/2015/dla-287.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs and ia32-libs-gtk packages contain 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the previous update of ia32-libs and
-ia32-libs-gtk in Squeeze LTS.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-287.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-288-2.data b/english/lts/security/2015/dla-288-2.data
deleted file mode 100644
index 6d71db2bf89..00000000000
--- a/english/lts/security/2015/dla-288-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-288-2 openssh</define-tag>
-<define-tag report_date>2015-9-30</define-tag>
-<define-tag secrefs>CVE-2015-5600</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-288-2.wml b/english/lts/security/2015/dla-288-2.wml
deleted file mode 100644
index c0f51638cbf..00000000000
--- a/english/lts/security/2015/dla-288-2.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Debian LTS (squeeze), the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600">CVE-2015-5600</a>[1] in openssh
-1:5.5p1-6+squeeze7 breaks authentication mechanisms that rely on the
-keyboard-interactive method. Thanks to Colin Watson for making aware of
-that.</p>
-
-<p>The patch fixing <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600">CVE-2015-5600</a> introduces the field <q>devices_done</q> to the
-KbdintAuthctxt struct, but does not initialize the field in the
-kbdint_alloc() function. On Linux, this ends up filling that field with
-junk data. The result of this are random login failures when
-keyboard-interactive authentication is used.</p>
-
-<p>This upload of openssh 1:5.5p1-6+squeeze7 to Debian LTS (squeeze) adds
-that initialization of the `devices_done` field alongside the existing
-initialization code.</p>
-
-<p>People relying on keyboard-interactive based authentication mechanisms with
-OpenSSH on Debian squeeze(-lts) systems are recommended to upgrade
-OpenSSH to 1:5.5p1-6+squeeze7.</p>
-
-<p>[1] <a href="https://lists.debian.org/debian-lts-announce/2015/08/msg00001.html">https://lists.debian.org/debian-lts-announce/2015/08/msg00001.html</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssh version 1:5.5p1-6+squeeze7</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-288-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-288.data b/english/lts/security/2015/dla-288.data
deleted file mode 100644
index 6d71db2bf89..00000000000
--- a/english/lts/security/2015/dla-288.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-288-2 openssh</define-tag>
-<define-tag report_date>2015-9-30</define-tag>
-<define-tag secrefs>CVE-2015-5600</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-288.wml b/english/lts/security/2015/dla-288.wml
deleted file mode 100644
index 88ade872743..00000000000
--- a/english/lts/security/2015/dla-288.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Debian LTS (squeeze), the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600">CVE-2015-5600</a> in openssh
-1:5.5p1-6+squeeze7 breaks authentication mechanisms that rely on the
-keyboard-interactive method. Thanks to Colin Watson for making aware of
-that.</p>
-
-<p>The patch fixing <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600">CVE-2015-5600</a> introduces the field <q>devices_done</q> to the
-KbdintAuthctxt struct, but does not initialize the field in the
-kbdint_alloc() function. On Linux, this ends up filling that field with
-junk data. The result of this are random login failures when
-keyboard-interactive authentication is used.</p>
-
-<p>This upload of openssh 1:5.5p1-6+squeeze7 to Debian LTS (squeeze) adds
-that initialization of the `devices_done` field alongside the existing
-initialization code.</p>
-
-<p>People relying on keyboard-interactive based authentication mechanisms with
-OpenSSH on Debian squeeze(-lts) systems are recommended to upgrade
-OpenSSH to 1:5.5p1-6+squeeze7.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-288.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-289.data b/english/lts/security/2015/dla-289.data
deleted file mode 100644
index 0fc7649447a..00000000000
--- a/english/lts/security/2015/dla-289.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-289-1 remind</define-tag>
-<define-tag report_date>2015-8-7</define-tag>
-<define-tag secrefs>CVE-2015-5957</define-tag>
-<define-tag packages>remind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-289.wml b/english/lts/security/2015/dla-289.wml
deleted file mode 100644
index a4ce0afcc20..00000000000
--- a/english/lts/security/2015/dla-289.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alexander Keller discovered a buffer overflow issue in remind, a tool for
-sophisticatedly reminding you of upcoming events.</p>
-
-<p>If running Debian squeeze LTS, we recommend upgrading remind to the latest
-version provided.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-289.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-290-2.data b/english/lts/security/2015/dla-290-2.data
deleted file mode 100644
index 0315dbdb133..00000000000
--- a/english/lts/security/2015/dla-290-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-290-2 opensaml2</define-tag>
-<define-tag report_date>2015-8-10</define-tag>
-<define-tag secrefs>CVE-2015-0851</define-tag>
-<define-tag packages>opensaml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-290-2.wml b/english/lts/security/2015/dla-290-2.wml
deleted file mode 100644
index 0a44078b995..00000000000
--- a/english/lts/security/2015/dla-290-2.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that opensaml2, a Security Assertion Markup Language
-library, needed to be rebuilt against a fixed version of the xmltooling
-package due to its use of macros vulnerable to <a href="https://security-tracker.debian.org/tracker/CVE-2015-0851">CVE-2015-0851</a> as fixed in
-the DSA 3321-1 update.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in opensaml2 version 2.3-2+squeeze2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-290-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-290.data b/english/lts/security/2015/dla-290.data
deleted file mode 100644
index b51658c18bd..00000000000
--- a/english/lts/security/2015/dla-290.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-290-1 xmltooling</define-tag>
-<define-tag report_date>2015-8-9</define-tag>
-<define-tag secrefs>CVE-2015-0851 Bug#793855</define-tag>
-<define-tag packages>xmltooling</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-290.wml b/english/lts/security/2015/dla-290.wml
deleted file mode 100644
index 81bd28453da..00000000000
--- a/english/lts/security/2015/dla-290.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Shibboleth SP software crashes on well-formed but invalid XML</p>
-
-<p>Another upload for opensaml2 is needed to really solve this
-issue. This will be done shortly.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-290.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-291.data b/english/lts/security/2015/dla-291.data
deleted file mode 100644
index 3f7cfc2e151..00000000000
--- a/english/lts/security/2015/dla-291.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-291-1 libidn</define-tag>
-<define-tag report_date>2015-8-16</define-tag>
-<define-tag packages>libidn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-291.wml b/english/lts/security/2015/dla-291.wml
deleted file mode 100644
index 7274f765823..00000000000
--- a/english/lts/security/2015/dla-291.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Adam Sampson found a vulnerability in GNU Libidn, library that
-implements the IETF IDN specifications. Libdin incorrectly handled
-invalid UTF-8 input, causing it to bad free(). This issue was introduced
-by the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-2059">CVE-2015-2059</a>.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in the 1.15-2+deb6u2
-version of libidn.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-291.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-292.data b/english/lts/security/2015/dla-292.data
deleted file mode 100644
index 1a58b2c328c..00000000000
--- a/english/lts/security/2015/dla-292.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-292-1 libstruts1.2-java</define-tag>
-<define-tag report_date>2015-8-17</define-tag>
-<define-tag secrefs>CVE-2014-0899</define-tag>
-<define-tag packages>libstruts1.2-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-292.wml b/english/lts/security/2015/dla-292.wml
deleted file mode 100644
index bd592b1ba53..00000000000
--- a/english/lts/security/2015/dla-292.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Validator in Apache Struts 1.1 and later contains a function to
-efficiently define rules for input validation across multiple pages during
-screen transitions. This function contains a vulnerability where input
-validation may be bypassed. When the Apache Struts 1 Validator is used,
-the web application may be vulnerable even when this function is not used
-explicitly.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-292.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-293.data b/english/lts/security/2015/dla-293.data
deleted file mode 100644
index 8a1435ad154..00000000000
--- a/english/lts/security/2015/dla-293.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-293-1 subversion</define-tag>
-<define-tag report_date>2015-8-16</define-tag>
-<define-tag secrefs>CVE-2015-3187</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-293.wml b/english/lts/security/2015/dla-293.wml
deleted file mode 100644
index 5280f42d5b8..00000000000
--- a/english/lts/security/2015/dla-293.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>C. Michael Pilato, from CollabNet, reported an issue in the version
-control system Subversion.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3187">CVE-2015-3187</a>
-
- <p>Subversion servers revealed some sensible paths hidden by path-based
- authorization. Remote authenticated users were allowed to obtain
- path information by reading the history of a node that has been
- moved from a hidden path. The vulnerability only revealed the path,
- though it didn't reveal its content.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in subversion
-1.6.12dfsg-7+deb6u3. We recommend to upgrade your subversion packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-293.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-294.data b/english/lts/security/2015/dla-294.data
deleted file mode 100644
index cbd6b9bd153..00000000000
--- a/english/lts/security/2015/dla-294.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-294-1 wordpress</define-tag>
-<define-tag report_date>2015-8-19</define-tag>
-<define-tag secrefs>CVE-2015-2213 CVE-2015-5622 CVE-2015-5731 CVE-2015-5732 CVE-2015-5734</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-294.wml b/english/lts/security/2015/dla-294.wml
deleted file mode 100644
index 09d0ccd66e9..00000000000
--- a/english/lts/security/2015/dla-294.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in Wordpress, the popular
-blogging engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2213">CVE-2015-2213</a>
-
- <p>SQL Injection allowed a remote attacker to compromise the site.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5622">CVE-2015-5622</a>
-
- <p>The robustness of the shortcodes HTML tags filter has been
- improved. The parsing is a bit more strict, which may affect
- your installation. This is the corrected version of the patch
- that needed to be reverted in DSA 3328-2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5731">CVE-2015-5731</a>
-
- <p>An attacker could lock a post that was being edited.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5732">CVE-2015-5732</a>
-
- <p>Cross site scripting in a widget title allows an attacker to
- steal sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5734">CVE-2015-5734</a>
-
- <p>Fix some broken links in the legacy theme preview.</p></li>
-
-</ul>
-
-<p>The issues were discovered by Marc-Alexandre Montpas of Sucuri, Helen
-Hou-Sandí of the WordPress security team, Netanel Rubin of Check Point,
-Ivan Grigorov, Johannes Schmitt of Scrutinizer and Mohamed A. Baset.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-294.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-295.data b/english/lts/security/2015/dla-295.data
deleted file mode 100644
index 9944e9f1fe2..00000000000
--- a/english/lts/security/2015/dla-295.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-295-1 conntrack</define-tag>
-<define-tag report_date>2015-8-19</define-tag>
-<define-tag secrefs>CVE-2015-6496 Bug##796103</define-tag>
-<define-tag packages>conntrack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-295.wml b/english/lts/security/2015/dla-295.wml
deleted file mode 100644
index 13e27ea418d..00000000000
--- a/english/lts/security/2015/dla-295.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>"jann" discovered that in certain configurations, if the relevant
-conntrack kernel module is not loaded, conntrackd will crash when
-handling DCCP, SCTP or ICMPv6 packets. In the version found in Debian
-6.0 <q>squeeze</q>, this vulnerability only applies to ICMPv6.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 1:0.9.14-2+deb6u1.</p>
-
-<p>For the oldstable distribution (wheezy) and stable distribution
-(jessie), this problem will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-295.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-296.data b/english/lts/security/2015/dla-296.data
deleted file mode 100644
index 809868e9781..00000000000
--- a/english/lts/security/2015/dla-296.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-296-1 extplorer</define-tag>
-<define-tag report_date>2015-8-21</define-tag>
-<define-tag secrefs>CVE-2015-0896</define-tag>
-<define-tag packages>extplorer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-296.wml b/english/lts/security/2015/dla-296.wml
deleted file mode 100644
index acf2849521c..00000000000
--- a/english/lts/security/2015/dla-296.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple cross-site scripting (XSS) vulnerabilities in eXtplorer before 2.1.7
-allow remote attackers to inject arbitrary web script or HTML via unspecified
-vectors.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-296.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-297.data b/english/lts/security/2015/dla-297.data
deleted file mode 100644
index 35145488229..00000000000
--- a/english/lts/security/2015/dla-297.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-297-1 wesnoth-1.8</define-tag>
-<define-tag report_date>2015-8-22</define-tag>
-<define-tag secrefs>CVE-2015-5069 CVE-2015-5070</define-tag>
-<define-tag packages>wesnoth-1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-297.wml b/english/lts/security/2015/dla-297.wml
deleted file mode 100644
index d7f73e79f3b..00000000000
--- a/english/lts/security/2015/dla-297.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>Wesnoth implements a text preprocessing language that is used in
- conjunction with its own game scripting language. It also has a
- built-in Lua interpreter and API.
- Both the Lua API and the preprocessor make use of the same function
- (filesystem::get_wml_location()) to resolve file paths so that only
- content from the user's data directory can be read.</p>
-
- <p>However, the function did not explicitly disallow files with the .pbl
- extension. The contents of these files could thus be stored in saved
- game files or even transmitted directly to other users in a networked
- game. Among the information that's compromised is a user-defined
- passphrase used to authenticate uploads to the game's content server.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-297.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-298.data b/english/lts/security/2015/dla-298.data
deleted file mode 100644
index b46a89309aa..00000000000
--- a/english/lts/security/2015/dla-298.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-298-1 roundup</define-tag>
-<define-tag report_date>2015-8-23</define-tag>
-<define-tag secrefs>CVE-2012-6130 CVE-2012-6131 CVE-2012-6132 CVE-2012-6133</define-tag>
-<define-tag packages>roundup</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-298.wml b/english/lts/security/2015/dla-298.wml
deleted file mode 100644
index 0857fffe4c5..00000000000
--- a/english/lts/security/2015/dla-298.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6130">CVE-2012-6130</a>
- <p>Cross-site scripting (XSS) vulnerability in the history
- display in Roundup before 1.4.20 allows remote attackers
- to inject arbitrary web script or HTML via a username,
- related to generating a link.</p></li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6131">CVE-2012-6131</a>
- <p>Cross-site scripting (XSS) vulnerability in cgi/client.py
- in Roundup before 1.4.20 allows remote attackers to inject
- arbitrary web script or HTML via the @action parameter to
- support/issue1.</p></li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6132">CVE-2012-6132</a>
- <p>Cross-site scripting (XSS) vulnerability in Roundup before
- 1.4.20 allows remote attackers to inject arbitrary web
- script or HTML via the otk parameter.</p></li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6133">CVE-2012-6133</a>
- <p>XSS flaws in ok and error messages
- We solve this differently from the proposals in the bug-report
- by not allowing *any* html-tags in ok/error messages anymore.</p></li>
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-298.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-299.data b/english/lts/security/2015/dla-299.data
deleted file mode 100644
index 93f7d234bca..00000000000
--- a/english/lts/security/2015/dla-299.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-299-1 ruby1.8</define-tag>
-<define-tag report_date>2015-8-26</define-tag>
-<define-tag secrefs>CVE-2009-5147</define-tag>
-<define-tag packages>ruby1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-299.wml b/english/lts/security/2015/dla-299.wml
deleted file mode 100644
index cd88fb75015..00000000000
--- a/english/lts/security/2015/dla-299.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>"sheepman" fixed a vulnerability in Ruby 1.8: DL::dlopen could open a library
-with tainted name even if $SAFE > 0.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in ruby1.8
-1.8.7.302-2squeeze5.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-299.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-300.data b/english/lts/security/2015/dla-300.data
deleted file mode 100644
index 3e1cad27e55..00000000000
--- a/english/lts/security/2015/dla-300.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-300-1 ruby1.9.1</define-tag>
-<define-tag report_date>2015-8-26</define-tag>
-<define-tag secrefs>CVE-2009-5147</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-300.wml b/english/lts/security/2015/dla-300.wml
deleted file mode 100644
index 86cdd1e1c56..00000000000
--- a/english/lts/security/2015/dla-300.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>"sheepman" fixed a vulnerability in Ruby 1.9.1: DL::dlopen could open a
-library with tainted name even if $SAFE > 0.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in ruby1.9.1
-1.9.2.0-2+deb6u7</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-300.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-301.data b/english/lts/security/2015/dla-301.data
deleted file mode 100644
index cd2cf3562f0..00000000000
--- a/english/lts/security/2015/dla-301.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-301-1 python-django</define-tag>
-<define-tag report_date>2015-8-26</define-tag>
-<define-tag secrefs>CVE-2015-5963 CVE-2015-5964</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-301.wml b/english/lts/security/2015/dla-301.wml
deleted file mode 100644
index 8abf3e3010e..00000000000
--- a/english/lts/security/2015/dla-301.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Denial-of-service possibility in logout() view by filling session store</p>
-
-<p>Previously, a session could be created when anonymously accessing the
-django.contrib.auth.views.logout view (provided it wasn't decorated with
-django.contrib.auth.decorators.login_required as done in the admin). This
-could allow an attacker to easily create many new session records by
-sending repeated requests, potentially filling up the session store or
-causing other users' session records to be evicted.</p>
-
-<p>The django.contrib.sessions.middleware.SessionMiddleware has been modified
-to no longer create empty session records.</p>
-
-<p>This portion of the fix has been assigned <a href="https://security-tracker.debian.org/tracker/CVE-2015-5963">CVE-2015-5963</a>.</p>
-
-<p>Additionally, the contrib.sessions.backends.base.SessionBase.flush() and
-cache_db.SessionStore.flush() methods have been modified to avoid creating
-a new empty session. Maintainers of third-party session backends should
-check if the same vulnerability is present in their backend and correct it
-if so.</p>
-
-<p>This portion of the fix has been assigned <a href="https://security-tracker.debian.org/tracker/CVE-2015-5964">CVE-2015-5964</a>.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-301.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-302.data b/english/lts/security/2015/dla-302.data
deleted file mode 100644
index f71a2cbaae8..00000000000
--- a/english/lts/security/2015/dla-302.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-302-1 zendframework</define-tag>
-<define-tag report_date>2015-8-27</define-tag>
-<define-tag secrefs>CVE-2015-5161</define-tag>
-<define-tag packages>zendframework</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-302.wml b/english/lts/security/2015/dla-302.wml
deleted file mode 100644
index 9adb86074d3..00000000000
--- a/english/lts/security/2015/dla-302.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski discovered that when running under PHP-FPM in a threaded
-environment, Zend Framework, a PHP framework, did not properly handle XML data
-in multibyte encoding. This could be used by remote attackers to perform an XML
-External Entity attack via crafted XML data.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in zendframework
-version 1.10.6-1squeeze5.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-302.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-303.data b/english/lts/security/2015/dla-303.data
deleted file mode 100644
index aa7c7740f23..00000000000
--- a/english/lts/security/2015/dla-303.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-303-1 openjdk-6</define-tag>
-<define-tag report_date>2015-8-28</define-tag>
-<define-tag secrefs>CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760</define-tag>
-<define-tag packages>openjdk-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-303.wml b/english/lts/security/2015/dla-303.wml
deleted file mode 100644
index 6d2fbbe26db..00000000000
--- a/english/lts/security/2015/dla-303.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in the execution
-of arbitrary code, breakouts of the Java sandbox, information
-disclosure, denial of service or insecure cryptography.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openjdk-6
-version 6b36-1.13.8-1~deb6u1.</p>
-
-<p>We recommend that you upgrade your openjdk-6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-303.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-304.data b/english/lts/security/2015/dla-304.data
deleted file mode 100644
index 21c49b7c22b..00000000000
--- a/english/lts/security/2015/dla-304.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-304-1 openslp-dfsg</define-tag>
-<define-tag report_date>2015-9-3</define-tag>
-<define-tag secrefs>CVE-2010-3609 CVE-2012-4428 CVE-2015-5177 Bug#623551 Bug#687597 Bug#795429</define-tag>
-<define-tag packages>openslp-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-304.wml b/english/lts/security/2015/dla-304.wml
deleted file mode 100644
index 00ed635625c..00000000000
--- a/english/lts/security/2015/dla-304.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been found and solved in OpenSLP, that implements the
-Internet Engineering Task Force (IETF) Service Location Protocol standards
-protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3609">CVE-2010-3609</a>
-
- <p>Remote attackers could cause a Denial of Service in the Service Location
- Protocol daemon (SLPD) via a crafted packet with a <q>next extension offset</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4428">CVE-2012-4428</a>
-
- <p>Georgi Geshev discovered that an out-of-bounds read error in the
- SLPIntersectStringList() function could be used to cause a DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5177">CVE-2015-5177</a>
-
- <p>A double free in the SLPDProcessMessage() function could be used to cause
- openslp to crash.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openslp-dfsg
-version 1.2.1-7.8+deb6u1.</p>
-
-<p>We recommend that you upgrade your openslp-dfsg packages.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-304.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-305.data b/english/lts/security/2015/dla-305.data
deleted file mode 100644
index 18a832ce389..00000000000
--- a/english/lts/security/2015/dla-305.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-305-1 screen</define-tag>
-<define-tag report_date>2015-9-05</define-tag>
-<define-tag secrefs>CVE-2015-6806</define-tag>
-<define-tag packages>screen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-305.wml b/english/lts/security/2015/dla-305.wml
deleted file mode 100644
index e9bd91c2afa..00000000000
--- a/english/lts/security/2015/dla-305.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>A vulnerability was found in screen causing a stack overflow which results
-in crashing the screen server process, resulting in denial of service.</p>
-
- <p>See <a href="./dsa-3352">DSA-3352-1</a> for information on other Debian releases.</p>
-
- <p>We recommend that you upgrade your screen packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-305.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-306.data b/english/lts/security/2015/dla-306.data
deleted file mode 100644
index 971ecdf37b3..00000000000
--- a/english/lts/security/2015/dla-306.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-306-1 libvdpau</define-tag>
-<define-tag report_date>2015-9-10</define-tag>
-<define-tag secrefs>CVE-2015-5198 CVE-2015-5199 CVE-2015-5200 Bug#797895</define-tag>
-<define-tag packages>libvdpau</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-306.wml b/english/lts/security/2015/dla-306.wml
deleted file mode 100644
index df64a92acd2..00000000000
--- a/english/lts/security/2015/dla-306.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Florian Weimer of Red Hat Product Security discovered that libvdpau, the
-VDPAU wrapper library, did not properly validate environment variables,
-allowing local attackers to gain additional privileges.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in libvdpau
-version 0.4.1-2+deb6u1. See <a href="./dsa-3355">DSA 3355-1</a> for information on other Debian
-releases.</p>
-
-<p>We recommend that you upgrade your libvdpau packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-306.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-307.data b/english/lts/security/2015/dla-307.data
deleted file mode 100644
index 99b6ab0f178..00000000000
--- a/english/lts/security/2015/dla-307.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-307-1 php5</define-tag>
-<define-tag report_date>2015-9-7</define-tag>
-<define-tag secrefs>CVE-2015-3307 CVE-2015-3411 CVE-2015-3412 CVE-2015-4021 CVE-2015-4022 CVE-2015-4025 CVE-2015-4026 CVE-2015-4147 CVE-2015-4148 CVE-2015-4598 CVE-2015-4599 CVE-2015-4600 CVE-2015-4601 CVE-2015-4602 CVE-2015-4604 CVE-2015-4605 CVE-2015-4643 CVE-2015-4644 CVE-2015-5589 CVE-2015-5590</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-307.wml b/english/lts/security/2015/dla-307.wml
deleted file mode 100644
index 405904be330..00000000000
--- a/english/lts/security/2015/dla-307.wml
+++ /dev/null
@@ -1,93 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3307">CVE-2015-3307</a>
- <p>The phar_parse_metadata function in ext/phar/phar.c in PHP before
- 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote
- attackers to cause a denial of service (heap metadata corruption)
- or possibly have unspecified other impact via a crafted tar archive.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3411">CVE-2015-3411</a> + <a href="https://security-tracker.debian.org/tracker/CVE-2015-3412">CVE-2015-3412</a>
- <p>Fixed bug #69353 (Missing null byte checks for paths in various
- PHP extensions).</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4021">CVE-2015-4021</a>
- <p>The phar_parse_tarfile function in ext/phar/tar.c in PHP
- before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9
- does not verify that the first character of a filename is
- different from the \0 character, which allows remote attackers
- to cause a denial of service (integer underflow and memory
- corruption) via a crafted entry in a tar archive.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4022">CVE-2015-4022</a>
- <p>Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP
- before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows
- remote FTP servers to execute arbitrary code via a long reply to a
- LIST command, leading to a heap-based buffer overflow.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4025">CVE-2015-4025</a>
- <p>PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9
- truncates a pathname upon encountering a \x00 character in certain
- situations, which allows remote attackers to bypass intended
- extension restrictions and access files or directories with
- unexpected names via a crafted argument to (1) set_include_path,
- (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability
- exists because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2006-7243">CVE-2006-7243</a>.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4026">CVE-2015-4026</a>
- <p>The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before
- 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering
- a \x00 character, which might allow remote attackers to bypass
- intended extension restrictions and execute files with unexpected
- names via a crafted first argument. NOTE: this vulnerability exists
- because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2006-7243">CVE-2006-7243</a>.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4147">CVE-2015-4147</a>
- <p>The SoapClient::__call method in ext/soap/soap.c in PHP before
- 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not
- verify that __default_headers is an array, which allows remote
- attackers to execute arbitrary code by providing crafted
- serialized data with an unexpected data type, related to a <q>type
- confusion</q> issue.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4148">CVE-2015-4148</a>
- <p>The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39,
- 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that
- the uri property is a string, which allows remote attackers to
- obtain sensitive information by providing crafted serialized data
- with an int data type, related to a <q>type confusion</q> issue.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4598">CVE-2015-4598</a>
- <p>Incorrect handling of paths with NULs.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4599">CVE-2015-4599</a>
- <p>Type confusion vulnerability in exception::getTraceAsString.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4600">CVE-2015-4600</a> + <a href="https://security-tracker.debian.org/tracker/CVE-2015-4601">CVE-2015-4601</a>
- <p>Added type checks.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4602">CVE-2015-4602</a>
- <p>Type Confusion Infoleak Vulnerability in unserialize() with SoapFault.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4604">CVE-2015-4604</a> + <a href="https://security-tracker.debian.org/tracker/CVE-2015-4605">CVE-2015-4605</a>
- <p>denial of service when processing a crafted file with Fileinfo
- (already fixed in CVE-2015-temp-68819.patch).</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4643">CVE-2015-4643</a>
- <p>Improved fix for bug #69545 (Integer overflow in ftp_genlist()
- resulting in heap overflow).</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4644">CVE-2015-4644</a>
- <p>Fixed bug #69667 (segfault in php_pgsql_meta_data).</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5589">CVE-2015-5589</a>
- <p>Segfault in Phar::convertToData on invalid file.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5590">CVE-2015-5590</a>
- <p>Buffer overflow and stack smashing error in phar_fix_filepath.</p></li>
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-307.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-308.data b/english/lts/security/2015/dla-308.data
deleted file mode 100644
index 9e9c06f4a41..00000000000
--- a/english/lts/security/2015/dla-308.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-308-1 bind9</define-tag>
-<define-tag report_date>2015-9-10</define-tag>
-<define-tag secrefs>CVE-2015-5722</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-308.wml b/english/lts/security/2015/dla-308.wml
deleted file mode 100644
index 7744756ef60..00000000000
--- a/english/lts/security/2015/dla-308.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hanno Böck from the Fuzzing Project discovered that incorrect validation of
-DNSSEC-signed records in the Bind DNS server could result in denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in bind9 version
-1:9.7.3.dfsg-1~squeeze17. We recomend you to upgrade your bind9 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-308.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-309.data b/english/lts/security/2015/dla-309.data
deleted file mode 100644
index 5d578b99267..00000000000
--- a/english/lts/security/2015/dla-309.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-309-1 openldap</define-tag>
-<define-tag report_date>2015-9-14</define-tag>
-<define-tag secrefs>CVE-2015-6908 Bug#798622</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-309.wml b/english/lts/security/2015/dla-309.wml
deleted file mode 100644
index fcbb284b22c..00000000000
--- a/english/lts/security/2015/dla-309.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Denis Andzakovic discovered that OpenLDAP, a free implementation of the
-Lightweight Directory Access Protocol, does not properly handle BER
-data. An unauthenticated remote attacker can use this flaw to cause a
-denial of service (slapd daemon crash) via a specially crafted packet.</p>
-
-<p>The Squeeze-LTS package has been prepared by Ryan Tandy.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-309.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-310.data b/english/lts/security/2015/dla-310.data
deleted file mode 100644
index 44972bc9a22..00000000000
--- a/english/lts/security/2015/dla-310.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-310-1 linux-2.6</define-tag>
-<define-tag report_date>2015-9-21</define-tag>
-<define-tag secrefs>CVE-2015-0272 CVE-2015-5156 CVE-2015-5364 CVE-2015-5366 CVE-2015-5697 CVE-2015-5707 CVE-2015-6937</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-310.wml b/english/lts/security/2015/dla-310.wml
deleted file mode 100644
index 78cbc2127b8..00000000000
--- a/english/lts/security/2015/dla-310.wml
+++ /dev/null
@@ -1,71 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0272">CVE-2015-0272</a>
-
- <p>It was discovered that NetworkManager would set IPv6 MTUs based on
- the values received in IPv6 RAs (Router Advertisements), without
- sufficiently validating these values. A remote attacker could
- exploit this attack to disable IPv6 connectivity. This has been
- mitigated by adding validation in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5156">CVE-2015-5156</a>
-
- <p>Jason Wang discovered that when a virtio_net device is connected
- to a bridge in the same VM, a series of TCP packets forwarded
- through the bridge may cause a heap buffer overflow. A remote
- attacker could use this to cause a denial of service (crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5364">CVE-2015-5364</a>
-
- <p>It was discovered that the Linux kernel does not properly handle
- invalid UDP checksums. A remote attacker could exploit this flaw to
- cause a denial of service using a flood of UDP packets with invalid
- checksums.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5366">CVE-2015-5366</a>
-
- <p>It was discovered that the Linux kernel does not properly handle
- invalid UDP checksums. A remote attacker can cause a denial of
- service against applications that use epoll by injecting a single
- packet with an invalid checksum.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5697">CVE-2015-5697</a>
-
- <p>A flaw was discovered in the md driver in the Linux kernel leading
- to an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5707">CVE-2015-5707</a>
-
- <p>An integer overflow in the SCSI generic driver in the Linux kernel
- was discovered. A local user with write permission on a SCSI generic
- device could potentially exploit this flaw for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6937">CVE-2015-6937</a>
-
- <p>It was found that the Reliable Datagram Sockets (RDS) protocol
- implementation did not verify that an underlying transport exists
- when creating a connection. Depending on how a local RDS
- application initialised its sockets, a remote attacker might be
- able to cause a denial of service (crash) by sending a crafted
- packet.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze14.</p>
-
-<p>For the oldstable distribution (wheezy), these problems have been
-fixed in version 3.2.68-1+deb7u4 or earlier.</p>
-
-<p>For the stable distribution (jessie), these problems have been fixed
-in version 3.16.7-ckt11-1+deb8u4 or earlier.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-310.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-311.data b/english/lts/security/2015/dla-311.data
deleted file mode 100644
index 001684cc7bb..00000000000
--- a/english/lts/security/2015/dla-311.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-311-1 rpcbind</define-tag>
-<define-tag report_date>2015-9-20</define-tag>
-<define-tag secrefs>CVE-2015-7236</define-tag>
-<define-tag packages>rpcbind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-311.wml b/english/lts/security/2015/dla-311.wml
deleted file mode 100644
index 8eb787080bc..00000000000
--- a/english/lts/security/2015/dla-311.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free vulnerability in rpcbind causing remotely triggerable crash
-was found. Rpcbind crashes in svc_dodestroy when trying to free a corrupted
-xprt-&gt;xp_netid pointer, which contains a sockaddr_in.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-311.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-312.data b/english/lts/security/2015/dla-312.data
deleted file mode 100644
index 7e9c664a971..00000000000
--- a/english/lts/security/2015/dla-312.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-312-1 libtorrent-rasterbar</define-tag>
-<define-tag report_date>2015-9-20</define-tag>
-<define-tag secrefs>CVE-2015-5685 Bug#797046</define-tag>
-<define-tag packages>libtorrent-rasterbar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-312.wml b/english/lts/security/2015/dla-312.wml
deleted file mode 100644
index 478f472ac45..00000000000
--- a/english/lts/security/2015/dla-312.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The lazy_bdecode function in BitTorrent DHT bootstrap server (bootstrap-dht )
-allows remote attackers to execute arbitrary code via a crafted packet, related
-to "improper indexing."</p>
-
-
-<p>Note while this CVE was reported against BitTorrent DHT Bootstrapt server,
-the same vulnerable code is available in libtorrent-rasterbar.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-312.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-313.data b/english/lts/security/2015/dla-313.data
deleted file mode 100644
index 45f838fa82d..00000000000
--- a/english/lts/security/2015/dla-313.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-313-1 virtualbox-ose</define-tag>
-<define-tag report_date>2015-9-29</define-tag>
-<define-tag secrefs>CVE-2013-3792 CVE-2014-2486 CVE-2014-2488 CVE-2014-2489 CVE-2015-2594</define-tag>
-<define-tag packages>virtualbox-ose</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-313.wml b/english/lts/security/2015/dla-313.wml
deleted file mode 100644
index 13eae22965d..00000000000
--- a/english/lts/security/2015/dla-313.wml
+++ /dev/null
@@ -1,70 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The latest maintenance release of the VirtualBox (OSE) 3.2.x series
-(i.e., version 3.2.28) has been uploaded to Debian LTS (squeeze). Thanks
-to Gianfranco Costamagna for preparing packages for review and upload by
-the Debian LTS Team.</p>
-
-<p>Unfortunately, Oracle no longer provides information on specific security
-vulnerabilities in VirtualBox, thus we provide their latest 3.2.28
-maintenance release in Debian LTS (squeeze) directly.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-3792">CVE-2013-3792</a>
-
- <p>Oracle reported an unspecified vulnerability in the Oracle VM
- VirtualBox component in Oracle Virtualization VirtualBox prior to
- 3.2.18, 4.0.20, 4.1.28, and 4.2.18 allows local users to affect
- availability via unknown vectors related to Core.</p>
-
- <p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2013-3792">CVE-2013-3792</a> prevents a virtio-net host DoS
- vulnerability by adding large frame support to IntNet, VirtioNet and
- NetFilter plus dropping oversized frames.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2486">CVE-2014-2486</a>
-
- <p>Unspecified vulnerability in the Oracle VM VirtualBox component
- in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26,
- 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity
- and availability via unknown vectors related to Core.</p>
-
- <p>No further details have been provided, the attack range has been
- given as local, severity low.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2488">CVE-2014-2488</a>
-
- <p>Unspecified vulnerability in the Oracle VM VirtualBox component in
- Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34,
- 4.2.26, and 4.3.12 allows local users to affect confidentiality via
- unknown vectors related to Core.</p>
-
- <p>No further details can been provided, the attack range has been
- given as local, severity low.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2489">CVE-2014-2489</a>
-
- <p>Unspecified vulnerability in the Oracle VM VirtualBox component in
- Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34,
- 4.2.26, and 4.3.12 allows local users to affect confidentiality,
- integrity, and availability via unknown vectors related to Core.</p>
-
- <p>No further details can been provided, the attack range has been
- given as local, severity medium.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2594">CVE-2015-2594</a>
-
- <p>Unspecified vulnerability in the Oracle VM VirtualBox component
- in Oracle Virtualization VirtualBox prior to 4.0.32, 4.1.40,
- 4.2.32, and 4.3.30 allows local users to affect confidentiality,
- integrity, and availability via unknown vectors related to Core.</p>
-
- <p>This update fixes an issue related to guests using bridged networking
- via WiFi.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-313.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-314.data b/english/lts/security/2015/dla-314.data
deleted file mode 100644
index d5fb2c8452f..00000000000
--- a/english/lts/security/2015/dla-314.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-314-1 cups</define-tag>
-<define-tag report_date>2015-9-24</define-tag>
-<define-tag secrefs>CVE-2015-3258 CVE-2015-3279</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-314.wml b/english/lts/security/2015/dla-314.wml
deleted file mode 100644
index dca16bd8d73..00000000000
--- a/english/lts/security/2015/dla-314.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Petr Sklenar of Red Hat discovered that the texttopdf tool, part of cups
-filters, was susceptible to multiple heap-based buffer and integer overflows
-due to improper handling of print jobs. This could allow remote attackers to
-crash texttopdf or possibly execute arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in cups version
-1.4.4-7+squeeze10. For Wheezy and Jessie, this has been fixed in the
-cups-filter package. We recommend you to upgrade your cups packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-314.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-315.data b/english/lts/security/2015/dla-315.data
deleted file mode 100644
index 8a1a6be58dc..00000000000
--- a/english/lts/security/2015/dla-315.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-315-1 nss</define-tag>
-<define-tag report_date>2015-9-27</define-tag>
-<define-tag secrefs>CVE-2015-2721 CVE-2015-2730</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-315.wml b/english/lts/security/2015/dla-315.wml
deleted file mode 100644
index 149e21e4ce4..00000000000
--- a/english/lts/security/2015/dla-315.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in nss, the Mozilla Network
-Security Service library. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2721">CVE-2015-2721</a>
-
- <p>Karthikeyan Bhargavan discovered that NSS incorrectly handles state
- transitions for the TLS state machine. A man-in-the-middle attacker
- could exploit this flaw to skip the ServerKeyExchange message and
- remove the forward-secrecy property.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2730">CVE-2015-2730</a>
-
- <p>Watson Ladd discovered that NSS does not properly perform Elliptical
- Curve Cryptography (ECC) multiplication, allowing a remote attacker
- to potentially spoof ECDSA signatures.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been fixed
-in version 3.12.8-1+squeeze12.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-315.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-316.data b/english/lts/security/2015/dla-316.data
deleted file mode 100644
index 42c6590abd1..00000000000
--- a/english/lts/security/2015/dla-316.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-316-1 eglibc</define-tag>
-<define-tag report_date>2015-9-27</define-tag>
-<define-tag secrefs>CVE-2014-8121</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-316.wml b/english/lts/security/2015/dla-316.wml
deleted file mode 100644
index 59ac12bd2e9..00000000000
--- a/english/lts/security/2015/dla-316.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in eglibc that
-may lead to a privilege escalation or denial of service.</p>
-
-<ul>
-
-<li>Glibc pointer guarding weakness
-
- <p>A weakness in the dynamic loader prior has been found. The issue is
- that the LD_POINTER_GUARD in the environment is not sanitized
- allowing local attackers easily to bypass the pointer guarding
- protection on set-user-ID and set-group-ID programs.</p></li>
-
-<li>Potential application crash due to overread in fnmatch
-
- <p>When processing certain malformed patterns, fnmatch can skip over the
- NUL byte terminating the pattern. This can potentially result in an
- application crash if fnmatch hits an unmapped page before
- encountering a NUL byte.</p></li>
-
-<li>_IO_wstr_overflow integer overflow
-
- <p>A miscalculation in _IO_wstr_overflow could potentially be exploited
- to overflow a buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8121">CVE-2014-8121</a>
-
- <p>DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS)
- in GNU C Library (aka glibc or libc6) 2.21 and earlier does not
- properly check if a file is open, which allows remote attackers to
- cause a denial of service (infinite loop) by performing a look-up
- while the database is iterated over the database, which triggers the
- file pointer to be reset.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been fixed
-in version 2.11.3-4+deb6u7.</p>
-
-<p>We recommend that you update your packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-316.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-317.data b/english/lts/security/2015/dla-317.data
deleted file mode 100644
index bdaada29c3c..00000000000
--- a/english/lts/security/2015/dla-317.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-317-1 vorbis-tools</define-tag>
-<define-tag report_date>2015-9-29</define-tag>
-<define-tag secrefs>CVE-2014-9638 CVE-2014-9639 CVE-2014-9640 CVE-2015-6749 Bug##771363 Bug##797461 Bug##776086</define-tag>
-<define-tag packages>vorbis-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-317.wml b/english/lts/security/2015/dla-317.wml
deleted file mode 100644
index a6471686c60..00000000000
--- a/english/lts/security/2015/dla-317.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various issues have been fixed in Debian LTS (squeeze) for package
-vorbis-tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9638">CVE-2014-9638</a>
-
- <p>A crafted WAV file with number of channels set to 0 will cause oggenc
- to crash due to a division by zero issue. This issue has been fixed
- upstream by providing a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-9639">CVE-2014-9639</a>. Reported upstream by
- <q>zuBux</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9639">CVE-2014-9639</a>
-
- <p>An integer overflow issue was discovered in oggenc, related to the
- number of channels in the input WAV file. The issue triggers an
- out-of-bounds memory access which causes oggenc to crash here
- (audio.c). Reported upstream by <q>zuBux</q>.</p>
-
- <p>The upstream fix for this has been backported to vorbis-tools in
- Debian LTS (squeeze).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9640">CVE-2014-9640</a>
-
- <p>Fix for a crash on closing raw input (dd if=/dev/zero bs=1 count=1 |
- oggenc -r - -o out.ogg). Reported upstream by <q>hanno</q>.</p>
-
- <p>The upstream fix for this has been backported to vorbis-tools in
- Debian LTS (squeeze).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6749">CVE-2015-6749</a>
-
- <p>Buffer overflow in the aiff_open function in oggenc/audio.c in
- vorbis-tools 1.4.0 and earlier allowed remote attackers to cause a
- denial of service (crash) via a crafted AIFF file. Reported upstream
- by <q>pengsu</q>.</p>
-
- <p>The upstream fix for this has been backported to vorbis-tools in
- Debian LTS (squeeze).</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-317.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-318.data b/english/lts/security/2015/dla-318.data
deleted file mode 100644
index fc2faf1d19a..00000000000
--- a/english/lts/security/2015/dla-318.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-318-1 flightgear</define-tag>
-<define-tag report_date>2015-9-29</define-tag>
-<define-tag secrefs>Bug#780712</define-tag>
-<define-tag packages>flightgear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-318.wml b/english/lts/security/2015/dla-318.wml
deleted file mode 100644
index 56a4a3c7bec..00000000000
--- a/english/lts/security/2015/dla-318.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that flightgear, a Flight Gear Flight Simulator
-game, did not perform adequate filesystem validation checks in its
-fgValidatePath routine.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-318.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-319.data b/english/lts/security/2015/dla-319.data
deleted file mode 100644
index e40320e4392..00000000000
--- a/english/lts/security/2015/dla-319.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-319-1 freetype</define-tag>
-<define-tag report_date>2015-9-30</define-tag>
-<define-tag secrefs>CVE-2014-9745 CVE-2014-9746 CVE-2014-9747 Bug#798619 Bug#798620</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-319.wml b/english/lts/security/2015/dla-319.wml
deleted file mode 100644
index 3b486e3beb1..00000000000
--- a/english/lts/security/2015/dla-319.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sergey Gorbaty reported issues related to the FreeType font engine.
-FreeType improperly handled certain malformed font files, allowing
-remote attackers to cause a Denial of Service when specially crafted
-font files were used.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in freetype version
-2.4.2-2.1+squeeze6. We recommend you to upgrade your freetype packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-319.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-320.data b/english/lts/security/2015/dla-320.data
deleted file mode 100644
index 331873835d8..00000000000
--- a/english/lts/security/2015/dla-320.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-320-1 libemail-address-perl</define-tag>
-<define-tag report_date>2015-9-30</define-tag>
-<define-tag packages>libemail-address-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-320.wml b/english/lts/security/2015/dla-320.wml
deleted file mode 100644
index 4168f8669ae..00000000000
--- a/english/lts/security/2015/dla-320.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Pali Rohár <a href="http://www.openwall.com/lists/oss-security/2015/09/27/1">discovered</a> a possible DoS attack in any software which uses
-the Email::Address Perl module for parsing string input to a list of
-email addresses.</p>
-
-<p>By default Email::Address module, version v1.907 (and all before) tries to
-understand nestable comments in an input string with depth level 2.</p>
-
-<p>With specially crafted inputs, parsing nestable comments can become too
-slow and can cause high CPU load, freeze the application and end in
-Denial of Service.</p>
-
-<p>Because input strings for Email::Address module come from external
-sources (e.g. from email sent by an attacker) it is a security problem
-impacting on all software applications which parse email messages using
-the Email::Address Perl module.</p>
-
-<p>With this upload of libemail-address-perl, the default value of nestable
-comments has been set to depth level 1 (as proposed by upstream). Please
-note that this is not proper a fix, just a workaround for pathological
-inputs with nestable comments.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-320.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-321.data b/english/lts/security/2015/dla-321.data
deleted file mode 100644
index af55b1dcbfc..00000000000
--- a/english/lts/security/2015/dla-321.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-321-1 wordpress</define-tag>
-<define-tag report_date>2015-9-30</define-tag>
-<define-tag secrefs>CVE-2015-5714 CVE-2015-5715 Bug##799140</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-321.wml b/english/lts/security/2015/dla-321.wml
deleted file mode 100644
index 86e27ab0723..00000000000
--- a/english/lts/security/2015/dla-321.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various security issue have been fixed in the Debian LTS (squeeze)
-version of the Wordpress content management system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5714">CVE-2015-5714</a>
-
- <p>A cross-site scripting vulnerability when processing shortcode tags
- has been discovered.</p>
-
- <p>The issue has been fixed by not allowing unclosed HTML elements in
- attributes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5715">CVE-2015-5715</a>
-
- <p>A vulnerability has been discovered, allowing users without proper
- permissions to publish private posts and make them sticky.</p>
-
- <p>The issue has been fixed in the XMLRPC code of Wordpress by not
- allowing private posts to be sticky.</p></li>
-
-<li>Other issue(s)
-
- <p>A cross-site scripting vulnerability in user list tables has been
- discovered.</p>
-
- <p>The issue has been fixed by URL-escaping email addresses in those user
- lists.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-321.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-322.data b/english/lts/security/2015/dla-322.data
deleted file mode 100644
index 4bb4355db23..00000000000
--- a/english/lts/security/2015/dla-322.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-322-1 commons-httpclient</define-tag>
-<define-tag report_date>2015-10-1</define-tag>
-<define-tag secrefs>CVE-2015-5262</define-tag>
-<define-tag packages>commons-httpclient</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-322.wml b/english/lts/security/2015/dla-322.wml
deleted file mode 100644
index e737b9e2d1f..00000000000
--- a/english/lts/security/2015/dla-322.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Trevin Beattie [1] <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1259892">discovered</a> an issue where one could observe hanging
-threads in a multi-threaded Java application. After debugging the issue,
-it became evident that the hanging threads were caused by the SSL
-initialization code in commons-httpclient.</p>
-
-<p>This upload fixes this issue by respecting the configured SO_TIMEOUT
-during SSL handshakes with the server.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-322.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-323.data b/english/lts/security/2015/dla-323.data
deleted file mode 100644
index 2ec9463fcb4..00000000000
--- a/english/lts/security/2015/dla-323.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-323-1 fuseiso</define-tag>
-<define-tag report_date>2015-10-1</define-tag>
-<define-tag secrefs>Bug##779047</define-tag>
-<define-tag packages>fuseiso</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-323.wml b/english/lts/security/2015/dla-323.wml
deleted file mode 100644
index 230eae79cbb..00000000000
--- a/english/lts/security/2015/dla-323.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following two issues have recently been fixed in Debian LTS (squeeze)
-for the fuseiso package.</p>
-
-<p>Issue 1</p>
-
- <p>An integer overflow, leading to a heap-based buffer overflow flaw was
- found in the way FuseISO, a FUSE module to mount ISO filesystem
- images, performed reading of certain ZF blocks of particular inodes.
- A remote attacker could provide a specially-crafted ISO file that,
- when mounted via the fuseiso tool would lead to fuseiso binary crash.</p>
-
- <p>This issue was discovered by Florian Weimer of Red Hat Product
- Security Team.</p>
-
- <p>The issue got resolve by bailing out before ZF blocks that exceed the
- supported block size of 2^17 are to be read.</p>
-
-<p>Issue 2</p>
-
- <p>A stack-based buffer overflow flaw was found in the way FuseISO, a
- FUSE module to mount ISO filesystem images, performed expanding of
- directory portions for absolute path filename entries. A remote
- attacker could provide a specially-crafted ISO file that, when
- mounted via fuseiso tool would lead to fuseiso binary crash or,
- potentially, arbitrary code execution with the privileges of the user
- running the fuseiso executable.</p>
-
- <p>This issue was discovered by Florian Weimer of Red Hat Product
- Security Team.</p>
-
- <p>The issue got resolved by checking the resulting length of an
- absolute path name and by bailing out if the platform's PATH_MAX
- value gets exceeded.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-323.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-324.data b/english/lts/security/2015/dla-324.data
deleted file mode 100644
index e5b8667ae8b..00000000000
--- a/english/lts/security/2015/dla-324.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-324-1 binutils</define-tag>
-<define-tag report_date>2015-10-02</define-tag>
-<define-tag secrefs>CVE-2012-3509 Bug#688951</define-tag>
-<define-tag packages>binutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-324.wml b/english/lts/security/2015/dla-324.wml
deleted file mode 100644
index ff520da5437..00000000000
--- a/english/lts/security/2015/dla-324.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes several issues as described below.</p>
-
-<ul>
-
-<li>PR ld/12613 (no CVE assigned)
-
- <p>Niranjan Hasabnis discovered that passing an malformed linker
- script to GNU ld, part of binutils, may result in a stack buffer
- overflow. If the linker is used with untrusted object files, this
- would allow remote attackers to cause a denial of service (crash)
- or possibly privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3509">CVE-2012-3509</a>, #688951
-
- <p>Sang Kil Cha discovered that a buffer size calculation in
- libiberty, part of binutils, may result in integer overflow and
- then a heap buffer overflow. If libiberty or the commands in
- binutils are used to read untrusted binaries, this would allow
- remote attackers to cause a denial of service (crash) or possibly
- privilege escalation.</p></li>
-
-<li>PR binutils/18750 (no CVE assigned)
-
- <p>Joshua Rogers reported that passing a malformed ihex (Intel
- hexadecimal) file to to various commands in binutils may result in
- a stack buffer overflow. A similar issue was found in readelf.
- If these commands are used to read untrusted binaries, this would
- allow remote attackers to cause a denial of service (crash) or
- possibly privilege escalation.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.20.1-16+deb6u2.</p>
-
-<p>For the oldstable distribution (wheezy) and the stable distribution
-(jessie), PR ld/12613 and <a href="https://security-tracker.debian.org/tracker/CVE-2012-3509">CVE-2012-3509</a> were fixed before release, and
-PR binutils/18750 will be fixed in a later update.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-324.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-325.data b/english/lts/security/2015/dla-325.data
deleted file mode 100644
index d6668a4216e..00000000000
--- a/english/lts/security/2015/dla-325.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-325-1 linux-2.6</define-tag>
-<define-tag report_date>2015-10-12</define-tag>
-<define-tag secrefs>CVE-2015-2925 CVE-2015-5257 CVE-2015-7613</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-325.wml b/english/lts/security/2015/dla-325.wml
deleted file mode 100644
index 3e9055e7bd9..00000000000
--- a/english/lts/security/2015/dla-325.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2925">CVE-2015-2925</a>
-
- <p>Jann Horn discovered that when a subdirectory of a filesystem was
- bind-mounted into a chroot or mount namespace, a user that should
- be confined to that chroot or namespace could access the whole of
- that filesystem if they had write permission on an ancestor of
- the subdirectory. This is not a common configuration for this
- kernel version.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5257">CVE-2015-5257</a>
-
- <p>Moein Ghasemzadeh of Istuary Innovation Labs reported that a USB
- device could cause a denial of service (crash) by imitating a
- Whiteheat USB serial device but presenting a smaller number of
- endpoints.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7613">CVE-2015-7613</a>
-
- <p>Dmitry Vyukov discovered that System V IPC objects (message queues
- and shared memory segments) were made accessible before their
- ownership and other attributes were fully initialised. If a local
- user can race against another user or service creating a new IPC
- object, this may result in unauthorised information disclosure,
- unauthorised information modification, denial of service and/or
- privilege escalation.</p>
-
- <p>A similar issue existed with System V semaphore arrays, but was
- less severe because they were always cleared before being fully
- initialised.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze16.</p>
-
-<p>For the oldstable distribution (wheezy), these problems will be fixed
-in version 3.2.68-1+deb7u5.</p>
-
-<p>For the stable distribution (jessie), these problems will be fixed
-in version 3.16.7-ckt11-1+deb8u5 or have been fixed earlier.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-325.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-326.data b/english/lts/security/2015/dla-326.data
deleted file mode 100644
index 859f8ca4e69..00000000000
--- a/english/lts/security/2015/dla-326.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-326-1 zendframework</define-tag>
-<define-tag report_date>2015-10-15</define-tag>
-<define-tag secrefs>CVE-2015-7695</define-tag>
-<define-tag packages>zendframework</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-326.wml b/english/lts/security/2015/dla-326.wml
deleted file mode 100644
index 8489564daa5..00000000000
--- a/english/lts/security/2015/dla-326.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The PDO adapters of Zend Framework 1 did not filter null bytes values in
-SQL statements. A PDO adapter can treat null bytes in a query as a
-string terminator, allowing an attacker to add arbitrary SQL following a
-null byte, and thus create a SQL injection.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in zendframework
-version 1.10.6-1squeeze6.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-326.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-327.data b/english/lts/security/2015/dla-327.data
deleted file mode 100644
index e54d645828a..00000000000
--- a/english/lts/security/2015/dla-327.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-327-1 freeimage</define-tag>
-<define-tag report_date>2015-10-18</define-tag>
-<define-tag secrefs>CVE-2015-0852</define-tag>
-<define-tag packages>freeimage</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-327.wml b/english/lts/security/2015/dla-327.wml
deleted file mode 100644
index e3e94bbd681..00000000000
--- a/english/lts/security/2015/dla-327.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple integer underflows in PluginPCX.cpp in FreeImage 3.17.0 and earlier
-allow remote attackers to cause a denial of service (heap memory corruption)
-via vectors related to the height and width of a window.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-327.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-328.data b/english/lts/security/2015/dla-328.data
deleted file mode 100644
index 3be4bc5e2d0..00000000000
--- a/english/lts/security/2015/dla-328.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-328-1 tzdata</define-tag>
-<define-tag report_date>2015-10-18</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-328.wml b/english/lts/security/2015/dla-328.wml
deleted file mode 100644
index c69bba0ebce..00000000000
--- a/english/lts/security/2015/dla-328.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 2015g, with changes to the following
-timezones compared to the current version in squeeze-lts:</p>
-
-<ul>
-<li>Fiji</li>
-<li>Fort Nelson, British Columbia</li>
-<li>Morroco</li>
-<li>Norfolk Island</li>
-<li>North Korea</li>
-<li>Turkey</li>
-<li>Uruguay</li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tzdata version 2015g-0+deb6u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-328.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-329.data b/english/lts/security/2015/dla-329.data
deleted file mode 100644
index b9a385e344f..00000000000
--- a/english/lts/security/2015/dla-329.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-329-1 postgresql-8.4</define-tag>
-<define-tag report_date>2015-10-19</define-tag>
-<define-tag packages>postgresql-8.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-329.wml b/english/lts/security/2015/dla-329.wml
deleted file mode 100644
index fa4f4dba267..00000000000
--- a/english/lts/security/2015/dla-329.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several bugs were discovered in PostgreSQL, a relational database server
-system. The 8.4 branch is EOLed upstream, but still present in Debian squeeze.
-This new LTS minor version contains the fixes that were applied upstream to the
-9.0.22 version, backported to 8.4.22 which was the last version officially
-released by the PostgreSQL developers. This LTS effort for squeeze-lts is a
-community project sponsored by credativ GmbH.</p>
-
-<h3>Migration to Version 8.4.22lts5</h3>
-
-<p>A dump/restore is not required for those running 8.4.X. However, if you are
-upgrading from a version earlier than 8.4.22, see the relevant release notes.</p>
-
-<h3>Security Fixes</h3>
-
-<p>Fix contrib/pgcrypto to detect and report too-short crypt salts (Josh
-Kupershmidt)</p>
-
-<p>Certain invalid salt arguments crashed the server or disclosed a few
-bytes of server memory. We have not ruled out the viability of attacks
-that arrange for presence of confidential information in the disclosed
-bytes, but they seem unlikely. (<a href="https://security-tracker.debian.org/tracker/CVE-2015-5288">CVE-2015-5288</a>)</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-329.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-330.data b/english/lts/security/2015/dla-330.data
deleted file mode 100644
index 0c8b3ce6f59..00000000000
--- a/english/lts/security/2015/dla-330.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-330-1 unzip</define-tag>
-<define-tag report_date>2015-10-22</define-tag>
-<define-tag secrefs>CVE-2015-7696 CVE-2015-7697 Bug#802160 Bug#802162</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-330.wml b/english/lts/security/2015/dla-330.wml
deleted file mode 100644
index 0afae59f7f0..00000000000
--- a/english/lts/security/2015/dla-330.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gustavo Grieco discovered with a fuzzer that unzip was vulnerable to a
-heap overflow and to a denial of service with specially crafted
-password-protected ZIP archives.</p>
-
-<p>For the Debian 6 squeeze, these issues haven been fixed in unzip
-6.0-4+deb6u3.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-330.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-331.data b/english/lts/security/2015/dla-331.data
deleted file mode 100644
index 2473bdf673b..00000000000
--- a/english/lts/security/2015/dla-331.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-331-1 polarssl</define-tag>
-<define-tag report_date>2015-10-22</define-tag>
-<define-tag secrefs>CVE-2015-5291</define-tag>
-<define-tag packages>polarssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-331.wml b/english/lts/security/2015/dla-331.wml
deleted file mode 100644
index bd7cc282c3f..00000000000
--- a/english/lts/security/2015/dla-331.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in PolarSSl and mbed TLS:</p>
-
-<p>When the client creates its ClientHello message, due to insufficient bounds
-checking it can overflow the heap-based buffer containing the message while
-writing some extensions. Two extensions in particular could be used by a remote
-attacker to trigger the overflow: the session ticket extension and the server
-name indication (SNI) extension.</p>
-
-<p>Although most of the vulnerable code is not present in the Squeeze version,
-this upload contains at least a length check for incoming data.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-331.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-332.data b/english/lts/security/2015/dla-332.data
deleted file mode 100644
index c7237d23b5f..00000000000
--- a/english/lts/security/2015/dla-332.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-332-1 optipng</define-tag>
-<define-tag report_date>2015-10-22</define-tag>
-<define-tag secrefs>CVE-2015-7801</define-tag>
-<define-tag packages>optipng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-332.wml b/english/lts/security/2015/dla-332.wml
deleted file mode 100644
index 10807b83b28..00000000000
--- a/english/lts/security/2015/dla-332.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gustavo Grieco discovered a use-after-free causing an invalid/double
-free in optipng 0.6.4.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in optipng version
-0.6.4-1+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-332.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-333.data b/english/lts/security/2015/dla-333.data
deleted file mode 100644
index ea6438e2d56..00000000000
--- a/english/lts/security/2015/dla-333.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-333-1 cakephp</define-tag>
-<define-tag report_date>2015-10-23</define-tag>
-<define-tag packages>cakephp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-333.wml b/english/lts/security/2015/dla-333.wml
deleted file mode 100644
index b3dbce2758e..00000000000
--- a/english/lts/security/2015/dla-333.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>CakePHP, an open-source web application framework for PHP, was
-vulnerable to SSRF (Server Side
-Request Forgery) attacks. Remote attacker can utilize it for at least
-DoS (Denial of Service) attacks, if the target application accepts XML
-as an input. It is caused by insecure design of Cake's Xml class.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in cakephp version
-1.3.2-1.1+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-333.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-334-2.data b/english/lts/security/2015/dla-334-2.data
deleted file mode 100644
index 4374aa581c6..00000000000
--- a/english/lts/security/2015/dla-334-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-334-2 libxml2</define-tag>
-<define-tag report_date>2015-10-26</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-334-2.wml b/english/lts/security/2015/dla-334-2.wml
deleted file mode 100644
index 05dc5c1597a..00000000000
--- a/english/lts/security/2015/dla-334-2.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Unfortunately I mixed up the build of the i386 version of the libxml2
-package. dpkg did not understand the contents of an included trigger
-file and threw an error message.
-This new upload should fix this and you can get rid of the error message
-with for example:
- apt-get update; apt-get -f install</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxml2 version 2.7.8.dfsg-2+squeeze14</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-334-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-334.data b/english/lts/security/2015/dla-334.data
deleted file mode 100644
index 1247f105913..00000000000
--- a/english/lts/security/2015/dla-334.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-334-1 libxml2</define-tag>
-<define-tag report_date>2015-10-25</define-tag>
-<define-tag secrefs>CVE-2015-7942 Bug#802827</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-334.wml b/english/lts/security/2015/dla-334.wml
deleted file mode 100644
index 7884bda0495..00000000000
--- a/english/lts/security/2015/dla-334.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Crafted xml causes out of bound memory access. heap-buffer-overflow in
-xmlParseConditionalSections.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-334.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-335.data b/english/lts/security/2015/dla-335.data
deleted file mode 100644
index 786bfe8ba0d..00000000000
--- a/english/lts/security/2015/dla-335.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-335-1 ntp</define-tag>
-<define-tag report_date>2015-10-28</define-tag>
-<define-tag secrefs>CVE-2015-5146 CVE-2015-5194 CVE-2015-5195 CVE-2015-5219 CVE-2015-5300 CVE-2015-7691 CVE-2015-7692 CVE-2015-7701 CVE-2015-7702 CVE-2015-7703 CVE-2015-7704 CVE-2015-7850 CVE-2015-7851 CVE-2015-7852 CVE-2015-7855 CVE-2015-7871</define-tag>
-<define-tag packages>ntp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-335.wml b/english/lts/security/2015/dla-335.wml
deleted file mode 100644
index 7ee148ac7ad..00000000000
--- a/english/lts/security/2015/dla-335.wml
+++ /dev/null
@@ -1,152 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues where found in ntp:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5146">CVE-2015-5146</a>
-
- <p>A flaw was found in the way ntpd processed certain remote
- configuration packets. An attacker could use a specially crafted
- package to cause ntpd to crash if:</p>
- <ul>
- <li>ntpd enabled remote configuration</li>
- <li>The attacker had the knowledge of the configuration password</li>
- <li>The attacker had access to a computer entrusted to perform remote
- configuration</li>
- </ul>
-
- <p>Note that remote configuration is disabled by default in NTP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5194">CVE-2015-5194</a>
-
- <p>It was found that ntpd could crash due to an uninitialized variable
- when processing malformed logconfig configuration commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5195">CVE-2015-5195</a>
-
- <p>It was found that ntpd exits with a segmentation fault when a
- statistics type that was not enabled during compilation (e.g.
- timingstats) is referenced by the statistics or filegen
- configuration command</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5219">CVE-2015-5219</a>
-
- <p>It was discovered that sntp program would hang in an infinite loop when
- a crafted NTP packet was received, related to the conversion of the
- precision value in the packet to double.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5300">CVE-2015-5300</a>
-
- <p>It was found that ntpd did not correctly implement the -g option:</p>
-
- <p>Normally, ntpd exits with a message to the system log if the offset
- exceeds the panic threshold, which is 1000 s by default. This
- option allows the time to be set to any value without restriction;
- however, this can happen only once. If the threshold is exceeded
- after that, ntpd will exit with a message to the system log. This
- option can be used with the -q and -x options.</p>
-
- <p>ntpd could actually step the clock multiple times by more than the
- panic threshold if its clock discipline doesn't have enough time to
- reach the sync state and stay there for at least one update. If a
- man-in-the-middle attacker can control the NTP traffic since ntpd
- was started (or maybe up to 15-30 minutes after that), they can
- prevent the client from reaching the sync state and force it to step
- its clock by any amount any number of times, which can be used by
- attackers to expire certificates, etc.</p>
-
- <p>This is contrary to what the documentation says. Normally, the
- assumption is that an MITM attacker can step the clock more than the
- panic threshold only once when ntpd starts and to make a larger
- adjustment the attacker has to divide it into multiple smaller
- steps, each taking 15 minutes, which is slow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7691">CVE-2015-7691</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-7692">CVE-2015-7692</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-7702">CVE-2015-7702</a>
-
- <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-9750">CVE-2014-9750</a> was incomplete: three
- issues were found in the value length checks in ntp_crypto.c, where
- a packet with particular autokey operations that contained malicious
- data was not always being completely validated. Receipt of these
- packets can cause ntpd to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7701">CVE-2015-7701</a>
-
- <p>A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd is
- configured to use autokey authentication, an attacker could send
- packets to ntpd that would, after several days of ongoing attack,
- cause it to run out of memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7703">CVE-2015-7703</a>
-
- <p>Miroslav Lichvár of Red Hat found that the :config command can be
- used to set the pidfile and driftfile paths without any
- restrictions. A remote attacker could use this flaw to overwrite a
- file on the file system with a file containing the pid of the ntpd
- process (immediately) or the current estimated drift of the system
- clock (in hourly intervals). For example:</p>
-<pre>
- ntpq -c ':config pidfile /tmp/ntp.pid'
- ntpq -c ':config driftfile /tmp/ntp.drift'
-</pre>
- <p>In Debian ntpd is configured to drop root privileges, which limits
- the impact of this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7704">CVE-2015-7704</a>
-
- <p>When ntpd as an NTP client receives a Kiss-of-Death (KoD) packet
- from the server to reduce its polling rate, it doesn't check if the
- originate timestamp in the reply matches the transmit timestamp from
- its request. An off-path attacker can send a crafted KoD packet to
- the client, which will increase the client's polling interval to a
- large value and effectively disable synchronization with the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7850">CVE-2015-7850</a>
-
- <p>An exploitable denial of service vulnerability exists in the remote
- configuration functionality of the Network Time Protocol. A
- specially crafted configuration file could cause an endless loop
- resulting in a denial of service. An attacker could provide a the
- malicious configuration file to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7851">CVE-2015-7851</a>
-
- <p>A potential path traversal vulnerability exists in the config file
- saving of ntpd on VMS. A specially crafted path could cause a path
- traversal potentially resulting in files being overwritten. An
- attacker could provide a malicious path to trigger this
- vulnerability.</p>
-
- <p>This issue does not affect Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7852">CVE-2015-7852</a>
-
- <p>A potential off by one vulnerability exists in the cookedprint
- functionality of ntpq. A specially crafted buffer could cause a
- buffer overflow potentially resulting in null byte being written out
- of bounds.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7855">CVE-2015-7855</a>
-
- <p>It was found that NTP's decodenetnum() would abort with an assertion
- failure when processing a mode 6 or mode 7 packet containing an
- unusually long data value where a network address was expected. This
- could allow an authenticated attacker to crash ntpd.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7871">CVE-2015-7871</a>
-
- <p>An error handling logic error exists within ntpd that manifests due
- to improper error condition handling associated with certain
- crypto-NAK packets. An unauthenticated, off-path attacker can force
- ntpd processes on targeted servers to peer with time sources of the
- attacker's choosing by transmitting symmetric active crypto-NAK
- packets to ntpd. This attack bypasses the authentication typically
- required to establish a peer association and allows an attacker to
- make arbitrary changes to system time.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-335.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-336.data b/english/lts/security/2015/dla-336.data
deleted file mode 100644
index 6f2b19b9d06..00000000000
--- a/english/lts/security/2015/dla-336.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-336-1 phpmyadmin</define-tag>
-<define-tag report_date>2015-10-28</define-tag>
-<define-tag secrefs>CVE-2014-8958 CVE-2014-9218 CVE-2015-2206 CVE-2015-3902</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-336.wml b/english/lts/security/2015/dla-336.wml
deleted file mode 100644
index 535e229563f..00000000000
--- a/english/lts/security/2015/dla-336.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been fixed in phpMyAdmin, the web administration
-tool for MySQL.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8958">CVE-2014-8958</a>
-
- <p>Multiple cross-site scripting (XSS) vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9218">CVE-2014-9218</a>
-
- <p>Denial of service (resource consumption) via a long password.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2206">CVE-2015-2206</a>
-
- <p>Risk of BREACH attack due to reflected parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3902">CVE-2015-3902</a>
-
- <p>XSRF/CSRF vulnerability in phpMyAdmin setup.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-336.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-337.data b/english/lts/security/2015/dla-337.data
deleted file mode 100644
index 1d50f05e146..00000000000
--- a/english/lts/security/2015/dla-337.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-337-1 busybox</define-tag>
-<define-tag report_date>2015-10-31</define-tag>
-<define-tag secrefs>Bug#803097</define-tag>
-<define-tag packages>busybox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-337.wml b/english/lts/security/2015/dla-337.wml
deleted file mode 100644
index 3baab07f3cc..00000000000
--- a/english/lts/security/2015/dla-337.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>busybox, a collection of tiny utilities for small and embedded systems,
-was vulnerable to crashing when handling a specially crafted zip file.
-The issue was discovered by Gustavo Grieco.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in busybox version
-1.17.1-8+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-337.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-338.data b/english/lts/security/2015/dla-338.data
deleted file mode 100644
index 5aaf10c8ff6..00000000000
--- a/english/lts/security/2015/dla-338.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-338-1 xscreensaver</define-tag>
-<define-tag report_date>2015-10-31</define-tag>
-<define-tag secrefs>CVE-2015-8025 Bug#802914</define-tag>
-<define-tag packages>xscreensaver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-338.wml b/english/lts/security/2015/dla-338.wml
deleted file mode 100644
index f8c6755b195..00000000000
--- a/english/lts/security/2015/dla-338.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>xscreensaver, a screensaver daemon and frontend for X11 was vulnerable
-to crashing when hot-swapping monitors.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in xscreensaver version
-5.11-1+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-338.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-339.data b/english/lts/security/2015/dla-339.data
deleted file mode 100644
index 90b1c7deb19..00000000000
--- a/english/lts/security/2015/dla-339.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-339-1 libhtml-scrubber-perl</define-tag>
-<define-tag report_date>2015-11-3</define-tag>
-<define-tag secrefs>CVE-2015-5667 Bug#803943</define-tag>
-<define-tag packages>libhtml-scrubber-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-339.wml b/english/lts/security/2015/dla-339.wml
deleted file mode 100644
index 1ca1571e294..00000000000
--- a/english/lts/security/2015/dla-339.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>HTML::Scrubber is vulnerable to a cross-site scripting (XSS) vulnerability
-when the comment feature is enabled. It allows remote attackers to inject
-arbitrary web script or HTML via a crafted comment.</p>
-
-<p>For Debian 6 squeeze, this has been fixed in libhtml-scrubber-perl version
-0.08-4+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-339.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-340.data b/english/lts/security/2015/dla-340.data
deleted file mode 100644
index 8cbe8ff69b0..00000000000
--- a/english/lts/security/2015/dla-340.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-340-1 krb5</define-tag>
-<define-tag report_date>2015-11-7</define-tag>
-<define-tag secrefs>CVE-2015-2695 CVE-2015-2697</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-340.wml b/english/lts/security/2015/dla-340.wml
deleted file mode 100644
index 1af454b48f5..00000000000
--- a/english/lts/security/2015/dla-340.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in krb5, the MIT implementation
-of Kerberos. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2695">CVE-2015-2695</a>
-
- <p>It was discovered that applications which call gss_inquire_context()
- on a partially-established SPNEGO context can cause the GSS-API
- library to read from a pointer using the wrong type, leading to a
- process crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2697">CVE-2015-2697</a>
-
- <p>It was discovered that the build_principal_va() function incorrectly
- handles input strings. An authenticated attacker can take advantage
- of this flaw to cause a KDC to crash using a TGS request with a
- large realm field beginning with a null byte.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 1.8.3+dfsg-4squeeze10.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-340.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-341.data b/english/lts/security/2015/dla-341.data
deleted file mode 100644
index 67b5b83b5a7..00000000000
--- a/english/lts/security/2015/dla-341.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-341-1 php5</define-tag>
-<define-tag report_date>2015-11-8</define-tag>
-<define-tag secrefs>CVE-2015-6831 CVE-2015-6832 CVE-2015-6833 CVE-2015-6834 CVE-2015-6836 CVE-2015-6837 CVE-2015-6838 CVE-2015-7803 CVE-2015-7804</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-341.wml b/english/lts/security/2015/dla-341.wml
deleted file mode 100644
index cae7b1aa06f..00000000000
--- a/english/lts/security/2015/dla-341.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6831">CVE-2015-6831</a>
- <p>Use after free vulnerability was found in unserialize() function.
- We can create ZVAL and free it via Serializable::unserialize.
- However the unserialize() will still allow to use R: or r: to set
- references to that already freed memory. It is possible to
- use-after-free attack and execute arbitrary code remotely.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6832">CVE-2015-6832</a>
- <p>Dangling pointer in the unserialization of ArrayObject items.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6833">CVE-2015-6833</a>
- <p>Files extracted from archive may be placed outside of destination
- directory</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6834">CVE-2015-6834</a>
- <p>Use after free vulnerability was found in unserialize() function.
- We can create ZVAL and free it via Serializable::unserialize.
- However the unserialize() will still allow to use R: or r: to set
- references to that already freed memory. It is possible to
- use-after-free attack and execute arbitrary code remotely.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6836">CVE-2015-6836</a>
- <p>A type confusion occurs within SOAP serialize_function_call due
- to an insufficient validation of the headers field.
- In the SoapClient's __call method, the verify_soap_headers_array
- check is applied only to headers retrieved from
- zend_parse_parameters; problem is that a few lines later,
- soap_headers could be updated or even replaced with values from
- the __default_headers object fields.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6837">CVE-2015-6837</a>
- <p>The XSLTProcessor class misses a few checks on the input from the
- libxslt library. The valuePop() function call is able to return
- NULL pointer and php does not check that.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6838">CVE-2015-6838</a>
- <p>The XSLTProcessor class misses a few checks on the input from the
- libxslt library. The valuePop() function call is able to return
- NULL pointer and php does not check that.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7803">CVE-2015-7803</a>
- <p>A NULL pointer dereference flaw was found in the way PHP's Phar
- extension parsed Phar archives. A specially crafted archive could
- cause PHP to crash.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7804">CVE-2015-7804</a>
- <p>An uninitialized pointer use flaw was found in the
- phar_make_dirstream() function of PHP's Phar extension.
- A specially crafted phar file in the ZIP format with a directory
- entry with a file name "/ZIP" could cause a PHP application
- function to crash.</p></li>
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-341.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-342.data b/english/lts/security/2015/dla-342.data
deleted file mode 100644
index 987c0b53792..00000000000
--- a/english/lts/security/2015/dla-342.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-342-1 openafs</define-tag>
-<define-tag report_date>2015-11-18</define-tag>
-<define-tag secrefs>CVE-2015-3282 CVE-2015-3283 CVE-2015-3285 CVE-2015-6587 CVE-2015-7762 CVE-2015-7763</define-tag>
-<define-tag packages>openafs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-342.wml b/english/lts/security/2015/dla-342.wml
deleted file mode 100644
index 1bd9a69158c..00000000000
--- a/english/lts/security/2015/dla-342.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found and solved in the distributed file
-system OpenAFS:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3282">CVE-2015-3282</a>
-
- <p>vos leaked stack data clear on the wire when updating vldb entries.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3283">CVE-2015-3283</a>
-
- <p>OpenAFS allowed remote attackers to spoof bos commands via unspecified
- vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3285">CVE-2015-3285</a>
-
- <p>pioctl wrongly used the pointer related to the RPC, allowing local users to
- cause a denial of service (memory corruption and kernel panic) via a
- crafted OSD FS command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6587">CVE-2015-6587</a>
-
- <p>vlserver allowed remote authenticated users to cause a denial of service
- (out-of-bounds read and crash) via a crafted regular expression in a
- VL_ListAttributesN2 RPC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762">CVE-2015-7762</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763">CVE-2015-7763</a> ("Tattletale")
-
- <p>John Stumpo found that Rx ACK packets leaked plaintext of packets
- previously processed.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openafs version
-1.4.12.1+dfsg-4+squeeze4.</p>
-
-<p>We recommend that you upgrade your OpenAFS packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-342.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-343.data b/english/lts/security/2015/dla-343.data
deleted file mode 100644
index a04d9866af2..00000000000
--- a/english/lts/security/2015/dla-343.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-343-1 libpng</define-tag>
-<define-tag report_date>2015-11-17</define-tag>
-<define-tag secrefs>CVE-2012-3425 CVE-2015-7981 CVE-2015-8126</define-tag>
-<define-tag packages>libpng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-343.wml b/english/lts/security/2015/dla-343.wml
deleted file mode 100644
index 9c57f7be5d9..00000000000
--- a/english/lts/security/2015/dla-343.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7981">CVE-2015-7981</a>
- <p>Added a safety check in png_set_tIME() (Bug report from Qixue Xiao).</p></li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8126">CVE-2015-8126</a>
- <p>Multiple buffer overflows in the (1) png_set_PLTE and
- (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x
- before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24,
- and 1.6.x before 1.6.19 allow remote attackers to cause a denial
- of service (application crash) or possibly have unspecified other
- impact via a small bit-depth value in an IHDR (aka image header)
- chunk in a PNG image.</p></li>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3425">CVE-2012-3425</a>
- <p>vulnerable code is not present here</p></li>
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-343.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-344.data b/english/lts/security/2015/dla-344.data
deleted file mode 100644
index bf4bac2eb10..00000000000
--- a/english/lts/security/2015/dla-344.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-344-1 nspr</define-tag>
-<define-tag report_date>2015-11-19</define-tag>
-<define-tag secrefs>CVE-2015-7183</define-tag>
-<define-tag packages>nspr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-344.wml b/english/lts/security/2015/dla-344.wml
deleted file mode 100644
index f757f2b92b4..00000000000
--- a/english/lts/security/2015/dla-344.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Google security engineer Ryan Sleevi found a vulnerability in the NetScape
-Portable Runtime Library (NSPR). NSPR allocated memory without specific checks,
-making it possible for remote attackers to cause a Denial of Service or execute
-arbitrary code.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue have been fixed in nspr version
-4.8.6-1+squeeze3. We recommend that you upgrade your nspr packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-344.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-345.data b/english/lts/security/2015/dla-345.data
deleted file mode 100644
index 8c1bff3568e..00000000000
--- a/english/lts/security/2015/dla-345.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-345-1 strongswan</define-tag>
-<define-tag report_date>2015-11-19</define-tag>
-<define-tag secrefs>CVE-2015-8023</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-345.wml b/english/lts/security/2015/dla-345.wml
deleted file mode 100644
index 558fbbb5f34..00000000000
--- a/english/lts/security/2015/dla-345.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Brunner found an authentication bypass vulnerability in
-strongSwan, an IKE/IPsec suite.</p>
-
-<p>Due to insufficient validation of its local state the server
-implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin
-can be tricked into successfully concluding the authentication without
-providing valid credentials.</p>
-
-<p>It's possible to recognize such attacks by looking at the server logs.
-The following log message would be seen during the client
-authentication:</p>
-
- <p>EAP method EAP_MSCHAPV2 succeeded, no MSK established</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-345.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-346.data b/english/lts/security/2015/dla-346.data
deleted file mode 100644
index 0bde0c03e4e..00000000000
--- a/english/lts/security/2015/dla-346.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-346-1 openjdk-6</define-tag>
-<define-tag report_date>2015-11-24</define-tag>
-<define-tag secrefs>CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4835 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844 CVE-2015-4860 CVE-2015-4872 CVE-2015-4881 CVE-2015-4882 CVE-2015-4883 CVE-2015-4893 CVE-2015-4903 CVE-2015-4911</define-tag>
-<define-tag packages>openjdk-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-346.wml b/english/lts/security/2015/dla-346.wml
deleted file mode 100644
index 0b843731dfd..00000000000
--- a/english/lts/security/2015/dla-346.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an implementation of
-the Oracle Java platform. These vulnerabilities relate to execution of
-arbitrary code, breakouts of the Java sandbox, information disclosure and
-denial of service.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openjdk-6
-version 6b37-1.13.9-1~deb6u1.</p>
-
-<p>We recommend you to upgrade your openjdk-6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-346.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-347.data b/english/lts/security/2015/dla-347.data
deleted file mode 100644
index b72241f7f04..00000000000
--- a/english/lts/security/2015/dla-347.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-347-1 putty</define-tag>
-<define-tag report_date>2015-11-24</define-tag>
-<define-tag secrefs>CVE-2015-5309</define-tag>
-<define-tag packages>putty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-347.wml b/english/lts/security/2015/dla-347.wml
deleted file mode 100644
index 9a5aaeac758..00000000000
--- a/english/lts/security/2015/dla-347.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that PuTTY's terminal emulator did not properly
-validate the parameter to the ECH (erase characters) control sequence,
-allowing a denial of service and possibly remote code execution.</p>
-
-<p>For the oldoldstable distribution (squeeze), this problem has been
-fixed in version 0.60+2010-02-20-1+squeeze4.</p>
-
-<p>For the oldstable (wheezy) and stable (jessie) distributions, this
-problem will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-347.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-348.data b/english/lts/security/2015/dla-348.data
deleted file mode 100644
index 18f633c5e2e..00000000000
--- a/english/lts/security/2015/dla-348.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-348-1 smokeping</define-tag>
-<define-tag report_date>2015-11-27</define-tag>
-<define-tag secrefs>CVE-2013-4168</define-tag>
-<define-tag packages>smokeping</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-348.wml b/english/lts/security/2015/dla-348.wml
deleted file mode 100644
index 9a0e9854a8c..00000000000
--- a/english/lts/security/2015/dla-348.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4168">CVE-2013-4168</a>
-
- <p>Minor XSS issue resolved in the upstream 2.6.9, discovered by Steven
- Chamberlain and backported by the LTS security team.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-348.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-349.data b/english/lts/security/2015/dla-349.data
deleted file mode 100644
index d947156434d..00000000000
--- a/english/lts/security/2015/dla-349.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-349-1 python-django</define-tag>
-<define-tag report_date>2015-11-25</define-tag>
-<define-tag secrefs>CVE-2015-8213</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-349.wml b/english/lts/security/2015/dla-349.wml
deleted file mode 100644
index f6ececc2d2e..00000000000
--- a/english/lts/security/2015/dla-349.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a potential settings leak in date
-template filter of Django, a web-development framework.</p>
-
-<p>If an application allows users to specify an unvalidated format for
-dates and passes this format to the date filter, e.g.
-<tt>{{ last_updated|date:user_date_format }}</tt>, then a malicious user
-could obtain any secret in the application's settings by specifying
-a settings key instead of a date format. e.g. <q>SECRET_KEY</q> instead
-of "j/m/Y".</p>
-
-<p>To remedy this, the underlying function used by the date template
-filter, django.utils.formats.get_format(), now only allows accessing
-the date/time formatting settings.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in python-django
-version 1.2.3-3+squeeze15.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-349.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-350.data b/english/lts/security/2015/dla-350.data
deleted file mode 100644
index c2559ce5603..00000000000
--- a/english/lts/security/2015/dla-350.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-350-1 eglibc</define-tag>
-<define-tag report_date>2015-11-26</define-tag>
-<define-tag secrefs>not assigned yet Bug#803927</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-350.wml b/english/lts/security/2015/dla-350.wml
deleted file mode 100644
index acb63c43675..00000000000
--- a/english/lts/security/2015/dla-350.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The strxfrm() function is vulnerable to integer overflows when computing
-memory allocation sizes (similar to <a href="https://security-tracker.debian.org/tracker/CVE-2012-4412">CVE-2012-4412</a>). Furthermore since
-it fallbacks to use alloca() when malloc() fails, it is vulnerable to
-stack-based buffer overflows (similar to <a href="https://security-tracker.debian.org/tracker/CVE-2012-4424">CVE-2012-4424</a>).</p>
-
-<p>Those issues have been fixed in Debian 6 Squeeze with eglibc
-2.11.3-4+deb6u8. We recommend that you upgrade libc6 and other
-packages provided by eglibc.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-350.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-351.data b/english/lts/security/2015/dla-351.data
deleted file mode 100644
index 0d8d42eb604..00000000000
--- a/english/lts/security/2015/dla-351.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-351-1 redmine</define-tag>
-<define-tag report_date>2015-11-26</define-tag>
-<define-tag secrefs>CVE-2015-8346</define-tag>
-<define-tag packages>redmine</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-351.wml b/english/lts/security/2015/dla-351.wml
deleted file mode 100644
index e7d3f77edf8..00000000000
--- a/english/lts/security/2015/dla-351.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a data disclosure vulnerability in
-Redmine, a web-based bug and project management tool.</p>
-
-<p>The time logging form could disclose subjects of issues that are not
-visible/public. Patch by Holger Just.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in redmine version
-1.0.1-2+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-351.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-352.data b/english/lts/security/2015/dla-352.data
deleted file mode 100644
index 215d67ddffa..00000000000
--- a/english/lts/security/2015/dla-352.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-352-1 libcommons-collections3-java</define-tag>
-<define-tag report_date>2015-11-26</define-tag>
-<define-tag packages>libcommons-collections3-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-352.wml b/english/lts/security/2015/dla-352.wml
deleted file mode 100644
index 5e46993823a..00000000000
--- a/english/lts/security/2015/dla-352.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Apache commons collection suffered from security issues, making
-applications to accept serialized objects from untrusted sources. Remote
-attackers might take advantage of these issues to execute arbitrary Java
-functions and even inject manipulated bytecode.</p>
-
-<p>This release of libcommons-collection3-java prevents these issues by disabling
-the deserialization of the functors classes, unless the system property
-org.apache.commons.collections.enableUnsafeSerialization is set to <q>true</q>.
-Classes considered unsafe are: CloneTransformer, ForClosure,
-InstantiateFactory, InstantiateTransformer, InvokerTransformer,
-PrototypeCloneFactory, PrototypeSerializationFactory and WhileClosure.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in
-libcommons-collections3-java version 3.2.1-4+deb6u1. We recommend you to
-upgrade your libcommons-collections3-java packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-352.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-353.data b/english/lts/security/2015/dla-353.data
deleted file mode 100644
index bfc5fd3d032..00000000000
--- a/english/lts/security/2015/dla-353.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-353-1 imagemagick</define-tag>
-<define-tag report_date>2015-11-27</define-tag>
-<define-tag secrefs>Bug#806441</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-353.wml b/english/lts/security/2015/dla-353.wml
deleted file mode 100644
index 04dd56c94d7..00000000000
--- a/english/lts/security/2015/dla-353.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Submitting specially crafted icons (.ico) or .pict images to ImageMagick
-can trigger integer overflows that can lead to buffer overflows and
-memory allocations issues. Depending on the case, this can lead to a
-denial of service or possibly worse.</p>
-
-<p>For Debian 6 Squeeze, those issues have been fixed in imagemagick
-8:6.6.0.4-3+squeeze7. We recommend that you upgrade your packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-353.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-354.data b/english/lts/security/2015/dla-354.data
deleted file mode 100644
index cbe4987d488..00000000000
--- a/english/lts/security/2015/dla-354.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-354-1 nss</define-tag>
-<define-tag report_date>2015-11-29</define-tag>
-<define-tag secrefs>CVE-2015-7181 CVE-2015-7182</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-354.wml b/english/lts/security/2015/dla-354.wml
deleted file mode 100644
index 0b933f00a81..00000000000
--- a/english/lts/security/2015/dla-354.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in nss, the Mozilla Network
-Security Service library. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7181">CVE-2015-7181</a>
-
- <p>The sec_asn1d_parse_leaf function improperly restricts access to an
- unspecified data structure, which allows remote attackers to cause a
- denial of service (application crash) or possibly execute arbitrary
- code via crafted OCTET STRING data, related to a "use-after-poison"
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7182">CVE-2015-7182</a>
-
- <p>A Heap-based buffer overflow in the ASN.1 decoder allows remote
- attackers to cause a denial of service (application crash) or
- possibly execute arbitrary code via crafted OCTET STRING data.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been fixed
-in version 3.12.8-1+squeeze13.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-354.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-355.data b/english/lts/security/2015/dla-355.data
deleted file mode 100644
index a88e764ea6d..00000000000
--- a/english/lts/security/2015/dla-355.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-355-1 libxml2</define-tag>
-<define-tag report_date>2015-11-29</define-tag>
-<define-tag secrefs>CVE-2015-8241 CVE-2015-8317 Bug#806384</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-355.wml b/english/lts/security/2015/dla-355.wml
deleted file mode 100644
index ca3bfd36926..00000000000
--- a/english/lts/security/2015/dla-355.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8241">CVE-2015-8241</a>
-
- <p>Buffer overread with XML parser in xmlNextChar</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8317">CVE-2015-8317</a>
-
- <ul>
- <li>issues in the xmlParseXMLDecl function:
- If we fail conversing the current input stream while
- processing the encoding declaration of the XMLDecl
- then it's safer to just abort there and not try to
- report further errors.</li>
- <li>If the string is not properly terminated do not try to convert
- to the given encoding.
- </ul></li>
-
-</ul>
-
-<p>Additional fix for off by one error in previous patch for <a href="https://security-tracker.debian.org/tracker/CVE-2015-7942">CVE-2015-7942</a>
-(thanks to Salvatore for spotting this)</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-355.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-356.data b/english/lts/security/2015/dla-356.data
deleted file mode 100644
index c89c8e165e5..00000000000
--- a/english/lts/security/2015/dla-356.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-356-1 libsndfile</define-tag>
-<define-tag report_date>2015-11-30</define-tag>
-<define-tag secrefs>CVE-2014-9496 CVE-2014-9756 CVE-2015-7805 Bug#774162 Bug#804445 Bug#804447</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-356.wml b/english/lts/security/2015/dla-356.wml
deleted file mode 100644
index 090ac630329..00000000000
--- a/english/lts/security/2015/dla-356.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9496">CVE-2014-9496</a>
-
- <p>The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows
- attackers to have unspecified impact via vectors related to a (1) map
- offset or (2) rsrc marker, which triggers an out-of-bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9756">CVE-2014-9756</a>
-
- <p>The psf_fwrite function in file_io.c in libsndfile allows attackers to
- cause a denial of service (divide-by-zero error and application crash)
- via unspecified vectors related to the headindex variable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7805">CVE-2015-7805</a>
-
- <p>Heap-based buffer overflow in libsndfile 1.0.25 allows remote
- attackers to have unspecified impact via the headindex value in the
- header in an AIFF file.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-356.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-357.data b/english/lts/security/2015/dla-357.data
deleted file mode 100644
index 1a3c407c46f..00000000000
--- a/english/lts/security/2015/dla-357.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-357-1 libphp-snoopy</define-tag>
-<define-tag report_date>2015-11-30</define-tag>
-<define-tag secrefs>CVE-2008-7313 CVE-2014-5008 Bug#778634</define-tag>
-<define-tag packages>libphp-snoopy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-357.wml b/english/lts/security/2015/dla-357.wml
deleted file mode 100644
index 812d83614c7..00000000000
--- a/english/lts/security/2015/dla-357.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that missing input sanitizing in Snoopy, a PHP class that
-simulates a web browser may result in the execution of arbitrary
-commands.</p>
-
-<p>For the oldoldstable distribution (squeeze-lts), this problem has been fixed
-in version 2.0.0-1~deb6u1.</p>
-
-<p>We recommend that you upgrade your libphp-snoopy packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-357.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-358.data b/english/lts/security/2015/dla-358.data
deleted file mode 100644
index e29fc2a26ce..00000000000
--- a/english/lts/security/2015/dla-358.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-358-1 openssl</define-tag>
-<define-tag report_date>2015-12-3</define-tag>
-<define-tag secrefs>CVE-2015-3195</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-358.wml b/english/lts/security/2015/dla-358.wml
deleted file mode 100644
index 0970e0fed45..00000000000
--- a/english/lts/security/2015/dla-358.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
-memory. This structure is used by the PKCS#7 and CMS routines so any
-application which reads PKCS#7 or CMS data from untrusted sources is affected.
-SSL/TLS is not affected.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-358.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-359.data b/english/lts/security/2015/dla-359.data
deleted file mode 100644
index 2b88fb7aac5..00000000000
--- a/english/lts/security/2015/dla-359.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-359-1 mysql-5.1</define-tag>
-<define-tag report_date>2015-12-16</define-tag>
-<define-tag packages></define-tag>
-<define-tag secrefs>CVE-2015-0499 CVE-2015-0501 CVE-2015-0505 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573 CVE-2015-4752 CVE-2015-4737 CVE-2015-2648 CVE-2015-2643 CVE-2015-2620 CVE-2015-2582 CVE-2015-4792 CVE-2015-4802 CVE-2015-4815 CVE-2015-4816 CVE-2015-4819 CVE-2015-4826 CVE-2015-4830 CVE-2015-4836 CVE-2015-4858 CVE-2015-4861 CVE-2015-4870 CVE-2015-4879 CVE-2015-4913</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-359.wml b/english/lts/security/2015/dla-359.wml
deleted file mode 100644
index 4e071713965..00000000000
--- a/english/lts/security/2015/dla-359.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>MySQL 5.5 packages added; end of support for MySQL 5.1</define-tag>
-<define-tag moreinfo>
-<p>Oracle, the upstream maintainer of MySQL, no longer supports MySQL
-version 5.1, which is included in Debian 6.0 <q>squeeze</q>. MySQL 5.1 likely
-suffers from multiple vulnerabilities fixed in newer versions after the
-end of upstream support, but Oracle does not disclose enough information
-either to verify or to fix them.</p>
-
-<p>As an alternative, the Debian LTS team is providing MySQL 5.5 packages
-for use in Debian 6.0 <q>squeeze</q>. We recommend that Squeeze LTS users
-install them and migrate their MySQL databases.</p>
-
-<p>Please note that a dist-upgrade will not consider these MySQL 5.5
-packages automatically, so users need to install them explicitly.</p>
-
-<p>If you are running a MySQL server:</p>
-
-<pre>apt-get install mysql-server-5.5</pre>
-
-<p>If you only need the MySQL client:</p>
-
-<pre>apt-get install mysql-client-5.5</pre>
-
-
-<h3>Compatibility updates</h3>
-
-<p>Some packages were updated to solve incompatibility issues, that were
-fixed in the following versions:</p>
-
-<ul>
-<li>bacula-director-mysql 5.0.2-2.2+squeeze2</li>
-<li>cacti 0.8.7g-1+squeeze9</li>
-<li>phpmyadmin 4:3.3.7-10</li>
-<li>postfix-policyd 1.82-2+deb6u1</li>
-<li>prelude-manager 1.0.0-1+deb6u1</li>
-</ul>
-
-<p>We recommend that you upgrade these packages before upgrading to
-MySQL 5.5. A common dist-upgrade should be enough.</p>
-
-<p>We have done our best to provide you with reliable MySQL 5.5 packages. We
-have made available test packages for some time, although we did not get
-any feedback from users. In any case, don't hesitate to report any issues
-related to this MySQL upgrade to debian-lts@lists.debian.org.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-359.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-360.data b/english/lts/security/2015/dla-360.data
deleted file mode 100644
index a0e755c5e40..00000000000
--- a/english/lts/security/2015/dla-360.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-360-1 linux-2.6</define-tag>
-<define-tag report_date>2015-12-08</define-tag>
-<define-tag secrefs>CVE-2013-7446 CVE-2015-7799 CVE-2015-7833 CVE-2015-7990 CVE-2015-8324</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-360.wml b/english/lts/security/2015/dla-360.wml
deleted file mode 100644
index 25294a2d9d7..00000000000
--- a/english/lts/security/2015/dla-360.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7446">CVE-2013-7446</a>
-
- <p>Dmitry Vyukov discovered that a particular sequence of valid
- operations on local (AF_UNIX) sockets can result in a
- use-after-free. This may be used to cause a denial of service
- (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7799">CVE-2015-7799</a>
-
- <p>郭永刚 discovered that a user granted access to /dev/ppp can cause
- a denial of service (crash) by passing invalid parameters to the
- PPPIOCSMAXCID ioctl. This also applies to ISDN PPP device nodes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7833">CVE-2015-7833</a>
-
- <p>Sergej Schumilo, Hendrik Schwartke and Ralf Spenneberg discovered a
- flaw in the processing of certain USB device descriptors in the
- usbvision driver. An attacker with physical access to the system can
- use this flaw to crash the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7990">CVE-2015-7990</a>
-
- <p>It was discovered that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-6937">CVE-2015-6937</a> was incomplete. A
- race condition when sending a message on unbound socket can still
- cause a NULL pointer dereference. A remote attacker might be able to
- cause a denial of service (crash) by sending a crafted packet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8324">CVE-2015-8324</a>
-
- <p><q>Valintinr</q> reported that an attempt to mount a corrupted ext4
- filesystem may result in a kernel panic. A user permitted to
- mount filesystems could use this flaw to crash the system.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze17. We recommend that you upgrade your
-linux-2.6 packages.</p>
-
-<p>For the oldstable (wheezy) and stable (jessie) distributions,
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-7833">CVE-2015-7833</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-7990">CVE-2015-7990</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-8324">CVE-2015-8324</a> have been fixed and the
-other issues will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-360.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-361.data b/english/lts/security/2015/dla-361.data
deleted file mode 100644
index 92322bfab76..00000000000
--- a/english/lts/security/2015/dla-361.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-361-1 bouncycastle</define-tag>
-<define-tag report_date>2015-12-8</define-tag>
-<define-tag secrefs>CVE-2015-7940 Bug#802671</define-tag>
-<define-tag packages>bouncycastle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-361.wml b/english/lts/security/2015/dla-361.wml
deleted file mode 100644
index e35a2caa37d..00000000000
--- a/english/lts/security/2015/dla-361.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Bouncy Castle Java library before 1.51 does not validate that a point
-is within the elliptic curve, which makes it easier for remote attackers
-to obtain private keys via a series of crafted elliptic curve Diffie
-Hellman (ECDH) key exchanges, aka an "invalid curve attack."</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in version
-1.44+dfsg-2+deb6u1 of bouncycastle.</p>
-
-<p>Many thanks to upstream author Peter Dettmann who reviewed the backport
-that we prepared.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-361.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-362.data b/english/lts/security/2015/dla-362.data
deleted file mode 100644
index ba389cedca3..00000000000
--- a/english/lts/security/2015/dla-362.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-362-1 dhcpcd</define-tag>
-<define-tag report_date>2015-12-8</define-tag>
-<define-tag secrefs>CVE-2012-6698 CVE-2012-6699 CVE-2012-6700</define-tag>
-<define-tag packages>dhcpcd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-362.wml b/english/lts/security/2015/dla-362.wml
deleted file mode 100644
index 568695abaa2..00000000000
--- a/english/lts/security/2015/dla-362.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Guido Vranken discovered several memory-related vulnerabilities
-while fuzzing DHCP messages sent to dhcpcd.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, those issues have been fixed in version
-1:3.2.3-5+squeeze2.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6698">CVE-2012-6698</a>
-
- <p>Out-of-bounds write with specially crafted DHCP messages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6699">CVE-2012-6699</a>
-
- <p>Out-of-bounds read with specially crafted DHCP messages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6700">CVE-2012-6700</a>
-
- <p>Use after free with specially crafted DHCP messages.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-362.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-363.data b/english/lts/security/2015/dla-363.data
deleted file mode 100644
index d80bca6f633..00000000000
--- a/english/lts/security/2015/dla-363.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-363-1 libphp-phpmailer</define-tag>
-<define-tag report_date>2015-12-08</define-tag>
-<define-tag secrefs>CVE-2015-8476 Bug#807265</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-363.wml b/english/lts/security/2015/dla-363.wml
deleted file mode 100644
index 08d445e4377..00000000000
--- a/english/lts/security/2015/dla-363.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a header injection vulnerability in
-libphp-phpmailer, an email transfer library for PHP.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in libphp-phpmailer
-version 5.1-1+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-363.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-364.data b/english/lts/security/2015/dla-364.data
deleted file mode 100644
index 9cd7aaff2a6..00000000000
--- a/english/lts/security/2015/dla-364.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-364-1 gnutls26</define-tag>
-<define-tag report_date>2015-12-9</define-tag>
-<define-tag secrefs>CVE-2015-8313</define-tag>
-<define-tag packages>gnutls26</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-364.wml b/english/lts/security/2015/dla-364.wml
deleted file mode 100644
index 982432a49d6..00000000000
--- a/english/lts/security/2015/dla-364.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hanno Böck discovered that GnuTLS, a library implementing the TLS and SSL
-protocols, incorrectly validated the first padding byte in CBC modes. A remote
-attacker can possibly take advantage of this flaw to perform a padding oracle
-attack.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in gnutls26 version
-2.8.6-1+squeeze6. We recommend you to upgrade your gnutls26 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-364.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-365.data b/english/lts/security/2015/dla-365.data
deleted file mode 100644
index afda36960f6..00000000000
--- a/english/lts/security/2015/dla-365.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-365-1 foomatic-filters</define-tag>
-<define-tag report_date>2015-12-09</define-tag>
-<define-tag secrefs>CVE-2015-8327 Bug#806886</define-tag>
-<define-tag packages>foomatic-filters</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-365.wml b/english/lts/security/2015/dla-365.wml
deleted file mode 100644
index 72195317463..00000000000
--- a/english/lts/security/2015/dla-365.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an injection vulnerability in
-foomatic-filters which is used by printer spoolers to convert
-incoming PostScript data into the printer's native format.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in foomatic-filters
-version 4.0.5-6+squeeze2+deb6u11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-365.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-366.data b/english/lts/security/2015/dla-366.data
deleted file mode 100644
index 1b841740a1f..00000000000
--- a/english/lts/security/2015/dla-366.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-366-1 arts</define-tag>
-<define-tag report_date>2015-12-10</define-tag>
-<define-tag secrefs>CVE-2015-7543</define-tag>
-<define-tag packages>arts</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-366.wml b/english/lts/security/2015/dla-366.wml
deleted file mode 100644
index 40fa8b73179..00000000000
--- a/english/lts/security/2015/dla-366.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It has been reported that arts uses the insecure mktemp() function
-to create the temporary directory it uses to host user-specific sockets.
-It is thus possible for another user to hijack this temporary directory
-and gain IPC access it should not have.</p>
-
-<p>In Debian 6 <q>Squeeze</q>, this issue has been addressed in arts
-1.5.9-3+deb6u1 with the use of the safer mkdtemp() function.
-We recommend that you upgrade your arts packages.</p>
-
-<p>Other Debian releases do not have the arts package.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-366.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-367.data b/english/lts/security/2015/dla-367.data
deleted file mode 100644
index c31f3966564..00000000000
--- a/english/lts/security/2015/dla-367.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-367-1 kdelibs</define-tag>
-<define-tag report_date>2015-12-10</define-tag>
-<define-tag secrefs>CVE-2015-7543</define-tag>
-<define-tag packages>kdelibs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-367.wml b/english/lts/security/2015/dla-367.wml
deleted file mode 100644
index 68f1c822dd4..00000000000
--- a/english/lts/security/2015/dla-367.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It has been reported that kdelibs uses the insecure mktemp() function
-to create the temporary directory it uses to host user-specific sockets.
-It is thus possible for another user to hijack this temporary directory
-and gain socket accesses it should not have.</p>
-
-<p>In Debian 6 <q>Squeeze</q>, this issue has been addressed in kdelibs
-3.5.10.dfsg.1-5+deb6u1 with the use of the safer mkdtemp() function.
-We recommend that you upgrade your kdelibs packages.</p>
-
-<p>Other Debian releases have newer versions of the libraries (kdelibs4) that
-are not affected by this problem.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-367.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-368.data b/english/lts/security/2015/dla-368.data
deleted file mode 100644
index 98e5adc3fcc..00000000000
--- a/english/lts/security/2015/dla-368.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-368-1 grub2</define-tag>
-<define-tag report_date>2015-12-12</define-tag>
-<define-tag secrefs>CVE-2015-8370 Bug##807614</define-tag>
-<define-tag packages>grub2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-368.wml b/english/lts/security/2015/dla-368.wml
deleted file mode 100644
index 5be86957523..00000000000
--- a/english/lts/security/2015/dla-368.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hector Marco-Gisbert, from the Universitat Politècnica de València
-Cybersecurity Team, reported a buffer overflow in grub2 when checking password
-during bootup.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this problem has been fixed in grub2 version
-1.98+20100804-14+squeeze2. We recommend you to upgrade your grub2
-packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-368.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-369.data b/english/lts/security/2015/dla-369.data
deleted file mode 100644
index 15e3be513fb..00000000000
--- a/english/lts/security/2015/dla-369.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-369-1 pygments</define-tag>
-<define-tag report_date>2015-12-15</define-tag>
-<define-tag secrefs>CVE-2015-8557 Bug#802828</define-tag>
-<define-tag packages>pygments</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-369.wml b/english/lts/security/2015/dla-369.wml
deleted file mode 100644
index 7c62f292e61..00000000000
--- a/english/lts/security/2015/dla-369.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a shell injection vulnerability in
-pygments, a syntax highlighting package written in Python.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in pygments
-version 1.3.1+dfsg-1+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-369.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-370.data b/english/lts/security/2015/dla-370.data
deleted file mode 100644
index 3f4faa6fbbf..00000000000
--- a/english/lts/security/2015/dla-370.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-370-1 bind9</define-tag>
-<define-tag report_date>2015-12-17</define-tag>
-<define-tag secrefs>CVE-2015-8000</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-370.wml b/english/lts/security/2015/dla-370.wml
deleted file mode 100644
index 36432ee33d4..00000000000
--- a/english/lts/security/2015/dla-370.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the BIND DNS server does not properly handle the
-parsing of incoming responses, allowing some records with an incorrect
-class to be accepted by BIND instead of being rejected as malformed.
-This can trigger a REQUIRE assertion failure when those records are
-subsequently cached. A remote attacker can exploit this flaw to cause a
-denial of service against servers performing recursive queries.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-370.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-371.data b/english/lts/security/2015/dla-371.data
deleted file mode 100644
index 15a7b03627a..00000000000
--- a/english/lts/security/2015/dla-371.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-371-1 foomatic-filters</define-tag>
-<define-tag report_date>2015-12-18</define-tag>
-<define-tag secrefs>CVE-2015-8560 Bug#807993</define-tag>
-<define-tag packages>foomatic-filters</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-371.wml b/english/lts/security/2015/dla-371.wml
deleted file mode 100644
index eda1b60d3fa..00000000000
--- a/english/lts/security/2015/dla-371.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Adam Chester discovered that there was an injection vulnerability in
-foomatic-filters which is used by printer spoolers to convert
-incoming PostScript data into the printer's native format. This
-could lead to the execution of arbitrary commands.</p>
-
-<p>The patch applied in <a href="./dla-365">DLA 365-1</a> prevented usage of (unescaped) backticks
-and this update complements the previous update by doing the same for
-semi-colons.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in foomatic-filters
-version 4.0.5-6+squeeze2+deb6u12.</p>
-
-<p>(Thanks to Yann Soubeyrand who prepared the updated Debian package)</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-371.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-372.data b/english/lts/security/2015/dla-372.data
deleted file mode 100644
index ee07e6872a0..00000000000
--- a/english/lts/security/2015/dla-372.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-372-1 virtualbox-ose</define-tag>
-<define-tag report_date>2015-12-18</define-tag>
-<define-tag packages>virtualbox-ose</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-372.wml b/english/lts/security/2015/dla-372.wml
deleted file mode 100644
index 2ef376258a7..00000000000
--- a/english/lts/security/2015/dla-372.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Oracle stopped supporting version 3.2 of VirtualBox last June. They also
-do not disclose enough information about vulnerabilities discovered
-and fixed in newer versions so that it is impossible for us to
-verify whether the vulnerability also applies to 3.2 and to backport
-the fix when needed.</p>
-
-<p>We are thus no longer supporting virtualbox-ose in Debian 6 Squeeze.
-If you rely on it, you should either consider using backports of newer
-versions (version 4.1.42 is available in squeeze-backports) or
-upgrade to Debian 7 Wheezy (or newer).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-372.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-373.data b/english/lts/security/2015/dla-373.data
deleted file mode 100644
index 1323907c9b8..00000000000
--- a/english/lts/security/2015/dla-373.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-373-1 libxml2</define-tag>
-<define-tag report_date>2015-12-26</define-tag>
-<define-tag secrefs>CVE-2015-5312 CVE-2015-7497 CVE-2015-7498 CVE-2015-7499 CVE-2015-7500</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-373.wml b/english/lts/security/2015/dla-373.wml
deleted file mode 100644
index 01b5debc306..00000000000
--- a/english/lts/security/2015/dla-373.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libxml2, a library providing
-support to read, modify and write XML and HTML files. A remote attacker
-could provide a specially crafted XML or HTML file that, when processed
-by an application using libxml2, would cause that application to use an
-excessive amount of CPU, leak potentially sensitive information, or
-crash the application.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5312">CVE-2015-5312</a>
-
- <p>CPU exhaustion when processing specially crafted XML input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7497">CVE-2015-7497</a>
-
- <p>Heap-based buffer overflow in xmlDictComputeFastQKey.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7498">CVE-2015-7498</a>
-
- <p>Heap-based buffer overflow in xmlParseXmlDecl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7499">CVE-2015-7499</a>
-
- <p>Heap-based buffer overflow in xmlGROW.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7500">CVE-2015-7500</a>
-
- <p>Heap buffer overflow in xmlParseMisc.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-373.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-374-2.data b/english/lts/security/2015/dla-374-2.data
deleted file mode 100644
index a148acf268f..00000000000
--- a/english/lts/security/2015/dla-374-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-374-2 cacti</define-tag>
-<define-tag report_date>2015-12-30</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-374-2.wml b/english/lts/security/2015/dla-374-2.wml
deleted file mode 100644
index 61922d2d2b5..00000000000
--- a/english/lts/security/2015/dla-374-2.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a regression in the patch intended to fix
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-8369">CVE-2015-8369</a> in the recent upload of cacti 0.8.7g-1+squeeze9+deb6u11.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in cacti version
-0.8.7g-1+squeeze9+deb6u12.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-374-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-374.data b/english/lts/security/2015/dla-374.data
deleted file mode 100644
index 5667effa9bc..00000000000
--- a/english/lts/security/2015/dla-374.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-374-1 cacti</define-tag>
-<define-tag report_date>2015-12-26</define-tag>
-<define-tag secrefs>CVE-2015-8369 CVE-2015-8377 Bug#807599</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-374.wml b/english/lts/security/2015/dla-374.wml
deleted file mode 100644
index 3bf350a7cb8..00000000000
--- a/english/lts/security/2015/dla-374.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were SQL injection vulnerabilities in
-cacti, a web interface for graphing of monitoring systems.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in cacti version
-0.8.7g-1+squeeze9+deb6u11.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-374.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-375.data b/english/lts/security/2015/dla-375.data
deleted file mode 100644
index e1833250bf6..00000000000
--- a/english/lts/security/2015/dla-375.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-375-1 libpng</define-tag>
-<define-tag report_date>2015-12-27</define-tag>
-<define-tag secrefs>CVE-2012-3425 CVE-2015-8472 CVE-2015-8540</define-tag>
-<define-tag packages>libpng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-375.wml b/english/lts/security/2015/dla-375.wml
deleted file mode 100644
index 17adceb9149..00000000000
--- a/english/lts/security/2015/dla-375.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8472">CVE-2015-8472</a>
-
- <p>update incomplete patch for <a href="https://security-tracker.debian.org/tracker/CVE-2015-8126">CVE-2015-8126</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8540">CVE-2015-8540</a>
-
- <p>underflow read in png_check_keyword in pngwutil.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3425">CVE-2012-3425</a>
-
- <p>The png_push_read_zTXt function in pngpread.c in libpng 1.0.x
- before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and
- 1.5.x before 1.5.10 allows remote attackers to cause a denial
- of service (out-of-bounds read) via a large avail_in field value
- in a PNG image.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-375.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-376.data b/english/lts/security/2015/dla-376.data
deleted file mode 100644
index fe9bd3fb8e3..00000000000
--- a/english/lts/security/2015/dla-376.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-376-1 mono</define-tag>
-<define-tag report_date>2015-12-30</define-tag>
-<define-tag secrefs>CVE-2009-0689</define-tag>
-<define-tag packages>mono</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-376.wml b/english/lts/security/2015/dla-376.wml
deleted file mode 100644
index 8eafa53329a..00000000000
--- a/english/lts/security/2015/dla-376.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mono's string-to-double parser may crash, on specially crafted input. This
-could theoretically lead to arbitrary code execution.</p>
-
-<p>This issue has been fixed in Debian 6 Squeeze with the version
-2.6.7-5.1+deb6u2 of mono. We recommend that you upgrade your
-mono packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-376.data"
-# $Id$
diff --git a/english/lts/security/2015/dla-377.data b/english/lts/security/2015/dla-377.data
deleted file mode 100644
index c36bf626623..00000000000
--- a/english/lts/security/2015/dla-377.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-377-1 ia32-libs</define-tag>
-<define-tag report_date>2016-1-1</define-tag>
-<define-tag packages>ia32-libs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-377.wml b/english/lts/security/2015/dla-377.wml
deleted file mode 100644
index 32e57cf1a74..00000000000
--- a/english/lts/security/2015/dla-377.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs package contains 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the previous update of ia32-libs in
-Squeeze LTS.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ia32-libs version 20151231</p>
-
-<p>Note: This DLA was originally was published as DLA-375-1, but due
-to an error that id was reused.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-377.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-91-2.data b/english/lts/security/2015/dla-91-2.data
deleted file mode 100644
index fb02b669fc0..00000000000
--- a/english/lts/security/2015/dla-91-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-91-2 tomcat6</define-tag>
-<define-tag report_date>2015-1-19</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-91-2.wml b/english/lts/security/2015/dla-91-2.wml
deleted file mode 100644
index 60cef181600..00000000000
--- a/english/lts/security/2015/dla-91-2.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a <q>NoSuchElementException</q> when an XML attribute has an
-empty string as value.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tomcat6 version 6.0.41-2+squeeze6</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-91-2.data"
-# $Id: $
diff --git a/english/lts/security/2015/dla-91.data b/english/lts/security/2015/dla-91.data
deleted file mode 100644
index fb02b669fc0..00000000000
--- a/english/lts/security/2015/dla-91.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-91-2 tomcat6</define-tag>
-<define-tag report_date>2015-1-19</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2015/dla-91.wml b/english/lts/security/2015/dla-91.wml
deleted file mode 100644
index 06a113daa8c..00000000000
--- a/english/lts/security/2015/dla-91.wml
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a <q>NoSuchElementException</q> when an XML attribute has an
-empty string as value.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2015/dla-91.data"
-# $Id$
diff --git a/english/lts/security/2015/index.wml b/english/lts/security/2015/index.wml
deleted file mode 100644
index 599d6efcd38..00000000000
--- a/english/lts/security/2015/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2015</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2015' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2016/Makefile b/english/lts/security/2016/Makefile
deleted file mode 100644
index 9f3feab7c22..00000000000
--- a/english/lts/security/2016/Makefile
+++ /dev/null
@@ -1,25 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2016
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-
-index.$(LANGUAGE).html: index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
diff --git a/english/lts/security/2016/dla-374-3.data b/english/lts/security/2016/dla-374-3.data
deleted file mode 100644
index ada2fb05433..00000000000
--- a/english/lts/security/2016/dla-374-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-374-3 cacti</define-tag>
-<define-tag report_date>2016-1-4</define-tag>
-<define-tag secrefs>CVE-2015-8369 Bug#807599</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-374-3.wml b/english/lts/security/2016/dla-374-3.wml
deleted file mode 100644
index f94a2d7a5cb..00000000000
--- a/english/lts/security/2016/dla-374-3.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a regression in the patch intended to fix
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-8369">CVE-2015-8369</a>
-in the recent upload of cacti 0.8.7g-1+squeeze9+deb6u12.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in cacti version
-0.8.7g-1+squeeze9+deb6u13.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-374-3.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-374.data b/english/lts/security/2016/dla-374.data
deleted file mode 100644
index f131a92c189..00000000000
--- a/english/lts/security/2016/dla-374.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-374-3 cacti</define-tag>
-<define-tag report_date>2016-1-04</define-tag>
-<define-tag secrefs>CVE-2015-8369 Bug#807599</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-374.wml b/english/lts/security/2016/dla-374.wml
deleted file mode 100644
index 6b12d277e1d..00000000000
--- a/english/lts/security/2016/dla-374.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a regression in the patch intended to fix
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-8369">CVE-2015-8369</a>
-in the recent upload of cacti 0.8.7g-1+squeeze9+deb6u12.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in cacti version
-0.8.7g-1+squeeze9+deb6u13.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-374.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-375.data b/english/lts/security/2016/dla-375.data
deleted file mode 100644
index fd075a2f72e..00000000000
--- a/english/lts/security/2016/dla-375.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-375-1 ia32-libs</define-tag>
-<define-tag report_date>2016-1-1</define-tag>
-<define-tag packages>ia32-libs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-375.wml b/english/lts/security/2016/dla-375.wml
deleted file mode 100644
index 91489d19c2f..00000000000
--- a/english/lts/security/2016/dla-375.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs package contains 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the previous update of ia32-libs in
-Squeeze LTS.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-375.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-378.data b/english/lts/security/2016/dla-378.data
deleted file mode 100644
index 35c35551896..00000000000
--- a/english/lts/security/2016/dla-378.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-378-1 linux-2.6</define-tag>
-<define-tag report_date>2016-1-05</define-tag>
-<define-tag secrefs>CVE-2015-7550 CVE-2015-8543 CVE-2015-8575 Bug##808293</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-378.wml b/english/lts/security/2016/dla-378.wml
deleted file mode 100644
index 174faae1717..00000000000
--- a/english/lts/security/2016/dla-378.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7550">CVE-2015-7550</a>
-
- <p>Dmitry Vyukov discovered a race condition in the keyring subsystem
- that allows a local user to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8543">CVE-2015-8543</a>
-
- <p>It was discovered that a local user permitted to create raw sockets
- could cause a denial-of-service by specifying an invalid protocol
- number for the socket. The attacker must have the CAP_NET_RAW
- capability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8575">CVE-2015-8575</a>
-
- <p>David Miller discovered a flaw in the Bluetooth SCO sockets
- implementation that leads to an information leak to local users.</p></li>
-
-</ul>
-
-<p>In addition, this update fixes a regression in the previous update:</p>
-
-<ul>
-
-<li>#808293
-
- <p>A regression in the UDP implementation prevented freeradius and
- some other applications from receiving data.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze18.</p>
-
-<p>For the oldstable distribution (wheezy), these problems have been
-fixed in version 3.2.73-2+deb7u2.</p>
-
-<p>For the stable distribution (jessie), these problems have been fixed
-in version 3.16.7-ckt20-1+deb8u2 or earlier.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-378.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-379.data b/english/lts/security/2016/dla-379.data
deleted file mode 100644
index 83fe00db281..00000000000
--- a/english/lts/security/2016/dla-379.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-379-1 samba</define-tag>
-<define-tag report_date>2016-1-3</define-tag>
-<define-tag secrefs>CVE-2015-5252 CVE-2015-5296 CVE-2015-5299</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-379.wml b/english/lts/security/2016/dla-379.wml
deleted file mode 100644
index 4b26b3b41c1..00000000000
--- a/english/lts/security/2016/dla-379.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in Samba, a SMB/CIFS implementation
-that provides a file, print, and login server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5252">CVE-2015-5252</a>
-
- <p>Jan <q>Yenya</q> Kasprzak and the Computer Systems Unit team at Faculty
- of Informatics, Masaryk University, reported that samba wrongly
- verified symlinks, making it possible to access resources outside
- the shared path, under certain circumstances.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5296">CVE-2015-5296</a>
-
- <p>Stefan Metzmacher of SerNet and the Samba Team discovered that samba
- did not ensure that signing was negotiated when a client established
- an encrypted connection against a samba server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5299">CVE-2015-5299</a>
-
- <p>Samba was vulnerable to a missing access control check in the
- VFS shadow_copy2 module, that could allow unauthorized users to
- access snapshots.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in samba version
-2:3.5.6~dfsg-3squeeze13. We recommend you to upgrade your samba
-packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-379.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-380.data b/english/lts/security/2016/dla-380.data
deleted file mode 100644
index 84c641a2a08..00000000000
--- a/english/lts/security/2016/dla-380.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-380-1 libvncserver</define-tag>
-<define-tag report_date>2016-1-4</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-380.wml b/english/lts/security/2016/dla-380.wml
deleted file mode 100644
index 935ee3ebb40..00000000000
--- a/english/lts/security/2016/dla-380.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue had been discovered and resolved by the libvncserver upstream
-developer Karl Runge addressing thread-safety in libvncserver when
-libvncserver is used for handling multiple VNC connections [1].</p>
-
-<p>Unfortunately, it is not trivially feasible (because of ABI breakage) to
-backport the <a href="https://github.com/LibVNC/libvncserver/commit/804335f9d296440bb708ca844f5d89b58b50b0c6">related patch</a> to libvncserver 0.9.7 as shipped in Debian
-squeeze(-lts).</p>
-
-<p>However, the thread-safety patch discussed resolved a related issue of
-memory corruption caused by freeing global variables without nullifying
-them when reusing them in another <q>thread</q>, especially occurring when
-libvncserver is used for handling multiple VNC connections</p>
-
-<p>The described issue has been resolved with this version of libvncserver
-and users of VNC are recommended to upgrade to this version of the
-package.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-380.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-381.data b/english/lts/security/2016/dla-381.data
deleted file mode 100644
index f14bb37301d..00000000000
--- a/english/lts/security/2016/dla-381.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-381-1 icu</define-tag>
-<define-tag report_date>2016-1-11</define-tag>
-<define-tag secrefs>CVE-2015-2632</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-381.wml b/english/lts/security/2016/dla-381.wml
deleted file mode 100644
index 115ecab3323..00000000000
--- a/english/lts/security/2016/dla-381.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in ICU, a set of libraries that provides Unicode and
-internationalization support. Integer overflows in the ICU layout engine made
-it possible to disclose information.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this problem has been fixed in icu version
-4.4.1-8+squeeze5. We recommend you to upgrade your icu packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-381.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-382.data b/english/lts/security/2016/dla-382.data
deleted file mode 100644
index b5cad91c565..00000000000
--- a/english/lts/security/2016/dla-382.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-382-1 sudo</define-tag>
-<define-tag report_date>2016-1-11</define-tag>
-<define-tag secrefs>CVE-2015-5602 Bug#804149</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-382.wml b/english/lts/security/2016/dla-382.wml
deleted file mode 100644
index 6979ab41b61..00000000000
--- a/english/lts/security/2016/dla-382.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>When sudo is configured to allow a user to edit files under a
-directory that they can already write to without using sudo, they can
-actually edit (read and write) arbitrary files. Daniel Svartman
-reported that a configuration like this might be introduced
-unintentionally if the editable files are specified using wildcards,
-for example:</p>
-<pre>
- operator ALL=(root) sudoedit /home/*/*/test.txt
-</pre>
-
-<p>The default behaviour of sudo has been changed so that it does not
-allow editing of a file in a directory that the user can write to, or
-that is reached by following a symlink in a directory that the user
-can write to. These restrictions can be disabled, but this is
-strongly discouraged.</p>
-
-<p>For the oldoldstable distribution (squeeze), this has been fixed in
-version 1.7.4p4-2.squeeze.6.</p>
-
-<p>For the oldstable distribution (wheezy) and the stable distribution
-(jessie), this will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-382.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-383.data b/english/lts/security/2016/dla-383.data
deleted file mode 100644
index 4cc676f8d06..00000000000
--- a/english/lts/security/2016/dla-383.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-383-1 claws-mail</define-tag>
-<define-tag report_date>2016-1-12</define-tag>
-<define-tag secrefs>CVE-2015-8614 CVE-2015-8708</define-tag>
-<define-tag packages>claws-mail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-383.wml b/english/lts/security/2016/dla-383.wml
deleted file mode 100644
index 234f19d5887..00000000000
--- a/english/lts/security/2016/dla-383.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>"DrWhax" of the Tails project reported that Claws Mail is missing
-range checks in some text conversion functions. A remote attacker
-could exploit this to run arbitrary code under the account of a user
-that receives a message from them using Claws Mail.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8614">CVE-2015-8614</a>
-
- <p>There were no checks on the output length for conversions between
- JIS (ISO-2022-JP) and EUC-JP, between JIS and UTF-8, and from
- Shift_JIS to EUC-JP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8708">CVE-2015-8708</a>
-
- <p>The original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-8614">CVE-2015-8614</a> was incomplete.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 3.7.6-4+squeeze2.</p>
-
-<p>For the oldstable distribution (wheezy) and the stable distribution
-(jessie), this will be fixed soon. These versions were built with
-hardening features that make this issue harder to exploit.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-383.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-384.data b/english/lts/security/2016/dla-384.data
deleted file mode 100644
index b50e6b431cd..00000000000
--- a/english/lts/security/2016/dla-384.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-384-1 inspircd</define-tag>
-<define-tag report_date>2016-1-13</define-tag>
-<define-tag secrefs>CVE-2015-8702 Bug#668253</define-tag>
-<define-tag packages>inspircd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-384.wml b/english/lts/security/2016/dla-384.wml
deleted file mode 100644
index 11594b25326..00000000000
--- a/english/lts/security/2016/dla-384.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that InspIRCd did not validate the names in DNS
-responses before using them in inter-server communication. A remote
-attacker controlling the reverse DNS server for an IRC client could
-use this for denial of service or possibly for privilege escalation on
-the IRC network.</p>
-
-<p>InspIRCd appears to have been completely unusable since version
-1.1.22+dfsg-4+squeeze1 due to a bug in its build system triggered by
-(e)glibc versions newer than 2.9. This has also been fixed.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-384.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-385-2.data b/english/lts/security/2016/dla-385-2.data
deleted file mode 100644
index 85f045dc6c8..00000000000
--- a/english/lts/security/2016/dla-385-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-385-2 isc-dhcp</define-tag>
-<define-tag report_date>2016-1-19</define-tag>
-<define-tag secrefs>CVE-2015-8605 Bug##810875</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-385-2.wml b/english/lts/security/2016/dla-385-2.wml
deleted file mode 100644
index b32a5977b39..00000000000
--- a/english/lts/security/2016/dla-385-2.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>With the previous upload of the isc-dhcp package to Debian Squeeze LTS
-two issues got introduced into LTS that are resolved by this upload.</p>
-
-<ul>
-
-<li>(1)
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2015-8605">CVE-2015-8605</a>
-had only been resolved for the LDAP variant of the DHCP
-server package built from the isc-dhcp source package. With upload of
-version 4.1.1-P1-15+squeeze10, now all DHCP server variants (LDAP and
-non-LDAP alike) include the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-8605">CVE-2015-8605</a>. Thanks to Ben
-Hutchings for spotting this inaccuracy.</p></li>
-
-<li>(2)
-
-<p>The amd64 binary build of the previously uploaded isc-dhcp version
-(4.1.1-P1-15+squeeze9) was flawed and searched for the dhcpd.conf
-configuration file at the wrong location [1,2,3]. This flaw in the amd64
-build had been caused by a not-100%-pure-squeeze-lts build system on the
-maintainer's end. The amd64 build of version 4.1.1-P1-15+squeeze10 has
-been redone in a brand-new build environment and does not show the
-reported symptom(s) anymore.</p>
-
-<p>I deeply apologize for the experienced inconvenience to all who
-encountered this issue.</p></li>
-
-</ul>
-
-<p>[1] <a href="https://bugs.debian.org/811097">https://bugs.debian.org/811097</a><br>
-[2] <a href="https://bugs.debian.org/811397">https://bugs.debian.org/811397</a><br>
-[3] <a href="https://bugs.debian.org/811402">https://bugs.debian.org/811402</a></p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in isc-dhcp version 4.1.1-P1-15+squeeze10</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-385-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-385.data b/english/lts/security/2016/dla-385.data
deleted file mode 100644
index 11344d593d7..00000000000
--- a/english/lts/security/2016/dla-385.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-385-1 isc-dhcp</define-tag>
-<define-tag report_date>2016-1-14</define-tag>
-<define-tag secrefs>CVE-2015-8605 Bug##810875</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-385.wml b/english/lts/security/2016/dla-385.wml
deleted file mode 100644
index bdcada3a790..00000000000
--- a/english/lts/security/2016/dla-385.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that a maliciously crafted packet can crash any of the
-isc-dhcp applications. This includes the DHCP client, relay, and server
-application. Only IPv4 setups are affected.</p>
-
-<p>We recommend that you upgrade your isc-dhcp packages to version
-4.1.1-P1-15+squeeze9 (Debian squeeze LTS).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-385.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-386.data b/english/lts/security/2016/dla-386.data
deleted file mode 100644
index 02f0bd76ac2..00000000000
--- a/english/lts/security/2016/dla-386.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-386-1 cacti</define-tag>
-<define-tag report_date>2016-1-14</define-tag>
-<define-tag secrefs>CVE-2015-8604</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-386.wml b/english/lts/security/2016/dla-386.wml
deleted file mode 100644
index c3bc7e111fd..00000000000
--- a/english/lts/security/2016/dla-386.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was another SQL injection
-vulnerability in cacti, a web interface for graphing monitoring
-systems.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in cacti version
-0.8.7g-1+squeeze9+deb6u14.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-386.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-387.data b/english/lts/security/2016/dla-387.data
deleted file mode 100644
index becad4b3aca..00000000000
--- a/english/lts/security/2016/dla-387.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-387-1 openssh</define-tag>
-<define-tag report_date>2016-1-14</define-tag>
-<define-tag secrefs>CVE-2016-0777 CVE-2016-0778 Bug#810984</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-387.wml b/english/lts/security/2016/dla-387.wml
deleted file mode 100644
index b698611ad2c..00000000000
--- a/english/lts/security/2016/dla-387.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Security team discovered two vulnerabilities in the roaming
-code of the OpenSSH client (an implementation of the SSH protocol
-suite).</p>
-
-<p>SSH roaming enables a client, in case an SSH connection breaks
-unexpectedly, to resume it at a later time, provided the server also
-supports it.</p>
-
-<p>The OpenSSH server doesn't support roaming, but the OpenSSH client
-supports it (even though it's not documented) and it's enabled by
-default.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0777">CVE-2016-0777</a>
-
- <p>An information leak (memory disclosure) can be exploited by a rogue
- SSH server to trick a client into leaking sensitive data from the
- client memory, including for example private keys.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0778">CVE-2016-0778</a>
-
- <p>A buffer overflow (leading to file descriptor leak), can also be
- exploited by a rogue SSH server, but due to another bug in the code
- is possibly not exploitable, and only under certain conditions (not
- the default configuration), when using ProxyCommand, ForwardAgent or
- ForwardX11.</p></li>
-
-</ul>
-
-<p>This security update completely disables the roaming code in the OpenSSH
-client.</p>
-
-<p>It is also possible to disable roaming by adding the (undocumented)
-option <q>UseRoaming no</q> to the global /etc/ssh/ssh_config file, or to the
-user configuration in ~/.ssh/config, or by passing -oUseRoaming=no on
-the command line.</p>
-
-<p>Users with passphrase-less privates keys, especially in non interactive
-setups (automated jobs using ssh, scp, rsync+ssh etc.) are advised to
-update their keys if they have connected to an SSH server they don't
-trust.</p>
-
-<p>More details about identifying an attack and mitigations can be found in
-the Qualys Security Advisory.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-387.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-388.data b/english/lts/security/2016/dla-388.data
deleted file mode 100644
index 7dca557b636..00000000000
--- a/english/lts/security/2016/dla-388.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-388-1 dwarfutils</define-tag>
-<define-tag report_date>2016-1-15</define-tag>
-<define-tag secrefs>CVE-2015-8750</define-tag>
-<define-tag packages>dwarfutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-388.wml b/english/lts/security/2016/dla-388.wml
deleted file mode 100644
index 8522db1a34e..00000000000
--- a/english/lts/security/2016/dla-388.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a NULL deference in dwarfutils, a tool
-to dump DWARF debug information from ELF objects.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in dwarfutils version
-20100214-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-388.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-389.data b/english/lts/security/2016/dla-389.data
deleted file mode 100644
index 17d5a53f518..00000000000
--- a/english/lts/security/2016/dla-389.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-389-1 giflib</define-tag>
-<define-tag report_date>2016-1-15</define-tag>
-<define-tag secrefs>CVE-2015-7555 Bug#808704</define-tag>
-<define-tag packages>giflib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-389.wml b/english/lts/security/2016/dla-389.wml
deleted file mode 100644
index 118ad44e024..00000000000
--- a/english/lts/security/2016/dla-389.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that a maliciously crafted GIF can crash the giffix
-utility which is part of giflib-tools.</p>
-
-<p>We recommend that you upgrade your giflib-tools package to version
-4.1.6-9+deb6u1 (Debian squeeze LTS).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-389.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-390.data b/english/lts/security/2016/dla-390.data
deleted file mode 100644
index 8c227b94c60..00000000000
--- a/english/lts/security/2016/dla-390.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-390-1 dbconfig-common</define-tag>
-<define-tag report_date>2016-1-15</define-tag>
-<define-tag secrefs>NA Bug#805638</define-tag>
-<define-tag packages>dbconfig-common</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-390.wml b/english/lts/security/2016/dla-390.wml
deleted file mode 100644
index 1c742fbace4..00000000000
--- a/english/lts/security/2016/dla-390.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that dbconfig-common could, depending on the local
-umask, make PostgreSQL database backups that were readable by other
-users than the database owner. The issue is fixed in version
-1.8.46+squeeze.1. Access rights to existing database backups (not only
-for PostgreSQL) will be limited to the owner of the backup during the
-upgrade of dbconfig-common to this version. Future upgrades will not
-change access rights in case the local administrator has specific
-requirements.</p>
-
-<p>dbconfig-common is a Debian helper package that is used by a number of
-packages to manage the corresponding database.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-390.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-391.data b/english/lts/security/2016/dla-391.data
deleted file mode 100644
index 0a2b6e62aff..00000000000
--- a/english/lts/security/2016/dla-391.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-391-1 prosody</define-tag>
-<define-tag report_date>2016-1-16</define-tag>
-<define-tag secrefs>CVE-2016-1232</define-tag>
-<define-tag packages>prosody</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-391.wml b/english/lts/security/2016/dla-391.wml
deleted file mode 100644
index c067ae6b42f..00000000000
--- a/english/lts/security/2016/dla-391.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that in prosody, a Lightweight Jabber/XMPP server,
-used a weak PRNG in the mod_dialback module.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in prosody version
-0.7.0-1squeeze1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-391.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-392.data b/english/lts/security/2016/dla-392.data
deleted file mode 100644
index 4a6fd216dc0..00000000000
--- a/english/lts/security/2016/dla-392.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-392-1 roundcube</define-tag>
-<define-tag report_date>2016-1-17</define-tag>
-<define-tag secrefs>CVE-2015-8770</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-392.wml b/english/lts/security/2016/dla-392.wml
deleted file mode 100644
index f544497c55c..00000000000
--- a/english/lts/security/2016/dla-392.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>High-Tech Bridge Security Research Lab discovered a path traversal
-vulnerability in a popular webmail client Roundcube. Vulnerability can be
-exploited to gain access to sensitive information and under certain
-circumstances to execute arbitrary code and totally compromise the vulnerable
-server.</p>
-
-<p>The vulnerability exists due to insufficient sanitization of <q>_skin</q> HTTP POST
-parameter in "/index.php" script when changing between different skins of the
-web application. A remote authenticated attacker can use path traversal
-sequences (e.g. "../../") to load a new skin from arbitrary location on the
-system, readable by the webserver.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-392.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-393.data b/english/lts/security/2016/dla-393.data
deleted file mode 100644
index 43599bbe293..00000000000
--- a/english/lts/security/2016/dla-393.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-393-1 srtp</define-tag>
-<define-tag report_date>2016-1-18</define-tag>
-<define-tag secrefs>CVE-2015-6360</define-tag>
-<define-tag packages>srtp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-393.wml b/english/lts/security/2016/dla-393.wml
deleted file mode 100644
index 4a8fdd0f3a1..00000000000
--- a/english/lts/security/2016/dla-393.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC
-count and extension header length. Credit goes to Randell Jesup and the Firefox
-team for reporting this issue.</p>
-
-<p>(As there is no aead mode available in the Squeeze version, only srtp_unprotect() needed to be patched)</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-393.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-394.data b/english/lts/security/2016/dla-394.data
deleted file mode 100644
index 153b689d4a0..00000000000
--- a/english/lts/security/2016/dla-394.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-394-1 passenger</define-tag>
-<define-tag report_date>2016-1-18</define-tag>
-<define-tag secrefs>CVE-2015-7519</define-tag>
-<define-tag packages>passenger</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-394.wml b/english/lts/security/2016/dla-394.wml
deleted file mode 100644
index 451c94efa77..00000000000
--- a/english/lts/security/2016/dla-394.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and
-5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode
-without a filtering proxy, allows remote attackers to spoof headers passed to
-applications by using an _ (underscore) character instead of a - (dash)
-character in an HTTP header, as demonstrated by an X_User header.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-394.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-395.data b/english/lts/security/2016/dla-395.data
deleted file mode 100644
index 2455989805b..00000000000
--- a/english/lts/security/2016/dla-395.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-395-1 librsvg</define-tag>
-<define-tag report_date>2016-1-19</define-tag>
-<define-tag secrefs>CVE-2015-7557</define-tag>
-<define-tag packages>librsvg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-395.wml b/english/lts/security/2016/dla-395.wml
deleted file mode 100644
index 68e675409bf..00000000000
--- a/english/lts/security/2016/dla-395.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in LibRSVG, a library to render SVG graphics.
-Librsvg was susceptible to an out-of-bounds heap read when parsing SVG
-files.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in librsvg version
-2.26.3-1+deb6u3. We recommend you to upgrade your librsvg packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-395.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-396.data b/english/lts/security/2016/dla-396.data
deleted file mode 100644
index 4a1614f4568..00000000000
--- a/english/lts/security/2016/dla-396.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-396-1 bind9</define-tag>
-<define-tag report_date>2016-1-19</define-tag>
-<define-tag secrefs>CVE-2015-8704</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-396.wml b/english/lts/security/2016/dla-396.wml
deleted file mode 100644
index 5141d2912db..00000000000
--- a/english/lts/security/2016/dla-396.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that specific APL RR data could trigger an INSIST
-failure in apl_42.c and cause the BIND DNS server to exit, leading to a
-denial-of-service.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-396.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-397.data b/english/lts/security/2016/dla-397.data
deleted file mode 100644
index 991be8c2783..00000000000
--- a/english/lts/security/2016/dla-397.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-397-1 ecryptfs-utils</define-tag>
-<define-tag report_date>2016-1-20</define-tag>
-<define-tag secrefs>CVE-2016-1572</define-tag>
-<define-tag packages>ecryptfs-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-397.wml b/english/lts/security/2016/dla-397.wml
deleted file mode 100644
index 145829e3ab8..00000000000
--- a/english/lts/security/2016/dla-397.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn discovered that the setuid-root mount.ecryptfs_private helper
-in the ecryptfs-utils would mount over any target directory that the
-user owns, including a directory in procfs. A local attacker could use
-this flaw to escalate his privileges.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-397.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-398.data b/english/lts/security/2016/dla-398.data
deleted file mode 100644
index 6ee17c87b7b..00000000000
--- a/english/lts/security/2016/dla-398.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-398-1 privoxy</define-tag>
-<define-tag report_date>2016-1-23</define-tag>
-<define-tag secrefs>CVE-2016-1982 CVE-2016-1983</define-tag>
-<define-tag packages>privoxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-398.wml b/english/lts/security/2016/dla-398.wml
deleted file mode 100644
index d1601ec8958..00000000000
--- a/english/lts/security/2016/dla-398.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1982">CVE-2016-1982</a>
- <p>Prevent invalid reads in case of corrupt chunk-encoded content</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1983">CVE-2016-1983</a>
-
- <p>Remove empty Host headers in client requests; resulting in
- invalid reads.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-398.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-399.data b/english/lts/security/2016/dla-399.data
deleted file mode 100644
index 17236ec1bd6..00000000000
--- a/english/lts/security/2016/dla-399.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-399-1 foomatic-filters</define-tag>
-<define-tag report_date>2016-1-23</define-tag>
-<define-tag secrefs>not yet assigned</define-tag>
-<define-tag packages>foomatic-filters</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-399.wml b/english/lts/security/2016/dla-399.wml
deleted file mode 100644
index c6c0b325426..00000000000
--- a/english/lts/security/2016/dla-399.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>cups-filters contains multiple buffer overflows caused by lack of size checks
-when copying from environment variables to local buffers (strcpy) as well on
-string concatenation operations (strcat).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-399.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-400.data b/english/lts/security/2016/dla-400.data
deleted file mode 100644
index a6a5c9d3239..00000000000
--- a/english/lts/security/2016/dla-400.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-400-1 pound</define-tag>
-<define-tag report_date>2016-1-24</define-tag>
-<define-tag secrefs>CVE-2009-3555 CVE-2011-3389 CVE-2012-4929 CVE-2014-3566</define-tag>
-<define-tag packages>pound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-400.wml b/english/lts/security/2016/dla-400.wml
deleted file mode 100644
index d19d0d3590b..00000000000
--- a/english/lts/security/2016/dla-400.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes certain known vulnerabilities in pound in squeeze-lts by
-backporting the version in wheezy.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3555">CVE-2009-3555</a>
-
- <p>The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as
- used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl
- in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l,
- GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS)
- 3.12.4 and earlier, multiple Cisco products, and other products,
- does not properly associate renegotiation handshakes with an
- existing connection, which allows man-in-the-middle attackers to
- insert data into HTTPS sessions, and possibly other types of
- sessions protected by TLS or SSL, by sending an unauthenticated
- request that is processed retroactively by a server in a
- post-renegotiation context, related to a <q>plaintext injection</q>
- attack, aka the <q>Project Mogul</q> issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3389">CVE-2011-3389</a>
-
- <p>The SSL protocol, as used in certain configurations in Microsoft
- Windows and Microsoft Internet Explorer, Mozilla Firefox, Google
- Chrome, Opera, and other products, encrypts data by using CBC mode
- with chained initialization vectors, which allows man-in-the-middle
- attackers to obtain plaintext HTTP headers via a blockwise
- chosen-boundary attack (BCBA) on an HTTPS session, in conjunction
- with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the
- Java URLConnection API, or (3) the Silverlight WebClient API, aka a
- <q>BEAST</q> attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4929">CVE-2012-4929</a>
-
- <p>The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google
- Chrome, Qt, and other products, can encrypt compressed data without
- properly obfuscating the length of the unencrypted data, which
- allows man-in-the-middle attackers to obtain plaintext HTTP headers
- by observing length differences during a series of guesses in which
- a string in an HTTP request potentially matches an unknown string in
- an HTTP header, aka a <q>CRIME</q> attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3566">CVE-2014-3566</a>
-
- <p>The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
- products, uses nondeterministic CBC padding, which makes it easier
- for man-in-the-middle attackers to obtain cleartext data via a
- padding-oracle attack, aka the <q>POODLE</q> issue.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-400.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-401.data b/english/lts/security/2016/dla-401.data
deleted file mode 100644
index 1fa4d712fad..00000000000
--- a/english/lts/security/2016/dla-401.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-401-1 imlib2</define-tag>
-<define-tag report_date>2016-1-24</define-tag>
-<define-tag secrefs>CVE-2014-9762 CVE-2014-9763 CVE-2014-9764</define-tag>
-<define-tag packages>imlib2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-401.wml b/english/lts/security/2016/dla-401.wml
deleted file mode 100644
index eb8d00d44d2..00000000000
--- a/english/lts/security/2016/dla-401.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9762">CVE-2014-9762</a>
-
- <p>GIF loader: Fix segv on images without colormap</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9763">CVE-2014-9763</a>
-
- <p>Prevent division-by-zero crashes</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9764">CVE-2014-9764</a>
-
- <p>Fix segfault when opening <tt>input/queue/id:000007,src:000000,op:flip1,pos:51</tt> with feh</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-401.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-402.data b/english/lts/security/2016/dla-402.data
deleted file mode 100644
index b81b87bb28b..00000000000
--- a/english/lts/security/2016/dla-402.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-402-1 tiff</define-tag>
-<define-tag report_date>2016-1-26</define-tag>
-<define-tag secrefs>CVE-2015-8665 CVE-2015-8683 Bug#809021 Bug#808968</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-402.wml b/english/lts/security/2016/dla-402.wml
deleted file mode 100644
index 877bd77e0da..00000000000
--- a/english/lts/security/2016/dla-402.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security flaws have been found and solved in libtiff, library that provides
-support for handling Tag Image File Format (TIFF). These flaws concern out of
-bounds reads in the TIFFRGBAImage interface, when parsing unsupported values
-related to LogLUV and CIELab. <a href="https://security-tracker.debian.org/tracker/CVE-2015-8665">CVE-2015-8665</a> was reported by limingxing and
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-8683">CVE-2015-8683</a> by zzf of Alibaba.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tiff version
-3.9.4-5+squeeze13. We recommend you to upgrade your tiff packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-402.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-403.data b/english/lts/security/2016/dla-403.data
deleted file mode 100644
index 5bfead9b216..00000000000
--- a/english/lts/security/2016/dla-403.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-403-1 radicale</define-tag>
-<define-tag report_date>2016-1-26</define-tag>
-<define-tag secrefs>CVE-2015-8747 CVE-2015-8748 Bug#809920</define-tag>
-<define-tag packages>radicale</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-403.wml b/english/lts/security/2016/dla-403.wml
deleted file mode 100644
index 931bed91548..00000000000
--- a/english/lts/security/2016/dla-403.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered by Unrud in Radicale, a calendar
-and addressbook server. A remote attacker could exploit these
-vulnerabilities and call arbitrary functions by sending crafted HTTP
-requests.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8748">CVE-2015-8748</a>
-
- <p>Prevent regex injection in rights management.
- Prevent crafted HTTP request from calling arbitrary functions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8747">CVE-2015-8747</a>
-
- <p>The multifilesystem backend allows access to arbitrary files
- on all platforms. (Squeeze is not affected because the
- multifilesystem backend does not exist in this version.)</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-0.3-2+deb6u1.</p>
-
-<p>We recommend that you upgrade your radicale packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-403.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-404.data b/english/lts/security/2016/dla-404.data
deleted file mode 100644
index 05c290d61b3..00000000000
--- a/english/lts/security/2016/dla-404.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-404-1 nginx</define-tag>
-<define-tag report_date>2016-1-27</define-tag>
-<define-tag secrefs>CVE-2016-0742 Bug#812806</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-404.wml b/english/lts/security/2016/dla-404.wml
deleted file mode 100644
index e2860d9ca44..00000000000
--- a/english/lts/security/2016/dla-404.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a invalid pointer deference in nginx, a
-small, powerful, scalable web/proxy server. An invalid pointer
-dereference might occur during DNS server response processing, allowing
-an attacker who is able to forge UDP packets from the DNS server to cause
-worker process crash</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in nginx version
-0.7.67-3+squeeze4+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-404.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-405.data b/english/lts/security/2016/dla-405.data
deleted file mode 100644
index 859fb1f80f9..00000000000
--- a/english/lts/security/2016/dla-405.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-405-1 tiff</define-tag>
-<define-tag report_date>2016-1-30</define-tag>
-<define-tag secrefs>CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 CVE-2015-8784</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-405.wml b/english/lts/security/2016/dla-405.wml
deleted file mode 100644
index c0e3e07ee53..00000000000
--- a/english/lts/security/2016/dla-405.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security flaws have been found and solved in libtiff, a
-library that provides support for handling Tag Image File Format
-(TIFF). These flaws concern out of bounds reads and writes in the
-LogL16Decode, LogLuvDecode24, LogLuvDecode32, LogLuvDecodeTile,
-LogL16Encode, LogLuvEncode24, LogLuvEncode32 and NeXTDecode functions.</p>
-
-<p>These IDs were assigned for the problems: <a href="https://security-tracker.debian.org/tracker/CVE-2015-8781">CVE-2015-8781</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-8782">CVE-2015-8782</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8783">CVE-2015-8783</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-8784">CVE-2015-8784</a>.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tiff version
-3.9.4-5+squeeze14. We recommend you to upgrade your tiff packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-405.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-406.data b/english/lts/security/2016/dla-406.data
deleted file mode 100644
index 5014a61207d..00000000000
--- a/english/lts/security/2016/dla-406.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-406-1 phpmyadmin</define-tag>
-<define-tag report_date>2016-1-30</define-tag>
-<define-tag secrefs>CVE-2016-2039 CVE-2016-2041</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-406.wml b/english/lts/security/2016/dla-406.wml
deleted file mode 100644
index ff81eef7630..00000000000
--- a/english/lts/security/2016/dla-406.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several flaws were discovered in the CSRF authentication code of
-phpMyAdmin.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2039">CVE-2016-2039</a>
-
- <p>The XSRF/CSRF token is generated with a weak algorithm using
- functions that do not return cryptographically secure values.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2041">CVE-2016-2041</a>
-
- <p>The comparison of the XSRF/CSRF token parameter with the value saved
- in the session is vulnerable to timing attacks. Moreover, the
- comparison could be bypassed if the XSRF/CSRF token matches a
- particular pattern.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-406.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-407.data b/english/lts/security/2016/dla-407.data
deleted file mode 100644
index 23bc90b56b5..00000000000
--- a/english/lts/security/2016/dla-407.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-407-1 prosody</define-tag>
-<define-tag report_date>2016-1-30</define-tag>
-<define-tag secrefs>CVE-2016-0756</define-tag>
-<define-tag packages>prosody</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-407.wml b/english/lts/security/2016/dla-407.wml
deleted file mode 100644
index 70a5fe7a8a7..00000000000
--- a/english/lts/security/2016/dla-407.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The flaw allows a malicious server to impersonate the vulnerable domain
-to any XMPP domain whose domain name includes the attacker's domain as a
-suffix.</p>
-
-<p>For example, <q>bber.example</q> would be able to connect to <q>jabber.example</q>
-and successfully impersonate any vulnerable server on the network.</p>
-
-<p>This release also fixes a regression introduced in the previous
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-1232">CVE-2016-1232</a> fix: s2s doesn't work if /dev/urandom is read-only.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-407.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-408.data b/english/lts/security/2016/dla-408.data
deleted file mode 100644
index 7be5a445469..00000000000
--- a/english/lts/security/2016/dla-408.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-408-1 gosa</define-tag>
-<define-tag report_date>2016-1-31</define-tag>
-<define-tag secrefs>CVE-2015-8771</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-408.wml b/english/lts/security/2016/dla-408.wml
deleted file mode 100644
index 31a163fd8c6..00000000000
--- a/english/lts/security/2016/dla-408.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>GOsa is a combination of system-administrator and end-user web interface,
-designed to handle LDAP based setups.</p>
-
-<p>GOsa upstream reported a code injection vulnerability in the Samba plugin
-code of GOsa. During Samba password changes it has been possible to
-inject malicious Perl code.</p>
-
-<p>This upload to Debian Squeeze LTS fixes this issues. However, if you
-upgrade to this fixed package revision, please note that Samba password
-changes will stop working until the sambaHashHook parameter in gosa.conf
-has been updated to accept base64 encoded password strings from the PHP
-code of GOsa.</p>
-
-<p>Please read /usr/share/doc/gosa/NEWS.gz and the gosa.conf (5) man page
-after you have upgraded to this package revision and adapt gosa.conf as
-described there.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-408.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-409.data b/english/lts/security/2016/dla-409.data
deleted file mode 100644
index 359d653dfdc..00000000000
--- a/english/lts/security/2016/dla-409.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-409-1 mysql-5.5</define-tag>
-<define-tag report_date>2016-2-1</define-tag>
-<define-tag secrefs>CVE-2016-0505 CVE-2016-0546 CVE-2016-0596 CVE-2016-0597 CVE-2016-0598 CVE-2016-0600 CVE-2016-0606 CVE-2016-0608 CVE-2016-0609 CVE-2016-0616 Bug#811428</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-409.wml b/english/lts/security/2016/dla-409.wml
deleted file mode 100644
index 696f84c1b13..00000000000
--- a/english/lts/security/2016/dla-409.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been found in the MySQL database server. These
-issues have been addressed by upgrading to the most recent upstream
-release of MySQL, 5.5.47. Please, look at the MySQL 5.5 Release Notes
-and Oracle's Critical Patch Update advisory for further details:</p>
-
-<ul>
- <li><a href="http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html">http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html</a></li>
- <li><a href="http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html">http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html</a></li>
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mysql-5.5
-version 5.5.47-0+deb6u1. We recommend you to upgrade your mysql-5.5
-packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-409.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-410.data b/english/lts/security/2016/dla-410.data
deleted file mode 100644
index 3bf376b9339..00000000000
--- a/english/lts/security/2016/dla-410.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-410-1 openjdk-6</define-tag>
-<define-tag report_date>2016-2-4</define-tag>
-<define-tag secrefs>CVE-2015-7575 CVE-2015-8126 CVE-2015-8472 CVE-2016-0402 CVE-2016-0448 CVE-2016-0466 CVE-2016-0483 CVE-2016-0494</define-tag>
-<define-tag packages>openjdk-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-410.wml b/english/lts/security/2016/dla-410.wml
deleted file mode 100644
index 129d5b2cbc0..00000000000
--- a/english/lts/security/2016/dla-410.wml
+++ /dev/null
@@ -1,86 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in breakouts of
-the Java sandbox, information disclosure, denial of service and insecure
-cryptography.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7575">CVE-2015-7575</a>
-
- <p>A flaw was found in the way TLS 1.2 could use the MD5 hash
- function for signing ServerKeyExchange and Client
- Authentication packets during a TLS handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8126">CVE-2015-8126</a>
-
- <p>Multiple buffer overflows in the (1) png_set_PLTE and (2)
- png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x
- before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before
- 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause
- a denial of service (application crash) or possibly have
- unspecified other impact via a small bit-depth value in an IHDR
- (aka image header) chunk in a PNG image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8472">CVE-2015-8472</a>
-
- <p>Buffer overflow in the png_set_PLTE function in libpng before
- 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before
- 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows
- remote attackers to cause a denial of service (application
- crash) or possibly have unspecified other impact via a small
- bit-depth value in an IHDR (aka image header) chunk in a PNG
- image. NOTE: this vulnerability exists because of an incomplete
- fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-8126">CVE-2015-8126</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0402">CVE-2016-0402</a>
-
- <p>Unspecified vulnerability in the Java SE and Java SE Embedded
- components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE
- Embedded 8u65 allows remote attackers to affect integrity via
- unknown vectors related to Networking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0448">CVE-2016-0448</a>
-
- <p>Unspecified vulnerability in the Java SE and Java SE Embedded
- components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE
- Embedded 8u65 allows remote authenticated users to affect
- confidentiality via vectors related to JMX.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0466">CVE-2016-0466</a>
-
- <p>It was discovered that the JAXP component in OpenJDK did not
- properly enforce the totalEntitySizeLimit limit. An attacker
- able to make a Java application process a specially crafted XML
- file could use this flaw to make the application consume an
- excessive amount of memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0483">CVE-2016-0483</a>
-
- <p>Unspecified vulnerability in the Java SE, Java SE Embedded, and
- JRockit components in Oracle Java SE 6u105, 7u91, and 8u66;
- Java SE Embedded 8u65; and JRockit R28.3.8 allows remote
- attackers to affect confidentiality, integrity, and
- availability via vectors related to AWT.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0494">CVE-2016-0494</a>
-
- <p>Unspecified vulnerability in the Java SE and Java SE Embedded
- components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE
- Embedded 8u65 allows remote attackers to affect
- confidentiality, integrity, and availability via
- unknown vectors related to 2D.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-6b38-1.13.10-1~deb6u1.</p>
-
-<p>We recommend that you upgrade your openjdk-6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-410.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-411-2.data b/english/lts/security/2016/dla-411-2.data
deleted file mode 100644
index f193cfbb7ac..00000000000
--- a/english/lts/security/2016/dla-411-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-411-2 eglibc</define-tag>
-<define-tag report_date>2016-2-12</define-tag>
-<define-tag secrefs>CVE-2014-9761 Bug#814078</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-411-2.wml b/english/lts/security/2016/dla-411-2.wml
deleted file mode 100644
index 62c5e02bc80..00000000000
--- a/english/lts/security/2016/dla-411-2.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-9761">CVE-2014-9761</a> in Squeeze wrongly backported the upstream
-patch. New symbols were not declared as private and the ABI changed.
-This made some programs and services crash after the upgrade, and needed
-to be restarted.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version 2.11.3-4+deb6u10</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-411-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-411.data b/english/lts/security/2016/dla-411.data
deleted file mode 100644
index ddef0957883..00000000000
--- a/english/lts/security/2016/dla-411.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-411-1 eglibc</define-tag>
-<define-tag report_date>2016-2-5</define-tag>
-<define-tag secrefs>CVE-2014-9761 CVE-2015-8776 CVE-2015-8778 CVE-2015-8779</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-411.wml b/english/lts/security/2016/dla-411.wml
deleted file mode 100644
index fa27eb4545c..00000000000
--- a/english/lts/security/2016/dla-411.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in the Debian GNU C Library,
-eglibc:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9761">CVE-2014-9761</a>
-
- <p>The math's nan* function wrongly handled payload strings, yielding
- to an unbounded stack allocation based on the length of the
- arguments. To solve this issue, payload parsing has been refactored
- out of strtod into a separate functions that nan* can call directly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8776">CVE-2015-8776</a>
-
- <p>The strftime() function made it possible to access invalid memory,
- allowing to segfault the calling application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8778">CVE-2015-8778</a>
-
- <p>hcreate() was susceptible to an integer overflow, that may results
- in out-of-bounds heap accesses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8779">CVE-2015-8779</a>
-
- <p>The catopen() function suffered from multiple unbounded stack
- allocations.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version
-eglibc_2.11.3-4+deb6u9. We recommend you to upgrade your eglibc
-packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-411.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-412.data b/english/lts/security/2016/dla-412.data
deleted file mode 100644
index a0d9f0eda43..00000000000
--- a/english/lts/security/2016/dla-412.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-412-1 linux-2.6</define-tag>
-<define-tag report_date>2016-2-06</define-tag>
-<define-tag secrefs>CVE-2015-7566 CVE-2015-8767 CVE-2015-8785 CVE-2016-0723 CVE-2016-2069</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-412.wml b/english/lts/security/2016/dla-412.wml
deleted file mode 100644
index 47b393ddb28..00000000000
--- a/english/lts/security/2016/dla-412.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7566">CVE-2015-7566</a>
-
- <p>Ralf Spenneberg of OpenSource Security reported that the visor
- driver crashes when a specially crafted USB device without bulk-out
- endpoint is detected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8767">CVE-2015-8767</a>
-
- <p>An SCTP denial-of-service was discovered which can be triggered by a
- local attacker during a heartbeat timeout event after the 4-way
- handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8785">CVE-2015-8785</a>
-
- <p>It was discovered that local users permitted to write to a file on
- a FUSE filesystem could cause a denial of service (unkillable loop
- in the kernel).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0723">CVE-2016-0723</a>
-
- <p>A use-after-free vulnerability was discovered in the TIOCGETD ioctl.
- A local attacker could use this flaw for denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2069">CVE-2016-2069</a>
-
- <p>Andy Lutomirski discovered a race condition in flushing of the TLB
- when switching tasks. On an SMP system this could possibly lead to
- a crash, information leak or privilege escalation.</p></li>
-
-</ul>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze19. Additionally, this version
-includes upstream stable update 2.6.32.70. This is the final update
-to the linux-2.6 package for squeeze.</p>
-
-<p>For the oldstable distribution (wheezy), these problems will be fixed
-soon.</p>
-
-<p>For the stable distribution (jessie), <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566">CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767">CVE-2015-8767</a> and
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723">CVE-2016-0723</a> were fixed in linux version 3.16.7-ckt20-1+deb8u3 and
-the remaining problems will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-412.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-413.data b/english/lts/security/2016/dla-413.data
deleted file mode 100644
index 3e407efecaf..00000000000
--- a/english/lts/security/2016/dla-413.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-413-1 gajim</define-tag>
-<define-tag report_date>2016-2-9</define-tag>
-<define-tag secrefs>CVE-2015-8688 Bug#809900</define-tag>
-<define-tag packages>gajim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-413.wml b/english/lts/security/2016/dla-413.wml
deleted file mode 100644
index 4bf426d7679..00000000000
--- a/english/lts/security/2016/dla-413.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Affected versions of gajim allow remote attackers to modify the roster
-and intercept messages via a crafted roster-push IQ stanza.</p>
-
-<p>This has been fixed in squeeze-lts by version 0.13.4-3+squeeze4.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-413.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-414.data b/english/lts/security/2016/dla-414.data
deleted file mode 100644
index 3f2b51f1470..00000000000
--- a/english/lts/security/2016/dla-414.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-414-1 chrony</define-tag>
-<define-tag report_date>2016-2-12</define-tag>
-<define-tag secrefs>CVE-2016-1567 Bug#812923</define-tag>
-<define-tag packages>chrony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-414.wml b/english/lts/security/2016/dla-414.wml
deleted file mode 100644
index ab076306ba6..00000000000
--- a/english/lts/security/2016/dla-414.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer
-associations of symmetric keys when authenticating packets, which might
-allow remote attackers to conduct impersonation attacks via an arbitrary
-trusted key, aka a "skeleton key."</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-414.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-415.data b/english/lts/security/2016/dla-415.data
deleted file mode 100644
index 56ee5acd15e..00000000000
--- a/english/lts/security/2016/dla-415.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-415-1 cpio</define-tag>
-<define-tag report_date>2016-2-15</define-tag>
-<define-tag secrefs>CVE-2016-2037 Bug#812401</define-tag>
-<define-tag packages>cpio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-415.wml b/english/lts/security/2016/dla-415.wml
deleted file mode 100644
index ab43fd4a355..00000000000
--- a/english/lts/security/2016/dla-415.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds write was discovered in the parsing of cpio files. For
-Debian 6 <q>Squeeze</q>, this issue has been fixed in cpio version
-2.11-4+deb6u2.</p>
-
-<p>We recommend you to upgrade your cpio package.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-415.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-416.data b/english/lts/security/2016/dla-416.data
deleted file mode 100644
index 2904e01c3f5..00000000000
--- a/english/lts/security/2016/dla-416.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-416-1 eglibc</define-tag>
-<define-tag report_date>2016-2-16</define-tag>
-<define-tag secrefs>CVE-2015-7547</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-416.wml b/english/lts/security/2016/dla-416.wml
deleted file mode 100644
index 8eba5c4e0d7..00000000000
--- a/english/lts/security/2016/dla-416.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in the Debian GNU C Library,
-eglibc:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7547">CVE-2015-7547</a>
-
- <p>The Google Security Team and Red Hat discovered that the glibc
- host name resolver function, getaddrinfo, when processing
- AF_UNSPEC queries (for dual A/AAAA lookups), could mismange its
- internal buffers, leading to a stack-based buffer overflow and
- arbitrary code execution. This vulnerability affects most
- applications which perform host name resolution using getaddrinfo,
- including system services.</p></li>
-
-<li>The following fixed vulnerabilities currently lack CVE assignment
-
- <p>Andreas Schwab reported a memory leak (memory allocation without a
- matching deallocation) while processing certain DNS answers in
- getaddrinfo, related to the _nss_dns_gethostbyname4_r function.
- This vulnerability could lead to a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version
-eglibc_2.11.3-4+deb6u11. In addition this version corrects the fix for
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-9761">CVE-2014-9761</a>
-in Squeeze, which have wrongly marked a few symbols as
-public instead of private.</p>
-
-<p>While it is only necessary to ensure that all processes are not using
-the old eglibc anymore, it is recommended to reboot the machines after
-applying the security upgrade.</p>
-
-<p>We recommend you to upgrade your eglibc packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-416.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-417.data b/english/lts/security/2016/dla-417.data
deleted file mode 100644
index 84c36532043..00000000000
--- a/english/lts/security/2016/dla-417.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-417-1 xdelta3</define-tag>
-<define-tag report_date>2016-2-16</define-tag>
-<define-tag secrefs>CVE-2014-9765 Bug#814067</define-tag>
-<define-tag packages>xdelta3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-417.wml b/english/lts/security/2016/dla-417.wml
deleted file mode 100644
index fb58d3d5393..00000000000
--- a/english/lts/security/2016/dla-417.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a buffer overflow in in xdelta3,
-a diff utility which works with binary files. This vulnerability
-allowed arbitrary code execution from input files.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in xdelta3 version
-0y.dfsg-1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-417.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-418.data b/english/lts/security/2016/dla-418.data
deleted file mode 100644
index 43df4a0e46c..00000000000
--- a/english/lts/security/2016/dla-418.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-418-1 wordpress</define-tag>
-<define-tag report_date>2016-2-17</define-tag>
-<define-tag secrefs>CVE-2016-2221 CVE-2016-2222 Bug#813697</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-418.wml b/english/lts/security/2016/dla-418.wml
deleted file mode 100644
index 9bf7421a97a..00000000000
--- a/english/lts/security/2016/dla-418.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>WordPress versions 4.4.1 and earlier are affected by two security
-issues: a possible Side Request Forgery Vulnerability for certain
-local URIs, reported by Ronni Skansing; and an open redirection
-attack, reported by Shailesh Suthar.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2221">CVE-2016-2221</a>
-
- <p>Wordpress could be vulnerable for an open redirection attack
- which was fixed by better validation of the URL used in HTTP
- redirects.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2222">CVE-2016-2222</a>
-
- <p>It was discovered that Wordpress was susceptible for a possible Side
- Request Forgery Vulnerability because it considered for instance
- 0.1.2.3 as a valid IP.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb6u9.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-418.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-419.data b/english/lts/security/2016/dla-419.data
deleted file mode 100644
index e83f6975847..00000000000
--- a/english/lts/security/2016/dla-419.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-419-1 gtk+2.0</define-tag>
-<define-tag report_date>2016-2-17</define-tag>
-<define-tag secrefs>CVE-2013-7447 Bug#799275</define-tag>
-<define-tag packages>gtk+2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-419.wml b/english/lts/security/2016/dla-419.wml
deleted file mode 100644
index f0c944fa6f6..00000000000
--- a/english/lts/security/2016/dla-419.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gtk+2.0, a graphical user interface library, was susceptible to an integer
-overflow in its gdk_cairo_set_source_pixbuf function when allocating a
-large block of memory.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in gtk+2.0 version
-2.20.1-2+deb6u1. We recommend you to upgrade your gtk+2.0 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-419.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-420.data b/english/lts/security/2016/dla-420.data
deleted file mode 100644
index dae95dde0d7..00000000000
--- a/english/lts/security/2016/dla-420.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-420-1 libmatroska</define-tag>
-<define-tag report_date>2016-2-18</define-tag>
-<define-tag secrefs>CVE-2014-9765</define-tag>
-<define-tag packages>libmatroska</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-420.wml b/english/lts/security/2016/dla-420.wml
deleted file mode 100644
index e227ec9ba16..00000000000
--- a/english/lts/security/2016/dla-420.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a invalid memory address issue
-in libmatroska, an extensible open standard audio/video container
-format.</p>
-
-<p>When reading a block group or a simple block that uses EBML
-lacing the frame sizes indicated in the lacing weren't checked
-against the available number of bytes. If the indicated frame
-size was bigger than the whole block's size the parser would read
-beyond the end of the buffer resulting in a heap information
-leak.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in libmatroska
-version 0.8.1-1.1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-420.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-421.data b/english/lts/security/2016/dla-421.data
deleted file mode 100644
index 2b1a94ac1e2..00000000000
--- a/english/lts/security/2016/dla-421.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-421-1 openssl</define-tag>
-<define-tag report_date>2016-2-20</define-tag>
-<define-tag secrefs>CVE-2015-3197</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-421.wml b/english/lts/security/2016/dla-421.wml
deleted file mode 100644
index 99876ec3f56..00000000000
--- a/english/lts/security/2016/dla-421.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3197">CVE-2015-3197</a>
-
-<p>A malicious client can negotiate SSLv2 ciphers that have been disabled on the
-server and complete SSLv2 handshakes even if all SSLv2 ciphers have been
-disabled, provided that the SSLv2 protocol was not also disabled via
-SSL_OP_NO_SSLv2.</p></li>
-
-</ul>
-
-<p>Additionally, when using a DHE cipher suite a new DH key will always be
-generated for each connection.</p>
-
-<p>This will be the last security update for the squeeze version of the package.
-The 0.9.8 version is no longer supported and the squeeze LTS support will end
-soon. If you are using openssl you should upgrade to wheezy or preferably
-jessie. The version in those versions contain many security improvements.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-421.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-422.data b/english/lts/security/2016/dla-422.data
deleted file mode 100644
index 46c7a89e83f..00000000000
--- a/english/lts/security/2016/dla-422.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-422-1 python-imaging</define-tag>
-<define-tag report_date>2016-2-21</define-tag>
-<define-tag secrefs>CVE-2016-0775 Bug#813909</define-tag>
-<define-tag packages>python-imaging</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-422.wml b/english/lts/security/2016/dla-422.wml
deleted file mode 100644
index 67b7641e279..00000000000
--- a/english/lts/security/2016/dla-422.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two buffer overflows were discovered in python-imaging, a Python
-library for loading and manipulating image files, which may lead to
-the execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0775">CVE-2016-0775</a>
-
- <p>Buffer overflow in FliDecode.c</p></li>
-
-</ul>
-
-<p>The second buffer overflow was in PcdDecode.c. A CVE identifier has
-not been assigned yet.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-1.1.7-2+deb6u2.</p>
-
-<p>We recommend that you upgrade your python-imaging packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-422.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-423.data b/english/lts/security/2016/dla-423.data
deleted file mode 100644
index 201404f6f8b..00000000000
--- a/english/lts/security/2016/dla-423.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-423-1 krb5</define-tag>
-<define-tag report_date>2016-2-22</define-tag>
-<define-tag secrefs>CVE-2015-8629 CVE-2015-8631 Bug#813126 Bug#813296</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-423.wml b/english/lts/security/2016/dla-423.wml
deleted file mode 100644
index 651ac7047ca..00000000000
--- a/english/lts/security/2016/dla-423.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8629">CVE-2015-8629</a>
-
- <p>It was discovered that an authenticated attacker can cause kadmind
- to read beyond the end of allocated memory by sending a string
- without a terminating zero byte. Information leakage may be possible
- for an attacker with permission to modify the database.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8631">CVE-2015-8631</a>
-
- <p>It was discovered that an authenticated attacker can cause kadmind
- to leak memory by supplying a null principal name in a request which
- uses one. Repeating these requests will eventually cause kadmind to
- exhaust all available memory.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-423.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-424.data b/english/lts/security/2016/dla-424.data
deleted file mode 100644
index a70fd6c4065..00000000000
--- a/english/lts/security/2016/dla-424.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-424-1 didiwiki</define-tag>
-<define-tag report_date>2016-2-22</define-tag>
-<define-tag secrefs>CVE-2013-7448 Bug#815111</define-tag>
-<define-tag packages>didiwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-424.wml b/english/lts/security/2016/dla-424.wml
deleted file mode 100644
index 37dabe5f447..00000000000
--- a/english/lts/security/2016/dla-424.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alexander Izmailov discovered that didiwiki, a wiki implementation,
-failed to correctly validate user-supplied input, thus allowing a
-malicious user to access any part of the filesystem.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-424.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-425.data b/english/lts/security/2016/dla-425.data
deleted file mode 100644
index 1781ec0ec15..00000000000
--- a/english/lts/security/2016/dla-425.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-425-1 libssh</define-tag>
-<define-tag report_date>2016-2-23</define-tag>
-<define-tag secrefs>CVE-2016-0739</define-tag>
-<define-tag packages>libssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-425.wml b/english/lts/security/2016/dla-425.wml
deleted file mode 100644
index 1bfe3ce15d9..00000000000
--- a/english/lts/security/2016/dla-425.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Aris Adamantiadis of the libssh team discovered that libssh, an SSH2
-protocol implementation used by many applications, did not generate
-sufficiently long Diffie-Hellman secrets.</p>
-
-<p>This vulnerability could be exploited by an eavesdropper to decrypt
-and to intercept SSH sessions.</p>
-
-<p>For the oldoldstable distribution (squeeze), this has been fixed in
-version 0.4.5-3+squeeze3.</p>
-
-<p>For the oldstable (wheezy) and stable (jessie) distributions, this
-will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-425.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-426.data b/english/lts/security/2016/dla-426.data
deleted file mode 100644
index 39f849f8ade..00000000000
--- a/english/lts/security/2016/dla-426.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-426-1 libssh2</define-tag>
-<define-tag report_date>2016-2-23</define-tag>
-<define-tag secrefs>CVE-2016-0787</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-426.wml b/english/lts/security/2016/dla-426.wml
deleted file mode 100644
index 5e72ef59f7c..00000000000
--- a/english/lts/security/2016/dla-426.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andreas Schneider reported that libssh2, an SSH2 protocol
-implementation used by many applications, did not generate
-sufficiently long Diffie-Hellman secrets.</p>
-
-<p>This vulnerability could be exploited by an eavesdropper to decrypt
-and to intercept SSH sessions.</p>
-
-<p>For the oldoldstable distribution (squeeze), this has been fixed in
-version 1.2.6-1+deb6u2. Although the changelog refers to <q>sha256</q>,
-this version only supports DH SHA-1 key exchange and it is that key
-exchange method that has been fixed.</p>
-
-<p>For the oldstable (wheezy) and stable (jessie) distributions, this
-will be fixed soon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-426.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-427.data b/english/lts/security/2016/dla-427.data
deleted file mode 100644
index 6ec03846115..00000000000
--- a/english/lts/security/2016/dla-427.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-427-1 nss</define-tag>
-<define-tag report_date>2016-2-24</define-tag>
-<define-tag secrefs>CVE-2016-1938</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-427.wml b/english/lts/security/2016/dla-427.wml
deleted file mode 100644
index d0cb85b473d..00000000000
--- a/english/lts/security/2016/dla-427.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The s_mp_div function in Mozilla Network Security Services (NSS) before
-3.21, improperly divides numbers, which might make it easier for remote
-attackers to defeat cryptographic protection mechanisms by leveraging
-use of the (1) mp_div or (2) mp_exptmod function.</p>
-
-<p>For the oldoldstable distribution (squeeze), these problem has been fixed
-in version 3.12.8-1+squeeze14.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-427.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-428.data b/english/lts/security/2016/dla-428.data
deleted file mode 100644
index 1d6fe580bbc..00000000000
--- a/english/lts/security/2016/dla-428.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-428-1 websvn</define-tag>
-<define-tag report_date>2016-2-24</define-tag>
-<define-tag secrefs>CVE-2016-2511</define-tag>
-<define-tag packages>websvn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-428.wml b/english/lts/security/2016/dla-428.wml
deleted file mode 100644
index 734276bbc1b..00000000000
--- a/english/lts/security/2016/dla-428.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a cross-site scripting vulnerability
-in websvn, a web-based Subversion repository browser</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in websvn version
-2.3.1-1+deb6u2.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-428.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-429.data b/english/lts/security/2016/dla-429.data
deleted file mode 100644
index cb5144b69d2..00000000000
--- a/english/lts/security/2016/dla-429.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-429-1 pixman</define-tag>
-<define-tag report_date>2016-2-24</define-tag>
-<define-tag secrefs>CVE-2014-9766</define-tag>
-<define-tag packages>pixman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-429.wml b/english/lts/security/2016/dla-429.wml
deleted file mode 100644
index f4b9ad6572b..00000000000
--- a/english/lts/security/2016/dla-429.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a buffer overflow in pixman, a
-pixel-manipulation library for X and cairo.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in pixman version
-0.16.4-1+deb6u2.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-429.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-430.data b/english/lts/security/2016/dla-430.data
deleted file mode 100644
index d9a71e5e1ca..00000000000
--- a/english/lts/security/2016/dla-430.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-430-1 libfcgi</define-tag>
-<define-tag report_date>2016-2-25</define-tag>
-<define-tag secrefs>CVE-2012-6687 Bug#681591</define-tag>
-<define-tag packages>libfcgi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-430.wml b/english/lts/security/2016/dla-430.wml
deleted file mode 100644
index ee6da80b252..00000000000
--- a/english/lts/security/2016/dla-430.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote denial of service in
-libfcgi, a library for implementing the FastCGI web server protocol.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in libfcgi version
-2.4.0-8+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-430.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-431.data b/english/lts/security/2016/dla-431.data
deleted file mode 100644
index a5dc9460575..00000000000
--- a/english/lts/security/2016/dla-431.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-431-1 libfcgi-perl</define-tag>
-<define-tag report_date>2016-2-25</define-tag>
-<define-tag secrefs>CVE-2012-6687 Bug#815840</define-tag>
-<define-tag packages>libfcgi-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-431.wml b/english/lts/security/2016/dla-431.wml
deleted file mode 100644
index 614bb2c0f30..00000000000
--- a/english/lts/security/2016/dla-431.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote denial of service in libfcgi-perl,
-a helper library for implementing the FastCGI web server protocol for Perl.</p>
-
-<p>For Debian 6 Squeeze, this issue has been fixed in libfcgi-perl version
-0.71-1+squeeze1+deb6u1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-431.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-432.data b/english/lts/security/2016/dla-432.data
deleted file mode 100644
index a9f35be8f42..00000000000
--- a/english/lts/security/2016/dla-432.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-432-1 postgresql-8.4</define-tag>
-<define-tag report_date>2016-2-25</define-tag>
-<define-tag packages>postgresql-8.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-432.wml b/english/lts/security/2016/dla-432.wml
deleted file mode 100644
index bbe6a23f427..00000000000
--- a/english/lts/security/2016/dla-432.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several bugs were discovered in PostgreSQL, a relational database server
-system. The 8.4 branch is EOLed upstream, but still present in Debian squeeze.
-This new LTS minor version contains fixes that were applied upstream to the
-9.1.20 version, backported to 8.4.22 which was the last version officially
-released by the PostgreSQL developers. This LTS effort for squeeze-lts is a
-community project sponsored by credativ GmbH.</p>
-
-<p>This release is the last LTS update for PostgreSQL 8.4. Users should
-migrate to a newer PostgreSQL at the earliest opportunity.</p>
-
-<h3>Migration to Version 8.4.22lts6</h3>
-
-<p>A dump/restore is not required for those running 8.4.X. However, if you are
-upgrading from a version earlier than 8.4.22, see the relevant release notes.</p>
-
-<h3>Fixes</h3>
-
-<ul>
-
-<li>Fix infinite loops and buffer-overrun problems in regular expressions
-(Tom Lane)
-
- <p>Very large character ranges in bracket expressions could cause
- infinite loops in some cases, and memory overwrites in other cases.
- (<a href="https://security-tracker.debian.org/tracker/CVE-2016-0773">CVE-2016-0773</a>)</p></li>
-
-<li>Perform an immediate shutdown if the postmaster.pid file is removed
-(Tom Lane)
-
- <p>The postmaster now checks every minute or so that postmaster.pid is
- still there and still contains its own PID. If not, it performs an
- immediate shutdown, as though it had received SIGQUIT. The main
- motivation for this change is to ensure that failed buildfarm runs
- will get cleaned up without manual intervention; but it also serves
- to limit the bad effects if a DBA forcibly removes postmaster.pid
- and then starts a new postmaster.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-432.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-433.data b/english/lts/security/2016/dla-433.data
deleted file mode 100644
index 8f94648403b..00000000000
--- a/english/lts/security/2016/dla-433.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-433-1 xerces-c</define-tag>
-<define-tag report_date>2016-2-25</define-tag>
-<define-tag secrefs>CVE-2016-0729</define-tag>
-<define-tag packages>xerces-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-433.wml b/english/lts/security/2016/dla-433.wml
deleted file mode 100644
index 14575094e9e..00000000000
--- a/english/lts/security/2016/dla-433.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gustavo Grieco discovered that xerces-c, a validating XML parser library
-for C++, mishandles certain kinds of malformed input documents,
-resulting in buffer overflows during processing and error reporting.
-These flaws could lead to a denial of service in applications using the
-xerces-c library, or potentially, to the execution of arbitrary code.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-433.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-434.data b/english/lts/security/2016/dla-434.data
deleted file mode 100644
index 82aaef9e72f..00000000000
--- a/english/lts/security/2016/dla-434.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-434-1 gtk+2.0</define-tag>
-<define-tag report_date>2016-2-27</define-tag>
-<define-tag secrefs>CVE-2015-4491 CVE-2015-7673 CVE-2015-7674</define-tag>
-<define-tag packages>gtk+2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-434.wml b/english/lts/security/2016/dla-434.wml
deleted file mode 100644
index f968684a8a0..00000000000
--- a/english/lts/security/2016/dla-434.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gustavo Grieco discovered different security issues in Gtk+2.0's
-gdk-pixbuf.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4491">CVE-2015-4491</a>
-
- <p>Heap overflow when processing BMP images which may allow to execute
- of arbitrary code via malformed images.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7673">CVE-2015-7673</a>
-
- <p>Heap overflow when processing TGA images which may allow execute
- arbitrary code or denial of service (process crash) via malformed
- images.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7674">CVE-2015-7674</a>
-
- <p>Integer overflow when processing GIF images which may allow to
- execute arbitrary code or denial of service (process crash) via
- malformed image.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gtk+2.0 version
-2.20.1-2+deb6u2. We recommend you to upgrade your gtk+2.0 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-434.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-435.data b/english/lts/security/2016/dla-435.data
deleted file mode 100644
index 915c576bef4..00000000000
--- a/english/lts/security/2016/dla-435.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-435-1 tomcat6</define-tag>
-<define-tag report_date>2016-2-27</define-tag>
-<define-tag secrefs>CVE-2015-5174 CVE-2015-5345 CVE-2015-5351 CVE-2016-0706 CVE-2016-0714 CVE-2016-0763</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-435.wml b/english/lts/security/2016/dla-435.wml
deleted file mode 100644
index 0d3f4628089..00000000000
--- a/english/lts/security/2016/dla-435.wml
+++ /dev/null
@@ -1,73 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tomcat 6, an implementation of the Java Servlet and the JavaServer
-Pages (JSP) specifications and a pure Java web server environment, was
-affected by multiple security issues prior version 6.0.45.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5174">CVE-2015-5174</a>
-
- <p>Directory traversal vulnerability in RequestUtil.java in Apache
- Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27
- allows remote authenticated users to bypass intended SecurityManager
- restrictions and list a parent directory via a /.. (slash dot dot)
- in a pathname used by a web application in a getResource,
- getResourceAsStream, or getResourcePaths call, as demonstrated by
- the $CATALINA_BASE/webapps directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5345">CVE-2015-5345</a>
-
- <p>The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before
- 7.0.67, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes
- redirects before considering security constraints and Filters, which
- allows remote attackers to determine the existence of a directory
- via a URL that lacks a trailing / (slash) character.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5351">CVE-2015-5351</a>
-
- <p>The Manager and Host Manager applications in Apache Tomcat
- establish sessions and send CSRF tokens for arbitrary new requests,
- which allows remote attackers to bypass a CSRF protection mechanism
- by using a token.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0706">CVE-2016-0706</a>
-
- <p>Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before
- 8.0.31, and 9.x before 9.0.0.M2 does not place
- org.apache.catalina.manager.StatusManagerServlet on the org/apache
- /catalina/core/RestrictedServlets.properties list, which allows
- remote authenticated users to bypass intended SecurityManager
- restrictions and read arbitrary HTTP requests, and consequently
- discover session ID values, via a crafted web application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0714">CVE-2016-0714</a>
-
- <p>The session-persistence implementation in Apache Tomcat 6.x before
- 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before
- 9.0.0.M2 mishandles session attributes, which allows remote
- authenticated users to bypass intended SecurityManager restrictions
- and execute arbitrary code in a privileged context via a web
- application that places a crafted object in a session.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0763">CVE-2016-0763</a>
-
- <p>The setGlobalContext method in org/apache/naming/factory
- /ResourceLinkFactory.java in Apache Tomcat does not consider whether
- ResourceLinkFactory.setGlobalContext callers are authorized, which
- allows remote authenticated users to bypass intended SecurityManager
- restrictions and read or write to arbitrary application data, or
- cause a denial of service (application disruption), via a web
- application that sets a crafted global context.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-6.0.45-1~deb6u1.</p>
-
-<p>We recommend that you upgrade your tomcat6 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-435.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-436.data b/english/lts/security/2016/dla-436.data
deleted file mode 100644
index 1a17c99e6d9..00000000000
--- a/english/lts/security/2016/dla-436.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-436-1 ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag report_date>2016-2-28</define-tag>
-<define-tag packages>ia32-libs, ia32-libs-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-436.wml b/english/lts/security/2016/dla-436.wml
deleted file mode 100644
index 4e4b9cd7bf0..00000000000
--- a/english/lts/security/2016/dla-436.wml
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ia32-libs and ia32-libs-gtk packages contain 32 bit versions of various
-libraries for use on 64 bit systems. This update rolls in all security
-fixes made to these libraries since the start of Squeeze LTS.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-436.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-437.data b/english/lts/security/2016/dla-437.data
deleted file mode 100644
index 55401d12519..00000000000
--- a/english/lts/security/2016/dla-437.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-437-1 clamav</define-tag>
-<define-tag report_date>2016-2-28</define-tag>
-<define-tag secrefs>Bug#813894</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-437.wml b/english/lts/security/2016/dla-437.wml
deleted file mode 100644
index a63ce841a5a..00000000000
--- a/english/lts/security/2016/dla-437.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Upstream published version 0.99. This update updates sqeeze-lts to the latest
-upstream release in line with the approach used for other Debian releases.</p>
-
-<p>The changes are not strictly required for operation, but users of the previous
-version in Squeeze may not be able to make use of all current virus signatures
-and might get warnings.</p>
-
-<p>Due to a change in soname included with this release, libclamav has been
-updated to libclamav7. This requires updates to external users of libclamav.
-For python-clamav, klamav, and libclamunrar, these changes are, or will be
-shortly, available.</p>
-
-<p>Unfortunately, for dansguardian, it was released for squeeze with latent
-issues that preclude rebuilding the package. If you are using dansguardian,
-do not attempt to upgrade to the new clamav.</p>
-
-<p>Otherwise, if you use clamav, we strongly recommend that you upgrade to this
-version.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-437.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-438.data b/english/lts/security/2016/dla-438.data
deleted file mode 100644
index 9d3bd9d8265..00000000000
--- a/english/lts/security/2016/dla-438.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-438-1 libebml</define-tag>
-<define-tag report_date>2016-2-28</define-tag>
-<define-tag secrefs>CVE-2015-8790 CVE-2015-8791</define-tag>
-<define-tag packages>libebml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-438.wml b/english/lts/security/2016/dla-438.wml
deleted file mode 100644
index 2247a016554..00000000000
--- a/english/lts/security/2016/dla-438.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security-related issues were fixed in libebml, a library for accessing the
-EBML format:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8790">CVE-2015-8790</a>
-
- <p>The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3
- allows context-dependent attackers to obtain sensitive information from
- process heap memory via a crafted UTF-8 string, which triggers an invalid
- memory access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8791">CVE-2015-8791</a>
-
- <p>The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows
- context-dependent attackers to obtain sensitive information from process
- heap memory via a crafted length value in an EBML id, which triggers an
- invalid memory access.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>squeeze</q>, these issues have been fixed in libebml version
-0.7.7-3.1+deb6u1. We recommend you to upgrade your libebml packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-438.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-439.data b/english/lts/security/2016/dla-439.data
deleted file mode 100644
index b1d6ff578c2..00000000000
--- a/english/lts/security/2016/dla-439.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-439-1 linux-2.6</define-tag>
-<define-tag report_date>2016-2-29</define-tag>
-<define-tag secrefs>CVE-2015-8812 CVE-2016-0774 CVE-2016-2384</define-tag>
-<define-tag packages>linux-2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-439.wml b/english/lts/security/2016/dla-439.wml
deleted file mode 100644
index d3fa82ef473..00000000000
--- a/english/lts/security/2016/dla-439.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8812">CVE-2015-8812</a>
-
- <p>A flaw was found in the iw_cxgb3 Infiniband driver. Whenever it
- could not send a packet because the network was congested, it
- would free the packet buffer but later attempt to send the packet
- again. This use-after-free could result in a denial of service
- (crash or hang), data loss or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0774">CVE-2016-0774</a>
-
- <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a> in kernel versions
- older than Linux 3.16 did not correctly handle the case of a
- partially failed atomic read. A local, unprivileged user could
- use this flaw to crash the system or leak kernel memory to user
- space.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2384">CVE-2016-2384</a>
-
- <p>Andrey Konovalov found that a USB MIDI device with an invalid USB
- descriptor could trigger a double-free. This may be used by a
- physically present user for privilege escalation.</p></li>
-
-</ul>
-
-<p>Additionally, it fixes some old security issues with no CVE ID:</p>
-
- <p>Several kernel APIs permitted reading or writing 2 GiB of data or
- more in a single chunk, which could lead to an integer overflow
- when applied to certain filesystems, socket or device types. The
- full security impact has not been evaluated.</p>
-
-<p>Finally, it fixes a regression in 2.6.32-48squeeze17 that would cause
-Samba to hang in some situations.</p>
-
-<p>For the oldoldstable distribution (squeeze), these problems have been
-fixed in version 2.6.32-48squeeze20. This is *really* the final
-update to the linux-2.6 package for squeeze.</p>
-
-<p>For the oldstable distribution (wheezy), the kernel was not affected
-by the integer overflow issues and the remaining problems will be
-fixed in version 3.2.73-2+deb7u3.</p>
-
-<p>For the stable distribution (jessie), the kernel was not affected by
-the integer overflow issues or <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774">CVE-2016-0774</a>, and the remaining
-problems will be fixed in version 3.16.7-ckt20-1+deb8u4.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-439.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-440.data b/english/lts/security/2016/dla-440.data
deleted file mode 100644
index 41a904a6fae..00000000000
--- a/english/lts/security/2016/dla-440.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-440-1 dansguardian</define-tag>
-<define-tag report_date>2016-2-28</define-tag>
-<define-tag secrefs>Bug#813894</define-tag>
-<define-tag packages>dansguardian</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-440.wml b/english/lts/security/2016/dla-440.wml
deleted file mode 100644
index f5ec7656341..00000000000
--- a/english/lts/security/2016/dla-440.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>As described in <a href="./dla-437">DLA-437-1</a>, clamav has been updated to the most recent upstream
-version, 0.99. Due to a soname change in libclamav, packages depending on
-libclamav needed to be recompiled to work with the new libclamav7. At the
-time DLA-437-1 was sent, updated dansguardian packages were not available.</p>
-
-<p>An update to dansguardian has now been uploaded and packages should be
-available shortly. The recommendation in DLA-437-1 not to upgrade clamav if
-using it with dansguardian in no longer applicable.</p>
-
-<p>Upgrading clamav and dansguardian is recommended for the reasons described in
-DLA-437-1.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-440.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-441.data b/english/lts/security/2016/dla-441.data
deleted file mode 100644
index aea526f5b23..00000000000
--- a/english/lts/security/2016/dla-441.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-441-1 pcre3</define-tag>
-<define-tag report_date>2016-2-29</define-tag>
-<define-tag secrefs>Bug#815921</define-tag>
-<define-tag packages>pcre3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-441.wml b/english/lts/security/2016/dla-441.wml
deleted file mode 100644
index 13bc532348a..00000000000
--- a/english/lts/security/2016/dla-441.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>HP's Zero Day Initiative has identified a vulnerability affecting the
-pcre3 package. It was assigned ZDI id ZDI-CAN-3542. A CVE identifier has
-not been assigned yet.</p>
-
-<p>PCRE Regular Expression Compilation Stack Buffer Overflow Remote Code
-Execution Vulnerability.</p>
-
-<p>PCRE did not validate that handling the (*ACCEPT) verb will occur within
-the bounds of the cworkspace stack buffer, leading to a stack buffer
-overflow.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-8.02-1.1+deb6u1.</p>
-
-<p>We recommend that you upgrade your pcre3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-441.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-442.data b/english/lts/security/2016/dla-442.data
deleted file mode 100644
index d1635cda902..00000000000
--- a/english/lts/security/2016/dla-442.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-442-1 lxc</define-tag>
-<define-tag report_date>2016-2-29</define-tag>
-<define-tag secrefs>CVE-2013-6441 CVE-2015-1335 Bug##800471</define-tag>
-<define-tag packages>lxc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-442.wml b/english/lts/security/2016/dla-442.wml
deleted file mode 100644
index a8e803b0451..00000000000
--- a/english/lts/security/2016/dla-442.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-6441">CVE-2013-6441</a>
-
- <p>The template script lxc-sshd used to mount itself as /sbin/init in the
- container using a writable bind-mount.</p>
-
- <p>This update resolved the above issue by using a read-only bind-mount
- instead preventing any form of potentially accidental damage.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1335">CVE-2015-1335</a>
-
- <p>On container startup, lxc sets up the container's initial file system
- tree by doing a bunch of mounting, guided by the container's configuration
- file.</p>
-
- <p>The container config is owned by the admin or user on the host, so we
- do not try to guard against bad entries. However, since the mount
- target is in the container, it's possible that the container admin
- could divert the mount with symbolic links. This could bypass proper
- container startup (i.e. confinement of a root-owned container by the
- restrictive apparmor policy, by diverting the required write to
- /proc/self/attr/current), or bypass the (path-based) apparmor policy
- by diverting, say, /proc to /mnt in the container.</p>
-
- <p>This update implements a safe_mount() function that prevents lxc from
- doing mounts onto symbolic links.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-442.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-443.data b/english/lts/security/2016/dla-443.data
deleted file mode 100644
index a07ddf8388f..00000000000
--- a/english/lts/security/2016/dla-443.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-443-1 bsh</define-tag>
-<define-tag report_date>2016-2-29</define-tag>
-<define-tag secrefs>CVE-2016-2510</define-tag>
-<define-tag packages>bsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-443.wml b/english/lts/security/2016/dla-443.wml
deleted file mode 100644
index 2cee3154ac6..00000000000
--- a/english/lts/security/2016/dla-443.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A remote code execution vulnerability was found in BeanShell, an
-embeddable Java source interpreter with object scripting language
-features.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2510">CVE-2016-2510</a>
-
- <p>An application that includes BeanShell on the classpath may be
- vulnerable if another part of the application uses Java
- serialization or XStream to deserialize data from an untrusted
- source. A vulnerable application could be exploited for remote
- code execution, including executing arbitrary shell commands.</p></li>
-
-</ul>
-
-<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
-2.0b4-12+deb6u1.</p>
-
-<p>We recommend that you upgrade your bsh packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-443.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-444.data b/english/lts/security/2016/dla-444.data
deleted file mode 100644
index fc9982194e5..00000000000
--- a/english/lts/security/2016/dla-444.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-444-1 php5</define-tag>
-<define-tag report_date>2016-2-29</define-tag>
-<define-tag secrefs>CVE-2015-2305 CVE-2015-2348</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-444.wml b/english/lts/security/2016/dla-444.wml
deleted file mode 100644
index f31254cb6d6..00000000000
--- a/english/lts/security/2016/dla-444.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2305">CVE-2015-2305</a>
-
- <p>Integer overflow in the regcomp implementation in the Henry
- Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on
- 32-bit platforms, as used in NetBSD through 6.1.5 and other
- products, might allow context-dependent attackers to execute
- arbitrary code via a large regular expression that leads to
- a heap-based buffer overflow.</p></li>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2348">CVE-2015-2348</a>
- <p>The move_uploaded_file implementation in
- ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x
- before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon
- encountering a \x00 character, which allows remote attackers to
- bypass intended extension restrictions and create files with
- unexpected names via a crafted second argument.</p>
- <p><b>Note</b>: this vulnerability exists because of an incomplete fix for
- <a href="https://security-tracker.debian.org/tracker/CVE-2006-7243">CVE-2006-7243</a>.</p></li>
-<li>CVE-2016-tmp, Bug #71039
- <p>exec functions ignore length but look for NULL termination</p></li>
-<li>CVE-2016-tmp, Bug #71089
- <p>No check to duplicate zend_extension</p></li>
-<li>CVE-2016-tmp, Bug #71201
- <p>round() segfault on 64-bit builds</p></li>
-<li>CVE-2016-tmp, Bug #71459
- <p>Integer overflow in iptcembed()</p></li>
-<li>CVE-2016-tmp, Bug #71354
- <p>Heap corruption in tar/zip/phar parser</p></li>
-<li>CVE-2016-tmp, Bug #71391
- <p>NULL Pointer Dereference in phar_tar_setupmetadata()</p></li>
-<li>CVE-2016-tmp, Bug #70979
- <p>Crash on bad SOAP request</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-444.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-445-2.data b/english/lts/security/2016/dla-445-2.data
deleted file mode 100644
index 13521a39ca9..00000000000
--- a/english/lts/security/2016/dla-445-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-445-2 squid3</define-tag>
-<define-tag report_date>2016-3-3</define-tag>
-<define-tag secrefs>CVE-2016-2569 Bug#816601</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-445-2.wml b/english/lts/security/2016/dla-445-2.wml
deleted file mode 100644
index d013369dcaf..00000000000
--- a/english/lts/security/2016/dla-445-2.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The backported patch to solve <a href="https://security-tracker.debian.org/tracker/CVE-2016-2569">CVE-2016-2569</a> yielded to failed assertions
-that made squid3 to crash when closing connections. The fix for this CVE
-strongly relies on exception handling present in more recent versions of
-squid3, that I failed to identify in the previous update. I have
-reverted the patch to take the safest position, taking into account that
-Squeeze users should migrate to a supported version of Debian. This
-post-EOL update is intended to keep a functional squid3 package in the
-archive.</p>
-
-<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in squid3 version 3.1.6-1.2+squeeze7</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-445-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-445.data b/english/lts/security/2016/dla-445.data
deleted file mode 100644
index 13521a39ca9..00000000000
--- a/english/lts/security/2016/dla-445.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-445-2 squid3</define-tag>
-<define-tag report_date>2016-3-3</define-tag>
-<define-tag secrefs>CVE-2016-2569 Bug#816601</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-445.wml b/english/lts/security/2016/dla-445.wml
deleted file mode 100644
index 1f0089e015d..00000000000
--- a/english/lts/security/2016/dla-445.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The backported patch to solve <a href="https://security-tracker.debian.org/tracker/CVE-2016-2569">CVE-2016-2569</a> yielded to failed assertions
-that made squid3 to crash when closing connections. The fix for this CVE
-strongly relies on exception handling present in more recent versions of
-squid3, that I failed to identify in the previous update. I have
-reverted the patch to take the safest position, taking into account that
-Squeeze users should migrate to a supported version of Debian. This
-post-EOL update is intended to keep a functional squid3 package in the
-archive.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-445.data"
-# $Id$
diff --git a/english/lts/security/2016/dla-446.data b/english/lts/security/2016/dla-446.data
deleted file mode 100644
index c5e78483271..00000000000
--- a/english/lts/security/2016/dla-446.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-446-1 poppler</define-tag>
-<define-tag report_date>2016-4-29</define-tag>
-<define-tag secrefs>CVE-2015-8868 Bug#822578</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-446.wml b/english/lts/security/2016/dla-446.wml
deleted file mode 100644
index 063c9ce0d57..00000000000
--- a/english/lts/security/2016/dla-446.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap buffer overflow vulnerability was found in the poppler library. A
-maliciously crafted file could cause the application to crash. The issue
-happens when <q>ExtGState</q> is not a valid blend mode.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in poppler version 0.18.4-6+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-446.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-447.data b/english/lts/security/2016/dla-447.data
deleted file mode 100644
index be987878753..00000000000
--- a/english/lts/security/2016/dla-447.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-447-1 mysql-5.5</define-tag>
-<define-tag report_date>2016-4-30</define-tag>
-<define-tag secrefs>CVE-2016-0640 CVE-2016-0641 CVE-2016-0642 CVE-2016-0643 CVE-2016-0644 CVE-2016-0646 CVE-2016-0647 CVE-2016-0648 CVE-2016-0649 CVE-2016-0650 CVE-2016-0666 CVE-2016-2047 Bug#821100</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-447.wml b/english/lts/security/2016/dla-447.wml
deleted file mode 100644
index e8a95bd226c..00000000000
--- a/english/lts/security/2016/dla-447.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovereded in the MySQL database server,
-which are fixed in the new upstream version 5.5.49. Please see the MySQL 5.5
-Release Notes and Oracle's Critical Patch Update advisory for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html"></li>
-<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html">https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html</a></li>
-<li><a href="http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html">http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in mysql-5.5 version
-5.5.49-0+deb7u1. We recommend you to upgrade your mysql-5.5 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-447.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-448.data b/english/lts/security/2016/dla-448.data
deleted file mode 100644
index c100493018d..00000000000
--- a/english/lts/security/2016/dla-448.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-448-1 subversion</define-tag>
-<define-tag report_date>2016-5-1</define-tag>
-<define-tag secrefs>CVE-2016-2167 CVE-2016-2168</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-448.wml b/english/lts/security/2016/dla-448.wml
deleted file mode 100644
index 18310d82dc0..00000000000
--- a/english/lts/security/2016/dla-448.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2167">CVE-2016-2167</a>
-
- <p>svnserve, the svn:// protocol server, can optionally use the Cyrus
- SASL library for authentication, integrity protection, and encryption.
- Due to a programming oversight, authentication against Cyrus SASL
- would permit the remote user to specify a realm string which is
- a prefix of the expected realm string.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2168">CVE-2016-2168</a>
-
- <p>Subversion's httpd servers are vulnerable to a remotely triggerable crash
- in the mod_authz_svn module. The crash can occur during an authorization
- check for a COPY or MOVE request with a specially crafted header value.</p>
-
- <p>This allows remote attackers to cause a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in subversion version 1.6.17dfsg-4+deb7u11</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-448.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-449-2.data b/english/lts/security/2016/dla-449-2.data
deleted file mode 100644
index 55a777fbf56..00000000000
--- a/english/lts/security/2016/dla-449-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-449-2 botan1.10</define-tag>
-<define-tag report_date>2016-5-10</define-tag>
-<define-tag secrefs>Bug#823297</define-tag>
-<define-tag packages>botan1.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-449-2.wml b/english/lts/security/2016/dla-449-2.wml
deleted file mode 100644
index 7aab220a3ae..00000000000
--- a/english/lts/security/2016/dla-449-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The security update for botan1.10 caused a regression in monotone due
-to a ABI change. In order to fix this issue all reverse-dependencies
-of botan1.10 have been rebuilt.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in</p>
-
-<p>monotone 1.0-6+deb7u2
-softhsm 1.3.3-2+deb7u1</p>
-
-<p>We recommend that you upgrade both packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-449-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-449.data b/english/lts/security/2016/dla-449.data
deleted file mode 100644
index 67a0a10cb93..00000000000
--- a/english/lts/security/2016/dla-449.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-449-1 botan1.10</define-tag>
-<define-tag report_date>2016-4-30</define-tag>
-<define-tag secrefs>CVE-2014-9742 CVE-2015-5726 CVE-2015-5727 CVE-2015-7827 CVE-2016-2194 CVE-2016-2195 CVE-2016-2849</define-tag>
-<define-tag packages>botan1.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-449.wml b/english/lts/security/2016/dla-449.wml
deleted file mode 100644
index e6bf5e62c95..00000000000
--- a/english/lts/security/2016/dla-449.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in botan1.10, a C++
-library which provides support for many common cryptographic
-operations, including encryption, authentication, X.509v3 certificates
-and CRLs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9742">CVE-2014-9742</a>
-
- <p>A bug in Miller-Rabin primality testing was responsible for
- insufficient randomness.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5726">CVE-2015-5726</a>
-
- <p>The BER decoder would crash due to reading from offset 0 of an
- empty vector if it encountered a BIT STRING which did not contain
- any data at all. This can be used to easily crash applications
- reading untrusted ASN.1 data, but does not seem exploitable for
- code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5727">CVE-2015-5727</a>
-
- <p>The BER decoder would allocate a fairly arbitrary amount of memory
- in a length field, even if there was no chance the read request
- would succeed. This might cause the process to run out of memory or
- invoke the OOM killer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7827">CVE-2015-7827</a>
-
- <p>Use constant time PKCS #1 unpadding to avoid possible side channel
- attack against RSA decryption</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2194">CVE-2016-2194</a>
-
- <p>Infinite loop in modular square root algorithm.
- The ressol function implementing the Tonelli-Shanks algorithm for
- finding square roots could be sent into a nearly infinite loop due
- to a misplaced conditional check. This could occur if a composite
- modulus is provided, as this algorithm is only defined for primes.
- This function is exposed to attacker controlled input via the
- OS2ECP function during ECC point decompression.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2195">CVE-2016-2195</a>
-
- <p>Fix Heap overflow on invalid ECC point.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2849">CVE-2016-2849</a>
-
- <p>Use constant time modular inverse algorithm to avoid possible
- side channel attack against ECDSA</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10.5-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your botan1.10 packages.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-449.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-450.data b/english/lts/security/2016/dla-450.data
deleted file mode 100644
index e49031b4fe1..00000000000
--- a/english/lts/security/2016/dla-450.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-450-1 gdk-pixbuf</define-tag>
-<define-tag report_date>2016-4-30</define-tag>
-<define-tag secrefs>CVE-2015-7552 CVE-2015-7674</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-450.wml b/english/lts/security/2016/dla-450.wml
deleted file mode 100644
index e6359670622..00000000000
--- a/english/lts/security/2016/dla-450.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer overflow has been discovered in gdk-pixbuf, a
-library for image loading and saving facilities, fast scaling and
-compositing of pixbufs, that allows remote attackers to cause a denial
-of service or possibly execute arbitrary code via a crafted BMP file.</p>
-
-<p>This update also fixes an incomplete patch for <a href="https://security-tracker.debian.org/tracker/CVE-2015-7674">CVE-2015-7674</a>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7552">CVE-2015-7552</a>
-
- <p>Heap-based buffer overflow in the gdk_pixbuf_flip function in
- gdk-pixbuf-scale.c in gdk-pixbuf allows remote attackers to cause a
- denial of service or possibly execute arbitrary code via a crafted
- BMP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7674">CVE-2015-7674</a>
-
- <p>Integer overflow in the pixops_scale_nearest function in
- pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers
- to cause a denial of service (application crash) and possibly
- execute arbitrary code via a crafted GIF image file, which triggers
- a heap-based buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.26.1-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-450.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-451.data b/english/lts/security/2016/dla-451.data
deleted file mode 100644
index e7cac388431..00000000000
--- a/english/lts/security/2016/dla-451.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-451-1 openjdk-7</define-tag>
-<define-tag report_date>2016-5-3</define-tag>
-<define-tag secrefs>CVE-2016-0636 CVE-2016-0686 CVE-2016-0687 CVE-2016-0695 CVE-2016-3425 CVE-2016-3426 CVE-2016-3427</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-451.wml b/english/lts/security/2016/dla-451.wml
deleted file mode 100644
index d43cf2614db..00000000000
--- a/english/lts/security/2016/dla-451.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in breakouts of
-the Java sandbox, denial of service or information disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u101-2.6.6-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Please note that OpenJDK 7 will be made the new default Java
-implementation on 26 June 2016. For further information please refer to</p>
-
-<p><url "https://wiki.debian.org/LTS/Wheezy"></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-451.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-452.data b/english/lts/security/2016/dla-452.data
deleted file mode 100644
index ce76b7fa4cb..00000000000
--- a/english/lts/security/2016/dla-452.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-452-1 smarty3</define-tag>
-<define-tag report_date>2016-5-3</define-tag>
-<define-tag secrefs>CVE-2014-8350 Bug#765920</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-452.wml b/english/lts/security/2016/dla-452.wml
deleted file mode 100644
index 78fbdc07a45..00000000000
--- a/english/lts/security/2016/dla-452.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Smarty3, a template engine for PHP, allowed remote attackers to bypass
-the secure mode restrictions and execute arbitrary PHP code as
-demonstrated by "{literal}<{/literal}script language=php>" in a
-template.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1.10-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-452.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-453.data b/english/lts/security/2016/dla-453.data
deleted file mode 100644
index d116865e63e..00000000000
--- a/english/lts/security/2016/dla-453.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-453-1 extplorer</define-tag>
-<define-tag report_date>2016-5-3</define-tag>
-<define-tag secrefs>CVE-2015-0896 Bug#783231</define-tag>
-<define-tag packages>extplorer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-453.wml b/english/lts/security/2016/dla-453.wml
deleted file mode 100644
index 9bef3aaf0a8..00000000000
--- a/english/lts/security/2016/dla-453.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple cross-site scripting (XSS) vulnerabilities in eXtplorer before
-2.1.7 allow remote attackers to inject arbitrary web script or HTML via
-unspecified vectors.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in extplorer version 2.1.0b6+dfsg.3-4+deb7u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-453.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-454.data b/english/lts/security/2016/dla-454.data
deleted file mode 100644
index 27107b71862..00000000000
--- a/english/lts/security/2016/dla-454.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-454-1 minissdpd</define-tag>
-<define-tag report_date>2016-5-3</define-tag>
-<define-tag secrefs>CVE-2016-3178 CVE-2016-3179</define-tag>
-<define-tag packages>minissdpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-454.wml b/english/lts/security/2016/dla-454.wml
deleted file mode 100644
index 7d7f6a4db4d..00000000000
--- a/english/lts/security/2016/dla-454.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The minissdpd daemon contains a improper validation of array index
-vulnerability (CWE-129) when processing requests sent to the Unix
-socket at /var/run/minissdpd.sock the Unix socket can be accessed
-by an unprivileged user to send invalid request causes an
-out-of-bounds memory access that crashes the minissdpd daemon.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in minissdpd version 1.1.20120121-1+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-454.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-455.data b/english/lts/security/2016/dla-455.data
deleted file mode 100644
index d2ba6315919..00000000000
--- a/english/lts/security/2016/dla-455.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-455-1 asterisk</define-tag>
-<define-tag report_date>2016-5-3</define-tag>
-<define-tag secrefs>CVE-2014-2286 CVE-2014-4046 CVE-2014-6610 CVE-2014-8412 CVE-2014-8418 CVE-2015-3008 Bug#741313 Bug#762164 Bug#771463 Bug#782411</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-455.wml b/english/lts/security/2016/dla-455.wml
deleted file mode 100644
index 5b2fa5ffd9e..00000000000
--- a/english/lts/security/2016/dla-455.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6610">CVE-2014-6610</a>
-
- <p>Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1
- and Certified Asterisk 11.6 before 11.6-cert6, when using the
- res_fax_spandsp module, allows remote authenticated users to
- cause a denial of service (crash) via an out of call message,
- which is not properly handled in the ReceiveFax dialplan
- application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4046">CVE-2014-4046</a>
-
- <p>Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1
- and Certified Asterisk 11.6 before 11.6-cert3 allows remote
- authenticated Manager users to execute arbitrary shell commands
- via a MixMonitor action.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2286">CVE-2014-2286</a>
-
- <p>main/http.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x
- before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk
- 1.8.x before 1.8.15-cert5 and 11.6 before 11.6-cert2, allows remote
- attackers to cause a denial of service (stack consumption) and
- possibly execute arbitrary code via an HTTP request with a large
- number of Cookie headers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8412">CVE-2014-8412</a>
-
- <p>The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager
- Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1,
- 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1
- and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before
- 11.6-cert8 allows remote attackers to bypass the ACL restrictions
- via a packet with a source IP that does not share the address family
- as the first ACL entry.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8418">CVE-2014-8418</a>
-
- <p>The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32,
- 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and
- Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8
- allows remote authenticated users to gain privileges via a call from
- an external protocol, as demonstrated by the AMI protocol.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3008">CVE-2015-3008</a>
-
- <p>Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x
- before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28
- before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before
- 13.1-cert2, when registering a SIP TLS device, does not properly
- handle a null byte in a domain name in the subject's Common Name (CN)
- field of an X.509 certificate, which allows man-in-the-middle attackers
- to spoof arbitrary SSL servers via a crafted certificate issued by a
- legitimate Certification Authority.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in asterisk version 1:1.8.13.1~dfsg1-3+deb7u4</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-455.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-456.data b/english/lts/security/2016/dla-456.data
deleted file mode 100644
index 9ec9f781c3e..00000000000
--- a/english/lts/security/2016/dla-456.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-456-1 openssl</define-tag>
-<define-tag report_date>2016-5-3</define-tag>
-<define-tag secrefs>CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2176</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-456.wml b/english/lts/security/2016/dla-456.wml
deleted file mode 100644
index f585f189a00..00000000000
--- a/english/lts/security/2016/dla-456.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in OpenSSL, a Secure Socket Layer
-toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2105">CVE-2016-2105</a>
-
- <p>Guido Vranken discovered that an overflow can occur in the function
- EVP_EncodeUpdate(), used for Base64 encoding, if an attacker can
- supply a large amount of data. This could lead to a heap corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2106">CVE-2016-2106</a>
-
- <p>Guido Vranken discovered that an overflow can occur in the function
- EVP_EncryptUpdate() if an attacker can supply a large amount of data.
- This could lead to a heap corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2107">CVE-2016-2107</a>
-
- <p>Juraj Somorovsky discovered a padding oracle in the AES CBC cipher
- implementation based on the AES-NI instruction set. This could allow
- an attacker to decrypt TLS traffic encrypted with one of the cipher
- suites based on AES CBC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2108">CVE-2016-2108</a>
-
- <p>David Benjamin from Google discovered that two separate bugs in the
- ASN.1 encoder, related to handling of negative zero integer values
- and large universal tags, could lead to an out-of-bounds write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2109">CVE-2016-2109</a>
-
- <p>Brian Carpenter discovered that when ASN.1 data is read from a BIO
- using functions such as d2i_CMS_bio(), a short invalid encoding can
- casuse allocation of large amounts of memory potentially consuming
- excessive resources or exhausting memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2176">CVE-2016-2176</a>
-
- <p>Guido Vranken discovered that ASN.1 Strings that are over 1024 bytes
- can cause an overread in applications using the X509_NAME_oneline()
- function on EBCDIC systems. This could result in arbitrary stack data
- being returned in the buffer.</p></li>
-
-</ul>
-
-<p>Additional information about these issues can be found in the OpenSSL
-security advisory at <a href="https://www.openssl.org/news/secadv/20160503.txt">https://www.openssl.org/news/secadv/20160503.txt</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in openssl version 1.0.1e-2+deb7u21</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-456.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-457.data b/english/lts/security/2016/dla-457.data
deleted file mode 100644
index e380e6e54ba..00000000000
--- a/english/lts/security/2016/dla-457.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-457-1 mplayer</define-tag>
-<define-tag report_date>2016-5-4</define-tag>
-<define-tag secrefs>CVE-2016-4352</define-tag>
-<define-tag packages>mplayer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-457.wml b/english/lts/security/2016/dla-457.wml
deleted file mode 100644
index 63dd4409468..00000000000
--- a/english/lts/security/2016/dla-457.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mplayer is crashing when playing a fuzzed gif file. The gif demuxes
-assumes in many places that width*height is <= INT_MAX; this might
-not be true. Fixed by validating the picture size.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in mplayer version 2:1.0~rc4.dfsg1+svn34540-1+deb7u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-457.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-458.data b/english/lts/security/2016/dla-458.data
deleted file mode 100644
index 78e323e5ffa..00000000000
--- a/english/lts/security/2016/dla-458.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-458-1 mplayer2</define-tag>
-<define-tag report_date>2016-5-5</define-tag>
-<define-tag secrefs>CVE-2016-4352</define-tag>
-<define-tag packages>mplayer2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-458.wml b/english/lts/security/2016/dla-458.wml
deleted file mode 100644
index 1bd83dc71d1..00000000000
--- a/english/lts/security/2016/dla-458.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mplayer2 is crashing when playing a fuzzed gif file. The gif demuxes
-assumes in many places that width*height is <= INT_MAX; this might
-not be true. Fixed by validating the picture size.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in mplayer2 version 2.0-554-gf63dbad-1+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-458.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-459.data b/english/lts/security/2016/dla-459.data
deleted file mode 100644
index 0b5357a56d5..00000000000
--- a/english/lts/security/2016/dla-459.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-459-1 mercurial</define-tag>
-<define-tag report_date>2016-5-6</define-tag>
-<define-tag secrefs>CVE-2016-3105</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-459.wml b/english/lts/security/2016/dla-459.wml
deleted file mode 100644
index 25deef86161..00000000000
--- a/english/lts/security/2016/dla-459.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Blake Burkhart discovered an arbitrary code execution flaw in
-Mercurial, a distributed version control system, when using the convert
-extension on Git repositories with specially crafted names. This flaw in
-particular affects automated code conversion services that allow
-arbitrary repository names.</p>
-
-<p>Patches are taken from the Jessie version.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in mercurial version 2.2.2-4+deb7u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-459.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-460.data b/english/lts/security/2016/dla-460.data
deleted file mode 100644
index d39bb452784..00000000000
--- a/english/lts/security/2016/dla-460.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-460-1 file</define-tag>
-<define-tag report_date>2016-5-7</define-tag>
-<define-tag secrefs>CVE-2015-8865</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-460.wml b/english/lts/security/2016/dla-460.wml
deleted file mode 100644
index 03f8932e1c1..00000000000
--- a/english/lts/security/2016/dla-460.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A malformed magic file could trigger a segmentation fault and thus crash
-applications due to a buffer over-write in the file_check_mem function.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-5.11-2+deb7u9.</p>
-
-<p>We recommend that you upgrade your file packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-460.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-461.data b/english/lts/security/2016/dla-461.data
deleted file mode 100644
index 9b7fb75c234..00000000000
--- a/english/lts/security/2016/dla-461.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-461-1 nagios3</define-tag>
-<define-tag report_date>2016-5-7</define-tag>
-<define-tag secrefs>CVE-2014-1878</define-tag>
-<define-tag packages>nagios3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-461.wml b/english/lts/security/2016/dla-461.wml
deleted file mode 100644
index f0143ea53e4..00000000000
--- a/english/lts/security/2016/dla-461.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c
-in Nagios, a monitoring and management system for hosts, services and
-networks, allowed remote attackers to cause a denial of service
-(segmentation fault) via a long message to cmd.cgi.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.4.1-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your nagios3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-461.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-462.data b/english/lts/security/2016/dla-462.data
deleted file mode 100644
index 409412cc676..00000000000
--- a/english/lts/security/2016/dla-462.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-462-1 websvn</define-tag>
-<define-tag report_date>2016-5-9</define-tag>
-<define-tag secrefs>CVE-2016-1236</define-tag>
-<define-tag packages>websvn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-462.wml b/english/lts/security/2016/dla-462.wml
deleted file mode 100644
index 97b5a766da7..00000000000
--- a/english/lts/security/2016/dla-462.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nitin Venkatesh discovered that websvn, a web viewer for Subversion
-repositories, is susceptible to cross-site scripting attacks via
-specially crafted file and directory names in repositories.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in websvn version 2.3.3-1.1+deb7u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-462.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-463.data b/english/lts/security/2016/dla-463.data
deleted file mode 100644
index 682f515b292..00000000000
--- a/english/lts/security/2016/dla-463.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-463-1 ikiwiki</define-tag>
-<define-tag report_date>2016-5-9</define-tag>
-<define-tag secrefs>CVE-2016-4561</define-tag>
-<define-tag packages>ikiwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-463.wml b/english/lts/security/2016/dla-463.wml
deleted file mode 100644
index 11864f17e7a..00000000000
--- a/english/lts/security/2016/dla-463.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Simon McVittie discovered a cross-site scripting vulnerability in the
-error reporting of Ikiwiki, a wiki compiler. This update also hardens
-ikiwiki's use of imagemagick in the img plugin.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.20120629.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your ikiwiki packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-463.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-464.data b/english/lts/security/2016/dla-464.data
deleted file mode 100644
index 2de18901c23..00000000000
--- a/english/lts/security/2016/dla-464.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-464-1 libav</define-tag>
-<define-tag report_date>2016-5-10</define-tag>
-<define-tag secrefs>CVE-2014-9676</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-464.wml b/english/lts/security/2016/dla-464.wml
deleted file mode 100644
index 7977ae73e47..00000000000
--- a/english/lts/security/2016/dla-464.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after free vulnerability in
-libav, a multimedia player, server, encoder and transcoder library.</p>
-
-<p>The seg_write_packet function in libavformat/segment.c in ffmpeg
-2.1.4 and earlier does not free the correct memory location, which
-allows remote attackers to cause a denial of service ("invalid
-memory handler") and possibly execute arbitrary code via a crafted
-video that triggers a use after free.</p>
-
-<p>For Debian 7 Wheezy, this issue has been fixed in libav version
-6:0.8.17-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-464.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-465.data b/english/lts/security/2016/dla-465.data
deleted file mode 100644
index 1b90f489f53..00000000000
--- a/english/lts/security/2016/dla-465.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-465-1 debian-security-support</define-tag>
-<define-tag report_date>2016-5-10</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-465.wml b/english/lts/security/2016/dla-465.wml
deleted file mode 100644
index a37bdd68d20..00000000000
--- a/english/lts/security/2016/dla-465.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It is not feasible to fully support some Debian packages through the releases
-life cycle. The debian-security-support package provides the
-check-support-status tool that helps to warn the administrator about installed
-packages whose security support is limited or has to prematurely end.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, debian-security-support version 2016.05.09+nmu1~deb7u1
-updates the list of packages with restricted support in Wheezy LTS. In
-particular, this version also includes a new feature to notify the user about
-oncoming end-of-lifes.</p>
-
-<p>We recommend you to install the debian-security-support and run
-check-support-status to verify the status of installed packages. Please, refer
-to the check-support-status (1) man page for more information about how to
-use it.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in debian-security-support version 2016.05.09+nmu1~deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-465.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-466.data b/english/lts/security/2016/dla-466.data
deleted file mode 100644
index f83475f6cdc..00000000000
--- a/english/lts/security/2016/dla-466.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-466-1 ocaml</define-tag>
-<define-tag report_date>2016-5-11</define-tag>
-<define-tag secrefs>CVE-2015-8869</define-tag>
-<define-tag packages>ocaml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-466.wml b/english/lts/security/2016/dla-466.wml
deleted file mode 100644
index 1f1e1db2b34..00000000000
--- a/english/lts/security/2016/dla-466.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>OCaml versions 4.02.3 and earlier have a runtime bug that,
-on 64-bit platforms, causes sizes arguments to an internal
-memmove call to be sign-extended from 32 to 64-bits before
-being passed to the memmove function.
-This leads arguments between 2GiB and 4GiB to be interpreted
-as larger than they are (specifically, a bit below 2^64),
-causing a buffer overflow.
-Arguments between 4GiB and 6GiB are interpreted as 4GiB smaller
-than they should be, causing a possible information leak.A</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in ocaml version 3.12.1-4+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-466.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-467.data b/english/lts/security/2016/dla-467.data
deleted file mode 100644
index ab21797a30e..00000000000
--- a/english/lts/security/2016/dla-467.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-467-1 xerces-c</define-tag>
-<define-tag report_date>2016-5-12</define-tag>
-<define-tag secrefs>CVE-2016-2099 Bug#823863</define-tag>
-<define-tag packages>xerces-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-467.wml b/english/lts/security/2016/dla-467.wml
deleted file mode 100644
index 96ac7e34274..00000000000
--- a/english/lts/security/2016/dla-467.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>XMLReader class can raise an exception if an invalid character is
-encountered, and the exception crosses stack frames in an unsafe way that
-causes a higher level exception handler to access an already-freed object.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in xerces-c version 3.1.1-3+deb7u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-467.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-468.data b/english/lts/security/2016/dla-468.data
deleted file mode 100644
index 297b120eebd..00000000000
--- a/english/lts/security/2016/dla-468.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-468-1 libuser</define-tag>
-<define-tag report_date>2016-5-12</define-tag>
-<define-tag secrefs>CVE-2015-3245 CVE-2015-3246 Bug#793465</define-tag>
-<define-tag packages>libuser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-468.wml b/english/lts/security/2016/dla-468.wml
deleted file mode 100644
index 277b514bda0..00000000000
--- a/english/lts/security/2016/dla-468.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in libuser, a library
-that implements a standardized interface for manipulating and
-administering user and group accounts, that could lead to a denial of
-service or privilege escalation by local users.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3245">CVE-2015-3245</a>
-
- <p>Incomplete blacklist vulnerability in the chfn function in libuser
- before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper
- program in the usermode package, allows local users to cause a
- denial of service (/etc/passwd corruption) via a newline character
- in the GECOS field.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3246">CVE-2015-3246</a>
-
- <p>libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the
- userhelper program in the usermode package, directly modifies
- /etc/passwd, which allows local users to cause a denial of service
- (inconsistent file state) by causing an error during the
- modification. NOTE: this issue can be combined with <a href="https://security-tracker.debian.org/tracker/CVE-2015-3245">CVE-2015-3245</a>
- to gain privileges.</p></li>
-
-</ul>
-
-<p>In addition the usermode package, which depends on libuser, was
-rebuilt against the updated version.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in</p>
-
-<p>libuser 1:0.56.9.dfsg.1-1.2+deb7u1
-usermode 1.109-1+deb7u2</p>
-
-<p>We recommend that you upgrade your libuser and usermode packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-468.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-469.data b/english/lts/security/2016/dla-469.data
deleted file mode 100644
index 00974e5197c..00000000000
--- a/english/lts/security/2016/dla-469.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-469-1 libgwenhywfar</define-tag>
-<define-tag report_date>2016-5-12</define-tag>
-<define-tag secrefs>CVE-2015-7542 Bug#748955</define-tag>
-<define-tag packages>libgwenhywfar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-469.wml b/english/lts/security/2016/dla-469.wml
deleted file mode 100644
index 19ddf651867..00000000000
--- a/english/lts/security/2016/dla-469.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libgwenhywfar (an OS abstraction layer that
-allows porting of software to different operating systems like Linux,
-*BSD, Windows etc.) used an outdated CA certificate bundle.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libgwenhywfar version
-4.3.3-1+deb7u1 by utilising the ca-certificates package.</p>
-
-<p>We recommend that you upgrade your libgwenhywfar packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-469.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-470.data b/english/lts/security/2016/dla-470.data
deleted file mode 100644
index 6b46925ef30..00000000000
--- a/english/lts/security/2016/dla-470.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-470-1 libksba</define-tag>
-<define-tag report_date>2016-5-13</define-tag>
-<define-tag secrefs>CVE-2016-4579</define-tag>
-<define-tag packages>libksba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-470.wml b/english/lts/security/2016/dla-470.wml
deleted file mode 100644
index 3d755be300b..00000000000
--- a/english/lts/security/2016/dla-470.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a possible read access beyond a buffer
-vulnerability in libksba, a X.509 and CMS certificate support library.</p>
-
-<p>The returned length of the object from _ksba_ber_parse_tl (ti.length)
-was not always checked against the actual buffer length, thus leading
-to a read access after the end of the buffer and thus a SEGV.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libksba version
-1.2.0-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your libksba packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-470.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-471.data b/english/lts/security/2016/dla-471.data
deleted file mode 100644
index 5e0545b99e8..00000000000
--- a/english/lts/security/2016/dla-471.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-471-1 jansson</define-tag>
-<define-tag report_date>2016-5-13</define-tag>
-<define-tag secrefs>CVE-2016-4425 Bug#823238</define-tag>
-<define-tag packages>jansson</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-471.wml b/english/lts/security/2016/dla-471.wml
deleted file mode 100644
index cbbc5afa783..00000000000
--- a/english/lts/security/2016/dla-471.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Applications that depend on Jansson, a C library for encoding,
-decoding and manipulating JSON data, could crash due to stack
-exhaustion while parsing a JSON file. This was caused due to an
-unlimited parsing depth when parsing JSON arrays and is now fixed by
-limiting the depth to 2048.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2.3.1-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your jansson packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-471.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-472-2.data b/english/lts/security/2016/dla-472-2.data
deleted file mode 100644
index 0d43146b4eb..00000000000
--- a/english/lts/security/2016/dla-472-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-472-2 icedove</define-tag>
-<define-tag report_date>2016-5-18</define-tag>
-<define-tag secrefs>CVE-2016-1979 CVE-2016-2805 CVE-2016-2807 Bug##823430</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-472-2.wml b/english/lts/security/2016/dla-472-2.wml
deleted file mode 100644
index 36cf2e88ab3..00000000000
--- a/english/lts/security/2016/dla-472-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update for icedove did not build on armhf. This is resolved
-by this upload.</p>
-
-<p>The text of the original DLA follows:</p>
-
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client. Multiple memory safety errors may
-lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-38.8.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-472-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-472.data b/english/lts/security/2016/dla-472.data
deleted file mode 100644
index 1d5c59c5d62..00000000000
--- a/english/lts/security/2016/dla-472.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-472-1 icedove</define-tag>
-<define-tag report_date>2016-5-14</define-tag>
-<define-tag secrefs>CVE-2016-1979 CVE-2016-2805 CVE-2016-2807</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-472.wml b/english/lts/security/2016/dla-472.wml
deleted file mode 100644
index 11449833f48..00000000000
--- a/english/lts/security/2016/dla-472.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client. Multiple memory safety errors may
-lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-38.8.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-472.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-473.data b/english/lts/security/2016/dla-473.data
deleted file mode 100644
index ede24d2f578..00000000000
--- a/english/lts/security/2016/dla-473.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-473-1 wpa</define-tag>
-<define-tag report_date>2016-5-14</define-tag>
-<define-tag secrefs>CVE-2016-4476 CVE-2016-4477 Bug#823411</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-473.wml b/english/lts/security/2016/dla-473.wml
deleted file mode 100644
index fd57087a079..00000000000
--- a/english/lts/security/2016/dla-473.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in how hostapd and wpa_supplicant writes the
-configuration file update for the WPA/WPA2 passphrase parameter. If
-this parameter has been updated to include control characters either
-through a WPS operation (<a href="https://security-tracker.debian.org/tracker/CVE-2016-4476">CVE-2016-4476</a>)
-or through local configuration
-change over the wpa_supplicant control interface (<a href="https://security-tracker.debian.org/tracker/CVE-2016-4477">CVE-2016-4477</a>), the
-resulting configuration file may prevent the hostapd and
-wpa_supplicant from starting when the updated file is used. In
-addition for wpa_supplicant, it may be possible to load a local
-library file and execute code from there with the same privileges
-under which the wpa_supplicant process runs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4476">CVE-2016-4476</a>
-
- <p>hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do
- not reject \n and \r characters in passphrase parameters, which
- allows remote attackers to cause a denial of service (daemon
- outage) via a crafted WPS operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4477">CVE-2016-4477</a>
-
- <p>wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r
- characters in passphrase parameters, which allows local users to
- trigger arbitrary library loading and consequently gain privileges,
- or cause a denial of service (daemon outage), via a crafted (1)
- SET, (2) SET_CRED, or (3) SET_NETWORK command.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0-3+deb7u4.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-473.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-474.data b/english/lts/security/2016/dla-474.data
deleted file mode 100644
index a694679ccc3..00000000000
--- a/english/lts/security/2016/dla-474.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-474-1 dosfstools</define-tag>
-<define-tag report_date>2016-5-15</define-tag>
-<define-tag secrefs>CVE-2015-8872 CVE-2016-4804</define-tag>
-<define-tag packages>dosfstools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-474.wml b/english/lts/security/2016/dla-474.wml
deleted file mode 100644
index 69ca25ba560..00000000000
--- a/english/lts/security/2016/dla-474.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an invalid memory and heap overflow
-vulnerability in dosfstools, a collection of utilities for making and
-checking MS-DOS FAT filesystems.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in dosfstools version
-3.0.13-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your dosfstools packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-474.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-475.data b/english/lts/security/2016/dla-475.data
deleted file mode 100644
index 4b954ad0f85..00000000000
--- a/english/lts/security/2016/dla-475.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-475-1 python-tornado</define-tag>
-<define-tag report_date>2016-5-15</define-tag>
-<define-tag secrefs>CVE-2014-9720</define-tag>
-<define-tag packages>python-tornado</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-475.wml b/english/lts/security/2016/dla-475.wml
deleted file mode 100644
index d87fc94eaa4..00000000000
--- a/english/lts/security/2016/dla-475.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that python-tornado, a Python web framework and
-asynchronous networking library, was susceptible for the BREACH attack.
-The XSRF token is now encoded with a random mask on each request. This
-makes it safe to include in compressed pages without being vulnerable.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your python-tornado packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-475.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-476.data b/english/lts/security/2016/dla-476.data
deleted file mode 100644
index 6d13b221d25..00000000000
--- a/english/lts/security/2016/dla-476.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-476-1 libidn</define-tag>
-<define-tag report_date>2016-5-17</define-tag>
-<define-tag secrefs>CVE-2015-2059</define-tag>
-<define-tag packages>libidn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-476.wml b/english/lts/security/2016/dla-476.wml
deleted file mode 100644
index 65ed6c73fce..00000000000
--- a/english/lts/security/2016/dla-476.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libidn, the GNU library for Internationalized
-Domain Names (IDNs), did not correctly handle invalid UTF-8 input,
-causing an out-of-bounds read. This could allow attackers to disclose
-sensitive information from an application using the libidn library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.25-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libidn packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-476.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-477.data b/english/lts/security/2016/dla-477.data
deleted file mode 100644
index 13dba1c3931..00000000000
--- a/english/lts/security/2016/dla-477.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-477-1 librsvg</define-tag>
-<define-tag report_date>2016-5-17</define-tag>
-<define-tag secrefs>CVE-2015-7558 CVE-2016-4347 CVE-2016-4348</define-tag>
-<define-tag packages>librsvg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-477.wml b/english/lts/security/2016/dla-477.wml
deleted file mode 100644
index 345ac9b6540..00000000000
--- a/english/lts/security/2016/dla-477.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>(Note <a href="https://security-tracker.debian.org/tracker/CVE-2016-4347">CVE-2016-4347</a> is a duplicate of <a href="https://security-tracker.debian.org/tracker/CVE-2015-7558">CVE-2015-7558</a>)</p>
-
-<p>Two DoS in librsvg 2.40.2 parsing SVGs with circular definitions were
-found (they will produce stack exhaustion) by Gustavo Grieco.</p>
-
-<p>The version in wheezy (2.36.1-2+deb7u1) is also vulnerable.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.36.1-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your librsvg packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-477.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-478.data b/english/lts/security/2016/dla-478.data
deleted file mode 100644
index 850dcc4a095..00000000000
--- a/english/lts/security/2016/dla-478.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-478-1 squid3</define-tag>
-<define-tag report_date>2016-5-16</define-tag>
-<define-tag secrefs>CVE-2016-4051 CVE-2016-4052 CVE-2016-4053 CVE-2016-4054 CVE-2016-4554 CVE-2016-4555 CVE-2016-4556 Bug#823968</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-478.wml b/english/lts/security/2016/dla-478.wml
deleted file mode 100644
index 3c2de01354c..00000000000
--- a/english/lts/security/2016/dla-478.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been discovered in the Squid caching proxy.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4051">CVE-2016-4051</a>
-
- <p>CESG and Yuriy M. Kaminskiy discovered that Squid cachemgr.cgi
- was vulnerable to a buffer overflow when processing remotely supplied
- inputs relayed through Squid.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4052">CVE-2016-4052</a>
-
-
- <p>CESG discovered that a buffer overflow made Squid vulnerable to a
- Denial of Service (DoS) attack when processing ESI responses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4053">CVE-2016-4053</a>
-
- <p>CESG found that Squid was vulnerable to public information disclosure
- of the server stack layout when processing ESI responses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4054">CVE-2016-4054</a>
-
- <p>CESG discovered that Squid was vulnerable to remote code execution
- when processing ESI responses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4554">CVE-2016-4554</a>
-
- <p>Jianjun Chen found that Squid was vulnerable to a header smuggling
- attack that could lead to cache poisoning and to bypass of same-origin
- security policy in Squid and some client browsers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4555">CVE-2016-4555</a>
-
-<p>and <a href="https://security-tracker.debian.org/tracker/CVE-2016-4556">CVE-2016-4556</a></p>
-
- <p>"bfek-18" and "@vftable" found that Squid was vulnerable to a Denial
- of Service (DoS) attack when processing ESI responses, due to
- incorrect pointer handling and reference counting.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in squid3 version
-3.1.20-2.2+deb7u5. We recommend you to upgrade your squid3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-478.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-479.data b/english/lts/security/2016/dla-479.data
deleted file mode 100644
index 14a82f15984..00000000000
--- a/english/lts/security/2016/dla-479.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-479-1 xen</define-tag>
-<define-tag report_date>2016-5-17</define-tag>
-<define-tag secrefs>CVE-2015-2752 CVE-2015-2756 CVE-2015-5165 CVE-2015-5307 CVE-2015-7969 CVE-2015-7970 CVE-2015-7971 CVE-2015-7972 CVE-2015-8104 CVE-2015-8339 CVE-2015-8340 CVE-2015-8550 CVE-2015-8554 CVE-2015-8555 CVE-2015-8615 CVE-2016-1570 CVE-2016-1571 CVE-2016-2270 CVE-2016-2271</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-479.wml b/english/lts/security/2016/dla-479.wml
deleted file mode 100644
index 0e1028a6a2f..00000000000
--- a/english/lts/security/2016/dla-479.wml
+++ /dev/null
@@ -1,167 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security update fixes a number of security issues in Xen in wheezy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libidn packages.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2752">CVE-2015-2752</a>
-
- <p>The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x,
- when using a PCI passthrough device, is not preemptable, which
- allows local x86 HVM domain users to cause a denial of service (host
- CPU consumption) via a crafted request to the device model
- (qemu-dm).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2756">CVE-2015-2756</a>
-
- <p>QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict
- access to PCI command registers, which might allow local HVM guest
- users to cause a denial of service (non-maskable interrupt and host
- crash) by disabling the (1) memory or (2) I/O decoding for a PCI
- Express device and then accessing the device, which triggers an
- Unsupported Request (UR) response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5165">CVE-2015-5165</a>
-
- <p>The C+ mode offload emulation in the RTL8139 network card device
- model in QEMU, as used in Xen 4.5.x and earlier, allows remote
- attackers to read process heap memory via unspecified vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5307">CVE-2015-5307</a>
-
- <p>The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
- through 4.6.x, allows guest OS users to cause a denial of service
- (host OS panic or hang) by triggering many #AC (aka Alignment Check)
- exceptions, related to svm.c and vmx.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7969">CVE-2015-7969</a>
-
- <p>Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest
- administrators or domains with certain permission to cause a denial
- of service (memory consumption) via a large number of <q>teardowns</q> of
- domains with the vcpu pointer array allocated using the (1)
- XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer
- array allocated using the (2) XENOPROF_get_buffer or (3)
- XENOPROF_set_passive hypercall.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7970">CVE-2015-7970</a>
-
- <p>The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen
- 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86
- HVM guest administrators to cause a denial of service (CPU
- consumption and possibly reboot) via crafted memory contents that
- triggers a "time-consuming linear scan," related to
- Populate-on-Demand.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7971">CVE-2015-7971</a>
-
- <p>Xen 3.2.x through 4.6.x does not limit the number of printk console
- messages when logging certain pmu and profiling hypercalls, which
- allows local guests to cause a denial of service via a sequence of
- crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly
- handled in the do_xenoprof_op function in common/xenoprof.c, or (2)
- HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in
- the do_xenpmu_op function in arch/x86/cpu/vpmu.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7972">CVE-2015-7972</a>
-
- <p>The (1) libxl_set_memory_target function in tools/libxl/libxl.c and
- (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen
- 3.4.x through 4.6.x do not properly calculate the balloon size when
- using the populate-on-demand (PoD) system, which allows local HVM
- guest users to cause a denial of service (guest crash) via
- unspecified vectors related to "heavy memory pressure."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8104">CVE-2015-8104</a>
-
- <p>The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
- through 4.6.x, allows guest OS users to cause a denial of service
- (host OS panic or hang) by triggering many #DB (aka Debug)
- exceptions, related to svm.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8339">CVE-2015-8339</a>
-
- <p>The memory_exchange function in common/memory.c in Xen 3.2.x through
- 4.6.x does not properly hand back pages to a domain, which might
- allow guest OS administrators to cause a denial of service (host
- crash) via unspecified vectors related to domain teardown.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8340">CVE-2015-8340</a>
-
- <p>The memory_exchange function in common/memory.c in Xen 3.2.x through
- 4.6.x does not properly release locks, which might allow guest OS
- administrators to cause a denial of service (deadlock or host crash)
- via unspecified vectors, related to XENMEM_exchange error handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8550">CVE-2015-8550</a>
-
- <p>Xen, when used on a system providing PV backends, allows local guest
- OS administrators to cause a denial of service (host OS crash) or
- gain privileges by writing to memory shared between the frontend and
- backend, aka a double fetch vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8554">CVE-2015-8554</a>
-
- <p>Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using
- the qemu-xen-traditional (aka qemu-dm) device model, allows local
- x86 HVM guest administrators to gain privileges by leveraging a
- system with access to a passed-through MSI-X capable physical PCI
- device and MSI-X table entries, related to a "write path."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8555">CVE-2015-8555</a>
-
- <p>Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86
- FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage
- guest extended register state, which allows local guest domains to
- obtain sensitive information from other domains via unspecified
- vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8615">CVE-2015-8615</a>
-
- <p>The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6
- does not limit the number of printk console messages when logging
- the new callback method, which allows local HVM guest OS users to
- cause a denial of service via a large number of changes to the
- callback method (HVM_PARAM_CALLBACK_IRQ).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1570">CVE-2016-1570</a>
-
- <p>The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1,
- and 4.1.x through 4.6.x allows local PV guests to obtain sensitive
- information, cause a denial of service, gain privileges, or have
- unspecified other impact via a crafted page identifier (MFN) to the
- (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the
- HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to
- page table updates.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1571">CVE-2016-1571</a>
-
- <p>The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x
- through 4.6.x, when using shadow mode paging or nested
- virtualization is enabled, allows local HVM guest users to cause a
- denial of service (host crash) via a non-canonical guest address in
- an INVVPID instruction, which triggers a hypervisor bug check.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2270">CVE-2016-2270</a>
-
- <p>Xen 4.6.x and earlier allows local guest administrators to cause a
- denial of service (host reboot) via vectors related to multiple
- mappings of MMIO pages with different cachability settings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2271">CVE-2016-2271</a>
-
- <p>VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU,
- allows local HVM guest users to cause a denial of service (guest
- crash) via vectors related to a non-canonical RIP.</p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-479.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-480.data b/english/lts/security/2016/dla-480.data
deleted file mode 100644
index 06180f33a75..00000000000
--- a/english/lts/security/2016/dla-480.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-480-1 nss</define-tag>
-<define-tag report_date>2016-5-18</define-tag>
-<define-tag secrefs>CVE-2015-7181 CVE-2015-7182 CVE-2016-1938 CVE-2016-1950 CVE-2016-1978 CVE-2016-1979</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-480.wml b/english/lts/security/2016/dla-480.wml
deleted file mode 100644
index c5b550c12de..00000000000
--- a/english/lts/security/2016/dla-480.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security update fixes serious security issues in NSS including
-arbitrary code execution and remote denial service attacks.</p>
-
-<p>For Debian 7 <q>wheezy</q>, these problems have been fixed in
-3.14.5-1+deb7u6. We recommend you upgrade your nss packages as soon as
-possible.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7181">CVE-2015-7181</a>
-
- <p>The sec_asn1d_parse_leaf function improperly restricts access to
- an unspecified data structure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7182">CVE-2015-7182</a>
-
- <p>Heap-based buffer overflow in the ASN.1 decoder.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1938">CVE-2016-1938</a>
-
- <p>The s_mp_div function in lib/freebl/mpi/mpi.c in improperly
- divides numbers, which might make it easier for remote attackers
- to defeat cryptographic protection mechanisms.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1950">CVE-2016-1950</a>
-
- <p>Heap-based buffer overflow allows remote attackers to execute
- arbitrary code via crafted ASN.1 data in an X.509 certificate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1978">CVE-2016-1978</a>
-
- <p>Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange
- function allows remote attackers to cause a denial of service or
- possibly have unspecified other impact by making an SSL (1) DHE or
- (2) ECDHE handshake at a time of high memory consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1979">CVE-2016-1979</a>
-
- <p>Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey
- function allows remote attackers to cause a denial of service or
- possibly have unspecified other impact via crafted key data with
- DER encoding.</p></li>
-
-</ul>
-
-<p>Further information about Debian LTS security Advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-480.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-481-2.data b/english/lts/security/2016/dla-481-2.data
deleted file mode 100644
index 70f5640e0f5..00000000000
--- a/english/lts/security/2016/dla-481-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-481-2 phpmyadmin</define-tag>
-<define-tag report_date>2016-5-30</define-tag>
-<define-tag secrefs>CVE-2016-1927 CVE-2016-2038 CVE-2016-2039 CVE-2016-2040 CVE-2016-2041 CVE-2016-2045 CVE-2016-2560 Bug#825301</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-481-2.wml b/english/lts/security/2016/dla-481-2.wml
deleted file mode 100644
index 2a111b1091d..00000000000
--- a/english/lts/security/2016/dla-481-2.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous security upload broke the search pages in phpMyAdmin. This
-was caused by a broken patch applied to fix <a href="https://security-tracker.debian.org/tracker/CVE-2016-2040">CVE-2016-2040</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:3.4.11.1-2+deb7u4.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-481-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-481.data b/english/lts/security/2016/dla-481.data
deleted file mode 100644
index 63e7c8d3479..00000000000
--- a/english/lts/security/2016/dla-481.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-481-1 phpmyadmin</define-tag>
-<define-tag report_date>2016-5-18</define-tag>
-<define-tag secrefs>CVE-2016-1927 CVE-2016-2038 CVE-2016-2039 CVE-2016-2040 CVE-2016-2041 CVE-2016-2045 CVE-2016-2560</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-481.wml b/english/lts/security/2016/dla-481.wml
deleted file mode 100644
index 5f2eba5ae0a..00000000000
--- a/english/lts/security/2016/dla-481.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security update fixes a number of security issues in
-phpMyAdmin. We recommend you upgrade your phpmyadmin packages.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1927">CVE-2016-1927</a>
-
- <p>suggestPassword generates weak passphrases</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2038">CVE-2016-2038</a>
-
- <p>information disclosure via crafted requests</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2039">CVE-2016-2039</a>
-
- <p>weak CSRF token values</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2040">CVE-2016-2040</a>
-
- <p>XSS vulnerabilities in authenticated users</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2041">CVE-2016-2041</a>
-
- <p>information breach in CSRF token comparison</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2045">CVE-2016-2045</a>
-
- <p>XSS injection via crafted SQL queries</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2560">CVE-2016-2560</a>
-
- <p>XSS injection</p></li>
-
-</ul>
-
-<p>Further information about Debian LTS security Advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in phpmyadmin version 4:3.4.11.1-2+deb7u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-481.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-482.data b/english/lts/security/2016/dla-482.data
deleted file mode 100644
index fb54265902a..00000000000
--- a/english/lts/security/2016/dla-482.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-482-1 libgd2</define-tag>
-<define-tag report_date>2016-5-19</define-tag>
-<define-tag secrefs>CVE-2015-8874 Bug#824627</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-482.wml b/english/lts/security/2016/dla-482.wml
deleted file mode 100644
index 44a9c6909c2..00000000000
--- a/english/lts/security/2016/dla-482.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a stack consumption vulnerability
-in the libgd2 graphics library which allowed remote attackers to
-cause a denial of service via a crafted imagefilltoborder call.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libgd2 version
-2.0.36~rc1~dfsg-6.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-482.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-483.data b/english/lts/security/2016/dla-483.data
deleted file mode 100644
index 2cae9b4661b..00000000000
--- a/english/lts/security/2016/dla-483.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-483-1 expat</define-tag>
-<define-tag report_date>2016-5-19</define-tag>
-<define-tag secrefs>CVE-2016-0718</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-483.wml b/english/lts/security/2016/dla-483.wml
deleted file mode 100644
index 6f1ae0d8150..00000000000
--- a/english/lts/security/2016/dla-483.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gustavo Grieco discovered that Expat, a XML parsing C library, does not
-properly handle certain kinds of malformed input documents, resulting in
-buffer overflows during processing and error reporting. A remote
-attacker can take advantage of this flaw to cause an application using
-the Expat library to crash, or potentially, to execute arbitrary code
-with the privileges of the user running the application.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.0-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-483.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-484.data b/english/lts/security/2016/dla-484.data
deleted file mode 100644
index dec1baadddc..00000000000
--- a/english/lts/security/2016/dla-484.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-484-1 graphicsmagick</define-tag>
-<define-tag report_date>2016-5-21</define-tag>
-<define-tag secrefs>CVE-2015-8808 CVE-2016-2317 CVE-2016-2318 CVE-2016-3714 CVE-2016-3715 CVE-2016-3716 CVE-2016-3717 CVE-2016-3718 Bug#814732</define-tag>
-<define-tag packages></define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-484.wml b/english/lts/security/2016/dla-484.wml
deleted file mode 100644
index 8f8deb7c3e4..00000000000
--- a/english/lts/security/2016/dla-484.wml
+++ /dev/null
@@ -1,75 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in graphicsmagick a
-tool to manipulate image files.</p>
-
-<p>GraphicsMagick is a fork of ImageMagick and also affected by
-vulnerabilities collectively known as ImageTragick, that are the
-consequence of lack of sanitization of untrusted input. An attacker
-with control on the image input could, with the privileges of the user
-running the application,
-execute code
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-3714">CVE-2016-3714</a>),
-make HTTP GET or FTP requests
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-3718">CVE-2016-3718</a>),
-or delete
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-3715">CVE-2016-3715</a>),
-move
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-3716">CVE-2016-3716</a>),
-or read
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-3717">CVE-2016-3717</a>),
-local files.</p>
-
-<p>To address these concerns the following changes have been made:</p>
-
-<ol>
-
-<li>Remove automatic detection/execution of MVG based on file header or
- file extension.</li>
-
-<li>Remove the ability to cause an input file to be deleted based on a
- filename specification.</li>
-
-<li>Improve the safety of delegates.mgk by removing gnuplot support,
- removing manual page support, and by adding -dSAFER to all
- ghostscript invocations.</li>
-
-<li>Sanity check the MVG image primitive filename argument to assure
- that "magick:" prefix strings will not be interpreted. Please note
- that this patch will break intentional uses of magick prefix
- strings in MVG and so some MVG scripts may fail. We will search
- for a more flexible solution.</li>
-
-</ol>
-
-<p>In addition the following issues have been fixed:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8808">CVE-2015-8808</a>
-
- <p>Assure that GIF decoder does not use unitialized data and cause an
- out-of-bound read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2317">CVE-2016-2317</a> and
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2318">CVE-2016-2318</a>
-
- <p>Vulnerabilities that allow to read or write outside memory bounds
- (heap, stack) as well as some null-pointer derreferences to cause a
- denial of service when parsing SVG files.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-484.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-485.data b/english/lts/security/2016/dla-485.data
deleted file mode 100644
index e41853a36ea..00000000000
--- a/english/lts/security/2016/dla-485.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-485-1 extplorer</define-tag>
-<define-tag report_date>2016-5-22</define-tag>
-<define-tag secrefs>CVE-2015-5660</define-tag>
-<define-tag packages>extplorer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-485.wml b/english/lts/security/2016/dla-485.wml
deleted file mode 100644
index a9c43bbfdf0..00000000000
--- a/english/lts/security/2016/dla-485.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security update fixes a security issue in extplorer. We recommend you
-upgrade your extplorer package.</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5660">CVE-2015-5660</a>
- <p>Cross-site request forgery (CSRF) vulnerability allows remote
- attackers to hijack the authentication of arbitrary users for
- requests that execute PHP code.</p></li>
-
-</ul>
-
-<p>Further information about Debian LTS security Advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in extplorer version 2.1.0b6+dfsg.3-4+deb7u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-485.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-486.data b/english/lts/security/2016/dla-486.data
deleted file mode 100644
index 11f71f90117..00000000000
--- a/english/lts/security/2016/dla-486.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-486-1 imagemagick</define-tag>
-<define-tag report_date>2016-5-23</define-tag>
-<define-tag secrefs>CVE-2016-3714 CVE-2016-3715 CVE-2016-3716 CVE-2016-3717 CVE-2016-3718 Bug#823542</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-486.wml b/english/lts/security/2016/dla-486.wml
deleted file mode 100644
index ee22c90832c..00000000000
--- a/english/lts/security/2016/dla-486.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nikolay Ermishkin from the Mail.Ru Security Team and Stewie discovered
-several vulnerabilities in ImageMagick, a program suite for image
-manipulation. These vulnerabilities, collectively known as ImageTragick,
-are the consequence of lack of sanitization of untrusted input. An
-attacker with control on the image input could, with the privileges of
-the user running the application, execute code (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3714">CVE-2016-3714</a>), make
-HTTP GET or FTP requests (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3718">CVE-2016-3718</a>), or delete (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3715">CVE-2016-3715</a>),
-move (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3716">CVE-2016-3716</a>), or read (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3717">CVE-2016-3717</a>) local files.</p>
-
-<p>These vulnerabilities are particularly critical if Imagemagick processes
-images coming from remote parties, such as part of a web service.</p>
-
-<p>The update disables the vulnerable coders (EPHEMERAL, URL, MVG, MSL, and
-PLT) and indirect reads via /etc/ImageMagick/policy.xml file. In
-addition, we introduce extra preventions, including some sanitization
-for input filenames in http/https delegates, the full remotion of
-PLT/Gnuplot decoder, and the need of explicit reference in the filename
-for the insecure coders.</p>
-
-<p>For the wheezy, these problems have been fixed in version
-8:6.7.7.10-5+deb7u5.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-486.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-487.data b/english/lts/security/2016/dla-487.data
deleted file mode 100644
index cbed9e5c9ee..00000000000
--- a/english/lts/security/2016/dla-487.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-487-1 debian-security-support</define-tag>
-<define-tag report_date>2016-5-25</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-487.wml b/english/lts/security/2016/dla-487.wml
deleted file mode 100644
index 2cb322a5823..00000000000
--- a/english/lts/security/2016/dla-487.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Debian Long Term Support (LTS) Team is unable to continue supporting
-different packages in the extended life cycle of Wheezy LTS. The
-debian-security-support package provides the check-support-status tool that
-helps to warn the administrator about installed packages whose security support
-is limited or has to prematurely end.</p>
-
-<p>debian-security-support version 2016.05.24~deb7u1 updates the list of packages
-with restricted support in Wheezy LTS, adding the following:</p>
-
-<table>
-<tr><th>Source Package</th> <th>Last supported version</th> <th>EOL date</th> <th>Additional information</th></tr>
-<tr><td>libv8</td> <td>3.8.9.20-2</td> <td>2016-02-06</td> <td><a href="https://lists.debian.org/debian-lts/2015/08/msg00035.html">https://lists.debian.org/debian-lts/2015/08/msg00035.html</a></td></tr>
-<tr><td>mediawiki</td> <td>1:1.19.20+dfsg-0+deb7u3</td><td>2016-04-26</td> <td><a href="https://www.debian.org/releases/jessie/amd64/release-notes/ch-information.html#mediawiki-security">https://www.debian.org/releases/jessie/amd64/release-notes/ch-information.html#mediawiki-security</a></td></tr>
-<tr><td>sogo</td> <td>1.3.16-1</td> <td>2016-05-19</td> <td><a href="https://lists.debian.org/debian-lts/2016/05/msg00197.html">https://lists.debian.org/debian-lts/2016/05/msg00197.html</a></td></tr>
-<tr><td>vlc</td> <td>2.0.3-5+deb7u2</td> <td>2016-02-06</td> <td><a href="https://lists.debian.org/debian-lts/2015/11/msg00049.html">https://lists.debian.org/debian-lts/2015/11/msg00049.html</a></td></tr>
-</table>
-
-<p>If you rely on those packages on a system running Debian 7 <q>Wheezy</q>, we
-recommend you to upgrade to Debian 8 <q>Jessie</q>, the current stable release.
-Note however that the mediawiki support has also ended in Jessie. </p>
-
-<p>We recommend you to install the debian-security-support package to verify the
-support status of the packages installed on the system.</p>
-
-<p>More information about Debian LTS can be found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in debian-security-support version 2016.05.24~deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-487.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-488.data b/english/lts/security/2016/dla-488.data
deleted file mode 100644
index 73f31c04840..00000000000
--- a/english/lts/security/2016/dla-488.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-488-1 xymon</define-tag>
-<define-tag report_date>2016-5-25</define-tag>
-<define-tag secrefs>CVE-2016-2054 CVE-2016-2055 CVE-2016-2056 CVE-2016-2058</define-tag>
-<define-tag packages>xymon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-488.wml b/english/lts/security/2016/dla-488.wml
deleted file mode 100644
index 65184307a87..00000000000
--- a/english/lts/security/2016/dla-488.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Markus Krell discovered that Xymon (formerly known as Hobbit), a
-network- and applications-monitoring system, was vulnerable to the
-following security issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2054">CVE-2016-2054</a>
-
- <p>The incorrect handling of user-supplied input in the <q>config</q>
- command can trigger a stack-based buffer overflow, resulting in
- denial of service (via application crash) or remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2055">CVE-2016-2055</a>
-
- <p>The incorrect handling of user-supplied input in the <q>config</q>
- command can lead to an information leak by serving sensitive
- configuration files to a remote user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2056">CVE-2016-2056</a>
-
- <p>The commands handling password management do not properly validate
- user-supplied input, and are thus vulnerable to shell command
- injection by a remote user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2058">CVE-2016-2058</a>
-
- <p>Incorrect escaping of user-supplied input in status webpages can
- be used to trigger reflected cross-site scripting attacks.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.3.0~beta2.dfsg-9.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your xymon packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-488.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-489.data b/english/lts/security/2016/dla-489.data
deleted file mode 100644
index 7cfffc1f719..00000000000
--- a/english/lts/security/2016/dla-489.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-489-1 ruby-mail</define-tag>
-<define-tag report_date>2016-5-25</define-tag>
-<define-tag secrefs>N/A Bug#N/A</define-tag>
-<define-tag packages>ruby-mail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-489.wml b/english/lts/security/2016/dla-489.wml
deleted file mode 100644
index af2964c12d3..00000000000
--- a/english/lts/security/2016/dla-489.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security update fixes a security issue in
-ruby-mail. We recommend you upgrade your ruby-mail package.</p>
-
- <p>Takeshi Terada (Mitsui Bussan Secure Directions, Inc.) released a
- whitepaper entitled <q>SMTP Injection via recipient email addresses</q>
- (<a href="http://www.mbsd.jp/Whitepaper/smtpi.pdf">http://www.mbsd.jp/Whitepaper/smtpi.pdf</a>).
- This whitepaper has a section
- discussing how one such vulnerability affected the <q>mail</q> ruby gem (see
- section 3.1).</p>
-
- <p>Whitepaper has all the specific details, but basically the <q>mail</q> ruby gem
- module is prone to the recipient attack as it does not validate nor
- sanitize given recipient addresses. Thus, the attacks described in chapter
- 2 of the whitepaper can be applied to the gem without any modification. The
- <q>mail</q> ruby gem itself does not impose a length limit on email addresses,
- so an attacker can send a long spam message via a recipient address unless
- there is a limit on the application's side. This vulnerability affects only
- the applications that lack input validation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4.4-2+deb7u1.</p>
-
-<p>Further information about Debian LTS security Advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-489.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-490.data b/english/lts/security/2016/dla-490.data
deleted file mode 100644
index cafbe6764c6..00000000000
--- a/english/lts/security/2016/dla-490.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-490-1 bozohttpd</define-tag>
-<define-tag report_date>2016-5-26</define-tag>
-<define-tag secrefs>CVE-2014-5015 CVE-2015-8212 Bug#755197</define-tag>
-<define-tag packages>bozohttpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-490.wml b/english/lts/security/2016/dla-490.wml
deleted file mode 100644
index 7999996d81c..00000000000
--- a/english/lts/security/2016/dla-490.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities have been discovered in bozohttpd, a small
-HTTP server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5015">CVE-2014-5015</a>
-
- <p>Bozotic HTTP server (aka bozohttpd) before 201407081 truncates
- paths when checking .htpasswd restrictions, which allows remote
- attackers to bypass the HTTP authentication scheme and access
- restrictions via a long path.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8212">CVE-2015-8212</a>
-
- <p>A flaw in CGI suffix handler support was found, if the -C option
- has been used to setup a CGI handler, that could result in remote
- code execution.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-20111118-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your bozohttpd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-490.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-491.data b/english/lts/security/2016/dla-491.data
deleted file mode 100644
index a3b38b9d9f4..00000000000
--- a/english/lts/security/2016/dla-491.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-491-1 postgresql-9.1</define-tag>
-<define-tag report_date>2016-5-27</define-tag>
-<define-tag packages>postgresql-9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-491.wml b/english/lts/security/2016/dla-491.wml
deleted file mode 100644
index 3694e97c13a..00000000000
--- a/english/lts/security/2016/dla-491.wml
+++ /dev/null
@@ -1,81 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The PostgreSQL project released a new version of the PostgreSQL 9.1 branch:</p>
-
-<ul>
-
-<li>Clear the OpenSSL error queue before OpenSSL calls, rather than assuming it's
-clear already; and make sure we leave it clear afterwards (Peter Geoghegan,
-Dave Vitek, Peter Eisentraut)</li>
-
-</ul>
-
-<p>This change prevents problems when there are multiple connections using OpenSSL
-within a single process and not all the code involved follows the same rules
-for when to clear the error queue. Failures have been reported specifically
-when a client application uses SSL connections in libpq concurrently with SSL
-connections using the PHP, Python, or Ruby wrappers for OpenSSL. It's possible
-for similar problems to arise within the server as well, if an extension module
-establishes an outgoing SSL connection.</p>
-
-<ul>
-
-<li>Fix "failed to build any N-way joins" planner error with a full join enclosed
-in the right-hand side of a left join (Tom Lane)</li>
-
-<li>Fix possible misbehavior of TH, th, and Y,YYY format codes in to_timestamp()
-(Tom Lane)</li>
-
-</ul>
-
-<p>These could advance off the end of the input string, causing subsequent format
-codes to read garbage.</p>
-
-<ul>
-
-<li>Fix dumping of rules and views in which the array argument of a value
-operator ANY (array) construct is a sub-SELECT (Tom Lane)</li>
-
-<li>Make pg_regress use a startup timeout from the PGCTLTIMEOUT environment
-variable, if that's set (Tom Lane)</li>
-
-</ul>
-
-<p>This is for consistency with a behavior recently added to pg_ctl; it eases
-automated testing on slow machines.</p>
-
-<ul>
-
-<li>Fix pg_upgrade to correctly restore extension membership for operator
-families containing only one operator class (Tom Lane)</li>
-
-</ul>
-
-<p>In such a case, the operator family was restored into the new database, but it
-was no longer marked as part of the extension. This had no immediate ill
-effects, but would cause later pg_dump runs to emit output that would cause
-(harmless) errors on restore.</p>
-
-<ul>
-
-<li>Rename internal function strtoi() to strtoint() to avoid conflict with a
-NetBSD library function (Thomas Munro)</li>
-
-<li>Use the FORMAT_MESSAGE_IGNORE_INSERTS flag where appropriate. No live bug is
-known to exist here, but it seems like a good idea to be careful.</li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.1.22-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-491.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-492.data b/english/lts/security/2016/dla-492.data
deleted file mode 100644
index 7848694cf12..00000000000
--- a/english/lts/security/2016/dla-492.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-492-1 pdns</define-tag>
-<define-tag report_date>2016-5-29</define-tag>
-<define-tag secrefs>CVE-2014-7210</define-tag>
-<define-tag packages>pdns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-492.wml b/english/lts/security/2016/dla-492.wml
deleted file mode 100644
index 419246d9664..00000000000
--- a/english/lts/security/2016/dla-492.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the maintainer scripts of pdns-backend-mysql
-grant too wide database permissions for the pdns user. Other backends
-are not affected.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1-4.1+deb7u1.</p>
-
-<p>Note that if you're running the pdns server with the mysql backend these
-additional grants are not removed automatically since they might have
-been added on purpose. Check</p>
-
- <p>/usr/share/doc/pdns-backend-mysql/NEWS.Debian.gz</p>
-
-<p>on how to remove them.</p>
-
-<p>We recommend that you upgrade your pdns packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-492.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-493.data b/english/lts/security/2016/dla-493.data
deleted file mode 100644
index 9086a1a4bda..00000000000
--- a/english/lts/security/2016/dla-493.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-493-1 openafs</define-tag>
-<define-tag report_date>2016-5-29</define-tag>
-<define-tag secrefs>CVE-2015-8312 CVE-2016-2860 CVE-2016-4536</define-tag>
-<define-tag packages>openafs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-493.wml b/english/lts/security/2016/dla-493.wml
deleted file mode 100644
index 99169f631c0..00000000000
--- a/english/lts/security/2016/dla-493.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8312">CVE-2015-8312</a>
- <p>Off-by-one error in afs_pioctl.c in OpenAFS before 1.6.16 might allow
- local users to cause a denial of service (memory overwrite and system
- crash) via a pioctl with an input buffer size of 4096 bytes.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2860">CVE-2016-2860</a>
- <p>The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17
- allows remote authenticated users from foreign Kerberos realms to
- bypass intended access restrictions and create arbitrary groups as
- administrators by leveraging mishandling of the creator ID.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4536">CVE-2016-4536</a>
- <p>The client in OpenAFS before 1.6.17 does not properly initialize the
- (1) AFSStoreStatus, (2) AFSStoreVolumeStatus, (3) VldbListByAttributes,
- and (4) ListAddrByAttributes structures, which might allow remote
- attackers to obtain sensitive memory information by leveraging access
- to RPC call traffic.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6.1-3+deb7u6.</p>
-
-<p>We recommend that you upgrade your openafs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-493.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-494.data b/english/lts/security/2016/dla-494.data
deleted file mode 100644
index 07627d201db..00000000000
--- a/english/lts/security/2016/dla-494.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-494-1 eglibc</define-tag>
-<define-tag report_date>2016-5-30</define-tag>
-<define-tag secrefs>CVE-2016-1234 CVE-2016-3075 CVE-2016-3706</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-494.wml b/english/lts/security/2016/dla-494.wml
deleted file mode 100644
index 6e12f988627..00000000000
--- a/english/lts/security/2016/dla-494.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been fixed in the Debian GNU C Library,
-eglibc:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1234">CVE-2016-1234</a>
-
- <p>Alexander Cherepanov discovered that the glibc's glob implementation
- suffered from a stack-based buffer overflow when it was called with the
- GLOB_ALTDIRFUNC flag and encountered a long file name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3075">CVE-2016-3075</a>
-
- <p>The getnetbyname implementation in nss_dns was susceptible to a stack
- overflow and a crash if it was invoked on a very long name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3706">CVE-2016-3706</a>
-
- <p>Michael Petlan reported that getaddrinfo copied large amounts of address
- data to the stack, possibly leading to a stack overflow. This complements
- the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2013-4458">CVE-2013-4458</a>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.13-38+deb7u11.</p>
-
-<p>We recommend you to upgrade your eglibc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system, and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-494.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-495.data b/english/lts/security/2016/dla-495.data
deleted file mode 100644
index a2d3eba996f..00000000000
--- a/english/lts/security/2016/dla-495.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-495-1 libtasn1-3</define-tag>
-<define-tag report_date>2016-5-30</define-tag>
-<define-tag secrefs>CVE-2016-4008</define-tag>
-<define-tag packages>libtasn1-3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-495.wml b/english/lts/security/2016/dla-495.wml
deleted file mode 100644
index 7de78828269..00000000000
--- a/english/lts/security/2016/dla-495.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4008">CVE-2016-4008</a>
-
- <p>infinite loop while parsing DER certificates
- The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1
- before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag,
- allows remote attackers to cause a denial of service
- (infinite recursion) via a crafted certificate.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.13-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your libtasn1-3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-495.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-496.data b/english/lts/security/2016/dla-496.data
deleted file mode 100644
index 10a83d0af2b..00000000000
--- a/english/lts/security/2016/dla-496.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-496-1 ruby-activerecord-3.2</define-tag>
-<define-tag report_date>2016-5-30</define-tag>
-<define-tag secrefs>CVE-2015-7577 Bug#N/A</define-tag>
-<define-tag packages>ruby-activerecord-3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-496.wml b/english/lts/security/2016/dla-496.wml
deleted file mode 100644
index fbccf5ff1ce..00000000000
--- a/english/lts/security/2016/dla-496.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7577">CVE-2015-7577</a>
-
- <p>activerecord/lib/active_record/nested_attributes.rb in Active Record
- does not properly implement a certain destroy option, which allows
- remote attackers to bypass intended change restrictions by leveraging
- use of the nested attributes feature.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem have been fixed in version
-3.2.6-5+deb7u2.</p>
-
-<p>We recommend that you upgrade your ruby-activerecord-3.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-496.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-497.data b/english/lts/security/2016/dla-497.data
deleted file mode 100644
index ab090527c0d..00000000000
--- a/english/lts/security/2016/dla-497.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-497-1 wireshark</define-tag>
-<define-tag report_date>2016-5-31</define-tag>
-<define-tag secrefs>CVE-2012-6052 CVE-2012-6053 CVE-2012-6054 CVE-2012-6055 CVE-2012-6056 CVE-2012-6057 CVE-2012-6058 CVE-2012-6059 CVE-2012-6060 CVE-2012-6061 CVE-2012-6062 CVE-2013-1572 CVE-2013-1573 CVE-2013-1574 CVE-2013-1575 CVE-2013-1576 CVE-2013-1577 CVE-2013-1578 CVE-2013-1579 CVE-2013-1580 CVE-2013-1581 CVE-2013-2476 CVE-2013-2479 CVE-2013-2482 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-4079 CVE-2013-4080 CVE-2013-4927 CVE-2013-4929 CVE-2013-4931 CVE-2013-5719 CVE-2013-5721 CVE-2013-6339 CVE-2013-7112 CVE-2015-6243 CVE-2015-6246 CVE-2015-6248 CVE-2016-4006 CVE-2016-4079 CVE-2016-4080 CVE-2016-4081 CVE-2016-4082 CVE-2016-4085</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-497.wml b/english/lts/security/2016/dla-497.wml
deleted file mode 100644
index c573548679b..00000000000
--- a/english/lts/security/2016/dla-497.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the dissectors/parsers for
-PKTC, IAX2, GSM CBCH and NCP which could result in denial of service.</p>
-
-<p>This update also fixes many older less important issues by updating the
-package to the version found in Debian 8 also known as Jessie.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u1.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-497.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-498.data b/english/lts/security/2016/dla-498.data
deleted file mode 100644
index 347c0f0bcc9..00000000000
--- a/english/lts/security/2016/dla-498.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-498-1 ruby-activemodel-3.2</define-tag>
-<define-tag report_date>2016-5-31</define-tag>
-<define-tag secrefs>CVE-2016-0753</define-tag>
-<define-tag packages>ruby-activemodel-3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-498.wml b/english/lts/security/2016/dla-498.wml
deleted file mode 100644
index e762ca7b342..00000000000
--- a/english/lts/security/2016/dla-498.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before
-4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level
-writers for class accessors, which allows remote attackers to bypass
-intended validation steps via crafted parameters.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2_3.2.6-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your ruby-activemodel-3.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-498.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-499.data b/english/lts/security/2016/dla-499.data
deleted file mode 100644
index dae73704a17..00000000000
--- a/english/lts/security/2016/dla-499.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-499-1 php5</define-tag>
-<define-tag report_date>2016-5-31</define-tag>
-<define-tag secrefs>CVE-2015-8865 CVE-2015-8866 CVE-2015-8878 CVE-2015-8879 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072 CVE-2016-4073 CVE-2016-4343 CVE-2016-4537 CVE-2016-4539 CVE-2016-4540 CVE-2016-4541 CVE-2016-4542 CVE-2016-4543 CVE-2016-4544</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-499.wml b/english/lts/security/2016/dla-499.wml
deleted file mode 100644
index 13187f826a7..00000000000
--- a/english/lts/security/2016/dla-499.wml
+++ /dev/null
@@ -1,105 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8865">CVE-2015-8865</a>
- <p>The file_check_mem function in funcs.c in file before 5.23, as used
- in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20,
- and 7.x before 7.0.5, mishandles continuation-level jumps, which
- allows context-dependent attackers to cause a denial of service
- (buffer overflow and application crash) or possibly execute arbitrary
- code via a crafted magic file.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8866">CVE-2015-8866</a>
- <p>libxml_disable_entity_loader setting is shared between threads
- ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when
- PHP-FPM is used, does not isolate each thread from
- libxml_disable_entity_loader changes in other threads, which allows
- remote attackers to conduct XML External Entity (XXE) and XML Entity
- Expansion (XEE) attacks via a crafted XML document, a related issue
- to <a href="https://security-tracker.debian.org/tracker/CVE-2015-5161">CVE-2015-5161</a>.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8878">CVE-2015-8878</a>
- <p>main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before
- 5.6.12 does not ensure thread safety, which allows remote attackers to
- cause a denial of service (race condition and heap memory corruption)
- by leveraging an application that performs many temporary-file accesses.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8879">CVE-2015-8879</a>
- <p>The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12
- mishandles driver behavior for SQL_WVARCHAR columns, which allows
- remote attackers to cause a denial of service (application crash) in
- opportunistic circumstances by leveraging use of the odbc_fetch_array
- function to access a certain type of Microsoft SQL Server table.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4070">CVE-2016-4070</a>
- <p>Integer overflow in the php_raw_url_encode function in ext/standard/url.c
- in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows
- remote attackers to cause a denial of service (application crash) via a
- long string to the rawurlencode function.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4071">CVE-2016-4071</a>
- <p>Format string vulnerability in the php_snmp_error function in
- ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x
- before 7.0.5 allows remote attackers to execute arbitrary code via
- format string specifiers in an SNMP::get call.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4072">CVE-2016-4072</a>
- <p>The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x
- before 7.0.5 allows remote attackers to execute arbitrary code via a
- crafted filename, as demonstrated by mishandling of \0 characters by
- the phar_analyze_path function in ext/phar/phar.c.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4073">CVE-2016-4073</a>
- <p>Multiple integer overflows in the mbfl_strcut function in
- ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before
- 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial
- of service (application crash) or possibly execute arbitrary code via
- a crafted mb_strcut call.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4343">CVE-2016-4343</a>
- <p>The phar_make_dirstream function in ext/phar/dirstream.c in PHP before
- 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files,
- which allows remote attackers to cause a denial of service
- (uninitialized pointer dereference) or possibly have unspecified other
- impact via a crafted TAR archive.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4537">CVE-2016-4537</a>
- <p>The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35,
- 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer
- for the scale argument, which allows remote attackers to cause a
- denial of service or possibly have unspecified other impact via a
- crafted call.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4539">CVE-2016-4539</a>
- <p>The xml_parse_into_struct function in ext/xml/xml.c in PHP before
- 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote
- attackers to cause a denial of service (buffer under-read and
- segmentation fault) or possibly have unspecified other impact via
- crafted XML data in the second argument, leading to a parser level
- of zero.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4540">CVE-2016-4540</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4541">CVE-2016-4541</a>
- <p>The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c
- in before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows
- remote attackers to cause a denial of service (out-of-bounds read)
- or possibly have unspecified other impact via a negative offset.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4542">CVE-2016-4542</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4543">CVE-2016-4543</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4544">CVE-2016-4544</a>
- <p>The exif_process_* function in ext/exif/exif.c in PHP before 5.5.35,
- 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes,
- which allows remote attackers to cause a denial of service
- (out-of-bounds read) or possibly have unspecified other impact via
- crafted header data.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in php5 version 5.4.45-0+deb7u3</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-499.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-500.data b/english/lts/security/2016/dla-500.data
deleted file mode 100644
index ae9fb609544..00000000000
--- a/english/lts/security/2016/dla-500.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-500-1 imagemagick</define-tag>
-<define-tag report_date>2016-6-2</define-tag>
-<define-tag secrefs>CVE-2016-5118 Bug#825799</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-500.wml b/english/lts/security/2016/dla-500.wml
deleted file mode 100644
index cacf3133eb8..00000000000
--- a/english/lts/security/2016/dla-500.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Bob Friesenhahn from the GraphicsMagick project discovered a command
-injection vulnerability in ImageMagick, a program suite for image
-manipulation. An attacker with control on input image or the input
-filename can execute arbitrary commands with the privileges of the user
-running the application.</p>
-
-<p>This update removes the possibility of using pipe (|) in filenames to
-interact with imagemagick.</p>
-
-<p>It is important that you upgrade the libmagickcore5 and not just
-the imagemagick package. Applications using libmagickcore5 might
-also be affected and need to be restarted after the upgrade.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u6.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-500.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-501.data b/english/lts/security/2016/dla-501.data
deleted file mode 100644
index a55502589f2..00000000000
--- a/english/lts/security/2016/dla-501.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-501-1 gdk-pixbuf</define-tag>
-<define-tag report_date>2016-6-2</define-tag>
-<define-tag secrefs>CVE-2015-7552</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-501.wml b/english/lts/security/2016/dla-501.wml
deleted file mode 100644
index 7e2d1ce87a5..00000000000
--- a/english/lts/security/2016/dla-501.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-7552">CVE-2015-7552</a> (DLA-450-1)
-was incomplete.</p>
-
-<p>A heap-based buffer overflow in gdk-pixbuf, a library for image
-loading and saving facilities, fast scaling and compositing of
-pixbufs, allows remote attackers to cause a denial of service or
-possibly execute arbitrary code via a crafted BMP file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.26.1-1+deb7u5.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-501.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-502.data b/english/lts/security/2016/dla-502.data
deleted file mode 100644
index 0ed13be35af..00000000000
--- a/english/lts/security/2016/dla-502.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-502-1 graphicsmagick</define-tag>
-<define-tag report_date>2016-6-2</define-tag>
-<define-tag secrefs>CVE-2016-5118 Bug#825800</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-502.wml b/english/lts/security/2016/dla-502.wml
deleted file mode 100644
index 6abb1e84760..00000000000
--- a/english/lts/security/2016/dla-502.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Bob Friesenhahn discovered a command injection vulnerability in
-Graphicsmagick, a program suite for image manipulation. An attacker with
-control on input image or the input filename can execute arbitrary
-commands with the privileges of the user running the application.</p>
-
-<p>This update removes the possibility of using pipe (|) in filenames to
-interact with graphicsmagick.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-502.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-503.data b/english/lts/security/2016/dla-503.data
deleted file mode 100644
index 693e87ccbec..00000000000
--- a/english/lts/security/2016/dla-503.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-503-1 libxml2</define-tag>
-<define-tag report_date>2016-6-3</define-tag>
-<define-tag secrefs>CVE-2015-8806 CVE-2016-1762 CVE-2016-1833 CVE-2016-1834 CVE-2016-1835 CVE-2016-1837 CVE-2016-1838 CVE-2016-1839 CVE-2016-1840 CVE-2016-2073 CVE-2016-3627 CVE-2016-3705 CVE-2016-4447 CVE-2016-4449 CVE-2016-4483 Bug#812807 Bug#813613 Bug#819006 Bug#823405 Bug#823414</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-503.wml b/english/lts/security/2016/dla-503.wml
deleted file mode 100644
index 9f58af729b4..00000000000
--- a/english/lts/security/2016/dla-503.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libxml2, a library providing
-support to read, modify and write XML and HTML files. A remote attacker
-could provide a specially crafted XML or HTML file that, when processed
-by an application using libxml2, would cause a denial-of-service against
-the application, or potentially the execution of arbitrary code with the
-privileges of the user running the application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy6.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-503.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-504.data b/english/lts/security/2016/dla-504.data
deleted file mode 100644
index e349b21ccd4..00000000000
--- a/english/lts/security/2016/dla-504.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-504-1 libxstream-java</define-tag>
-<define-tag report_date>2016-6-8</define-tag>
-<define-tag secrefs>CVE-2016-3674 Bug#819455</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-504.wml b/english/lts/security/2016/dla-504.wml
deleted file mode 100644
index 1574e208b90..00000000000
--- a/english/lts/security/2016/dla-504.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that XStream, a Java library to serialize objects to
-XML and back again, was susceptible to XML External Entity attacks.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.2-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-504.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-505.data b/english/lts/security/2016/dla-505.data
deleted file mode 100644
index 7e9c3aaaf76..00000000000
--- a/english/lts/security/2016/dla-505.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-505-1 libpdfbox-java</define-tag>
-<define-tag report_date>2016-6-8</define-tag>
-<define-tag secrefs>CVE-2016-2175</define-tag>
-<define-tag packages>libpdfbox-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-505.wml b/english/lts/security/2016/dla-505.wml
deleted file mode 100644
index 9fd82cc4a79..00000000000
--- a/english/lts/security/2016/dla-505.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Apache PDFBox did not properly initialize the XML parsers, which
-allows context-dependent attackers to conduct XML External Entity
-(XXE) attacks via a crafted PDF. This may lead to the disclosure of
-confidential data, denial of service, server side request forgery,
-port scanning from the perspective of the machine where the parser is
-located, and other system impacts.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.7.0+dfsg-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your libpdfbox-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-505.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-506.data b/english/lts/security/2016/dla-506.data
deleted file mode 100644
index 9be194c644f..00000000000
--- a/english/lts/security/2016/dla-506.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-506-1 dhcpcd5</define-tag>
-<define-tag report_date>2016-6-6</define-tag>
-<define-tag secrefs>CVE-2014-7912 CVE-2014-7913 Bug#N/A</define-tag>
-<define-tag packages>dhcpcd5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-506.wml b/english/lts/security/2016/dla-506.wml
deleted file mode 100644
index d6545438d64..00000000000
--- a/english/lts/security/2016/dla-506.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in dhcpcd5 a DHCP client package.
-A remote (on a local network) attacker can possibly execute arbitrary
-code or cause a denial of service attack by crafted messages.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7912">CVE-2014-7912</a>
-
- <p>The get_option function does not validate the relationship between
- length fields and the amount of data, which allows remote DHCP
- servers to execute arbitrary code or cause a denial of service
- (memory corruption) via a large length value of an option in a
- DHCPACK message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7913">CVE-2014-7913</a>
-
- <p>The print_option function misinterprets the return value of the
- snprintf function, which allows remote DHCP servers to execute
- arbitrary code or cause a denial of service (memory corruption)
- via a crafted message.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.6-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your dhcpcd5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-506.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-507.data b/english/lts/security/2016/dla-507.data
deleted file mode 100644
index 16e30114bc3..00000000000
--- a/english/lts/security/2016/dla-507.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-507-1 nss</define-tag>
-<define-tag report_date>2016-6-7</define-tag>
-<define-tag secrefs>CVE-2015-4000 Bug#N/A</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-507.wml b/english/lts/security/2016/dla-507.wml
deleted file mode 100644
index 9f40a3667be..00000000000
--- a/english/lts/security/2016/dla-507.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in nss.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4000">CVE-2015-4000</a>
-
- <p>With TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is
- enabled on a server but not on a client, does not properly convey
- a DHE_EXPORT choice, which allows man-in-the-middle attackers to
- conduct cipher-downgrade attacks by rewriting a ClientHello with
- DHE replaced by DHE_EXPORT and then rewriting a ServerHello with
- DHE_EXPORT replaced by DHE, aka the <q>Logjam</q> issue.</p>
-
-<p>The solution in nss was to not accept bit lengths less than 1024.
-This may potentially be a backwards incompatibility issue but such
-low bit lengths should not be in use so it was deemed acceptable.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.14.5-1+deb7u7.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-507.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-508.data b/english/lts/security/2016/dla-508.data
deleted file mode 100644
index b286c07ba73..00000000000
--- a/english/lts/security/2016/dla-508.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-508-1 expat</define-tag>
-<define-tag report_date>2016-6-8</define-tag>
-<define-tag secrefs>CVE-2012-6702 CVE-2016-5300</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-508.wml b/english/lts/security/2016/dla-508.wml
deleted file mode 100644
index 6acce62f42b..00000000000
--- a/english/lts/security/2016/dla-508.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two related issues have been discovered in Expat, a C library for
-parsing XML.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6702">CVE-2012-6702</a>
-
- <p>This issue was introduced when <a href="https://security-tracker.debian.org/tracker/CVE-2012-0876">CVE-2012-0876</a> was addressed. Stefan
- Sørensen discovered that the use of the function XML_Parse() seeds
- the random number generator generating repeated outputs for rand()
- calls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5300">CVE-2016-5300</a>
-
- <p>This is the product of an incomplete solution for <a href="https://security-tracker.debian.org/tracker/CVE-2012-0876">CVE-2012-0876</a>. The
- parser poorly seeds the random number generator allowing an
- attacker to cause a denial of service (CPU consumption) via an XML
- file with crafted identifiers.</p></li>
-
-</ul>
-
-<p>You might need to manually restart programs and services using expat
-libraries.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.0-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-508.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-509.data b/english/lts/security/2016/dla-509.data
deleted file mode 100644
index 8e64d26a662..00000000000
--- a/english/lts/security/2016/dla-509.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-509-1 samba</define-tag>
-<define-tag report_date>2016-6-9</define-tag>
-<define-tag secrefs>Bug#820982 Bug#821811</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-509.wml b/english/lts/security/2016/dla-509.wml
deleted file mode 100644
index 10476e1f1b7..00000000000
--- a/english/lts/security/2016/dla-509.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Samba 2:3.6.6-6+deb7u9 release, issued by the DSA-3548-1, introduced
-different regressions causing trust relationship with Win 7 domains to
-fail. The fix for the <a href="https://security-tracker.debian.org/tracker/CVE-2016-2115">CVE-2016-2115</a> has been reverted, so administrators
-should set 'client signing = required' instead.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.6.6-6+deb7u10. More information is available in the NEWS file
-included in this samba release.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-509.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-510.data b/english/lts/security/2016/dla-510.data
deleted file mode 100644
index a6839109207..00000000000
--- a/english/lts/security/2016/dla-510.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-510-1 p7zip</define-tag>
-<define-tag report_date>2016-6-10</define-tag>
-<define-tag secrefs>CVE-2016-2335 Bug#824160</define-tag>
-<define-tag packages>p7zip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-510.wml b/english/lts/security/2016/dla-510.wml
deleted file mode 100644
index 0161a92de30..00000000000
--- a/english/lts/security/2016/dla-510.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Marcin <q>Icewall</q> Noga of Cisco Talos discovered an out-of-bound read
-vulnerability in the CInArchive::ReadFileItem method in p7zip, a 7zr
-file archiver with high compression ratio. A remote attacker can take
-advantage of this flaw to cause a denial-of-service or, potentially the
-execution of arbitrary code with the privileges of the user running
-p7zip, if a specially crafted UDF file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.20.1~dfsg.1-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your p7zip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-510.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-511.data b/english/lts/security/2016/dla-511.data
deleted file mode 100644
index 88f4bc5df2f..00000000000
--- a/english/lts/security/2016/dla-511.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-511-1 libtorrent-rasterbar</define-tag>
-<define-tag report_date>2016-6-11</define-tag>
-<define-tag secrefs>CVE-2016-5301 Bug#826380</define-tag>
-<define-tag packages>libtorrent-rasterbar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-511.wml b/english/lts/security/2016/dla-511.wml
deleted file mode 100644
index 2de70477893..00000000000
--- a/english/lts/security/2016/dla-511.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A specially crafted HTTP response from a tracker (or potentially a UPnP
-broadcast) can crash libtorrent in the parse_chunk_header() function.
-Although this function is not present in this version, upstream's
-additional sanity checks were added to abort the program if necessary
-instead of crashing it.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.15.10-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libtorrent-rasterbar packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-511.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-512.data b/english/lts/security/2016/dla-512.data
deleted file mode 100644
index 3a304affd93..00000000000
--- a/english/lts/security/2016/dla-512.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-512-1 mantis</define-tag>
-<define-tag report_date>2016-6-12</define-tag>
-<define-tag secrefs>CVE-2016-5364</define-tag>
-<define-tag packages>mantis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-512.wml b/english/lts/security/2016/dla-512.wml
deleted file mode 100644
index 907aef4fe2a..00000000000
--- a/english/lts/security/2016/dla-512.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an XSS vulnerability in custom
-field management in mantis, a web-based bug tracking system.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in mantis version
-1.2.18-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your mantis packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-512.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-513.data b/english/lts/security/2016/dla-513.data
deleted file mode 100644
index 8bdc4c53426..00000000000
--- a/english/lts/security/2016/dla-513.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-513-1 nspr</define-tag>
-<define-tag report_date>2016-6-12</define-tag>
-<define-tag secrefs>CVE-2016-1951</define-tag>
-<define-tag packages>nspr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-513.wml b/english/lts/security/2016/dla-513.wml
deleted file mode 100644
index 490d0c419d7..00000000000
--- a/english/lts/security/2016/dla-513.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a buffer overflow in a sprintf
-utility within nspr, the NetScape Portable Runtime library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in nspr version
-2:4.9.2-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your nspr packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-513.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-514.data b/english/lts/security/2016/dla-514.data
deleted file mode 100644
index bac57845578..00000000000
--- a/english/lts/security/2016/dla-514.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-514-1 libxslt</define-tag>
-<define-tag report_date>2016-6-12</define-tag>
-<define-tag secrefs>CVE-2015-7995 CVE-2016-1683 CVE-2016-1684</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-514.wml b/english/lts/security/2016/dla-514.wml
deleted file mode 100644
index cd8bc5cc545..00000000000
--- a/english/lts/security/2016/dla-514.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were found in libxslt.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7995">CVE-2015-7995</a>
-
- <p>A missing type check could cause an application crash via a
- especially crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1683">CVE-2016-1683</a>
-
- <p>An out of bounds heap access bug was found in libxslt.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1684">CVE-2016-1684</a>
-
- <p>There was an integer overflow bug in libxslt that could lead to an
- application crash.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.26-14.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-514.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-515.data b/english/lts/security/2016/dla-515.data
deleted file mode 100644
index d34fec1cbdb..00000000000
--- a/english/lts/security/2016/dla-515.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-515-1 libav</define-tag>
-<define-tag report_date>2016-6-14</define-tag>
-<define-tag secrefs>CVE-2016-3062</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-515.wml b/english/lts/security/2016/dla-515.wml
deleted file mode 100644
index d62a78a90fe..00000000000
--- a/english/lts/security/2016/dla-515.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a memory corruption issue in
-libav (a multimedia player, server, encoder and transcoder) when
-parsing .mp4 files which could lead to crash or possibly execute
-arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libav version
-6:0.8.17-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-515.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-516.data b/english/lts/security/2016/dla-516.data
deleted file mode 100644
index b19d666d502..00000000000
--- a/english/lts/security/2016/dla-516.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-516-1 linux</define-tag>
-<define-tag report_date>2016-6-17</define-tag>
-<define-tag secrefs>CVE-2016-0821 CVE-2016-1583 CVE-2016-2184 CVE-2016-2185 CVE-2016-2186 CVE-2016-2187 CVE-2016-3134 CVE-2016-3136 CVE-2016-3137 CVE-2016-3138 CVE-2016-3140 CVE-2016-3157 CVE-2016-3672 CVE-2016-3951 CVE-2016-3955 CVE-2016-3961 CVE-2016-4482 CVE-2016-4485 CVE-2016-4486 CVE-2016-4565 CVE-2016-4569 CVE-2016-4578 CVE-2016-4580 CVE-2016-4913 CVE-2016-5243 CVE-2016-5244 Bug##627782</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-516.wml b/english/lts/security/2016/dla-516.wml
deleted file mode 100644
index 223e392ef2c..00000000000
--- a/english/lts/security/2016/dla-516.wml
+++ /dev/null
@@ -1,136 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0821">CVE-2016-0821</a>
-
- <p>Solar Designer noted that the list <q>poisoning</q> feature, intended
- to mitigate the effects of bugs in list manipulation in the
- kernel, used poison values within the range of virtual addresses
- that can be allocated by user processes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1583">CVE-2016-1583</a>
-
- <p>Jann Horn of Google Project Zero reported that the eCryptfs
- filesystem could be used together with the proc filesystem to
- cause a kernel stack overflow. If the ecryptfs-utils package was
- installed, local users could exploit this, via the
- mount.ecryptfs_private program, for denial of service (crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2184">CVE-2016-2184</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2185">CVE-2016-2185</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2186">CVE-2016-2186</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2187">CVE-2016-2187</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3136">CVE-2016-3136</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3137">CVE-2016-3137</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3138">CVE-2016-3138</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3140">CVE-2016-3140</a>
-
- <p>Ralf Spenneberg of OpenSource Security reported that various USB
- drivers do not sufficiently validate USB descriptors. This
- allowed a physically present user with a specially designed USB
- device to cause a denial of service (crash). Not all the drivers
- have yet been fixed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3134">CVE-2016-3134</a>
-
- <p>The Google Project Zero team found that the netfilter subsystem
- does not sufficiently validate filter table entries. A user with
- the CAP_NET_ADMIN capability could use this for denial of service
- (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3157">CVE-2016-3157</a> / XSA-171
-
- <p>Andy Lutomirski discovered that the x86_64 (amd64) task switching
- implementation did not correctly update the I/O permission level
- when running as a Xen paravirtual (PV) guest. In some
- configurations this would allow local users to cause a denial of
- service (crash) or to escalate their privileges within the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3672">CVE-2016-3672</a>
-
- <p>Hector Marco and Ismael Ripoll noted that it was still possible to
- disable Address Space Layout Randomisation (ASLR) for x86_32
- (i386) programs by removing the stack resource limit. This made
- it easier for local users to exploit security flaws in programs
- that have the setuid or setgid flag set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3951">CVE-2016-3951</a>
-
- <p>It was discovered that the cdc_ncm driver would free memory
- prematurely if certain errors occurred during its initialisation.
- This allowed a physically present user with a specially designed
- USB device to cause a denial of service (crash) or possibly to
- escalate their privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3955">CVE-2016-3955</a>
-
- <p>Ignat Korchagin reported that the usbip subsystem did not check
- the length of data received for a USB buffer. This allowed denial
- of service (crash) or privilege escalation on a system configured
- as a usbip client, by the usbip server or by an attacker able to
- impersonate it over the network. A system configured as a usbip
- server might be similarly vulnerable to physically present users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3961">CVE-2016-3961</a> / XSA-174
-
- <p>Vitaly Kuznetsov of Red Hat discovered that Linux allowed use of
- hugetlbfs on x86 (i386 and amd64) systems even when running as a
- Xen paravirtualised (PV) guest, although Xen does not support huge
- pages. This allowed users with access to /dev/hugepages to cause
- a denial of service (crash) in the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4482">CVE-2016-4482</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4485">CVE-2016-4485</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4486">CVE-2016-4486</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4569">CVE-2016-4569</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4578">CVE-2016-4578</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4580">CVE-2016-4580</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5243">CVE-2016-5243</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5244">CVE-2016-5244</a>
-
- <p>Kangjie Lu reported that the USB devio, llc, rtnetlink, ALSA
- timer, x25, tipc, and rds facilities leaked information from the
- kernel stack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4565">CVE-2016-4565</a>
-
- <p>Jann Horn of Google Project Zero reported that various components
- in the InfiniBand stack implemented unusual semantics for the
- write() operation. On a system with InfiniBand drivers loaded,
- local users could use this for denial of service or privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4913">CVE-2016-4913</a>
-
- <p>Al Viro found that the ISO9660 filesystem implementation did not
- correctly count the length of certain invalid name entries.
- Reading a directory containing such name entries would leak
- information from kernel memory. Users permitted to mount disks or
- disk images could use this to obtain sensitive information.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.81-1.</p>
-
-<p>This update also fixes bug #627782, which caused data corruption in
-some applications running on an aufs filesystem, and includes many
-other bug fixes from upstream stable updates 3.2.79, 3.2.80 and
-3.2.81.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems will be fixed soon.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-516.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-517.data b/english/lts/security/2016/dla-517.data
deleted file mode 100644
index 456f44b4022..00000000000
--- a/english/lts/security/2016/dla-517.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-517-1 imagemagick</define-tag>
-<define-tag report_date>2016-6-17</define-tag>
-<define-tag secrefs>CVE-2016-4563</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-517.wml b/english/lts/security/2016/dla-517.wml
deleted file mode 100644
index 38ee914a6f8..00000000000
--- a/english/lts/security/2016/dla-517.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The code did not check the integer didn't overflow before trying to
-resize a buffer. A specially crafted file could result in using memory
-past the end of the allocated buffer.</p>
-
-<p>This security CVEs for this issue (<a href="https://security-tracker.debian.org/tracker/CVE-2016-4563">CVE-2016-4563</a>) along with
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-4562">CVE-2016-4562</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2016-4564">CVE-2016-4564</a> were based on a security advisory that
-will not be made public. This security fix was generated based only on
-the surface-level code-change information that is public in GitHub. For
-more information on this, see: <a href="http://seclists.org/oss-sec/2016/q2/476">http://seclists.org/oss-sec/2016/q2/476</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u7.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-517.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-518.data b/english/lts/security/2016/dla-518.data
deleted file mode 100644
index e3a4776a2c7..00000000000
--- a/english/lts/security/2016/dla-518.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-518-1 mozilla-devscripts</define-tag>
-<define-tag report_date>2016-6-17</define-tag>
-<define-tag secrefs>Bug#825508</define-tag>
-<define-tag packages>mozilla-devscripts</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-518.wml b/english/lts/security/2016/dla-518.wml
deleted file mode 100644
index e6dc5c7e594..00000000000
--- a/english/lts/security/2016/dla-518.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In preparation of the upcoming switch to Icedove 45 the
-mozilla-devscripts package was updated to generate correct
-dependencies for rebuilt extensions.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.32+deb7u1.</p>
-
-<p>In case you build mozilla extensions we recommend that you upgrade your
-mozilla-devscripts packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-518.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-519.data b/english/lts/security/2016/dla-519.data
deleted file mode 100644
index 68cdd8f5b9b..00000000000
--- a/english/lts/security/2016/dla-519.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-519-1 icedove</define-tag>
-<define-tag report_date>2016-6-22</define-tag>
-<define-tag secrefs>CVE-2016-2806</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-519.wml b/english/lts/security/2016/dla-519.wml
deleted file mode 100644
index eb89c70c1de..00000000000
--- a/english/lts/security/2016/dla-519.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client: Multiple memory safety errors may
-lead to the execution of arbitrary code or denial of service.</p>
-
-<p>Debian follows the extended support releases (ESR) of Thunderbird. Support
-for the 38.x series has ended, so starting with this update we're now
-following the 45.x releases.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.1.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-519.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-520.data b/english/lts/security/2016/dla-520.data
deleted file mode 100644
index 738298915c9..00000000000
--- a/english/lts/security/2016/dla-520.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-520-1 horizon</define-tag>
-<define-tag report_date>2016-6-18</define-tag>
-<define-tag secrefs>CVE-2016-4428</define-tag>
-<define-tag packages>horizon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-520.wml b/english/lts/security/2016/dla-520.wml
deleted file mode 100644
index 14c4ce2e94d..00000000000
--- a/english/lts/security/2016/dla-520.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an XSS vulnerability in horizon,
-a Django module providing web interaction with OpenStack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in horizon version
-2012.1.1-10+deb7u1.</p>
-
-<p>We recommend that you upgrade your horizon packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-520.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-521.data b/english/lts/security/2016/dla-521.data
deleted file mode 100644
index ee1b3ac0783..00000000000
--- a/english/lts/security/2016/dla-521.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-521-1 firefox-esr</define-tag>
-<define-tag report_date>2016-6-19</define-tag>
-<define-tag secrefs>CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2828 CVE-2016-2831</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-521.wml b/english/lts/security/2016/dla-521.wml
deleted file mode 100644
index c71cd68212a..00000000000
--- a/english/lts/security/2016/dla-521.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-spoofing.</p>
-
-<p>Wait, Firefox? No more references to Iceweasel? That's right, Debian no
-longer applies a custom branding. Please see these links for further
-information:</p>
-<ul>
-<li><a href="https://glandium.org/blog/?p622">https://glandium.org/blog/?p622</a></li>
-<li><a href="https://en.wikipedia.org/wiki/Mozilla_software_rebranded_by_Debian">https://en.wikipedia.org/wiki/Mozilla_software_rebranded_by_Debian</a></li>
-</ul>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 38.x series has ended, so starting with this update we're now
-following the 45.x releases and this update to the next ESR is also the
-point where we reapply the original branding.</p>
-
-<p>Transition packages for the iceweasel packages are provided which
-automatically upgrade to the new version. Since new binary packages need
-to be installed, make sure to allow that in your upgrade procedure (e.g.
-by using "apt-get dist-upgrade" instead of "apt-get upgrade").</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.2.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-521.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-522.data b/english/lts/security/2016/dla-522.data
deleted file mode 100644
index 8b0701d201b..00000000000
--- a/english/lts/security/2016/dla-522.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-522-1 python2.7</define-tag>
-<define-tag report_date>2016-6-21</define-tag>
-<define-tag secrefs>CVE-2016-0772 CVE-2016-5636 CVE-2016-5699</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-522.wml b/english/lts/security/2016/dla-522.wml
deleted file mode 100644
index d53d09e8fce..00000000000
--- a/english/lts/security/2016/dla-522.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0772">CVE-2016-0772</a>
-
- <p>A vulnerability in smtplib allowing MITM attacker to perform a
- startTLS stripping attack. smtplib does not seem to raise an
- exception when the remote end (smtp server) is capable of
- negotiating starttls but fails to respond with 220 (ok) to an
- explicit call of SMTP.starttls(). This may allow a malicious
- MITM to perform a startTLS stripping attack if the client code
- does not explicitly check the response code for startTLS.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5636">CVE-2016-5636</a>
-
- <p>Issue #26171: Fix possible integer overflow and heap corruption
- in zipimporter.get_data().</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5699">CVE-2016-5699</a>
-
- <p>Protocol injection can occur not only if an application sets a
- header based on user-supplied values, but also if the application
- ever tries to fetch a URL specified by an attacker (SSRF case) OR
- if the application ever accesses any malicious web server
- (redirection case).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.7.3-6+deb7u3.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-522.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-523.data b/english/lts/security/2016/dla-523.data
deleted file mode 100644
index 1d1fb5a570a..00000000000
--- a/english/lts/security/2016/dla-523.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-523-1 enigmail</define-tag>
-<define-tag report_date>2016-6-23</define-tag>
-<define-tag packages>enigmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-523.wml b/english/lts/security/2016/dla-523.wml
deleted file mode 100644
index 078d31a6f2e..00000000000
--- a/english/lts/security/2016/dla-523.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This uploads corrects the dependencies of the enigmail
-extension so it becomes installable again together with
-Icedove 45.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.2-4~deb7u2.</p>
-
-<p>We recommend that you upgrade your enigmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-523.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-524.data b/english/lts/security/2016/dla-524.data
deleted file mode 100644
index 54244ce27de..00000000000
--- a/english/lts/security/2016/dla-524.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-524-1 squidguard</define-tag>
-<define-tag report_date>2016-6-22</define-tag>
-<define-tag secrefs>CVE-2015-8936</define-tag>
-<define-tag packages>squidguard</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-524.wml b/english/lts/security/2016/dla-524.wml
deleted file mode 100644
index 14b9422a72f..00000000000
--- a/english/lts/security/2016/dla-524.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a reflected cross-site scripting
-vulnerability in squidguard, a filter and redirector plugin for Squid.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in squidguard version
-1.5-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your squidguard packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-524.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-525.data b/english/lts/security/2016/dla-525.data
deleted file mode 100644
index 642279b350b..00000000000
--- a/english/lts/security/2016/dla-525.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-525-1 gimp</define-tag>
-<define-tag report_date>2016-6-25</define-tag>
-<define-tag secrefs>CVE-2016-4994</define-tag>
-<define-tag packages>gimp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-525.wml b/english/lts/security/2016/dla-525.wml
deleted file mode 100644
index a172b446606..00000000000
--- a/english/lts/security/2016/dla-525.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after-free vulnerability
-in the channel and layer properties parsing process in Gimp, the
-GNU Image Manipulation Program.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in gimp version
-2.8.2-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your gimp packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-525.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-526.data b/english/lts/security/2016/dla-526.data
deleted file mode 100644
index 47a99f086ca..00000000000
--- a/english/lts/security/2016/dla-526.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-526-1 mysql-connector-java</define-tag>
-<define-tag report_date>2016-6-25</define-tag>
-<define-tag secrefs>CVE-2015-2575</define-tag>
-<define-tag packages>mysql-connector-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-526.wml b/english/lts/security/2016/dla-526.wml
deleted file mode 100644
index 91e30a75f2d..00000000000
--- a/english/lts/security/2016/dla-526.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability in the MySQL Connectors component of Oracle MySQL
-(subcomponent: Connector/J) has been discovered that may result in
-unauthorized update, insert or delete access to some MySQL Connectors
-accessible data as well as read access to a subset of MySQL Connectors.
-The issue is addressed by updating to the latest stable release of
-mysql-connector-java since Oracle did not release further information.</p>
-
-<p>Please see Oracle's Critical Patch Update advisory for further details.</p>
-
-<p><url "http://www.oracle.com/technetwork/topics/security/cpuapr2015verbose-2365613.html#MSQL"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1.39-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-connector-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-526.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-527.data b/english/lts/security/2016/dla-527.data
deleted file mode 100644
index b326fc7a14a..00000000000
--- a/english/lts/security/2016/dla-527.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-527-1 nss</define-tag>
-<define-tag report_date>2016-6-25</define-tag>
-<define-tag secrefs>CVE-2016-2834</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-527.wml b/english/lts/security/2016/dla-527.wml
deleted file mode 100644
index 9d9dfcc69d9..00000000000
--- a/english/lts/security/2016/dla-527.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Four moderate rated networking security issues were found in NSS.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.14.5-1+deb7u8.</p>
-
-<p>We recommend that you upgrade your nss packages and restart any
-applications that use them.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-527.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-528.data b/english/lts/security/2016/dla-528.data
deleted file mode 100644
index 0c9e4231a1e..00000000000
--- a/english/lts/security/2016/dla-528.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-528-1 libcommons-fileupload-java</define-tag>
-<define-tag report_date>2016-6-26</define-tag>
-<define-tag secrefs>CVE-2016-3092</define-tag>
-<define-tag packages>libcommons-fileupload-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-528.wml b/english/lts/security/2016/dla-528.wml
deleted file mode 100644
index c5bb2c0477d..00000000000
--- a/english/lts/security/2016/dla-528.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A denial of service vulnerability was identified in Commons FileUpload
-that occurred when the length of the multipart boundary was just below
-the size of the buffer (4096 bytes) used to read the uploaded file.
-This caused the file upload process to take several orders of
-magnitude longer than if the boundary was the typical tens of bytes long.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.2-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libcommons-fileupload-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-528.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-529.data b/english/lts/security/2016/dla-529.data
deleted file mode 100644
index 262e1e0e9fe..00000000000
--- a/english/lts/security/2016/dla-529.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-529-1 tomcat7</define-tag>
-<define-tag report_date>2016-6-26</define-tag>
-<define-tag secrefs>CVE-2016-3092</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-529.wml b/english/lts/security/2016/dla-529.wml
deleted file mode 100644
index 62144ba15c0..00000000000
--- a/english/lts/security/2016/dla-529.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A denial of service vulnerability was identified in Commons FileUpload
-that occurred when the length of the multipart boundary was just below
-the size of the buffer (4096 bytes) used to read the uploaded file.
-This caused the file upload process to take several orders of
-magnitude longer than if the boundary was the typical tens of bytes long.</p>
-
-<p>Apache Tomcat uses a package renamed copy of Apache Commons FileUpload
-to implement the file upload requirements of the Servlet specification
-and was therefore also vulnerable to the denial of service vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u5.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-529.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-530.data b/english/lts/security/2016/dla-530.data
deleted file mode 100644
index dae5ae4ca7c..00000000000
--- a/english/lts/security/2016/dla-530.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-530-1 java-common</define-tag>
-<define-tag report_date>2016-6-26</define-tag>
-<define-tag packages>java-common</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-530.wml b/english/lts/security/2016/dla-530.wml
deleted file mode 100644
index f479de57a97..00000000000
--- a/english/lts/security/2016/dla-530.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>As previously announced [1][2], the default Java implementation has
-been switched from OpenJDK 6 to OpenJDK 7. We strongly recommend to
-remove the unsupported OpenJDK 6 packages which will receive no
-further security updates.</p>
-
-<p>[1] <a href="https://lists.debian.org/debian-lts-announce/2016/05/msg00007.html">https://lists.debian.org/debian-lts-announce/2016/05/msg00007.html</a>
-[2] <a href="https://www.debian.org/News/2016/20160425">https://www.debian.org/News/2016/20160425</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.47+deb7u2.</p>
-
-<p>We recommend that you upgrade your java-common packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-530.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-531.data b/english/lts/security/2016/dla-531.data
deleted file mode 100644
index c1c2806e889..00000000000
--- a/english/lts/security/2016/dla-531.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-531-1 spice</define-tag>
-<define-tag report_date>2016-6-27</define-tag>
-<define-tag secrefs>CVE-2016-2150 Bug#826584</define-tag>
-<define-tag packages>spice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-531.wml b/english/lts/security/2016/dla-531.wml
deleted file mode 100644
index 914b113c961..00000000000
--- a/english/lts/security/2016/dla-531.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in the Simple Protocol for Independent Computing
-Environments, SPICE.</p>
-
-<p>Frediano Ziglio from Red Hat discovered that SPICE allowed local guest
-OS users to read from or write to arbitrary host memory locations via
-crafted primary surface parameters.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version 0.11.0-1+deb7u3.</p>
-
-<p>We recommend you to upgrade your spice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-531.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-532.data b/english/lts/security/2016/dla-532.data
deleted file mode 100644
index b2d55616c25..00000000000
--- a/english/lts/security/2016/dla-532.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-532-1 movabletype-opensource</define-tag>
-<define-tag report_date>2016-6-27</define-tag>
-<define-tag secrefs>CVE-2016-5742</define-tag>
-<define-tag packages>movabletype-opensource</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-532.wml b/english/lts/security/2016/dla-532.wml
deleted file mode 100644
index a0c1bcf46ce..00000000000
--- a/english/lts/security/2016/dla-532.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a SQL injection vulnerability in
-the XML-RPC interface in MovableType, a blogging engine.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in
-movabletype-opensource version 5.1.4+dfsg-4+deb7u4.</p>
-
-<p>We recommend that you upgrade your movabletype-opensource packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-532.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-533.data b/english/lts/security/2016/dla-533.data
deleted file mode 100644
index 5eac43bce4b..00000000000
--- a/english/lts/security/2016/dla-533.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-533-1 php5</define-tag>
-<define-tag report_date>2016-6-29</define-tag>
-<define-tag secrefs>CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-533.wml b/english/lts/security/2016/dla-533.wml
deleted file mode 100644
index deb7250e6cc..00000000000
--- a/english/lts/security/2016/dla-533.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5093">CVE-2016-5093</a>
-
- <p>Absence of null character causes unexpected zend_string length and
- leaks heap memory. The test script uses locale_get_primary_language
- to reach get_icu_value_internal but there are some other functions
- that also trigger this issue:<br>
- locale_canonicalize, locale_filter_matches,<br>
- locale_lookup, locale_parse</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5094">CVE-2016-5094</a>
-
- <p>don't create strings with lengths outside int range</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5095">CVE-2016-5095</a>
-
- <p>similar to <a href="https://security-tracker.debian.org/tracker/CVE-2016-5094">CVE-2016-5094</a>
- don't create strings with lengths outside int range</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5096">CVE-2016-5096</a>
-
- <p>int/size_t confusion in fread</p></li>
-
- <li>CVE-TEMP-bug-70661
-
- <p>bug70661: Use After Free Vulnerability in WDDX Packet Deserialization</p></li>
-
- <li>CVE-TEMP-bug-70728
-
- <p>bug70728: Type Confusion Vulnerability in PHP_to_XMLRPC_worker()</p></li>
-
- <li>CVE-TEMP-bug-70741
-
- <p>bug70741: Session WDDX Packet Deserialization Type Confusion
- Vulnerability</p></li>
-
- <li>CVE-TEMP-bug-70480-raw
-
- <p>bug70480: php_url_parse_ex() buffer overflow read</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u4.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-533.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-534.data b/english/lts/security/2016/dla-534.data
deleted file mode 100644
index e635c0dcf77..00000000000
--- a/english/lts/security/2016/dla-534.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-534-1 libgd2</define-tag>
-<define-tag report_date>2016-6-29</define-tag>
-<define-tag secrefs>CVE-2016-5766</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-534.wml b/english/lts/security/2016/dla-534.wml
deleted file mode 100644
index 90443d46839..00000000000
--- a/english/lts/security/2016/dla-534.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5766">CVE-2016-5766</a>
- <p>Integer Overflow in _gd2GetHeader() resulting in heap overflow.</p></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-534.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-535.data b/english/lts/security/2016/dla-535.data
deleted file mode 100644
index 0341df49dca..00000000000
--- a/english/lts/security/2016/dla-535.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-535-1 xerces-c</define-tag>
-<define-tag report_date>2016-6-29</define-tag>
-<define-tag secrefs>CVE-2016-4463 Bug#828990</define-tag>
-<define-tag packages>xerces-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-535.wml b/english/lts/security/2016/dla-535.wml
deleted file mode 100644
index 8edfdb1f5d9..00000000000
--- a/english/lts/security/2016/dla-535.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brandon Perry discovered that xerces-c, a validating XML parser library
-for C++, fails to successfully parse a DTD that is deeply nested,
-causing a stack overflow. A remote unauthenticated attacker can take
-advantage of this flaw to cause a denial of service against applications
-using the xerces-c library.</p>
-
-<p>Additionally this update includes an enhancement to enable applications
-to fully disable DTD processing through the use of an environment
-variable (XERCES_DISABLE_DTD).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1.1-3+deb7u4.</p>
-
-<p>We recommend that you upgrade your xerces-c packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-535.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-536.data b/english/lts/security/2016/dla-536.data
deleted file mode 100644
index be868bd5908..00000000000
--- a/english/lts/security/2016/dla-536.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-536-1 wget</define-tag>
-<define-tag report_date>2016-6-30</define-tag>
-<define-tag secrefs>CVE-2016-4971 Bug#827003</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-536.wml b/english/lts/security/2016/dla-536.wml
deleted file mode 100644
index a7adc03324f..00000000000
--- a/english/lts/security/2016/dla-536.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>On a server redirect from HTTP to a FTP resource, wget would trust
-the HTTP server and uses the name in the redirected URL as the
-destination filename.
-This behaviour was changed and now it works similarly as a redirect
-from HTTP to another HTTP resource so the original name is used as
-the destination file. To keep the previous behaviour the user must
-provide --trust-server-names.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.13.4-3+deb7u3.</p>
-
-<p>We recommend that you upgrade your wget packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-536.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-537.data b/english/lts/security/2016/dla-537.data
deleted file mode 100644
index c72a44e26a8..00000000000
--- a/english/lts/security/2016/dla-537.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-537-1 roundcube</define-tag>
-<define-tag report_date>2016-6-30</define-tag>
-<define-tag secrefs>CVE-2015-8864</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-537.wml b/english/lts/security/2016/dla-537.wml
deleted file mode 100644
index e49f60290cc..00000000000
--- a/english/lts/security/2016/dla-537.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Roundcube, a webmail solution for IMAP servers, was susceptible to
-cross-site-scripting (XSS) vulnerabilities when handling SVG images.
-When right-clicking on the download link of an attached image, it was
-possible that embedded Javascript could be executed in a separate Tab.</p>
-
-<p>The update disables displaying of SVG images in e-mails and TABS.
-Downloading attachments is still possible. This security update also
-mitigates against other ways to exploit this issue in SVG images.
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-4068">CVE-2016-4068</a>)</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7.2-9+deb7u3.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-537.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-538.data b/english/lts/security/2016/dla-538.data
deleted file mode 100644
index a665f158c9a..00000000000
--- a/english/lts/security/2016/dla-538.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-538-1 wireshark</define-tag>
-<define-tag report_date>2016-6-30</define-tag>
-<define-tag secrefs>CVE-2016-5350 CVE-2016-5351 CVE-2016-5353 CVE-2016-5354 CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5359</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-538.wml b/english/lts/security/2016/dla-538.wml
deleted file mode 100644
index 2c23ec5d11e..00000000000
--- a/english/lts/security/2016/dla-538.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following vulnerabilities have been discovered in the Wheezy's
-Wireshark version:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5350">CVE-2016-5350</a>
-
- <p>The SPOOLS dissector could go into an infinite loop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5351">CVE-2016-5351</a>
-
- <p>The IEEE 802.11 dissector could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5353">CVE-2016-5353</a>
-
- <p>The UMTS FP dissector could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5354">CVE-2016-5354</a>
-
- <p>Some USB dissectors could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5355">CVE-2016-5355</a>
-
- <p>The Toshiba file parser could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5356">CVE-2016-5356</a>
-
- <p>The CoSine file parser could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5357">CVE-2016-5357</a>
-
- <p>The NetScreen file parser could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5359">CVE-2016-5359</a>
-
- <p>The WBXML dissector could go into an infinite loop</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u2.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-538.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-539.data b/english/lts/security/2016/dla-539.data
deleted file mode 100644
index cdd47f52dd9..00000000000
--- a/english/lts/security/2016/dla-539.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-539-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-7-1</define-tag>
-<define-tag secrefs>CVE-2016-3710 CVE-2016-3712</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-539.wml b/english/lts/security/2016/dla-539.wml
deleted file mode 100644
index 2a143c76403..00000000000
--- a/english/lts/security/2016/dla-539.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in qemu-kvm, a full
-virtualization solution for Linux hosts on x86 hardware with x86 guests.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3710">CVE-2016-3710</a>
-
- <p>Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds
- read and write flaw in the QEMU VGA module. A privileged guest user
- could use this flaw to execute arbitrary code on the host with the
- privileges of the hosting QEMU process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3712">CVE-2016-3712</a>
-
- <p>Zuozhi Fzz of Alibaba Inc discovered potential integer overflow
- or out-of-bounds read access issues in the QEMU VGA module. A
- privileged guest user could use this flaw to mount a denial of
- service (QEMU process crash).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u13.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-539.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-540.data b/english/lts/security/2016/dla-540.data
deleted file mode 100644
index d1038a6bffd..00000000000
--- a/english/lts/security/2016/dla-540.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-540-1 qemu</define-tag>
-<define-tag report_date>2016-7-1</define-tag>
-<define-tag secrefs>CVE-2016-3710 CVE-2016-3712 Bug#823830</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-540.wml b/english/lts/security/2016/dla-540.wml
deleted file mode 100644
index 2fac8318d74..00000000000
--- a/english/lts/security/2016/dla-540.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in qemu, a fast processor
-emulator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3710">CVE-2016-3710</a>
-
- <p>Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds
- read and write flaw in the QEMU VGA module. A privileged guest user
- could use this flaw to execute arbitrary code on the host with the
- privileges of the hosting QEMU process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3712">CVE-2016-3712</a>
-
- <p>Zuozhi Fzz of Alibaba Inc discovered potential integer overflow
- or out-of-bounds read access issues in the QEMU VGA module. A
- privileged guest user could use this flaw to mount a denial of
- service (QEMU process crash).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6a+deb7u13.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-540.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-541.data b/english/lts/security/2016/dla-541.data
deleted file mode 100644
index 6fa0ee445a6..00000000000
--- a/english/lts/security/2016/dla-541.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-541-1 libvirt</define-tag>
-<define-tag report_date>2016-7-1</define-tag>
-<define-tag secrefs>CVE-2016-5008</define-tag>
-<define-tag packages>libvirt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-541.wml b/english/lts/security/2016/dla-541.wml
deleted file mode 100644
index 35f00b4b965..00000000000
--- a/english/lts/security/2016/dla-541.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a password policy issue in libvirt, a
-library for interfacing with different virtualization systems.</p>
-
-<p>Setting an empty graphics password is documented as a way to disable
-VNC/SPICE access, but QEMU does not always behave like that. VNC would
-happily accept the empty password. We enforce the behavior by setting
-password expiration to <q>now</q>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libvirt version
-0.9.12.3-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libvirt packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-541.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-542.data b/english/lts/security/2016/dla-542.data
deleted file mode 100644
index 0a86629952f..00000000000
--- a/english/lts/security/2016/dla-542.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-542-1 pidgin</define-tag>
-<define-tag report_date>2016-7-4</define-tag>
-<define-tag secrefs>CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368 CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372 CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376 CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323</define-tag>
-<define-tag packages>pidgin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-542.wml b/english/lts/security/2016/dla-542.wml
deleted file mode 100644
index fe0a9291436..00000000000
--- a/english/lts/security/2016/dla-542.wml
+++ /dev/null
@@ -1,86 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Numerous security issues have been identified and fixed in Pidgin in
-Debian/Wheezy.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2365">CVE-2016-2365</a>
-
- <p>MXIT Markup Command Denial of Service Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2366">CVE-2016-2366</a>
-
- <p>MXIT Table Command Denial of Service Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2367">CVE-2016-2367</a>
-
- <p>MXIT Avatar Length Memory Disclosure Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2368">CVE-2016-2368</a>
-
- <p>MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2369">CVE-2016-2369</a>
-
- <p>MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2370">CVE-2016-2370</a>
-
- <p>MXIT Custom Resource Denial of Service Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2371">CVE-2016-2371</a>
-
- <p>MXIT Extended Profiles Code Execution Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2372">CVE-2016-2372</a>
-
- <p>MXIT File Transfer Length Memory Disclosure Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2373">CVE-2016-2373</a>
-
- <p>MXIT Contact Mood Denial of Service Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2374">CVE-2016-2374</a>
-
- <p>MXIT MultiMX Message Code Execution Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2375">CVE-2016-2375</a>
-
- <p>MXIT Suggested Contacts Memory Disclosure Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2376">CVE-2016-2376</a>
-
- <p>MXIT read stage 0x3 Code Execution Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2377">CVE-2016-2377</a>
-
- <p>MXIT HTTP Content-Length Buffer Overflow Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2378">CVE-2016-2378</a>
-
- <p>MXIT get_utf8_string Code Execution Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2380">CVE-2016-2380</a>
-
- <p>MXIT mxit_convert_markup_tx Information Leak Vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4323">CVE-2016-4323</a>
-
- <p>MXIT Splash Image Arbitrary File Overwrite Vulnerability</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.10.10-1~deb7u2.</p>
-
-<p>We recommend that you upgrade your pidgin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-542.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-543.data b/english/lts/security/2016/dla-543.data
deleted file mode 100644
index 05db90bd93c..00000000000
--- a/english/lts/security/2016/dla-543.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-543-1 sqlite3</define-tag>
-<define-tag report_date>2016-7-6</define-tag>
-<define-tag secrefs>CVE-2016-6153</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-543.wml b/english/lts/security/2016/dla-543.wml
deleted file mode 100644
index 473b85a825d..00000000000
--- a/english/lts/security/2016/dla-543.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that sqlite3, a C library that implements a SQL
-database engine, would reject a temporary directory (e.g., as specified
-by the TMPDIR environment variable) to which the executing user did not
-have read permissions. This could result in information leakage as less
-secure global temporary directories (e.g., /var/tmp or /tmp) would be
-used instead.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.7.13-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-543.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-544.data b/english/lts/security/2016/dla-544.data
deleted file mode 100644
index 986c01f6225..00000000000
--- a/english/lts/security/2016/dla-544.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-544-1 tcpreplay</define-tag>
-<define-tag report_date>2016-7-7</define-tag>
-<define-tag secrefs>CVE-2016-6160 Bug#829350</define-tag>
-<define-tag packages>tcpreplay</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-544.wml b/english/lts/security/2016/dla-544.wml
deleted file mode 100644
index 8fcbd2d5418..00000000000
--- a/english/lts/security/2016/dla-544.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The tcprewrite program, part of the tcpreplay suite, does not check the
-size of the frames it processes. Huge frames may trigger a segmentation
-fault, and such frames occur when caputuring packets on interfaces with
-an MTU of or close to 65536. For example, the loopback interface lo of
-the Linux kernel has such a value.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.4.3-2+wheezy2.</p>
-
-<p>We recommend that you upgrade your tcpreplay packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-544.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-545.data b/english/lts/security/2016/dla-545.data
deleted file mode 100644
index ce805c10529..00000000000
--- a/english/lts/security/2016/dla-545.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-545-1 icu</define-tag>
-<define-tag report_date>2016-7-7</define-tag>
-<define-tag secrefs>CVE-2015-2632 CVE-2015-4844 CVE-2016-0494</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-545.wml b/english/lts/security/2016/dla-545.wml
deleted file mode 100644
index 900b5919c43..00000000000
--- a/english/lts/security/2016/dla-545.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues have been identified and corrected in ICU, the
-International Components for Unicode C and C++ library, in Debian Wheezy.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2632">CVE-2015-2632</a>
-
- <p>Buffer overflow vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4844">CVE-2015-4844</a>
-
- <p>Buffer overflow vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0494">CVE-2016-0494</a>
-
- <p>Integer signedness/overflow vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.8.1.1-12+deb7u4.</p>
-
-<p>We recommend that you upgrade your icu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-545.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-546-2.data b/english/lts/security/2016/dla-546-2.data
deleted file mode 100644
index 38cd9a68d3e..00000000000
--- a/english/lts/security/2016/dla-546-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-546-2 clamav</define-tag>
-<define-tag report_date>2016-7-14</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-546-2.wml b/english/lts/security/2016/dla-546-2.wml
deleted file mode 100644
index a3795551f1c..00000000000
--- a/english/lts/security/2016/dla-546-2.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA 546-1 was incorrectly released before updated clamav packages were
-available and there were subsequent issues with the acceptance of the package
-(which have since been corrected). Updates are now available for all
-supported LTS architectures.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Upstream published version 0.99.2. This update updates wheezy-lts to the
-latest upstream release in line with the approach used for other Debian
-releases.</p>
-
-<p>The changes are not strictly required for operation, but users of the previous
-version in Wheezy may not be able to make use of all current virus signatures
-and might get warnings.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this has been addressed in version
-0.99.2+dfsg-0+deb7u2.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply these
-updates to your system and frequently asked questions can be found at:
-<a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in clamav version 0.99.2+dfsg-0+deb7u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-546-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-546.data b/english/lts/security/2016/dla-546.data
deleted file mode 100644
index 885dd061819..00000000000
--- a/english/lts/security/2016/dla-546.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-546-1 clamav</define-tag>
-<define-tag report_date>2016-7-8</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-546.wml b/english/lts/security/2016/dla-546.wml
deleted file mode 100644
index a00c03905d4..00000000000
--- a/english/lts/security/2016/dla-546.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Upstream published version 0.99.2. This update updates wheezy-lts to the
-latest upstream release in line with the approach used for other Debian
-releases.</p>
-
-<p>The changes are not strictly required for operation, but users of the previous
-version in Wheezy may not be able to make use of all current virus signatures
-and might get warnings.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this has been addressed in version
-0.99.2+dfsg-0+deb7u1.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-546.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-547.data b/english/lts/security/2016/dla-547.data
deleted file mode 100644
index c78dfd68418..00000000000
--- a/english/lts/security/2016/dla-547.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-574-1 graphicsmagick</define-tag>
-<define-tag report_date>2016-7-11</define-tag>
-<define-tag secrefs>2016-5240 2016-5241</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-547.wml b/english/lts/security/2016/dla-547.wml
deleted file mode 100644
index dc88829ecaa..00000000000
--- a/english/lts/security/2016/dla-547.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two denial of service vulnerabilities
-in graphicsmagick, a collection of image processing tools:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5240">CVE-2016-5240</a>
-
- <p>Prevent denial-of-service by detecting and rejecting
- negative stroke-dasharray arguments which were resulting in an
- endless loop.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5241">CVE-2016-5241</a>
-
- <p>Fix divide-by-zero problem if fill or stroke pattern
- image has zero columns or rows to prevent DoS attack.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in graphicsmagick version
-1.3.16-1.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-574.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-548.data b/english/lts/security/2016/dla-548.data
deleted file mode 100644
index 3ce4d24b0f7..00000000000
--- a/english/lts/security/2016/dla-548.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-548-1 drupal7</define-tag>
-<define-tag report_date>2016-7-11</define-tag>
-<define-tag secrefs>CVE-2015-7943</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-548.wml b/english/lts/security/2016/dla-548.wml
deleted file mode 100644
index d76af224bb9..00000000000
--- a/english/lts/security/2016/dla-548.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an open redirect vulnerability in drupal7,
-a content management framework.</p>
-
-<p>The <q>Overlay</q> module in Drupal core displays administrative pages as a layer
-over the current page (using JavaScript) rather than replacing the page
-in the browser window. The module did not sufficiently validate URLs prior
-to displaying their contents, leading to an open redirect vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in drupal7 version
-7.14-2+deb7u13.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-548.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-549.data b/english/lts/security/2016/dla-549.data
deleted file mode 100644
index 26966753019..00000000000
--- a/english/lts/security/2016/dla-549.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-549-1 ruby-eventmachine</define-tag>
-<define-tag report_date>2016-7-15</define-tag>
-<define-tag secrefs>Bug#678512 Bug#696015</define-tag>
-<define-tag packages>ruby-eventmachine</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-549.wml b/english/lts/security/2016/dla-549.wml
deleted file mode 100644
index 8ce08eab7e4..00000000000
--- a/english/lts/security/2016/dla-549.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>EventMachine, a Ruby network engine could be crashed by opening
-a high number of parallel connections (>= 1024) towards a server
-using the EventMachine engine. The crash happens due to the file
-descriptors overwriting the stack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.12.10-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your ruby-eventmachine packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-549.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-550.data b/english/lts/security/2016/dla-550.data
deleted file mode 100644
index 73006282c4e..00000000000
--- a/english/lts/security/2016/dla-550.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-550-1 drupal7</define-tag>
-<define-tag report_date>2016-7-15</define-tag>
-<define-tag secrefs>CVE-2016-6211</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-550.wml b/english/lts/security/2016/dla-550.wml
deleted file mode 100644
index 19bafcddbec..00000000000
--- a/english/lts/security/2016/dla-550.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability existed in the user
-module in drupal7, a content management framework.</p>
-
-<p>If some specific contributed or custom code triggers a rebuild of the
-user profile form, a registered user can be granted all user roles on
-the site. This would typically result in the user gaining administrative
-access.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in drupal7 version
-7.14-2+deb7u14.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-550.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-551.data b/english/lts/security/2016/dla-551.data
deleted file mode 100644
index fa3984b958a..00000000000
--- a/english/lts/security/2016/dla-551.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-551-1 phpmyadmin</define-tag>
-<define-tag report_date>2016-7-17</define-tag>
-<define-tag secrefs>CVE-2016-5731 CVE-2016-5733 CVE-2016-5739</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-551.wml b/english/lts/security/2016/dla-551.wml
deleted file mode 100644
index 206a7ef97b5..00000000000
--- a/english/lts/security/2016/dla-551.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Phpmyadmin, a web administration tool for MySQL, had several
-Cross Site Scripting (XSS) vulnerabilities were reported.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5731">CVE-2016-5731</a>
-
- <p>With a specially crafted request, it is possible to trigger
- an XSS attack through the example OpenID authentication script.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5733">CVE-2016-5733</a>
-
- <p>Several XSS vulnerabilities were found with the Transformation
- feature.
- Also a vulnerability was reported allowing a specifically
- configured MySQL server to execute an XSS attack.
- This particular attack requires configuring the MySQL server
- log_bin directive with the payload.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5739">CVE-2016-5739</a>
-
- <p>A vulnerability was reported where a specially crafted
- Transformation could be used to leak information including
- the authentication token. This could be used to direct a
- CSRF attack against a user.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:3.4.11.1-2+deb7u5.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-551.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-552.data b/english/lts/security/2016/dla-552.data
deleted file mode 100644
index 8bdbee5bcf5..00000000000
--- a/english/lts/security/2016/dla-552.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-552-1 binutils</define-tag>
-<define-tag report_date>2016-7-18</define-tag>
-<define-tag secrefs>CVE-2016-2226 CVE-2016-4487 CVE-2016-4488 CVE-2016-4489 CVE-2016-4490 CVE-2016-4492 CVE-2016-4493 CVE-2016-6131</define-tag>
-<define-tag packages>binutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-552.wml b/english/lts/security/2016/dla-552.wml
deleted file mode 100644
index fe7441f171f..00000000000
--- a/english/lts/security/2016/dla-552.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some minor security issues have been identified and fixed in binutils in
-Debian LTS. These are:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2226">CVE-2016-2226</a>
-
- <p>Exploitable buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4487">CVE-2016-4487</a>
-
- <p>Invalid write due to a use-after-free to array btypevec.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4488">CVE-2016-4488</a>
-
- <p>Invalid write due to a use-after-free to array ktypevec.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4489">CVE-2016-4489</a>
-
- <p>Invalid write due to integer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4490">CVE-2016-4490</a>
-
- <p>Write access violation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4492">CVE-2016-4492</a>
-
- <p>Write access violations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4493">CVE-2016-4493</a>
-
- <p>Read access violations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6131">CVE-2016-6131</a>
-
- <p>Stack buffer overflow when printing bad bytes in Intel Hex objects</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.22-8+deb7u3.</p>
-
-<p>We recommend that you upgrade your binutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-552.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-553.data b/english/lts/security/2016/dla-553.data
deleted file mode 100644
index 83e8a54873d..00000000000
--- a/english/lts/security/2016/dla-553.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-553-1 apache2</define-tag>
-<define-tag report_date>2016-7-20</define-tag>
-<define-tag secrefs>CVE-2016-5387</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-553.wml b/english/lts/security/2016/dla-553.wml
deleted file mode 100644
index aac25a1b131..00000000000
--- a/english/lts/security/2016/dla-553.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Scott Geary of VendHQ discovered that the Apache HTTPD server used the
-value of the Proxy header from HTTP requests to initialize the
-HTTP_PROXY environment variable for CGI scripts, which in turn was
-incorrectly used by certain HTTP client implementations to configure the
-proxy for outgoing HTTP requests. A remote attacker could possibly use
-this flaw to redirect HTTP requests performed by a CGI script to an
-attacker-controlled proxy via a malicious HTTP request.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2.2.22-13+deb7u7.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-553.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-554.data b/english/lts/security/2016/dla-554.data
deleted file mode 100644
index 10d340af6bb..00000000000
--- a/english/lts/security/2016/dla-554.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-554-1 libarchive</define-tag>
-<define-tag report_date>2016-7-21</define-tag>
-<define-tag secrefs>CVE-2015-8917 CVE-2015-8919 CVE-2015-8920 CVE-2015-8921 CVE-2015-8922 CVE-2015-8923 CVE-2015-8924 CVE-2015-8925 CVE-2015-8926 CVE-2015-8930 CVE-2015-8931 CVE-2015-8932 CVE-2015-8933 CVE-2015-8934 CVE-2016-4300 CVE-2016-4302 CVE-2016-4809 CVE-2016-5844</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-554.wml b/english/lts/security/2016/dla-554.wml
deleted file mode 100644
index 8f31da49b34..00000000000
--- a/english/lts/security/2016/dla-554.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in libarchive, a library for
-reading and writing archives in various formats. An attacker can take
-advantage of these flaws to cause a denial-of-service against an
-application using the libarchive library (application crash), or
-potentially execute arbitrary code with the privileges of the user
-running the application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.4-3+wheezy2.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-554.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-555.data b/english/lts/security/2016/dla-555.data
deleted file mode 100644
index 82ad4af4ac0..00000000000
--- a/english/lts/security/2016/dla-555.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-555-1 python-django</define-tag>
-<define-tag report_date>2016-7-21</define-tag>
-<define-tag secrefs>CVE-2016-6186 Bug#831799</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-555.wml b/english/lts/security/2016/dla-555.wml
deleted file mode 100644
index 6055179afbf..00000000000
--- a/english/lts/security/2016/dla-555.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Django, a high-level Python web development
-framework, is prone to a cross-site scripting vulnerability in the
-admin's add/change related popup and debug view.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.5-1+deb7u17.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-555.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-556.data b/english/lts/security/2016/dla-556.data
deleted file mode 100644
index 7449bbbb808..00000000000
--- a/english/lts/security/2016/dla-556.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-556-1 squid3</define-tag>
-<define-tag report_date>2016-7-23</define-tag>
-<define-tag secrefs>CVE-2016-4051</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-556.wml b/english/lts/security/2016/dla-556.wml
deleted file mode 100644
index d14260d4a42..00000000000
--- a/english/lts/security/2016/dla-556.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A buffer overflow in the Squid 3's cache manager, identified by the
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-4051">CVE-2016-4051</a>, was addressed by the DLA-478-1 and the Debian package
-version 3.1.20-2.2+deb7u6. However, the fix was incomplete and thus a
-new upload has been needed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.1.20-2.2+deb7u6.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-556.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-557.data b/english/lts/security/2016/dla-557.data
deleted file mode 100644
index 953b47b8d03..00000000000
--- a/english/lts/security/2016/dla-557.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-557-1 dietlibc</define-tag>
-<define-tag report_date>2016-7-25</define-tag>
-<define-tag secrefs>Bug##832169</define-tag>
-<define-tag packages>dietlibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-557.wml b/english/lts/security/2016/dla-557.wml
deleted file mode 100644
index b095d15edb2..00000000000
--- a/english/lts/security/2016/dla-557.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an insecure default PATH in
-dietlibc, a libc optimized for small size.</p>
-
-<p>Thorsten Glaser discovered that the default PATH in dietlibc
-(if the environment variable is unset) contained the current
-working directory.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in:</p>
-
-<ul>
- <li>dietlibc version 0.33~cvs20120325-4+deb7u1</li>
- <li>minit version 0.10-5+deb7u1</li>
-</ul>
-
-<p>We recommend that you upgrade your dietlibc and minit packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-557.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-558.data b/english/lts/security/2016/dla-558.data
deleted file mode 100644
index c7058759fd1..00000000000
--- a/english/lts/security/2016/dla-558.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-558-1 squid</define-tag>
-<define-tag report_date>2016-7-25</define-tag>
-<define-tag secrefs>CVE-2016-4554</define-tag>
-<define-tag packages>squid</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-558.wml b/english/lts/security/2016/dla-558.wml
deleted file mode 100644
index 31921fcc137..00000000000
--- a/english/lts/security/2016/dla-558.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue has been discovered in the Squid chaching proxy, on its
-2.7.STABLE9 version branch.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4554">CVE-2016-4554</a>
-
- <p>Jianjun Chen found that Squid was vulnerable to a header smuggling
- attack that could lead to cache poisoning and to bypass of same-origin
- security policy in Squid and some client browsers.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in version
-2.7.STABLE9-4.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your squid packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-558.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-559.data b/english/lts/security/2016/dla-559.data
deleted file mode 100644
index efb845cb77e..00000000000
--- a/english/lts/security/2016/dla-559.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-559-1 ntp</define-tag>
-<define-tag report_date>2016-7-25</define-tag>
-<define-tag secrefs>CVE-2015-7974 CVE-2015-7977 CVE-2015-7978 CVE-2015-7979 CVE-2015-8138 CVE-2015-8158 CVE-2016-1547 CVE-2016-1548 CVE-2016-1550 CVE-2016-2516 CVE-2016-2518</define-tag>
-<define-tag packages>ntp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-559.wml b/english/lts/security/2016/dla-559.wml
deleted file mode 100644
index 7133bcb53f0..00000000000
--- a/english/lts/security/2016/dla-559.wml
+++ /dev/null
@@ -1,78 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Network Time Protocol
-daemon and utility programs:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7974">CVE-2015-7974</a>
-
- <p>Matt Street discovered that insufficient key validation allows
- impersonation attacks between authenticated peers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7977">CVE-2015-7977</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2015-7978">CVE-2015-7978</a>
-
- <p>Stephen Gray discovered that a NULL pointer dereference and a
- buffer overflow in the handling of <q>ntpdc reslist</q> commands may
- result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7979">CVE-2015-7979</a>
-
- <p>Aanchal Malhotra discovered that if NTP is configured for broadcast
- mode, an attacker can send malformed authentication packets which
- break associations with the server for other broadcast clients.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8138">CVE-2015-8138</a>
-
- <p>Matthew van Gundy and Jonathan Gardner discovered that missing
- validation of origin timestamps in ntpd clients may result in denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8158">CVE-2015-8158</a>
-
- <p>Jonathan Gardner discovered that missing input sanitising in ntpq
- may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1547">CVE-2016-1547</a>
-
- <p>Stephen Gray and Matthew van Gundy discovered that incorrect handling
- of crypto NAK packets my result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1548">CVE-2016-1548</a>
-
- <p>Jonathan Gardner and Miroslav Lichvar discovered that ntpd clients
- could be forced to change from basic client/server mode to interleaved
- symmetric mode, preventing time synchronisation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1550">CVE-2016-1550</a>
-
- <p>Matthew van Gundy, Stephen Gray and Loganaden Velvindron discovered
- that timing leaks in the the packet authentication code could result
- in recovery of a message digest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2516">CVE-2016-2516</a>
-
- <p>Yihan Lian discovered that duplicate IPs on <q>unconfig</q> directives will
- trigger an assert.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2518">CVE-2016-2518</a>
-
- <p>Yihan Lian discovered that an OOB memory access could potentially
- crash ntpd.</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:4.2.6.p5+dfsg-2+deb7u7.</p>
-
-<p>We recommend that you upgrade your ntp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-559.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-560-2.data b/english/lts/security/2016/dla-560-2.data
deleted file mode 100644
index 3720cd27f4f..00000000000
--- a/english/lts/security/2016/dla-560-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-560-2 cacti</define-tag>
-<define-tag report_date>2016-9-1</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-560-2.wml b/english/lts/security/2016/dla-560-2.wml
deleted file mode 100644
index 772f570bb31..00000000000
--- a/english/lts/security/2016/dla-560-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-2313">CVE-2016-2313</a>
-did not take into account guest users.
-This update fixes it.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.8a+dfsg-5+deb7u10.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-560-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-560.data b/english/lts/security/2016/dla-560.data
deleted file mode 100644
index 196dd3c4fe1..00000000000
--- a/english/lts/security/2016/dla-560.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-560-1 cacti</define-tag>
-<define-tag report_date>2016-7-25</define-tag>
-<define-tag secrefs>CVE-2016-2313 CVE-2016-3172 CVE-2016-3659</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-560.wml b/english/lts/security/2016/dla-560.wml
deleted file mode 100644
index e21eeaa4129..00000000000
--- a/english/lts/security/2016/dla-560.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three security issues have been found in cacti:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2313">CVE-2016-2313</a>
-
- <p>auth_login.php allows remote authenticated users who use web
- authentication to bypass intended access restrictions by logging in
- as a user not in the cacti database.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3172">CVE-2016-3172</a>
-
- <p>An SQL injection vulnerability in tree.php allows remote authenticated
- users to execute arbitrary SQL commands via the parent_id parameter in
- an item_edit action.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3659">CVE-2016-3659</a>
-
- <p>An SQL injection vulnerability in graph_view.php allows remote
- authenticated users to execute arbitrary SQL commands via the
- host_group_data parameter.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.8a+dfsg-5+deb7u9.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-560.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-561.data b/english/lts/security/2016/dla-561.data
deleted file mode 100644
index f7691cb220d..00000000000
--- a/english/lts/security/2016/dla-561.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-561-1 uclibc</define-tag>
-<define-tag report_date>2016-7-26</define-tag>
-<define-tag secrefs>CVE-2016-2224 CVE-2016-2225 CVE-2016-6264</define-tag>
-<define-tag packages>uclibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-561.wml b/english/lts/security/2016/dla-561.wml
deleted file mode 100644
index a109e75c86d..00000000000
--- a/english/lts/security/2016/dla-561.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in uClibc, an
-implementation of the standard C library that is much smaller than
-glibc, which makes it useful for embedded systems.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2224">CVE-2016-2224</a>
-
- <p>Fix possible denial of service via a specially crafted DNS reply
- that could cause an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2225">CVE-2016-2225</a>
-
- <p>Fix possible denial of service via specially crafted packet that
- will make the parser in libc/inet/resolv.c terminate early.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6264">CVE-2016-6264</a>
-
- <p>It was found that <q>BLT</q> instruction in libc/string/arm/memset.S
- checks for signed values. If the parameter of memset is negative,
- then value added to the PC will be large. An attacker that controls
- the length parameter of memset can also control the value of PC
- register.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.32-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your uclibc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-561.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-562.data b/english/lts/security/2016/dla-562.data
deleted file mode 100644
index 74b2bebc105..00000000000
--- a/english/lts/security/2016/dla-562.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-562-1 gosa</define-tag>
-<define-tag report_date>2016-7-26</define-tag>
-<define-tag secrefs>CVE-2015-8771</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-562.wml b/english/lts/security/2016/dla-562.wml
deleted file mode 100644
index 2f5821c7aaf..00000000000
--- a/english/lts/security/2016/dla-562.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>GOsa² is a combination of system-administrator and end-user web
-interface, designed to handle LDAP based setups.</p>
-
-<p>A code injection vulnerability in the Samba plugin code of GOsa has
-been discovered. During Samba password changes it has been possible to
-inject malicious Perl code.</p>
-
-<p>If you upgrade to this fixed package revision, please note that Samba
-password changes will stop working until the sambaHashHook parameter
-in gosa.conf has been updated to accept base64 encoded password strings.</p>
-
-<p>Please read the gosa.conf (5) man page after you have upgraded to this
-package revision and adapt gosa.conf as described there.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.7.4-4.3~deb7u3.</p>
-
-<p>We recommend that you upgrade your gosa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-562.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-563.data b/english/lts/security/2016/dla-563.data
deleted file mode 100644
index 2f0cd33edec..00000000000
--- a/english/lts/security/2016/dla-563.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-563-1 libgd2</define-tag>
-<define-tag report_date>2016-7-26</define-tag>
-<define-tag secrefs>CVE-2016-6161</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-563.wml b/english/lts/security/2016/dla-563.wml
deleted file mode 100644
index 687b3f1dbad..00000000000
--- a/english/lts/security/2016/dla-563.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A global out of bounds read when encoding gif from malformed input was
-found in this software.</p>
-
-<p>When given invalid inputs, we might be fed the EOF marker before it is
-actually the EOF. The gif logic assumes once it sees the EOF marker,
-there won't be any more data, so it leaves the cur_bits index possibly
-negative. So when we get more data, we underflow the masks array.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-563.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-564.data b/english/lts/security/2016/dla-564.data
deleted file mode 100644
index d29eecf6ba8..00000000000
--- a/english/lts/security/2016/dla-564.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-564-1 tardiff</define-tag>
-<define-tag report_date>2016-7-27</define-tag>
-<define-tag secrefs>CVE-2015-0857 CVE-2015-0858</define-tag>
-<define-tag packages>tardiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-564.wml b/english/lts/security/2016/dla-564.wml
deleted file mode 100644
index 1057f7b87f3..00000000000
--- a/english/lts/security/2016/dla-564.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in tardiff:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0857">CVE-2015-0857</a>
-
- <p>Arbitrary command execution was possible via shell metacharacters
- in the name of a (1) tar file or (2) file within a tar file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0858">CVE-2015-0858</a>
-
- <p>Local users could write to arbitrary files via a symlink attack on
- a pathname in a /tmp/tardiff-$$ temporary directory.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your tardiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-564.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-565.data b/english/lts/security/2016/dla-565.data
deleted file mode 100644
index 113c1f370a3..00000000000
--- a/english/lts/security/2016/dla-565.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-565-1 perl</define-tag>
-<define-tag report_date>2016-7-28</define-tag>
-<define-tag secrefs>CVE-2016-1238 CVE-2016-6185 Bug#829578</define-tag>
-<define-tag packages>perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-565.wml b/english/lts/security/2016/dla-565.wml
deleted file mode 100644
index abf33778f02..00000000000
--- a/english/lts/security/2016/dla-565.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the implementation of the
-Perl programming language. The Common Vulnerabilities and Exposures
-project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1238">CVE-2016-1238</a>
-
- <p>John Lightsey and Todd Rinaldo reported that the opportunistic
- loading of optional modules can make many programs unintentionally
- load code from the current working directory (which might be changed
- to another directory without the user realising) and potentially
- leading to privilege escalation, as demonstrated in Debian with
- certain combinations of installed packages.</p>
-
- <p>The problem relates to Perl loading modules from the includes
- directory array ("@INC") in which the last element is the current
- directory ("."). That means that, when <q>perl</q> wants to load a module
- (during first compilation or during lazy loading of a module in run
- time), perl will look for the module in the current directory at the
- end, since '.' is the last include directory in its array of include
- directories to seek. The issue is with requiring libraries that are
- in "." but are not otherwise installed.</p>
-
- <p>With this update several modules which are known to be vulnerable
- are updated to not load modules from current directory.</p>
-
- <p>Additionally the update allows configurable removal of "." from @INC
- in /etc/perl/sitecustomize.pl for a transitional period. It is
- recommended to enable this setting if the possible breakage for a
- specific site has been evaluated. Problems in packages provided in
- Debian resulting from the switch to the removal of '.' from @INC
- should be reported to the Perl maintainers at
- perl@packages.debian.org .</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6185">CVE-2016-6185</a>
-
- <p>It was discovered that XSLoader, a core module from Perl to
- dynamically load C libraries into Perl code, could load shared
- library from incorrect location. XSLoader uses caller() information
- to locate the .so file to load. This can be incorrect if
- XSLoader::load() is called in a string eval. An attacker can take
- advantage of this flaw to execute arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.14.2-21+deb7u4.</p>
-
-<p>We recommend that you upgrade your perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-565.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-566.data b/english/lts/security/2016/dla-566.data
deleted file mode 100644
index 49ba8d1c041..00000000000
--- a/english/lts/security/2016/dla-566.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-566-1 cakephp</define-tag>
-<define-tag report_date>2016-7-28</define-tag>
-<define-tag secrefs>Bug#832283</define-tag>
-<define-tag packages>cakephp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-566.wml b/english/lts/security/2016/dla-566.wml
deleted file mode 100644
index 169d082a2df..00000000000
--- a/english/lts/security/2016/dla-566.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>CakePHP, an open-source web application framework for PHP, was
-vulnerable to SSRF (Server Side
-Request Forgery) attacks. Remote attacker can utilize it for at least
-DoS (Denial of Service) attacks, if the target application accepts XML
-as an input. It is caused by insecure design of Cake's Xml class.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.15-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your cakephp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-566.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-567-2.data b/english/lts/security/2016/dla-567-2.data
deleted file mode 100644
index 4e3fba102ca..00000000000
--- a/english/lts/security/2016/dla-567-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-567-2 mysql-5.5</define-tag>
-<define-tag report_date>2016-8-5</define-tag>
-<define-tag secrefs>CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 CVE-2016-5440</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-567-2.wml b/english/lts/security/2016/dla-567-2.wml
deleted file mode 100644
index aa536e445aa..00000000000
--- a/english/lts/security/2016/dla-567-2.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the MySQL Database Server. These
-vulnerabilities are addressed by upgrading MySQL to the recent upstream 5.5.50
-version. Please refer to the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html"></li>
-<li><a href="http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html">http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.50-0+deb7u2.</p>
-
-<p>Regression note: I have wrongly built the previous 5.5.50-0+deb7u1 upload over
-the jessie-security debian packaging. Although I have not identified any issues
-on amd64, I have uploaded a new release built on the regular wheezy packaging.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-567-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-567.data b/english/lts/security/2016/dla-567.data
deleted file mode 100644
index a60d371154d..00000000000
--- a/english/lts/security/2016/dla-567.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-567-1 mysql-5.5</define-tag>
-<define-tag report_date>2016-7-29</define-tag>
-<define-tag secrefs>CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 CVE-2016-5440</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-567.wml b/english/lts/security/2016/dla-567.wml
deleted file mode 100644
index 93454d60dcc..00000000000
--- a/english/lts/security/2016/dla-567.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the MySQL Database Server. These
-vulnerabilities are addressed by upgrading MySQL to the recent upstream 5.5.50
-version. Please refer to the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
- <p>https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html
- <a href="http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html">http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.50-0+deb7u2.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-567.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-568.data b/english/lts/security/2016/dla-568.data
deleted file mode 100644
index 63f15ff659e..00000000000
--- a/english/lts/security/2016/dla-568.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-568-1 wordpress</define-tag>
-<define-tag report_date>2016-7-29</define-tag>
-<define-tag secrefs>CVE-2016-5387 CVE-2016-5832 CVE-2016-5834 CVE-2016-5835 CVE-2016-5838 CVE-2016-5839 Bug#828225</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-568.wml b/english/lts/security/2016/dla-568.wml
deleted file mode 100644
index d2cefba60e4..00000000000
--- a/english/lts/security/2016/dla-568.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5387">CVE-2016-5387</a>
-
- <p>WordPress allows remote attackers to bypass intended
- access restrictions and remove a category attribute from a post via
- unspecified vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5832">CVE-2016-5832</a>
-
- <p>The customizer in WordPress allows remote attackers to
- bypass intended redirection restrictions via unspecified vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5834">CVE-2016-5834</a>
-
- <p>Cross-site scripting (XSS) vulnerability in the
- wp_get_attachment_link function in wp-includes/post
- template.php in WordPress allows remote
- attackers to inject arbitrary web script or HTML via a crafted
- attachment name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5835">CVE-2016-5835</a>
-
- <p>WordPress allows remote attackers to obtain sensitive
- revision-history information by leveraging the ability to read a
- post related to wp-admin/includes/ajax-actions.php and
- wp-admin/revision.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5838">CVE-2016-5838</a>
-
- <p>WordPress allows remote attackers to bypass intended password
- change restrictions by leveraging knowledge of a cookie.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5839">CVE-2016-5839</a>
-
- <p>WordPress allows remote attackers to bypass the
- sanitize_file_name protection mechanism via unspecified vectors.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u11.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-568.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-569.data b/english/lts/security/2016/dla-569.data
deleted file mode 100644
index 6c1cde0bee4..00000000000
--- a/english/lts/security/2016/dla-569.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-569-1 xmlrpc-epi</define-tag>
-<define-tag report_date>2016-7-29</define-tag>
-<define-tag secrefs>CVE-2016-6296</define-tag>
-<define-tag packages>xmlrpc-epi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-569.wml b/english/lts/security/2016/dla-569.wml
deleted file mode 100644
index 8328a45a316..00000000000
--- a/english/lts/security/2016/dla-569.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Integer signedness error in the simplestring_addn function in
-simplestring.c in xmlrpc-epi through 0.54.2 allows remote attackers to
-cause a denial of service (heap-based buffer overflow) or possibly have
-unspecified other impact via a long first argument to the PHP
-xmlrpc_encode_request function.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.54.2-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your xmlrpc-epi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-569.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-570.data b/english/lts/security/2016/dla-570.data
deleted file mode 100644
index 033f789ed1a..00000000000
--- a/english/lts/security/2016/dla-570.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-570-1 kde4libs</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2016-6232 Bug#832620</define-tag>
-<define-tag packages>kde4libs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-570.wml b/english/lts/security/2016/dla-570.wml
deleted file mode 100644
index 00995a66412..00000000000
--- a/english/lts/security/2016/dla-570.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was possible to trick kde4libs's KArchiveDirectory::copyTo()
-function to extract files to arbitrary system locations from
-a specially prepared tar file outside of the extraction folder.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:4.8.4-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your kde4libs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-570.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-571.data b/english/lts/security/2016/dla-571.data
deleted file mode 100644
index e95af2a32b5..00000000000
--- a/english/lts/security/2016/dla-571.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-571-1 xen</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 CVE-2016-3712 CVE-2016-3960 CVE-2016-4480 CVE-2016-6258</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-571.wml b/english/lts/security/2016/dla-571.wml
deleted file mode 100644
index fcfea11b398..00000000000
--- a/english/lts/security/2016/dla-571.wml
+++ /dev/null
@@ -1,76 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3672">CVE-2014-3672</a> (XSA-180)
-
- <p>Andrew Sorensen discovered that a HVM domain can exhaust the hosts
- disk space by filling up the log file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3158">CVE-2016-3158</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3159">CVE-2016-3159</a> (XSA-172)
-
- <p>Jan Beulich from SUSE discovered that Xen does not properly handle
- writes to the hardware FSW.ES bit when running on AMD64 processors.
- A malicious domain can take advantage of this flaw to obtain address
- space usage and timing information, about another domain, at a
- fairly low rate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3710">CVE-2016-3710</a> (XSA-179)
-
- <p>Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds
- read and write flaw in the QEMU VGA module. A privileged guest user
- could use this flaw to execute arbitrary code on the host with the
- privileges of the hosting QEMU process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3712">CVE-2016-3712</a> (XSA-179)
-
- <p>Zuozhi Fzz of Alibaba Inc discovered potential integer overflow
- or out-of-bounds read access issues in the QEMU VGA module. A
- privileged guest user could use this flaw to mount a denial of
- service (QEMU process crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3960">CVE-2016-3960</a> (XSA-173)
-
- <p>Ling Liu and Yihan Lian of the Cloud Security Team, Qihoo 360
- discovered an integer overflow in the x86 shadow pagetable code. A
- HVM guest using shadow pagetables can cause the host to crash. A PV
- guest using shadow pagetables (i.e. being migrated) with PV
- superpages enabled (which is not the default) can crash the host, or
- corrupt hypervisor memory, potentially leading to privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4480">CVE-2016-4480</a> (XSA-176)
-
- <p>Jan Beulich discovered that incorrect page table handling could
- result in privilege escalation inside a Xen guest instance.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6258">CVE-2016-6258</a> (XSA-182)
-
- <p>Jérémie Boutoille discovered that incorrect pagetable handling in
- PV instances could result in guest to host privilege escalation.</p></li>
-
-<li>Additionally this Xen Security Advisory without a CVE was fixed: XSA-166
-
- <p>Konrad Rzeszutek Wilk and Jan Beulich discovered that ioreq handling
- is possibly susceptible to a multiple read issue.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-1.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-571.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-572.data b/english/lts/security/2016/dla-572.data
deleted file mode 100644
index 68b8fde9d5f..00000000000
--- a/english/lts/security/2016/dla-572.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-572-1 icedove</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2016-2818</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-572.wml b/english/lts/security/2016/dla-572.wml
deleted file mode 100644
index b98e44e5e80..00000000000
--- a/english/lts/security/2016/dla-572.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client: Multiple memory safety errors may
-lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:45.2.0-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-572.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-573.data b/english/lts/security/2016/dla-573.data
deleted file mode 100644
index 6583bafb309..00000000000
--- a/english/lts/security/2016/dla-573.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-573-1 qemu</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2015-5239 CVE-2016-2857 CVE-2016-4020 CVE-2016-4439 CVE-2016-5403 CVE-2016-6351</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-573.wml b/english/lts/security/2016/dla-573.wml
deleted file mode 100644
index 54746193194..00000000000
--- a/english/lts/security/2016/dla-573.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in QEMU, a fast processor
-emulator. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5239">CVE-2015-5239</a>
-
- <p>Lian Yihan discovered that QEMU incorrectly handled certain payload
- messages in the VNC display driver. A malicious guest could use this
- issue to cause the QEMU process to hang, resulting in a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2857">CVE-2016-2857</a>
-
- <p>Ling Liu discovered that QEMU incorrectly handled IP checksum
- routines. An attacker inside the guest could use this issue to cause
- QEMU to crash, resulting in a denial of service, or possibly leak
- host memory bytes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4020">CVE-2016-4020</a>
-
- <p>Donghai Zdh discovered that QEMU incorrectly handled the Task
- Priority Register(TPR). A privileged attacker inside the guest could
- use this issue to possibly leak host memory bytes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4439">CVE-2016-4439</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2016-6351">CVE-2016-6351</a></p>
-
- <p>Li Qiang disovered that the emulation of the 53C9X Fast SCSI
- Controller is affected by out of bound access issues.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5403">CVE-2016-5403</a>
-
- <p>Zhenhao Hong discovered that a malicious guest administrator can
- cause unbounded memory allocation in QEMU (which can cause an
- Out-of-Memory condition) by submitting virtio requests without
- bothering to wait for completion.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u14.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-573.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-574.data b/english/lts/security/2016/dla-574.data
deleted file mode 100644
index b7932a653cc..00000000000
--- a/english/lts/security/2016/dla-574.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-574-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2015-5239 CVE-2016-2857 CVE-2016-4020 CVE-2016-4439 CVE-2016-5403 CVE-2016-6351</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-574.wml b/english/lts/security/2016/dla-574.wml
deleted file mode 100644
index 29a0c8f2301..00000000000
--- a/english/lts/security/2016/dla-574.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in qemu-kvm, a full
-virtualization solution on x86 hardware. The Common Vulnerabilities and
-Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5239">CVE-2015-5239</a>
-
- <p>Lian Yihan discovered that QEMU incorrectly handled certain payload
- messages in the VNC display driver. A malicious guest could use this
- issue to cause the QEMU process to hang, resulting in a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2857">CVE-2016-2857</a>
-
- <p>Ling Liu discovered that QEMU incorrectly handled IP checksum
- routines. An attacker inside the guest could use this issue to cause
- QEMU to crash, resulting in a denial of service, or possibly leak
- host memory bytes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4020">CVE-2016-4020</a>
-
- <p>Donghai Zdh discovered that QEMU incorrectly handled the Task
- Priority Register(TPR). A privileged attacker inside the guest could
- use this issue to possibly leak host memory bytes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4439">CVE-2016-4439</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-6351">CVE-2016-6351</a>
-
- <p>Li Qiang disovered that the emulation of the 53C9X Fast SCSI
- Controller is affected by out of bound access issues.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5403">CVE-2016-5403</a>
-
- <p>Zhenhao Hong discovered that a malicious guest administrator can
- cause unbounded memory allocation in QEMU (which can cause an
- Out-of-Memory condition) by submitting virtio requests without
- bothering to wait for completion.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u14.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-574.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-575-2.data b/english/lts/security/2016/dla-575-2.data
deleted file mode 100644
index b969fb456d9..00000000000
--- a/english/lts/security/2016/dla-575-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-575-2 collectd</define-tag>
-<define-tag report_date>2016-8-4</define-tag>
-<define-tag secrefs>Bug#833013</define-tag>
-<define-tag packages>collectd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-575-2.wml b/english/lts/security/2016/dla-575-2.wml
deleted file mode 100644
index 1691116d6bd..00000000000
--- a/english/lts/security/2016/dla-575-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous upload of collectd surfaced a problem in the way the
-network plugin initializes gcrypt preventing the plugin from being
-loaded when packet signing or encryption is enabled. Previously, this
-may have led to program crashes.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1.0-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your collectd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-575-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-575.data b/english/lts/security/2016/dla-575.data
deleted file mode 100644
index 41b922460ed..00000000000
--- a/english/lts/security/2016/dla-575.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-575-1 collectd</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2016-6254 Bug#832507 Bug#832577</define-tag>
-<define-tag packages>collectd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-575.wml b/english/lts/security/2016/dla-575.wml
deleted file mode 100644
index 50375b5bab6..00000000000
--- a/english/lts/security/2016/dla-575.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Emilien Gaspar discovered that collectd, a statistics collection and
-monitoring daemon, incorrectly processed incoming network
-packets. This resulted in a heap overflow, allowing a remote attacker
-to either cause a DoS via application crash, or potentially execute
-arbitrary code.</p>
-
-<p>Additionally, security researchers at Columbia University and the
-University of Virginia discovered that collectd failed to verify a
-return value during initialization. This meant the daemon could
-sometimes be started without the desired, secure settings.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1.0-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your collectd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-575.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-576.data b/english/lts/security/2016/dla-576.data
deleted file mode 100644
index abe6a627e2c..00000000000
--- a/english/lts/security/2016/dla-576.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-576-1 libdbd-mysql-perl</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2014-9906 CVE-2015-8949</define-tag>
-<define-tag packages>libdbd-mysql-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-576.wml b/english/lts/security/2016/dla-576.wml
deleted file mode 100644
index 2d675a7d645..00000000000
--- a/english/lts/security/2016/dla-576.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two use-after-free vulnerabilities were discovered in DBD::mysql, a Perl
-DBI driver for the MySQL database server. A remote attacker can take
-advantage of these flaws to cause a denial-of-service against an
-application using DBD::mysql (application crash), or potentially to
-execute arbitrary code with the privileges of the user running the
-application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.021-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libdbd-mysql-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-576.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-577.data b/english/lts/security/2016/dla-577.data
deleted file mode 100644
index 78493305bc2..00000000000
--- a/english/lts/security/2016/dla-577.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-577-1 redis</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2013-7458 Bug#832460</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-577.wml b/english/lts/security/2016/dla-577.wml
deleted file mode 100644
index 2948f83dda9..00000000000
--- a/english/lts/security/2016/dla-577.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the redis-cli tool in redis (an in-memory
-key-value database) created world-readable history files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in redis version
-2:2.4.14-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-577.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-578.data b/english/lts/security/2016/dla-578.data
deleted file mode 100644
index b0c702ae352..00000000000
--- a/english/lts/security/2016/dla-578.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-578-1 openssh</define-tag>
-<define-tag report_date>2016-7-30</define-tag>
-<define-tag secrefs>CVE-2016-6210</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-578.wml b/english/lts/security/2016/dla-578.wml
deleted file mode 100644
index 89a729d439d..00000000000
--- a/english/lts/security/2016/dla-578.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>OpenSSH secure shell client and server had a user enumeration
-problem reported.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6210">CVE-2016-6210</a>
-
- <p>User enumeration via covert timing channel</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-6.0p1-4+deb7u5.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-578.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-579.data b/english/lts/security/2016/dla-579.data
deleted file mode 100644
index 8ca0559ed3b..00000000000
--- a/english/lts/security/2016/dla-579.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-579-1 openjdk-7</define-tag>
-<define-tag report_date>2016-8-5</define-tag>
-<define-tag secrefs>CVE-2016-3458 CVE-2016-3500 CVE-2016-3508 CVE-2016-3550 CVE-2016-3606</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-579.wml b/english/lts/security/2016/dla-579.wml
deleted file mode 100644
index 097c88349a1..00000000000
--- a/english/lts/security/2016/dla-579.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in breakouts of
-the Java sandbox, denial of service or information disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u111-2.6.7-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-579.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-580.data b/english/lts/security/2016/dla-580.data
deleted file mode 100644
index 0d59a507bd1..00000000000
--- a/english/lts/security/2016/dla-580.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-580-1 graphite2</define-tag>
-<define-tag report_date>2016-8-1</define-tag>
-<define-tag packages>graphite2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-580.wml b/english/lts/security/2016/dla-580.wml
deleted file mode 100644
index 44f26cbb2de..00000000000
--- a/english/lts/security/2016/dla-580.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous upload of graphite2 (on 2016-04-26) included a .shlib
-file which did not match the shipped shared libraries preventing
-packages build-depending on graphite2 libraries to build.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.6-1~deb7u2.</p>
-
-<p>We recommend that you upgrade your graphite2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-580.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-581.data b/english/lts/security/2016/dla-581.data
deleted file mode 100644
index 1d916bb75f8..00000000000
--- a/english/lts/security/2016/dla-581.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-581-1 libreoffice</define-tag>
-<define-tag report_date>2016-8-3</define-tag>
-<define-tag secrefs>CVE-2016-4324</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-581.wml b/english/lts/security/2016/dla-581.wml
deleted file mode 100644
index 71c3cb6093a..00000000000
--- a/english/lts/security/2016/dla-581.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Aleksandar Nikolic discovered that missing input sanitising in
-the RTF parser in Libreoffice may result in the execution of
-arbitrary code if a malformed documented is opened.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:3.5.4+dfsg2-0+deb7u7.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-581.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-582.data b/english/lts/security/2016/dla-582.data
deleted file mode 100644
index eeec859f2d8..00000000000
--- a/english/lts/security/2016/dla-582.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-582-1 libidn</define-tag>
-<define-tag report_date>2016-8-2</define-tag>
-<define-tag secrefs>CVE-2015-8948 CVE-2016-6261 CVE-2016-6263</define-tag>
-<define-tag packages>libidn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-582.wml b/english/lts/security/2016/dla-582.wml
deleted file mode 100644
index 83c091b0ff6..00000000000
--- a/english/lts/security/2016/dla-582.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in libidn. The Common
-Vulnerabilities and Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8948">CVE-2015-8948</a>
-
- <p>When idn is reading one zero byte as input an out-of-bounds-read occurred.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6261">CVE-2016-6261</a>
-
- <p>An out-of-bounds stack read is exploitable in idna_to_ascii_4i.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6263">CVE-2016-6263</a>
-
- <p>stringprep_utf8_nfkc_normalize reject invalid UTF-8, causes a crash.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.25-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your libidn packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-582.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-583.data b/english/lts/security/2016/dla-583.data
deleted file mode 100644
index 61f6eb45834..00000000000
--- a/english/lts/security/2016/dla-583.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-583-1 lighttpd</define-tag>
-<define-tag report_date>2016-8-3</define-tag>
-<define-tag secrefs>CVE-2016-1000212 Bug#832571</define-tag>
-<define-tag packages>lighttpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-583.wml b/english/lts/security/2016/dla-583.wml
deleted file mode 100644
index 3a0700976c4..00000000000
--- a/english/lts/security/2016/dla-583.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dominic Scheirlinck and Scott Geary of Vend reported an insecure
-behaviour in the lighttpd web server. Lighttpd assigned Proxy header
-values from client requests to internal HTTP_PROXY environment
-variables. This could be used to carry out Man in the Middle Attacks
-(MIDM) or create connections to arbitrary hosts.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in version
-1.4.31-4+deb7u5.</p>
-
-<p>We recommend that you upgrade your lighttpd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-583.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-584.data b/english/lts/security/2016/dla-584.data
deleted file mode 100644
index c5b1417758b..00000000000
--- a/english/lts/security/2016/dla-584.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-584-1 libsys-syslog-perl</define-tag>
-<define-tag report_date>2016-8-4</define-tag>
-<define-tag secrefs>CVE-2016-1238</define-tag>
-<define-tag packages>libsys-syslog-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-584.wml b/english/lts/security/2016/dla-584.wml
deleted file mode 100644
index ec12bbac80f..00000000000
--- a/english/lts/security/2016/dla-584.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>John Lightsey and Todd Rinaldo reported that the opportunistic loading
-of optional modules can make many programs unintentionally load code
-from the current working directory (which might be changed to another
-directory without the user realising) and potentially leading to
-privilege escalation, as demonstrated in Debian with certain
-combinations of installed packages.</p>
-
-<p>The problem relates to Perl loading modules from the includes directory
-array ("@INC") in which the last element is the current directory (".").
-That means that, when <q>perl</q> wants to load a module (during first
-compilation or during lazy loading of a module in run time), perl will
-look for the module in the current directory at the end, since '.' is
-the last include directory in its array of include directories to seek.
-The issue is with requiring libraries that are in "." but are not
-otherwise installed.</p>
-
-<p>With this update the Sys::Syslog Perl module is updated to not load
-modules from current directory.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.29-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libsys-syslog-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-584.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-585.data b/english/lts/security/2016/dla-585.data
deleted file mode 100644
index ac7193a9055..00000000000
--- a/english/lts/security/2016/dla-585.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-585-1 firefox-esr</define-tag>
-<define-tag report_date>2016-8-4</define-tag>
-<define-tag secrefs>CVE-2016-2830 CVE-2016-2836 CVE-2016-2837 CVE-2016-2838 CVE-2016-5252 CVE-2016-5254 CVE-2016-5258 CVE-2016-5259 CVE-2016-5262 CVE-2016-5263 CVE-2016-5264 CVE-2016-5265</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-585.wml b/english/lts/security/2016/dla-585.wml
deleted file mode 100644
index 5cc4f9affb6..00000000000
--- a/english/lts/security/2016/dla-585.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code,
-cross-site scriping, information disclosure and bypass of the
-same-origin policy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.3.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-585.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-586.data b/english/lts/security/2016/dla-586.data
deleted file mode 100644
index 26f81963d19..00000000000
--- a/english/lts/security/2016/dla-586.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-586-1 curl</define-tag>
-<define-tag report_date>2016-8-4</define-tag>
-<define-tag secrefs>CVE-2016-5419 CVE-2016-5420</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-586.wml b/english/lts/security/2016/dla-586.wml
deleted file mode 100644
index 828a1f6cb3f..00000000000
--- a/english/lts/security/2016/dla-586.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5419">CVE-2016-5419</a>
-
- <p>Bru Rom discovered that libcurl would attempt to resume a TLS
- session even if the client certificate had changed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5420">CVE-2016-5420</a>
-
- <p>It was discovered that libcurl did not consider client certificates
- when reusing TLS connections.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.26.0-1+wheezy14.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-586.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-587.data b/english/lts/security/2016/dla-587.data
deleted file mode 100644
index 804b78be231..00000000000
--- a/english/lts/security/2016/dla-587.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-587-1 fontconfig</define-tag>
-<define-tag report_date>2016-8-9</define-tag>
-<define-tag secrefs>CVE-2016-5384 Bug#833570</define-tag>
-<define-tag packages>fontconfig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-587.wml b/english/lts/security/2016/dla-587.wml
deleted file mode 100644
index b8856257cfd..00000000000
--- a/english/lts/security/2016/dla-587.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A possible double free vulnerability was found in fontconfig. The
-problem was due to insufficient validation when parsing the cache
-file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.9.0-7.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your fontconfig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-587.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-588-2.data b/english/lts/security/2016/dla-588-2.data
deleted file mode 100644
index 701f6fb0a2d..00000000000
--- a/english/lts/security/2016/dla-588-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-588-2 mongodb</define-tag>
-<define-tag report_date>2016-8-9</define-tag>
-<define-tag secrefs>CVE-2016-6494 Bug#832908 Bug#833087</define-tag>
-<define-tag packages>mongodb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-588-2.wml b/english/lts/security/2016/dla-588-2.wml
deleted file mode 100644
index 636d7aa315a..00000000000
--- a/english/lts/security/2016/dla-588-2.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is an update of DLA-558-1. The previous build had
-revision number that was considered lower than the one
-in wheezy and was therefore not installed at upgrade.</p>
-
-<p>The text for DLA-558-1 is included here for reference
-(with some improvement).</p>
-
-<p>Two security related problems have been found in the mongodb
-package, both related to logging.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6494">CVE-2016-6494</a>
-
- <p>World-readable .dbshell history file</p></li>
-
-<li>Debian Bug 833087
-
- <p>Bruteforcable challenge responses in unprotected logfile</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.6-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your mongodb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-588-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-588.data b/english/lts/security/2016/dla-588.data
deleted file mode 100644
index 199a5ca145a..00000000000
--- a/english/lts/security/2016/dla-588.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-588-1 mongodb</define-tag>
-<define-tag report_date>2016-8-8</define-tag>
-<define-tag secrefs>CVE-2016-6494 Bug#832908 Bug#833087</define-tag>
-<define-tag packages>mongodb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-588.wml b/english/lts/security/2016/dla-588.wml
deleted file mode 100644
index cdaef0dbda0..00000000000
--- a/english/lts/security/2016/dla-588.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security related problems have been found in the mongodb
-package, related to logging.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6494">CVE-2016-6494</a>
-
- <p>World-readable .dbshell history file</p>
-
-<li>TEMP-0833087-C5410D
-
- <p>Bruteforcable challenge responses in unprotected logfile</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.6-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your mongodb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-588.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-589.data b/english/lts/security/2016/dla-589.data
deleted file mode 100644
index 53ce769a64f..00000000000
--- a/english/lts/security/2016/dla-589.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-589-1 mupdf</define-tag>
-<define-tag report_date>2016-8-8</define-tag>
-<define-tag secrefs>CVE-2016-6525 Bug#833417</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-589.wml b/english/lts/security/2016/dla-589.wml
deleted file mode 100644
index 024ce03d37e..00000000000
--- a/english/lts/security/2016/dla-589.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in the pdf_load_mesh_params() function allowing
-out-of-bounds write access to memory locations. With carefully crafted
-input, that could trigger a heap overflow, resulting in application
-crash or possibly having other unspecified impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-589.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-590.data b/english/lts/security/2016/dla-590.data
deleted file mode 100644
index 15805455e3d..00000000000
--- a/english/lts/security/2016/dla-590.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-590-1 python-django</define-tag>
-<define-tag report_date>2016-8-9</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-590.wml b/english/lts/security/2016/dla-590.wml
deleted file mode 100644
index 4f6d52f89a8..00000000000
--- a/english/lts/security/2016/dla-590.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The release team recently approved rebasing jessie on latest
-python-django 1.7.x (see #807654). For similiar reasons, it makes sense
-to rebase wheezy on latest 1.4.x, especially since 1.4.x is an LTS
-version.</p>
-
-<p>Django 1.4.22-1 has been uploaded to wheezy-security to address this.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in python-django version 1.4.22-1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-590.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-591.data b/english/lts/security/2016/dla-591.data
deleted file mode 100644
index 2e4f64330f3..00000000000
--- a/english/lts/security/2016/dla-591.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-591-1 libreoffice</define-tag>
-<define-tag report_date>2016-8-9</define-tag>
-<define-tag secrefs>CVE-2016-1513</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-591.wml b/english/lts/security/2016/dla-591.wml
deleted file mode 100644
index b814f11e2c3..00000000000
--- a/english/lts/security/2016/dla-591.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An OpenDocument Presentation .ODP or Presentation Template .OTP file
-can contain invalid presentation elements that lead to memory
-corruption when the document is loaded in LibreOffice Impress. The
-defect may cause the document to appear as corrupted and LibreOffice
-may crash in a recovery-stuck mode requiring manual intervention. A
-crafted exploitation of the defect can allow an attacker to cause
-denial of service (memory corruption and application crash) and
-possible execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem have been fixed in version
-3.5.4+dfsg2-0+deb7u8.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-591.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-592.data b/english/lts/security/2016/dla-592.data
deleted file mode 100644
index ef47b616b0b..00000000000
--- a/english/lts/security/2016/dla-592.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-592-1 postgresql-9.1</define-tag>
-<define-tag report_date>2016-8-11</define-tag>
-<define-tag packages>postgresql-9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-592.wml b/english/lts/security/2016/dla-592.wml
deleted file mode 100644
index 750dd07f8a6..00000000000
--- a/english/lts/security/2016/dla-592.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in PostgreSQL, an SQL
-database system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5423">CVE-2016-5423</a>
-
- <p>Karthikeyan Jambu Rajaraman discovered that nested CASE-WHEN
- expressions are not properly evaluated, potentially leading to a
- crash or allowing to disclose portions of server memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5424">CVE-2016-5424</a>
-
- <p>Nathan Bossart discovered that special characters in database and
- role names are not properly handled, potentially leading to the
- execution of commands with superuser privileges, when a superuser
- executes pg_dumpall or other routine maintenance operations.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.1.23-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-592.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-593.data b/english/lts/security/2016/dla-593.data
deleted file mode 100644
index 85bae751a3c..00000000000
--- a/english/lts/security/2016/dla-593.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-593-1 nettle</define-tag>
-<define-tag report_date>2016-8-11</define-tag>
-<define-tag secrefs>CVE-2016-6489 Bug#832983</define-tag>
-<define-tag packages>nettle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-593.wml b/english/lts/security/2016/dla-593.wml
deleted file mode 100644
index a678c85ad78..00000000000
--- a/english/lts/security/2016/dla-593.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The cryptographic library nettle had a potential information leak
-problem reported.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6489">CVE-2016-6489</a>
-
- <p>RSA code is vulnerable to cache sharing related attacks.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problems has been fixed in version
-2.4-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your nettle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-593.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-594.data b/english/lts/security/2016/dla-594.data
deleted file mode 100644
index 7a2e0e26e6c..00000000000
--- a/english/lts/security/2016/dla-594.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-594-1 openssh</define-tag>
-<define-tag report_date>2016-8-12</define-tag>
-<define-tag secrefs>CVE-2016-6515 Bug#833823</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-594.wml b/english/lts/security/2016/dla-594.wml
deleted file mode 100644
index 5259d39cd84..00000000000
--- a/english/lts/security/2016/dla-594.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>OpenSSH secure shell client and server had a denial of service
-vulnerability reported.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6515">CVE-2016-6515</a>
-
- <p>The password authentication function in sshd in OpenSSH before 7.3
- does not limit password lengths for password authentication, which
- allows remote attackers to cause a denial of service
- (crypt CPU consumption) via a long string.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problems has been fixed in version
-6.0p1-4+deb7u6.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-594.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-595.data b/english/lts/security/2016/dla-595.data
deleted file mode 100644
index bd5ec982e02..00000000000
--- a/english/lts/security/2016/dla-595.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-595-1 wireshark</define-tag>
-<define-tag report_date>2016-8-15</define-tag>
-<define-tag secrefs>CVE-2016-6504 CVE-2016-6505 CVE-2016-6506 CVE-2016-6507 CVE-2016-6508 CVE-2016-6509 CVE-2016-6510 CVE-2016-6511</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-595.wml b/english/lts/security/2016/dla-595.wml
deleted file mode 100644
index a670da91b4d..00000000000
--- a/english/lts/security/2016/dla-595.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the dissectors for NDS,
-PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result
-in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u3.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-595.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-596.data b/english/lts/security/2016/dla-596.data
deleted file mode 100644
index 898b1239fed..00000000000
--- a/english/lts/security/2016/dla-596.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-596-1 extplorer</define-tag>
-<define-tag report_date>2016-8-15</define-tag>
-<define-tag secrefs>CVE-2016-4313</define-tag>
-<define-tag packages>extplorer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-596.wml b/english/lts/security/2016/dla-596.wml
deleted file mode 100644
index 02dcaa0db69..00000000000
--- a/english/lts/security/2016/dla-596.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an archive traversal exploit in eXtplorer,
-a web-based file manager.</p>
-
-<p>The unzip/extract feature allowed for path traversal as decompressed files
-can be placed outside of the intended target directory if the archive
-content contained "../" characters.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in extplorer version
-2.1.0b6+dfsg.3-4+deb7u4.</p>
-
-<p>We recommend that you upgrade your extplorer packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-596.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-597.data b/english/lts/security/2016/dla-597.data
deleted file mode 100644
index 32b74374da8..00000000000
--- a/english/lts/security/2016/dla-597.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-597-1 libupnp</define-tag>
-<define-tag report_date>2016-8-18</define-tag>
-<define-tag secrefs>CVE-2016-6255 Bug#831857</define-tag>
-<define-tag packages>libupnp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-597.wml b/english/lts/security/2016/dla-597.wml
deleted file mode 100644
index b84aa978297..00000000000
--- a/english/lts/security/2016/dla-597.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been discovered that libupnp's default behaviour allows anyone
-to write to the filesystem of the system running a libupnp-based
-server application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6.17-1.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libupnp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-597.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-598.data b/english/lts/security/2016/dla-598.data
deleted file mode 100644
index ad09faad1fa..00000000000
--- a/english/lts/security/2016/dla-598.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-598-1 suckless-tools</define-tag>
-<define-tag report_date>2016-8-20</define-tag>
-<define-tag secrefs>CVE-2016-6866</define-tag>
-<define-tag packages>suckless-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-598.wml b/english/lts/security/2016/dla-598.wml
deleted file mode 100644
index 5324ef5988c..00000000000
--- a/english/lts/security/2016/dla-598.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the slock screen locking tool would segfault when the
-user's account had been disabled.</p>
-
-<p>slock called crypt(3) and used the return value for strcmp(3) without checking
-to see if the return value of crypt(3) was a NULL pointer. If the hash returned
-by (getspnam()->sp_pwdp) was invalid, crypt(3) would return NULL and set errno
-to EINVAL. This would cause slock to segfault which leaves the machine
-unprotected.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in suckless-tools version
-38-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your suckless-tools packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-598.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-599.data b/english/lts/security/2016/dla-599.data
deleted file mode 100644
index b99559acc31..00000000000
--- a/english/lts/security/2016/dla-599.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-599-1 cracklib2</define-tag>
-<define-tag report_date>2016-8-20</define-tag>
-<define-tag secrefs>CVE-2016-6318 Bug#834502</define-tag>
-<define-tag packages>cracklib2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-599.wml b/english/lts/security/2016/dla-599.wml
deleted file mode 100644
index e4a983b3582..00000000000
--- a/english/lts/security/2016/dla-599.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a stack-based buffer overflow when
-parsing large GECOS fields in cracklib2, a pro-active password checker
-library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in cracklib2 version
-2.8.19-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your cracklib2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-599.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-600.data b/english/lts/security/2016/dla-600.data
deleted file mode 100644
index 54076cd18e4..00000000000
--- a/english/lts/security/2016/dla-600.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-600-1 libgcrypt11</define-tag>
-<define-tag report_date>2016-8-23</define-tag>
-<define-tag secrefs>CVE-2016-6313</define-tag>
-<define-tag packages>libgcrypt11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-600.wml b/english/lts/security/2016/dla-600.wml
deleted file mode 100644
index 5b5d20b311e..00000000000
--- a/english/lts/security/2016/dla-600.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The crypto library libgcrypt11 has a weakness in the random number
-generator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6313">CVE-2016-6313</a>
-
- <p>Felix Dörre and Vladimir Klebanov from the Karlsruhe Institute of
- Technology found a bug in the mixing functions of Libgcrypt's random
- number generator. An attacker who obtains 4640 bits from the RNG can
- trivially predict the next 160 bits of output.</p></li>
-
-</ul>
-
-<p>A first analysis on the impact of this bug in GnuPG shows that existing
-RSA keys are not weakened. For DSA and Elgamal keys it is also unlikely
-that the private key can be predicted from other public information.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.5.0-5+deb7u5.</p>
-
-<p>We recommend that you upgrade your libgcrypt11 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-600.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-601.data b/english/lts/security/2016/dla-601.data
deleted file mode 100644
index 127f82cbdb9..00000000000
--- a/english/lts/security/2016/dla-601.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-601-1 quagga</define-tag>
-<define-tag report_date>2016-8-27</define-tag>
-<define-tag secrefs>CVE-2016-4036 CVE-2016-4049 Bug#835223 Bug#822787</define-tag>
-<define-tag packages>quagga</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-601.wml b/english/lts/security/2016/dla-601.wml
deleted file mode 100644
index bd47b991548..00000000000
--- a/english/lts/security/2016/dla-601.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The quagga package installs world readable sensitive files in /etc/quagga,
-and might be subject to denial of service because of lacking packet size
-checks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4036">CVE-2016-4036</a>
-
- <p>The quagga package before 0.99.23-2.6.1 uses weak permissions for
- /etc/quagga, which allows local users to obtain sensitive information
- by reading files in the directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4049">CVE-2016-4049</a>
-
- <p>The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does
- not perform size checks when dumping data, which might allow remote
- attackers to cause a denial of service (assertion failure and daemon
- crash) via a large BGP packet.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.99.22.4-1+wheezy3.</p>
-
-<p>We recommend that you upgrade your quagga packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-601.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-602.data b/english/lts/security/2016/dla-602.data
deleted file mode 100644
index 43f4cbfbefc..00000000000
--- a/english/lts/security/2016/dla-602.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-602-1 gnupg</define-tag>
-<define-tag report_date>2016-8-29</define-tag>
-<define-tag secrefs>CVE-2016-6313 Bug#834893</define-tag>
-<define-tag packages>gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-602.wml b/english/lts/security/2016/dla-602.wml
deleted file mode 100644
index 3d7047c0f16..00000000000
--- a/english/lts/security/2016/dla-602.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6313">CVE-2016-6313</a>
-
- <p>Felix Doerre and Vladimir Klebanov from the Karlsruhe Institute of
- Technology discovered a flaw in the mixing functions of GnuPG's
- random number generator. An attacker who obtains 4640 bits from the RNG
- can trivially predict the next 160 bits of output.</p>
-
- <p>A first analysis on the impact of this bug for GnuPG shows that
- existing RSA keys are not weakened. For DSA and Elgamal keys it is also
- unlikely that the private key can be predicted from other public
- information.</p></li>
-
-<li>Bypassing GnuPG key checking
-
- <p>Weaknesses have been found in GnuPG signature validation that
- attackers could exploit thanks to especially forged public keys and
- under specific hardware-software conditions. While the underlying
- problem cannot be solved only by software, GnuPG has been
- strengthened, avoiding to rely on keyring signature caches when
- verifying keys. Potential specific attacks are not valid any more
- with the patch of GnuPG</p></li>
-
-<li>Bypassing GnuPG key checking:
-
- <p>Vrije Universiteit Amsterdam and Katholieke Universteit Leuven
- researchers discovered an attack method, known as Flip Feng Shui,
- that concerns flaws in GnuPG. Researchers found that under specific
- hardware-software conditions, attackers could bypass the GnuPG
- signature validation by using forged public keys. While the
- underlying problem cannot be solved only by software, GnuPG has been
- made more robust to avoid relying on keyring signature caches when
- verifying keys.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been addressed in version
-1.4.12-7+deb7u8.</p>
-
-<p>We recommend that you upgrade your gnupg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-602.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-603.data b/english/lts/security/2016/dla-603.data
deleted file mode 100644
index c4f399a16fc..00000000000
--- a/english/lts/security/2016/dla-603.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-603-1 ruby-activesupport-3.2</define-tag>
-<define-tag report_date>2016-8-27</define-tag>
-<define-tag secrefs>CVE-2015-3227</define-tag>
-<define-tag packages>ruby-activesupport-3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-603.wml b/english/lts/security/2016/dla-603.wml
deleted file mode 100644
index ac68d2b8ba2..00000000000
--- a/english/lts/security/2016/dla-603.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The support and utility classes used by the Rails 3.2 framework allow
-remote attackers to cause a denial of service (SystemStackError) via a
-large XML document depth.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.6-6+deb7u2.</p>
-
-<p>Additionally this upload adds 'active_support/security_utils' that will
-be used by ruby-actionpack-3.2 to address <a href="https://security-tracker.debian.org/tracker/CVE-2015-7576">CVE-2015-7576</a>.</p>
-
-<p>We recommend that you upgrade your ruby-activesupport-3.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-603.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-604.data b/english/lts/security/2016/dla-604.data
deleted file mode 100644
index 46f74cf28f0..00000000000
--- a/english/lts/security/2016/dla-604.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-604-1 ruby-actionpack-3.2</define-tag>
-<define-tag report_date>2016-8-28</define-tag>
-<define-tag secrefs>CVE-2015-7576 CVE-2016-0751 CVE-2016-0752 CVE-2016-2097 CVE-2016-2098 CVE-2016-6316</define-tag>
-<define-tag packages>ruby-actionpack-3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-604.wml b/english/lts/security/2016/dla-604.wml
deleted file mode 100644
index 9cded23f049..00000000000
--- a/english/lts/security/2016/dla-604.wml
+++ /dev/null
@@ -1,69 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in ruby-actionpack-3.2, a
-web-flow and rendering framework and part of Rails:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7576">CVE-2015-7576</a>
-
- <p>A flaw was found in the way the Action Controller component compared
- user names and passwords when performing HTTP basic
- authentication. Time taken to compare strings could differ depending
- on input, possibly allowing a remote attacker to determine valid user
- names and passwords using a timing attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0751">CVE-2016-0751</a>
-
- <p>A flaw was found in the way the Action Pack component performed MIME
- type lookups. Since queries were cached in a global cache of MIME
- types, an attacker could use this flaw to grow the cache indefinitely,
- potentially resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0752">CVE-2016-0752</a>
-
- <p>A directory traversal flaw was found in the way the Action View
- component searched for templates for rendering. If an application
- passed untrusted input to the <q>render</q> method, a remote,
- unauthenticated attacker could use this flaw to render unexpected
- files and, possibly, execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2097">CVE-2016-2097</a>
-
- <p>Crafted requests to Action View might result in rendering files from
- arbitrary locations, including files beyond the application's view
- directory. This vulnerability is the result of an incomplete fix of
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-0752">CVE-2016-0752</a>.
- This bug was found by Jyoti Singh and Tobias Kraze
- from Makandra.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2098">CVE-2016-2098</a>
-
- <p>If a web applications does not properly sanitize user inputs, an
- attacker might control the arguments of the render method in a
- controller or a view, resulting in the possibility of executing
- arbitrary ruby code. This bug was found by Tobias Kraze from
- Makandra and joernchen of Phenoelit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6316">CVE-2016-6316</a>
-
- <p>Andrew Carpenter of Critical Juncture discovered a cross-site
- scripting vulnerability affecting Action View. Text declared as <q>HTML
- safe</q> will not have quotes escaped when used as attribute values in
- tag helpers.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.6-6+deb7u3.</p>
-
-<p>We recommend that you upgrade your ruby-actionpack-3.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-604.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-605.data b/english/lts/security/2016/dla-605.data
deleted file mode 100644
index 5ad2e120e6a..00000000000
--- a/english/lts/security/2016/dla-605.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-605-1 eog</define-tag>
-<define-tag report_date>2016-8-28</define-tag>
-<define-tag secrefs>CVE-2016-6855</define-tag>
-<define-tag packages>eog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-605.wml b/english/lts/security/2016/dla-605.wml
deleted file mode 100644
index 0d2c545e74d..00000000000
--- a/english/lts/security/2016/dla-605.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that Eye of GNOME incorrectly handled certain invalid
-UTF-8 strings. If a user were tricked into opening a specially-crafted
-image, a remote attacker could use this issue to cause Eye of GNOME to
-crash, resulting in a denial of service, or possibly execute arbitrary
-code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.4.2-1+build1+deb7u1.</p>
-
-<p>We recommend that you upgrade your eog packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-605.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-606.data b/english/lts/security/2016/dla-606.data
deleted file mode 100644
index 08c7163b7d4..00000000000
--- a/english/lts/security/2016/dla-606.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-606-1 tiff</define-tag>
-<define-tag report_date>2016-8-30</define-tag>
-<define-tag secrefs>CVE-2016-3991 CVE-2016-5314 CVE-2016-5315 CVE-2016-5316 CVE-2016-5317 CVE-2016-5320 CVE-2016-5321 CVE-2016-5322 CVE-2016-5323 CVE-2016-5875</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-606.wml b/english/lts/security/2016/dla-606.wml
deleted file mode 100644
index f10b850a56f..00000000000
--- a/english/lts/security/2016/dla-606.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in the tiff library, potentially
-causing denial of services to applications using it.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u6.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-606.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-607.data b/english/lts/security/2016/dla-607.data
deleted file mode 100644
index a36fb465a77..00000000000
--- a/english/lts/security/2016/dla-607.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-607-1 tryton-server</define-tag>
-<define-tag report_date>2016-8-31</define-tag>
-<define-tag secrefs>CVE-2016-1242</define-tag>
-<define-tag packages>tryton-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-607.wml b/english/lts/security/2016/dla-607.wml
deleted file mode 100644
index e9f0ed59a75..00000000000
--- a/english/lts/security/2016/dla-607.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The file_open syscall did not prevent the use of an up-level reference in a file
-name. A forged Report name could be used to open a file outside the root
-directory of trytond.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.2.4-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your ikiwiki packages. In addition it is also
-recommended that you have liblwpx-paranoidagent-perl installed, which listed in
-the recommends field of ikiwiki.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-607.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-608.data b/english/lts/security/2016/dla-608.data
deleted file mode 100644
index 8b304907b5a..00000000000
--- a/english/lts/security/2016/dla-608.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-608-1 mailman</define-tag>
-<define-tag report_date>2016-9-2</define-tag>
-<define-tag secrefs>CVE-2016-6893 Bug#835970</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-608.wml b/english/lts/security/2016/dla-608.wml
deleted file mode 100644
index f4e045dde8d..00000000000
--- a/english/lts/security/2016/dla-608.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a CSRF vulnerability in mailman, a
-web-based mailing list manager, which could allow an attacker to obtain
-a user's password.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in mailman version
-1:2.1.15-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-608.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-609.data b/english/lts/security/2016/dla-609.data
deleted file mode 100644
index 7f87a9624c2..00000000000
--- a/english/lts/security/2016/dla-609.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-609-1 linux</define-tag>
-<define-tag report_date>2016-9-3</define-tag>
-<define-tag secrefs>CVE-2016-3857 CVE-2016-4470 CVE-2016-5696 CVE-2016-5829 CVE-2016-6136 CVE-2016-6480 CVE-2016-6828 CVE-2016-7118 Bug#827561</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-609.wml b/english/lts/security/2016/dla-609.wml
deleted file mode 100644
index 324b8c9b54d..00000000000
--- a/english/lts/security/2016/dla-609.wml
+++ /dev/null
@@ -1,102 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes the CVEs described below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3857">CVE-2016-3857</a>
-
- <p>Chiachih Wu reported two bugs in the ARM OABI compatibility layer
- that can be used by local users for privilege escalation. The
- OABI compatibility layer is enabled in all kernel flavours for
- armel and armhf.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4470">CVE-2016-4470</a>
-
- <p>Wade Mealing of the Red Hat Product Security Team reported that
- in some error cases the KEYS subsystem will dereference an
- uninitialised pointer. A local user can use the keyctl()
- system call for denial of service (crash) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5696">CVE-2016-5696</a>
-
- <p>Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, and Srikanth V.
- Krishnamurthy of the University of California, Riverside; and Lisa
- M. Marvel of the United States Army Research Laboratory discovered
- that Linux's implementation of the TCP Challenge ACK feature
- results in a side channel that can be used to find TCP connections
- between specific IP addresses, and to inject messages into those
- connections.</p>
-
- <p>Where a service is made available through TCP, this may allow
- remote attackers to impersonate another connected user to the
- server or to impersonate the server to another connected user. In
- case the service uses a protocol with message authentication
- (e.g. TLS or SSH), this vulnerability only allows denial of
- service (connection failure). An attack takes tens of seconds, so
- short-lived TCP connections are also unlikely to be vulnerable.</p>
-
- <p>This may be mitigated by increasing the rate limit for TCP
- Challenge ACKs so that it is never exceeded:
- sysctl net.ipv4.tcp_challenge_ack_limit=1000000000</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5829">CVE-2016-5829</a>
-
- <p>Several heap-based buffer overflow vulnerabilities were found in
- the hiddev driver, allowing a local user with access to a HID
- device to cause a denial of service or potentially escalate their
- privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6136">CVE-2016-6136</a>
-
- <p>Pengfei Wang discovered that the audit subsystem has a
- 'double-fetch' or <q>TOCTTOU</q> bug in its handling of special
- characters in the name of an executable. Where audit logging of
- execve() is enabled, this allows a local user to generate
- misleading log messages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6480">CVE-2016-6480</a>
-
- <p>Pengfei Wang discovered that the aacraid driver for Adaptec RAID
- controllers has a 'double-fetch' or <q>TOCTTOU</q> bug in its
- validation of <q>FIB</q> messages passed through the ioctl() system
- call. This has no practical security impact in current Debian
- releases.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6828">CVE-2016-6828</a>
-
- <p>Marco Grassi reported a 'use-after-free' bug in the TCP
- implementation, which can be triggered by local users. The
- security impact is unclear, but might include denial of service or
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7118">CVE-2016-7118</a>
-
- <p>Marcin Szewczyk reported that calling fcntl() on a file descriptor
- for a directory on an aufs filesystem would result in am <q>oops</q>.
- This allows local users to cause a denial of service. This is a
- Debian-specific regression introduced in version 3.2.81-1.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.81-2. This version also fixes a build failure (bug #827561) for
-custom kernels with CONFIG_MODULES disabled, a regression in version
-3.2.81-1. It also updates the PREEMPT_RT featureset to version
-3.2.81-rt117.</p>
-
-<p>For Debian 8 <q>Jessie</q>, <a href="https://security-tracker.debian.org/tracker/CVE-2016-3857">CVE-2016-3857</a> has no impact; <a href="https://security-tracker.debian.org/tracker/CVE-2016-4470">CVE-2016-4470</a> and
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-5829">CVE-2016-5829</a> were fixed in linux version 3.16.7-ckt25-2+deb8u3 or
-earlier; and the remaining issues are fixed in version 3.16.36-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-609.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-610.data b/english/lts/security/2016/dla-610.data
deleted file mode 100644
index adde482e734..00000000000
--- a/english/lts/security/2016/dla-610.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-610-1 tiff3</define-tag>
-<define-tag report_date>2016-9-4</define-tag>
-<define-tag secrefs>CVE-2010-2596 CVE-2013-1961 CVE-2014-8128 CVE-2014-8129 CVE-2014-9655 CVE-2015-1547 CVE-2015-8665 CVE-2015-8683 CVE-2016-3186 CVE-2016-3623 CVE-2016-3945 CVE-2016-3990 CVE-2016-3991 CVE-2016-5314 CVE-2016-5315 CVE-2016-5316 CVE-2016-5317 CVE-2016-5320 CVE-2016-5321 CVE-2016-5322 CVE-2016-5323 CVE-2016-5875 CVE-2016-6223</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-610.wml b/english/lts/security/2016/dla-610.wml
deleted file mode 100644
index f10c39b5395..00000000000
--- a/english/lts/security/2016/dla-610.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities were discovered in tiff3, a library
-providing support for the Tag Image File Format (TIFF). An attacker
-could take advantage of these flaws to cause a denial-of-service
-against an application using the libtiff4 or libtiffxx0c2 library
-(application crash), or potentially execute arbitrary code with the
-privileges of the user running the application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u1.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-610.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-611.data b/english/lts/security/2016/dla-611.data
deleted file mode 100644
index 528997ad66b..00000000000
--- a/english/lts/security/2016/dla-611.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-611-1 jsch</define-tag>
-<define-tag report_date>2016-9-5</define-tag>
-<define-tag secrefs>CVE-2016-5725</define-tag>
-<define-tag packages>jsch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-611.wml b/english/lts/security/2016/dla-611.wml
deleted file mode 100644
index 240f11dd219..00000000000
--- a/english/lts/security/2016/dla-611.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a path traversal vulnerability in jsch, a
-pure Java implementation of the SSH2 protocol.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in jsch version
-0.1.42-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your jsch packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-611.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-612.data b/english/lts/security/2016/dla-612.data
deleted file mode 100644
index e81100e0469..00000000000
--- a/english/lts/security/2016/dla-612.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-612-1 libtomcrypt</define-tag>
-<define-tag report_date>2016-9-6</define-tag>
-<define-tag secrefs>CVE-2016-6129</define-tag>
-<define-tag packages>libtomcrypt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-612.wml b/english/lts/security/2016/dla-612.wml
deleted file mode 100644
index 9db0ea720a0..00000000000
--- a/english/lts/security/2016/dla-612.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the implementation of RSA signature verification
-in libtomcrypt is vulnerable to the Bleichenbacher signature attack.</p>
-
-<p>If an RSA key with exponent 3 is used it may be possible to forge a
-PKCS#1 v1.5 signature signed by that key.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.17-3.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libtomcrypt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-612.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-613.data b/english/lts/security/2016/dla-613.data
deleted file mode 100644
index 9823cdf7bb9..00000000000
--- a/english/lts/security/2016/dla-613.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-613-1 roundcube</define-tag>
-<define-tag report_date>2016-9-8</define-tag>
-<define-tag secrefs>CVE-2014-9587 CVE-2015-1433 CVE-2016-4069 Bug#822333 Bug#775576 Bug#776700</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-613.wml b/english/lts/security/2016/dla-613.wml
deleted file mode 100644
index 8f2cbc27aed..00000000000
--- a/english/lts/security/2016/dla-613.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple CSRF and XSS issues allow remote attackers to hijack the
-authentication and execute roundcube operations without the consent of the
-user. In some cases, this could result in data loss or data theft.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9587">CVE-2014-9587</a>
-
- <p>Multiple cross-site request forgery (CSRF) vulnerabilities in
- allow remote attackers to hijack the authentication of unspecified
- victims via unknown vectors, related to (1) address book operations or
- the (2) ACL or (3) Managesieve plugins.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1433">CVE-2015-1433</a>
-
- <p>Incorrect quotation logic during sanitization of style HTML
- attribute allows remote attackers to execute arbitrary
- javascript code on the user's browser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4069">CVE-2016-4069</a>
-
- <p>Cross-site request forgery (CSRF) vulnerability allows remote
- attackers to hijack the authentication of users for requests that
- download attachments and cause a denial of service (disk consumption)
- via unspecified vectors.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7.2-9+deb7u4.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-613.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-614.data b/english/lts/security/2016/dla-614.data
deleted file mode 100644
index 379cce663e2..00000000000
--- a/english/lts/security/2016/dla-614.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-614-1 xen</define-tag>
-<define-tag report_date>2016-9-9</define-tag>
-<define-tag secrefs>CVE-2016-7092 CVE-2016-7094</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-614.wml b/english/lts/security/2016/dla-614.wml
deleted file mode 100644
index e2b38848f10..00000000000
--- a/english/lts/security/2016/dla-614.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7092">CVE-2016-7092</a> (XSA-185)
-
- <p>Jeremie Boutoille of Quarkslab and Shangcong Luan of Alibaba
- discovered a flaw in the handling of L3 pagetable entries, allowing
- a malicious 32-bit PV guest administrator can escalate their
- privilege to that of the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7094">CVE-2016-7094</a> (XSA-187)
-
- <p>x86 HVM guests running with shadow paging use a subset of the x86
- emulator to handle the guest writing to its own pagetables. Andrew
- Cooper of Citrix discovered that there are situations a guest can
- provoke which result in exceeding the space allocated for internal
- state. A malicious HVM guest administrator can cause Xen to fail a
- bug check, causing a denial of service to the host.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-2. For Debian 8 <q>Jessie</q>, these problems have been fixed in
-version 4.4.1-9+deb8u7.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-614.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-615.data b/english/lts/security/2016/dla-615.data
deleted file mode 100644
index 1d897dedeb1..00000000000
--- a/english/lts/security/2016/dla-615.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-615-1 icu</define-tag>
-<define-tag report_date>2016-9-8</define-tag>
-<define-tag secrefs>CVE-2016-6293</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-615.wml b/english/lts/security/2016/dla-615.wml
deleted file mode 100644
index e8e2fa07b3c..00000000000
--- a/english/lts/security/2016/dla-615.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This update fixes a buffer overflow in the uloc_acceptLanguageFromHTTP
-function in ICU, the International Components for Unicode C and C++
-library, in Debian Wheezy</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.8.1.1-12+deb7u5.</p>
-
-<p>We recommend that you upgrade your icu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-615.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-616.data b/english/lts/security/2016/dla-616.data
deleted file mode 100644
index 91de1111efc..00000000000
--- a/english/lts/security/2016/dla-616.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-616-1 curl</define-tag>
-<define-tag report_date>2016-9-9</define-tag>
-<define-tag secrefs>CVE-2016-7141 Bug#836918</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-616.wml b/english/lts/security/2016/dla-616.wml
deleted file mode 100644
index 48bcc3062dc..00000000000
--- a/english/lts/security/2016/dla-616.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libcurl built on top of NSS (Network Security
-Services) incorrectly re-used client certificates if a certificate from
-file was used for one TLS connection but no certificate set for a
-subsequent TLS connection.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-7.26.0-1+wheezy15.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-616.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-617.data b/english/lts/security/2016/dla-617.data
deleted file mode 100644
index 30f0201d5c0..00000000000
--- a/english/lts/security/2016/dla-617.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-617-1 libarchive</define-tag>
-<define-tag report_date>2016-9-10</define-tag>
-<define-tag secrefs>CVE-2015-8915 CVE-2016-7166 Bug#784213</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-617.wml b/english/lts/security/2016/dla-617.wml
deleted file mode 100644
index 82d2664af1e..00000000000
--- a/english/lts/security/2016/dla-617.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities have been discovered in libarchive,
-a multi-format archive and compression library. An attacker could
-take advantage of these flaws to cause an out of bounds read or a
-denial of service against an application using the libarchive12
-library using a carefully crafted input file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8915">CVE-2015-8915</a>
-
- <p>Paris Zoumpouloglou of Project Zero labs discovered a flaw in
- libarchive bsdtar. Using a crafted file bsdtar can perform an
- out-of-bounds memory read which will lead to a SEGFAULT.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7166">CVE-2016-7166</a>
-
- <p>Alexander Cherepanov discovered a flaw in libarchive compression
- handling. Using a crafted gzip file, one can get libarchive to
- invoke an infinite chain of gzip compressors until all the memory
- has been exhausted or another resource limit kicks in.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.4-3+wheezy3.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-617.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-618.data b/english/lts/security/2016/dla-618.data
deleted file mode 100644
index 09a8ad0265b..00000000000
--- a/english/lts/security/2016/dla-618.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-618-1 qemu</define-tag>
-<define-tag report_date>2016-9-11</define-tag>
-<define-tag secrefs>CVE-2016-7116 Bug#836502</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-618.wml b/english/lts/security/2016/dla-618.wml
deleted file mode 100644
index f71f3648085..00000000000
--- a/english/lts/security/2016/dla-618.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9
-File System(9pfs) support, is vulnerable to a directory/path traversal issue.
-It could occur while creating or accessing files on a shared host directory.</p>
-
-<p>A privileged user inside guest could use this flaw to access undue files on the
-host.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u15.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-618.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-619.data b/english/lts/security/2016/dla-619.data
deleted file mode 100644
index c1e0f333a92..00000000000
--- a/english/lts/security/2016/dla-619.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-619-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-9-11</define-tag>
-<define-tag secrefs>CVE-2016-7116</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-619.wml b/english/lts/security/2016/dla-619.wml
deleted file mode 100644
index 816d05d1a0a..00000000000
--- a/english/lts/security/2016/dla-619.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>qemu-kvm built with the VirtFS, host directory sharing via Plan 9 File System
-(9pfs) support, is vulnerable to a directory/path traversal issue. It could
-occur while creating or accessing files on a shared host directory.</p>
-
-<p>A privileged user inside guest could use this flaw to access undue files on the
-host.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u15.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-619.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-620.data b/english/lts/security/2016/dla-620.data
deleted file mode 100644
index 0b28ac66f01..00000000000
--- a/english/lts/security/2016/dla-620.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-620-1 libphp-adodb</define-tag>
-<define-tag report_date>2016-9-13</define-tag>
-<define-tag secrefs>Bug##837211 Bug##837418</define-tag>
-<define-tag packages>libphp-adodb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-620.wml b/english/lts/security/2016/dla-620.wml
deleted file mode 100644
index 4630084c98b..00000000000
--- a/english/lts/security/2016/dla-620.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a SQL injection vulnerability in libphp-adodb,
-PHP database abstraction layer library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libphp-adodb version
-5.15-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libphp-adodb packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-620.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-621.data b/english/lts/security/2016/dla-621.data
deleted file mode 100644
index ef67e7a40c3..00000000000
--- a/english/lts/security/2016/dla-621.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-621-1 autotrace</define-tag>
-<define-tag report_date>2016-9-15</define-tag>
-<define-tag secrefs>CVE-2016-7392</define-tag>
-<define-tag packages>autotrace</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-621.wml b/english/lts/security/2016/dla-621.wml
deleted file mode 100644
index 5a4b6090fb6..00000000000
--- a/english/lts/security/2016/dla-621.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Autotrace is a program for converting bitmaps to vector graphics. It had a bug
-that caused an out-of-bounds write. This was caused by not allocating
-sufficient memory to store the terminating NULL pointer in an array.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem have been fixed in version
-0.31.1-16+deb7u1.</p>
-
-<p>We recommend that you upgrade your autotrace packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-621.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-622.data b/english/lts/security/2016/dla-622.data
deleted file mode 100644
index 4131b0823e3..00000000000
--- a/english/lts/security/2016/dla-622.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-622-1 tomcat6</define-tag>
-<define-tag report_date>2016-9-15</define-tag>
-<define-tag secrefs>CVE-2016-1240</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-622.wml b/english/lts/security/2016/dla-622.wml
deleted file mode 100644
index a4b6005269c..00000000000
--- a/english/lts/security/2016/dla-622.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski from legalhackers.com discovered that Debian's version
-of Tomcat 6 was vulnerable to a local privilege escalation. Local
-attackers who have gained access to the server in the context of the
-tomcat6 user through a vulnerability in a web application were able to
-replace the file with a symlink to an arbitrary file.</p>
-
-<p>The full advisory can be found at</p>
-
-<p><url "http://legalhackers.com/advisories/Tomcat-Debian-based-Root-Privilege-Escalation-Exploit.txt"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.0.45+dfsg-1~deb7u2.</p>
-
-<p>We recommend that you upgrade your tomcat6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-622.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-623.data b/english/lts/security/2016/dla-623.data
deleted file mode 100644
index eaa6319318d..00000000000
--- a/english/lts/security/2016/dla-623.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-623-1 tomcat7</define-tag>
-<define-tag report_date>2016-9-15</define-tag>
-<define-tag secrefs>CVE-2016-1240</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-623.wml b/english/lts/security/2016/dla-623.wml
deleted file mode 100644
index 5da5b5ee5e2..00000000000
--- a/english/lts/security/2016/dla-623.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Dawid Golunski from legalhackers.com discovered that Debian's version
-of Tomcat 7 was vulnerable to a local privilege escalation. Local
-attackers who have gained access to the server in the context of the
-tomcat7 user through a vulnerability in a web application were able to
-replace the file with a symlink to an arbitrary file.</p>
-
-<p>The full advisory can be found at</p>
-
-<p><url "http://legalhackers.com/advisories/Tomcat-Debian-based-Root-Privilege-Escalation-Exploit.txt"></p>
-
-<p>In addition this security update also fixes Debian bug #821391. File
-ownership in /etc/tomcat7 will no longer be unconditionally overridden
-on upgrade. As another precaution the file permissions of Debian
-specific configuration files in /etc/tomcat7 were changed to 640 to
-disallow world readable access.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u6.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-623.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-624.data b/english/lts/security/2016/dla-624.data
deleted file mode 100644
index 6f6b0a0ef6b..00000000000
--- a/english/lts/security/2016/dla-624.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-624-1 mysql-5.5</define-tag>
-<define-tag report_date>2016-9-16</define-tag>
-<define-tag secrefs>CVE-2016-6662</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-624.wml b/english/lts/security/2016/dla-624.wml
deleted file mode 100644
index ddd965482be..00000000000
--- a/english/lts/security/2016/dla-624.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski discovered that the mysqld_safe wrapper provided by the
-MySQL database server insufficiently restricted the load path for custom
-malloc implementations, which could result in privilege escalation.</p>
-
-<p>The vulnerability was addressed by upgrading MySQL to the new upstream
-version 5.5.52, which includes additional changes, such as performance
-improvements, bug fixes, new features, and possibly incompatible
-changes. Please see the MySQL 5.5 Release Notes for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html"></li>
-<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html">https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.52-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-624.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-625.data b/english/lts/security/2016/dla-625.data
deleted file mode 100644
index f2e8faaa326..00000000000
--- a/english/lts/security/2016/dla-625.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-625-1 curl</define-tag>
-<define-tag report_date>2016-9-17</define-tag>
-<define-tag secrefs>CVE-2016-7167 Bug#837945</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-625.wml b/english/lts/security/2016/dla-625.wml
deleted file mode 100644
index 4e2d778cef2..00000000000
--- a/english/lts/security/2016/dla-625.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the four libcurl functions curl_escape(),
-curl_easy_escape(), curl_unescape and curl_easy_unescape accepted
-negative string length inputs.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.26.0-1+wheezy16.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-625.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-626.data b/english/lts/security/2016/dla-626.data
deleted file mode 100644
index 21f0abd0c05..00000000000
--- a/english/lts/security/2016/dla-626.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-626-1 phpmyadmin</define-tag>
-<define-tag report_date>2016-9-17</define-tag>
-<define-tag secrefs>CVE-2016-6606 CVE-2016-6607 CVE-2016-6609 CVE-2016-6611 CVE-2016-6612 CVE-2016-6613 CVE-2016-6614 CVE-2016-6620 CVE-2016-6622 CVE-2016-6623 CVE-2016-6624 CVE-2016-6630 CVE-2016-6631</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-626.wml b/english/lts/security/2016/dla-626.wml
deleted file mode 100644
index 306144bdea3..00000000000
--- a/english/lts/security/2016/dla-626.wml
+++ /dev/null
@@ -1,115 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Phpmyadmin, a web administration tool for MySQL, had several
-vulnerabilities reported.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6606">CVE-2016-6606</a>
-
- <p>A pair of vulnerabilities were found affecting the way cookies are
- stored.</p>
-
- <p>The decryption of the username/password is vulnerable to a padding
- oracle attack. The can allow an attacker who has access to a user's
- browser cookie file to decrypt the username and password.</p>
-
- <p>A vulnerability was found where the same initialization vector
- is used to hash the username and password stored in the phpMyAdmin
- cookie. If a user has the same password as their username, an
- attacker who examines the browser cookie can see that they are the
- same — but the attacker can not directly decode these values from
- the cookie as it is still hashed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6607">CVE-2016-6607</a>
-
- <p>Cross site scripting vulnerability in the replication feature</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6609">CVE-2016-6609</a>
-
- <p>A specially crafted database name could be used to run arbitrary PHP
- commands through the array export feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6611">CVE-2016-6611</a>
-
- <p>A specially crafted database and/or table name can be used to trigger
- an SQL injection attack through the SQL export functionality.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6612">CVE-2016-6612</a>
-
- <p>A user can exploit the LOAD LOCAL INFILE functionality to expose
- files on the server to the database system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6613">CVE-2016-6613</a>
-
- <p>A user can specially craft a symlink on disk, to a file which
- phpMyAdmin is permitted to read but the user is not, which
- phpMyAdmin will then expose to the user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6614">CVE-2016-6614</a>
-
- <p>A vulnerability was reported with the %u username replacement
- functionality of the SaveDir and UploadDir features. When the
- username substitution is configured, a specially-crafted user name
- can be used to circumvent restrictions to traverse the file system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6620">CVE-2016-6620</a>
-
- <p>A vulnerability was reported where some data is passed to the PHP
- unserialize() function without verification that it's valid
- serialized data. Due to how the PHP function operates,
- unserialization can result in code being loaded and executed due to
- object instantiation and autoloading, and a malicious user may be
- able to exploit this.
- Therefore, a malicious user may be able to manipulate the stored
- data in a way to exploit this weakness.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6622">CVE-2016-6622</a>
-
- <p>An unauthenticated user is able to execute a denial-of-service
- attack by forcing persistent connections when phpMyAdmin is running
- with $cfg['AllowArbitraryServer']=true;.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6623">CVE-2016-6623</a>
-
- <p>A malicious authorized user can cause a denial-of-service attack
- on a server by passing large values to a loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6624">CVE-2016-6624</a>
-
- <p>A vulnerability was discovered where, under certain circumstances,
- it may be possible to circumvent the phpMyAdmin IP-based
- authentication rules.
- When phpMyAdmin is used with IPv6 in a proxy server environment,
- and the proxy server is in the allowed range but the attacking
- computer is not allowed, this vulnerability can allow the attacking
- computer to connect despite the IP rules.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6630">CVE-2016-6630</a>
-
- <p>An authenticated user can trigger a denial-of-service attack by
- entering a very long password at the change password dialog.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6631">CVE-2016-6631</a>
-
- <p>A vulnerability was discovered where a user can execute a remote
- code execution attack against a server when phpMyAdmin is being
- run as a CGI application. Under certain server configurations,
- a user can pass a query string which is executed as a
- command-line argument by shell scripts.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.4.11.1-2+deb7u6.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-626.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-627.data b/english/lts/security/2016/dla-627.data
deleted file mode 100644
index 18ac0fb09b0..00000000000
--- a/english/lts/security/2016/dla-627.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-627-1 pdns</define-tag>
-<define-tag report_date>2016-9-18</define-tag>
-<define-tag secrefs>CVE-2016-5426 CVE-2016-5427 CVE-2016-6172 Bug#830808</define-tag>
-<define-tag packages>pdns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-627.wml b/english/lts/security/2016/dla-627.wml
deleted file mode 100644
index 776cd62dd69..00000000000
--- a/english/lts/security/2016/dla-627.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in pdns, an authoritative
-DNS server. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5426">CVE-2016-5426</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5427">CVE-2016-5427</a>
-
- <p>Florian Heinz and Martin Kluge reported that the PowerDNS
- Authoritative Server accepts queries with a qname's length larger
- than 255 bytes and does not properly handle dot inside labels. A
- remote, unauthenticated attacker can take advantage of these flaws
- to cause abnormal load on the PowerDNS backend by sending specially
- crafted DNS queries, potentially leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6172">CVE-2016-6172</a>
-
- <p>It was reported that a malicious primary DNS server can crash a
- secondary PowerDNS server due to improper restriction of zone size
- limits. This update adds a feature to limit AXFR sizes in response
- to this flaw.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1-4.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your pdns packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-627.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-628.data b/english/lts/security/2016/dla-628.data
deleted file mode 100644
index a6d38e091d7..00000000000
--- a/english/lts/security/2016/dla-628.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-628-1 php5</define-tag>
-<define-tag report_date>2016-9-18</define-tag>
-<define-tag secrefs>CVE-2016-4473 CVE-2016-4538 CVE-2016-5114 CVE-2016-5399 CVE-2016-5768 CVE-2016-5769 CVE-2016-5770 CVE-2016-5771 CVE-2016-5772 CVE-2016-5773 CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6292 CVE-2016-6294 CVE-2016-6295 CVE-2016-6296 CVE-2016-6297</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-628.wml b/english/lts/security/2016/dla-628.wml
deleted file mode 100644
index bee11bfa899..00000000000
--- a/english/lts/security/2016/dla-628.wml
+++ /dev/null
@@ -1,146 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4473">CVE-2016-4473</a>
- <p>An invalid free may occur under certain conditions when processing
- phar-compatible archives.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4538">CVE-2016-4538</a>
- <p>The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35,
- 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer
- for the scale argument, which allows remote attackers to cause a
- denial of service or possibly have unspecified other impact via a
- crafted call.
- (already fixed with patch for <a href="https://security-tracker.debian.org/tracker/CVE-2016-4537">CVE-2016-4537</a>)</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5114">CVE-2016-5114</a>
- <p>sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17,
- and 7.x before 7.0.2 misinterprets the semantics of the snprintf
- return value, which allows attackers to obtain sensitive information
- from process memory or cause a denial of service (out-of-bounds read
- and buffer overflow) via a long string, as demonstrated by a long URI
- in a configuration with custom REQUEST_URI logging.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5399">CVE-2016-5399</a>
- <p>Improper error handling in bzread()</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5768">CVE-2016-5768</a>
- <p>Double free vulnerability in the _php_mb_regex_ereg_replace_exec
- function in php_mbregex.c in the mbstring extension in PHP before
- 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote
- attackers to execute arbitrary code or cause a denial of service
- (application crash) by leveraging a callback exception.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5769">CVE-2016-5769</a>
- <p>Multiple integer overflows in mcrypt.c in the mcrypt extension in
- PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow
- remote attackers to cause a denial of service (heap-based buffer
- overflow and application crash) or possibly have unspecified other
- impact via a crafted length value, related to the
- (1) mcrypt_generic and (2) mdecrypt_generic functions.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5770">CVE-2016-5770</a>
- <p>Integer overflow in the SplFileObject::fread function in
- spl_directory.c in the SPL extension in PHP before 5.5.37 and
- 5.6.x before 5.6.23 allows remote attackers to cause a denial
- of service or possibly have unspecified other impact via a
- large integer argument, a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2016-5096">CVE-2016-5096</a>.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5771">CVE-2016-5771</a>
- <p>spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x
- before 5.6.23 improperly interacts with the unserialize
- implementation and garbage collection, which allows remote
- attackers to execute arbitrary code or cause a denial of service
- (use-after-free and application crash) via crafted serialized data.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5772">CVE-2016-5772</a>
- <p>Double free vulnerability in the php_wddx_process_data function in
- wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before
- 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a
- denial of service (application crash) or possibly execute arbitrary
- code via crafted XML data that is mishandled in a wddx_deserialize
- call.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5773">CVE-2016-5773</a>
- <p>php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before
- 5.6.23, and 7.x before 7.0.8 improperly interacts with the
- unserialize implementation and garbage collection, which allows
- remote attackers to execute arbitrary code or cause a denial of
- service (use-after-free and application crash) via crafted
- serialized data containing a ZipArchive object.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6289">CVE-2016-6289</a>
- <p>Integer overflow in the virtual_file_ex function in
- TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24,
- and 7.x before 7.0.9 allows remote attackers to cause a denial of
- service (stack-based buffer overflow) or possibly have unspecified
- other impact via a crafted extract operation on a ZIP archive.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6290">CVE-2016-6290</a>
- <p>ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24,
- and 7.x before 7.0.9 does not properly maintain a certain hash
- data structure, which allows remote attackers to cause a denial
- of service (use-after-free) or possibly have unspecified other
- impact via vectors related to session deserialization.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6291">CVE-2016-6291</a>
- <p>The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in
- PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows
- remote attackers to cause a denial of service (out-of-bounds array
- access and memory corruption), obtain sensitive information from
- process memory, or possibly have unspecified other impact via a
- crafted JPEG image.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6292">CVE-2016-6292</a>
- <p>The exif_process_user_comment function in ext/exif/exif.c in PHP
- before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows
- remote attackers to cause a denial of service (NULL pointer
- dereference and application crash) via a crafted JPEG image.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6294">CVE-2016-6294</a>
- <p>The locale_accept_from_http function in
- ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before
- 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to
- the ICU uloc_acceptLanguageFromHTTP function, which allows remote
- attackers to cause a denial of service (out-of-bounds read) or
- possibly have unspecified other impact via a call with a long argument.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6295">CVE-2016-6295</a>
- <p>ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x
- before 7.0.9 improperly interacts with the unserialize implementation
- and garbage collection, which allows remote attackers to cause a
- denial of service (use-after-free and application crash) or possibly
- have unspecified other impact via crafted serialized data, a related
- issue to <a href="https://security-tracker.debian.org/tracker/CVE-2016-5773">CVE-2016-5773</a>.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6296">CVE-2016-6296</a>
- <p>Integer signedness error in the simplestring_addn function in
- simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before
- 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote
- attackers to cause a denial of service (heap-based buffer overflow)
- or possibly have unspecified other impact via a long first argument
- to the PHP xmlrpc_encode_request function.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6297">CVE-2016-6297</a>
- <p>Integer overflow in the php_stream_zip_opener function in
- ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and
- 7.x before 7.0.9 allows remote attackers to cause a denial of
- service (stack-based buffer overflow) or possibly have unspecified
- other impact via a crafted zip:// URL.</p></li>
-
- <li>BUG-70436
- <p>Use After Free Vulnerability in unserialize()</p></li>
-
- <li>BUG-72681
- <p>PHP Session Data Injection Vulnerability, consume data even if we're
- not storing them.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in php5 version 5.4.45-0+deb7u5</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-628.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-629.data b/english/lts/security/2016/dla-629.data
deleted file mode 100644
index 6c52b64227e..00000000000
--- a/english/lts/security/2016/dla-629.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-629-1 jackrabbit</define-tag>
-<define-tag report_date>2016-9-18</define-tag>
-<define-tag secrefs>CVE-2016-6801 Bug#838204</define-tag>
-<define-tag packages>jackrabbit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-629.wml b/english/lts/security/2016/dla-629.wml
deleted file mode 100644
index 280507b6081..00000000000
--- a/english/lts/security/2016/dla-629.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Lukas Reschke discovered that Apache Jackrabbit, a content repository
-implementation for Java, was vulnerable to Cross-Site-Request-Forgery
-in Jackrabbit's webdav module.</p>
-
-<p>The CSRF content-type check for POST requests did not handle missing
-Content-Type header fields, nor variations in field values with
-respect to upper/lower case or optional parameters. This could be
-exploited to create a resource via CSRF.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.6-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your jackrabbit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-629.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-630.data b/english/lts/security/2016/dla-630.data
deleted file mode 100644
index 76ce5044c37..00000000000
--- a/english/lts/security/2016/dla-630.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-630-1 zookeeper</define-tag>
-<define-tag report_date>2016-9-18</define-tag>
-<define-tag secrefs>CVE-2016-5017</define-tag>
-<define-tag packages>zookeeper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-630.wml b/english/lts/security/2016/dla-630.wml
deleted file mode 100644
index 8a73ecc9ae0..00000000000
--- a/english/lts/security/2016/dla-630.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Lyon Yang discovered that the C client shells cli_st and cli_mt of
-Apache Zookeeper, a high-performance coordination service for
-distributed applications, were affected by a buffer overflow
-vulnerability associated with parsing of the input command when using
-the "cmd:" batch mode syntax. If the command string exceeds 1024
-characters a buffer overflow will occur.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.3.5+dfsg1-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your zookeeper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-630.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-631.data b/english/lts/security/2016/dla-631.data
deleted file mode 100644
index 1f9c27d6e03..00000000000
--- a/english/lts/security/2016/dla-631.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-631-1 unadf</define-tag>
-<define-tag report_date>2016-9-21</define-tag>
-<define-tag secrefs>CVE-2016-1243 CVE-2016-1244 Bug##838248</define-tag>
-<define-tag packages>unadf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-631.wml b/english/lts/security/2016/dla-631.wml
deleted file mode 100644
index a405d808fd1..00000000000
--- a/english/lts/security/2016/dla-631.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities in unadf, a tool to
-extract files from an Amiga Disk File dump (.adf):</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1243">CVE-2016-1243</a>
-
- <p>stack buffer overflow caused by blindly trusting on
- pathname lengths of archived files.</p>
-
- <p>Stack allocated buffer sysbuf was filled with sprintf() without any
- bounds checking in extracTree() function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1244">CVE-2016-1244</a>
-
- <p>execution of unsanitized input</p>
-
- <p>Shell command used for creating directory paths was constructed by
- concatenating names of archived files to the end of the command
- string.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in unadf version
-0.7.11a-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your unadf packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-631.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-632.data b/english/lts/security/2016/dla-632.data
deleted file mode 100644
index 22e1eb9180b..00000000000
--- a/english/lts/security/2016/dla-632.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-632-1 wireshark</define-tag>
-<define-tag report_date>2016-9-21</define-tag>
-<define-tag secrefs>CVE-2016-7176 CVE-2016-7177 CVE-2016-7178 CVE-2016-7179 CVE-2016-7180</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-632.wml b/english/lts/security/2016/dla-632.wml
deleted file mode 100644
index 55e1c01479f..00000000000
--- a/english/lts/security/2016/dla-632.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the dissectors for H.225,
-Catapult DCT2000, UMTS FP and IPMI, which could result in denial of
-service or the execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u4.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-632.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-633.data b/english/lts/security/2016/dla-633.data
deleted file mode 100644
index aea657e8a3a..00000000000
--- a/english/lts/security/2016/dla-633.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-633-1 wordpress</define-tag>
-<define-tag report_date>2016-9-22</define-tag>
-<define-tag secrefs>CVE-2015-8834 CVE-2016-4029 CVE-2016-5836 CVE-2016-6634 CVE-2016-6635 CVE-2016-7168 CVE-2016-7169 CVE-2015-3440</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-633.wml b/english/lts/security/2016/dla-633.wml
deleted file mode 100644
index a62e40fde21..00000000000
--- a/english/lts/security/2016/dla-633.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8834">CVE-2015-8834</a>
-
- <p>Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in
- WordPress before 4.2.2 allows remote attackers to inject arbitrary
- web script or HTML via a long comment that is improperly stored
- because of limitations on the MySQL TEXT data type.
- NOTE: this vulnerability exists because of an incomplete fix for
- <a href="https://security-tracker.debian.org/tracker/CVE-2015-3440">CVE-2015-3440</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4029">CVE-2016-4029</a>
-
- <p>WordPress before 4.5 does not consider octal and hexadecimal IP
- address formats when determining an intranet address, which allows
- remote attackers to bypass an intended SSRF protection mechanism
- via a crafted address.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5836">CVE-2016-5836</a>
-
- <p>The oEmbed protocol implementation in WordPress before 4.5.3 allows
- remote attackers to cause a denial of service via unspecified
- vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6634">CVE-2016-6634</a>
-
- <p>Cross-site scripting (XSS) vulnerability in the network settings
- page in WordPress before 4.5 allows remote attackers to inject
- arbitrary web script or HTML via unspecified vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6635">CVE-2016-6635</a>
-
- <p>Cross-site request forgery (CSRF) vulnerability in the
- wp_ajax_wp_compression_test function in wp-admin/includes/ajaxactions.php
- in WordPress before 4.5 allows remote attackers to
- hijack the authentication of administrators for requests that
- change the script compression option.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7168">CVE-2016-7168</a>
-
- <p>Fix a cross-site scripting vulnerability via image filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7169">CVE-2016-7169</a>
-
- <p>Fix a path traversal vulnerability in the upgrade package uploader.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u12.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-633.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-634.data b/english/lts/security/2016/dla-634.data
deleted file mode 100644
index 90c406949a0..00000000000
--- a/english/lts/security/2016/dla-634.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-634-1 dropbear</define-tag>
-<define-tag report_date>2016-9-23</define-tag>
-<define-tag secrefs>CVE-2016-7406 CVE-2016-7407</define-tag>
-<define-tag packages>dropbear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-634.wml b/english/lts/security/2016/dla-634.wml
deleted file mode 100644
index 501d71eff9e..00000000000
--- a/english/lts/security/2016/dla-634.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two issues in dropbear, a lightweight SSH2
-server and client:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7406">CVE-2016-7406</a>
-
- <p>Potential issues in exit message formatting.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7407">CVE-2016-7407</a>
-
- <p>Overflows when parsing OpenSSH's ASN.1 key format.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in dropbear version
-2012.55-1.3+deb7u1.</p>
-
-<p>We recommend that you upgrade your dropbear packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-634.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-635.data b/english/lts/security/2016/dla-635.data
deleted file mode 100644
index 08b72c0bef6..00000000000
--- a/english/lts/security/2016/dla-635.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-635-1 dwarfutils</define-tag>
-<define-tag report_date>2016-9-24</define-tag>
-<define-tag secrefs>CVE-2016-7510 CVE-2016-7511</define-tag>
-<define-tag packages>dwarfutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-635.wml b/english/lts/security/2016/dla-635.wml
deleted file mode 100644
index 0204a7d9fd9..00000000000
--- a/english/lts/security/2016/dla-635.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were out-of-bounds read issues in dwarfutils, a
-library to consume and produce DWARF debug information.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in dwarfutils version
-20120410-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your dwarfutils packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-635.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-636-2.data b/english/lts/security/2016/dla-636-2.data
deleted file mode 100644
index cf66b38a524..00000000000
--- a/english/lts/security/2016/dla-636-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-636-2 firefox-esr</define-tag>
-<define-tag report_date>2016-9-30</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-636-2.wml b/english/lts/security/2016/dla-636-2.wml
deleted file mode 100644
index 4ef0b85fa4d..00000000000
--- a/english/lts/security/2016/dla-636-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of firefox-esr to 45.4.0esr-1~deb7u1 caused build failure
-on armel and armhf architectures.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.4.0esr-1~deb7u2.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-636-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-636.data b/english/lts/security/2016/dla-636.data
deleted file mode 100644
index f8a66ba829d..00000000000
--- a/english/lts/security/2016/dla-636.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-636-1 firefox-esr</define-tag>
-<define-tag report_date>2016-9-27</define-tag>
-<define-tag secrefs>CVE-2016-5250 CVE-2016-5257 CVE-2016-5261 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-636.wml b/english/lts/security/2016/dla-636.wml
deleted file mode 100644
index 797df5d8714..00000000000
--- a/english/lts/security/2016/dla-636.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-information disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.4.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-636.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-637.data b/english/lts/security/2016/dla-637.data
deleted file mode 100644
index 928b270180f..00000000000
--- a/english/lts/security/2016/dla-637.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-637-1 openssl</define-tag>
-<define-tag report_date>2016-9-25</define-tag>
-<define-tag secrefs>CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-637.wml b/english/lts/security/2016/dla-637.wml
deleted file mode 100644
index 90e42d9ebb4..00000000000
--- a/english/lts/security/2016/dla-637.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in OpenSSL:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2177">CVE-2016-2177</a>
-
- <p>Guido Vranken discovered that OpenSSL uses undefined pointer
- arithmetic. Additional information can be found at
- <a href="https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/">\
- https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2178">CVE-2016-2178</a>
-
- <p>Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing
- leak in the DSA code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2179">CVE-2016-2179</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2181">CVE-2016-2181</a>
-
- <p>Quan Luo and the OCAP audit team discovered denial of service
- vulnerabilities in DTLS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2180">CVE-2016-2180</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2182">CVE-2016-2182</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-6303">CVE-2016-6303</a>
-
- <p>Shi Lei discovered an out-of-bounds memory read in
- TS_OBJ_print_bio() and an out-of-bounds write in BN_bn2dec()
- and MDC2_Update().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2183">CVE-2016-2183</a>
-
- <p>DES-based cipher suites are demoted from the HIGH group to MEDIUM
- as a mitigation for the SWEET32 attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6302">CVE-2016-6302</a>
-
- <p>Shi Lei discovered that the use of SHA512 in TLS session tickets
- is susceptible to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6304">CVE-2016-6304</a>
-
- <p>Shi Lei discovered that excessively large OCSP status request may
- result in denial of service via memory exhaustion.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6306">CVE-2016-6306</a>
-
- <p>Shi Lei discovered that missing message length validation when parsing
- certificates may potentially result in denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.1t-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your openssl and libssl1.0.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-637.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-638.data b/english/lts/security/2016/dla-638.data
deleted file mode 100644
index 87105bb00c6..00000000000
--- a/english/lts/security/2016/dla-638.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-638-1 policycoreutils</define-tag>
-<define-tag report_date>2016-9-25</define-tag>
-<define-tag secrefs>CVE-2016-7545 Bug#838599</define-tag>
-<define-tag packages>policycoreutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-638.wml b/english/lts/security/2016/dla-638.wml
deleted file mode 100644
index d68291fe5ab..00000000000
--- a/english/lts/security/2016/dla-638.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a sandbox escape via the <q>TIOCSTI</q> ioctl in
-policycoreutils, a set of programs required for the basic operation of an
-SELinux-based system.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in policycoreutils version
-2.1.10-9+deb7u1.</p>
-
-<p>We recommend that you upgrade your policycoreutils packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-638.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-639.data b/english/lts/security/2016/dla-639.data
deleted file mode 100644
index b44bf3c8cfd..00000000000
--- a/english/lts/security/2016/dla-639.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-639-1 mactelnet</define-tag>
-<define-tag report_date>2016-9-25</define-tag>
-<define-tag secrefs>CVE-2016-7115</define-tag>
-<define-tag packages>mactelnet</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-639.wml b/english/lts/security/2016/dla-639.wml
deleted file mode 100644
index a1787f21803..00000000000
--- a/english/lts/security/2016/dla-639.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7115">CVE-2016-7115</a>
- <p>Buffer overflow in the handle_packet function in mactelnet.c in the
- client in MAC-Telnet 0.4.3 and earlier allows remote TELNET servers to
- execute arbitrary code via a long string in an MT_CPTYPE_ENCRYPTIONKEY
- control packet.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.3.4-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your mactelnet packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-639.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-640.data b/english/lts/security/2016/dla-640.data
deleted file mode 100644
index 1b263777ffd..00000000000
--- a/english/lts/security/2016/dla-640.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-640-1 icedove</define-tag>
-<define-tag report_date>2016-9-30</define-tag>
-<define-tag secrefs>CVE-2016-2836</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-640.wml b/english/lts/security/2016/dla-640.wml
deleted file mode 100644
index 168528bbe59..00000000000
--- a/english/lts/security/2016/dla-640.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client: Multiple memory safety errors may
-lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:45.3.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-640.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-641.data b/english/lts/security/2016/dla-641.data
deleted file mode 100644
index 7be47c21832..00000000000
--- a/english/lts/security/2016/dla-641.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-641-1 ruby-activesupport-3.2</define-tag>
-<define-tag report_date>2016-9-30</define-tag>
-<define-tag secrefs>CVE-2016-0753</define-tag>
-<define-tag packages>ruby-activesupport-3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-641.wml b/english/lts/security/2016/dla-641.wml
deleted file mode 100644
index 445f75da5fe..00000000000
--- a/english/lts/security/2016/dla-641.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Active Support in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before
-4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level
-writers for class accessors, which allows remote attackers to bypass
-intended validation steps via crafted parameters.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2_3.2.6-6+deb7u3.</p>
-
-<p>We recommend that you upgrade your ruby-activesupport-3.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-641.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-642.data b/english/lts/security/2016/dla-642.data
deleted file mode 100644
index d8976644d3a..00000000000
--- a/english/lts/security/2016/dla-642.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-642-1 ruby-activerecord-3.2</define-tag>
-<define-tag report_date>2016-9-30</define-tag>
-<define-tag secrefs>CVE-2016-0753</define-tag>
-<define-tag packages>ruby-activerecord-3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-642.wml b/english/lts/security/2016/dla-642.wml
deleted file mode 100644
index 48b74376b72..00000000000
--- a/english/lts/security/2016/dla-642.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Active Record in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before
-4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level
-writers for class accessors, which allows remote attackers to bypass
-intended validation steps via crafted parameters.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.6-5+deb7u3.</p>
-
-<p>We recommend that you upgrade your ruby-activerecord-3.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-642.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-643.data b/english/lts/security/2016/dla-643.data
deleted file mode 100644
index 1db576d1422..00000000000
--- a/english/lts/security/2016/dla-643.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-643-1 chicken</define-tag>
-<define-tag report_date>2016-9-30</define-tag>
-<define-tag secrefs>CVE-2016-6830 CVE-2016-6831</define-tag>
-<define-tag packages>chicken</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-643.wml b/english/lts/security/2016/dla-643.wml
deleted file mode 100644
index 980710f8132..00000000000
--- a/english/lts/security/2016/dla-643.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been found in the CHICKEN Scheme compiler:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6830">CVE-2016-6830</a>
-
- <p>Buffer overrun in CHICKEN Scheme's "process-execute" and
- "process-spawn" procedures from the posix unit</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6831">CVE-2016-6831</a>
-
- <p>Memory leak in CHICKEN Scheme's process-execute and process-spawn
- procedures</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.7.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your chicken packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-643.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-644.data b/english/lts/security/2016/dla-644.data
deleted file mode 100644
index 2eb1cc47a6c..00000000000
--- a/english/lts/security/2016/dla-644.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-644-1 libav</define-tag>
-<define-tag report_date>2016-10-4</define-tag>
-<define-tag secrefs>CVE-2015-1872 CVE-2015-5479 CVE-2016-7393</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-644.wml b/english/lts/security/2016/dla-644.wml
deleted file mode 100644
index 19aa0ca90ae..00000000000
--- a/english/lts/security/2016/dla-644.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in libav:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1872">CVE-2015-1872</a>
-
- <p>The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in Libav before
- 0.8.18 does not validate the number of components in a JPEG-LS Start Of
- Frame segment, which allows remote attackers to cause a denial of service
- (out-of-bounds array access) or possibly have unspecified other impact via
- crafted Motion JPEG data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5479">CVE-2015-5479</a>
-
- <p>The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before
- 11.5 allows remote attackers to cause a denial of service (divide-by-zero
- error and application crash) via a file with crafted dimensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7393">CVE-2016-7393</a>
-
- <p>The aac_sync function in libavcodec/aac_parser.c in Libav before 11.5 is
- vulnerable to a stack-based buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6:0.8.18-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-644.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-645.data b/english/lts/security/2016/dla-645.data
deleted file mode 100644
index f201ca3cc4e..00000000000
--- a/english/lts/security/2016/dla-645.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-645-1 bind9</define-tag>
-<define-tag report_date>2016-10-5</define-tag>
-<define-tag secrefs>CVE-2016-2775 CVE-2016-2776 Bug#831796 Bug#839010</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-645.wml b/english/lts/security/2016/dla-645.wml
deleted file mode 100644
index 9d03d7d50ec..00000000000
--- a/english/lts/security/2016/dla-645.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2775">CVE-2016-2775</a>
-
- <p>lwresd crash with long query name
- Backport of upstream commit 38cc2d14e218e536e0102fa70deef99461354232.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2776">CVE-2016-2776</a>
-
- <p>assertion failure due to unspecified crafted query
- Fix based on 43139-9-9.patch from ISC.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u11.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-645.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-646.data b/english/lts/security/2016/dla-646.data
deleted file mode 100644
index 1b1442dd91f..00000000000
--- a/english/lts/security/2016/dla-646.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-646-1 zendframework</define-tag>
-<define-tag report_date>2016-10-5</define-tag>
-<define-tag secrefs>CVE-2016-4861</define-tag>
-<define-tag packages>zendframework</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-646.wml b/english/lts/security/2016/dla-646.wml
deleted file mode 100644
index 61d27f1229d..00000000000
--- a/english/lts/security/2016/dla-646.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4861">CVE-2016-4861</a>
-
- <p>The implementation of ORDER BY and GROUP BY in Zend_Db_Select
- remained prone to SQL injection when a combination of SQL
- expressions and comments were used. This security patch provides
- a comprehensive solution that identifies and removes comments
- prior to checking validity of the statement to ensure no SQLi
- vectors occur.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.11.13-1.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your zendframework packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-646.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-647.data b/english/lts/security/2016/dla-647.data
deleted file mode 100644
index 73b786d4be2..00000000000
--- a/english/lts/security/2016/dla-647.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-647-1 freeimage</define-tag>
-<define-tag report_date>2016-10-6</define-tag>
-<define-tag secrefs>CVE-2016-5684 Bug##839827</define-tag>
-<define-tag packages>freeimage</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-647.wml b/english/lts/security/2016/dla-647.wml
deleted file mode 100644
index d3d9820370c..00000000000
--- a/english/lts/security/2016/dla-647.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an out-of-bounds write vulnerability in the
-XMP image handling functionality in freeimage, a support library for various
-graphics image formats. A specially crafted XMP file can cause an arbitrary
-memory overwrite resulting in code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in freeimage version
-3.15.1-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your freeimage packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-647.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-648.data b/english/lts/security/2016/dla-648.data
deleted file mode 100644
index e2fabf4fd3e..00000000000
--- a/english/lts/security/2016/dla-648.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-648-1 c-ares</define-tag>
-<define-tag report_date>2016-10-6</define-tag>
-<define-tag secrefs>CVE-2016-5180 Bug#839151</define-tag>
-<define-tag packages>c-ares</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-648.wml b/english/lts/security/2016/dla-648.wml
deleted file mode 100644
index 9f9c19698f3..00000000000
--- a/english/lts/security/2016/dla-648.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Gzob Qq discovered that the query-building functions in c-ares, an
-asynchronous DNS request library would not correctly process crafted
-query names, resulting in a heap buffer overflow and potentially
-leading to arbitrary code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.1-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your c-ares packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-648.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-649.data b/english/lts/security/2016/dla-649.data
deleted file mode 100644
index f7b6a4452f7..00000000000
--- a/english/lts/security/2016/dla-649.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-649-1 python-django</define-tag>
-<define-tag report_date>2016-10-6</define-tag>
-<define-tag secrefs>CVE-2016-7401</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-649.wml b/english/lts/security/2016/dla-649.wml
deleted file mode 100644
index 601be73fa1b..00000000000
--- a/english/lts/security/2016/dla-649.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a possible CSRF protection bypass on sites
-that use Google Analytics in python-django, a High-level Python web
-development framework.</p>
-
-<p>More information can be found in the upstream announcement:</p>
-
-<p><url "https://www.djangoproject.com/weblog/2016/sep/26/security-releases/"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-django version
-1.4.22-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-649.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-650.data b/english/lts/security/2016/dla-650.data
deleted file mode 100644
index be66149862c..00000000000
--- a/english/lts/security/2016/dla-650.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-650-1 mat</define-tag>
-<define-tag report_date>2016-10-9</define-tag>
-<define-tag secrefs>Bug#826101</define-tag>
-<define-tag packages>mat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-650.wml b/english/lts/security/2016/dla-650.wml
deleted file mode 100644
index 5c4c8940a0e..00000000000
--- a/english/lts/security/2016/dla-650.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An implementation flaw was discovered in mat, the metadata anonymisation
-toolkit. The implementation of PDF support lacks support to anonymize
-the metadata in embedded images. As there is no easy fix for this flaw,
-it was decided that PDF support will be removed altogether from mat for
-the time being.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.3.2-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your mat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-650.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-651.data b/english/lts/security/2016/dla-651.data
deleted file mode 100644
index fda5b83793f..00000000000
--- a/english/lts/security/2016/dla-651.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-651-1 graphicsmagick</define-tag>
-<define-tag report_date>2016-10-11</define-tag>
-<define-tag secrefs>CVE-2016-7446 CVE-2016-7447 CVE-2016-7449 CVE-2016-7800</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-651.wml b/english/lts/security/2016/dla-651.wml
deleted file mode 100644
index a941590dccf..00000000000
--- a/english/lts/security/2016/dla-651.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various security issues were found and fixed in graphicsmagick in Debian
-wheezy LTS.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7446">CVE-2016-7446</a>
-
- <p>Heap buffer overflow issue in MVG/SVG rendering.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7447">CVE-2016-7447</a>
-
- <p>Heap overflow of the EscapeParenthesis() function</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7449">CVE-2016-7449</a>
-
- <p>TIFF related problems due to use of strlcpy use.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7800">CVE-2016-7800</a>
-
- <p>Fix unsigned underflow leading to heap overflow when
- parsing 8BIM chunk.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-651.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-652.data b/english/lts/security/2016/dla-652.data
deleted file mode 100644
index a9a09fe50f2..00000000000
--- a/english/lts/security/2016/dla-652.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-652-1 qemu</define-tag>
-<define-tag report_date>2016-10-11</define-tag>
-<define-tag secrefs>CVE-2016-7161 CVE-2016-7170 CVE-2016-7908</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-652.wml b/english/lts/security/2016/dla-652.wml
deleted file mode 100644
index 413dbb4e1a1..00000000000
--- a/english/lts/security/2016/dla-652.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in QEMU:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7161">CVE-2016-7161</a>
-
- <p>Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite
- in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on
- the QEMU host via a large ethlite packet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7170">CVE-2016-7170</a>
-
- <p>The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick
- Emulator) is vulnerable to an OOB memory access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7908">CVE-2016-7908</a>
-
- <p>The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator)
- does not properly limit the buffer descriptor count when transmitting
- packets, which allows local guest OS administrators to cause a denial of
- service (infinite loop and QEMU process crash) via vectors involving a
- buffer descriptor with a length of 0 and crafted values in bd.flags.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u16.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-652.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-653.data b/english/lts/security/2016/dla-653.data
deleted file mode 100644
index 6f32e4c4bc6..00000000000
--- a/english/lts/security/2016/dla-653.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-653-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-10-11</define-tag>
-<define-tag secrefs>CVE-2016-7161 CVE-2016-7170 CVE-2016-7908</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-653.wml b/english/lts/security/2016/dla-653.wml
deleted file mode 100644
index b51cc3efd6e..00000000000
--- a/english/lts/security/2016/dla-653.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in qemu-kvm:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7161">CVE-2016-7161</a>
-
- <p>Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite
- in qemu-kvm allows attackers to execute arbitrary code on the QEMU host via
- a large ethlite packet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7170">CVE-2016-7170</a>
-
- <p>The vmsvga_fifo_run function in hw/display/vmware_vga.c in qemu-kvm is
- vulnerable to an OOB memory access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7908">CVE-2016-7908</a>
-
- <p>The mcf_fec_do_tx function in hw/net/mcf_fec.c in qemu-kvm does not
- properly limit the buffer descriptor count when transmitting packets, which
- allows local guest OS administrators to cause a denial of service (infinite
- loop and QEMU process crash) via vectors involving a buffer descriptor with
- a length of 0 and crafted values in bd.flags.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u16.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-653.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-654.data b/english/lts/security/2016/dla-654.data
deleted file mode 100644
index b3c3786079a..00000000000
--- a/english/lts/security/2016/dla-654.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-654-1 libxfixes</define-tag>
-<define-tag report_date>2016-10-14</define-tag>
-<define-tag secrefs>CVE-2016-7944 Bug#840442</define-tag>
-<define-tag packages>libxfixes</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-654.wml b/english/lts/security/2016/dla-654.wml
deleted file mode 100644
index 83d22b84dfb..00000000000
--- a/english/lts/security/2016/dla-654.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a integer overflow in libxfixes, a library
-providing a client interface to the X11 <q>XFIXES</q> extension.</p>
-
-<p>The 32 bit field <q>rep.length</q> was not checked for validity, which allowed an
-integer overflow on 32 bit systems. A malicious server could send INT_MAX as
-<q>length</q> which was then multiplied by the size of XRectangle. In this case the
-client would not read the whole data from server, getting out of sync.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libxfixes version
-1:5.0-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxfixes packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-654.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-655.data b/english/lts/security/2016/dla-655.data
deleted file mode 100644
index 4b0486bb825..00000000000
--- a/english/lts/security/2016/dla-655.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-655-1 mpg123</define-tag>
-<define-tag report_date>2016-10-15</define-tag>
-<define-tag packages></define-tag>
-<define-tag secrefs>CVE-2014-9497 CVE-2016-1000247</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-655.wml b/english/lts/security/2016/dla-655.wml
deleted file mode 100644
index 3687e15f554..00000000000
--- a/english/lts/security/2016/dla-655.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in mpg123, an
-MPEG layer 1/2/3 audio decoder and player. An attacker could take
-advantage of these flaws to cause a denial of service against mpg123
-or applications using the libmpg123 library with a carefully crafted
-input file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9497">CVE-2014-9497</a>
-
- <p>Myautsai PAN discovered a flaw in the decoder initialization code
- of libmpg123. A specially crafted mp3 input file can be used to
- cause a buffer overflow, resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000247">CVE-2016-1000247</a>
-
- <p>Jerold Hoong discovered a flaw in the id3 tag processing code of
- libmpg123. A specially crafted mp3 input file could be used to
- cause a buffer over-read, resulting in a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.14.4-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your mpg123 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-655.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-656.data b/english/lts/security/2016/dla-656.data
deleted file mode 100644
index 4475ce239a0..00000000000
--- a/english/lts/security/2016/dla-656.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-656-1 libdbd-mysql-perl</define-tag>
-<define-tag report_date>2016-10-15</define-tag>
-<define-tag secrefs>CVE-2016-1246</define-tag>
-<define-tag packages>libdbd-mysql-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-656.wml b/english/lts/security/2016/dla-656.wml
deleted file mode 100644
index 8391f84f92d..00000000000
--- a/english/lts/security/2016/dla-656.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Paul Rohar discovered that libdbd-mysql-perl, the Perl DBI database
-driver for MySQL and MariaDB, constructed an error message in a
-fixed-length buffer, leading to a crash (_FORTIFY_SOURCE failure) and,
-potentially, to denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.021-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libdbd-mysql-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-656.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-657.data b/english/lts/security/2016/dla-657.data
deleted file mode 100644
index d0ca62f454a..00000000000
--- a/english/lts/security/2016/dla-657.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-657-1 libarchive</define-tag>
-<define-tag report_date>2016-10-16</define-tag>
-<define-tag secrefs>CVE-2016-5418 Bug#837714</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-657.wml b/english/lts/security/2016/dla-657.wml
deleted file mode 100644
index 9d9637c9f5f..00000000000
--- a/english/lts/security/2016/dla-657.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that libarchive mishandled hardlink archive entries of
-non-zero data size, possibly allowing remote attackers to to write to
-arbitrary files via especially crafted archives.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.4-3+wheezy4.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-657.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-658.data b/english/lts/security/2016/dla-658.data
deleted file mode 100644
index f4a5e1e5846..00000000000
--- a/english/lts/security/2016/dla-658.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-658-1 icedove</define-tag>
-<define-tag report_date>2016-10-16</define-tag>
-<define-tag secrefs>CVE-2016-5278 CVE-2016-5270 CVE-2016-5272 CVE-2016-5276 CVE-2016-5277 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 CVE-2016-5250 CVE-2016-5261 CVE-2016-5257</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-658.wml b/english/lts/security/2016/dla-658.wml
deleted file mode 100644
index f3968aa4dd9..00000000000
--- a/english/lts/security/2016/dla-658.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client: Multiple memory safety errors may
-lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.4.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-658.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-659.data b/english/lts/security/2016/dla-659.data
deleted file mode 100644
index d609124cb87..00000000000
--- a/english/lts/security/2016/dla-659.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-659-1 systemd</define-tag>
-<define-tag report_date>2016-10-18</define-tag>
-<define-tag secrefs>CVE-2016-7796 Bug#839607</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-659.wml b/english/lts/security/2016/dla-659.wml
deleted file mode 100644
index 3e05c74a15f..00000000000
--- a/english/lts/security/2016/dla-659.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The manager_dispatch_notify_fd function in systemd allowed local users to cause
-a denial of service (system hang) via a zero-length message received over a
-notify socket, which caused an error to be returned and the notification
-handler to be disabled.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-44-11+deb7u5.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-659.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-660.data b/english/lts/security/2016/dla-660.data
deleted file mode 100644
index dba9ff9ddb7..00000000000
--- a/english/lts/security/2016/dla-660.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-660-1 libxrandr</define-tag>
-<define-tag report_date>2016-10-17</define-tag>
-<define-tag secrefs>CVE-2016-7947 CVE-2016-7948 Bug#840441</define-tag>
-<define-tag packages>libxrandr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-660.wml b/english/lts/security/2016/dla-660.wml
deleted file mode 100644
index 31df821bfc5..00000000000
--- a/english/lts/security/2016/dla-660.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Insufficient validation of data from the X server in libxrandr
-before v1.5.0 can cause out of boundary memory writes and integer
-overflows.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.3.2-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxrandr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-660.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-661.data b/english/lts/security/2016/dla-661.data
deleted file mode 100644
index 5cf622cfff6..00000000000
--- a/english/lts/security/2016/dla-661.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-661-1 libarchive</define-tag>
-<define-tag report_date>2016-10-17</define-tag>
-<define-tag secrefs>CVE-2016-8687 CVE-2016-8688 CVE-2016-8689 Bug#840934 Bug#840935 Bug#840936</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-661.wml b/english/lts/security/2016/dla-661.wml
deleted file mode 100644
index ede2519127e..00000000000
--- a/english/lts/security/2016/dla-661.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Agostino Sarubbo of Gentoo discovered several security vulnerabilities
-in libarchive, a multi-format archive and compression library. An
-attacker could take advantage of these flaws to cause a buffer overflow
-or an out of bounds read using a carefully crafted input file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8687">CVE-2016-8687</a>
-
- <p>Agostino Sarubbo of Gentoo discovered a possible stack-based buffer
- overflow when printing a filename in bsdtar_expand_char() of util.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8688">CVE-2016-8688</a>
-
- <p>Agostino Sarubbo of Gentoo discovered a possible out of bounds read
- when parsing multiple long lines in bid_entry() and detect_form() of
- archive_read_support_format_mtree.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8689">CVE-2016-8689</a>
-
- <p>Agostino Sarubbo of Gentoo discovered a possible heap-based buffer
- overflow when reading corrupted 7z files in read_Header() of
- archive_read_support_format_7zip.c.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.4-3+wheezy5.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-661.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-662.data b/english/lts/security/2016/dla-662.data
deleted file mode 100644
index 24ca0eb9532..00000000000
--- a/english/lts/security/2016/dla-662.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-662-1 quagga</define-tag>
-<define-tag report_date>2016-10-18</define-tag>
-<define-tag secrefs>CVE-2016-1245 Bug#841162</define-tag>
-<define-tag packages>quagga</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-662.wml b/english/lts/security/2016/dla-662.wml
deleted file mode 100644
index f4254416d4d..00000000000
--- a/english/lts/security/2016/dla-662.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was stack overrun in IPv6 RA receive code in
-quagga, a BGP/OSPF/RIP routing daemon.</p>
-
-<p>The buffer size specified when receiving mixed up two constants that have
-different values.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in quagga version
-0.99.22.4-1+wheezy3+deb7u1.</p>
-
-<p>We recommend that you upgrade your quagga packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-662.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-663.data b/english/lts/security/2016/dla-663.data
deleted file mode 100644
index 46f721094e9..00000000000
--- a/english/lts/security/2016/dla-663.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-663-1 tor</define-tag>
-<define-tag report_date>2016-10-18</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-663.wml b/english/lts/security/2016/dla-663.wml
deleted file mode 100644
index c4edd4e437c..00000000000
--- a/english/lts/security/2016/dla-663.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It has been discovered that Tor treats the contents of some buffer
-chunks as if they were a NUL-terminated string. This issue could
-enable a remote attacker to crash a Tor client, hidden service, relay,
-or authority. This update aims to defend against this general
-class of security bugs.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version 0.2.4.27-2.</p>
-
-<p>For the stable distribution (jessie), this problem has been fixed in
-version 0.2.5.12-3., for unstable (sid) with version 0.2.8.9-1, and for
-experimental with 0.2.9.4-alpha-1.</p>
-
-<p>Additionally, for wheezy this updates the set of authority directory servers
-to the one from Tor 0.2.8.7, released in August 2016.</p>
-
-<p>We recommend that you upgrade your tor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-663.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-664.data b/english/lts/security/2016/dla-664.data
deleted file mode 100644
index f4b93e6dfb2..00000000000
--- a/english/lts/security/2016/dla-664.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-664-1 libxrender</define-tag>
-<define-tag report_date>2016-10-18</define-tag>
-<define-tag secrefs>CVE-2016-7949 CVE-2016-7950 Bug#840443</define-tag>
-<define-tag packages>libxrender</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-664.wml b/english/lts/security/2016/dla-664.wml
deleted file mode 100644
index e69b2dbf596..00000000000
--- a/english/lts/security/2016/dla-664.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tobias Stoeckmann from the OpenBSD project has discovered a number of
-issues in the way various X client libraries handle the responses they
-receive from servers. Insufficient validation of data from the X server
-could cause out of boundary memory writes in the libXrender library
-potentially allowing the user to escalate their privileges.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.9.7-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libxrender packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-664.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-665.data b/english/lts/security/2016/dla-665.data
deleted file mode 100644
index 4e5f1e36843..00000000000
--- a/english/lts/security/2016/dla-665.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-665-1 libgd2</define-tag>
-<define-tag report_date>2016-10-18</define-tag>
-<define-tag secrefs>CVE-2016-6911 CVE-2016-8670</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-665.wml b/english/lts/security/2016/dla-665.wml
deleted file mode 100644
index 1df28b42aee..00000000000
--- a/english/lts/security/2016/dla-665.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6911">CVE-2016-6911</a>
-
- <p>invalid read in gdImageCreateFromTiffPtr()
- (most of the code is not present in the Wheezy version)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8670">CVE-2016-8670</a>
-
- <p>Stack Buffer Overflow in GD dynamicGetbuf</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u6.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-665.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-666.data b/english/lts/security/2016/dla-666.data
deleted file mode 100644
index 57978457719..00000000000
--- a/english/lts/security/2016/dla-666.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-666-1 guile-2.0</define-tag>
-<define-tag report_date>2016-10-18</define-tag>
-<define-tag secrefs>CVE-2016-8605 CVE-2016-8606 Bug#840555 Bug#840556</define-tag>
-<define-tag packages>guile-2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-666.wml b/english/lts/security/2016/dla-666.wml
deleted file mode 100644
index bcc35f031c2..00000000000
--- a/english/lts/security/2016/dla-666.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in GNU Guile, an
-implementation of the Scheme programming language. The Common
-Vulnerabilities and Exposures project identifies the following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8605">CVE-2016-8605</a>
-
- <p>The mkdir procedure of GNU Guile temporarily changed the process'
- umask to zero. During that time window, in a multithreaded
- application, other threads could end up creating files with
- insecure permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8606">CVE-2016-8606</a>
-
- <p>GNU Guile provides a <q>REPL server</q> which is a command prompt that
- developers can connect to for live coding and debugging purposes.
- The REPL server is started by the '--listen' command-line option
- or equivalent API.</p>
-
- <p>It was reported that the REPL server is vulnerable to the HTTP
- inter-protocol attack.</p>
-
- <p>This constitutes a remote code execution vulnerability for
- developers running a REPL server that listens on a loopback device
- or private network. Applications that do not run a REPL server, as
- is usually the case, are unaffected.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.5+1-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your guile-2.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-666.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-667.data b/english/lts/security/2016/dla-667.data
deleted file mode 100644
index ab892f12eaf..00000000000
--- a/english/lts/security/2016/dla-667.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-667-1 libxv</define-tag>
-<define-tag report_date>2016-10-19</define-tag>
-<define-tag secrefs>CVE-2016-5407 Bug#840438</define-tag>
-<define-tag packages>libxv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-667.wml b/english/lts/security/2016/dla-667.wml
deleted file mode 100644
index 6e2a9660aa1..00000000000
--- a/english/lts/security/2016/dla-667.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tobias Stoeckmann from the OpenBSD project has discovered a number of
-issues in the way various X client libraries handle the responses they
-receive from servers. Insufficient validation of data from the X
-server can cause out of boundary memory and memory corruption in the
-libxv library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.0.7-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-667.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-668.data b/english/lts/security/2016/dla-668.data
deleted file mode 100644
index f22ece55db0..00000000000
--- a/english/lts/security/2016/dla-668.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-668-1 libass</define-tag>
-<define-tag report_date>2016-10-19</define-tag>
-<define-tag secrefs>CVE-2016-7969 CVE-2016-7972</define-tag>
-<define-tag packages>libass</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-668.wml b/english/lts/security/2016/dla-668.wml
deleted file mode 100644
index a4bd4c00e14..00000000000
--- a/english/lts/security/2016/dla-668.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in libass, a library for
-manipulating the SubStation Alpha (SSA) subtitle file format. The Common
-Vulnerabilities and Exposures project identifies the following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7969">CVE-2016-7969</a>
-
- <p>Mode 0/3 line wrapping equalization in specific cases which could
- result in illegal reads while laying out and shaping text.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7972">CVE-2016-7972</a>
-
- <p>Memory reallocation issue in the shaper which lead to undefined
- behavior</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.0-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your libass packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-668.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-669.data b/english/lts/security/2016/dla-669.data
deleted file mode 100644
index 711d589c380..00000000000
--- a/english/lts/security/2016/dla-669.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-669-1 dwarfutils</define-tag>
-<define-tag report_date>2016-10-19</define-tag>
-<define-tag secrefs>CVE-2015-8538 CVE-2015-8750 CVE-2016-2050 CVE-2016-2091 CVE-2016-5034 CVE-2016-5036 CVE-2016-5038 CVE-2016-5039 CVE-2016-5042</define-tag>
-<define-tag packages>dwarfutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-669.wml b/english/lts/security/2016/dla-669.wml
deleted file mode 100644
index 5e1ade1a0c3..00000000000
--- a/english/lts/security/2016/dla-669.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in dwarfutils, a tool and
-library for reading/consuming and writing/producing DWARF debugging
-information. The Common Vulnerabilities and Exposures project
-identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8538">CVE-2015-8538</a>
-
- <p>A specially crafted ELF file can cause a segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8750">CVE-2015-8750</a>
-
- <p>A specially crafted ELF file can cause a NULL pointer
- dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2050">CVE-2016-2050</a>
-
- <p>Out-of-bounds write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2091">CVE-2016-2091</a>
-
- <p>Out-of-bounds read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5034">CVE-2016-5034</a>
-
- <p>Out-of-bounds write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5036">CVE-2016-5036</a>
-
- <p>Out-of-bounds read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5038">CVE-2016-5038</a>
-
- <p>Out-of-bounds read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5039">CVE-2016-5039</a>
-
- <p>Out-of-bounds read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5042">CVE-2016-5042</a>
-
- <p>A specially crafted DWARF section can cause an infinite loop,
- reading from increasing memory addresses until the application
- crashes.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-20120410-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your dwarfutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-669.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-670.data b/english/lts/security/2016/dla-670.data
deleted file mode 100644
index b0b4d2f9591..00000000000
--- a/english/lts/security/2016/dla-670.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-670-1 linux</define-tag>
-<define-tag report_date>2016-10-20</define-tag>
-<define-tag secrefs>CVE-2015-8956 CVE-2016-5195 CVE-2016-7042 CVE-2016-7425</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-670.wml b/english/lts/security/2016/dla-670.wml
deleted file mode 100644
index 0dba6518ec4..00000000000
--- a/english/lts/security/2016/dla-670.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8956">CVE-2015-8956</a>
-
- <p>It was discovered that missing input sanitising in RFCOMM Bluetooth
- socket handling may result in denial of service or information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5195">CVE-2016-5195</a>
-
- <p>It was discovered that a race condition in the memory management
- code can be used for local privilege escalation. This does not
- affect kernels built with PREEMPT_RT enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7042">CVE-2016-7042</a>
-
- <p>Ondrej Kozina discovered that incorrect buffer allocation in the
- proc_keys_show() function may result in local denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7425">CVE-2016-7425</a>
-
- <p>Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver
- which may result in local denial of service, or potentially,
- arbitrary code execution.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.82-1. This version also includes bug fixes from upstream version
-3.2.82 and updates the PREEMPT_RT featureset to version 3.2.82-rt119.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.36-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-670.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-671.data b/english/lts/security/2016/dla-671.data
deleted file mode 100644
index bfea544ecab..00000000000
--- a/english/lts/security/2016/dla-671.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-671-1 libxvmc</define-tag>
-<define-tag report_date>2016-10-19</define-tag>
-<define-tag secrefs>CVE-2016-7953</define-tag>
-<define-tag packages>libxvmc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-671.wml b/english/lts/security/2016/dla-671.wml
deleted file mode 100644
index 8620f7687a1..00000000000
--- a/english/lts/security/2016/dla-671.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7953">CVE-2016-7953</a>
-
- <p>If an empty string is received from an x-server, do not underrun
- the buffer by accessing "rep.nameLen - 1" unconditionally, which
- could end up being -1.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.0.7-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libxvmc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-671.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-672.data b/english/lts/security/2016/dla-672.data
deleted file mode 100644
index 815d762ddab..00000000000
--- a/english/lts/security/2016/dla-672.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-672-1 bind9</define-tag>
-<define-tag report_date>2016-10-20</define-tag>
-<define-tag secrefs>CVE-2016-2848</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-672.wml b/english/lts/security/2016/dla-672.wml
deleted file mode 100644
index 7a5a2435bc6..00000000000
--- a/english/lts/security/2016/dla-672.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2848">CVE-2016-2848</a>
-
- <p>A server vulnerable to this defect can be forced to
- exit with an assertion failure if it receives a malformed packet.
- Authoritative and recursive servers are both vulnerable.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u12.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-672.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-673.data b/english/lts/security/2016/dla-673.data
deleted file mode 100644
index a6125f821e3..00000000000
--- a/english/lts/security/2016/dla-673.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-673-1 kdepimlibs</define-tag>
-<define-tag report_date>2016-10-22</define-tag>
-<define-tag secrefs>CVE-2016-7966 Bug#840546</define-tag>
-<define-tag packages>kdepimlibs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-673.wml b/english/lts/security/2016/dla-673.wml
deleted file mode 100644
index 6bf8c7a6b62..00000000000
--- a/english/lts/security/2016/dla-673.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Roland Tapken discovered that insufficient input sanitizing in KMail's
-plain text viewer allowed attackers the injection of HTML code. This
-might open the way to the exploitation of other vulnerabilities in the
-HTML viewer code, which is disabled by default.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:4.8.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your kdepimlibs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-673.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-674-2.data b/english/lts/security/2016/dla-674-2.data
deleted file mode 100644
index 51ca6f1915d..00000000000
--- a/english/lts/security/2016/dla-674-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-674-2 ghostscript</define-tag>
-<define-tag report_date>2016-10-28</define-tag>
-<define-tag secrefs>Bug#840691</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-674-2.wml b/english/lts/security/2016/dla-674-2.wml
deleted file mode 100644
index 1bf823f40e7..00000000000
--- a/english/lts/security/2016/dla-674-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update for ghostscript issued as DLA-674-1 caused regressions for
-certain Postscript document viewers (evince, zathura). Updated packages
-are now available to address this problem. For reference, the original
-advisory text follows.</p>
-
-<p>Several vulnerabilities were discovered in Ghostscript, the GPL
-PostScript/PDF interpreter, which may lead to the execution of arbitrary
-code or information disclosure if a specially crafted Postscript file is
-processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.05~dfsg-6.3+deb7u4.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-674-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-674.data b/english/lts/security/2016/dla-674.data
deleted file mode 100644
index 9cafcd5771e..00000000000
--- a/english/lts/security/2016/dla-674.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-674-1 ghostscript</define-tag>
-<define-tag report_date>2016-10-25</define-tag>
-<define-tag secrefs>CVE-2013-5653 CVE-2016-7976 CVE-2016-7977 CVE-2016-7978 CVE-2016-7979 CVE-2016-8602 Bug#839118 Bug#839260 Bug#839841 Bug#839845 Bug#839846 Bug#840451</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-674.wml b/english/lts/security/2016/dla-674.wml
deleted file mode 100644
index 0bed2d0483e..00000000000
--- a/english/lts/security/2016/dla-674.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Ghostscript, the GPL
-PostScript/PDF interpreter, which may lead to the execution of arbitrary
-code or information disclosure if a specially crafted Postscript file is
-processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.05~dfsg-6.3+deb7u3.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-674.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-675.data b/english/lts/security/2016/dla-675.data
deleted file mode 100644
index 5c91bc51c52..00000000000
--- a/english/lts/security/2016/dla-675.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-675-1 potrace</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag secrefs>CVE-2013-7437 CVE-2016-8694 CVE-2016-8695 CVE-2016-8696 CVE-2016-8697 CVE-2016-8698 CVE-2016-8699 CVE-2016-8700 CVE-2016-8701 CVE-2016-8702 CVE-2016-8703 Bug##778646</define-tag>
-<define-tag packages>potrace</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-675.wml b/english/lts/security/2016/dla-675.wml
deleted file mode 100644
index 238ec36f066..00000000000
--- a/english/lts/security/2016/dla-675.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in potrace.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7437">CVE-2013-7437</a>
-
- <p>Multiple integer overflows in potrace 1.11 allow remote attackers
- to cause a denial of service (crash) via large dimensions in a BMP
- image, which triggers a buffer overflow.
- This bug was reported by Murray McAllister of the Red Hat
- Security Response Team.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8694">CVE-2016-8694</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8695">CVE-2016-8695</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8696">CVE-2016-8696</a>
-
- <p>Multiple NULL pointer dereferences in bm_readbody_bmp.
- This bug was discovered by Agostino Sarubbo of Gentoo.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8697">CVE-2016-8697</a>
-
- <p>Division by zero in bm_new.
- This bug was discovered by Agostino Sarubbo of Gentoo.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8698">CVE-2016-8698</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8699">CVE-2016-8699</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8700">CVE-2016-8700</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8701">CVE-2016-8701</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8702">CVE-2016-8702</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8703">CVE-2016-8703</a>
-
- <p>Multiple heap-based buffer overflows in bm_readbody_bmp.
- This bug was discovered by Agostino Sarubbo of Gentoo.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your potrace packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-675.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-676.data b/english/lts/security/2016/dla-676.data
deleted file mode 100644
index 61bd770d58a..00000000000
--- a/english/lts/security/2016/dla-676.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-676-1 nspr</define-tag>
-<define-tag report_date>2016-10-25</define-tag>
-<define-tag packages>nspr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-676.wml b/english/lts/security/2016/dla-676.wml
deleted file mode 100644
index f8d40aec79f..00000000000
--- a/english/lts/security/2016/dla-676.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Network Security Service (NSS) libraries uses
-environment variables to configure lots of things, some of which refer to
-file system locations. Others can be degrade the operation of NSS in various
-ways, forcing compatibility modes and so on.</p>
-
-<p>Previously, these environment variables were not ignored SUID
-binaries. This version of NetScape Portable Runtime Library (NSPR)
-introduce a new API, PR_GetEnVSecure, to address this.</p>
-
-<p>Both NSPR and NSS need to be upgraded to address this problem.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in NSPR version
-4.12-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your nspr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-676.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-677.data b/english/lts/security/2016/dla-677.data
deleted file mode 100644
index c1837f4b56c..00000000000
--- a/english/lts/security/2016/dla-677.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-677-1 nss</define-tag>
-<define-tag report_date>2016-10-25</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-677.wml b/english/lts/security/2016/dla-677.wml
deleted file mode 100644
index 78da6cd4f75..00000000000
--- a/english/lts/security/2016/dla-677.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Network Security Service (NSS) libraries uses
-environment variables to configure lots of things, some of which refer to
-file system locations. Others can be degrade the operation of NSS in various
-ways, forcing compatibility modes and so on.</p>
-
-<p>Previously, these environment variables were not ignored SUID
-binaries. This version of NetScape Portable Runtime Library (NSPR)
-introduce a new API, PR_GetEnVSecure, to address this.</p>
-
-<p>Both NSPR and NSS need to be upgraded to address this problem.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in NSS version
-3.26-1+debu7u1.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-677.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-678.data b/english/lts/security/2016/dla-678.data
deleted file mode 100644
index deaa820c683..00000000000
--- a/english/lts/security/2016/dla-678.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-678-1 qemu</define-tag>
-<define-tag report_date>2016-10-25</define-tag>
-<define-tag secrefs>CVE-2016-8576 CVE-2016-8577 CVE-2016-8578 CVE-2016-8669</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-678.wml b/english/lts/security/2016/dla-678.wml
deleted file mode 100644
index 8bc39b4654f..00000000000
--- a/english/lts/security/2016/dla-678.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in QEMU:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8576">CVE-2016-8576</a>
-
- <p>Quick Emulator (Qemu) built with the USB xHCI controller emulation support
- is vulnerable to an infinite loop issue. It could occur while processing USB
- command ring in <q>xhci_ring_fetch</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8577">CVE-2016-8577</a>
-
- <p>Quick Emulator (Qemu) built with the virtio-9p back-end support is
- vulnerable to a memory leakage issue. It could occur while doing a I/O read
- operation in v9fs_read() routine.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8578">CVE-2016-8578</a>
-
- <p>Quick Emulator (Qemu) built with the virtio-9p back-end support is
- vulnerable to a null pointer dereference issue. It could occur while doing
- an I/O vector unmarshalling operation in v9fs_iov_vunmarshal() routine.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8669">CVE-2016-8669</a>
-
- <p>Quick Emulator (Qemu) built with the 16550A UART emulation support is
- vulnerable to a divide by zero issue. It could occur while updating serial
- device parameters in <q>serial_update_parameters</q>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u17.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-678.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-679.data b/english/lts/security/2016/dla-679.data
deleted file mode 100644
index 8b7f68c19a6..00000000000
--- a/english/lts/security/2016/dla-679.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-679-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-10-25</define-tag>
-<define-tag secrefs>CVE-2016-8576 CVE-2016-8577 CVE-2016-8578 CVE-2016-8669</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-679.wml b/english/lts/security/2016/dla-679.wml
deleted file mode 100644
index e45f156009f..00000000000
--- a/english/lts/security/2016/dla-679.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in qemu-kvm:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8576">CVE-2016-8576</a>
-
- <p>qemu-kvm built with the USB xHCI controller emulation support is vulnerable
- to an infinite loop issue. It could occur while processing USB command ring
- in <q>xhci_ring_fetch</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8577">CVE-2016-8577</a>
-
- <p>qemu-kvm built with the virtio-9p back-end support is vulnerable to a memory
- leakage issue. It could occur while doing a I/O read operation in
- v9fs_read() routine.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8578">CVE-2016-8578</a>
-
- <p>qemu-kvm built with the virtio-9p back-end support is vulnerable to a null
- pointer dereference issue. It could occur while doing an I/O vector
- unmarshalling operation in v9fs_iov_vunmarshal() routine.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8669">CVE-2016-8669</a>
-
- <p>qemu-kvm built with the 16550A UART emulation support is vulnerable to a
- divide by zero issue. It could occur while updating serial device parameters
- in <q>serial_update_parameters</q>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u17.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-679.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-680-2.data b/english/lts/security/2016/dla-680-2.data
deleted file mode 100644
index 6da33d21597..00000000000
--- a/english/lts/security/2016/dla-680-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-680-2 bash</define-tag>
-<define-tag report_date>2016-10-28</define-tag>
-<define-tag secrefs>CVE-2016-7543</define-tag>
-<define-tag packages>bash</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-680-2.wml b/english/lts/security/2016/dla-680-2.wml
deleted file mode 100644
index 655e6e28c22..00000000000
--- a/english/lts/security/2016/dla-680-2.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is a correction of DLA 680-1 that mentioned that
-bash 4.2+dfsg-0.1+deb7u3 was corrected. The corrected package
-version was 4.2+dfsg-0.1+deb7u4.</p>
-
-<p>For completeness the text from DLA 680-1 available below with
-only corrected version information. No other changes.</p>
-
-<p>An old attack vector has been corrected in bash (a sh-compatible
-command language interpreter).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7543">CVE-2016-7543</a>
-
- <p>Specially crafted SHELLOPTS+PS4 environment variables in combination
- with insecure setuid binaries.</p>
-
-<p>The setuid binary had to both use setuid() function call in
-combination with a system() or popen() function call. With this
-combination it is possible to gain root access.</p>
-
-<p>I addition bash have to be the default shell (/bin/sh have to point
-to bash) for the system to be vulnerable.</p>
-
-<p>The default shell in Debian is dash and there are no known setuid
-binaries in Debian with the, above described, insecure combination.</p>
-
-<p>There could however be local software with the, above described,
-insecure combination that could benefit from this correction.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem have been fixed in version
-4.2+dfsg-0.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your bash packages.</p>
-
-<p>If there are local software that have the insecure combination and
-do a setuid() to some other user than root, then the update will not
-correct that problem. That problem have to be addressed in the
-insecure setuid binary.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-680-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-680.data b/english/lts/security/2016/dla-680.data
deleted file mode 100644
index 8f3259c6d35..00000000000
--- a/english/lts/security/2016/dla-680.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-680-1 bash</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag secrefs>CVE-2016-7543</define-tag>
-<define-tag packages>bash</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-680.wml b/english/lts/security/2016/dla-680.wml
deleted file mode 100644
index 2b46909800b..00000000000
--- a/english/lts/security/2016/dla-680.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An old attack vector has been corrected in bash, a sh-compatible
-command language interpreter.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7543">CVE-2016-7543</a>
-
- <p>Specially crafted SHELLOPTS+PS4 environment variables in combination
- with insecure setuid binaries can result in root privilege
- escalation.</p>
-
-<p>The setuid binary had to both use setuid() function call in
-combination with a system() or popen() function call. With this
-combination it is possible to gain root access.</p>
-
-<p>I addition bash have to be the default shell (/bin/sh have to point
-to bash) for the system to be vulnerable.</p>
-
-<p>The default shell in Debian is dash and there are no known setuid
-binaries in Debian with the, above described, insecure combination.</p>
-
-<p>There could however be local software with the, above described,
-insecure combination that could benefit from this correction.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem have been fixed in version
-4.2+dfsg-0.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your bash packages.</p>
-
-<p>If there are local software that have the insecure combination and
-do a setuid() to some other user than root, then the update will not
-correct that problem. That problem have to be addressed in the
-insecure setuid binary.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-680.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-681.data b/english/lts/security/2016/dla-681.data
deleted file mode 100644
index e1ac5506f52..00000000000
--- a/english/lts/security/2016/dla-681.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-681-1 tzdata</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-681.wml b/english/lts/security/2016/dla-681.wml
deleted file mode 100644
index c4241039b3c..00000000000
--- a/english/lts/security/2016/dla-681.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata up to 2016h. Notable
-changes are:</p>
-
-<ul>
- <li>Asia/Gaza and Asia/Hebron (DST ending on 2016-10-29 at 01:00,
- not 2016-10-21 at 00:00).</li>
- <li>Europe/Istanbul switch from EET/EEST (+02/+03) to permanent +03 on
- 2016-09-07. While the timezone has changed, the divergence from
- EET/EEST will happen on 2016-10-30.</li>
- <li>Turkey switched from EET/EEST (+02/+03) to permanent +03,
- effective 2016-09-07.</li>
- <li>New leap second 2016-12-31 23:59:60 UTC as per IERS Bulletin C 52.</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2016h-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-681.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-682.data b/english/lts/security/2016/dla-682.data
deleted file mode 100644
index 581281d972d..00000000000
--- a/english/lts/security/2016/dla-682.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-682-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-682.wml b/english/lts/security/2016/dla-682.wml
deleted file mode 100644
index 2b575713e49..00000000000
--- a/english/lts/security/2016/dla-682.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata up to 2016h for the
-Perl bindings. For the list of changes, see DLA-681-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2016h.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-682.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-683.data b/english/lts/security/2016/dla-683.data
deleted file mode 100644
index b5a787c19e0..00000000000
--- a/english/lts/security/2016/dla-683.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-683-1 graphicsmagick</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag secrefs>CVE-2016-7448 CVE-2016-7996 CVE-2016-7997 CVE-2016-8682 CVE-2016-8683 CVE-2016-8684</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-683.wml b/english/lts/security/2016/dla-683.wml
deleted file mode 100644
index 102966b386b..00000000000
--- a/english/lts/security/2016/dla-683.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the graphicsmagick package
-that may lead to denial of service through failed assertions, CPU or
-memory usage. Some vulnerabilities may also lead to code execution but
-no exploit is currently known.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7448">CVE-2016-7448</a>
-
- <p>Utah RLE: Reject truncated/absurd files which caused huge memory
- allocations and/or consumed huge CPU </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7996">CVE-2016-7996</a>
-
- <p>missing check that the provided colormap is not larger than 256
- entries resulting in potential heap overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7997">CVE-2016-7997</a>
-
- <p>denial of service via a crash due to an assertion</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8682">CVE-2016-8682</a>
-
- <p>stack-based buffer overflow in ReadSCTImage (sct.c)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8683">CVE-2016-8683</a>
-
- <p>memory allocation failure in ReadPCXImage (pcx.c)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8684">CVE-2016-8684</a>
-
- <p>memory allocation failure in MagickMalloc (memory.c)</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-683.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-684.data b/english/lts/security/2016/dla-684.data
deleted file mode 100644
index 3abb8d8fa6f..00000000000
--- a/english/lts/security/2016/dla-684.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-684-1 libx11</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag secrefs>CVE-2016-7942 CVE-2016-7943 Bug#840439</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-684.wml b/english/lts/security/2016/dla-684.wml
deleted file mode 100644
index 1dca3973402..00000000000
--- a/english/lts/security/2016/dla-684.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Stoeckmann from the OpenBSD project discovered the following
-vulnerability in libX11, the X11 client-side library:</p>
-
- <p>Insufficient validation of data from the X server
- can cause out of boundary memory read (XGetImage())
- or write (XListFonts()).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.5.0-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-684.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-685-2.data b/english/lts/security/2016/dla-685-2.data
deleted file mode 100644
index 77da5619c3a..00000000000
--- a/english/lts/security/2016/dla-685-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-685-2 libxi</define-tag>
-<define-tag report_date>2016-12-29</define-tag>
-<define-tag secrefs>Bug#849026</define-tag>
-<define-tag packages>libxi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-685-2.wml b/english/lts/security/2016/dla-685-2.wml
deleted file mode 100644
index 85c6419394c..00000000000
--- a/english/lts/security/2016/dla-685-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was found in the previous libxi update. An uninitialized
-pointer could be freed, causing crashes.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.6.1-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libxi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-685-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-685.data b/english/lts/security/2016/dla-685.data
deleted file mode 100644
index 4bc6a1f10d1..00000000000
--- a/english/lts/security/2016/dla-685.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-685-1 libxi</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag secrefs>CVE-2016-7945 CVE-2016-7946 Bug#840440</define-tag>
-<define-tag packages>libxi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-685.wml b/english/lts/security/2016/dla-685.wml
deleted file mode 100644
index 6318a316783..00000000000
--- a/english/lts/security/2016/dla-685.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Stoeckmann from the OpenBSD project discovered the following
-vulnerability in libXi, the X11 input extension library:</p>
-
- <p>Insufficient validation of data from the X server
- can cause out of boundary memory access or
- endless loops (Denial of Service).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.6.1-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-685.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-686.data b/english/lts/security/2016/dla-686.data
deleted file mode 100644
index 2949ac029a3..00000000000
--- a/english/lts/security/2016/dla-686.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-686-1 libxtst</define-tag>
-<define-tag report_date>2016-10-26</define-tag>
-<define-tag secrefs>CVE-2016-7951 CVE-2016-7952 Bug#840444</define-tag>
-<define-tag packages>libxtst</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-686.wml b/english/lts/security/2016/dla-686.wml
deleted file mode 100644
index be04479c636..00000000000
--- a/english/lts/security/2016/dla-686.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Stoeckmann from the OpenBSD project discovered the following
-vulnerability in libXtst, the X Record extension:</p>
-
- <p>Insufficient validation of data from the X server
- can cause out of boundary memory access or
- endless loops (Denial of Service).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.2.1-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxtst packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-686.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-687.data b/english/lts/security/2016/dla-687.data
deleted file mode 100644
index 9235ff81b2b..00000000000
--- a/english/lts/security/2016/dla-687.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-687-1 tre</define-tag>
-<define-tag report_date>2016-10-27</define-tag>
-<define-tag secrefs>CVE-2016-8859 Bug#842169</define-tag>
-<define-tag packages>tre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-687.wml b/english/lts/security/2016/dla-687.wml
deleted file mode 100644
index 8e7fe36bf53..00000000000
--- a/english/lts/security/2016/dla-687.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in the tre package that could allow an
-attacker to perform controlled heap corruption.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.0-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your tre packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-687.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-688.data b/english/lts/security/2016/dla-688.data
deleted file mode 100644
index 39465bc7a48..00000000000
--- a/english/lts/security/2016/dla-688.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-688-1 cairo</define-tag>
-<define-tag report_date>2016-10-28</define-tag>
-<define-tag secrefs>CVE-2016-9082 Bug##842289</define-tag>
-<define-tag packages>cairo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-688.wml b/english/lts/security/2016/dla-688.wml
deleted file mode 100644
index 01b276bdde3..00000000000
--- a/english/lts/security/2016/dla-688.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a possible DoS attack in Cairo, a
-multi-platform library providing vector-based rendering. An SVG could
-generate invalid pointers from a _cairo_image_surface in write_png.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in cairo version
-1.12.2-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your cairo packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-688.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-689.data b/english/lts/security/2016/dla-689.data
deleted file mode 100644
index 7e864486bfa..00000000000
--- a/english/lts/security/2016/dla-689.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-689-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-10-30</define-tag>
-<define-tag secrefs>CVE-2016-7909 CVE-2016-8909 CVE-2016-8910 Bug#839834 Bug#841950 Bug#841955 Bug#842455 Bug#842463</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-689.wml b/english/lts/security/2016/dla-689.wml
deleted file mode 100644
index 8b050f432f2..00000000000
--- a/english/lts/security/2016/dla-689.wml
+++ /dev/null
@@ -1,88 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in qemu-kvm, a full
-virtualization solution on x86 hardware based on Quick
-Emulator(Qemu). The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7909">CVE-2016-7909</a>
-
- <p>Quick Emulator(Qemu) built with the AMD PC-Net II emulator support is
- vulnerable to an infinite loop issue. It could occur while receiving
- packets via pcnet_receive().</p>
-
- <p>A privileged user/process inside guest could use this issue to crash
- the Qemu process on the host leading to DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8909">CVE-2016-8909</a>
-
- <p>Quick Emulator(Qemu) built with the Intel HDA controller emulation support
- is vulnerable to an infinite loop issue. It could occur while processing the
- DMA buffer stream while doing data transfer in <q>intel_hda_xfer</q>.</p>
-
- <p>A privileged user inside guest could use this flaw to consume excessive CPU
- cycles on the host, resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8910">CVE-2016-8910</a>
-
- <p>Quick Emulator(Qemu) built with the RTL8139 ethernet controller emulation
- support is vulnerable to an infinite loop issue. It could occur while
- transmitting packets in C+ mode of operation.</p>
-
- <p>A privileged user inside guest could use this flaw to consume
- excessive CPU cycles on the host, resulting in DoS situation.</p></li>
-
-</ul>
-
-<p>Further issues fixed where the CVE requests are pending:</p>
-
-<ul>
-
-<li>Quick Emulator(Qemu) built with the i8255x (PRO100) NIC emulation
- support is vulnerable to a memory leakage issue. It could occur while
- unplugging the device, and doing so repeatedly would result in leaking
- host memory affecting, other services on the host.
-
- <p>A privileged user inside guest could use this flaw to cause a DoS on the host
- and/or potentially crash the Qemu process on the host.</p></li>
-
-<li>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to a several memory
- leakage issues.
-
- <p>A privileged user inside guest could use this flaw to leak the host
- memory bytes resulting in DoS for other services.</p></li>
-
-<li>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an integer overflow
- issue. It could occur by accessing xattributes values.
-
- <p>A privileged user inside guest could use this flaw to crash the Qemu
- process instance resulting in DoS.</p></li>
-
-<li>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to memory leakage
- issue. It could occur while creating extended attribute via
- <q>Txattrcreate</q> message.
-
- <p>A privileged user inside guest could use this flaw to leak host
- memory, thus affecting other services on the host and/or potentially
- crash the Qemu process on the host.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u18.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-689.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-690.data b/english/lts/security/2016/dla-690.data
deleted file mode 100644
index cac6444f3a2..00000000000
--- a/english/lts/security/2016/dla-690.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-690-1 tar</define-tag>
-<define-tag report_date>2016-10-31</define-tag>
-<define-tag secrefs>CVE-2016-6321 Bug#842339</define-tag>
-<define-tag packages>tar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-690.wml b/english/lts/security/2016/dla-690.wml
deleted file mode 100644
index cafe8958d4d..00000000000
--- a/english/lts/security/2016/dla-690.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been discovered in the tar package that could allow
-an attacker to overwrite arbitrary files through crafted files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.26+dfsg-0.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your tar packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-690.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-691.data b/english/lts/security/2016/dla-691.data
deleted file mode 100644
index 18913bfbc67..00000000000
--- a/english/lts/security/2016/dla-691.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-691-1 libxml2</define-tag>
-<define-tag report_date>2016-10-31</define-tag>
-<define-tag secrefs>CVE-2016-4658 CVE-2016-5131</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-691.wml b/english/lts/security/2016/dla-691.wml
deleted file mode 100644
index bf3d309faed..00000000000
--- a/english/lts/security/2016/dla-691.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4658">CVE-2016-4658</a>
-
- <p>Namespace nodes must be copied to avoid use-after-free errors.
- But they don't necessarily have a physical representation in a
- document, so simply disallow them in XPointer ranges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5131">CVE-2016-5131</a>
-
- <p>The old code would invoke the broken xmlXPtrRangeToFunction.
- range-to isn't really a function but a special kind of
- location step. Remove this function and always handle range-to
- in the XPath code.
- The old xmlXPtrRangeToFunction could also be abused to trigger
- a use-after-free error with the potential for remote code
- execution.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy7.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-691.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-692.data b/english/lts/security/2016/dla-692.data
deleted file mode 100644
index 793e203a402..00000000000
--- a/english/lts/security/2016/dla-692.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-692-1 tiff3</define-tag>
-<define-tag report_date>2016-11-2</define-tag>
-<define-tag secrefs>CVE-2015-7554 CVE-2016-5318</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-692.wml b/english/lts/security/2016/dla-692.wml
deleted file mode 100644
index a6a74c7563c..00000000000
--- a/english/lts/security/2016/dla-692.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Applications using libtiff can trigger buffer overflows through
-TIFFGetField() when processing TIFF images with unknown tags.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u2.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-692.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-693.data b/english/lts/security/2016/dla-693.data
deleted file mode 100644
index 8bdcc96cccb..00000000000
--- a/english/lts/security/2016/dla-693.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-693-1 tiff</define-tag>
-<define-tag report_date>2016-11-2</define-tag>
-<define-tag secrefs>CVE-2014-8128 CVE-2015-7554 CVE-2015-8668 CVE-2016-3186 CVE-2016-3619 CVE-2016-3620 CVE-2016-3621 CVE-2016-3631 CVE-2016-3632 CVE-2016-3633 CVE-2016-3634 CVE-2016-5102 CVE-2016-5318 CVE-2016-5319 CVE-2016-5652 CVE-2016-6223 CVE-2016-8331 Bug#842043 Bug#842046 Bug#842361 Bug#842270</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-693.wml b/english/lts/security/2016/dla-693.wml
deleted file mode 100644
index 98a81f1c231..00000000000
--- a/english/lts/security/2016/dla-693.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The libtiff library and associated tools provided in libtiff-tools are
-vulnerable to many security problems.</p>
-
-<p>This update drops many tools which are no longer supported upstream
-and which are affected by multiple memory corruption issues:</p>
-
-<ul>
-<li>bmp2tiff (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3619">CVE-2016-3619</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3620">CVE-2016-3620</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3621">CVE-2016-3621</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5319">CVE-2016-5319</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2015-8668">CVE-2015-8668</a>)</li>
-<li>gif2tiff (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3186">CVE-2016-3186</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5102">CVE-2016-5102</a>)</li>
-<li>ras2tiff</li>
-<li>sgi2tiff</li>
-<li>sgisv</li>
-<li>ycbcr</li>
-<li>rgb2ycbcr (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3623">CVE-2016-3623</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3624">CVE-2016-3624</a>)</li>
-<li>thumbnail (<a href="https://security-tracker.debian.org/tracker/CVE-2016-3631">CVE-2016-3631</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3632">CVE-2016-3632</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3633">CVE-2016-3633</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3634">CVE-2016-3634</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8331">CVE-2016-8331</a>)</li>
-</ul>
-
-<p>This update also fixes the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8128">CVE-2014-8128</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2015-7554">CVE-2015-7554</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5318">CVE-2016-5318</a>
-
- <p>Multiple buffer overflows triggered through TIFFGetField() on unknown
- tags. Lacking an upstream fix, the list of known tags has been
- extended to cover all those that are in use by the TIFF tools.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5652">CVE-2016-5652</a>
-
- <p>Heap based buffer overflow in tiff2pdf.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6223">CVE-2016-6223</a>
-
- <p>Information leak in libtiff/tif_read.c. Fix out-of-bounds read on
- memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1()
- when stripoffset is beyond tmsize_t max value (reported by
- Mathias Svensson).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u7.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-693.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-694.data b/english/lts/security/2016/dla-694.data
deleted file mode 100644
index fc6c7c7dd25..00000000000
--- a/english/lts/security/2016/dla-694.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-694-1 libwmf</define-tag>
-<define-tag report_date>2016-11-2</define-tag>
-<define-tag secrefs>CVE-2016-9011 Bug#842090</define-tag>
-<define-tag packages>libwmf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-694.wml b/english/lts/security/2016/dla-694.wml
deleted file mode 100644
index c4cae5a3c86..00000000000
--- a/english/lts/security/2016/dla-694.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Agostino Sarubbo from Gentoo discovered a flaw in libwmf's Windows
-Metafile Format (WMF) parser which caused allocation of excessive
-amount of memory potentially leading to a crash.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.2.8.4-10.3+deb7u2.</p>
-
-<p>We recommend that you upgrade your libwmf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-694.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-695.data b/english/lts/security/2016/dla-695.data
deleted file mode 100644
index 606cd6a45e9..00000000000
--- a/english/lts/security/2016/dla-695.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-695-1 spip</define-tag>
-<define-tag report_date>2016-11-2</define-tag>
-<define-tag secrefs>CVE-2016-7980 CVE-2016-7981 CVE-2016-7982 CVE-2016-7998 CVE-2016-7999</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-695.wml b/english/lts/security/2016/dla-695.wml
deleted file mode 100644
index fd73662b07b..00000000000
--- a/english/lts/security/2016/dla-695.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in SPIP, a website
-engine for publishing written in PHP.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7980">CVE-2016-7980</a>
-
- <p>Nicolas Chatelain of Sysdream Labs discovered a cross-site request
- forgery (CSRF) vulnerability in the valider_xml action of SPIP. This
- allows remote attackers to make use of potential additional
- vulnerabilities such as the one described in <a href="https://security-tracker.debian.org/tracker/CVE-2016-7998">CVE-2016-7998</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7981">CVE-2016-7981</a>
-
- <p>Nicolas Chatelain of Sysdream Labs discovered a reflected cross-site
- scripting attack (XSS) vulnerability in the validater_xml action of
- SPIP. An attacker could take advantage of this vulnerability to
- inject arbitrary code by tricking an administrator to open a
- malicious link.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7982">CVE-2016-7982</a>
-
- <p>Nicolas Chatelain of Sysdream Labs discovered a file enumeration /
- path traversal attack in the validator_xml action of SPIP. An
- attacker could use this to enumerate files in an arbitrary directory
- on the file system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7998">CVE-2016-7998</a>
-
- <p>Nicolas Chatelain of Sysdream Labs discovered a possible PHP code
- execution vulnerability in the template compiler/composer function
- of SPIP. In combination with the XSS and CSRF vulnerabilities
- described in this advisory, a remote attacker could take advantage
- of this to execute arbitrary PHP code on the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7999">CVE-2016-7999</a>
-
- <p>Nicolas Chatelain of Sysdream Labs discovered a server side request
- forgery in the valider_xml action of SPIP. Attackers could take
- advantage of this vulnerability to send HTTP or FTP requests to
- remote servers that they don't have direct access to, possibly
- bypassing access controls such as a firewall.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.17-1+deb7u6.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-695.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-696.data b/english/lts/security/2016/dla-696.data
deleted file mode 100644
index 186264a669f..00000000000
--- a/english/lts/security/2016/dla-696.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-696-1 bind9</define-tag>
-<define-tag report_date>2016-11-2</define-tag>
-<define-tag secrefs>CVE-2016-8864</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-696.wml b/english/lts/security/2016/dla-696.wml
deleted file mode 100644
index af135c27fc4..00000000000
--- a/english/lts/security/2016/dla-696.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tony Finch and Marco Davids reported an assertion failure in BIND, a
-DNS server implementation, which causes the server process to
-terminate. This denial-of-service vulnerability is related to a
-defect in the processing of responses with DNAME records from
-authoritative servers and primarily affects recursive resolvers.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u13.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-696.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-697.data b/english/lts/security/2016/dla-697.data
deleted file mode 100644
index 76847f13fb6..00000000000
--- a/english/lts/security/2016/dla-697.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-697-1 bsdiff</define-tag>
-<define-tag report_date>2016-11-3</define-tag>
-<define-tag secrefs>CVE-2014-9862</define-tag>
-<define-tag packages>bsdiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-697.wml b/english/lts/security/2016/dla-697.wml
deleted file mode 100644
index e0954792486..00000000000
--- a/english/lts/security/2016/dla-697.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an <q>arbitrary write</q> vulnerability in bsdiff,
-a tool to patches between binary files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in bsdiff version
-4.3-14+deb7u1.</p>
-
-<p>We recommend that you upgrade your bsdiff packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-697.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-698.data b/english/lts/security/2016/dla-698.data
deleted file mode 100644
index dd3e38d2b1f..00000000000
--- a/english/lts/security/2016/dla-698.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-698-1 qemu</define-tag>
-<define-tag report_date>2016-11-3</define-tag>
-<define-tag secrefs>CVE-2016-7909 CVE-2016-8909 CVE-2016-8910 CVE-2016-9101 CVE-2016-9102 CVE-2016-9103 CVE-2016-9104 CVE-2016-9105 CVE-2016-9106 Bug#839834 Bug#841950 Bug#841955 Bug#842455 Bug#842463</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-698.wml b/english/lts/security/2016/dla-698.wml
deleted file mode 100644
index 7956641746a..00000000000
--- a/english/lts/security/2016/dla-698.wml
+++ /dev/null
@@ -1,90 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in qemu, a fast processor
-emulator. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7909">CVE-2016-7909</a>
-
- <p>Quick Emulator(Qemu) built with the AMD PC-Net II emulator support is
- vulnerable to an infinite loop issue. It could occur while receiving
- packets via pcnet_receive().</p>
-
- <p>A privileged user/process inside guest could use this issue to crash
- the Qemu process on the host leading to DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8909">CVE-2016-8909</a>
-
- <p>Quick Emulator(Qemu) built with the Intel HDA controller emulation support
- is vulnerable to an infinite loop issue. It could occur while processing the
- DMA buffer stream while doing data transfer in <q>intel_hda_xfer</q>.</p>
-
- <p>A privileged user inside guest could use this flaw to consume excessive CPU
- cycles on the host, resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8910">CVE-2016-8910</a>
-
- <p>Quick Emulator(Qemu) built with the RTL8139 ethernet controller emulation
- support is vulnerable to an infinite loop issue. It could occur while
- transmitting packets in C+ mode of operation.</p>
-
- <p>A privileged user inside guest could use this flaw to consume
- excessive CPU cycles on the host, resulting in DoS situation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9101">CVE-2016-9101</a>
-
- <p>Quick Emulator(Qemu) built with the i8255x (PRO100) NIC emulation
- support is vulnerable to a memory leakage issue. It could occur while
- unplugging the device, and doing so repeatedly would result in leaking
- host memory affecting, other services on the host.</p>
-
- <p>A privileged user inside guest could use this flaw to cause a DoS on the host
- and/or potentially crash the Qemu process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9102">CVE-2016-9102</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9105">CVE-2016-9105</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9106">CVE-2016-9106</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to a several memory
- leakage issues.</p>
-
- <p>A privileged user inside guest could use this flaws to leak the host
- memory bytes resulting in DoS for other services.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9104">CVE-2016-9104</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an integer overflow
- issue. It could occur by accessing xattributes values.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the Qemu
- process instance resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9103">CVE-2016-9103</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an information
- leakage issue. It could occur by accessing xattribute value before
- it's written to.</p>
-
- <p>A privileged user inside guest could use this flaw to leak host memory
- bytes.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u18.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-698.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-699.data b/english/lts/security/2016/dla-699.data
deleted file mode 100644
index 4e58803fc14..00000000000
--- a/english/lts/security/2016/dla-699.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-699-1 xen</define-tag>
-<define-tag report_date>2016-11-3</define-tag>
-<define-tag secrefs>CVE-2016-7777</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-699.wml b/english/lts/security/2016/dla-699.wml
deleted file mode 100644
index 5eaee29c9f8..00000000000
--- a/english/lts/security/2016/dla-699.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Xen does not properly honor CR0.TS and CR0.EM, which allows local x86
-HVM guest OS users to read or modify FPU, MMX, or XMM register state
-information belonging to arbitrary tasks on the guest by modifying an
-instruction while the hypervisor is preparing to emulate it.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-3.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-699.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-700.data b/english/lts/security/2016/dla-700.data
deleted file mode 100644
index 0e67d47f5ad..00000000000
--- a/english/lts/security/2016/dla-700.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-700-1 libxslt</define-tag>
-<define-tag report_date>2016-11-5</define-tag>
-<define-tag secrefs>CVE-2016-4738 Bug#842570</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-700.wml b/english/lts/security/2016/dla-700.wml
deleted file mode 100644
index fad4cc40c7b..00000000000
--- a/english/lts/security/2016/dla-700.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap overread bug was found in libxslt, which can cause arbitrary
-code execution or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.26-14.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-700.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-701.data b/english/lts/security/2016/dla-701.data
deleted file mode 100644
index 1201c262fcc..00000000000
--- a/english/lts/security/2016/dla-701.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-701-1 memcached</define-tag>
-<define-tag report_date>2016-11-5</define-tag>
-<define-tag secrefs>CVE-2013-7291 CVE-2016-8704 CVE-2016-8705 CVE-2016-8706 Bug#735314 Bug#842811 Bug#842812 Bug#842814</define-tag>
-<define-tag packages>memcached</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-701.wml b/english/lts/security/2016/dla-701.wml
deleted file mode 100644
index 3c3f5eb1429..00000000000
--- a/english/lts/security/2016/dla-701.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilites have been found in memcached, a high-performance
-memory object caching system. A remote attacker could take advantage of
-these flaws to cause a denial of service (daemon crash), or potentially
-to execute arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7291">CVE-2013-7291</a>
-
- <p>It was discovered that memcached, when running in verbose mode, can
- be crashed by sending carefully crafted requests that trigger an
- unbounded key print, resulting in a daemon crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8704">CVE-2016-8704</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8705">CVE-2016-8705</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8706">CVE-2016-8706</a>
-
- <p>Aleksandar Nikolic of Cisco Talos found several vulnerabilities in
- memcached. A remote attacker could cause an integer overflow by
- sending carefully crafted requests to the memcached server,
- resulting in a daemon crash.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.13-0.2+deb7u2.</p>
-
-<p>We recommend that you upgrade your memcached packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-701.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-702.data b/english/lts/security/2016/dla-702.data
deleted file mode 100644
index 00ad39f04d1..00000000000
--- a/english/lts/security/2016/dla-702.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-702-1 tzdata</define-tag>
-<define-tag report_date>2016-11-6</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-702.wml b/english/lts/security/2016/dla-702.wml
deleted file mode 100644
index 759799d83ed..00000000000
--- a/english/lts/security/2016/dla-702.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2016i. Notable
-changes are:</p>
-
-<ul>
-<li>Pacific/Tongatapu (DST starting on 2016-11-06 at 02:00).</li>
-<li>Northern Cyprus is now +03 year round, the Asia/Famagusta zone has
- been added.</li>
-<li>Antarctica/Casey (switched from +08 to +11 on 2016-10-22).</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2016i-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-702.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-703.data b/english/lts/security/2016/dla-703.data
deleted file mode 100644
index 2a12c8a43d6..00000000000
--- a/english/lts/security/2016/dla-703.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-703-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2016-11-6</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-703.wml b/english/lts/security/2016/dla-703.wml
deleted file mode 100644
index 43b572e6b33..00000000000
--- a/english/lts/security/2016/dla-703.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2016i for the
-Perl bindings. For the list of changes, see DLA-702-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2016i.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-703.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-704.data b/english/lts/security/2016/dla-704.data
deleted file mode 100644
index 18a96fdec18..00000000000
--- a/english/lts/security/2016/dla-704.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-704-1 openjdk-7</define-tag>
-<define-tag report_date>2016-11-6</define-tag>
-<define-tag secrefs>CVE-2016-5542 CVE-2016-5554 CVE-2016-5573 CVE-2016-5582 CVE-2016-5597 Bug#841692</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-704.wml b/english/lts/security/2016/dla-704.wml
deleted file mode 100644
index c412d7ae07b..00000000000
--- a/english/lts/security/2016/dla-704.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in
-information disclosure, denial of service and arbitrary code
-execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u111-2.6.7-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-704.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-705.data b/english/lts/security/2016/dla-705.data
deleted file mode 100644
index ded0ab5d874..00000000000
--- a/english/lts/security/2016/dla-705.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-705-1 python-imaging</define-tag>
-<define-tag report_date>2016-11-7</define-tag>
-<define-tag secrefs>CVE-2016-9189 CVE-2016-9190</define-tag>
-<define-tag packages>python-imaging</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-705.wml b/english/lts/security/2016/dla-705.wml
deleted file mode 100644
index a37842972dc..00000000000
--- a/english/lts/security/2016/dla-705.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were a number of memory overflow issues in in
-python-imaging, a Python image manipulation library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-imaging version
-1.1.7-4+deb7u3.</p>
-
-<p>We recommend that you upgrade your python-imaging packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-705.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-706.data b/english/lts/security/2016/dla-706.data
deleted file mode 100644
index e1e537bc5e8..00000000000
--- a/english/lts/security/2016/dla-706.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-706-1 python-django</define-tag>
-<define-tag report_date>2016-11-14</define-tag>
-<define-tag secrefs>CVE-2016-9014 Bug#842856</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-706.wml b/english/lts/security/2016/dla-706.wml
deleted file mode 100644
index a433fb96ba0..00000000000
--- a/english/lts/security/2016/dla-706.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A DNS rebinding vulnerability was found in python-django when DEBUG=True.
-An attacker could attack services listening on localhost.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.22-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-706.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-707.data b/english/lts/security/2016/dla-707.data
deleted file mode 100644
index 401d704d008..00000000000
--- a/english/lts/security/2016/dla-707.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-707-1 sudo</define-tag>
-<define-tag report_date>2016-11-14</define-tag>
-<define-tag secrefs>CVE-2016-7032 CVE-2016-7076 Bug#842507</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-707.wml b/english/lts/security/2016/dla-707.wml
deleted file mode 100644
index b8a0ae1d15b..00000000000
--- a/english/lts/security/2016/dla-707.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the sudo noexec restriction could have been
-bypassed if application run via sudo executed system(), popen() or
-wordexp() C library functions with a user supplied argument. A local
-user permitted to run such application via sudo with noexec
-restriction could possibly use this flaw to execute arbitrary commands
-with elevated privileges.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7032">CVE-2016-7032</a>
-
- <p>noexec bypass via system() and popen()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7076">CVE-2016-7076</a>
-
- <p>noexec bypass via wordexp()</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.5p2-1+nmu3+deb7u2.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-707.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-708.data b/english/lts/security/2016/dla-708.data
deleted file mode 100644
index 8fe093a42d8..00000000000
--- a/english/lts/security/2016/dla-708.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-708-1 mysql-5.5</define-tag>
-<define-tag report_date>2016-11-16</define-tag>
-<define-tag secrefs>CVE-2016-5584 CVE-2016-7440 Bug#841050</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-708.wml b/english/lts/security/2016/dla-708.wml
deleted file mode 100644
index a3a793b52cf..00000000000
--- a/english/lts/security/2016/dla-708.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.53, which includes additional changes, such as performance
-improvements, bug fixes, new features, and possibly incompatible
-changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
-<ul>
- <li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html">https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html</a></li>
- <li><a href="http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html">http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html</a></li>
-</ul>
-
-<p>Also note that packaging will now create /var/lib/mysql-files, as
-server will now by default restrict all import/export operations to
-this directory.This can be changed using the secure-file-priv
-configuration option.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.53-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-708.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-709.data b/english/lts/security/2016/dla-709.data
deleted file mode 100644
index 3c424be7094..00000000000
--- a/english/lts/security/2016/dla-709.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-709-1 postgresql-9.1</define-tag>
-<define-tag report_date>2016-11-16</define-tag>
-<define-tag packages>postgresql-9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-709.wml b/english/lts/security/2016/dla-709.wml
deleted file mode 100644
index c5d741877a8..00000000000
--- a/english/lts/security/2016/dla-709.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p>Several bugs were discovered in PostgreSQL, a relational database server
- system. This update corrects various stability issues.</p>
-
- <p>9.1.24 marks the end of life of the PostgreSQL 9.1 branch. No further
- releases will be made by the PostgreSQL Global Development Group.</p>
-
- <p>Users of PostgreSQL 9.1 should look into upgrading to a newer PostgreSQL
- release. Options are:</p>
-
-<ul>
-
- <li>Upgrading to Debian 8 (Jessie), providing postgresql-9.4.</li>
-
- <li><p>The use of the apt.postgresql.org repository, providing packages for all
- active PostgreSQL branches (9.2 up to 9.6 at the time of writing).</p>
-
- <p>See <a href="https://wiki.postgresql.org/wiki/Apt">https://wiki.postgresql.org/wiki/Apt</a> for more information about the
- repository.</p>
-
- <p>A helper script to activate the repository is provided in
- /usr/share/doc/postgresql-9.1/examples/apt.postgresql.org.sh.gz.</p></li>
-
- <li><p>In Debian, an LTS version of 9.1 is in planning that will cover the
- lifetime of wheezy-lts. Updates will made on a best-effort basis. Users
- can take advantage of this, but should still consider upgrading to newer
- PostgreSQL versions over the next months.</p>
-
- <p>See <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a> for more information about Debian LTS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in postgresql-9.1 version 9.1.24-0+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-709.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-710.data b/english/lts/security/2016/dla-710.data
deleted file mode 100644
index 8f5399d3dc5..00000000000
--- a/english/lts/security/2016/dla-710.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-710-1 akonadi</define-tag>
-<define-tag report_date>2016-11-17</define-tag>
-<define-tag secrefs>Bug#843534</define-tag>
-<define-tag packages>akonadi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-710.wml b/english/lts/security/2016/dla-710.wml
deleted file mode 100644
index 91726f8510d..00000000000
--- a/english/lts/security/2016/dla-710.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In some configurations the MySQL storage backend for Akonadi, an
-extensible cross-desktop Personal Information Management (PIM)
-storage service failed to start after applying the MySQL 5.5.53
-security upgrade.</p>
-
-<p>This update extends the /etc/akonadi/mysql-global.conf configuration
-file to restore compatibility (version 1.7.2-3+deb7u1 in Wheezy).</p>
-
-<p>We recommend that you upgrade your akonadi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in akonadi version 1.7.2-3+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-710.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-711.data b/english/lts/security/2016/dla-711.data
deleted file mode 100644
index 487533b504f..00000000000
--- a/english/lts/security/2016/dla-711.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-711-1 curl</define-tag>
-<define-tag report_date>2016-11-17</define-tag>
-<define-tag secrefs>CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-711.wml b/english/lts/security/2016/dla-711.wml
deleted file mode 100644
index 3b2a034fd92..00000000000
--- a/english/lts/security/2016/dla-711.wml
+++ /dev/null
@@ -1,115 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8615">CVE-2016-8615</a>
-
- <p>If cookie state is written into a cookie jar file that is later read
- back and used for subsequent requests, a malicious HTTP server can
- inject new cookies for arbitrary domains into said cookie jar.
- The issue pertains to the function that loads cookies into memory, which
- reads the specified file into a fixed-size buffer in a line-by-line
- manner using the `fgets()` function. If an invocation of fgets() cannot
- read the whole line into the destination buffer due to it being too
- small, it truncates the output.
- This way, a very long cookie (name + value) sent by a malicious server
- would be stored in the file and subsequently that cookie could be read
- partially and crafted correctly, it could be treated as a different
- cookie for another server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8616">CVE-2016-8616</a>
-
- <p>When re-using a connection, curl was doing case insensitive comparisons
- of user name and password with the existing connections.
- This means that if an unused connection with proper credentials exists
- for a protocol that has connection-scoped credentials, an attacker can
- cause that connection to be reused if s/he knows the case-insensitive
- version of the correct password.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8617">CVE-2016-8617</a>
-
- <p>In libcurl's base64 encode function, the output buffer is allocated
- as follows without any checks on insize:
- malloc( insize * 4 / 3 + 4 )
- On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32),
- the multiplication in the expression wraps around if insize is at
- least 1GB of data. If this happens, an undersized output buffer will
- be allocated, but the full result will be written, thus causing the
- memory behind the output buffer to be overwritten.
- Systems with 64 bit versions of the `size_t` type are not affected
- by this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8618">CVE-2016-8618</a>
-
- <p>The libcurl API function called `curl_maprintf()` can be tricked into
- doing a double-free due to an unsafe `size_t` multiplication, on
- systems using 32 bit `size_t` variables. The function is also used
- internallty in numerous situations.
- Systems with 64 bit versions of the `size_t` type are not affected
- by this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8619">CVE-2016-8619</a>
-
- <p>In curl's implementation of the Kerberos authentication mechanism,
- the function `read_data()` in security.c is used to fill the
- necessary krb5 structures. When reading one of the length fields from
- the socket, it fails to ensure that the length parameter passed to
- realloc() is not set to 0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8621">CVE-2016-8621</a>
-
- <p>The `curl_getdate` converts a given date string into a numerical
- timestamp and it supports a range of different formats and
- possibilites to express a date and time. The underlying date
- parsing function is also used internally when parsing for example
- HTTP cookies (possibly received from remote servers) and it can be
- used when doing conditional HTTP requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8622">CVE-2016-8622</a>
-
- <p>The URL percent-encoding decode function in libcurl is called
- `curl_easy_unescape`. Internally, even if this function would be
- made to allocate a unescape destination buffer larger than 2GB, it
- would return that new length in a signed 32 bit integer variable,
- thus the length would get either just truncated or both truncated
- and turned negative. That could then lead to libcurl writing outside
- of its heap based buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8623">CVE-2016-8623</a>
-
- <p>libcurl explicitly allows users to share cookies between multiple
- easy handles that are concurrently employed by different threads.
- When cookies to be sent to a server are collected, the matching
- function collects all cookies to send and the cookie lock is released
- immediately afterwards. That function however only returns a list with
- *references* back to the original strings for name, value, path and so
- on. Therefore, if another thread quickly takes the lock and frees one
- of the original cookie structs together with its strings,
- a use-after-free can occur and lead to information disclosure. Another
- thread can also replace the contents of the cookies from separate HTTP
- responses or API calls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8624">CVE-2016-8624</a>
-
- <p>curl doesn't parse the authority component of the URL correctly when
- the host name part ends with a '#' character, and could instead be
- tricked into connecting to a different host. This may have security
- implications if you for example use an URL parser that follows the RFC
- to check for allowed domains before using curl to request them.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.26.0-1+wheezy17.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-711.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-712.data b/english/lts/security/2016/dla-712.data
deleted file mode 100644
index b39a0d81da9..00000000000
--- a/english/lts/security/2016/dla-712.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-712-1 gst-plugins-bad0.10</define-tag>
-<define-tag report_date>2016-11-19</define-tag>
-<define-tag secrefs>CVE-2016-9445 CVE-2016-9446 CVE-2016-9447</define-tag>
-<define-tag packages>gst-plugins-bad0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-712.wml b/english/lts/security/2016/dla-712.wml
deleted file mode 100644
index e4e60f95597..00000000000
--- a/english/lts/security/2016/dla-712.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9445">CVE-2016-9445</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9446">CVE-2016-9446</a>
-
- <p>Chris Evans discovered that the GStreamer plugin to decode VMware screen
- capture files allowed the execution of arbitrary code. He also found that
- an initialized buffer may lead into memory disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9447">CVE-2016-9447</a>
-
- <p>Chris Evans discovered that the GStreamer 0.10 plugin to decode NES
- Sound Format files allowed the execution of arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.23-7.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-712.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-713.data b/english/lts/security/2016/dla-713.data
deleted file mode 100644
index 61879f0e2bd..00000000000
--- a/english/lts/security/2016/dla-713.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-713-1 sniffit</define-tag>
-<define-tag report_date>2016-11-21</define-tag>
-<define-tag secrefs>CVE-2014-5439 Bug#845122</define-tag>
-<define-tag packages>sniffit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-713.wml b/english/lts/security/2016/dla-713.wml
deleted file mode 100644
index bfd107fd674..00000000000
--- a/english/lts/security/2016/dla-713.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a buffer overflow in the packet sniffer and
-monitoring tool <q>sniffit</q> which allowed a specially-crafted configuration file
-to provide a root shell.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in sniffit version
-0.3.7.beta-16.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your sniffit packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-713.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-714.data b/english/lts/security/2016/dla-714.data
deleted file mode 100644
index fee99a5b378..00000000000
--- a/english/lts/security/2016/dla-714.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-714-1 wireshark</define-tag>
-<define-tag report_date>2016-11-21</define-tag>
-<define-tag secrefs>CVE-2016-9373 CVE-2016-9374 CVE-2016-9375 CVE-2016-9376</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-714.wml b/english/lts/security/2016/dla-714.wml
deleted file mode 100644
index 806ff44fcb7..00000000000
--- a/english/lts/security/2016/dla-714.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following vulnerabilities have been discovered in the Debian
-Wheezy's Wireshark version:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9373">CVE-2016-9373</a>
-
- <p>The DCERPC dissector could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9374">CVE-2016-9374</a>
-
- <p>The AllJoyn dissector could crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9375">CVE-2016-9375</a>
-
- <p>The DTN dissector could ender an infinite loop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9376">CVE-2016-9376</a>
-
- <p>The OpenFlow dissector could crash</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u5.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-714.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-715.data b/english/lts/security/2016/dla-715.data
deleted file mode 100644
index 06eac3f2dcc..00000000000
--- a/english/lts/security/2016/dla-715.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-715-1 drupal7</define-tag>
-<define-tag report_date>2016-11-21</define-tag>
-<define-tag secrefs>CVE-2016-9449 CVE-2016-9451</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-715.wml b/english/lts/security/2016/dla-715.wml
deleted file mode 100644
index aa2239ebae0..00000000000
--- a/english/lts/security/2016/dla-715.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in the Drupal content
-management framework. For additional information, please refer to the
-upstream advisory at <a href="https://www.drupal.org/SA-CORE-2016-005.">https://www.drupal.org/SA-CORE-2016-005.</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.14-2+deb7u15.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-715.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-716.data b/english/lts/security/2016/dla-716.data
deleted file mode 100644
index f2ffac81f71..00000000000
--- a/english/lts/security/2016/dla-716.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-716-1 tiff</define-tag>
-<define-tag report_date>2016-11-22</define-tag>
-<define-tag secrefs>CVE-2016-9273 CVE-2016-9297 CVE-2016-9532 Bug#844013 Bug#844226 Bug#844057</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-716.wml b/english/lts/security/2016/dla-716.wml
deleted file mode 100644
index ee6fc83d4ea..00000000000
--- a/english/lts/security/2016/dla-716.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple memory corruption issues have been identified in libtiff
-and its associated tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9273">CVE-2016-9273</a>
-
- <p>Heap buffer overflow in cpStrips().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9297">CVE-2016-9297</a>
-
- <p>Read outside buffer in _TIFFPrintField().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9532">CVE-2016-9532</a>
-
- <p>Heap buffer overflow via writeBufferToSeparateStrips().</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u8.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-716.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-717.data b/english/lts/security/2016/dla-717.data
deleted file mode 100644
index b7eacaaba6e..00000000000
--- a/english/lts/security/2016/dla-717.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-717-1 moin</define-tag>
-<define-tag report_date>2016-11-22</define-tag>
-<define-tag secrefs>CVE-2016-7146 CVE-2016-9119 Bug#844338 Bug#844340</define-tag>
-<define-tag packages>moin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-717.wml b/english/lts/security/2016/dla-717.wml
deleted file mode 100644
index 03a3ab73126..00000000000
--- a/english/lts/security/2016/dla-717.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several cross-site scripting vulnerabilities were discovered in moin, a
-Python clone of WikiWiki. A remote attacker can conduct cross-site
-scripting attacks via the GUI editor's attachment dialogue
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-7146">CVE-2016-7146</a>)
-and the GUI editor's link dialogue (<a href="https://security-tracker.debian.org/tracker/CVE-2016-9119">CVE-2016-9119</a>).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.4-8+deb7u3.</p>
-
-<p>We recommend that you upgrade your moin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-717.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-718.data b/english/lts/security/2016/dla-718.data
deleted file mode 100644
index d88e17eb944..00000000000
--- a/english/lts/security/2016/dla-718.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-718-1 vim</define-tag>
-<define-tag report_date>2016-11-22</define-tag>
-<define-tag secrefs>CVE-2016-1248</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-718.wml b/english/lts/security/2016/dla-718.wml
deleted file mode 100644
index bef796d5b1b..00000000000
--- a/english/lts/security/2016/dla-718.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Florian Larysch and Bram Moolenaar discovered that vim, an enhanced vi
-editor, does not properly validate values for the the <q>filetype</q>,
-<q>syntax</q> and <q>keymap</q> options, which may result in the execution of
-arbitrary code if a file with a specially crafted modeline is opened.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:7.3.547-7+deb7u1.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-718.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-719.data b/english/lts/security/2016/dla-719.data
deleted file mode 100644
index 69b99edac6a..00000000000
--- a/english/lts/security/2016/dla-719.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-719-1 lynx-cur</define-tag>
-<define-tag report_date>2016-11-24</define-tag>
-<define-tag secrefs>CVE-2016-9179</define-tag>
-<define-tag packages>lynx-cur</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-719.wml b/english/lts/security/2016/dla-719.wml
deleted file mode 100644
index c705ddc6d8f..00000000000
--- a/english/lts/security/2016/dla-719.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Current versions of lynx have incorrect parsing of the URL. In certian
-circumstances the hostname will be incorrectly derived after the '?' character.
-This could lead to lynx incorrectly going to the wrong website.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.8dev.12-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your lynx-cur packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-719.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-720.data b/english/lts/security/2016/dla-720.data
deleted file mode 100644
index 871cb34f976..00000000000
--- a/english/lts/security/2016/dla-720.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-720-1 xen</define-tag>
-<define-tag report_date>2016-11-24</define-tag>
-<define-tag secrefs>CVE-2016-9379 CVE-2016-9380 CVE-2016-9381 CVE-2016-9382 CVE-2016-9383 CVE-2016-9386</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-720.wml b/english/lts/security/2016/dla-720.wml
deleted file mode 100644
index 4a21328e756..00000000000
--- a/english/lts/security/2016/dla-720.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9379">CVE-2016-9379</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9380">CVE-2016-9380</a> (XSA-198)
-
- <p>pygrub, the boot loader emulator, fails to quote (or sanity check)
- its results when reporting them to its caller. A malicious guest
- administrator can obtain the contents of sensitive host files</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9381">CVE-2016-9381</a> (XSA-197)
-
- <p>The compiler can emit optimizations in qemu which can lead to double
- fetch vulnerabilities. Malicious administrators can exploit this
- vulnerability to take over the qemu process, elevating its privilege
- to that of the qemu process. </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9382">CVE-2016-9382</a> (XSA-192)
-
- <p>LDTR, just like TR, is purely a protected mode facility. Hence even
- when switching to a VM86 mode task, LDTR loading needs to follow
- protected mode semantics. A malicious unprivileged guest process
- can crash or escalate its privilege to that of the guest operating
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9383">CVE-2016-9383</a> (XSA-195)
-
- <p>When Xen needs to emulate some instruction, to efficiently handle
- the emulation, the memory address and register operand are
- recalculated internally to Xen. In this process, the high bits of
- an intermediate expression were discarded, leading to both the
- memory location and the register operand being wrong. A malicious
- guest can modify arbitrary memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9386">CVE-2016-9386</a> (XSA-191)
-
- <p>The Xen x86 emulator erroneously failed to consider the unusability
- of segments when performing memory accesses. An unprivileged guest
- user program may be able to elevate its privilege to that of the
- guest operating system.</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-4. For Debian 8 <q>Jessie</q>, these problems will be fixed shortly.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-720.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-721.data b/english/lts/security/2016/dla-721.data
deleted file mode 100644
index 64aa138a95d..00000000000
--- a/english/lts/security/2016/dla-721.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-721-1 libgc</define-tag>
-<define-tag report_date>2016-11-25</define-tag>
-<define-tag secrefs>CVE-2016-9427 Bug#844771</define-tag>
-<define-tag packages>libgc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-721.wml b/english/lts/security/2016/dla-721.wml
deleted file mode 100644
index a762e2012cb..00000000000
--- a/english/lts/security/2016/dla-721.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libgc is vulnerable to integer overflows in multiple places. In some cases,
-when asked to allocate a huge quantity of memory, instead of failing the
-request, it will return a pointer to a small amount of memory possibly
-tricking the application into a buffer overwrite.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:7.1-9.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libgc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-721.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-722.data b/english/lts/security/2016/dla-722.data
deleted file mode 100644
index 6f38fc0d3e4..00000000000
--- a/english/lts/security/2016/dla-722.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-722-1 irssi</define-tag>
-<define-tag report_date>2016-11-25</define-tag>
-<define-tag secrefs>CVE-2016-7553 Bug#838762</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-722.wml b/english/lts/security/2016/dla-722.wml
deleted file mode 100644
index 78b41a150a2..00000000000
--- a/english/lts/security/2016/dla-722.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An information disclosure vulnerability was found in irssi.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7553">CVE-2016-7553</a>
-
- <p>Other users on the same machine as the user running irssi with
- buf.pl loaded may be able to retrieve the whole window contents
- after /UPGRADE.
- Furthermore, this dump of the windows contents is never removed
- afterwards.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problems have been fixed in version
-0.8.15-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-722.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-723.data b/english/lts/security/2016/dla-723.data
deleted file mode 100644
index 7e7c6df7abc..00000000000
--- a/english/lts/security/2016/dla-723.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-723-1 libsoap-lite-perl</define-tag>
-<define-tag report_date>2016-11-25</define-tag>
-<define-tag secrefs>CVE-2015-8978</define-tag>
-<define-tag packages>libsoap-lite-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-723.wml b/english/lts/security/2016/dla-723.wml
deleted file mode 100644
index f627859cede..00000000000
--- a/english/lts/security/2016/dla-723.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a <q>Billion Laughs</q> [0] XML expansion
-vulnerability in libsoap-lite-perl, a Perl implementation of a SOAP [1] client
-and server.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libsoap-lite-perl version
-0.714-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libsoap-lite-perl packages.</p>
-
- <p>[0] <a href="https://en.wikipedia.org/wiki/Billion_laughs">https://en.wikipedia.org/wiki/Billion_laughs</a><br>
- [1] <a href="https://en.wikipedia.org/wiki/SOAP">https://en.wikipedia.org/wiki/SOAP</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-723.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-724.data b/english/lts/security/2016/dla-724.data
deleted file mode 100644
index 40a0bcc0dbb..00000000000
--- a/english/lts/security/2016/dla-724.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-724-1 mcabber</define-tag>
-<define-tag report_date>2016-11-27</define-tag>
-<define-tag secrefs>Bug#845258</define-tag>
-<define-tag packages>mcabber</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-724.wml b/english/lts/security/2016/dla-724.wml
deleted file mode 100644
index 1775b4ffd7c..00000000000
--- a/english/lts/security/2016/dla-724.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a <q>roster push attack</q> [0] in mcabber, a
-console-based Jabber (XMPP) client.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in mcabber version
-0.10.1-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your mcabber packages.</p>
-
- <p>[0] <a href="https://gultsch.de/gajim_roster_push_and_message_interception.html">https://gultsch.de/gajim_roster_push_and_message_interception.html</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-724.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-725.data b/english/lts/security/2016/dla-725.data
deleted file mode 100644
index aff5d7996c9..00000000000
--- a/english/lts/security/2016/dla-725.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-725-1 tzdata</define-tag>
-<define-tag report_date>2016-11-29</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-725.wml b/english/lts/security/2016/dla-725.wml
deleted file mode 100644
index 3f1ca92e899..00000000000
--- a/english/lts/security/2016/dla-725.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2016j. Notable
-changes are:</p>
-
-<ul>
-<li>Saratov, Russia switches from +03 to +04 on 2016-12-04 at 02:00.</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2016j-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-725.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-726.data b/english/lts/security/2016/dla-726.data
deleted file mode 100644
index e6426f417c1..00000000000
--- a/english/lts/security/2016/dla-726.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-726-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2016-11-30</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-726.wml b/english/lts/security/2016/dla-726.wml
deleted file mode 100644
index 82c7b1169c7..00000000000
--- a/english/lts/security/2016/dla-726.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2016j for the
-Perl bindings. For the list of changes, see DLA-725-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2016j.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-726.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-727.data b/english/lts/security/2016/dla-727.data
deleted file mode 100644
index e853192530c..00000000000
--- a/english/lts/security/2016/dla-727.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-727-1 gst-plugins-good0.10</define-tag>
-<define-tag report_date>2016-11-30</define-tag>
-<define-tag secrefs>CVE-2016-9634 CVE-2016-9635 CVE-2016-9636</define-tag>
-<define-tag packages>gst-plugins-good0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-727.wml b/english/lts/security/2016/dla-727.wml
deleted file mode 100644
index 902cf9ecd4f..00000000000
--- a/english/lts/security/2016/dla-727.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chris Evans discovered that the GStreamer 0.10 plugin used to decode
-files in the FLIC format allowed execution of arbitrary code. Further
-details can be found in his advisory at
-<a href="https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html">\
-https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html</a></p>
-
-<p>This update removes the insecure FLIC file format plugin.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.31-3+nmu1+deb7u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-good0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-727.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-728.data b/english/lts/security/2016/dla-728.data
deleted file mode 100644
index 523c6633bcd..00000000000
--- a/english/lts/security/2016/dla-728.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-728-1 tomcat6</define-tag>
-<define-tag report_date>2016-12-1</define-tag>
-<define-tag secrefs>CVE-2016-0762 CVE-2016-5018 CVE-2016-6794 CVE-2016-6796 CVE-2016-6797 CVE-2016-6816 CVE-2016-8735 Bug#841655 Bug#842662 Bug#842663 Bug#842664 Bug#842665 Bug#842666 Bug#845385</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-728.wml b/english/lts/security/2016/dla-728.wml
deleted file mode 100644
index b7f99e010f4..00000000000
--- a/english/lts/security/2016/dla-728.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine, which may result in possible timing attacks to
-determine valid user names, bypass of the SecurityManager, disclosure of
-system properties, unrestricted access to global resources, arbitrary
-file overwrites, and potentially escalation of privileges.</p>
-
-<p>In addition this update further hardens Tomcat's init and maintainer
-scripts to prevent possible privilege escalations. Thanks to Paul
-Szabo for the report.</p>
-
-<p>This is probably the last security update of Tomcat 6 which will reach
-its end-of-life exactly in one month. We strongly recommend to switch
-to another supported version such as Tomcat 7 at your earliest
-convenience.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.0.45+dfsg-1~deb7u3.</p>
-
-<p>We recommend that you upgrade your tomcat6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-728.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-729.data b/english/lts/security/2016/dla-729.data
deleted file mode 100644
index dcbad809637..00000000000
--- a/english/lts/security/2016/dla-729.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-729-1 tomcat7</define-tag>
-<define-tag report_date>2016-12-1</define-tag>
-<define-tag secrefs>CVE-2016-0762 CVE-2016-5018 CVE-2016-6794 CVE-2016-6796 CVE-2016-6797 CVE-2016-6816 CVE-2016-8735 Bug#841655 Bug#842662 Bug#842663 Bug#842664 Bug#842665 Bug#842666 Bug#845385</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-729.wml b/english/lts/security/2016/dla-729.wml
deleted file mode 100644
index 3f961d96fbb..00000000000
--- a/english/lts/security/2016/dla-729.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine, which may result in possible timing attacks to
-determine valid user names, bypass of the SecurityManager, disclosure of
-system properties, unrestricted access to global resources, arbitrary
-file overwrites, and potentially escalation of privileges.</p>
-
-<p>In addition this update further hardens Tomcat's init and maintainer
-scripts to prevent possible privilege escalations. Thanks to Paul
-Szabo for the report.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u7.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-729.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-730.data b/english/lts/security/2016/dla-730.data
deleted file mode 100644
index 6bcd685f96f..00000000000
--- a/english/lts/security/2016/dla-730.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-730-1 firefox-esr</define-tag>
-<define-tag report_date>2016-12-1</define-tag>
-<define-tag secrefs>CVE-2016-5290 CVE-2016-5291 CVE-2016-5296 CVE-2016-5297 CVE-2016-9064 CVE-2016-9066</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-730.wml b/english/lts/security/2016/dla-730.wml
deleted file mode 100644
index 33196eb4195..00000000000
--- a/english/lts/security/2016/dla-730.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-bypass of the same-origin policy.</p>
-
-<p>A man-in-the-middle attack in the addon update mechanism has been fixed.</p>
-
-<p>A use-after-free vulnerability in the SVG Animation was discovered,
-allowing a remote attacker to cause a denial of service (application
-crash) or execute arbitrary code, if a user is tricked into opening a
-specially crafted website.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.5.1esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-730.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-731-2.data b/english/lts/security/2016/dla-731-2.data
deleted file mode 100644
index c796dcf2cfa..00000000000
--- a/english/lts/security/2016/dla-731-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-731-2 imagemagick</define-tag>
-<define-tag report_date>2016-12-11</define-tag>
-<define-tag secrefs>Bug#847058</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-731-2.wml b/english/lts/security/2016/dla-731-2.wml
deleted file mode 100644
index bc598b1e739..00000000000
--- a/english/lts/security/2016/dla-731-2.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update for imagemagick issued as DLA-731-1 caused regressions when
-decoding properties of certain images. Updated packages are now
-available to address this problem. For reference, the original advisory
-text follows.</p>
-
-<p>Several issues have been discovered in ImageMagick, a popular set of
-programs and libraries for image manipulation. These issues include
-several problems in memory handling that can result in a denial of
-service attack or in execution of arbitrary code by an attacker with
-control on the image input.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u9.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-731-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-731.data b/english/lts/security/2016/dla-731.data
deleted file mode 100644
index ce99931919b..00000000000
--- a/english/lts/security/2016/dla-731.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-731-1 imagemagick</define-tag>
-<define-tag report_date>2016-12-2</define-tag>
-<define-tag secrefs>CVE-2014-9805 CVE-2014-9806 CVE-2014-9807 CVE-2014-9808 CVE-2014-9809 CVE-2014-9810 CVE-2014-9811 CVE-2014-9812 CVE-2014-9813 CVE-2014-9814 CVE-2014-9815 CVE-2014-9816 CVE-2014-9817 CVE-2014-9818 CVE-2014-9819 CVE-2014-9821 CVE-2014-9822 CVE-2014-9823 CVE-2014-9824 CVE-2014-9826 CVE-2014-9828 CVE-2014-9829 CVE-2014-9830 CVE-2014-9831 CVE-2014-9832 CVE-2014-9833 CVE-2014-9834 CVE-2014-9835 CVE-2014-9836 CVE-2014-9837 CVE-2014-9838 CVE-2014-9839 CVE-2014-9840 CVE-2014-9843 CVE-2014-9844 CVE-2014-9845 CVE-2014-9846 CVE-2014-9847 CVE-2014-9848 CVE-2014-9849 CVE-2014-9851 CVE-2014-9853 CVE-2014-9854 CVE-2014-9907 CVE-2015-8957 CVE-2015-8958 CVE-2015-8959 CVE-2016-4562 CVE-2016-4564 CVE-2016-5010 CVE-2016-5687 CVE-2016-5688 CVE-2016-5689 CVE-2016-5690 CVE-2016-5691 CVE-2016-5841 CVE-2016-5842 CVE-2016-6491 CVE-2016-6823 CVE-2016-7101 CVE-2016-7514 CVE-2016-7515 CVE-2016-7516 CVE-2016-7517 CVE-2016-7518 CVE-2016-7519 CVE-2016-7520 CVE-2016-7521 CVE-2016-7522 CVE-2016-7523 CVE-2016-7524 CVE-2016-7526 CVE-2016-7527 CVE-2016-7528 CVE-2016-7529 CVE-2016-7530 CVE-2016-7531 CVE-2016-7532 CVE-2016-7533 CVE-2016-7534 CVE-2016-7535 CVE-2016-7536 CVE-2016-7537 CVE-2016-7538 CVE-2016-7539 Bug##773980 Bug##836172 Bug##834501 Bug##834183 Bug##833744 Bug##833730 Bug##833735</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-731.wml b/english/lts/security/2016/dla-731.wml
deleted file mode 100644
index a936845b495..00000000000
--- a/english/lts/security/2016/dla-731.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been discovered in ImageMagick, a popular set of
-programs and libraries for image manipulation. These issues include
-several problems in memory handling that can result in a denial of
-service attack or in execution of arbitrary code by an attacker with
-control on the image input.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u8.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-731.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-732-2.data b/english/lts/security/2016/dla-732-2.data
deleted file mode 100644
index 9402bbd64e9..00000000000
--- a/english/lts/security/2016/dla-732-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-732-2 monit</define-tag>
-<define-tag report_date>2016-12-6</define-tag>
-<define-tag secrefs>CVE-2016-7067 Bug#847196</define-tag>
-<define-tag packages>monit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-732-2.wml b/english/lts/security/2016/dla-732-2.wml
deleted file mode 100644
index 9672c38f1e8..00000000000
--- a/english/lts/security/2016/dla-732-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for monit issued as DLA-732-1 causes monit to segfault at
-actions such as start/stop/restart. This update fixes the regression.
-For reference the original advisory text follows.</p>
-
-<p>Adith Sudhakar discovered a cross-site request forgery (CSRF) issue in
-monit, a utility for monitoring hosts and services. An attacker could
-cause an authenticated admin to change monitoring for hosts/services
-through a forged link. This update fixes the vulnerability by adding
-CSRF protection via a security token and enforced POST requests for
-actions that cause changes to the monitoring.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:5.4-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your monit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-732-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-732-3.data b/english/lts/security/2016/dla-732-3.data
deleted file mode 100644
index ae41a29b7cd..00000000000
--- a/english/lts/security/2016/dla-732-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-732-3 monit</define-tag>
-<define-tag report_date>2016-12-12</define-tag>
-<define-tag secrefs>Bug#847196</define-tag>
-<define-tag packages>monit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-732-3.wml b/english/lts/security/2016/dla-732-3.wml
deleted file mode 100644
index 849e80cff36..00000000000
--- a/english/lts/security/2016/dla-732-3.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for monit issued as DLA-732-1 causes monit to segfault when
-using the collector function meant to provide data to M/Monit. This
-update fixes the regression. For reference the original advisory text
-follows.</p>
-
-<p>Adith Sudhakar discovered a cross-site request forgery (CSRF) issue in
-monit, a utility for monitoring hosts and services. An attacker could
-cause an authenticated admin to change monitoring for hosts/services
-through a forged link. This update fixes the vulnerability by adding
-CSRF protection via a security token and enforced POST requests for
-actions that cause changes to the monitoring.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:5.4-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your monit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-732-3.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-732.data b/english/lts/security/2016/dla-732.data
deleted file mode 100644
index 469fe0de1a2..00000000000
--- a/english/lts/security/2016/dla-732.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-732-1 monit</define-tag>
-<define-tag report_date>2016-12-2</define-tag>
-<define-tag secrefs>CVE-2016-7067</define-tag>
-<define-tag packages>monit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-732.wml b/english/lts/security/2016/dla-732.wml
deleted file mode 100644
index 585604f6009..00000000000
--- a/english/lts/security/2016/dla-732.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Adith Sudhakar discovered a cross-site request forgery (CSRF) issue in
-monit, a utility for monitoring hosts and services. An attacker could
-cause an authenticated admin to change monitoring for hosts/services
-through a forged link. This update fixes the vulnerability by adding
-CSRF protection via a security token and enforced POST requests for
-actions that cause changes to the monitoring.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your monit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-732.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-733.data b/english/lts/security/2016/dla-733.data
deleted file mode 100644
index 7f057c5d7eb..00000000000
--- a/english/lts/security/2016/dla-733.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-733-1 openafs</define-tag>
-<define-tag report_date>2016-12-3</define-tag>
-<define-tag secrefs>CVE-2016-9772</define-tag>
-<define-tag packages>openafs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-733.wml b/english/lts/security/2016/dla-733.wml
deleted file mode 100644
index d7370c63c85..00000000000
--- a/english/lts/security/2016/dla-733.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an information leak vulnerability in
-openafs, a distributed filesystem.</p>
-
-<p>Due to incomplete initialization or clearing of reused memory, OpenAFS
-directory objects are likely to contain <q>dead</q> directory entry
-information.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in openafs version
-1.6.1-3+deb7u7.</p>
-
-<p>We recommend that you upgrade your openafs packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-733.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-734.data b/english/lts/security/2016/dla-734.data
deleted file mode 100644
index 15ba3eedf2c..00000000000
--- a/english/lts/security/2016/dla-734.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-734-1 mapserver</define-tag>
-<define-tag report_date>2016-12-7</define-tag>
-<define-tag secrefs>CVE-2016-9839</define-tag>
-<define-tag packages>mapserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-734.wml b/english/lts/security/2016/dla-734.wml
deleted file mode 100644
index bd0feb6b3ac..00000000000
--- a/english/lts/security/2016/dla-734.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an information leakage vulnerability in
-mapserver, a CGI-based framework for Internet map services.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in mapserver version
-6.0.1-3.2+deb7u3.</p>
-
-<p>We recommend that you upgrade your mapserver packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-734.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-735.data b/english/lts/security/2016/dla-735.data
deleted file mode 100644
index b3e237e34f6..00000000000
--- a/english/lts/security/2016/dla-735.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-735-1 gst-plugins-base0.10</define-tag>
-<define-tag report_date>2016-12-8</define-tag>
-<define-tag secrefs>CVE-2016-9811</define-tag>
-<define-tag packages>gst-plugins-base0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-735.wml b/english/lts/security/2016/dla-735.wml
deleted file mode 100644
index feabfb630e2..00000000000
--- a/english/lts/security/2016/dla-735.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out of bounds heap read issue was found in gst-plugins-base0.10.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.36-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-735.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-736.data b/english/lts/security/2016/dla-736.data
deleted file mode 100644
index 0bbbde0bbcc..00000000000
--- a/english/lts/security/2016/dla-736.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-736-1 gst-plugins-bad0.10</define-tag>
-<define-tag report_date>2016-12-8</define-tag>
-<define-tag secrefs>CVE-2016-9809</define-tag>
-<define-tag packages>gst-plugins-bad0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-736.wml b/english/lts/security/2016/dla-736.wml
deleted file mode 100644
index 7c0ea2514f7..00000000000
--- a/english/lts/security/2016/dla-736.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out of bounds heap bug was found in the H264 parser in
-gst-plugins-bad0.10.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.23-7.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-736.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-737.data b/english/lts/security/2016/dla-737.data
deleted file mode 100644
index 8024e6bb6d1..00000000000
--- a/english/lts/security/2016/dla-737.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-737-1 roundcube</define-tag>
-<define-tag report_date>2016-12-8</define-tag>
-<define-tag secrefs>Bug#847287</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-737.wml b/english/lts/security/2016/dla-737.wml
deleted file mode 100644
index f69be9af2fb..00000000000
--- a/english/lts/security/2016/dla-737.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability where a remote user could
-execute arbitrary commands in Roundcube, a webmail solution for IMAP
-servers, by sending a specially crafted email.</p>
-
-<p>This was due to lack of sanitisation of the arguments to PHP's <q>mail</q>
-function.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in roundcube version
-0.7.2-9+deb7u5.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-737.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-738.data b/english/lts/security/2016/dla-738.data
deleted file mode 100644
index 777ef76f91d..00000000000
--- a/english/lts/security/2016/dla-738.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-738-1 spip</define-tag>
-<define-tag report_date>2016-12-8</define-tag>
-<define-tag secrefs>CVE-2016-9152 Bug#847156</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-738.wml b/english/lts/security/2016/dla-738.wml
deleted file mode 100644
index cf60cb43c88..00000000000
--- a/english/lts/security/2016/dla-738.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability in
-spip, a website publishing engine, which allowed remote attackers to inject
-arbitrary web script or HTML via the <q>rac</q> parameter.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in spip version
-2.1.17-1+deb7u7.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-738.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-739.data b/english/lts/security/2016/dla-739.data
deleted file mode 100644
index 36e7c8fe918..00000000000
--- a/english/lts/security/2016/dla-739.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-739-1 jasper</define-tag>
-<define-tag report_date>2016-12-10</define-tag>
-<define-tag secrefs>CVE-2016-8654 CVE-2016-8691 CVE-2016-8692 CVE-2016-8693 CVE-2016-8882 CVE-2016-8883 CVE-2016-8887 CVE-2016-9560</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-739.wml b/english/lts/security/2016/dla-739.wml
deleted file mode 100644
index 83fddc653f5..00000000000
--- a/english/lts/security/2016/dla-739.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8691">CVE-2016-8691</a>
-
- <p>FPE on unknown address ... jpc_dec_process_siz ... jpc_dec.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8692">CVE-2016-8692</a>
-
- <p>FPE on unknown address ... jpc_dec_process_siz ... jpc_dec.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8693">CVE-2016-8693</a>
-
- <p>attempting double-free ... mem_close ... jas_stream.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8882">CVE-2016-8882</a>
-
- <p>segfault / null pointer access in jpc_pi_destroy</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9560">CVE-2016-9560</a>
-
- <p>stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8887">CVE-2016-8887</a> part 1 + 2
-
- <p>NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8654">CVE-2016-8654</a>
-
- <p>Heap-based buffer overflow in QMFB code in JPC codec</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8883">CVE-2016-8883</a>
-
- <p>assert in jpc_dec_tiledecode()</p>
-
-<li>TEMP-CVE
-
- <p>heap-based buffer overflow in jpc_dec_tiledecode (jpc_dec.c)</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.900.1-13+deb7u5.</p>
-
-<p>We recommend that you upgrade your jasper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-739.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-740.data b/english/lts/security/2016/dla-740.data
deleted file mode 100644
index 511456b6b5a..00000000000
--- a/english/lts/security/2016/dla-740.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-740-1 libgsf</define-tag>
-<define-tag report_date>2016-12-11</define-tag>
-<define-tag secrefs>CVE-2016-9888</define-tag>
-<define-tag packages>libgsf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-740.wml b/english/lts/security/2016/dla-740.wml
deleted file mode 100644
index 6b3d744762c..00000000000
--- a/english/lts/security/2016/dla-740.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a null pointer deference exploit in libgsf, a
-I/O abstraction library for GNOME.</p>
-
-<p>An error within the "tar_directory_for_file()" function could be exploited to
-trigger a null pointer dereference and subsequently cause a crash via a crafted
-TAR file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libgsf version
-1.14.21-2.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libgsf packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-740.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-741.data b/english/lts/security/2016/dla-741.data
deleted file mode 100644
index f5f859b1bc5..00000000000
--- a/english/lts/security/2016/dla-741.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-741-1 unzip</define-tag>
-<define-tag report_date>2016-12-13</define-tag>
-<define-tag secrefs>CVE-2014-9913 CVE-2016-9844 Bug#847485 Bug#847486</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-741.wml b/english/lts/security/2016/dla-741.wml
deleted file mode 100644
index e5f42bf46f1..00000000000
--- a/english/lts/security/2016/dla-741.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>"unzip -l" (<a href="https://security-tracker.debian.org/tracker/CVE-2014-9913">CVE-2014-9913</a>) and <q>zipinfo</q> (<a href="https://security-tracker.debian.org/tracker/CVE-2016-9844">CVE-2016-9844</a>) were vulnerable
-to buffer overflows when provided malformed or maliciously-crafted ZIP
-files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.0-8+deb7u6.</p>
-
-<p>We recommend that you upgrade your unzip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-741.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-742.data b/english/lts/security/2016/dla-742.data
deleted file mode 100644
index 1a6ad7cddb7..00000000000
--- a/english/lts/security/2016/dla-742.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-742-1 chrony</define-tag>
-<define-tag report_date>2016-12-13</define-tag>
-<define-tag secrefs>CVE-2016-1567 Bug#812923 Bug#568492</define-tag>
-<define-tag packages>chrony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-742.wml b/english/lts/security/2016/dla-742.wml
deleted file mode 100644
index d21bbd93f66..00000000000
--- a/english/lts/security/2016/dla-742.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Chrony, a versatile implementation of the
-Network Time Protocol, did not verify peer associations of symmetric
-keys when authenticating packets, which might allow remote attackers
-to conduct impersonation attacks via an arbitrary trusted key, aka a
-"skeleton key."</p>
-
-<p>This update also resolves Debian bug #568492.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.24-3.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your chrony packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-742.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-743.data b/english/lts/security/2016/dla-743.data
deleted file mode 100644
index b1c265afb3a..00000000000
--- a/english/lts/security/2016/dla-743.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-743-1 firefox-esr</define-tag>
-<define-tag report_date>2016-12-15</define-tag>
-<define-tag secrefs>CVE-2016-9893 CVE-2016-9895 CVE-2016-9897 CVE-2016-9898 CVE-2016-9899 CVE-2016-9900 CVE-2016-9901 CVE-2016-9902 CVE-2016-9904 CVE-2016-9905</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-743.wml b/english/lts/security/2016/dla-743.wml
deleted file mode 100644
index 9090a0c40bc..00000000000
--- a/english/lts/security/2016/dla-743.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-information leaks.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.6.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-743.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-744.data b/english/lts/security/2016/dla-744.data
deleted file mode 100644
index ef6b4fa4068..00000000000
--- a/english/lts/security/2016/dla-744.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-744-1 icu</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2014-9911 CVE-2016-7415 Bug#838694</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-744.wml b/english/lts/security/2016/dla-744.wml
deleted file mode 100644
index 3700f7659a4..00000000000
--- a/english/lts/security/2016/dla-744.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Brief introduction </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9911">CVE-2014-9911</a>
-
- <p>Michele Spagnuolo discovered a buffer overflow vulnerability which
- might allow remote attackers to cause a denial of service or possibly
- execute arbitrary code via crafted text.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7415">CVE-2016-7415</a>
-
- <p>A stack-based buffer overflow might allow an attacker with control of
- the locale string to perform a denial of service and, possibly,
- execute arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.8.1.1-12+deb7u6.</p>
-
-<p>We recommend that you upgrade your icu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-744.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-745.data b/english/lts/security/2016/dla-745.data
deleted file mode 100644
index 04f7426d82c..00000000000
--- a/english/lts/security/2016/dla-745.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-745-1 most</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2016-1253 Bug#848132</define-tag>
-<define-tag packages>most</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-745.wml b/english/lts/security/2016/dla-745.wml
deleted file mode 100644
index d942127e9ec..00000000000
--- a/english/lts/security/2016/dla-745.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The most pager can automatically open files compressed with gzip,
-bzip2 and (in Debian) LZMA. Alberto Garcia discovered that Debian's
-version of most was susceptible for a shell injection attack that
-could be exploited to run arbitrary commands on the user's computer.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.0.0a-2.2.</p>
-
-<p>We recommend that you upgrade your most packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-745.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-746-2.data b/english/lts/security/2016/dla-746-2.data
deleted file mode 100644
index 0fe1b869a7f..00000000000
--- a/english/lts/security/2016/dla-746-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-746-2 tomcat6</define-tag>
-<define-tag report_date>2016-12-17</define-tag>
-<define-tag secrefs>Bug#848492</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-746-2.wml b/english/lts/security/2016/dla-746-2.wml
deleted file mode 100644
index 9b2f0107555..00000000000
--- a/english/lts/security/2016/dla-746-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The last security update introduced a regression due to the use of
-StringManager in the ResourceLinkFactory class. The code was removed
-again since it is not strictly required to resolve <a href="https://security-tracker.debian.org/tracker/CVE-2016-6797">CVE-2016-6797</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.0.45+dfsg-1~deb7u5.</p>
-
-<p>We recommend that you upgrade your tomcat6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-746-2.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-746.data b/english/lts/security/2016/dla-746.data
deleted file mode 100644
index 86bd09ddd05..00000000000
--- a/english/lts/security/2016/dla-746.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-746-1 tomcat6</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2016-9774 Bug#845393 Bug#845425 Bug#846298</define-tag>
-<define-tag packages>tomcat6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-746.wml b/english/lts/security/2016/dla-746.wml
deleted file mode 100644
index bb893c8ca8e..00000000000
--- a/english/lts/security/2016/dla-746.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Paul Szabo discovered a potential privilege escalation that could be
-exploited in the situation envisaged in DLA-622-1. This update also
-addresses two regressions which were introduced by the fixes for
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-5018">CVE-2016-5018</a> (when running Jasper with SecurityManager enabled) and
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-6797">CVE-2016-6797</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.0.45+dfsg-1~deb7u4.</p>
-
-<p>We recommend that you upgrade your tomcat6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-746.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-747.data b/english/lts/security/2016/dla-747.data
deleted file mode 100644
index 3933e388a10..00000000000
--- a/english/lts/security/2016/dla-747.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-747-1 libupnp</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2016-8863 Bug#842093</define-tag>
-<define-tag packages>libupnp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-747.wml b/english/lts/security/2016/dla-747.wml
deleted file mode 100644
index 501090a018a..00000000000
--- a/english/lts/security/2016/dla-747.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Scott Tenaglia discovered a heap-based buffer overflow in libupnp, a
-portable SDK for UPnP Devices. That can lead to denial of service or
-remote code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.6.17-1.2+deb7u2.</p>
-
-<p>We recommend that you upgrade your libupnp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-747.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-748.data b/english/lts/security/2016/dla-748.data
deleted file mode 100644
index 5e9bd382299..00000000000
--- a/english/lts/security/2016/dla-748.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-748-1 libupnp4</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2016-8863</define-tag>
-<define-tag packages>libupnp4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-748.wml b/english/lts/security/2016/dla-748.wml
deleted file mode 100644
index fad5f6a157f..00000000000
--- a/english/lts/security/2016/dla-748.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Scott Tenaglia discovered a heap-based buffer overflow in libupnp4, a
-portable SDK for UPnP Devices. That can lead to denial of service or
-remote code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.0~svn20100507-1.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libupnp4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-748.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-749.data b/english/lts/security/2016/dla-749.data
deleted file mode 100644
index a64f3fe72cc..00000000000
--- a/english/lts/security/2016/dla-749.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-749-1 php5</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2016-5385 CVE-2016-7124 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-749.wml b/english/lts/security/2016/dla-749.wml
deleted file mode 100644
index 8eb41616948..00000000000
--- a/english/lts/security/2016/dla-749.wml
+++ /dev/null
@@ -1,143 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5385">CVE-2016-5385</a>
-
- <p>PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18
- namespace conflicts and therefore does not protect applications from
- the presence of untrusted client data in the HTTP_PROXY environment
- variable, which might allow remote attackers to redirect an application's
- outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy
- header in an HTTP request, as demonstrated by (1) an application that
- makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP,
- aka an <q>httpoxy</q> issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7124">CVE-2016-7124</a>
-
- <p>ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10
- mishandles certain invalid objects, which allows remote attackers to cause
- a denial of service or possibly have unspecified other impact via crafted
- serialized data that leads to a (1) __destruct call or (2) magic method
- call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7128">CVE-2016-7128</a>
-
- <p>The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before
- 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset
- that exceeds the file size, which allows remote attackers to obtain
- sensitive information from process memory via a crafted TIFF image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7129">CVE-2016-7129</a>
-
- <p>The php_wddx_process_data function in ext/wddx/wddx.c in PHP before
- 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial
- of service (segmentation fault) or possibly have unspecified other
- impact via an invalid ISO 8601 time value, as demonstrated by
- a wddx_deserialize call that mishandles a dateTime element in
- a wddxPacket XML document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7130">CVE-2016-7130</a>
-
- <p>The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before
- 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a
- denial of service (NULL pointer dereference and application crash)
- or possibly have unspecified other impact via an invalid base64
- binary value, as demonstrated by a wddx_deserialize call that
- mishandles a binary element in a wddxPacket XML document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7131">CVE-2016-7131</a>
-
- <p>ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows
- remote attackers to cause a denial of service (NULL pointer
- dereference and application crash) or possibly have unspecified
- other impact via a malformed wddxPacket XML document that is
- mishandled in a wddx_deserialize call, as demonstrated by a tag
- that lacks a < (less than) character.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7132">CVE-2016-7132</a>
-
- <p>ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows
- remote attackers to cause a denial of service (NULL pointer
- dereference and application crash) or possibly have unspecified
- other impact via an invalid wddxPacket XML document that is
- mishandled in a wddx_deserialize call, as demonstrated by
- a stray element inside a boolean element, leading to incorrect
- pop processing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7411">CVE-2016-7411</a>
-
- <p>ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles
- object-deserialization failures, which allows remote attackers
- to cause a denial of service (memory corruption) or possibly
- have unspecified other impact via an unserialize call that
- references a partially constructed object.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7412">CVE-2016-7412</a>
-
- <p>ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x
- before 7.0.11 does not verify that a BIT field has the
- UNSIGNED_FLAG flag, which allows remote MySQL servers to cause
- a denial of service (heap-based buffer overflow) or possibly
- have unspecified other impact via crafted field metadata.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7413">CVE-2016-7413</a>
-
- <p>Use-after-free vulnerability in the wddx_stack_destroy function in
- ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows
- remote attackers to cause a denial of service or possibly have
- unspecified other impact via a wddxPacket XML document that lacks
- an end-tag for a recordset field element, leading to mishandling
- in a wddx_deserialize call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7414">CVE-2016-7414</a>
-
- <p>The ZIP signature-verification feature in PHP before 5.6.26 and 7.x
- before 7.0.11 does not ensure that the uncompressed_filesize field
- is large enough, which allows remote attackers to cause a denial of
- service (out-of-bounds memory access) or possibly have unspecified
- other impact via a crafted PHAR archive, related to ext/phar/util.c
- and ext/phar/zip.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7416">CVE-2016-7416</a>
-
- <p>ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x
- before 7.0.11 does not properly restrict the locale length provided
- to the Locale class in the ICU library, which allows remote attackers
- to cause a denial of service (application crash) or possibly have
- unspecified other impact via a MessageFormatter::formatMessage call
- with a long first argument.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7417">CVE-2016-7417</a>
-
- <p>ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11
- proceeds with SplArray unserialization without validating a
- return value and data type, which allows remote attackers to
- cause a denial of service or possibly have unspecified other
- impact via crafted serialized data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7418">CVE-2016-7418</a>
-
- <p>The php_wddx_push_element function in ext/wddx/wddx.c in PHP before
- 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a
- denial of service (invalid pointer access and out-of-bounds read)
- or possibly have unspecified other impact via an incorrect boolean
- element in a wddxPacket XML document, leading to mishandling in
- a wddx_deserialize call.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u6.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-749.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-750.data b/english/lts/security/2016/dla-750.data
deleted file mode 100644
index 193cf59bdd2..00000000000
--- a/english/lts/security/2016/dla-750.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-750-1 game-music-emu</define-tag>
-<define-tag report_date>2016-12-16</define-tag>
-<define-tag secrefs>CVE-2016-9957 CVE-2016-9958 CVE-2016-9959 CVE-2016-9960 CVE-2016-9961</define-tag>
-<define-tag packages>game-music-emu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-750.wml b/english/lts/security/2016/dla-750.wml
deleted file mode 100644
index 6fa5e8c8fbc..00000000000
--- a/english/lts/security/2016/dla-750.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chris Evans found several issues in the emulation code in game-music-emu
-that could lead to arbitrary code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.5-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your game-music-emu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-750.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-751.data b/english/lts/security/2016/dla-751.data
deleted file mode 100644
index 08c0a5fb6f3..00000000000
--- a/english/lts/security/2016/dla-751.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-751-1 nagios3</define-tag>
-<define-tag report_date>2016-12-17</define-tag>
-<define-tag secrefs>CVE-2016-9565 CVE-2016-9566</define-tag>
-<define-tag packages>nagios3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-751.wml b/english/lts/security/2016/dla-751.wml
deleted file mode 100644
index 4bb3c9e4683..00000000000
--- a/english/lts/security/2016/dla-751.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nagios was found to be vulnerable to two security issues that, when
-combined, lead to a remote root code execution vulnerability.
-Fortunately, the hardened permissions of the Debian package limit the
-effect of those to information disclosure, but privilege escalation to
-root is still possible locally.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9565">CVE-2016-9565</a>
-
- <p>Improper sanitization of RSS feed input enables unauthenticated
- remote read and write of arbitrary files which may lead to remote
- code execution if the web root is writable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9566">CVE-2016-9566</a>
-
- <p>Unsafe logfile handling allows unprivileged users to escalate their
- privileges to root. In wheezy, this is possible only through the
- debug logfile which is disabled by default.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.4.1-3+deb7u3.</p>
-
-<p>We recommend that you upgrade your nagios3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-751.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-752.data b/english/lts/security/2016/dla-752.data
deleted file mode 100644
index fff44530c67..00000000000
--- a/english/lts/security/2016/dla-752.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-752-1 icedove</define-tag>
-<define-tag report_date>2016-12-17</define-tag>
-<define-tag secrefs>CVE-2016-5290 CVE-2016-5291 CVE-2016-5296 CVE-2016-5297 CVE-2016-9066 CVE-2016-9074 CVE-2016-9079</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-752.wml b/english/lts/security/2016/dla-752.wml
deleted file mode 100644
index 385d8010b29..00000000000
--- a/english/lts/security/2016/dla-752.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client: Multiple memory safety errors,
-same-origin policy bypass issues, integer overflows, buffer overflows
-and use-after-frees may lead to the execution of arbitrary code or
-denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.5.1-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-752.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-753.data b/english/lts/security/2016/dla-753.data
deleted file mode 100644
index 46d8a4fb4be..00000000000
--- a/english/lts/security/2016/dla-753.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-753-1 tomcat7</define-tag>
-<define-tag report_date>2016-12-18</define-tag>
-<define-tag secrefs>CVE-2016-9774 Bug#845393 Bug#845425 Bug#846298</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-753.wml b/english/lts/security/2016/dla-753.wml
deleted file mode 100644
index f7ef154209c..00000000000
--- a/english/lts/security/2016/dla-753.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Paul Szabo discovered a potential privilege escalation that could be
-exploited in the situation envisaged in DLA-622-1. This update also
-addresses several regressions stemming from incomplete fixes for
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-5345">CVE-2015-5345</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2016-5018">CVE-2016-5018</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2016-6797">CVE-2016-6797</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u8.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-753.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-754.data b/english/lts/security/2016/dla-754.data
deleted file mode 100644
index dc74f13164c..00000000000
--- a/english/lts/security/2016/dla-754.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-754-1 tor</define-tag>
-<define-tag report_date>2016-12-20</define-tag>
-<define-tag secrefs>CVE-2016-1254 Bug##848847</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-754.wml b/english/lts/security/2016/dla-754.wml
deleted file mode 100644
index daa432cd7ba..00000000000
--- a/english/lts/security/2016/dla-754.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Tor, a connection-based low-latency anonymous
-communication system, may read one byte past a buffer when parsing
-hidden service descriptors. This issue may enable a hostile hidden
-service to crash Tor clients depending on hardening options and malloc
-implementation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.2.4.27-3.</p>
-
-<p>We recommend that you upgrade your tor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-754.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-755.data b/english/lts/security/2016/dla-755.data
deleted file mode 100644
index 901bee15c2b..00000000000
--- a/english/lts/security/2016/dla-755.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-755-1 dcmtk</define-tag>
-<define-tag report_date>2016-12-20</define-tag>
-<define-tag secrefs>CVE-2015-8979 Bug#848830</define-tag>
-<define-tag packages>dcmtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-755.wml b/english/lts/security/2016/dla-755.wml
deleted file mode 100644
index 8a937d53b1c..00000000000
--- a/english/lts/security/2016/dla-755.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>At several places in the code a wrong length of ACSE data structures
-received over the network can cause overflows or underflows when
-processing those data structures. Related checks have been added at
-various places in order to prevent such (possible) attacks. Thanks to
-Kevin Basista for the report.</p>
-
-<p>The bug will indeed affect all DCMTK-based server applications that
-accept incoming DICOM network connections that are using the
-dcmtk-3.6.0 and earlier versions.</p>
-
-<p>(From: <a href="http://zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php)">http://zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php)</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.0-12+deb7u1.</p>
-
-<p>We recommend that you upgrade your dcmtk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-755.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-756.data b/english/lts/security/2016/dla-756.data
deleted file mode 100644
index f4d2fc89ac8..00000000000
--- a/english/lts/security/2016/dla-756.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-756-1 imagemagick</define-tag>
-<define-tag report_date>2016-12-22</define-tag>
-<define-tag secrefs>CVE-2016-7799 CVE-2016-8707 CVE-2016-8862 CVE-2016-8866 CVE-2016-9556 Bug#840437 Bug#845206 Bug#848139 Bug#845634 Bug#845242 Bug#845243 Bug#845195 Bug#845196</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-756.wml b/english/lts/security/2016/dla-756.wml
deleted file mode 100644
index 5aa21c3a91a..00000000000
--- a/english/lts/security/2016/dla-756.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Numerous vulnerabilities were discovered in ImageMagick, an image
-manipulation program. Issues include memory exception, heap, buffer
-and stack overflows, out of bound reads and missing checks.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u10.</p>
-
-<p>The exact impact of the vulnerabilities is unknown, as they were
-mostly discovered through fuzzing. We still recommend that you upgrade
-your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-756.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-757.data b/english/lts/security/2016/dla-757.data
deleted file mode 100644
index 6c2690869b3..00000000000
--- a/english/lts/security/2016/dla-757.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-757-1 phpmyadmin</define-tag>
-<define-tag report_date>2016-12-24</define-tag>
-<define-tag secrefs>CVE-2016-4412 CVE-2016-6626 CVE-2016-9849 CVE-2016-9850 CVE-2016-9861 CVE-2016-9864 CVE-2016-9865</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-757.wml b/english/lts/security/2016/dla-757.wml
deleted file mode 100644
index 02ea8af99b0..00000000000
--- a/english/lts/security/2016/dla-757.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various security issues where found and fixed in phpmyadmin in wheezy.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4412">CVE-2016-4412</a> / PMASA-2016-57
-
- <p>A user can be tricked in following a link leading to phpMyAdmin, which
- after authentication redirects to another malicious site.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6626">CVE-2016-6626</a> / PMASA-2016-49
-
- <p>In the fix for PMASA-2016-57, we didn't have sufficient checking and was
- possible to bypass whitelist.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9849">CVE-2016-9849</a> / PMASA-2016-60
-
- <p>Username deny rules bypass (AllowRoot &amp; Others) by using Null Byte.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9850">CVE-2016-9850</a> / PMASA-2016-61
-
- <p>Username matching for the allow/deny rules
- may result in wrong matches and detection of the username in the rule due
- to non-constant execution time.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9861">CVE-2016-9861</a> / PMASA-2016-66
-
- <p>In the fix for PMASA-2016-49, we has buggy checks and was possible to
- bypass whitelist.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9864">CVE-2016-9864</a> / PMASA-2016-69
-
- <p>Multiple SQL injection vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9865">CVE-2016-9865</a> / PMASA-2016-70
-
- <p>Due to a bug in serialized string parsing, it was possible to bypass the
- protection offered by PMA_safeUnserialize() function.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:3.4.11.1-2+deb7u7.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-757.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-758.data b/english/lts/security/2016/dla-758.data
deleted file mode 100644
index 238c0c5657c..00000000000
--- a/english/lts/security/2016/dla-758.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-758-1 libgd2</define-tag>
-<define-tag report_date>2016-12-22</define-tag>
-<define-tag secrefs>CVE-2016-9933 Bug#849038</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-758.wml b/english/lts/security/2016/dla-758.wml
deleted file mode 100644
index 0d66eee44c9..00000000000
--- a/english/lts/security/2016/dla-758.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that invalid color causes stack exhaustion by
-recursive call to function gdImageFillToBorder when the image used is
-truecolor.</p>
-
-<p>The vulnerability can be exploited through php5 which uses system's
-libgd2 library through the imagefilltoborder() PHP function to cause
-denial of service (stack overflow) and possibly have unspecified other
-impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u7.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-758.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-759.data b/english/lts/security/2016/dla-759.data
deleted file mode 100644
index 3a993ccba84..00000000000
--- a/english/lts/security/2016/dla-759.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-759-1 nss</define-tag>
-<define-tag report_date>2016-12-23</define-tag>
-<define-tag secrefs>CVE-2016-9074</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-759.wml b/english/lts/security/2016/dla-759.wml
deleted file mode 100644
index c4c88dbc210..00000000000
--- a/english/lts/security/2016/dla-759.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Franziskus Kiefer reported that the existing mitigations for
-some timing side-channel attacks were insufficient:
-<a href="https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/#">https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/#</a><a href="https://security-tracker.debian.org/tracker/CVE-2016-9074">CVE-2016-9074</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.26-1+debu7u2.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-759.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-760.data b/english/lts/security/2016/dla-760.data
deleted file mode 100644
index 3aadbaf82cd..00000000000
--- a/english/lts/security/2016/dla-760.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-760-1 spip</define-tag>
-<define-tag report_date>2016-12-24</define-tag>
-<define-tag secrefs>CVE-2016-9997 CVE-2016-9998 Bug#848641</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-760.wml b/english/lts/security/2016/dla-760.wml
deleted file mode 100644
index 3631666d9b2..00000000000
--- a/english/lts/security/2016/dla-760.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple reflected cross-site scripting (XSS) vulnerabilities have been
-discovered in SPIP, a website publishing engine written in PHP.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9997">CVE-2016-9997</a>
-
- <p>It was discovered that the <q>id</q> parameter to the puce_statut action
- isn't sanitized properly. An attacker could inject arbitrary HTML
- code by tricking an authenticated SPIP user to open a specially
- crafted URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9998">CVE-2016-9998</a>
-
- <p>It was discovered that the <q>plugin</q> parameter to the info_plugin
- action isn't sanitized properly. An attacker could inject arbitrary
- HTML code by tricking an authenticated SPIP user to open a specially
- crafted URL.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.17-1+deb7u8.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-760.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-761.data b/english/lts/security/2016/dla-761.data
deleted file mode 100644
index ed2656103c1..00000000000
--- a/english/lts/security/2016/dla-761.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-761-1 python-bottle</define-tag>
-<define-tag report_date>2016-12-24</define-tag>
-<define-tag secrefs>CVE-2016-9964 Bug#848392</define-tag>
-<define-tag packages>python-bottle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-761.wml b/english/lts/security/2016/dla-761.wml
deleted file mode 100644
index 0546f4a11ea..00000000000
--- a/english/lts/security/2016/dla-761.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that bottle, a WSGI-framework for the Python
-programming language, did not properly filter "\r\n" sequences when
-handling redirections. This allowed an attacker to perform CRLF
-attacks such as HTTP header injection.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.11-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your python-bottle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-761.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-762.data b/english/lts/security/2016/dla-762.data
deleted file mode 100644
index bf078544552..00000000000
--- a/english/lts/security/2016/dla-762.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-762-1 exim4</define-tag>
-<define-tag report_date>2016-12-25</define-tag>
-<define-tag secrefs>CVE-2016-9963</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-762.wml b/english/lts/security/2016/dla-762.wml
deleted file mode 100644
index 98337be1bd2..00000000000
--- a/english/lts/security/2016/dla-762.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Bjoern Jacke discovered that Exim, Debian's default mail transfer agent,
-may leak the private DKIM signing key to the log files if specific
-configuration options are met.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.80-7+deb7u4.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-762.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-763.data b/english/lts/security/2016/dla-763.data
deleted file mode 100644
index 7f25c2e11b3..00000000000
--- a/english/lts/security/2016/dla-763.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-763-1 squid3</define-tag>
-<define-tag report_date>2016-12-25</define-tag>
-<define-tag secrefs>CVE-2016-10002 Bug#848493</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-763.wml b/english/lts/security/2016/dla-763.wml
deleted file mode 100644
index 00ff069e489..00000000000
--- a/english/lts/security/2016/dla-763.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Saulius Lapinskas from Lithuanian State Social Insurance Fund Board
-discovered that Squid3, a fully featured web proxy cache, does not
-properly process responses to If-None-Modified HTTP conditional
-requests, leading to client-specific Cookie data being leaked to other
-clients. A remote attacker can take advantage of this flaw to discover
-private and sensitive information about another client's browsing
-session.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1.20-2.2+deb7u7.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-763.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-764.data b/english/lts/security/2016/dla-764.data
deleted file mode 100644
index 94192b7a20a..00000000000
--- a/english/lts/security/2016/dla-764.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-764-1 qemu</define-tag>
-<define-tag report_date>2016-12-26</define-tag>
-<define-tag secrefs>CVE-2016-9911 CVE-2016-9921 CVE-2016-9922</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-764.wml b/english/lts/security/2016/dla-764.wml
deleted file mode 100644
index 19f25faaafc..00000000000
--- a/english/lts/security/2016/dla-764.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in QEMU:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9911">CVE-2016-9911</a>
-
- <p>Quick Emulator (Qemu) built with the USB EHCI Emulation support
- is vulnerable to a memory leakage issue. It could occur while
- processing packet data in <q>ehci_init_transfer</q>. A guest user/
- process could use this issue to leak host memory, resulting in
- DoS for a host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9921">CVE-2016-9921</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9922">CVE-2016-9922</a>
-
- <p>Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator
- support is vulnerable to a divide by zero issue. It could occur
- while copying VGA data when cirrus graphics mode was set to be
- VGA. A privileged user inside guest could use this flaw to crash
- the Qemu process instance on the host, resulting in DoS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u19.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-764.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-765.data b/english/lts/security/2016/dla-765.data
deleted file mode 100644
index 0a92d7cfa63..00000000000
--- a/english/lts/security/2016/dla-765.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-765-1 qemu-kvm</define-tag>
-<define-tag report_date>2016-12-26</define-tag>
-<define-tag secrefs>CVE-2016-9911 CVE-2016-9921 CVE-2016-9922</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-765.wml b/english/lts/security/2016/dla-765.wml
deleted file mode 100644
index 66ed4437277..00000000000
--- a/english/lts/security/2016/dla-765.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in qemu-kvm:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9911">CVE-2016-9911</a>
-
- <p>qemu-kvm built with the USB EHCI Emulation support is vulnerable
- to a memory leakage issue. It could occur while processing packet
- data in <q>ehci_init_transfer</q>. A guest user/process could use this
- issue to leak host memory, resulting in DoS for a host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9921">CVE-2016-9921</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9922">CVE-2016-9922</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
- vulnerable to a divide by zero issue. It could occur while copying
- VGA data when cirrus graphics mode was set to be VGA. A privileged
- user inside guest could use this flaw to crash the Qemu process
- instance on the host, resulting in DoS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u19.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-765.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-766.data b/english/lts/security/2016/dla-766.data
deleted file mode 100644
index 8983575a3d7..00000000000
--- a/english/lts/security/2016/dla-766.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-766-1 libcrypto++</define-tag>
-<define-tag report_date>2016-12-27</define-tag>
-<define-tag secrefs>CVE-2016-9939 Bug#848009</define-tag>
-<define-tag packages>libcrypto++</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-766.wml b/english/lts/security/2016/dla-766.wml
deleted file mode 100644
index 6667ddd8138..00000000000
--- a/english/lts/security/2016/dla-766.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gergely Gábor Nagy from Tresorit discovered that libcrypto++, a C++
-cryptographic library, contained a bug in several ASN.1 parsing
-routines. This would allow an attacker to remotely cause a denial of
-service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.6.1-6+deb7u3.</p>
-
-<p>We recommend that you upgrade your libcrypto++ packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-766.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-767.data b/english/lts/security/2016/dla-767.data
deleted file mode 100644
index ae9c6dce3ea..00000000000
--- a/english/lts/security/2016/dla-767.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-767-1 curl</define-tag>
-<define-tag report_date>2016-12-29</define-tag>
-<define-tag secrefs>CVE-2016-9586 Bug#848958</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-767.wml b/english/lts/security/2016/dla-767.wml
deleted file mode 100644
index ccb2824e15f..00000000000
--- a/english/lts/security/2016/dla-767.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that libcurl's implementation of the printf()
-functions triggers a buffer overflow when doing a large floating point
-output. The bug occurs when the conversion outputs more than 255 bytes.</p>
-
-<p>The flaw happens because the floating point conversion is using system
-functions without the correct boundary checks.</p>
-
-<p>If there are any application that accepts a format string from the
-outside without necessary input filtering, it could allow remote
-attacks.</p>
-
-<p>This flaw does not exist in the command line tool.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.26.0-1+wheezy18.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-767.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-768.data b/english/lts/security/2016/dla-768.data
deleted file mode 100644
index 61198347320..00000000000
--- a/english/lts/security/2016/dla-768.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-768-1 pgpdump</define-tag>
-<define-tag report_date>2016-12-30</define-tag>
-<define-tag secrefs>CVE-2016-4021 Bug#773747</define-tag>
-<define-tag packages>pgpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-768.wml b/english/lts/security/2016/dla-768.wml
deleted file mode 100644
index e2b5ba660fa..00000000000
--- a/english/lts/security/2016/dla-768.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The read_binary function in buffer.c in pgpdump, a PGP packet
-visualizer, allows context-dependent attackers to cause a denial of
-service (infinite loop and CPU consumption) via crafted input. This was
-assigned <a href="https://security-tracker.debian.org/tracker/CVE-2016-4021">CVE-2016-4021</a>.</p>
-
-<p>Also, the read_radix64 function the might read data from beyond the
-end of a buffer from crafted input.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.27-1+deb7u1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems will be fixed in version
-0.28-1+deb8u1, part of the upcoming point release</p>
-
-<p>For Debian 9 <q>Stretch</q> and <q>Sid</q>, these problems have been fixed in
-version 0.31-0.1</p>
-
-<p>We recommend that you upgrade your pgpdump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-768.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-769.data b/english/lts/security/2016/dla-769.data
deleted file mode 100644
index a1d2ae7b739..00000000000
--- a/english/lts/security/2016/dla-769.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-769-1 shutter</define-tag>
-<define-tag report_date>2016-12-30</define-tag>
-<define-tag secrefs>CVE-2015-0854 Bug#798862</define-tag>
-<define-tag packages>shutter</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-769.wml b/english/lts/security/2016/dla-769.wml
deleted file mode 100644
index 9ee5c98994f..00000000000
--- a/english/lts/security/2016/dla-769.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The feature-rich screenshot program shutter uses the system() call in
-an unsafe way. This allows an attacker to execute arbitrary programs
-via crafted directory names.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-0.88.3-1+deb7u1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem will be fixed in version
-0.92-0.1+deb8u1, part of the upcoming point release</p>
-
-<p>For Debian 9 <q>Stretch</q> and <q>Sid</q>, this problem has been fixed in
-version 0.93.1-1</p>
-
-<p>We recommend that you upgrade your shutter packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-769.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-770.data b/english/lts/security/2016/dla-770.data
deleted file mode 100644
index 0191253eefa..00000000000
--- a/english/lts/security/2016/dla-770.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-770-1 libphp-phpmailer</define-tag>
-<define-tag report_date>2016-12-31</define-tag>
-<define-tag secrefs>CVE-2016-10033 Bug#849365</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-770.wml b/english/lts/security/2016/dla-770.wml
deleted file mode 100644
index 851885a3f31..00000000000
--- a/english/lts/security/2016/dla-770.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski discovered that PHPMailer, a popular library to send
-email from PHP applications, allowed a remote attacker to execute
-code if they were able to provide a crafted Sender address.</p>
-
-<p>Note that for this issue also <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045">CVE-2016-10045</a> was assigned, which is a
-regression in the original patch proposed for <a href="https://security-tracker.debian.org/tracker/CVE-2016-10033">CVE-2016-10033</a>. Because
-the origial patch was not applied in Debian, Debian was not vulnerable
-to <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045">CVE-2016-10045</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1-1.2.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-770.data"
-# $Id: $
diff --git a/english/lts/security/2016/dla-771.data b/english/lts/security/2016/dla-771.data
deleted file mode 100644
index b8dd9dfe7ec..00000000000
--- a/english/lts/security/2016/dla-771.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-771-1 hdf5</define-tag>
-<define-tag report_date>2016-12-31</define-tag>
-<define-tag secrefs>CVE-2016-4330 CVE-2016-4331 CVE-2016-4332 CVE-2016-4333 Bug#845301</define-tag>
-<define-tag packages>hdf5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2016/dla-771.wml b/english/lts/security/2016/dla-771.wml
deleted file mode 100644
index 869d9cdec96..00000000000
--- a/english/lts/security/2016/dla-771.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cisco Talos discovered that hdf5, a file format and library for
-storing scientific data, contained several vulnerabilities that could
-lead to arbitrary code execution when handling untrusted data.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.8-9+deb7u1.</p>
-
-<p>We recommend that you upgrade your hdf5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2016/dla-771.data"
-# $Id: $
diff --git a/english/lts/security/2016/index.wml b/english/lts/security/2016/index.wml
deleted file mode 100644
index 03bc9a40742..00000000000
--- a/english/lts/security/2016/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2016</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2016' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2017/Makefile b/english/lts/security/2017/Makefile
deleted file mode 100644
index b890e4fdd41..00000000000
--- a/english/lts/security/2017/Makefile
+++ /dev/null
@@ -1,45 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2017
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
-
-
-
diff --git a/english/lts/security/2017/dla-1000.data b/english/lts/security/2017/dla-1000.data
deleted file mode 100644
index d1fb833a317..00000000000
--- a/english/lts/security/2017/dla-1000.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1000-1 imagemagick</define-tag>
-<define-tag report_date>2017-6-24</define-tag>
-<define-tag secrefs>CVE-2017-9261 CVE-2017-9262 CVE-2017-9405 CVE-2017-9407 CVE-2017-9409 CVE-2017-9439 CVE-2017-9500 CVE-2017-9501 Bug#863833 Bug#863834 Bug#864087 Bug#864089 Bug#864090 Bug#864274</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1000.wml b/english/lts/security/2017/dla-1000.wml
deleted file mode 100644
index f369bd08ad8..00000000000
--- a/english/lts/security/2017/dla-1000.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This update fixes several vulnerabilities in imagemagick: Various memory
-handling problems and cases of missing or incomplete input sanitising
-may result in denial of service if malformed MNG, JNG, ICON, PALM, MPC,
-or PDB files are processed.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u15.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1000.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1001.data b/english/lts/security/2017/dla-1001.data
deleted file mode 100644
index 8339c9d5e21..00000000000
--- a/english/lts/security/2017/dla-1001.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1001-1 exim4</define-tag>
-<define-tag report_date>2017-6-25</define-tag>
-<define-tag secrefs>CVE-2017-1000369</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1001.wml b/english/lts/security/2017/dla-1001.wml
deleted file mode 100644
index 4af131de168..00000000000
--- a/english/lts/security/2017/dla-1001.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Exim supports the use of multiple "-p" command line arguments which are
-malloc()'ed and never free()'ed, used in conjunction with other issues allows
-attackers to cause arbitrary code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.80-7+deb7u5.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1001.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1002.data b/english/lts/security/2017/dla-1002.data
deleted file mode 100644
index 4bb1d7f51f7..00000000000
--- a/english/lts/security/2017/dla-1002.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1002-1 smb4k</define-tag>
-<define-tag report_date>2017-6-25</define-tag>
-<define-tag secrefs>CVE-2017-8849 Bug#862505</define-tag>
-<define-tag packages>smb4k</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1002.wml b/english/lts/security/2017/dla-1002.wml
deleted file mode 100644
index 497743f7c84..00000000000
--- a/english/lts/security/2017/dla-1002.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sebastian Krahmer from SUSE discovered that smb4k, a Samba (SMB) share
-advanced browser, contains a logic flaw in which the mount helper binary
-does not properly verify the mount command it is being asked to run.</p>
-
-<p>This allows local users to call any other binary as root.</p>
-
-<p>The issue is resolved by backporting version 1.2.1-2 from Debian 9
-<q>Stretch</q>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.1-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your smb4k packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1002.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1003.data b/english/lts/security/2017/dla-1003.data
deleted file mode 100644
index 6081effd179..00000000000
--- a/english/lts/security/2017/dla-1003.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1003-1 unrar-nonfree</define-tag>
-<define-tag report_date>2017-6-27</define-tag>
-<define-tag secrefs>CVE-2012-6706 Bug##865461</define-tag>
-<define-tag packages>unrar-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1003.wml b/english/lts/security/2017/dla-1003.wml
deleted file mode 100644
index 61fbc06d41b..00000000000
--- a/english/lts/security/2017/dla-1003.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was reported that unrar fixed a VMSF_DELTA memory corruption issue in
-their latest version unrarsrc-5.5.5.tar.gz. This problem was reported to
-Sophos AV in 2012 but never reach upstream rar.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:4.1.4-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your unrar-nonfree packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1003.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1004.data b/english/lts/security/2017/dla-1004.data
deleted file mode 100644
index 87d761f11ea..00000000000
--- a/english/lts/security/2017/dla-1004.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1004-1 drupal7</define-tag>
-<define-tag report_date>2017-6-28</define-tag>
-<define-tag secrefs>CVE-2017-6922</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1004.wml b/english/lts/security/2017/dla-1004.wml
deleted file mode 100644
index 312c3b84c21..00000000000
--- a/english/lts/security/2017/dla-1004.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Private files that have been uploaded by an anonymous user but not permanently
-attached to content on the site should only be visible to the anonymous user
-that uploaded them, rather than all anonymous users. Drupal core did not
-previously provide this protection, allowing an access bypass vulnerability to
-occur. This issue is mitigated by the fact that in order to be affected, the
-site must allow anonymous users to upload files into a private file system.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.14-2+deb7u16.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1004.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1005.data b/english/lts/security/2017/dla-1005.data
deleted file mode 100644
index 353a220f5c1..00000000000
--- a/english/lts/security/2017/dla-1005.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1005-1 mercurial</define-tag>
-<define-tag report_date>2017-6-29</define-tag>
-<define-tag secrefs>CVE-2017-9462 Bug#861243</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1005.wml b/english/lts/security/2017/dla-1005.wml
deleted file mode 100644
index 6213c48b0c5..00000000000
--- a/english/lts/security/2017/dla-1005.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Mercurial before 4.1.3, "hg serve --stdio" allows remote
-authenticated users to launch the Python debugger, and consequently
-execute arbitrary code, by using --debugger as a repository name.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.2-4+deb7u4.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1005.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1006.data b/english/lts/security/2017/dla-1006.data
deleted file mode 100644
index 99fd730266e..00000000000
--- a/english/lts/security/2017/dla-1006.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1006-1 libarchive</define-tag>
-<define-tag report_date>2017-6-30</define-tag>
-<define-tag secrefs>CVE-2016-10209 CVE-2016-10349 CVE-2016-10350 Bug#859456 Bug#861609</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1006.wml b/english/lts/security/2017/dla-1006.wml
deleted file mode 100644
index 37723c53d85..00000000000
--- a/english/lts/security/2017/dla-1006.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple denial of services vulnerabilities have been identified in
-libarchive when manipulating specially crafted archives.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10209">CVE-2016-10209</a>
-
- <p>NULL pointer dereference and application crash in the
- archive_wstring_append_from_mbs() function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10349">CVE-2016-10349</a>
-
- <p>Heap-based buffer over-read and application crash in the
- archive_le32dec() function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10350">CVE-2016-10350</a>
-
- <p>Heap-based buffer over-read and application crash in the
- archive_read_format_cab_read_header() function.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.4-3+wheezy6.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1006.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1007.data b/english/lts/security/2017/dla-1007.data
deleted file mode 100644
index 3ba663003ab..00000000000
--- a/english/lts/security/2017/dla-1007.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1007-1 icedove</define-tag>
-<define-tag report_date>2017-7-3</define-tag>
-<define-tag secrefs>CVE-2017-5470 CVE-2017-5472 CVE-2017-7749 CVE-2017-7750 CVE-2017-7751 CVE-2017-7752 CVE-2017-7754 CVE-2017-7756 CVE-2017-7757 CVE-2017-7758 CVE-2017-7764 CVE-2017-7771 CVE-2017-7772 CVE-2017-7773 CVE-2017-7774 CVE-2017-7776 CVE-2017-7777 CVE-2017-7778</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1007.wml b/english/lts/security/2017/dla-1007.wml
deleted file mode 100644
index 58520c57dd9..00000000000
--- a/english/lts/security/2017/dla-1007.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-spoofing.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.2.1-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1007.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1008.data b/english/lts/security/2017/dla-1008.data
deleted file mode 100644
index 7aca7efd4a7..00000000000
--- a/english/lts/security/2017/dla-1008.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1008-1 libxml2</define-tag>
-<define-tag report_date>2017-6-30</define-tag>
-<define-tag secrefs>CVE-2017-7375 CVE-2017-9047 CVE-2017-9048 CVE-2017-9049 CVE-2017-9050</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1008.wml b/english/lts/security/2017/dla-1008.wml
deleted file mode 100644
index 804d9c41e4b..00000000000
--- a/english/lts/security/2017/dla-1008.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7375">CVE-2017-7375</a>
-
- <p>Missing validation for external entities in xmlParsePEReference</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9047">CVE-2017-9047</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-9048">CVE-2017-9048</a>
-
- <p>A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801.
- The function xmlSnprintfElementContent in valid.c is supposed to
- recursively dump the element content definition into a char buffer <q>buf</q>
- of size <q>size</q>. The variable len is assigned strlen(buf).
- If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the
- content->prefix is appended to buf (if it actually fits) whereupon
- (ii) content->name is written to the buffer. However, the check for
- whether the content->name actually fits also uses <q>len</q> rather than
- the updated buffer length strlen(buf). This allows us to write about
- <q>size</q> many bytes beyond the allocated memory. This vulnerability
- causes programs that use libxml2, such as PHP, to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9049">CVE-2017-9049</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-9050">CVE-2017-9050</a>
-
- <p>libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based
- buffer over-read in the xmlDictComputeFastKey function in dict.c.
- This vulnerability causes programs that use libxml2, such as PHP,
- to crash. This vulnerability exists because of an incomplete fix
- for libxml2 Bug 759398.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy8.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1008.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1009.data b/english/lts/security/2017/dla-1009.data
deleted file mode 100644
index 684a11dad22..00000000000
--- a/english/lts/security/2017/dla-1009.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1009-1 apache2</define-tag>
-<define-tag report_date>2017-7-2</define-tag>
-<define-tag secrefs>CVE-2017-3167 CVE-2017-3169 CVE-2017-7668 CVE-2017-7679</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1009.wml b/english/lts/security/2017/dla-1009.wml
deleted file mode 100644
index 36324a42410..00000000000
--- a/english/lts/security/2017/dla-1009.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been found in the Apache HTTPD server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3167">CVE-2017-3167</a>
-
- <p>Emmanuel Dreyfus reported that the use of ap_get_basic_auth_pw() by
- third-party modules outside of the authentication phase may lead to
- authentication requirements being bypassed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3169">CVE-2017-3169</a>
-
- <p>Vasileios Panopoulos of AdNovum Informatik AG discovered that
- mod_ssl may dereference a NULL pointer when third-party modules call
- ap_hook_process_connection() during an HTTP request to an HTTPS port
- leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7668">CVE-2017-7668</a>
-
- <p>Javier Jimenez reported that the HTTP strict parsing contains a flaw
- leading to a buffer overread in ap_find_token(). A remote attacker
- can take advantage of this flaw by carefully crafting a sequence of
- request headers to cause a segmentation fault, or to force
- ap_find_token() to return an incorrect value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7679">CVE-2017-7679</a>
-
- <p>ChenQin and Hanno Boeck reported that mod_mime can read one byte
- past the end of a buffer when sending a malicious Content-Type
- response header.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.22-13+deb7u9.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1009.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1010.data b/english/lts/security/2017/dla-1010.data
deleted file mode 100644
index 738b5624f8c..00000000000
--- a/english/lts/security/2017/dla-1010.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1010-1 vorbis-tools</define-tag>
-<define-tag report_date>2017-7-3</define-tag>
-<define-tag secrefs>CVE-2014-9638 CVE-2014-9639 CVE-2014-9640 CVE-2015-6749 Bug#797461 Bug#776086 Bug#771363</define-tag>
-<define-tag packages>vorbis-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1010.wml b/english/lts/security/2017/dla-1010.wml
deleted file mode 100644
index 79f0658bd90..00000000000
--- a/english/lts/security/2017/dla-1010.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>vorbis-tools is vulnerable to multiple issues that can result in denial
-of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9638">CVE-2014-9638</a>
-
- <p>Divide by zero error in oggenc with a WAV file whose number of
- channels is set to zero.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9639">CVE-2014-9639</a>
-
- <p>Integer overflow in oggenc via a crafted number of channels in a WAV
- file, which triggers an out-of-bounds memory access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9640">CVE-2014-9640</a>
-
- <p>Out-of bounds read in oggenc via a crafted raw file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6749">CVE-2015-6749</a>
-
- <p>Buffer overflow in the aiff_open function in oggenc/audio.c
- via a crafted AIFF file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your vorbis-tools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1010.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1011.data b/english/lts/security/2017/dla-1011.data
deleted file mode 100644
index e2183aa9b1a..00000000000
--- a/english/lts/security/2017/dla-1011.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1011-1 sudo</define-tag>
-<define-tag report_date>2017-7-3</define-tag>
-<define-tag secrefs>CVE-2017-1000368 Bug#863897</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1011.wml b/english/lts/security/2017/dla-1011.wml
deleted file mode 100644
index 5c6fc746385..00000000000
--- a/english/lts/security/2017/dla-1011.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an
-input validation (embedded newlines) in the get_process_ttyname()
-function resulting in information disclosure and command execution.</p>
-
-<p>The previous announcement (DLA-970-1) was about a similar security
-issue (<a href="https://security-tracker.debian.org/tracker/CVE-2017-1000367">CVE-2017-1000367</a>) which wasn't completely fixed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.5p2-1+nmu3+deb7u4.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1011.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1012.data b/english/lts/security/2017/dla-1012.data
deleted file mode 100644
index a69eba1e5f8..00000000000
--- a/english/lts/security/2017/dla-1012.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1012-1 puppet</define-tag>
-<define-tag report_date>2017-7-3</define-tag>
-<define-tag secrefs>CVE-2017-2295 Bug#863212</define-tag>
-<define-tag packages>puppet</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1012.wml b/english/lts/security/2017/dla-1012.wml
deleted file mode 100644
index 0119951222b..00000000000
--- a/english/lts/security/2017/dla-1012.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Versions of Puppet prior to 4.10.1 will deserialize data off the wire
-(from the agent to the server, in this case) with a attacker-specified
-format. This could be used to force YAML deserialization in an unsafe
-manner, which would lead to remote code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.7.23-1~deb7u4, by enabling PSON serialization on clients and refusing
-non-PSON formats on the server.</p>
-
-<p>We recommend that you upgrade your puppet packages. Make sure you
-update all your clients before you update the server otherwise older
-clients won't be able to connect to the server.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1012.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1013.data b/english/lts/security/2017/dla-1013.data
deleted file mode 100644
index c82069386dc..00000000000
--- a/english/lts/security/2017/dla-1013.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1013-1 graphite2</define-tag>
-<define-tag report_date>2017-7-5</define-tag>
-<define-tag secrefs>CVE-2017-7771 CVE-2017-7772 CVE-2017-7773 CVE-2017-7774 CVE-2017-7776 CVE-2017-7777 CVE-2017-7778</define-tag>
-<define-tag packages>graphite2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1013.wml b/english/lts/security/2017/dla-1013.wml
deleted file mode 100644
index 0bda1208e37..00000000000
--- a/english/lts/security/2017/dla-1013.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in the Graphite font rendering
-engine which might result in denial of service or the execution of
-arbitrary code if a malformed font file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.10-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your graphite2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1013.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1014.data b/english/lts/security/2017/dla-1014.data
deleted file mode 100644
index 501cba1f094..00000000000
--- a/english/lts/security/2017/dla-1014.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1014-1 libclamunrar</define-tag>
-<define-tag report_date>2017-7-5</define-tag>
-<define-tag secrefs>CVE-2017-7520 Bug##867223</define-tag>
-<define-tag packages>libclamunrar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1014.wml b/english/lts/security/2017/dla-1014.wml
deleted file mode 100644
index 1ef46d0bdee..00000000000
--- a/english/lts/security/2017/dla-1014.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an arbitrary code execution vulnerability in
-libcamunrar, a library to add unrar support to the Clam anti-virus software.</p>
-
-<p>This was caused by an integer overflow resulting in a negative value of the
-``DestPos`` variable, which allows the attacker to write out of bounds when
-setting ``Mem[DestPos]``.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libclamunrar version
-0.99-0+deb7u2.</p>
-
-<p>We recommend that you upgrade your libclamunrar packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1014.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1015.data b/english/lts/security/2017/dla-1015.data
deleted file mode 100644
index b2a74e382f3..00000000000
--- a/english/lts/security/2017/dla-1015.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1015-1 libgcrypt11</define-tag>
-<define-tag report_date>2017-7-6</define-tag>
-<define-tag secrefs>CVE-2017-7526</define-tag>
-<define-tag packages>libgcrypt11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1015.wml b/english/lts/security/2017/dla-1015.wml
deleted file mode 100644
index 6b0c1aceea7..00000000000
--- a/english/lts/security/2017/dla-1015.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a key disclosure vulnerability in libgcrypt11
-a library of cryptographic routines:</p>
-
- <p>It is well known that constant-time implementations of modular exponentiation
- cannot use sliding windows. However, software libraries such as Libgcrypt,
- used by GnuPG, continue to use sliding windows. It is widely believed that,
- even if the complete pattern of squarings and multiplications is observed
- through a side-channel attack, the number of exponent bits leaked is not
- sufficient to carry out a full key-recovery attack against RSA.
- Specifically, 4-bit sliding windows leak only 40% of the bits, and 5-bit
- sliding windows leak only 33% of the bits.</p>
-
- <p>-- Sliding right into disaster: Left-to-right sliding windows leak<br>
- <url "https://eprint.iacr.org/2017/627"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libgcrypt11 version
-1.5.0-5+deb7u6.</p>
-
-<p>We recommend that you upgrade your libgcrypt11 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1015.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1016.data b/english/lts/security/2017/dla-1016.data
deleted file mode 100644
index 91d6c026685..00000000000
--- a/english/lts/security/2017/dla-1016.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1016-1 radare2</define-tag>
-<define-tag report_date>2017-7-6</define-tag>
-<define-tag secrefs>CVE-2017-10929 Bug##867369</define-tag>
-<define-tag packages>radare2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1016.wml b/english/lts/security/2017/dla-1016.wml
deleted file mode 100644
index 85ca6dfc8f9..00000000000
--- a/english/lts/security/2017/dla-1016.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a heap-based buffer overflow in radare2, a
-reverse-engineering framework. The grub_memmove function allowed attackers to
-cause a remote denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in radare2 version
-0.9-3+deb7u3.</p>
-
-<p>We recommend that you upgrade your radare2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1016.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1017.data b/english/lts/security/2017/dla-1017.data
deleted file mode 100644
index bd083371fb0..00000000000
--- a/english/lts/security/2017/dla-1017.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1017-1 mpg123</define-tag>
-<define-tag report_date>2017-7-8</define-tag>
-<define-tag secrefs>CVE-2017-10683 Bug##866860</define-tag>
-<define-tag packages>mpg123</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1017.wml b/english/lts/security/2017/dla-1017.wml
deleted file mode 100644
index c50cee5ba1a..00000000000
--- a/english/lts/security/2017/dla-1017.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote denial of service vulnerability in
-the mpg123 audio library/player. This was caused by a heap-based buffer
-over-read in the <q>convert_latin1</q> function.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in mpg123 version
-1.14.4-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your mpg123 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1017.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1018.data b/english/lts/security/2017/dla-1018.data
deleted file mode 100644
index 3cca0f39e8e..00000000000
--- a/english/lts/security/2017/dla-1018.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1018-1 sqlite3</define-tag>
-<define-tag report_date>2017-7-9</define-tag>
-<define-tag secrefs>CVE-2017-10989 Bug##867618</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1018.wml b/english/lts/security/2017/dla-1018.wml
deleted file mode 100644
index af3c3c058c2..00000000000
--- a/english/lts/security/2017/dla-1018.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a heap-based buffer over-read vulnerability in
-SQLite, a lightweight database engine. The getNodeSize function in
-ext/rtree/rtree.c mishandled undersized RTree blobs in a specially-crafted
-database,</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in sqlite3 version
-3.7.13-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1018.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1019.data b/english/lts/security/2017/dla-1019.data
deleted file mode 100644
index 777f5ebbf4a..00000000000
--- a/english/lts/security/2017/dla-1019.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1019-1 phpldapadmin</define-tag>
-<define-tag report_date>2017-7-9</define-tag>
-<define-tag secrefs>CVE-2017-11107 Bug##867719</define-tag>
-<define-tag packages>phpldapadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1019.wml b/english/lts/security/2017/dla-1019.wml
deleted file mode 100644
index 022b2df1a21..00000000000
--- a/english/lts/security/2017/dla-1019.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability in
-phpldapadmin, a web-based interface for administering LDAP servers.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in phpldapadmin version
-1.2.2-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your phpldapadmin packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1019.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1020.data b/english/lts/security/2017/dla-1020.data
deleted file mode 100644
index b4bef0fb08e..00000000000
--- a/english/lts/security/2017/dla-1020.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1020-1 jetty</define-tag>
-<define-tag report_date>2017-7-9</define-tag>
-<define-tag secrefs>CVE-2017-9735 Bug#864898</define-tag>
-<define-tag packages>jetty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1020.wml b/english/lts/security/2017/dla-1020.wml
deleted file mode 100644
index bd7ef148e2e..00000000000
--- a/english/lts/security/2017/dla-1020.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Jetty, a Java servlet engine and webserver, was
-vulnerable to a timing attack which might reveal cryptographic
-credentials such as passwords to a local user.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.1.26-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your jetty packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1020.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1021.data b/english/lts/security/2017/dla-1021.data
deleted file mode 100644
index 863d4c15f94..00000000000
--- a/english/lts/security/2017/dla-1021.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1021-1 jetty8</define-tag>
-<define-tag report_date>2017-7-11</define-tag>
-<define-tag secrefs>CVE-2017-9735 Bug#864898</define-tag>
-<define-tag packages>jetty8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1021.wml b/english/lts/security/2017/dla-1021.wml
deleted file mode 100644
index 3d8ccf98bd2..00000000000
--- a/english/lts/security/2017/dla-1021.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Jetty8, a Java servlet engine and webserver, was
-vulnerable to a timing attack which might reveal cryptographic
-credentials such as passwords to a local user.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8.1.3-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your jetty8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1021.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1022.data b/english/lts/security/2017/dla-1022.data
deleted file mode 100644
index e1b93ea462d..00000000000
--- a/english/lts/security/2017/dla-1022.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1022-1 tiff</define-tag>
-<define-tag report_date>2017-7-11</define-tag>
-<define-tag secrefs>CVE-2017-9936 CVE-2017-10688 Bug#866113 Bug#866611</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1022.wml b/english/lts/security/2017/dla-1022.wml
deleted file mode 100644
index 27b58b87c62..00000000000
--- a/english/lts/security/2017/dla-1022.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been discovered in the libtiff library and the
-included tools, which may result in denial of service or the execution
-of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9936">CVE-2017-9936</a>
-
- <p>A crafted TIFF document can lead to a memory leak resulting in a
- remote denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10688">CVE-2017-10688</a>
-
- <p>A crafted input will lead to a remote denial of service attack.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u15.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1022.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1023.data b/english/lts/security/2017/dla-1023.data
deleted file mode 100644
index cdef57a8d7b..00000000000
--- a/english/lts/security/2017/dla-1023.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1023-1 tiff3</define-tag>
-<define-tag report_date>2017-7-11</define-tag>
-<define-tag secrefs>CVE-2017-9936 Bug#866113</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1023.wml b/english/lts/security/2017/dla-1023.wml
deleted file mode 100644
index 6c35e3e50ee..00000000000
--- a/english/lts/security/2017/dla-1023.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerabilitie has been discovered in the libtiff library and the
-included tools, which may result in denial of service or the execution
-of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9936">CVE-2017-9936</a>
-
- <p>A crafted TIFF document can lead to a memory leak resulting in a
- remote denial of service attack.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u7.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1023.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1024.data b/english/lts/security/2017/dla-1024.data
deleted file mode 100644
index d25d92a659f..00000000000
--- a/english/lts/security/2017/dla-1024.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1024-1 nginx</define-tag>
-<define-tag report_date>2017-7-13</define-tag>
-<define-tag secrefs>CVE-2017-7529 Bug##868109</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1024.wml b/english/lts/security/2017/dla-1024.wml
deleted file mode 100644
index 620e44918cb..00000000000
--- a/english/lts/security/2017/dla-1024.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was vulnerability in the range filter of nginx, a
-web/proxy server. A specially crafted request might result in an integer
-overflow and incorrect processing of HTTP ranges, potentially resulting in a
-sensitive information leak.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in nginx version
-1.2.1-2.2+wheezy4+deb7u1.</p>
-
-<p>We recommend that you upgrade your nginx packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1024.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1025-2.data b/english/lts/security/2017/dla-1025-2.data
deleted file mode 100644
index 3c284fe921f..00000000000
--- a/english/lts/security/2017/dla-1025-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1025-2 bind9</define-tag>
-<define-tag report_date>2017-7-25</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1025-2.wml b/english/lts/security/2017/dla-1025-2.wml
deleted file mode 100644
index 7996a152846..00000000000
--- a/english/lts/security/2017/dla-1025-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA-1025-1 in bind9 introduced a
-regression.</p>
-
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-3142">CVE-2017-3142</a>
-broke verification of TSIG signed TCP message
-sequences where not all the messages contain TSIG records.
-This is conform to the spec and may be used in AXFR and IXFR response.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u18.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1025-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1025.data b/english/lts/security/2017/dla-1025.data
deleted file mode 100644
index ab3624a63af..00000000000
--- a/english/lts/security/2017/dla-1025.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1025-1 bind9</define-tag>
-<define-tag report_date>2017-7-13</define-tag>
-<define-tag secrefs>CVE-2017-3142 CVE-2017-3143</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1025.wml b/english/lts/security/2017/dla-1025.wml
deleted file mode 100644
index 5a819f4a50e..00000000000
--- a/english/lts/security/2017/dla-1025.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3142">CVE-2017-3142</a>
-
- <p>An attacker who is able to send and receive messages to an authoritative
- DNS server and who has knowledge of a valid TSIG key name may be able to
- circumvent TSIG authentication of AXFR requests via a carefully constructed
- request packet. A server that relies solely on TSIG keys for protection
- with no other ACL protection could be manipulated into:</p>
- <ul>
- <li>providing an AXFR of a zone to an unauthorized recipient</li>
- <li>accepting bogus NOTIFY packets</li>
- </ul></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3143">CVE-2017-3143</a>
-
- <p>An attacker who is able to send and receive messages to an authoritative
- DNS server and who has knowledge of a valid TSIG key name for the zone and
- service being targeted may be able to manipulate BIND into accepting an
- unauthorized dynamic update.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u17.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1025.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1026.data b/english/lts/security/2017/dla-1026.data
deleted file mode 100644
index d406e20ac94..00000000000
--- a/english/lts/security/2017/dla-1026.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1026-1 xorg-server</define-tag>
-<define-tag report_date>2017-7-14</define-tag>
-<define-tag secrefs>CVE-2017-10971 CVE-2017-10972 Bug#867492 Bug#867492</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1026.wml b/english/lts/security/2017/dla-1026.wml
deleted file mode 100644
index 5050feb9c1a..00000000000
--- a/english/lts/security/2017/dla-1026.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10971">CVE-2017-10971</a>
-
- <p>A user authenticated to an X Session could crash or execute code in the
- context of the X Server by exploiting a stack overflow in the endianness
- conversion of X Events.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10972">CVE-2017-10972</a>
-
- <p>Uninitialized data in endianness conversion in the XEvent handling of the
- X.Org X Server allowed authenticated malicious users to access potentially
- privileged data from the X server.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.12.4-6+deb7u7.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1026.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1027.data b/english/lts/security/2017/dla-1027.data
deleted file mode 100644
index 4fa7570750f..00000000000
--- a/english/lts/security/2017/dla-1027.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1027-1 heimdal</define-tag>
-<define-tag report_date>2017-7-14</define-tag>
-<define-tag secrefs>CVE-2017-11103 Bug#868208</define-tag>
-<define-tag packages>heimdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1027.wml b/english/lts/security/2017/dla-1027.wml
deleted file mode 100644
index c2c7d5b58a0..00000000000
--- a/english/lts/security/2017/dla-1027.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jeffrey Altman, Viktor Duchovni and Nico Williams identified a mutual
-authentication bypass vulnerability in Heimdal Kerberos. Also known as
-Orpheus' Lyre, this vulnerability could be used by an attacker to mount
-a service impersonation attack on the client if he's on the network
-path between the client and the service.</p>
-
-<p>More details can be found on the vulnerability website
-(https://orpheus-lyre.info/).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6~git20120403+dfsg1-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your heimdal packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1027.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1028.data b/english/lts/security/2017/dla-1028.data
deleted file mode 100644
index cc948d63be1..00000000000
--- a/english/lts/security/2017/dla-1028.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1028-1 apache2</define-tag>
-<define-tag report_date>2017-7-17</define-tag>
-<define-tag secrefs>CVE-2017-9788 Bug##868467</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1028.wml b/english/lts/security/2017/dla-1028.wml
deleted file mode 100644
index 9c4667735f5..00000000000
--- a/english/lts/security/2017/dla-1028.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Robert Święcki discovered that the value placeholder in [Proxy-]Authorization
-Digest headers were not initialized or reset before or between successive
-key=value assignments in Apache 2's mod_auth_digest module</p>
-
-<p>Providing an initial key with no '=' assignment could reflect the stale value
-of uninitialized pool memory used by the prior request leading to leakage of
-potentially confidential information and a segfault.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in apache2 version
-2.2.22-13+deb7u10.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1028.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1029.data b/english/lts/security/2017/dla-1029.data
deleted file mode 100644
index ea3cc5e7418..00000000000
--- a/english/lts/security/2017/dla-1029.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1029-1 libmtp</define-tag>
-<define-tag report_date>2017-7-17</define-tag>
-<define-tag secrefs>CVE-2017-9831 CVE-2017-9832</define-tag>
-<define-tag packages>libmtp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1029.wml b/english/lts/security/2017/dla-1029.wml
deleted file mode 100644
index ffc644a98a9..00000000000
--- a/english/lts/security/2017/dla-1029.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libmtp, a library for communicating with MTP aware devices (like
-cellular phones and audio players), was found to be vulnerable to
-several integer overflow vulnerabilities, which allowed malicious
-devices to cause denial of service crashes and maybe remote code
-execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9831">CVE-2017-9831</a>
-
- <p>An integer overflow vulnerability in the
- ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of
- libmtp (version 1.1.12 and below) allows attackers to cause a
- denial of service (out-of-bounds memory access) or maybe remote
- code execution by inserting a mobile device into a personal
- computer through a USB cable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9832">CVE-2017-9832</a>
-
- <p>An integer overflow vulnerability in ptp-pack.c (ptp_unpack_OPL
- function) of libmtp (version 1.1.12 and below) allows attackers to
- cause a denial of service (out-of-bounds memory access) or maybe
- remote code execution by inserting a mobile device into a personal
- computer through a USB cable.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.3-35-g0ece104-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your libmtp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1029.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1030.data b/english/lts/security/2017/dla-1030.data
deleted file mode 100644
index 0b35a8808f8..00000000000
--- a/english/lts/security/2017/dla-1030.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1030-1 vim</define-tag>
-<define-tag report_date>2017-7-18</define-tag>
-<define-tag secrefs>CVE-2017-11109 Bug##867720</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1030.wml b/english/lts/security/2017/dla-1030.wml
deleted file mode 100644
index f8744c117ee..00000000000
--- a/english/lts/security/2017/dla-1030.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Vim 8.0 allows attackers to cause a denial of service (invalid free) or
-possibly have unspecified other impact via a crafted source (aka -S)
-file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:7.3.547-7+deb7u4.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1030.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1031.data b/english/lts/security/2017/dla-1031.data
deleted file mode 100644
index 672c9da83b5..00000000000
--- a/english/lts/security/2017/dla-1031.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1031-1 evince</define-tag>
-<define-tag report_date>2017-7-18</define-tag>
-<define-tag secrefs>CVE-2017-1000083 Bug#868500</define-tag>
-<define-tag packages>evince</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1031.wml b/english/lts/security/2017/dla-1031.wml
deleted file mode 100644
index b3779adc759..00000000000
--- a/english/lts/security/2017/dla-1031.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>from the Google Security Team discovered that the Evince document
-viewer made insecure use of tar when opening tar comic book archives
-(CBT). Opening a malicious CBT archive could result in the execution
-of arbitrary code. This update disables the CBT format entirely.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.4.0-3.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your evince packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1031.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1032.data b/english/lts/security/2017/dla-1032.data
deleted file mode 100644
index cc49370ffb3..00000000000
--- a/english/lts/security/2017/dla-1032.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1032-1 unattended-upgrades</define-tag>
-<define-tag report_date>2017-7-19</define-tag>
-<define-tag secrefs>Bug#867169</define-tag>
-<define-tag packages>unattended-upgrades</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1032.wml b/english/lts/security/2017/dla-1032.wml
deleted file mode 100644
index d723a84f55e..00000000000
--- a/english/lts/security/2017/dla-1032.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Since the release of the last Debian stable release ("stretch"),
-Debian LTS ("wheezy") has been renamed <q>oldoldstable</q>, which broke
-the unattended-upgrades package as described in bug #867169. Updates
-would simply not be performed anymore.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.79.5+wheezy3. Note that later unattended-upgrades version released
-in later Debian versions do not exhibit the same behavior, as they use
-the release codename (e.g. <q>jessie</q>) instead of the suite name
-(e.g. <q>oldstable</q>) in the configuration file. So later releases will
-transition correctly for future LTS releases.</p>
-
-<p>We recommend that you upgrade your unattended-upgrades packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1032.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1033.data b/english/lts/security/2017/dla-1033.data
deleted file mode 100644
index 136877dc680..00000000000
--- a/english/lts/security/2017/dla-1033.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1033-1 memcached</define-tag>
-<define-tag report_date>2017-7-20</define-tag>
-<define-tag secrefs>CVE-2017-9951 Bug##868701</define-tag>
-<define-tag packages>memcached</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1033.wml b/english/lts/security/2017/dla-1033.wml
deleted file mode 100644
index 94265ca556c..00000000000
--- a/english/lts/security/2017/dla-1033.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote denial-of-service (DoS) vulnerability
-in memcached, a high-performance memory object caching system.</p>
-
-<p>The try_read_command function allowed remote attackers to cause a DoS via a
-request to add/set a key that makes a comparison between a signed and unsigned
-integer which triggered a heap-based buffer over-read.</p>
-
-<p>This vulnerability existed due to an incomplete upstream fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-8705">CVE-2016-8705</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in memcached version
-1.4.13-0.2+deb7u3.</p>
-
-<p>We recommend that you upgrade your memcached packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1033.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1034.data b/english/lts/security/2017/dla-1034.data
deleted file mode 100644
index 027f6027ef8..00000000000
--- a/english/lts/security/2017/dla-1034.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1034-1 php5</define-tag>
-<define-tag report_date>2017-7-21</define-tag>
-<define-tag secrefs>CVE-2016-10397 CVE-2017-11143 CVE-2017-11144 CVE-2017-11145 CVE-2017-11147</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1034.wml b/english/lts/security/2017/dla-1034.wml
deleted file mode 100644
index 0efc2615870..00000000000
--- a/english/lts/security/2017/dla-1034.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in PHP (recursive acronym for PHP:
-Hypertext Preprocessor), a widely-used open source general-purpose
-scripting language that is especially suited for web development and can
-be embedded into HTML.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10397">CVE-2016-10397</a>
-
- <p>Incorrect handling of various URI components in the URL parser could
- be used by attackers to bypass hostname-specific URL checks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11143">CVE-2017-11143</a>
-
- <p>An invalid free in the WDDX deserialization of boolean parameters
- could be used by attackers able to inject XML for deserialization to
- crash the PHP interpreter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11144">CVE-2017-11144</a>
-
- <p>The openssl extension PEM sealing code did not check the return value
- of the OpenSSL sealing function, which could lead to a crash of the
- PHP interpreter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11145">CVE-2017-11145</a>
-
- <p>Lack of a bounds check in the date extension's timelib_meridian
- parsing code could be used by attackers able to supply date strings to
- leak information from the interpreter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11147">CVE-2017-11147</a>
-
- <p>The PHAR archive handler could be used by attackers supplying
- malicious archive files to crash the PHP interpreter or potentially
- disclose information due to a buffer over-read in the
- phar_parse_pharfile function in ext/phar/phar.c.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u9.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1034.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1035.data b/english/lts/security/2017/dla-1035.data
deleted file mode 100644
index 8189f726aa5..00000000000
--- a/english/lts/security/2017/dla-1035.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1035-1 qemu</define-tag>
-<define-tag report_date>2017-7-21</define-tag>
-<define-tag secrefs>CVE-2016-9602 CVE-2016-9603 CVE-2017-7377 CVE-2017-7471 CVE-2017-7493 CVE-2017-7718 CVE-2017-7980 CVE-2017-8086</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1035.wml b/english/lts/security/2017/dla-1035.wml
deleted file mode 100644
index fdf3a3d4aed..00000000000
--- a/english/lts/security/2017/dla-1035.wml
+++ /dev/null
@@ -1,105 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in qemu, a fast processor
-emulator. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9603">CVE-2016-9603</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator and the VNC
- display driver support is vulnerable to a heap buffer overflow
- issue. It could occur when Vnc client attempts to update its
- display after a vga operation is performed by a guest.</p>
-
- <p>A privileged user/process inside guest could use this flaw to crash
- the Qemu process resulting in DoS OR potentially leverage it to
- execute arbitrary code on the host with privileges of the Qemu
- process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7718">CVE-2017-7718</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
- vulnerable to an out-of-bounds access issue. It could occur while
- copying VGA data via bitblt functions cirrus_bitblt_rop_fwd_transp_
- and/or cirrus_bitblt_rop_fwd_.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7980">CVE-2017-7980</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
- vulnerable to an out-of-bounds r/w access issues. It could occur
- while copying VGA data via various bitblt functions.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS OR potentially execute arbitrary code
- on a host with privileges of Qemu process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9602">CVE-2016-9602</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an improper link
- following issue. It could occur while accessing symbolic link files
- on a shared host directory.</p>
-
- <p>A privileged user inside guest could use this flaw to access host file
- system beyond the shared folder and potentially escalating their
- privileges on a host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7377">CVE-2017-7377</a>
-
- <p>Quick Emulator(Qemu) built with the virtio-9p back-end support is
- vulnerable to a memory leakage issue. It could occur while doing a I/O
- operation via v9fs_create/v9fs_lcreate routine.</p>
-
- <p>A privileged user/process inside guest could use this flaw to leak
- host memory resulting in Dos.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7471">CVE-2017-7471</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an improper access
- control issue. It could occur while accessing files on a shared host
- directory.</p>
-
- <p>A privileged user inside guest could use this flaw to access host file
- system beyond the shared folder and potentially escalating their
- privileges on a host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7493">CVE-2017-7493</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an improper access
- control issue. It could occur while accessing virtfs metadata files
- in mapped-file security mode.</p>
-
- <p>A guest user could use this flaw to escalate their privileges inside
- guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8086">CVE-2017-8086</a>
-
- <p>Quick Emulator(Qemu) built with the virtio-9p back-end support is
- vulnerable to a memory leakage issue. It could occur while querying
- file system extended attributes via 9pfs_list_xattr() routine.</p>
-
- <p>A privileged user/process inside guest could use this flaw to leak
- host memory resulting in Dos.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u22.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1035.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1036.data b/english/lts/security/2017/dla-1036.data
deleted file mode 100644
index 78977c31acf..00000000000
--- a/english/lts/security/2017/dla-1036.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1036-1 gsoap</define-tag>
-<define-tag report_date>2017-7-24</define-tag>
-<define-tag secrefs>CVE-2017-9765</define-tag>
-<define-tag packages>gsoap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1036.wml b/english/lts/security/2017/dla-1036.wml
deleted file mode 100644
index 2b2ba8ccf6f..00000000000
--- a/english/lts/security/2017/dla-1036.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in gsoap, a library for the development
-of SOAP web services and clients, that may be exposed with a large and
-specific XML message over 2 GB in size. After receiving this 2 GB
-message, a buffer overflow can cause an open unsecured server to crash.
-Clients communicating with HTTPS with trusted servers are not affected.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.7-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your gsoap packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1036.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1037.data b/english/lts/security/2017/dla-1037.data
deleted file mode 100644
index 5a46681ceb4..00000000000
--- a/english/lts/security/2017/dla-1037.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1037-1 catdoc</define-tag>
-<define-tag report_date>2017-7-24</define-tag>
-<define-tag secrefs>CVE-2017-11110 Bug#867717</define-tag>
-<define-tag packages>catdoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1037.wml b/english/lts/security/2017/dla-1037.wml
deleted file mode 100644
index c61fd8eb24a..00000000000
--- a/english/lts/security/2017/dla-1037.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer underflow flaw was discovered in catdoc, a text
-extractor for MS-Office files, which may lead to denial of service
-(application crash) or have unspecified other impact, if a specially
-crafted file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.94.4-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your catdoc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1037.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1038.data b/english/lts/security/2017/dla-1038.data
deleted file mode 100644
index 5f17cea67d5..00000000000
--- a/english/lts/security/2017/dla-1038.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1038-1 libtasn1-3</define-tag>
-<define-tag report_date>2017-7-24</define-tag>
-<define-tag secrefs>CVE-2017-10790</define-tag>
-<define-tag packages>libtasn1-3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1038.wml b/english/lts/security/2017/dla-1038.wml
deleted file mode 100644
index e9e588b6587..00000000000
--- a/english/lts/security/2017/dla-1038.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10790">CVE-2017-10790</a>
-
- <p>The _asn1_check_identifier function in GNU Libtasn1 through 4.12
- causes a NULL pointer dereference and crash when reading crafted
- input that triggers assignment of a NULL value within an asn1_node
- structure. It may lead to a remote denial of service attack.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.13-2+deb7u5.</p>
-
-<p>We recommend that you upgrade your libtasn1-3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1038.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1039.data b/english/lts/security/2017/dla-1039.data
deleted file mode 100644
index 9b84afe7832..00000000000
--- a/english/lts/security/2017/dla-1039.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1039-1 rkhunter</define-tag>
-<define-tag report_date>2017-7-25</define-tag>
-<define-tag secrefs>CVE-2017-7480</define-tag>
-<define-tag packages>rkhunter</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1039.wml b/english/lts/security/2017/dla-1039.wml
deleted file mode 100644
index a4ba381c8d0..00000000000
--- a/english/lts/security/2017/dla-1039.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7480">CVE-2017-7480</a>
-
- <p>The original patch introduces new regex to better check for
- allowed download URLs.
- Other versions of the package in Jessie, Stretch and Sid don't
- apply that patch but just disable the download of everything by
- default via rkhunter.conf.
- In order to make this version consistent with all the other
- distributions and don't break existing installations, this will
- be done in Wheezy as well.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your rkhunter packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1039.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1040.data b/english/lts/security/2017/dla-1040.data
deleted file mode 100644
index 66721c3b809..00000000000
--- a/english/lts/security/2017/dla-1040.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1040-1 resiprocate</define-tag>
-<define-tag report_date>2017-7-26</define-tag>
-<define-tag secrefs>CVE-2017-11521</define-tag>
-<define-tag packages>resiprocate</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1040.wml b/english/lts/security/2017/dla-1040.wml
deleted file mode 100644
index 48404dc6dac..00000000000
--- a/english/lts/security/2017/dla-1040.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11521">CVE-2017-11521</a>
-
- <p>The SdpContents::Session::Medium::parse function in
- resip/stack/SdpContents.cxx in reSIProcate 1.10.2 allows remote
- attackers to cause a denial of service (memory consumption) by
- triggering many media connections.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.5-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your resiprocate packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1040.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1041.data b/english/lts/security/2017/dla-1041.data
deleted file mode 100644
index 58ce38d8c91..00000000000
--- a/english/lts/security/2017/dla-1041.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1041-1 nasm</define-tag>
-<define-tag report_date>2017-7-28</define-tag>
-<define-tag secrefs>CVE-2017-10686 CVE-2017-11111</define-tag>
-<define-tag packages>nasm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1041.wml b/english/lts/security/2017/dla-1041.wml
deleted file mode 100644
index 0c101bbe9fa..00000000000
--- a/english/lts/security/2017/dla-1041.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10686">CVE-2017-10686</a>
-
- <p>In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use
- after free vulnerabilities in the tool nasm. The related heap is
- allocated in the token() function and freed in the detoken()
- function (called by pp_getline()) - it is used again at multiple
- positions later that could cause multiple damages. For example,
- it causes a corrupted double-linked list in detoken(), a double
- free or corruption in delete_Token(), and an out-of-bounds write
- in detoken(). It has a high possibility to lead to a remote code
- execution attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11111">CVE-2017-11111</a>
-
- <p>In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote
- attackers to cause a denial of service (heap-based buffer
- overflow and application crash) or possibly have unspecified
- other impact via a crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.10.01-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your nasm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1041.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1042.data b/english/lts/security/2017/dla-1042.data
deleted file mode 100644
index ba5c0608ccb..00000000000
--- a/english/lts/security/2017/dla-1042.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1042-1 libquicktime</define-tag>
-<define-tag report_date>2017-7-28</define-tag>
-<define-tag secrefs>CVE-2017-9122 CVE-2017-9123 CVE-2017-9124 CVE-2017-9125 CVE-2017-9126 CVE-2017-9127 CVE-2017-9128 Bug#864664</define-tag>
-<define-tag packages>libquicktime</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1042.wml b/english/lts/security/2017/dla-1042.wml
deleted file mode 100644
index 023bd6dfd93..00000000000
--- a/english/lts/security/2017/dla-1042.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9122">CVE-2017-9122</a>
-
- <p>The quicktime_read_moov function in moov.c in libquicktime 1.2.4 allows
- remote attackers to cause a denial of service (infinite loop and CPU
- consumption) via a crafted mp4 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9123">CVE-2017-9123</a>
-
- <p>The lqt_frame_duration function in lqt_quicktime.c in libquicktime
- 1.2.4 allows remote attackers to cause a denial of service (invalid
- memory read and application crash) via a crafted mp4 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9124">CVE-2017-9124</a>
-
- <p>The quicktime_match_32 function in util.c in libquicktime 1.2.4 allows
- remote attackers to cause a denial of service (NULL pointer dereference
- and application crash) via a crafted mp4 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9125">CVE-2017-9125</a>
-
- <p>The lqt_frame_duration function in lqt_quicktime.c in libquicktime
- 1.2.4 allows remote attackers to cause a denial of service (heap-based
- buffer over-read) via a crafted mp4 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9126">CVE-2017-9126</a>
-
- <p>The quicktime_read_dref_table function in dref.c in libquicktime 1.2.4
- allows remote attackers to cause a denial of service (heap-based buffer
- overflow and application crash) via a crafted mp4 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9127">CVE-2017-9127</a>
-
- <p>The quicktime_user_atoms_read_atom function in useratoms.c in
- libquicktime 1.2.4 allows remote attackers to cause a denial of service
- (heap-based buffer overflow and application crash) via a crafted mp4
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9128">CVE-2017-9128</a>
-
- <p>The quicktime_video_width function in lqt_quicktime.c in libquicktime
- 1.2.4 allows remote attackers to cause a denial of service (heap-based
- buffer over-read and application crash) via a crafted mp4 file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.2.4-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your libquicktime packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1042.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1043.data b/english/lts/security/2017/dla-1043.data
deleted file mode 100644
index d2cc9ff21d9..00000000000
--- a/english/lts/security/2017/dla-1043.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1043-1 mysql-5.5</define-tag>
-<define-tag report_date>2017-7-28</define-tag>
-<define-tag secrefs>CVE-2017-3635 CVE-2017-3636 CVE-2017-3641 CVE-2017-3648. CVE-2017-3651 CVE-2017-3652 CVE-2017-3653 Bug#868788</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1043.wml b/english/lts/security/2017/dla-1043.wml
deleted file mode 100644
index 2b828d6135f..00000000000
--- a/english/lts/security/2017/dla-1043.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.57, which includes additional changes, such as performance
-improvements, bug fixes, new features, and possibly incompatible
-changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-56.html"></li>
-<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-57.html">https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-57.html</a></li>
-<li><a href="http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html">http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.57-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1043.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1044.data b/english/lts/security/2017/dla-1044.data
deleted file mode 100644
index 17333a7941f..00000000000
--- a/english/lts/security/2017/dla-1044.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1044-1 ipsec-tools</define-tag>
-<define-tag report_date>2017-7-30</define-tag>
-<define-tag secrefs>CVE-2016-10396 Bug#867986</define-tag>
-<define-tag packages>ipsec-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1044.wml b/english/lts/security/2017/dla-1044.wml
deleted file mode 100644
index ff25fbbbe91..00000000000
--- a/english/lts/security/2017/dla-1044.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The racoon daemon in IPsec-Tools 0.8.2 and earlier contains a remotely
-exploitable computational-complexity attack when parsing and storing
-ISAKMP fragments. The implementation permits a remote attacker to
-exhaust computational resources on the remote endpoint by repeatedly
-sending ISAKMP fragment packets in a particular order such that the
-worst-case computational complexity is realized in the algorithm
-utilized to determine if reassembly of the fragments can take place.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.8.0-14+deb7u2.</p>
-
-<p>We recommend that you upgrade your ipsec-tools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1044.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1045.data b/english/lts/security/2017/dla-1045.data
deleted file mode 100644
index d274d09afbf..00000000000
--- a/english/lts/security/2017/dla-1045.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1045-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-7-30</define-tag>
-<define-tag secrefs>CVE-2017-10799 CVE-2017-11102 CVE-2017-11140 CVE-2017-11403 CVE-2017-11636 CVE-2017-11637 CVE-2017-11638 CVE-2017-11641 CVE-2017-11642 CVE-2017-11643 Bug#867077 Bug#867746 Bug#870149</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1045.wml b/english/lts/security/2017/dla-1045.wml
deleted file mode 100644
index 142bc05d4a7..00000000000
--- a/english/lts/security/2017/dla-1045.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities, NULL pointer dereferences,
-use-after-free and heap based overflows, were discovered in
-graphicsmagick that can lead to denial of service by consuming all
-available memory or segmentation faults.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u8.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1045.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1046.data b/english/lts/security/2017/dla-1046.data
deleted file mode 100644
index be4d690b951..00000000000
--- a/english/lts/security/2017/dla-1046.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1046-1 lucene-solr</define-tag>
-<define-tag report_date>2017-7-30</define-tag>
-<define-tag secrefs>CVE-2017-3163 Bug#867712</define-tag>
-<define-tag packages>lucene-solr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1046.wml b/english/lts/security/2017/dla-1046.wml
deleted file mode 100644
index 88a04600d7d..00000000000
--- a/english/lts/security/2017/dla-1046.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>lucene-solr handler supports an HTTP API (/replication?command=filecontent&amp;file=&lt;file_name&gt;)
-which is vulnerable to path traversal attack. Specifically, this API does not
-perform any validation of the user specified file_name parameter. This can
-allow an attacker to download any file readable to Solr server process even if
-it is not related to the actual Solr index state.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.6.0+dfsg-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your lucene-solr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1046.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1047.data b/english/lts/security/2017/dla-1047.data
deleted file mode 100644
index 0eb7905425e..00000000000
--- a/english/lts/security/2017/dla-1047.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1047-1 supervisor</define-tag>
-<define-tag report_date>2017-7-31</define-tag>
-<define-tag secrefs>CVE-2017-11610 Bug#870187</define-tag>
-<define-tag packages>supervisor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1047.wml b/english/lts/security/2017/dla-1047.wml
deleted file mode 100644
index 7843cac0703..00000000000
--- a/english/lts/security/2017/dla-1047.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in supervisor, a system for controlling
-process state, where an authenticated client can send a malicious
-XML-RPC request to supervisord that will run arbitrary shell commands
-on the server. The commands will be run as the same user as supervisord.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0a8-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your supervisor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1047.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1048.data b/english/lts/security/2017/dla-1048.data
deleted file mode 100644
index b73f8dbe406..00000000000
--- a/english/lts/security/2017/dla-1048.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1048-1 ghostscript</define-tag>
-<define-tag report_date>2017-8-1</define-tag>
-<define-tag secrefs>CVE-2017-7207 CVE-2017-9611 CVE-2017-9612 CVE-2017-9726 CVE-2017-9727 CVE-2017-9739 CVE-2017-9835 CVE-2017-11714 Bug#858350 Bug#869977 Bug#869907 Bug#869910 Bug#869913 Bug#869915 Bug#869916 Bug#869917</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1048.wml b/english/lts/security/2017/dla-1048.wml
deleted file mode 100644
index 734b9d58e0a..00000000000
--- a/english/lts/security/2017/dla-1048.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in Ghostscript, the GPL PostScript/PDF
-interpreter, which allow remote attackers to cause a denial of service
-(heap-based buffer overflow and application crash) or possibly have
-unspecified other impact via a crafted PostScript document.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.05~dfsg-6.3+deb7u7.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1048.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1049.data b/english/lts/security/2017/dla-1049.data
deleted file mode 100644
index 64dd6fe5a06..00000000000
--- a/english/lts/security/2017/dla-1049.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1049-1 libsndfile</define-tag>
-<define-tag report_date>2017-8-7</define-tag>
-<define-tag secrefs>CVE-2017-12562 Bug##869166</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1049.wml b/english/lts/security/2017/dla-1049.wml
deleted file mode 100644
index 686dce33c6b..00000000000
--- a/english/lts/security/2017/dla-1049.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a heap buffer overflow attack in libsndfile, a
-library for reading/writing audio files. An attacker could cause a remote
-denial of service attack by tricking the function into outputting a large
-amount of data.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libsndfile version
-1.0.25-9.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1049.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1050.data b/english/lts/security/2017/dla-1050.data
deleted file mode 100644
index 4a601872064..00000000000
--- a/english/lts/security/2017/dla-1050.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1050-1 xchat</define-tag>
-<define-tag report_date>2017-8-10</define-tag>
-<define-tag secrefs>CVE-2016-2087 Bug#852275</define-tag>
-<define-tag packages>xchat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1050.wml b/english/lts/security/2017/dla-1050.wml
deleted file mode 100644
index e80dfd98a83..00000000000
--- a/english/lts/security/2017/dla-1050.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a directory traversal vulnerability in
-the xchat IRC client which allowed remote IRC servers to read or modify
-arbitrary files via a ".." in the server name.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in xchat version
-2.8.8-7.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your xchat packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1050.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1051.data b/english/lts/security/2017/dla-1051.data
deleted file mode 100644
index 7570b7e212e..00000000000
--- a/english/lts/security/2017/dla-1051.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1051-1 postgresql-9.1</define-tag>
-<define-tag report_date>2017-8-10</define-tag>
-<define-tag secrefs>CVE-2017-7486 CVE-2017-7546 CVE-2017-7547</define-tag>
-<define-tag packages>postgresql-9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1051.wml b/english/lts/security/2017/dla-1051.wml
deleted file mode 100644
index fb7cd4bed2e..00000000000
--- a/english/lts/security/2017/dla-1051.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the PostgreSQL database
-system:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7486">CVE-2017-7486</a>
-
- <p>Andrew Wheelwright discovered that user mappings were insufficiently
- restricted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7546">CVE-2017-7546</a>
-
- <p>In some authentication methods empty passwords were accepted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7547">CVE-2017-7547</a>
-
- <p>User mappings could leak data to unprivileged users.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.1.24lts2-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1051.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1052.data b/english/lts/security/2017/dla-1052.data
deleted file mode 100644
index 6661c07185c..00000000000
--- a/english/lts/security/2017/dla-1052.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1052-1 subversion</define-tag>
-<define-tag report_date>2017-8-11</define-tag>
-<define-tag secrefs>CVE-2017-9800</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1052.wml b/english/lts/security/2017/dla-1052.wml
deleted file mode 100644
index 4d8648513f9..00000000000
--- a/english/lts/security/2017/dla-1052.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a arbitrary code execution
-vulnerability in the subversion revision control system via
-malicious "svn+ssh" URLs in "svn:externals" and
-"svn:sync-from-url".</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in subversion
-version 1.6.17dfsg-4+deb7u12.</p>
-
-<p>We recommend that you upgrade your subversion packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1052.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1053.data b/english/lts/security/2017/dla-1053.data
deleted file mode 100644
index cafbaef8c46..00000000000
--- a/english/lts/security/2017/dla-1053.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1053-1 firefox-esr</define-tag>
-<define-tag report_date>2017-8-12</define-tag>
-<define-tag secrefs>CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 CVE-2017-7803 CVE-2017-7807 CVE-2017-7809</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1053.wml b/english/lts/security/2017/dla-1053.wml
deleted file mode 100644
index 8f521115bab..00000000000
--- a/english/lts/security/2017/dla-1053.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees, buffer
-overflows and other implementation errors may lead to the execution of
-arbitrary code, denial of service, bypass of the same-origin policy or
-incorrect enforcement of CSP.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.3.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1053.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1054.data b/english/lts/security/2017/dla-1054.data
deleted file mode 100644
index c8a5d87896e..00000000000
--- a/english/lts/security/2017/dla-1054.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1054-1 libgxps</define-tag>
-<define-tag report_date>2017-8-12</define-tag>
-<define-tag secrefs>CVE-2017-11590 Bug##870183</define-tag>
-<define-tag packages>libgxps</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1054.wml b/english/lts/security/2017/dla-1054.wml
deleted file mode 100644
index f68d4c611ff..00000000000
--- a/english/lts/security/2017/dla-1054.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a NULL pointer dereference in libgxps, a
-library to handle XML Paper Specification specifications.</p>
-
-<p>Specially-crafted input could lead to a remote denial of service attack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libgxps version
-0.2.2-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libgxps packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1054.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1055.data b/english/lts/security/2017/dla-1055.data
deleted file mode 100644
index b1c95ecdb68..00000000000
--- a/english/lts/security/2017/dla-1055.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1055-1 libgd2</define-tag>
-<define-tag report_date>2017-8-12</define-tag>
-<define-tag secrefs>CVE-2017-7890</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1055.wml b/english/lts/security/2017/dla-1055.wml
deleted file mode 100644
index 57da5762f9d..00000000000
--- a/english/lts/security/2017/dla-1055.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Matviy Kotoniy reported that the gdImageCreateFromGifCtx() function used
-to load images from GIF format files in libgd2, a library for
-programmatic graphics creation and manipulation, does not zero stack
-allocated color map buffers before their use, which may result in
-information disclosure if a specially crafted file is processed.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u9.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1055.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1056.data b/english/lts/security/2017/dla-1056.data
deleted file mode 100644
index d6eba105438..00000000000
--- a/english/lts/security/2017/dla-1056.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1056-1 cvs</define-tag>
-<define-tag report_date>2017-8-13</define-tag>
-<define-tag secrefs>CVE-2017-12836 Bug##871810</define-tag>
-<define-tag packages>cvs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1056.wml b/english/lts/security/2017/dla-1056.wml
deleted file mode 100644
index 19acf7d6b32..00000000000
--- a/english/lts/security/2017/dla-1056.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a command injection vulnerability in the CVS
-revision control system.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in cvs version
-2:1.12.13+real-9+deb7u1.</p>
-
-<p>We recommend that you upgrade your cvs packages. Thanks to Thorsten Glaser
-&lt;tg@mirbsd.de&gt; for preparing and testing this upload.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1056.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1057.data b/english/lts/security/2017/dla-1057.data
deleted file mode 100644
index b37c0128693..00000000000
--- a/english/lts/security/2017/dla-1057.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1057-1 libraw</define-tag>
-<define-tag report_date>2017-8-14</define-tag>
-<define-tag secrefs>CVE-2017-6886 CVE-2017-6887 Bug#864183</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1057.wml b/english/lts/security/2017/dla-1057.wml
deleted file mode 100644
index b70b5fb21b5..00000000000
--- a/english/lts/security/2017/dla-1057.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some memory corruption bugs were discovered in libraw, a raw image
-decoder library, which could be triggered via maliciously crafted
-input files to cause denial of service or other unspecified impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.14.6-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1057.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1058.data b/english/lts/security/2017/dla-1058.data
deleted file mode 100644
index a51be1b7c31..00000000000
--- a/english/lts/security/2017/dla-1058.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1058-1 krb5</define-tag>
-<define-tag report_date>2017-8-14</define-tag>
-<define-tag secrefs>CVE-2017-11368 Bug#869260</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1058.wml b/english/lts/security/2017/dla-1058.wml
deleted file mode 100644
index 12a499f0521..00000000000
--- a/english/lts/security/2017/dla-1058.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker
-can cause a KDC assertion failure by sending invalid S4U2Self or
-S4U2Proxy requests.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10.1+dfsg-5+deb7u8.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1058.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1059.data b/english/lts/security/2017/dla-1059.data
deleted file mode 100644
index a24020364ed..00000000000
--- a/english/lts/security/2017/dla-1059.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1059-1 strongswan</define-tag>
-<define-tag report_date>2017-8-18</define-tag>
-<define-tag secrefs>CVE-2017-11185 Bug##872155</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1059.wml b/english/lts/security/2017/dla-1059.wml
deleted file mode 100644
index f7bd47facad..00000000000
--- a/english/lts/security/2017/dla-1059.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial-of-service vulnerability in
-the Strongswan Virtual Private Network (VPN) software.</p>
-
-<p>Specific RSA signatures passed to the gmp plugin for verification could
-cause a null-pointer dereference. Potential triggers are signatures in
-certificates, but also signatures used during IKE authentication.</p>
-
-<p>For more details, please see:</p>
-
-<p><url "https://www.strongswan.org/blog/2017/08/14/strongswan-vulnerability-(cve-2017-11185).html"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in strongswan version
-4.5.2-1.5+deb7u10.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1059.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1060.data b/english/lts/security/2017/dla-1060.data
deleted file mode 100644
index ab84c5ba7ca..00000000000
--- a/english/lts/security/2017/dla-1060.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1060-1 libxml2</define-tag>
-<define-tag report_date>2017-8-19</define-tag>
-<define-tag secrefs>CVE-2017-0663 CVE-2017-7376</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1060.wml b/english/lts/security/2017/dla-1060.wml
deleted file mode 100644
index 998dd8d0743..00000000000
--- a/english/lts/security/2017/dla-1060.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0663">CVE-2017-0663</a>
-
- <p>Invalid casting of different structs could enable an attacker to
- remotely execute some code within the context of an unprivileged
- process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7376">CVE-2017-7376</a>
-
- <p>Incorrect limit used for port values.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy9.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1060.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1061.data b/english/lts/security/2017/dla-1061.data
deleted file mode 100644
index e2abda476a5..00000000000
--- a/english/lts/security/2017/dla-1061.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1061-1 newsbeuter</define-tag>
-<define-tag report_date>2017-8-19</define-tag>
-<define-tag secrefs>CVE-2017-12904</define-tag>
-<define-tag packages>newsbeuter</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1061.wml b/english/lts/security/2017/dla-1061.wml
deleted file mode 100644
index 3febc7fa3d2..00000000000
--- a/english/lts/security/2017/dla-1061.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jeriko One discovered that newsbeuter, a text-mode RSS feed reader,
-did not properly escape the title and description of a news article
-when bookmarking it. This allowed a remote attacker to run an
-arbitrary shell command on the client machine.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.5-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your newsbeuter packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1061.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1062.data b/english/lts/security/2017/dla-1062.data
deleted file mode 100644
index f31e5ef9002..00000000000
--- a/english/lts/security/2017/dla-1062.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1062-1 curl</define-tag>
-<define-tag report_date>2017-8-20</define-tag>
-<define-tag secrefs>CVE-2017-1000100</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1062.wml b/english/lts/security/2017/dla-1062.wml
deleted file mode 100644
index 096a180c14c..00000000000
--- a/english/lts/security/2017/dla-1062.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000100">CVE-2017-1000100</a>
-
- <p>Wrong handling of very long filenames during TFTP might result in
- curl sending more than buffer size.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-7.26.0-1+wheezy20.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1062.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1063.data b/english/lts/security/2017/dla-1063.data
deleted file mode 100644
index 2a748586b37..00000000000
--- a/english/lts/security/2017/dla-1063.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1063-1 extplorer</define-tag>
-<define-tag report_date>2017-8-21</define-tag>
-<define-tag secrefs>CVE-2017-12756</define-tag>
-<define-tag packages>extplorer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1063.wml b/english/lts/security/2017/dla-1063.wml
deleted file mode 100644
index cf3d6541bd9..00000000000
--- a/english/lts/security/2017/dla-1063.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12756">CVE-2017-12756</a>
-
- <p>Fix command inject in transfer from another server in extplorer
- 2.1.9 and prior allows attacker to inject command via the
- userfile[0] parameter.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.0b6+dfsg.3-4+deb7u5.</p>
-
-<p>We recommend that you upgrade your extplorer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1063.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1064.data b/english/lts/security/2017/dla-1064.data
deleted file mode 100644
index 051dbb443cf..00000000000
--- a/english/lts/security/2017/dla-1064.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1064-1 freeradius</define-tag>
-<define-tag report_date>2017-8-25</define-tag>
-<define-tag secrefs>CVE-2017-10978 CVE-2017-10979 CVE-2017-10980 CVE-2017-10981 CVE-2017-10982 CVE-2017-10983 Bug#868765</define-tag>
-<define-tag packages>freeradius</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1064.wml b/english/lts/security/2017/dla-1064.wml
deleted file mode 100644
index 4a23a3fe355..00000000000
--- a/english/lts/security/2017/dla-1064.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Guido Vranken discovered that FreeRADIUS, an open source
-implementation of RADIUS, the IETF protocol for AAA (Authorisation,
-Authentication, and
-Accounting), did not properly handle memory when processing packets.
-This would allow a remote attacker to cause a denial-of-service by
-application crash, or potentially execute arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.12+dfsg-1.2+deb7u2.</p>
-
-<p>We recommend that you upgrade your freeradius packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1064.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1065.data b/english/lts/security/2017/dla-1065.data
deleted file mode 100644
index 87726490e64..00000000000
--- a/english/lts/security/2017/dla-1065.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1065-1 fontforge</define-tag>
-<define-tag report_date>2017-8-26</define-tag>
-<define-tag secrefs>CVE-2017-11568 CVE-2017-11569 CVE-2017-11571 CVE-2017-11572 CVE-2017-11574 CVE-2017-11575 CVE-2017-11576 CVE-2017-11577</define-tag>
-<define-tag packages>fontforge</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1065.wml b/english/lts/security/2017/dla-1065.wml
deleted file mode 100644
index ac29c681768..00000000000
--- a/english/lts/security/2017/dla-1065.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>FontForge is vulnerable to heap-based buffer over-read in several
-functions, resulting in DoS or code execution via a crafted otf file:</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.0.20120101+git-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your fontforge packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1065.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1066.data b/english/lts/security/2017/dla-1066.data
deleted file mode 100644
index a5ed096f559..00000000000
--- a/english/lts/security/2017/dla-1066.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1066-1 php5</define-tag>
-<define-tag report_date>2017-8-26</define-tag>
-<define-tag secrefs>CVE-2017-11628</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1066.wml b/english/lts/security/2017/dla-1066.wml
deleted file mode 100644
index 1e9c1a8de81..00000000000
--- a/english/lts/security/2017/dla-1066.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A stack-based buffer overflow in the zend_ini_do_op() function in
-Zend/zend_ini_parser.c could cause a denial of service or potentially allow
-executing code. NOTE: this is only relevant for PHP applications that accept
-untrusted input (instead of the system's php.ini file) for the parse_ini_string
-or parse_ini_file function, e.g., a web application for syntax validation of
-php.ini directives.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u10.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1066.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1067.data b/english/lts/security/2017/dla-1067.data
deleted file mode 100644
index 3e38bf705cc..00000000000
--- a/english/lts/security/2017/dla-1067.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1067-1 augeas</define-tag>
-<define-tag report_date>2017-8-26</define-tag>
-<define-tag secrefs>CVE-2017-7555 Bug#872400</define-tag>
-<define-tag packages>augeas</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1067.wml b/english/lts/security/2017/dla-1067.wml
deleted file mode 100644
index db9af663735..00000000000
--- a/english/lts/security/2017/dla-1067.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Augeas is vulnerable to heap-based buffer overflow due to improper handling of
-escaped strings. Attacker could send crafted strings that would cause the
-application using augeas to copy past the end of a buffer, leading to a crash
-or possible code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your augeas packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1067.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1068.data b/english/lts/security/2017/dla-1068.data
deleted file mode 100644
index 54b52a63d01..00000000000
--- a/english/lts/security/2017/dla-1068.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1068-1 git</define-tag>
-<define-tag report_date>2017-8-27</define-tag>
-<define-tag secrefs>CVE-2017-1000117</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1068.wml b/english/lts/security/2017/dla-1068.wml
deleted file mode 100644
index 8130ce55862..00000000000
--- a/english/lts/security/2017/dla-1068.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Joern Schneeweisz discovered that git, a distributed revision control
-system, did not correctly handle maliciously constructed ssh://
-URLs. This allowed an attacker to run an arbitrary shell command, for
-instance via git submodules.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.7.10.4-1+wheezy5.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1068.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1069.data b/english/lts/security/2017/dla-1069.data
deleted file mode 100644
index 1e93ad8d375..00000000000
--- a/english/lts/security/2017/dla-1069.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1069-1 tenshi</define-tag>
-<define-tag report_date>2017-8-27</define-tag>
-<define-tag secrefs>CVE-2017-11746 Bug#871321</define-tag>
-<define-tag packages>tenshi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1069.wml b/english/lts/security/2017/dla-1069.wml
deleted file mode 100644
index 00f7a7fd642..00000000000
--- a/english/lts/security/2017/dla-1069.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tenshi creates a tenshi.pid file after dropping privileges to a non-root
-account, which might allow local users to kill arbitrary processes by
-leveraging access to this non-root account for tenshi.pid modification before a
-root script executes a "kill `cat /pathname/tenshi.pid`" command.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.13-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your tenshi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1069.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1070.data b/english/lts/security/2017/dla-1070.data
deleted file mode 100644
index 0fe99f48564..00000000000
--- a/english/lts/security/2017/dla-1070.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1070-1 qemu</define-tag>
-<define-tag report_date>2017-8-28</define-tag>
-<define-tag secrefs>CVE-2017-6505 CVE-2017-8309 CVE-2017-10664 CVE-2017-11434</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1070.wml b/english/lts/security/2017/dla-1070.wml
deleted file mode 100644
index 29b4abeaff3..00000000000
--- a/english/lts/security/2017/dla-1070.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in qemu, a fast processor
-emulator. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6505">CVE-2017-6505</a>
-
- <p>Denial of service via infinite loop in the USB OHCI emulation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8309">CVE-2017-8309</a>
-
- <p>Denial of service via VNC audio capture</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10664">CVE-2017-10664</a>
-
- <p>Denial of service in qemu-nbd server, qemu-io and qemu-img</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11434">CVE-2017-11434</a>
-
- <p>Denial of service via a crafted DHCP options string</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u23.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1070.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1071.data b/english/lts/security/2017/dla-1071.data
deleted file mode 100644
index 3f3fe927f9a..00000000000
--- a/english/lts/security/2017/dla-1071.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1071-1 qemu-kvm</define-tag>
-<define-tag report_date>2017-8-28</define-tag>
-<define-tag secrefs>CVE-2017-6505 CVE-2017-8309 CVE-2017-10664 CVE-2017-11434</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1071.wml b/english/lts/security/2017/dla-1071.wml
deleted file mode 100644
index 63565dbfb12..00000000000
--- a/english/lts/security/2017/dla-1071.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in qemu-kvm, a full
-virtualization solution for Linux hosts on x86 hardware with x86 guests
-based on the Quick Emulator(Qemu).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6505">CVE-2017-6505</a>
-
- <p>Denial of service via infinite loop in the USB OHCI emulation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8309">CVE-2017-8309</a>
-
- <p>Denial of service via VNC audio capture</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10664">CVE-2017-10664</a>
-
- <p>Denial of service in qemu-nbd server, qemu-io and qemu-img.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11434">CVE-2017-11434</a>
-
- <p>Denial of service via a crafted DHCP options string</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u23.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1071.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1072.data b/english/lts/security/2017/dla-1072.data
deleted file mode 100644
index d5b4283a5db..00000000000
--- a/english/lts/security/2017/dla-1072.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1072-1 mercurial</define-tag>
-<define-tag report_date>2017-8-31</define-tag>
-<define-tag secrefs>CVE-2017-1000115 CVE-2017-1000116 Bug#871709 Bug#871710</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1072.wml b/english/lts/security/2017/dla-1072.wml
deleted file mode 100644
index 2f88b0c7f19..00000000000
--- a/english/lts/security/2017/dla-1072.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two significant vulnerabilities were found in the Mercurial version
-control system which could lead to shell injection attacks and
-out-of-tree file overwrite.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000115">CVE-2017-1000115</a>
-
- <p>Mercurial's symlink auditing was incomplete prior to 4.3, and
- could be abused to write to files outside the repository.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000116">CVE-2017-1000116</a>
-
- <p>Mercurial was not sanitizing hostnames passed to ssh, allowing
- shell injection attacks on clients by specifying a hostname
- starting with -oProxyCommand. This vulnerability is similar to
- those in Git (<a href="https://security-tracker.debian.org/tracker/CVE-2017-1000117">CVE-2017-1000117</a>) and Subversion
- (<a href="https://security-tracker.debian.org/tracker/CVE-2017-9800">CVE-2017-9800</a>).</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.2-4+deb7u5.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1072.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1073.data b/english/lts/security/2017/dla-1073.data
deleted file mode 100644
index 1526d57a5c2..00000000000
--- a/english/lts/security/2017/dla-1073.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1073-1 openjdk-7</define-tag>
-<define-tag report_date>2017-8-28</define-tag>
-<define-tag secrefs>CVE-2017-10053 CVE-2017-10067 CVE-2017-10074 CVE-2017-10081 CVE-2017-10087 CVE-2017-10089 CVE-2017-10090 CVE-2017-10096 CVE-2017-10101 CVE-2017-10102 CVE-2017-10107 CVE-2017-10108 CVE-2017-10109 CVE-2017-10110 CVE-2017-10115 CVE-2017-10116 CVE-2017-10118 CVE-2017-10135 CVE-2017-10176 CVE-2017-10193 CVE-2017-10198 CVE-2017-10243</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1073.wml b/english/lts/security/2017/dla-1073.wml
deleted file mode 100644
index ee09233db34..00000000000
--- a/english/lts/security/2017/dla-1073.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in sandbox bypass,
-incorrect authentication, the execution of arbitrary code, denial of
-service, information disclosure, use of insecure cryptography or
-bypassing Jar verification.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u151-2.6.11-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1073.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1074.data b/english/lts/security/2017/dla-1074.data
deleted file mode 100644
index dc6e71a5959..00000000000
--- a/english/lts/security/2017/dla-1074.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1074-1 poppler</define-tag>
-<define-tag report_date>2017-8-29</define-tag>
-<define-tag secrefs>CVE-2013-4473 CVE-2013-4474 CVE-2017-9775 CVE-2017-9776 CVE-2017-9865</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1074.wml b/english/lts/security/2017/dla-1074.wml
deleted file mode 100644
index e97e8ae99c7..00000000000
--- a/english/lts/security/2017/dla-1074.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several buffer and integer overflow issues were discovered in Poppler,
-a PDF library, that could lead to application crash or possibly other
-unspecified impact via maliciously crafted files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.18.4-6+deb7u2.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1074.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1075.data b/english/lts/security/2017/dla-1075.data
deleted file mode 100644
index d7762b8e264..00000000000
--- a/english/lts/security/2017/dla-1075.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1075-1 wordpress</define-tag>
-<define-tag report_date>2017-8-29</define-tag>
-<define-tag secrefs>CVE-2017-9066 Bug#862816</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1075.wml b/english/lts/security/2017/dla-1075.wml
deleted file mode 100644
index 88bc54ead80..00000000000
--- a/english/lts/security/2017/dla-1075.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In WordPress, there is insufficient redirect validation in the
-HTTP class, leading to SSRF.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u16.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1075.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1076.data b/english/lts/security/2017/dla-1076.data
deleted file mode 100644
index f8fd186e1c9..00000000000
--- a/english/lts/security/2017/dla-1076.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1076-1 php5</define-tag>
-<define-tag report_date>2017-8-30</define-tag>
-<define-tag secrefs>CVE-2017-12933</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1076.wml b/english/lts/security/2017/dla-1076.wml
deleted file mode 100644
index 5dc29047260..00000000000
--- a/english/lts/security/2017/dla-1076.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The finish_nested_data function in ext/standard/var_unserializer.re in PHP is
-prone to a buffer over-read while unserializing untrusted data. Exploitation of
-this issue can have an unspecified impact on the integrity of PHP.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u11.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1076.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1077.data b/english/lts/security/2017/dla-1077.data
deleted file mode 100644
index 9337d17b1c0..00000000000
--- a/english/lts/security/2017/dla-1077.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1077-1 faad2</define-tag>
-<define-tag report_date>2017-8-30</define-tag>
-<define-tag secrefs>CVE-2017-9218 CVE-2017-9219 CVE-2017-9220 CVE-2017-9221 CVE-2017-9222 CVE-2017-9223 CVE-2017-9253 CVE-2017-9254 CVE-2017-9255 CVE-2017-9256 CVE-2017-9257 Bug#867724</define-tag>
-<define-tag packages>faad2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1077.wml b/english/lts/security/2017/dla-1077.wml
deleted file mode 100644
index 7b972a1315e..00000000000
--- a/english/lts/security/2017/dla-1077.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various security issues were discovered in faad2, a fast audio
-decoder, that would allow remote attackers to cause a denial of
-service (application crash due to memory failures or large CPU
-consumption) via a crafted mp4 file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.7-8+deb7u1.</p>
-
-<p>We recommend that you upgrade your faad2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1077.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1078.data b/english/lts/security/2017/dla-1078.data
deleted file mode 100644
index 455bfe79015..00000000000
--- a/english/lts/security/2017/dla-1078.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1078-1 connman</define-tag>
-<define-tag report_date>2017-8-30</define-tag>
-<define-tag secrefs>CVE-2017-12865 Bug#872844</define-tag>
-<define-tag packages>connman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1078.wml b/english/lts/security/2017/dla-1078.wml
deleted file mode 100644
index 579182f61bb..00000000000
--- a/english/lts/security/2017/dla-1078.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In connman, stack-based buffer overflow in <q>dnsproxy.c</q> allows remote attackers
-to cause a denial of service (crash) or execute arbitrary code via a crafted
-response query string passed to the <q>name</q> variable.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0-1.1+wheezy2.</p>
-
-<p>We recommend that you upgrade your connman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1078.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1079.data b/english/lts/security/2017/dla-1079.data
deleted file mode 100644
index 37cc5f8a5fd..00000000000
--- a/english/lts/security/2017/dla-1079.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1079-1 libdbd-mysql-perl</define-tag>
-<define-tag report_date>2017-8-31</define-tag>
-<define-tag secrefs>CVE-2017-10788 CVE-2017-10789 Bug#866818 Bug#866821</define-tag>
-<define-tag packages>libdbd-mysql-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1079.wml b/english/lts/security/2017/dla-1079.wml
deleted file mode 100644
index 7940660c700..00000000000
--- a/english/lts/security/2017/dla-1079.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Perl library for communicating with MySQL database, used in the
-<q>mysql</q> commandline client is vulnerable to a man in the middle attack
-in SSL configurations and remote crash when connecting to hostile
-servers.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10788">CVE-2017-10788</a>
-
- <p>The DBD::mysql module through 4.042 for Perl allows remote
- attackers to cause a denial of service (use-after-free and
- application crash) or possibly have unspecified other impact by
- triggering (1) certain error responses from a MySQL server or (2)
- a loss of a network connection to a MySQL server. The
- use-after-free defect was introduced by relying on incorrect
- Oracle mysql_stmt_close documentation and code examples.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10789">CVE-2017-10789</a>
-
- <p>The DBD::mysql module through 4.042 for Perl uses the mysql_ssl=1
- setting to mean that SSL is optional (even though this setting's
- documentation has a <q>your communication with the server will be
- encrypted</q> statement), which allows man-in-the-middle attackers to
- spoof servers via a cleartext-downgrade attack, a related issue to
- <a href="https://security-tracker.debian.org/tracker/CVE-2015-3152">CVE-2015-3152</a>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.021-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libdbd-mysql-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1079.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1080.data b/english/lts/security/2017/dla-1080.data
deleted file mode 100644
index ed2dcccbe76..00000000000
--- a/english/lts/security/2017/dla-1080.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1080-1 gnupg</define-tag>
-<define-tag report_date>2017-8-31</define-tag>
-<define-tag secrefs>CVE-2017-7526</define-tag>
-<define-tag packages>gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1080.wml b/english/lts/security/2017/dla-1080.wml
deleted file mode 100644
index 9c2afbd6c03..00000000000
--- a/english/lts/security/2017/dla-1080.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot
-Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and
-Yuval Yarom discovered that gnupg is prone to a local side-channel
-attack allowing full key recovery for RSA-1024.</p>
-
-<p>See <a href="https://eprint.iacr.org/2017/627">https://eprint.iacr.org/2017/627</a> for details.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.12-7+deb7u9.</p>
-
-<p>We recommend that you upgrade your gnupg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1080.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1081.data b/english/lts/security/2017/dla-1081.data
deleted file mode 100644
index 49ccdc24ede..00000000000
--- a/english/lts/security/2017/dla-1081.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1081-1 imagemagick</define-tag>
-<define-tag report_date>2017-8-31</define-tag>
-<define-tag secrefs>CVE-2017-8352 CVE-2017-9144 CVE-2017-9501 CVE-2017-10928 CVE-2017-10995 CVE-2017-11141 CVE-2017-11170 CVE-2017-1118 CVE-2017-11352 CVE-2017-11360 CVE-2017-11446 CVE-2017-1144 CVE-2017-11449 CVE-2017-11450 CVE-2017-11478 CVE-2017-1150 CVE-2017-11523 CVE-2017-11524 CVE-2017-11525 CVE-2017-1152 CVE-2017-11527 CVE-2017-11528 CVE-2017-11529 CVE-2017-1153 CVE-2017-11531 CVE-2017-11532 CVE-2017-11533 CVE-2017-1153 CVE-2017-11535 CVE-2017-11537 CVE-2017-11539 CVE-2017-1163 CVE-2017-11640 CVE-2017-11644 CVE-2017-11724 CVE-2017-1175 CVE-2017-11752 CVE-2017-12140 CVE-2017-12418 CVE-2017-1242 CVE-2017-12428 CVE-2017-12429 CVE-2017-12430 CVE-2017-1243 CVE-2017-12432 CVE-2017-12433 CVE-2017-12435 CVE-2017-1256 CVE-2017-12564 CVE-2017-12565 CVE-2017-12566 CVE-2017-1258 CVE-2017-12640 CVE-2017-12641 CVE-2017-12642 CVE-2017-1264 CVE-2017-12654 CVE-2017-12664 CVE-2017-12665 CVE-2017-1266 CVE-2017-12670 CVE-2017-12674 CVE-2017-12675 CVE-2017-1267 CVE-2017-12877 CVE-2017-12983 CVE-2017-13133 CVE-2017-1313 CVE-2017-13139 CVE-2017-13142 CVE-2017-13143 CVE-2017-1314 CVE-2017-13146 CVE-2017-13658 Bug#867367 Bug#867896 Bug#867806 Bug#867808 Bug#867810 Bug#867811 Bug#867812 Bug#867798</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1081.wml b/english/lts/security/2017/dla-1081.wml
deleted file mode 100644
index 038b9086eb8..00000000000
--- a/english/lts/security/2017/dla-1081.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This updates fixes numerous vulnerabilities in imagemagick: Various
-memory handling problems and cases of missing or incomplete input
-sanitising may result in denial of service, memory disclosure or the
-execution of arbitrary code if malformed DPX, RLE, CIN, DIB, EPT, MAT,
-VST, PNG, JNG, MNG, DVJU, JPEG, TXT, PES, MPC, UIL, PS, PALM, CIP, TIFF,
-ICON, MAGICK, DCM, MSL, WMF, MIFF, PCX, SUN, PSD, MVG, PWP, PICT, PDB,
-SFW, or XCF files are processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.7.7.10-5+deb7u16.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1081.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1082.data b/english/lts/security/2017/dla-1082.data
deleted file mode 100644
index c88c2fd94df..00000000000
--- a/english/lts/security/2017/dla-1082.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1082-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-8-31</define-tag>
-<define-tag secrefs>CVE-2017-12935 CVE-2017-12936 CVE-2017-12937 CVE-2017-13063 CVE-2017-13064 CVE-2017-13065 CVE-2017-13776 CVE-2017-13777</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1082.wml b/english/lts/security/2017/dla-1082.wml
deleted file mode 100644
index 8c70df72663..00000000000
--- a/english/lts/security/2017/dla-1082.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13776">CVE-2017-13776</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-13777">CVE-2017-13777</a>
-
- <p>denial of service issue in ReadXBMImage()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12935">CVE-2017-12935</a>
-
- <p>The ReadMNGImage function in coders/png.c mishandles large MNG
- images, leading to an invalid memory read in the
- SetImageColorCallBack function in magick/image.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12936">CVE-2017-12936</a>
-
- <p>The ReadWMFImage function in coders/wmf.c has a use-after-free
- issue for data associated with exception reporting.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12937">CVE-2017-12937</a>
-
- <p>The ReadSUNImage function in coders/sun.c has a colormap
- heap-based buffer over-read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13063">CVE-2017-13063</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-13064">CVE-2017-13064</a>
-
- <p>heap-based buffer overflow vulnerability in the function
- GetStyleTokens in coders/svg.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13065">CVE-2017-13065</a>
-
- <p>NULL pointer dereference vulnerability in the function
- SVGStartElement in coders/svg.c</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u9.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1082.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1083.data b/english/lts/security/2017/dla-1083.data
deleted file mode 100644
index 73f066fdfff..00000000000
--- a/english/lts/security/2017/dla-1083.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1083-1 openexr</define-tag>
-<define-tag report_date>2017-8-31</define-tag>
-<define-tag secrefs>CVE-2017-9110 CVE-2017-9112 CVE-2017-9116 Bug#864078</define-tag>
-<define-tag packages>openexr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1083.wml b/english/lts/security/2017/dla-1083.wml
deleted file mode 100644
index 8ba12342d49..00000000000
--- a/english/lts/security/2017/dla-1083.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brandon Perry discovered that openexr, a high dynamic-range (HDR) image
-library, was affected by an integer overflow vulnerability and missing
-boundary checks that would allow a remote attacker to cause a denial of
-service (application crash) via specially crafted image files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6.1-6+deb7u1.</p>
-
-<p>We recommend that you upgrade your openexr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1083.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1084.data b/english/lts/security/2017/dla-1084.data
deleted file mode 100644
index 53dc3d1bc6a..00000000000
--- a/english/lts/security/2017/dla-1084.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1084-1 libidn</define-tag>
-<define-tag report_date>2017-9-2</define-tag>
-<define-tag secrefs>CVE-2017-14062 Bug##873903</define-tag>
-<define-tag packages>libidn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1084.wml b/english/lts/security/2017/dla-1084.wml
deleted file mode 100644
index 4711ff0bcc3..00000000000
--- a/english/lts/security/2017/dla-1084.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an integer overflow vulnerability in
-libidn's Punycode handling (an encoding used to convert Unicode characters
-to ASCII) which would have allowed remote attackers to cause a denial of
-service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libidn version
-1.25-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your libidn packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1084.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1085.data b/english/lts/security/2017/dla-1085.data
deleted file mode 100644
index 310f0a90383..00000000000
--- a/english/lts/security/2017/dla-1085.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1085-1 libidn2-0</define-tag>
-<define-tag report_date>2017-9-3</define-tag>
-<define-tag secrefs>CVE-2017-14062 Bug##873902</define-tag>
-<define-tag packages>libidn2-0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1085.wml b/english/lts/security/2017/dla-1085.wml
deleted file mode 100644
index faf969a41c4..00000000000
--- a/english/lts/security/2017/dla-1085.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an integer overflow vulnerability
-in libidn2-0's Punycode handling (an encoding used to convert Unicode
-characters to ASCII) which would have allowed attackers to cause a
-remote denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libidn2-0 version
-0.8-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libidn2-0 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1085.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1086.data b/english/lts/security/2017/dla-1086.data
deleted file mode 100644
index 2129abb1f7e..00000000000
--- a/english/lts/security/2017/dla-1086.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1086-1 enigmail</define-tag>
-<define-tag report_date>2017-9-3</define-tag>
-<define-tag packages>enigmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1086.wml b/english/lts/security/2017/dla-1086.wml
deleted file mode 100644
index 95b26ed69e9..00000000000
--- a/english/lts/security/2017/dla-1086.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In DLA 1007-1 Thunderbird was upgraded to the latest ESR series. This
-update upgrades Enigmail, the OpenPGP extention for Thunderbird, to
-version 1.9.8.1 to restore full compatibility.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.9.8.1-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your enigmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1086.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1087-2.data b/english/lts/security/2017/dla-1087-2.data
deleted file mode 100644
index eee9927c2e0..00000000000
--- a/english/lts/security/2017/dla-1087-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1087-2 icedove</define-tag>
-<define-tag report_date>2017-9-7</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1087-2.wml b/english/lts/security/2017/dla-1087-2.wml
deleted file mode 100644
index 2839c51c19e..00000000000
--- a/english/lts/security/2017/dla-1087-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for icedove/thunderbird issued as DLA-1087-1 did not build on
-i386. This update corrects this. For reference, the original advisory
-text follows.</p>
-
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-spoofing.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.3.0-4~deb7u2.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1087-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1087.data b/english/lts/security/2017/dla-1087.data
deleted file mode 100644
index 9f7705a037c..00000000000
--- a/english/lts/security/2017/dla-1087.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1087-1 icedove</define-tag>
-<define-tag report_date>2017-9-5</define-tag>
-<define-tag secrefs>CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 CVE-2017-7803 CVE-2017-7804 CVE-2017-7807 CVE-2017-7809</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1087.wml b/english/lts/security/2017/dla-1087.wml
deleted file mode 100644
index 67a0b364b31..00000000000
--- a/english/lts/security/2017/dla-1087.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or
-spoofing.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.3.0-4~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1087.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1088.data b/english/lts/security/2017/dla-1088.data
deleted file mode 100644
index 875ae4c9baf..00000000000
--- a/english/lts/security/2017/dla-1088.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1088-1 irssi</define-tag>
-<define-tag report_date>2017-9-4</define-tag>
-<define-tag secrefs>CVE-2017-9468 CVE-2017-9469 Bug##864400</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1088.wml b/english/lts/security/2017/dla-1088.wml
deleted file mode 100644
index 9f1c630682f..00000000000
--- a/english/lts/security/2017/dla-1088.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Irssi has some issues where remote attackers might be able to cause a crash.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9468">CVE-2017-9468</a>
-
- <p>In irssi, when receiving a DCC message without source nick/host, it
- attempts to dereference a NULL pointer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9469">CVE-2017-9469</a>
-
- <p>In irssi, when receiving certain incorrectly quoted DCC files, it tries to
- find the terminating quote one byte before the allocated memory.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.15-5+deb7u2.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1088.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1089.data b/english/lts/security/2017/dla-1089.data
deleted file mode 100644
index eed34ae135b..00000000000
--- a/english/lts/security/2017/dla-1089.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1089-1 irssi</define-tag>
-<define-tag report_date>2017-9-5</define-tag>
-<define-tag secrefs>CVE-2017-10965 CVE-2017-10966 Bug#867598</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1089.wml b/english/lts/security/2017/dla-1089.wml
deleted file mode 100644
index 14701cf0782..00000000000
--- a/english/lts/security/2017/dla-1089.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some Irssi issues were found:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10965">CVE-2017-10965</a>
-
- <p>An issue was discovered in Irssi before 1.0.4. When receiving messages with
- invalid time stamps, Irssi would try to dereference a NULL pointer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10966">CVE-2017-10966</a>
-
- <p>An issue was discovered in Irssi before 1.0.4. While updating the internal
- nick list, Irssi could incorrectly use the GHashTable interface and free
- the nick while updating it. This would then result in use-after-free
- conditions on each access of the hash table.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.15-5+deb7u3.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1089.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1090.data b/english/lts/security/2017/dla-1090.data
deleted file mode 100644
index e464204e06e..00000000000
--- a/english/lts/security/2017/dla-1090.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1090-1 tcpdump</define-tag>
-<define-tag report_date>2017-9-6</define-tag>
-<define-tag secrefs>CVE-2017-11108 CVE-2017-11541 CVE-2017-11542 CVE-2017-11543</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1090.wml b/english/lts/security/2017/dla-1090.wml
deleted file mode 100644
index 00ad0cfdb13..00000000000
--- a/english/lts/security/2017/dla-1090.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in tcpdump, a command-line
-network traffic analyzer. These vulnerabilities might result in denial
-of service (application crash).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.9.0-1~deb7u2.</p>
-
-<p>We recommend that you upgrade your tcpdump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1090.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1091.data b/english/lts/security/2017/dla-1091.data
deleted file mode 100644
index 5f775db74a4..00000000000
--- a/english/lts/security/2017/dla-1091.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1091-1 unrar-free</define-tag>
-<define-tag report_date>2017-9-7</define-tag>
-<define-tag secrefs>CVE-2017-14120 Bug##874059</define-tag>
-<define-tag packages>unrar-free</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1091.wml b/english/lts/security/2017/dla-1091.wml
deleted file mode 100644
index 2c42c9dcd38..00000000000
--- a/english/lts/security/2017/dla-1091.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a directory traversal vulnerability in
-unrar-free, a unarchiver for .rar files, where pathnames of the form
-"../filename" were unpacked into the parent directory.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in unrar-free version
-1:0.0.1+cvs20071127-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your unrar-free packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1091.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1092.data b/english/lts/security/2017/dla-1092.data
deleted file mode 100644
index 48966243c37..00000000000
--- a/english/lts/security/2017/dla-1092.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1092-1 libarchive</define-tag>
-<define-tag report_date>2017-9-8</define-tag>
-<define-tag secrefs>CVE-2017-14166 Bug##874539</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1092.wml b/english/lts/security/2017/dla-1092.wml
deleted file mode 100644
index ab7fb416691..00000000000
--- a/english/lts/security/2017/dla-1092.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service vulnerability in the
-libarchive multi-format compression library. A specially-crafted .xar
-archive could cause via a heap-based buffer over-read.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libarchive version
-3.0.4-3+wheezy6+deb7u1.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1092.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1093.data b/english/lts/security/2017/dla-1093.data
deleted file mode 100644
index d86c81ac03b..00000000000
--- a/english/lts/security/2017/dla-1093.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1093-1 tiff</define-tag>
-<define-tag report_date>2017-9-10</define-tag>
-<define-tag secrefs>CVE-2017-11335 CVE-2017-12944 CVE-2017-13726 CVE-2017-13727 Bug#868513 Bug#872607 Bug#873880 Bug#873879</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1093.wml b/english/lts/security/2017/dla-1093.wml
deleted file mode 100644
index 719c9834d18..00000000000
--- a/english/lts/security/2017/dla-1093.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the Tag Image File
-Format (TIFF) library and its associated tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11335">CVE-2017-11335</a>
-
- <p>A heap based buffer overflow via a PlanarConfig=Contig image, which
- causes an out-of-bounds write (related to the ZIPDecode function). A
- crafted input may lead to a remote denial of service attack or an
- arbitrary code execution attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12944">CVE-2017-12944</a>
-
- <p>A mishandling of memory allocation for short files allows attackers
- to cause a denial of service (allocation failure and application
- crash) during a tiff2pdf invocation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13726">CVE-2017-13726</a>
-
- <p>A reachable assertion abort allows a crafted input to lead to a
- remote denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13727">CVE-2017-13727</a>
-
- <p>A reachable assertion abort allows a crafted input to lead to a
- remote denial of service attack.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u16.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1093.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1094.data b/english/lts/security/2017/dla-1094.data
deleted file mode 100644
index dec4415c0c8..00000000000
--- a/english/lts/security/2017/dla-1094.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1094-1 tiff3</define-tag>
-<define-tag report_date>2017-9-10</define-tag>
-<define-tag secrefs>CVE-2017-11335 Bug#868513</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1094.wml b/english/lts/security/2017/dla-1094.wml
deleted file mode 100644
index 616e7ba25d5..00000000000
--- a/english/lts/security/2017/dla-1094.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap based buffer overflow has been discovered in the tiff2pdf
-utility, part of the Tag Image File Format (TIFF) library.</p>
-
-<p>A PlanarConfig=Contig image can cause an out-of-bounds write (related to
-the ZIPDecode function). A crafted input may lead to a remote denial of
-service attack or an arbitrary code execution attack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u8.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1094.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1095.data b/english/lts/security/2017/dla-1095.data
deleted file mode 100644
index 3e52e599ae9..00000000000
--- a/english/lts/security/2017/dla-1095.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1095-1 freerdp</define-tag>
-<define-tag report_date>2017-9-11</define-tag>
-<define-tag secrefs>CVE-2017-2835 CVE-2017-2836 CVE-2017-2837 CVE-2017-2838 CVE-2017-2839 Bug#869880</define-tag>
-<define-tag packages>freerdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1095.wml b/english/lts/security/2017/dla-1095.wml
deleted file mode 100644
index 2cc9baed671..00000000000
--- a/english/lts/security/2017/dla-1095.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tyler Bohan of Talos discovered that FreeRDP, a free implementation of
-the Remote Desktop Protocol (RDP), contained several vulnerabilities
-that allowed a malicious remote server or a man-in-the-middle to
-either cause a DoS by forcibly terminating the client, or execute
-arbitrary code on the client side.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.1-1.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your freerdp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1095.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1096.data b/english/lts/security/2017/dla-1096.data
deleted file mode 100644
index 6737b7b5d78..00000000000
--- a/english/lts/security/2017/dla-1096.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1096-1 wordpress-shibboleth</define-tag>
-<define-tag report_date>2017-9-13</define-tag>
-<define-tag secrefs>CVE-2017-14313 Bug##874416</define-tag>
-<define-tag packages>wordpress-shibboleth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1096.wml b/english/lts/security/2017/dla-1096.wml
deleted file mode 100644
index 69f01c69bce..00000000000
--- a/english/lts/security/2017/dla-1096.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a an XSS vulnerability in the login form of
-the <q>Shibboleth</q> identity provider module for Wordpress.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in wordpress-shibboleth version
-1.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your wordpress-shibboleth packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1096.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1097.data b/english/lts/security/2017/dla-1097.data
deleted file mode 100644
index 312f234eed4..00000000000
--- a/english/lts/security/2017/dla-1097.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1097-1 tcpdump</define-tag>
-<define-tag report_date>2017-9-15</define-tag>
-<define-tag secrefs>CVE-2017-12894 CVE-2017-12895 CVE-2017-12896 CVE-2017-1289 CVE-2017-12898 CVE-2017-12899 CVE-2017-12900 CVE-2017-1290 CVE-2017-12902 CVE-2017-12985 CVE-2017-12986 CVE-2017-1298 CVE-2017-12988 CVE-2017-12989 CVE-2017-12990 CVE-2017-1299 CVE-2017-12992 CVE-2017-12993 CVE-2017-12994 CVE-2017-1299 CVE-2017-12996 CVE-2017-12997 CVE-2017-12998 CVE-2017-1299 CVE-2017-13000 CVE-2017-13001 CVE-2017-13002 CVE-2017-1300 CVE-2017-13004 CVE-2017-13005 CVE-2017-13006 CVE-2017-1300 CVE-2017-13008 CVE-2017-13009 CVE-2017-13010 CVE-2017-1301 CVE-2017-13012 CVE-2017-13013 CVE-2017-13014 CVE-2017-1301 CVE-2017-13016 CVE-2017-13017 CVE-2017-13018 CVE-2017-1301 CVE-2017-13020 CVE-2017-13021 CVE-2017-13022 CVE-2017-1302 CVE-2017-13024 CVE-2017-13025 CVE-2017-13026 CVE-2017-1302 CVE-2017-13028 CVE-2017-13029 CVE-2017-13030 CVE-2017-1303 CVE-2017-13032 CVE-2017-13033 CVE-2017-13034 CVE-2017-1303 CVE-2017-13036 CVE-2017-13037 CVE-2017-13038 CVE-2017-1303 CVE-2017-13040 CVE-2017-13041 CVE-2017-13042 CVE-2017-1304 CVE-2017-13044 CVE-2017-13045 CVE-2017-13046 CVE-2017-1304 CVE-2017-13048 CVE-2017-13049 CVE-2017-13050 CVE-2017-1305 CVE-2017-13052 CVE-2017-13053 CVE-2017-13054 CVE-2017-1305 CVE-2017-13687 CVE-2017-13688 CVE-2017-13689 CVE-2017-1369 CVE-2017-13725 CVE-2017-12893</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1097.wml b/english/lts/security/2017/dla-1097.wml
deleted file mode 100644
index c9b7af98c38..00000000000
--- a/english/lts/security/2017/dla-1097.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in tcpdump, a command-line
-network traffic analyzer. These vulnerabilities might result in denial
-of service or, potentially, execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.9.2-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your tcpdump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1097.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1098.data b/english/lts/security/2017/dla-1098.data
deleted file mode 100644
index 7c8ad3d129f..00000000000
--- a/english/lts/security/2017/dla-1098.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1098-1 freexl</define-tag>
-<define-tag report_date>2017-9-17</define-tag>
-<define-tag secrefs>CVE-2017-2923 CVE-2017-2924 Bug##875690 Bug##875691</define-tag>
-<define-tag packages>freexl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1098.wml b/english/lts/security/2017/dla-1098.wml
deleted file mode 100644
index df5fefa4daa..00000000000
--- a/english/lts/security/2017/dla-1098.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The Cisco Talos team reported two sensitive security issues affecting
-FreeXL-1.0.3 and any previous version.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2923">CVE-2017-2923</a>
-
- <p>An exploitable heap based buffer overflow vulnerability exists in
- the read_biff_next_record function of FreeXL 1.0.3. A specially
- crafted XLS file can cause a memory corruption resulting in remote
- code execution. An attacker can send malicious XLS file to trigger
- this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2924">CVE-2017-2924</a>
-
- <p>An exploitable heap-based buffer overflow vulnerability exists in
- the read_legacy_biff function of FreeXL 1.0.3. A specially crafted
- XLS file can cause a memory corruption resulting in remote code
- execution. An attacker can send malicious XLS file to trigger this
- vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.0b-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your freexl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1098.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1099.data b/english/lts/security/2017/dla-1099.data
deleted file mode 100644
index e0f501d6c80..00000000000
--- a/english/lts/security/2017/dla-1099.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1099-1 linux</define-tag>
-<define-tag report_date>2017-9-20</define-tag>
-<define-tag secrefs>CVE-2017-7482 CVE-2017-7542 CVE-2017-7889 CVE-2017-10661 CVE-2017-10911 CVE-2017-11176 CVE-2017-11600 CVE-2017-1213 CVE-2017-12153 CVE-2017-12154 CVE-2017-14106 CVE-2017-1414 CVE-2017-14156 CVE-2017-14340 CVE-2017-14489 CVE-2017-1000 CVE-2017-1000251 CVE-2017-1000363 CVE-2017-1000365 CVE-2017-1000380 Bug##866511 Bug##875881</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1099.wml b/english/lts/security/2017/dla-1099.wml
deleted file mode 100644
index 47fedda7d77..00000000000
--- a/english/lts/security/2017/dla-1099.wml
+++ /dev/null
@@ -1,175 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7482">CVE-2017-7482</a>
-
- <p>Shi Lei discovered that RxRPC Kerberos 5 ticket handling code does
- not properly verify metadata, leading to information disclosure,
- denial of service or potentially execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7542">CVE-2017-7542</a>
-
- <p>An integer overflow vulnerability in the ip6_find_1stfragopt()
- function was found allowing a local attacker with privileges to open
- raw sockets to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7889">CVE-2017-7889</a>
-
- <p>Tommi Rantala and Brad Spengler reported that the mm subsystem does
- not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism,
- allowing a local attacker with access to /dev/mem to obtain
- sensitive information or potentially execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10661">CVE-2017-10661</a>
-
- <p>Dmitry Vyukov of Google reported that the timerfd facility does
- not properly handle certain concurrent operations on a single file
- descriptor. This allows a local attacker to cause a denial of
- service or potentially to execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10911">CVE-2017-10911</a> / XSA-216
-
- <p>Anthony Perard of Citrix discovered an information leak flaw in Xen
- blkif response handling, allowing a malicious unprivileged guest to
- obtain sensitive information from the host or other guests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11176">CVE-2017-11176</a>
-
- <p>It was discovered that the mq_notify() function does not set the
- sock pointer to NULL upon entry into the retry logic. An attacker
- can take advantage of this flaw during a userspace close of a
- Netlink socket to cause a denial of service or potentially cause
- other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11600">CVE-2017-11600</a>
-
- <p>bo Zhang reported that the xfrm subsystem does not properly
- validate one of the parameters to a netlink message. Local users
- with the CAP_NET_ADMIN capability can use this to cause a denial
- of service or potentially to execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12134">CVE-2017-12134</a> / #866511 / XSA-229
-
- <p>Jan H. Schönherr of Amazon discovered that when Linux is running
- in a Xen PV domain on an x86 system, it may incorrectly merge
- block I/O requests. A buggy or malicious guest may trigger this
- bug in dom0 or a PV driver domain, causing a denial of service or
- potentially execution of arbitrary code.</p>
-
- <p>This issue can be mitigated by disabling merges on the underlying
- back-end block devices, e.g.:
- echo 2 > /sys/block/nvme0n1/queue/nomerges</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12153">CVE-2017-12153</a>
-
- <p>bo Zhang reported that the cfg80211 (wifi) subsystem does not
- properly validate the parameters to a netlink message. Local users
- with the CAP_NET_ADMIN capability on a system with a wifi device
- can use this to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12154">CVE-2017-12154</a>
-
- <p>Jim Mattson of Google reported that the KVM implementation for
- Intel x86 processors did not correctly handle certain nested
- hypervisor configurations. A malicious guest (or nested guest in a
- suitable L1 hypervisor) could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14106">CVE-2017-14106</a>
-
- <p>Andrey Konovalov of Google reported that a specific sequence of
- operations on a TCP socket could lead to division by zero. A
- local user could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14140">CVE-2017-14140</a>
-
- <p>Otto Ebeling reported that the move_pages() system call permitted
- users to discover the memory layout of a set-UID process running
- under their real user-ID. This made it easier for local users to
- exploit vulnerabilities in programs installed with the set-UID
- permission bit set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14156">CVE-2017-14156</a>
-
- <p><q>sohu0106</q> reported an information leak in the atyfb video driver.
- A local user with access to a framebuffer device handled by this
- driver could use this to obtain sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14340">CVE-2017-14340</a>
-
- <p>Richard Wareing discovered that the XFS implementation allows the
- creation of files with the <q>realtime</q> flag on a filesystem with no
- realtime device, which can result in a crash (oops). A local user
- with access to an XFS filesystem that does not have a realtime
- device can use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14489">CVE-2017-14489</a>
-
- <p>ChunYu of Red Hat discovered that the iSCSI subsystem does not
- properly validate the length of a netlink message, leading to
- memory corruption. A local user with permission to manage iSCSI
- devices can use this for denial of service or possibly to
- execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000111">CVE-2017-1000111</a>
-
- <p>Andrey Konovalov of Google reported that a race condition in the
- raw packet (af_packet) feature. Local users with the CAP_NET_RAW
- capability can use this to cause a denial of service or possibly to
- execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000251">CVE-2017-1000251</a> / #875881
-
- <p>Armis Labs discovered that the Bluetooth subsystem does not
- properly validate L2CAP configuration responses, leading to a
- stack buffer overflow. This is one of several vulnerabilities
- dubbed <q>Blueborne</q>. A nearby attacker can use this to cause a
- denial of service or possibly to execute arbitrary code on a
- system with Bluetooth enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000363">CVE-2017-1000363</a>
-
- <p>Roee Hay reported that the lp driver does not properly bounds-check
- passed arguments. This has no security impact in Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000365">CVE-2017-1000365</a>
-
- <p>It was discovered that argument and environment pointers are not
- properly taken into account by the size restrictions on arguments
- and environmental strings passed through execve(). A local
- attacker can take advantage of this flaw in conjunction with other
- flaws to execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000380">CVE-2017-1000380</a>
-
- <p>Alexander Potapenko of Google reported a race condition in the ALSA
- (sound) timer driver, leading to an information leak. A local user
- with permission to access sound devices could use this to obtain
- sensitive information.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.93-1. This version also includes bug fixes from upstream versions
-up to and including 3.2.93.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.43-2+deb8u4 or were fixed in an earlier version.</p>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4.9.30-2+deb9u4 or were fixed in an earlier version.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1099.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1100.data b/english/lts/security/2017/dla-1100.data
deleted file mode 100644
index 2f00ef0a154..00000000000
--- a/english/lts/security/2017/dla-1100.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1100-1 gdk-pixbuf</define-tag>
-<define-tag report_date>2017-9-19</define-tag>
-<define-tag secrefs>CVE-2017-2862 Bug#874552</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1100.wml b/english/lts/security/2017/dla-1100.wml
deleted file mode 100644
index 039377f4099..00000000000
--- a/english/lts/security/2017/dla-1100.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Marcin Noga discovered a buffer overflow in the JPEG loader of the GDK
-Pixbuf library, which may result in the execution of arbitrary code if
-a malformed file is opened.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.26.1-1+deb7u6.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1100.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1101.data b/english/lts/security/2017/dla-1101.data
deleted file mode 100644
index 7bd8a3339a0..00000000000
--- a/english/lts/security/2017/dla-1101.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1101-1 emacs23</define-tag>
-<define-tag report_date>2017-9-21</define-tag>
-<define-tag secrefs>CVE-2017-14482</define-tag>
-<define-tag packages>emacs23</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1101.wml b/english/lts/security/2017/dla-1101.wml
deleted file mode 100644
index 061c2c9d59f..00000000000
--- a/english/lts/security/2017/dla-1101.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Charles A. Roelli discovered that Emacs is vulnerable to arbitrary code
-execution when rendering text/enriched MIME data (e.g. when using
-Emacs-based mail clients).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-23.4+1-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your emacs23 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1101.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1102.data b/english/lts/security/2017/dla-1102.data
deleted file mode 100644
index 8172e22dac0..00000000000
--- a/english/lts/security/2017/dla-1102.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1102-1 apache2</define-tag>
-<define-tag report_date>2017-9-21</define-tag>
-<define-tag secrefs>CVE-2017-9798 Bug#876109</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1102.wml b/english/lts/security/2017/dla-1102.wml
deleted file mode 100644
index b40a25654dc..00000000000
--- a/english/lts/security/2017/dla-1102.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hanno Boeck discovered that incorrect parsing of Limit directives of
-.htaccess files by the Apache HTTP Server could result in memory
-disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.22-13+deb7u12.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1102.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1103.data b/english/lts/security/2017/dla-1103.data
deleted file mode 100644
index db0d1f7a30c..00000000000
--- a/english/lts/security/2017/dla-1103.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1103-1 bluez</define-tag>
-<define-tag report_date>2017-9-21</define-tag>
-<define-tag secrefs>CVE-2017-1000250 Bug#875633</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1103.wml b/english/lts/security/2017/dla-1103.wml
deleted file mode 100644
index 0e07ce22b64..00000000000
--- a/english/lts/security/2017/dla-1103.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The SDP server in BlueZ is vulnerable to an information disclosure
-vulnerability which allows remote attackers to obtain sensitive information
-from the bluetoothd process memory. This vulnerability lies in the processing
-of SDP search attribute requests.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.99-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1103.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1104.data b/english/lts/security/2017/dla-1104.data
deleted file mode 100644
index dbcaaa82432..00000000000
--- a/english/lts/security/2017/dla-1104.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1104-1 newsbeuter</define-tag>
-<define-tag report_date>2017-9-21</define-tag>
-<define-tag secrefs>CVE-2017-14500 Bug#876004</define-tag>
-<define-tag packages>newsbeuter</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1104.wml b/english/lts/security/2017/dla-1104.wml
deleted file mode 100644
index ef8f44ea7ab..00000000000
--- a/english/lts/security/2017/dla-1104.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that podbeuter, the podcast fetcher in newsbeuter, a
-text-mode RSS feed reader, did not properly escape the name of the media
-enclosure (the podcast file), allowing a remote attacker to run an
-arbitrary shell command on the client machine. This is only exploitable
-if the file is also played in podbeuter.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.5-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your newsbeuter packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1104.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1105.data b/english/lts/security/2017/dla-1105.data
deleted file mode 100644
index 71e23e763ab..00000000000
--- a/english/lts/security/2017/dla-1105.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1105-1 clamav</define-tag>
-<define-tag report_date>2017-9-22</define-tag>
-<define-tag secrefs>CVE-2017-6418 CVE-2017-6420</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1105.wml b/english/lts/security/2017/dla-1105.wml
deleted file mode 100644
index 8779673b017..00000000000
--- a/english/lts/security/2017/dla-1105.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>clamav is vulnerable to multiple issues that can lead
-to denial of service when processing untrusted content.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6418">CVE-2017-6418</a>
-
- <p>out-of-bounds read in libclamav/message.c, allowing remote attackers
- to cause a denial of service via a crafted e-mail message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6420">CVE-2017-6420</a>
-
- <p>use-after-free in the wwunpack function (libclamav/wwunpack.c), allowing
- remote attackers to cause a denial of service via a crafted PE file with
- WWPack compression.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.99.2+dfsg-0+deb7u3.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1105.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1106.data b/english/lts/security/2017/dla-1106.data
deleted file mode 100644
index 513af7caf02..00000000000
--- a/english/lts/security/2017/dla-1106.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1106-1 libgd2</define-tag>
-<define-tag report_date>2017-9-22</define-tag>
-<define-tag secrefs>CVE-2017-6362</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1106.wml b/english/lts/security/2017/dla-1106.wml
deleted file mode 100644
index e9d3800bac1..00000000000
--- a/english/lts/security/2017/dla-1106.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A double-free vulnerability was discovered in the gdImagePngPtr()
-function in libgd2, a library for programmatic graphics creation and
-manipulation, which may result in denial of service or potentially the
-execution of arbitrary code if a specially crafted file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u10.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1106.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1107.data b/english/lts/security/2017/dla-1107.data
deleted file mode 100644
index 006f391c8c3..00000000000
--- a/english/lts/security/2017/dla-1107.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1107-1 bzr</define-tag>
-<define-tag report_date>2017-9-23</define-tag>
-<define-tag secrefs>CVE-2013-2099 CVE-2017-14176 Bug#709068 Bug#874429</define-tag>
-<define-tag packages>bzr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1107.wml b/english/lts/security/2017/dla-1107.wml
deleted file mode 100644
index 2ae66e8ba8e..00000000000
--- a/english/lts/security/2017/dla-1107.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2099">CVE-2013-2099</a>
-
- <p>Bazaar bundles SSL certificate checking code from Python, which
- had a bug that could cause a denial of service via resource
- consumption through multiple wildcards in certificate hostnames.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14176">CVE-2017-14176</a>
-
- <p>Adam Collard found that host names in 'bzr+ssh' URLs were not
- parsed correctly by Bazaar, allowing remote attackers to run
- arbitrary code by tricking a user into a maliciously crafted
- URL.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.6.0~bzr6526-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your bzr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1107.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1108.data b/english/lts/security/2017/dla-1108.data
deleted file mode 100644
index 5c908126d2d..00000000000
--- a/english/lts/security/2017/dla-1108.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1108-1 tomcat7</define-tag>
-<define-tag report_date>2017-9-24</define-tag>
-<define-tag secrefs>CVE-2017-12616</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1108.wml b/english/lts/security/2017/dla-1108.wml
deleted file mode 100644
index d4308add4c3..00000000000
--- a/english/lts/security/2017/dla-1108.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Tomcat security team discovered that when using a
-VirtualDirContext it was possible to bypass security constraints
-and/or view the source code of JSPs for resources served by the
-VirtualDirContext using a specially crafted request.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u15.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1108.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1109.data b/english/lts/security/2017/dla-1109.data
deleted file mode 100644
index c3fee686cf8..00000000000
--- a/english/lts/security/2017/dla-1109.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1109-1 libraw</define-tag>
-<define-tag report_date>2017-9-24</define-tag>
-<define-tag secrefs>CVE-2017-14608</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1109.wml b/english/lts/security/2017/dla-1109.wml
deleted file mode 100644
index 797bd198b5c..00000000000
--- a/english/lts/security/2017/dla-1109.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14608">CVE-2017-14608</a>
-
- <p>An out of bounds read flaw related to kodak_65000_load_raw has been
- reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker
- could possibly exploit this flaw to disclose potentially sensitive
- memory or cause an application crash.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.14.6-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1109.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1110.data b/english/lts/security/2017/dla-1110.data
deleted file mode 100644
index 8f47cd49fad..00000000000
--- a/english/lts/security/2017/dla-1110.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1110-1 samba</define-tag>
-<define-tag report_date>2017-9-25</define-tag>
-<define-tag secrefs>CVE-2017-12150 CVE-2017-12163</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1110.wml b/english/lts/security/2017/dla-1110.wml
deleted file mode 100644
index cfcac8852c1..00000000000
--- a/english/lts/security/2017/dla-1110.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12150">CVE-2017-12150</a>
-
- <p>Stefan Metzmacher discovered multiple code paths where SMB signing
- was not enforced.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12163">CVE-2017-12163</a>
-
- <p>Yihan Lian and Zhibin Hu discovered that insufficient range checks
- in the processing of SMB1 write requests could result in disclosure
- of server memory.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.6.6-6+deb7u14.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1110.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1111.data b/english/lts/security/2017/dla-1111.data
deleted file mode 100644
index 1eb34c38622..00000000000
--- a/english/lts/security/2017/dla-1111.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1111-1 weechat</define-tag>
-<define-tag report_date>2017-9-26</define-tag>
-<define-tag secrefs>CVE-2017-14727 Bug#876553</define-tag>
-<define-tag packages>weechat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1111.wml b/english/lts/security/2017/dla-1111.wml
deleted file mode 100644
index 0f909da48c6..00000000000
--- a/english/lts/security/2017/dla-1111.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that WeeChat's logger plugin is vulnerable to an
-invalid buffer read which can be exploited remotely to trigger an
-application crash or other undefined behaviour.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.3.8-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your weechat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1111.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1112.data b/english/lts/security/2017/dla-1112.data
deleted file mode 100644
index cd90576e758..00000000000
--- a/english/lts/security/2017/dla-1112.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1112-1 rubygems</define-tag>
-<define-tag report_date>2017-9-27</define-tag>
-<define-tag secrefs>CVE-2017-0900 CVE-2017-0901 Bug#873802</define-tag>
-<define-tag packages>rubygems</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1112.wml b/english/lts/security/2017/dla-1112.wml
deleted file mode 100644
index d8fb9809c15..00000000000
--- a/english/lts/security/2017/dla-1112.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some vulnerabilities were found in the Rubygems package that affects
-the LTS distribution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0900">CVE-2017-0900</a>
-
- <p>DOS vulernerability in the query command</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0901">CVE-2017-0901</a>
-
- <p>gem installer allows a malicious gem to overwrite arbitrary files</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.24-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your rubygems packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1112.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1113.data b/english/lts/security/2017/dla-1113.data
deleted file mode 100644
index bb0719d35cc..00000000000
--- a/english/lts/security/2017/dla-1113.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1113-1 ruby1.8</define-tag>
-<define-tag report_date>2017-9-26</define-tag>
-<define-tag secrefs>CVE-2017-0898 CVE-2017-10784 Bug#875931 Bug#875936</define-tag>
-<define-tag packages>ruby1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1113.wml b/english/lts/security/2017/dla-1113.wml
deleted file mode 100644
index fdb0d3c4d41..00000000000
--- a/english/lts/security/2017/dla-1113.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some vulnerabilities were found in the Ruby 1.8 package that affects
-the LTS distribution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0898">CVE-2017-0898</a>
-
- <p>Buffer underrun vulnerability in Kernel.sprintf</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10784">CVE-2017-10784</a>
-
- <p>Escape sequence injection vulnerability in the Basic
- authentication of WEBrick</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.7.358-7.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your ruby1.8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1113.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1114.data b/english/lts/security/2017/dla-1114.data
deleted file mode 100644
index 83952484196..00000000000
--- a/english/lts/security/2017/dla-1114.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1114-1 ruby1.9.1</define-tag>
-<define-tag report_date>2017-9-26</define-tag>
-<define-tag secrefs>CVE-2017-0898 CVE-2017-0899 CVE-2017-0900 CVE-2017-0901 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 Bug#873802 Bug#873906 Bug#875928 Bug#875931 Bug#875936</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1114.wml b/english/lts/security/2017/dla-1114.wml
deleted file mode 100644
index dcae76a8ccd..00000000000
--- a/english/lts/security/2017/dla-1114.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the Ruby 1.9 interpretor.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0898">CVE-2017-0898</a>
-
- <p>Buffer underrun vulnerability in Kernel.sprintf</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0899">CVE-2017-0899</a>
-
- <p>ANSI escape sequence vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0900">CVE-2017-0900</a>
-
- <p>DOS vulernerability in the query command</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0901">CVE-2017-0901</a>
-
- <p>gem installer allows a malicious gem to overwrite arbitrary files</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10784">CVE-2017-10784</a>
-
- <p>Escape sequence injection vulnerability in the Basic
- authentication of WEBrick</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14033">CVE-2017-14033</a>
-
- <p>Buffer underrun vulnerability in OpenSSL ASN1 decode</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14064">CVE-2017-14064</a>
-
- <p>Heap exposure vulnerability in generating JSON</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.3.194-8.1+deb7u6.</p>
-
-<p>We recommend that you upgrade your ruby1.9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1114.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1115.data b/english/lts/security/2017/dla-1115.data
deleted file mode 100644
index 5c1495a8dea..00000000000
--- a/english/lts/security/2017/dla-1115.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1115-1 debsecan</define-tag>
-<define-tag report_date>2017-9-27</define-tag>
-<define-tag secrefs>Bug#842428</define-tag>
-<define-tag packages>debsecan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1115.wml b/english/lts/security/2017/dla-1115.wml
deleted file mode 100644
index f40ab581715..00000000000
--- a/english/lts/security/2017/dla-1115.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Debsecan in Wheezy in its default configuration currently fails to
-download recent vulnerability data due to an URL change.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.4.16+nmu1+deb7u1.</p>
-
-<p>We recommend that you upgrade your debsecan packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1115.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1116.data b/english/lts/security/2017/dla-1116.data
deleted file mode 100644
index c81e32f497e..00000000000
--- a/english/lts/security/2017/dla-1116.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1116-1 poppler</define-tag>
-<define-tag report_date>2017-9-27</define-tag>
-<define-tag secrefs>CVE-2017-14517 CVE-2017-14519 CVE-2017-14617 Bug#876086 Bug#876385 Bug#876079</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1116.wml b/english/lts/security/2017/dla-1116.wml
deleted file mode 100644
index 46a33c3817d..00000000000
--- a/english/lts/security/2017/dla-1116.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that poppler, a PDF rendering library, was affected
-by several denial-of-service (application crash), null pointer
-dereferences and memory corruption bugs:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14517">CVE-2017-14517</a>
-
- <p>NULL Pointer Dereference in the XRef::parseEntry() function in
- XRef.cc</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14519">CVE-2017-14519</a>
-
- <p>Memory corruption occurs in a call to Object::streamGetChar that
- may lead to a denial of service or other unspecified impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14617">CVE-2017-14617</a>
-
- <p>Potential buffer overflow in the ImageStream class in Stream.cc,
- which may lead to a denial of service or other unspecified impact.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.18.4-6+deb7u3.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1116.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1117.data b/english/lts/security/2017/dla-1117.data
deleted file mode 100644
index e3f4c97b11a..00000000000
--- a/english/lts/security/2017/dla-1117.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1117-1 opencv</define-tag>
-<define-tag report_date>2017-9-29</define-tag>
-<define-tag secrefs>CVE-2016-1516 CVE-2017-12597 CVE-2017-12598 CVE-2017-12599 CVE-2017-12601 CVE-2017-12603 CVE-2017-12604 CVE-2017-12605 CVE-2017-12606 CVE-2017-12862 CVE-2017-12863 CVE-2017-12864 CVE-2017-14136</define-tag>
-<define-tag packages>opencv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1117.wml b/english/lts/security/2017/dla-1117.wml
deleted file mode 100644
index e399b030b5f..00000000000
--- a/english/lts/security/2017/dla-1117.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>OpenCV through version 3.3 has out-of-bounds read/write errors, buffer
-overflows and double free issues in different functions.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.1-11+deb7u2.</p>
-
-<p>We recommend that you upgrade your opencv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1117.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1118.data b/english/lts/security/2017/dla-1118.data
deleted file mode 100644
index f2dfff5e910..00000000000
--- a/english/lts/security/2017/dla-1118.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1118-1 firefox-esr</define-tag>
-<define-tag report_date>2017-9-30</define-tag>
-<define-tag secrefs>CVE-2017-7793 CVE-2017-7805 CVE-2017-7810 CVE-2017-7814 CVE-2017-7818 CVE-2017-7819 CVE-2017-7823 CVE-2017-7824</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1118.wml b/english/lts/security/2017/dla-1118.wml
deleted file mode 100644
index cb2850552fd..00000000000
--- a/english/lts/security/2017/dla-1118.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees, buffer
-overflows and other implementation errors may lead to the execution of
-arbitrary code, denial of service, cross-site scripting or bypass of
-the phishing and malware protection feature.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.4.0esr-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1118.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1119.data b/english/lts/security/2017/dla-1119.data
deleted file mode 100644
index 7c131aa7da1..00000000000
--- a/english/lts/security/2017/dla-1119.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1119-1 otrs2</define-tag>
-<define-tag report_date>2017-9-30</define-tag>
-<define-tag secrefs>CVE-2014-1695 CVE-2014-2553 CVE-2014-2554 CVE-2017-14635 Bug#876462</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1119.wml b/english/lts/security/2017/dla-1119.wml
deleted file mode 100644
index 0d734d423eb..00000000000
--- a/english/lts/security/2017/dla-1119.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An attacker who is logged into OTRS, a Ticket Request System, as an
-agent with write permissions for statistics can inject arbitrary code
-into the system. This can lead to serious problems like privilege
-escalation, data loss, and denial of service. This issue is also known
-as <a href="https://security-tracker.debian.org/tracker/CVE-2017-14635">CVE-2017-14635</a>
-and is resolved by upgrading to the latest upstream release of OTRS3.</p>
-
-<p><strong>IMPORTANT UPGRADE NOTES</strong></p>
-
-<p>This update requires manual intervention. We strongly recommend to
-backup all files and databases before upgrading. If you use the MySQL
-backend you should read Debian bug report #707075 and the included
-README.Debian file which will provide further information.</p>
-
-<p>If you discover that the maintenance mode is still activated after the
-update, we recommend to remove /etc/otrs/maintenance.html and
-/var/lib/otrs/httpd/htdocs/maintenance.html which will resolve the issue.</p>
-
-<p>In addition the following security vulnerabilities were also addressed:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1695">CVE-2014-1695</a>
-
- <p>Cross-site scripting (XSS) vulnerability in OTRS allows remote
- attackers to inject arbitrary web script or HTML via a crafted HTML
- email</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2553">CVE-2014-2553</a>
-
- <p>Cross-site scripting (XSS) vulnerability in OTRS allows remote
- authenticated users to inject arbitrary web script or HTML via
- vectors related to dynamic fields</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2554">CVE-2014-2554</a>
-
- <p>OTRS allows remote attackers to conduct clickjacking attacks via an
- IFRAME element</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.3.18-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1119.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1120.data b/english/lts/security/2017/dla-1120.data
deleted file mode 100644
index a5eff8015c4..00000000000
--- a/english/lts/security/2017/dla-1120.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1120-1 git</define-tag>
-<define-tag report_date>2017-10-2</define-tag>
-<define-tag secrefs>CVE-2017-14867 Bug#876854</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1120.wml b/english/lts/security/2017/dla-1120.wml
deleted file mode 100644
index 63a36fc4ff0..00000000000
--- a/english/lts/security/2017/dla-1120.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>joernchen discovered that the git-cvsserver subcommand of Git, a
-distributed version control system, suffers from a shell command
-injection vulnerability due to unsafe use of the Perl backtick
-operator. The git-cvsserver subcommand is reachable from the
-git-shell subcommand even if CVS support has not been configured
-(however, the git-cvs package needs to be installed).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.7.10.4-1+wheezy6.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1120.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1121.data b/english/lts/security/2017/dla-1121.data
deleted file mode 100644
index 6d031da2b99..00000000000
--- a/english/lts/security/2017/dla-1121.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1121-1 curl</define-tag>
-<define-tag report_date>2017-10-5</define-tag>
-<define-tag secrefs>CVE-2017-1000254 Bug##877671</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1121.wml b/english/lts/security/2017/dla-1121.wml
deleted file mode 100644
index 517d5a6fc43..00000000000
--- a/english/lts/security/2017/dla-1121.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a out-of-bounds read vulnerability in
-curl, a command-line and library for transferring data over HTTP/FTP,
-etc. A malicious FTP server could abuse this to prevent curl-based
-clients from interacting with it.</p>
-
-<p>See <url "https://curl.haxx.se/docs/adv_20171004.html"> for more details.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in curl version
-7.26.0-1+wheezy21.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1121.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1122.data b/english/lts/security/2017/dla-1122.data
deleted file mode 100644
index 7ec9c28a2d5..00000000000
--- a/english/lts/security/2017/dla-1122.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1122-1 asterisk</define-tag>
-<define-tag report_date>2017-10-5</define-tag>
-<define-tag secrefs>CVE-2017-14100 Bug#873908</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1122.wml b/english/lts/security/2017/dla-1122.wml
deleted file mode 100644
index 3204371a67a..00000000000
--- a/english/lts/security/2017/dla-1122.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in Asterisk, an Open
-Source PBX and telephony toolkit, that may lead to unauthorized
-command execution.</p>
-
-<p>The app_minivm module has an <q>externnotify</q> program configuration option
-that is executed by the MinivmNotify dialplan application. The
-application uses the caller-id name and number as part of a built
-string passed to the OS shell for interpretation and execution. Since
-the caller-id name and number can come from an untrusted source, a
-crafted caller-id name or number allows an arbitrary shell command
-injection.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.8.13.1~dfsg1-3+deb7u7.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1122.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1123.data b/english/lts/security/2017/dla-1123.data
deleted file mode 100644
index 8516df4e15b..00000000000
--- a/english/lts/security/2017/dla-1123.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1123-1 golang</define-tag>
-<define-tag report_date>2017-10-6</define-tag>
-<define-tag secrefs>CVE-2017-1000098</define-tag>
-<define-tag packages>golang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1123.wml b/english/lts/security/2017/dla-1123.wml
deleted file mode 100644
index e20887bbb7e..00000000000
--- a/english/lts/security/2017/dla-1123.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in the Go programming language
-library where an attacker could generate a MIME request such that the
-server ran out of file descriptors.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in golang version
-2:1.0.2-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your golang packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1123.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1124.data b/english/lts/security/2017/dla-1124.data
deleted file mode 100644
index cdfcbd9a30e..00000000000
--- a/english/lts/security/2017/dla-1124.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1124-1 dnsmasq</define-tag>
-<define-tag report_date>2017-10-6</define-tag>
-<define-tag secrefs>CVE-2017-14491 CVE-2017-14492 CVE-2017-14494</define-tag>
-<define-tag packages>dnsmasq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1124.wml b/english/lts/security/2017/dla-1124.wml
deleted file mode 100644
index b1ec1fe0253..00000000000
--- a/english/lts/security/2017/dla-1124.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Felix Wilhelm, Fermin J. Serna, Gabriel Campana, Kevin Hamacher, Ron
-Bowes and Gynvael Coldwind of the Google Security Team discovered
-several vulnerabilities in dnsmasq, a small caching DNS proxy and
-DHCP/TFTP server, which may result in denial of service, information
-leak or the execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.62-3+deb7u4.</p>
-
-<p>We recommend that you upgrade your dnsmasq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1124.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1125.data b/english/lts/security/2017/dla-1125.data
deleted file mode 100644
index c188e4bf916..00000000000
--- a/english/lts/security/2017/dla-1125.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1125-1 botan1.10</define-tag>
-<define-tag report_date>2017-10-6</define-tag>
-<define-tag secrefs>CVE-2017-14737</define-tag>
-<define-tag packages>botan1.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1125.wml b/english/lts/security/2017/dla-1125.wml
deleted file mode 100644
index 6591de34331..00000000000
--- a/english/lts/security/2017/dla-1125.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14737">CVE-2017-14737</a>
-
- <p>Fix of cache-based side channel attack, which could recover
- information about RSA secret keys.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10.5-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your botan1.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1125.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1126.data b/english/lts/security/2017/dla-1126.data
deleted file mode 100644
index 85938bc6e96..00000000000
--- a/english/lts/security/2017/dla-1126.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1126-1 libxfont</define-tag>
-<define-tag report_date>2017-10-7</define-tag>
-<define-tag secrefs>CVE-2017-13720 CVE-2017-13722</define-tag>
-<define-tag packages>libxfont</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1126.wml b/english/lts/security/2017/dla-1126.wml
deleted file mode 100644
index a51add4bae0..00000000000
--- a/english/lts/security/2017/dla-1126.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there two vulnerabilities the library providing
-font selection and rasterisation, libxfont:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13720">CVE-2017-13720</a>
- <p>If a pattern contained a '?' character any character
- in the string is skipped even if it was a '\0'. The rest of the
- matching then read invalid memory.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13722">CVE-2017-13722</a>
- <p>A malformed PCF file could cause the library to make
- reads from random heap memory that was behind the `strings` buffer,
- leading to an application crash or a information leak.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libxfont version
-1:1.4.5-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your libxfont packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1126.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1127.data b/english/lts/security/2017/dla-1127.data
deleted file mode 100644
index bdad8fdff2d..00000000000
--- a/english/lts/security/2017/dla-1127.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1127-1 sam2p</define-tag>
-<define-tag report_date>2017-10-8</define-tag>
-<define-tag secrefs>CVE-2017-14628 CVE-2017-14629 CVE-2017-14630 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637</define-tag>
-<define-tag packages>sam2p</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1127.wml b/english/lts/security/2017/dla-1127.wml
deleted file mode 100644
index 8dfd854ceb5..00000000000
--- a/english/lts/security/2017/dla-1127.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilites, like heap-based buffer overflows, integer
-signedness or overflow errors have been found by fpbibi and have
-been fixed by upstream.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.49.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your sam2p packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1127.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1128.data b/english/lts/security/2017/dla-1128.data
deleted file mode 100644
index 4be8ae403c7..00000000000
--- a/english/lts/security/2017/dla-1128.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1128-1 qemu-kvm</define-tag>
-<define-tag report_date>2017-10-8</define-tag>
-<define-tag secrefs>CVE-2017-14167 CVE-2017-15038</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1128.wml b/english/lts/security/2017/dla-1128.wml
deleted file mode 100644
index 53f4ce5ae7c..00000000000
--- a/english/lts/security/2017/dla-1128.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in qemu-kvm, a full
-virtualization solution for Linux hosts on x86 hardware with x86 guests
-based on the Quick Emulator(Qemu).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14167">CVE-2017-14167</a>
-
- <p>Incorrect validation of multiboot headers could result in the
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15038">CVE-2017-15038</a>
-
- <p>When using 9pfs qemu-kvm is vulnerable to an information
- disclosure issue. It could occur while accessing extended attributes
- of a file due to a race condition. This could be used to disclose
- heap memory contents of the host.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u24.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1128.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1129.data b/english/lts/security/2017/dla-1129.data
deleted file mode 100644
index 879f8a3dbdb..00000000000
--- a/english/lts/security/2017/dla-1129.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1129-1 qemu</define-tag>
-<define-tag report_date>2017-10-8</define-tag>
-<define-tag secrefs>CVE-2017-14167 CVE-2017-15038</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1129.wml b/english/lts/security/2017/dla-1129.wml
deleted file mode 100644
index fe2ebc8568d..00000000000
--- a/english/lts/security/2017/dla-1129.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were discovered in qemu, a fast processor
-emulator. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14167">CVE-2017-14167</a>
-
- <p>Incorrect validation of multiboot headers could result in the
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15038">CVE-2017-15038</a>
-
- <p>When using 9pfs qemu-kvm is vulnerable to an information
- disclosure issue. It could occur while accessing extended attributes
- of a file due to a race condition. This could be used to disclose
- heap memory contents of the host.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u24.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1129.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1130.data b/english/lts/security/2017/dla-1130.data
deleted file mode 100644
index 944c0ccae96..00000000000
--- a/english/lts/security/2017/dla-1130.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1130-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-10-19</define-tag>
-<define-tag secrefs>CVE-2017-14103 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733 CVE-2017-14994 CVE-2017-14997</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1130.wml b/english/lts/security/2017/dla-1130.wml
deleted file mode 100644
index 6db04d3dddf..00000000000
--- a/english/lts/security/2017/dla-1130.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This upload fixes a number of security issues in graphicsmagick.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14103">CVE-2017-14103</a>
-
- <p>The ReadJNGImage and ReadOneJNGImage functions in
- coders/png.c did not properly manage image pointers after certain error
- conditions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14314">CVE-2017-14314</a>
-
- <p>Heap-based buffer over-read in DrawDashPolygon() .</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14504">CVE-2017-14504</a>
-
- <p>NULL pointer dereference triggered by malformed file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14733">CVE-2017-14733</a>
-
- <p>Ensure we detect alpha images with too few colors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14994">CVE-2017-14994</a>
-
- <p>DCM_ReadNonNativeImages() can produce image list with
- no frames, resulting in null image pointer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14997">CVE-2017-14997</a>
-
- <p>Unsigned underflow leading to astonishingly
- large allocation request.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u10.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1130.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1131.data b/english/lts/security/2017/dla-1131.data
deleted file mode 100644
index e83c7568938..00000000000
--- a/english/lts/security/2017/dla-1131.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1131-1 imagemagick</define-tag>
-<define-tag report_date>2017-10-11</define-tag>
-<define-tag secrefs>CVE-2017-12691 CVE-2017-12692 CVE-2017-12693 CVE-2017-1287 CVE-2017-13758 CVE-2017-13768 CVE-2017-13769 CVE-2017-1406 CVE-2017-14172 CVE-2017-14173 CVE-2017-14174 CVE-2017-1417 CVE-2017-14224 CVE-2017-14249 CVE-2017-14341 CVE-2017-1440 CVE-2017-14505 CVE-2017-14607 CVE-2017-14682 CVE-2017-1473 CVE-2017-14741 CVE-2017-14989 CVE-2017-15016 CVE-2017-15017 Bug#873871 Bug#875338 Bug#875339 Bug#875341 Bug#875352 Bug#875502 Bug#875503 Bug#875504</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1131.wml b/english/lts/security/2017/dla-1131.wml
deleted file mode 100644
index de7a7601721..00000000000
--- a/english/lts/security/2017/dla-1131.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This updates fixes numerous vulnerabilities in imagemagick: Various
-memory handling problems and cases of missing or incomplete input
-sanitising may result in denial of service, memory disclosure, or the
-execution of arbitrary code if malformed XCF, VIFF, BMP, thumbnail, CUT,
-PSD, TXT, XBM, PCX, MPC, WPG, TIFF, SVG, font, EMF, PNG, or other types
-of files are processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u17.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1131.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1132.data b/english/lts/security/2017/dla-1132.data
deleted file mode 100644
index df663d38c1a..00000000000
--- a/english/lts/security/2017/dla-1132.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1132-1 xen</define-tag>
-<define-tag report_date>2017-10-11</define-tag>
-<define-tag secrefs>CVE-2017-10912 CVE-2017-10913 CVE-2017-10914 CVE-2017-10915 CVE-2017-10918 CVE-2017-10920 CVE-2017-10921 CVE-2017-10922 CVE-2017-12135 CVE-2017-12137 CVE-2017-12855 CVE-2017-14316 CVE-2017-14317 CVE-2017-14318 CVE-2017-14319</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1132.wml b/english/lts/security/2017/dla-1132.wml
deleted file mode 100644
index b37daa78945..00000000000
--- a/english/lts/security/2017/dla-1132.wml
+++ /dev/null
@@ -1,87 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10912">CVE-2017-10912</a>
-
- <p>Jann Horn discovered that incorrectly handling of page transfers might
- result in privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10913">CVE-2017-10913</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-10914">CVE-2017-10914</a>
-
- <p>Jann Horn discovered that race conditions in grant handling might
- result in information leaks or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10915">CVE-2017-10915</a>
-
- <p>Andrew Cooper discovered that incorrect reference counting with
- shadow paging might result in privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10918">CVE-2017-10918</a>
-
- <p>Julien Grall discovered that incorrect error handling in
- physical-to-machine memory mappings may result in privilege
- escalation, denial of service or an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10920">CVE-2017-10920</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-10921">CVE-2017-10921</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-10922">CVE-2017-10922</a>
-
- <p>Jan Beulich discovered multiple places where reference
- counting on grant table operations was incorrect, resulting
- in potential privilege escalation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12135">CVE-2017-12135</a>
-
- <p>Jan Beulich found multiple problems in the handling of
- transitive grants which could result in denial of service
- and potentially privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12137">CVE-2017-12137</a>
-
- <p>Andrew Cooper discovered that incorrect validation of
- grants may result in privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12855">CVE-2017-12855</a>
-
- <p>Jan Beulich discovered that incorrect grant status handling, thus
- incorrectly informing the guest that the grant is no longer in use.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14316">CVE-2017-14316</a>
-
- <p>Matthew Daley discovered that the NUMA node parameter wasn't
- verified which which may result in privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14317">CVE-2017-14317</a>
-
- <p>Eric Chanudet discovered that a race conditions in cxenstored might
- result in information leaks or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14318">CVE-2017-14318</a>
-
- <p>Matthew Daley discovered that incorrect validation of
- grants may result in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14319">CVE-2017-14319</a>
-
- <p>Andrew Cooper discovered that insufficient grant unmapping
- checks may result in denial of service and privilege escalation.</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-9.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1132.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1133.data b/english/lts/security/2017/dla-1133.data
deleted file mode 100644
index 6e7da82ba17..00000000000
--- a/english/lts/security/2017/dla-1133.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1133-1 ming</define-tag>
-<define-tag report_date>2017-10-21</define-tag>
-<define-tag secrefs>CVE-2017-11704 CVE-2017-11728 CVE-2017-11729 CVE-2017-11730 CVE-2017-11731 CVE-2017-11734</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1133.wml b/english/lts/security/2017/dla-1133.wml
deleted file mode 100644
index 160e3693930..00000000000
--- a/english/lts/security/2017/dla-1133.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Ming:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11704">CVE-2017-11704</a>
-
- <p>Heap-based buffer over-read in the function decompileIF in util/decompile.c
- in Ming <= 0.4.8, which allows attackers to cause a denial of service via a
- crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11728">CVE-2017-11728</a>
-
- <p>Heap-based buffer over-read in the function OpCode (called from
- decompileSETMEMBER) in util/decompile.c in Ming <= 0.4.8, which allows
- attackers to cause a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11729">CVE-2017-11729</a>
-
- <p>Heap-based buffer over-read in the function OpCode (called from
- decompileINCR_DECR line 1440) in util/decompile.c in Ming <= 0.4.8, which
- allows attackers to cause a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11730">CVE-2017-11730</a>
-
- <p>Heap-based buffer over-read in the function OpCode (called from
- decompileINCR_DECR line 1474) in util/decompile.c in Ming <= 0.4.8, which
- allows attackers to cause a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11731">CVE-2017-11731</a>
-
- <p>Invalid memory read in the function OpCode (called from isLogicalOp and
- decompileIF) in util/decompile.c in Ming <= 0.4.8, which allows attackers
- to cause a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11734">CVE-2017-11734</a>
-
- <p>Heap-based buffer over-read in the function decompileCALLFUNCTION in
- util/decompile.c in Ming <= 0.4.8, which allows attackers to cause a denial of
- service via a crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.4.4-1.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1133.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1134.data b/english/lts/security/2017/dla-1134.data
deleted file mode 100644
index 5e2b649749c..00000000000
--- a/english/lts/security/2017/dla-1134.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1134-1 sdl-image1.2</define-tag>
-<define-tag report_date>2017-10-16</define-tag>
-<define-tag secrefs>CVE-2017-2887 Bug##878267</define-tag>
-<define-tag packages>sdl-image1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1134.wml b/english/lts/security/2017/dla-1134.wml
deleted file mode 100644
index 58c24daa610..00000000000
--- a/english/lts/security/2017/dla-1134.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a buffer overflow vulnerability in
-sdl-image1.2, an image loading library.</p>
-
-<p>A specially crafted .xcf file could cause a stack-based buffer overflow
-resulting in potential code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in sdl-image1.2 version
-1.2.12-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your sdl-image1.2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1134.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1135.data b/english/lts/security/2017/dla-1135.data
deleted file mode 100644
index b2f80357066..00000000000
--- a/english/lts/security/2017/dla-1135.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1135-1 db</define-tag>
-<define-tag report_date>2017-10-18</define-tag>
-<define-tag secrefs>CVE-2017-10140 Bug#872436</define-tag>
-<define-tag packages>db</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1135.wml b/english/lts/security/2017/dla-1135.wml
deleted file mode 100644
index cb759f3c092..00000000000
--- a/english/lts/security/2017/dla-1135.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the Berkeley DB reads DB_CONFIG from the current
-working directory, leading to information leak by tricking privileged
-processes into reading arbitrary files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1.29-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your db packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1135.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1136.data b/english/lts/security/2017/dla-1136.data
deleted file mode 100644
index 5f434e10371..00000000000
--- a/english/lts/security/2017/dla-1136.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1136-1 db4.8</define-tag>
-<define-tag report_date>2017-10-18</define-tag>
-<define-tag secrefs>CVE-2017-10140 Bug#872436</define-tag>
-<define-tag packages>db4.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1136.wml b/english/lts/security/2017/dla-1136.wml
deleted file mode 100644
index 8d300040024..00000000000
--- a/english/lts/security/2017/dla-1136.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the Berkeley DB reads DB_CONFIG from the current
-working directory, leading to information leak by tricking privileged
-processes into reading arbitrary files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.8.30-12+deb7u1.</p>
-
-<p>We recommend that you upgrade your db4.8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1136.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1137.data b/english/lts/security/2017/dla-1137.data
deleted file mode 100644
index 83ee54db0ca..00000000000
--- a/english/lts/security/2017/dla-1137.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1137-1 db4.7</define-tag>
-<define-tag report_date>2017-10-18</define-tag>
-<define-tag secrefs>CVE-2017-10140 Bug#872436</define-tag>
-<define-tag packages>db4.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1137.wml b/english/lts/security/2017/dla-1137.wml
deleted file mode 100644
index f3051f2a090..00000000000
--- a/english/lts/security/2017/dla-1137.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the Berkeley DB reads DB_CONFIG from the current
-working directory, leading to information leak by tricking privileged
-processes into reading arbitrary files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.7.25-21+deb7u1.</p>
-
-<p>We recommend that you upgrade your db4.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1137.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1138.data b/english/lts/security/2017/dla-1138.data
deleted file mode 100644
index 41e0eb5fe18..00000000000
--- a/english/lts/security/2017/dla-1138.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1138-1 nss</define-tag>
-<define-tag report_date>2017-10-19</define-tag>
-<define-tag secrefs>CVE-2017-7805</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1138.wml b/english/lts/security/2017/dla-1138.wml
deleted file mode 100644
index d37ab255dd6..00000000000
--- a/english/lts/security/2017/dla-1138.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Martin Thomson discovered that nss, the Mozilla Network Security Service
-library, is prone to a use-after-free vulnerability in the TLS 1.2
-implementation when handshake hashes are generated. A remote attacker
-can take advantage of this flaw to cause an application using the nss
-library to crash, resulting in a denial of service, or potentially to
-execute arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.26-1+debu7u5.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1138.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1139.data b/english/lts/security/2017/dla-1139.data
deleted file mode 100644
index 249ff0e8252..00000000000
--- a/english/lts/security/2017/dla-1139.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1139-1 imagemagick</define-tag>
-<define-tag report_date>2017-10-19</define-tag>
-<define-tag secrefs>CVE-2017-15277 CVE-2017-15281 Bug#878578 Bug#878579</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1139.wml b/english/lts/security/2017/dla-1139.wml
deleted file mode 100644
index 4b0ff333e42..00000000000
--- a/english/lts/security/2017/dla-1139.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This update fixes two vulnerabilities in ImageMagick:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15277">CVE-2017-15277</a>
-
- <p>An uninitialized data structure could lead to information disclosure
- when reading a specially crafted GIF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15281">CVE-2017-15281</a>
-
- <p>An uninitialized value used in a conditional jump could cause a
- denial of service (application crash) or other unspecified impacts
- when reading a specially crafted PSD file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u18.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1139.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1140.data b/english/lts/security/2017/dla-1140.data
deleted file mode 100644
index 4ecf0262cdd..00000000000
--- a/english/lts/security/2017/dla-1140.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1140-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-10-19</define-tag>
-<define-tag secrefs>CVE-2017-13737 CVE-2017-15277</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1140.wml b/english/lts/security/2017/dla-1140.wml
deleted file mode 100644
index c39249786e4..00000000000
--- a/english/lts/security/2017/dla-1140.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Immediately after the previous update to graphicsmagick, two more security
-issues were identified. These updates are included here.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13737">CVE-2017-13737</a>
-
- <p>Incorrect rounding up resulted in scrambling the heap beyond the
- allocation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15277">CVE-2017-15277</a>
-
- <p>Left the palette uninitialized when processing a GIF
- file that has neither a global nor local palette.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u11.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1140.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1141.data b/english/lts/security/2017/dla-1141.data
deleted file mode 100644
index 35e488718e3..00000000000
--- a/english/lts/security/2017/dla-1141.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1141-1 mysql-5.5</define-tag>
-<define-tag report_date>2017-10-19</define-tag>
-<define-tag secrefs>CVE-2017-10268 CVE-2017-10378 CVE-2017-10379 CVE-2017-10384 Bug#878402</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1141.wml b/english/lts/security/2017/dla-1141.wml
deleted file mode 100644
index 5fb7fc9516c..00000000000
--- a/english/lts/security/2017/dla-1141.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.58, which includes additional changes, such as performance
-improvements, bug fixes, new features, and possibly incompatible
-changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html"></li>
-<li><a href="http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html">http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.58-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1141.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1142.data b/english/lts/security/2017/dla-1142.data
deleted file mode 100644
index 3f1627b41f1..00000000000
--- a/english/lts/security/2017/dla-1142.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1142-1 libav</define-tag>
-<define-tag report_date>2017-10-21</define-tag>
-<define-tag secrefs>CVE-2015-8365 CVE-2017-7208 CVE-2017-7862 CVE-2017-9992</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1142.wml b/english/lts/security/2017/dla-1142.wml
deleted file mode 100644
index 21e73e3f9a2..00000000000
--- a/english/lts/security/2017/dla-1142.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in libav:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8365">CVE-2015-8365</a>
-
- <p>The smka_decode_frame function in libavcodec/smacker.c does not verify that
- the data size is consistent with the number of channels, which allows remote
- attackers to cause a denial of service (out-of-bounds array access) or
- possibly have unspecified other impact via crafted Smacker data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7208">CVE-2017-7208</a>
-
- <p>The decode_residual function in libavcodec allows remote attackers to cause
- a denial of service (buffer over-read) or obtain sensitive information from
- process memory via a crafted h264 video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7862">CVE-2017-7862</a>
-
- <p>The decode_frame function in libavcodec/pictordec.c is vulnerable to an
- out-of-bounds write caused by a heap-based buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9992">CVE-2017-9992</a>
-
- <p>The decode_dds1 function in libavcodec/dfa.c allows remote attackers to
- cause a denial of service (Heap-based buffer overflow and application crash)
- or possibly have unspecified other impact via a crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6:0.8.21-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1142.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1143.data b/english/lts/security/2017/dla-1143.data
deleted file mode 100644
index ee39c237205..00000000000
--- a/english/lts/security/2017/dla-1143.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1143-1 curl</define-tag>
-<define-tag report_date>2017-10-24</define-tag>
-<define-tag secrefs>CVE-2017-1000257</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1143.wml b/english/lts/security/2017/dla-1143.wml
deleted file mode 100644
index 2d5083b5e3c..00000000000
--- a/english/lts/security/2017/dla-1143.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brian Carpenter, Geeknik Labs, 0xd34db347, and independently reported by
-the OSS-Fuzz project, detected a out of bounds read during IMAP FETCH
-response.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-7.26.0-1+wheezy22.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1143.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1144.data b/english/lts/security/2017/dla-1144.data
deleted file mode 100644
index 1830b91c447..00000000000
--- a/english/lts/security/2017/dla-1144.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1144-1 git-annex</define-tag>
-<define-tag report_date>2017-10-27</define-tag>
-<define-tag secrefs>CVE-2017-12976 Bug#873088</define-tag>
-<define-tag packages>git-annex</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1144.wml b/english/lts/security/2017/dla-1144.wml
deleted file mode 100644
index c6a5a71ea5f..00000000000
--- a/english/lts/security/2017/dla-1144.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>git-annex before 6.20170818 allows remote attackers to execute arbitrary
-commands via an ssh URL with an initial dash character in the hostname,
-as demonstrated by an ssh://-eProxyCommand= URL, a related issue to
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-9800">CVE-2017-9800</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-12836">CVE-2017-12836</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-1000116">CVE-2017-1000116</a>, and
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-1000117">CVE-2017-1000117</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.20120629+deb7u1.</p>
-
-<p>We recommend that you upgrade your git-annex packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1144.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1145.data b/english/lts/security/2017/dla-1145.data
deleted file mode 100644
index dd0eea32241..00000000000
--- a/english/lts/security/2017/dla-1145.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1145-1 zoneminder</define-tag>
-<define-tag report_date>2017-10-26</define-tag>
-<define-tag secrefs>CVE-2017-5595</define-tag>
-<define-tag packages>zoneminder</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1145.wml b/english/lts/security/2017/dla-1145.wml
deleted file mode 100644
index b72dac8eb2d..00000000000
--- a/english/lts/security/2017/dla-1145.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in zoneminder. This update
-fixes only a serious file disclosure vulnerability (<a href="https://security-tracker.debian.org/tracker/CVE-2017-5595">CVE-2017-5595</a>).</p>
-
-<p>The application has been found to suffer from many other problems
-such as SQL injection vulnerabilities, cross-site scripting issues,
-cross-site request forgery, session fixation vulnerability. Due to the
-amount of issues and to the relative invasiveness of the relevant patches,
-those issues will not be fixed in Wheezy. We thus advise you to restrict
-access to zoneminder to trusted users only. If you want to review the
-list of ignored issues, you can check the security tracker:
-<a href="https://security-tracker.debian.org/tracker/source-package/zoneminder">https://security-tracker.debian.org/tracker/source-package/zoneminder</a></p>
-
-<p>We recommend that you upgrade your zoneminder packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in zoneminder version 1.25.0-4+deb7u2</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1145.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1146.data b/english/lts/security/2017/dla-1146.data
deleted file mode 100644
index 993e6260477..00000000000
--- a/english/lts/security/2017/dla-1146.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1146-1 mosquitto</define-tag>
-<define-tag report_date>2017-10-26</define-tag>
-<define-tag secrefs>CVE-2017-9868 Bug#865959</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1146.wml b/english/lts/security/2017/dla-1146.wml
deleted file mode 100644
index e2a7e2dce76..00000000000
--- a/english/lts/security/2017/dla-1146.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>mosquitto's persistence file (mosquitto.db) was created in a
-world-readable way thus allowing local users to obtain sensitive MQTT
-topic information. While the application has been fixed to set
-proper permissions by default, you still have to manually fix
-the permissions on any existing file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.15-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1146.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1147.data b/english/lts/security/2017/dla-1147.data
deleted file mode 100644
index 9b12fc40aed..00000000000
--- a/english/lts/security/2017/dla-1147.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1147-1 exiv2</define-tag>
-<define-tag report_date>2017-10-26</define-tag>
-<define-tag secrefs>CVE-2017-11591 CVE-2017-11683 CVE-2017-14859 CVE-2017-14862 CVE-2017-14864 Bug#876893</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1147.wml b/english/lts/security/2017/dla-1147.wml
deleted file mode 100644
index 573448cbc37..00000000000
--- a/english/lts/security/2017/dla-1147.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The exiv2 library is vulnerable to multiple issues that can all lead
-to denial of service of the applications relying on the library to parse
-images' metadata.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11591">CVE-2017-11591</a>
-
- <p>Denial of service via floating point exception in
- the Exiv2::ValueType function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11683">CVE-2017-11683</a>
-
- <p>Denial of service through failing assertion triggered by
- crafted image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14859">CVE-2017-14859</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-14862">CVE-2017-14862</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-14864">CVE-2017-14864</a>
-
- <p>Denial of service through invalid memory access triggered by a crafted
- image.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.23-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1147.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1148.data b/english/lts/security/2017/dla-1148.data
deleted file mode 100644
index 6d01c1a4041..00000000000
--- a/english/lts/security/2017/dla-1148.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1148-1 golang</define-tag>
-<define-tag report_date>2017-10-27</define-tag>
-<define-tag secrefs>CVE-2017-15041</define-tag>
-<define-tag packages>golang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1148.wml b/english/lts/security/2017/dla-1148.wml
deleted file mode 100644
index 611a60ec8e6..00000000000
--- a/english/lts/security/2017/dla-1148.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Go before 1.8.4 and 1.9.x before 1.9.1 allows <q>go get</q> remote command
-execution. Using custom domains, it is possible to arrange things so
-that example.com/pkg1 points to a Subversion repository but
-example.com/pkg1/pkg2 points to a Git repository. If the Subversion
-repository includes a Git checkout in its pkg2 directory and some
-other work is done to ensure the proper ordering of operations, <q>go
-get</q> can be tricked into reusing this Git checkout for the fetch of
-code from pkg2. If the Subversion repository's Git checkout has
-malicious commands in .git/hooks/, they will execute on the system
-running "go get."</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.0.2-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your golang packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1148.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1149.data b/english/lts/security/2017/dla-1149.data
deleted file mode 100644
index 6b078e2f48c..00000000000
--- a/english/lts/security/2017/dla-1149.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1149-1 wget</define-tag>
-<define-tag report_date>2017-10-27</define-tag>
-<define-tag secrefs>CVE-2017-13089 CVE-2017-13090</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1149.wml b/english/lts/security/2017/dla-1149.wml
deleted file mode 100644
index f3f8383eeef..00000000000
--- a/english/lts/security/2017/dla-1149.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13089">CVE-2017-13089</a>
-
- <p>Fix stack overflow in HTTP protocol handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13090">CVE-2017-13090</a>
-
- <p>Fix heap overflow in HTTP protocol handling.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.13.4-3+deb7u5.</p>
-
-<p>We recommend that you upgrade your wget packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1149.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1150.data b/english/lts/security/2017/dla-1150.data
deleted file mode 100644
index 2989ce384c5..00000000000
--- a/english/lts/security/2017/dla-1150.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1150-1 wpa</define-tag>
-<define-tag report_date>2017-10-31</define-tag>
-<define-tag secrefs>CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-1308 CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-1308 CVE-2017-13088</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1150.wml b/english/lts/security/2017/dla-1150.wml
deleted file mode 100644
index 02622d8e50d..00000000000
--- a/english/lts/security/2017/dla-1150.wml
+++ /dev/null
@@ -1,84 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in how WPA code can be triggered to
-reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific
-frame that is used to manage the keys. Such reinstallation of the
-encryption key can result in two different types of vulnerabilities:
-disabling replay protection and significantly reducing the security of
-encryption to the point of allowing frames to be decrypted or some parts
-of the keys to be determined by an attacker depending on which cipher is
-used.</p>
-
-<p>Those issues are commonly known under the <q>KRACK</q> appelation. According
-to US-CERT, "the impact of exploiting these vulnerabilities includes
-decryption, packet replay, TCP connection hijacking, HTTP content
-injection, and others."</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13077">CVE-2017-13077</a>
-
- <p>Reinstallation of the pairwise encryption key (PTK-TK) in the
- 4-way handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13078">CVE-2017-13078</a>
-
- <p>Reinstallation of the group key (GTK) in the 4-way handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13079">CVE-2017-13079</a>
-
- <p>Reinstallation of the integrity group key (IGTK) in the 4-way
- handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13080">CVE-2017-13080</a>
-
- <p>Reinstallation of the group key (GTK) in the group key handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13081">CVE-2017-13081</a>
-
- <p>Reinstallation of the integrity group key (IGTK) in the group key
- handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13082">CVE-2017-13082</a>
-
- <p>Accepting a retransmitted Fast BSS Transition (FT) Reassociation
- Request and reinstalling the pairwise encryption key (PTK-TK)
- while processing it.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13084">CVE-2017-13084</a>
-
- <p>Reinstallation of the STK key in the PeerKey handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13086">CVE-2017-13086</a>
-
- <p>reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey
- (TPK) key in the TDLS handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13087">CVE-2017-13087</a>
-
- <p>reinstallation of the group key (GTK) when processing a Wireless
- Network Management (WNM) Sleep Mode Response frame.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13088">CVE-2017-13088</a>
-
- <p>reinstallation of the integrity group key (IGTK) when processing a
- Wireless Network Management (WNM) Sleep Mode Response frame.</p>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0-3+deb7u5. Note that the latter two vulnerabilities (<a href="https://security-tracker.debian.org/tracker/CVE-2017-13087">CVE-2017-13087</a>
-and <a href="https://security-tracker.debian.org/tracker/CVE-2017-13088">CVE-2017-13088</a>) were mistakenly marked as fixed in the changelog
-whereas they simply did not apply to the 1.0 version of the WPA source
-code, which doesn't implement WNM sleep mode responses.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1150.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1151-2.data b/english/lts/security/2017/dla-1151-2.data
deleted file mode 100644
index b0d2779c523..00000000000
--- a/english/lts/security/2017/dla-1151-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1151-2 wordpress</define-tag>
-<define-tag report_date>2017-11-12</define-tag>
-<define-tag secrefs>Bug#881088</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1151-2.wml b/english/lts/security/2017/dla-1151-2.wml
deleted file mode 100644
index de8d5655bc5..00000000000
--- a/english/lts/security/2017/dla-1151-2.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-14990">CVE-2017-14990</a> issued as DLA-1151-1 was incomplete and
-caused a regression. It was discovered that an additional database
-upgrade and further code changes would be necessary. At the moment
-these changes are deemed as too intrusive and thus the initial patch
-for <a href="https://security-tracker.debian.org/tracker/CVE-2017-14990">CVE-2017-14990</a> has been removed again. For reference, the original
-advisory text follows.</p>
-
-<p>WordPress stores cleartext wp_signups.activation_key values (but
-stores the analogous wp_users.user_activation_key values as hashes),
-which might make it easier for remote attackers to hijack unactivated
-user accounts by leveraging database read access (such as access
-gained through an unspecified SQL injection vulnerability).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u19.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1151-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1151.data b/english/lts/security/2017/dla-1151.data
deleted file mode 100644
index d21eb4410ae..00000000000
--- a/english/lts/security/2017/dla-1151.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1151-1 wordpress</define-tag>
-<define-tag report_date>2017-10-31</define-tag>
-<define-tag secrefs>CVE-2016-9263 CVE-2017-14718 CVE-2017-14719 CVE-2017-14720 CVE-2017-14721 CVE-2017-14722 CVE-2017-14723 CVE-2017-14725 CVE-2017-14990 Bug#876274 Bug#877629</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1151.wml b/english/lts/security/2017/dla-1151.wml
deleted file mode 100644
index 1d1ec1b9aab..00000000000
--- a/english/lts/security/2017/dla-1151.wml
+++ /dev/null
@@ -1,78 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9263">CVE-2016-9263</a>
-
- <p>When domain-based flashmediaelement.swf sandboxing is not used,
- allows remote attackers to conduct cross-domain Flash injection
- (XSF) attacks by leveraging code contained within the
- wp-includes/js/mediaelement/flashmediaelement.swf file.</p>
-
- <p>This issue was resolved by completely removing
- flashmediaelement.swf.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14718">CVE-2017-14718</a>
-
- <p>WordPress was susceptible to a Cross-Site Scripting attack in the
- link modal via a javascript: or data: URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14719">CVE-2017-14719</a>
-
- <p>WordPress was vulnerable to a directory traversal attack during
- unzip operations in the ZipArchive and PclZip components.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14720">CVE-2017-14720</a>
-
- <p>WordPress allowed a Cross-Site scripting attack in the template list
- view via a crafted template name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14721">CVE-2017-14721</a>
-
- <p>WordPress allowed Cross-Site scripting in the plugin editor via a
- crafted plugin name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14722">CVE-2017-14722</a>
-
- <p>WordPress allowed a Directory Traversal attack in the Customizer
- component via a crafted theme filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14723">CVE-2017-14723</a>
-
- <p>WordPress mishandled % characters and additional placeholder values
- in $wpdb->prepare, and thus did not properly address the possibility
- of plugins and themes enabling SQL injection attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14725">CVE-2017-14725</a>
-
- <p>WordPress was susceptible to an open redirect attack in
- wp-admin/user-edit.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14990">CVE-2017-14990</a>
-
- <p>WordPress stores cleartext wp_signups.activation_key values (but
- stores the analogous wp_users.user_activation_key values as hashes),
- which might make it easier for remote attackers to hijack
- unactivated user accounts by leveraging database read access
- (such as access gained through an unspecified SQL injection
- vulnerability).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u17.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1151.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1152.data b/english/lts/security/2017/dla-1152.data
deleted file mode 100644
index 39552b19813..00000000000
--- a/english/lts/security/2017/dla-1152.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1152-1 quagga</define-tag>
-<define-tag report_date>2017-10-31</define-tag>
-<define-tag secrefs>CVE-2017-16227 Bug#879474</define-tag>
-<define-tag packages>quagga</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1152.wml b/english/lts/security/2017/dla-1152.wml
deleted file mode 100644
index 7b74645d2ec..00000000000
--- a/english/lts/security/2017/dla-1152.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the bgpd daemon in the Quagga routing suite
-does not properly calculate the length of multi-segment AS_PATH UPDATE
-messages, causing bgpd to drop a session and potentially resulting in
-loss of network connectivity.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-quagga_0.99.22.4-1+wheezy3+deb7u2.</p>
-
-<p>We recommend that you upgrade your quagga packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1152.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1153.data b/english/lts/security/2017/dla-1153.data
deleted file mode 100644
index b1ce7465faf..00000000000
--- a/english/lts/security/2017/dla-1153.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1153-1 thunderbird</define-tag>
-<define-tag report_date>2017-11-1</define-tag>
-<define-tag secrefs>CVE-2017-7793 CVE-2017-7805 CVE-2017-7810 CVE-2017-7814 CVE-2017-7818 CVE-2017-7819 CVE-2017-7823 CVE-2017-7824 CVE-2017-7825</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1153.wml b/english/lts/security/2017/dla-1153.wml
deleted file mode 100644
index c3e82e08f27..00000000000
--- a/english/lts/security/2017/dla-1153.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to crashes or the execution of arbitrary
-code.</p>
-
-<p>With this update the source package name changes from icedove to
-thunderbird so icedove will not be mentioned anymore in future
-advisories.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.4.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1153.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1154.data b/english/lts/security/2017/dla-1154.data
deleted file mode 100644
index c7bb170d40e..00000000000
--- a/english/lts/security/2017/dla-1154.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1154-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-10-31</define-tag>
-<define-tag secrefs>CVE-2017-14103 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733 CVE-2017-14994 CVE-2017-14997 CVE-2017-15930 Bug#879999</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1154.wml b/english/lts/security/2017/dla-1154.wml
deleted file mode 100644
index b41a60871e0..00000000000
--- a/english/lts/security/2017/dla-1154.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in graphicsmagick.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14103">CVE-2017-14103</a>
-
- <p>The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in
- GraphicsMagick 1.3.26 do not properly manage image pointers after
- certain error conditions, which allows remote attackers to conduct
- use-after-free attacks via a crafted file, related to a
- ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability
- exists because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-11403">CVE-2017-11403</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14314">CVE-2017-14314</a>
-
- <p>Off-by-one error in the DrawImage function in magick/render.c in
- GraphicsMagick 1.3.26 allows remote attackers to cause a denial of
- service (DrawDashPolygon heap-based buffer over-read and
- application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14504">CVE-2017-14504</a>
-
- <p>ReadPNMImage in coders/pnm.c in GraphicsMagick 1.3.26 does not
- ensure the correct number of colors for the XV 332 format, leading
- to a NULL Pointer Dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14733">CVE-2017-14733</a>
-
- <p>ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles
- RLE headers that specify too few colors, which allows remote
- attackers to cause a denial of service (heap-based buffer
- over-read and application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14994">CVE-2017-14994</a>
-
- <p>ReadDCMImage in coders/dcm.c in GraphicsMagick 1.3.26 allows
- remote attackers to cause a denial of service (NULL pointer
- dereference) via a crafted DICOM image, related to the ability of
- DCM_ReadNonNativeImages to yield an image list with zero frames.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14997">CVE-2017-14997</a>
-
- <p>GraphicsMagick 1.3.26 allows remote attackers to cause a denial of
- service (excessive memory allocation) because of an integer
- underflow in ReadPICTImage in coders/pict.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15930">CVE-2017-15930</a>
-
- <p>In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a
- Null Pointer Dereference occurs while transferring JPEG scanlines,
- related to a PixelPacket pointer.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, <a href="https://security-tracker.debian.org/tracker/CVE-2017-15930">CVE-2017-15930</a> has been fixed in version
-1.3.16-1.1+deb7u12. The other security issues were fixed in
-1.3.16-1.1+deb7u10 on 10 Oct 2017 in DLA-1130-1 but that announcement
-was never sent out so this advisory also contains the notice about
-those vulnerabilities.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1154.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1155.data b/english/lts/security/2017/dla-1155.data
deleted file mode 100644
index 875661e6682..00000000000
--- a/english/lts/security/2017/dla-1155.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1155-1 tzdata</define-tag>
-<define-tag report_date>2017-10-31</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1155.wml b/english/lts/security/2017/dla-1155.wml
deleted file mode 100644
index 1f6c5648233..00000000000
--- a/english/lts/security/2017/dla-1155.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2017b. Notable
-changes are:
-
-<ul>
-<li>Northern Cyprus resumed EU rules starting 2017-10-29.</li>
-<li>Namibia will switch from +01 with DST to +02 all year, affecting
- UT offsets starting 2018-04-01.</li>
-<li>Sudan will switch from +03 to +02 on 2017-11-01.</li>
-<li>Tonga will not observe DST on 2017-11-05.</li>
-<li>Turks &amp; Caicos will switch from -04 all year to -05 with US DST,
- affecting UT offset starting 2018-11-04.</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2017c-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1155.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1156.data b/english/lts/security/2017/dla-1156.data
deleted file mode 100644
index 1b7760958ff..00000000000
--- a/english/lts/security/2017/dla-1156.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1156-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2017-10-31</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1156.wml b/english/lts/security/2017/dla-1156.wml
deleted file mode 100644
index a6170ec7dff..00000000000
--- a/english/lts/security/2017/dla-1156.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2017c for the
-Perl bindings. For the list of changes, see DLA-1156-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2017c.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1156.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1157.data b/english/lts/security/2017/dla-1157.data
deleted file mode 100644
index 9538d7914ac..00000000000
--- a/english/lts/security/2017/dla-1157.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1157-1 openssl</define-tag>
-<define-tag report_date>2017-11-9</define-tag>
-<define-tag secrefs>CVE-2017-3735</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1157.wml b/english/lts/security/2017/dla-1157.wml
deleted file mode 100644
index 2bb68fbab51..00000000000
--- a/english/lts/security/2017/dla-1157.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in OpenSSL, the Secure Sockets
-Layer toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3735">CVE-2017-3735</a>
-
- <p>It was discovered that OpenSSL is prone to a one-byte buffer
- overread while parsing a malformed IPAddressFamily extension in an
- X.509 certificate.</p>
-
- <p>Details can be found in the upstream advisory:
- <a href="https://www.openssl.org/news/secadv/20170828.txt">https://www.openssl.org/news/secadv/20170828.txt</a></p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.1t-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1157.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1158.data b/english/lts/security/2017/dla-1158.data
deleted file mode 100644
index 2a5b2ed266f..00000000000
--- a/english/lts/security/2017/dla-1158.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1158-1 bchunk</define-tag>
-<define-tag report_date>2017-11-2</define-tag>
-<define-tag secrefs>CVE-2017-15953 CVE-2017-15954 CVE-2017-15955 Bug#880116</define-tag>
-<define-tag packages>bchunk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1158.wml b/english/lts/security/2017/dla-1158.wml
deleted file mode 100644
index c8cec454094..00000000000
--- a/english/lts/security/2017/dla-1158.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in bchunk, a tool to convert a
-CD image in .bin/.cue format into a set of .iso and .cdr/.wav tracks.
-It was possible to trigger a heap-based buffer overflow with an
-resultant invalid free when processing a malformed CUE (.cue) file
-that may lead to the execution of arbitrary code or a application crash.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.0-12+deb7u1.</p>
-
-<p>We recommend that you upgrade your bchunk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1158.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1159.data b/english/lts/security/2017/dla-1159.data
deleted file mode 100644
index 79a9ba5affa..00000000000
--- a/english/lts/security/2017/dla-1159.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1159-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-11-3</define-tag>
-<define-tag secrefs>CVE-2017-16352 CVE-2017-16353</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1159.wml b/english/lts/security/2017/dla-1159.wml
deleted file mode 100644
index c23601aa3ea..00000000000
--- a/english/lts/security/2017/dla-1159.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Maor Shwartz, Jeremy Heng and Terry Chia discovered two security
-vulnerabilities in Graphicsmagick, a collection of image processing tool
-s.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16352">CVE-2017-16352</a>
-
- <p>Graphicsmagick was vulnerable to a heap-based buffer
- overflow vulnerability found in the <q>Display visual image directory</q>
- feature of the DescribeImage() function of the magick/describe.c
- file. One possible way to trigger the vulnerability is to run the
- identify command on a specially crafted MIFF format file with the
- verbose flag.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16353">CVE-2017-16353</a>
-
- <p>Graphicsmagick was vulnerable to a memory information disclosure
- vulnerability found in the DescribeImage function of the
- magick/describe.c file, because of a heap-based buffer over-read. The
- portion of the code containing the vulnerability is responsible for
- printing the IPTC Profile information contained in the image. This
- vulnerability can be triggered with a specially crafted MIFF file.
- There is an out-of-bounds buffer dereference because certain
- increments are never checked.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u13.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1159.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1160.data b/english/lts/security/2017/dla-1160.data
deleted file mode 100644
index cb4d157bf1b..00000000000
--- a/english/lts/security/2017/dla-1160.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1160-1 wordpress</define-tag>
-<define-tag report_date>2017-11-4</define-tag>
-<define-tag secrefs>CVE-2017-16510 Bug#880528</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1160.wml b/english/lts/security/2017/dla-1160.wml
deleted file mode 100644
index 72c5c934c67..00000000000
--- a/english/lts/security/2017/dla-1160.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>WordPress, a web blogging tool, was affected by an issue where
-$wpdb->prepare() can create unexpected and unsafe queries leading to
-potential SQL injection (SQLi) in plugins and themes, as demonstrated
-by a <q>double prepare</q> approach, a different vulnerability than
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-14723">CVE-2017-14723</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u18.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1160.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1161.data b/english/lts/security/2017/dla-1161.data
deleted file mode 100644
index 0f8821dc159..00000000000
--- a/english/lts/security/2017/dla-1161.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1161-1 redis</define-tag>
-<define-tag report_date>2017-11-5</define-tag>
-<define-tag secrefs>CVE-2016-1051</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1161.wml b/english/lts/security/2017/dla-1161.wml
deleted file mode 100644
index 469d31cf51b..00000000000
--- a/english/lts/security/2017/dla-1161.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a <q>Cross Protocol Scripting</q> attack in
-the Redis key-value database.</p>
-
-<p>"POST" and "Host:" command strings (which are not valid in the Redis
-protocol) were not immediately rejected when an attacker makes HTTP
-request to the Redis TCP port.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in redis version
-2:2.4.14-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1161.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1162.data b/english/lts/security/2017/dla-1162.data
deleted file mode 100644
index f3a93e2dc9b..00000000000
--- a/english/lts/security/2017/dla-1162.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1162-1 apr</define-tag>
-<define-tag report_date>2017-11-6</define-tag>
-<define-tag secrefs>CVE-2017-12613 Bug##879708</define-tag>
-<define-tag packages>apr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1162.wml b/english/lts/security/2017/dla-1162.wml
deleted file mode 100644
index 262777a62eb..00000000000
--- a/english/lts/security/2017/dla-1162.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an out-of-bounds memory vulnerability
-in apr, a support/portability library for various applications.</p>
-
-<p>When the apr_exp_time*() or apr_os_exp_time*() functions were invoked
-with an invalid month field value, out of bounds memory may have been be
-accessed when converting this value to an apr_time_exp_t value. This
-could have potentially revealed the contents of a different static heap
-value or resulted in program termination.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in apr version
-1.4.6-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your apr packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1162.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1163.data b/english/lts/security/2017/dla-1163.data
deleted file mode 100644
index 93ef69acb75..00000000000
--- a/english/lts/security/2017/dla-1163.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1163-1 apr-util</define-tag>
-<define-tag report_date>2017-11-6</define-tag>
-<define-tag secrefs>CVE-2017-12618 Bug##879996</define-tag>
-<define-tag packages>apr-util</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1163.wml b/english/lts/security/2017/dla-1163.wml
deleted file mode 100644
index 6f31ba88fc6..00000000000
--- a/english/lts/security/2017/dla-1163.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an out-of-bounds read access in
-apr-util, a support/portability library used by many applications.</p>
-
-<p>A local user with write access to the database could have made a process
-using these functions crash and thus cause a denial-of-service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in apr-util version
-1.4.1-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your apr-util packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1163.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1164.data b/english/lts/security/2017/dla-1164.data
deleted file mode 100644
index 3ff070854c8..00000000000
--- a/english/lts/security/2017/dla-1164.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1164-1 mupdf</define-tag>
-<define-tag report_date>2017-11-7</define-tag>
-<define-tag secrefs>CVE-2017-14687 CVE-2017-15587 Bug#877379 Bug#879055</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1164.wml b/english/lts/security/2017/dla-1164.wml
deleted file mode 100644
index a33c584d154..00000000000
--- a/english/lts/security/2017/dla-1164.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were discovered in mupdf, a lightweight PDF viewer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14687">CVE-2017-14687</a>
-
- <p>MuPDF allows attackers to cause a denial of service or possibly have
- unspecified other impact via a crafted .xps file. This occurs
- because of mishandling of XML tag name comparisons.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15587">CVE-2017-15587</a>
-
- <p>An integer overflow was discovered in pdf_read_new_xref_section in
- pdf/pdf-xref.c</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9-2+deb7u4.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1164.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1165.data b/english/lts/security/2017/dla-1165.data
deleted file mode 100644
index 7c9df00c722..00000000000
--- a/english/lts/security/2017/dla-1165.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1165-1 libpam4j</define-tag>
-<define-tag report_date>2017-11-7</define-tag>
-<define-tag secrefs>CVE-2017-12197 Bug#879001</define-tag>
-<define-tag packages>libpam4j</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1165.wml b/english/lts/security/2017/dla-1165.wml
deleted file mode 100644
index 724ab350758..00000000000
--- a/english/lts/security/2017/dla-1165.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libpam4j, a Java binding for libpam.so, does
-not call pam_acct_mgmt(). As a consequence, the PAM account is not
-properly
-verified. Any user with a valid password but with deactivated or
-disabled account was able to log in.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libpam4j packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1165.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1166-2.data b/english/lts/security/2017/dla-1166-2.data
deleted file mode 100644
index a92d71caf30..00000000000
--- a/english/lts/security/2017/dla-1166-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1166-2 tomcat7</define-tag>
-<define-tag report_date>2017-11-10</define-tag>
-<define-tag secrefs>Bug#881162</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1166-2.wml b/english/lts/security/2017/dla-1166-2.wml
deleted file mode 100644
index 6fa7ac5a96b..00000000000
--- a/english/lts/security/2017/dla-1166-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update for tomcat7 issued as DLA-1166-1 caused a regressions whereby every
-request, including for the root document (/), returned HTTP status 404. Updated
-packages are now available to address this problem. For reference, the original
-advisory text follows.</p>
-
- <p>When HTTP PUT was enabled (e.g., via setting the readonly initialization
- parameter of the Default servlet to false) it was possible to upload a JSP
- file to the server via a specially crafted request. This JSP could then be
- requested and any code it contained would be executed by the server.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u17.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1166-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1166.data b/english/lts/security/2017/dla-1166.data
deleted file mode 100644
index a87a713ff41..00000000000
--- a/english/lts/security/2017/dla-1166.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1166-1 tomcat7</define-tag>
-<define-tag report_date>2017-11-7</define-tag>
-<define-tag secrefs>CVE-2017-12617</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1166.wml b/english/lts/security/2017/dla-1166.wml
deleted file mode 100644
index 1b8301467bc..00000000000
--- a/english/lts/security/2017/dla-1166.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A remote code execution vulnerability has been discovered in tomcat7.</p>
-
-<p>When HTTP PUT was enabled (e.g., via setting the readonly initialization
-parameter of the Default servlet to false) it was possible to upload a JSP
-file to the server via a specially crafted request. This JSP could then be
-requested and any code it contained would be executed by the server.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u16.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1166.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1167.data b/english/lts/security/2017/dla-1167.data
deleted file mode 100644
index 6adcffc956a..00000000000
--- a/english/lts/security/2017/dla-1167.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1167-1 ruby-yajl</define-tag>
-<define-tag report_date>2017-11-8</define-tag>
-<define-tag secrefs>CVE-2017-16516 Bug#880691</define-tag>
-<define-tag packages>ruby-yajl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1167.wml b/english/lts/security/2017/dla-1167.wml
deleted file mode 100644
index 99ae77387fe..00000000000
--- a/english/lts/security/2017/dla-1167.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in ruby-yajl, an interface to Yajl, a JSON
-stream-based parser library. When a crafted JSON file is supplied to
-Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT
-in the yajl_string_decode function in yajl_encode.c. This may result
-in a denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.0-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your ruby-yajl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1167.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1168.data b/english/lts/security/2017/dla-1168.data
deleted file mode 100644
index 86b20dbf19e..00000000000
--- a/english/lts/security/2017/dla-1168.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1168-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-11-10</define-tag>
-<define-tag secrefs>CVE-2017-16669</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1168.wml b/english/lts/security/2017/dla-1168.wml
deleted file mode 100644
index f27f23bd986..00000000000
--- a/english/lts/security/2017/dla-1168.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A remote denial of service vulnerability has been discovered in
-graphicsmagick, a collection of image processing tools and associated
-libraries.</p>
-
-<p>A specially crafted file can be used to produce a heap-based buffer
-overflow and application crash by exploiting a defect in the
-AcquireCacheNexus function in magick/pixel_cache.c.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u14.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.
-<p><b>Note</b>: The previous graphicsmagick package inadvertently introduced a
-dependency on liblcms2-2. This version of the package returns to using
-liblcms1. If your system does not otherwise require liblcms2-2, you
-may want to consider removing it following the graphicsmagick upgrade.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1168.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1169.data b/english/lts/security/2017/dla-1169.data
deleted file mode 100644
index d98ae377d0c..00000000000
--- a/english/lts/security/2017/dla-1169.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1169-1 postgresql-common</define-tag>
-<define-tag report_date>2017-11-11</define-tag>
-<define-tag packages>postgresql-common</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1169.wml b/english/lts/security/2017/dla-1169.wml
deleted file mode 100644
index 84f7fa35255..00000000000
--- a/english/lts/security/2017/dla-1169.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability has been found in postgresql-common, Debian's
-PostgreSQL database cluster management tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8806">CVE-2017-8806</a>
-
- <p>It was discovered that the pg_ctlcluster, pg_createcluster and
- pg_upgradecluster commands handled symbolic links insecurely which
- could result in local denial of service by overwriting arbitrary
- files.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-134wheezy6.</p>
-
-<p>We recommend that you upgrade your postgresql-common packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1169.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1170.data b/english/lts/security/2017/dla-1170.data
deleted file mode 100644
index 51f58ecd0fb..00000000000
--- a/english/lts/security/2017/dla-1170.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1170-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-11-14</define-tag>
-<define-tag secrefs>CVE-2017-13134 CVE-2017-16547 Bug#881524</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1170.wml b/english/lts/security/2017/dla-1170.wml
deleted file mode 100644
index b9d75ba6eb0..00000000000
--- a/english/lts/security/2017/dla-1170.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Security vulnerabilities have been identified in graphicsmagick, a
-collection of image processing utilities and libraries.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13134">CVE-2017-13134</a>
-
- <p>Graphicsmagick was vulnerable to a heap-based buffer over-read and
- denial of service via a crafted SFW file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16547">CVE-2017-16547</a>
-
- <p>Graphicsmagick was vulnerable to a remote denial of service
- (application crash) or possible unspecified other impact via a
- crafted file resulting from a defective memory allocation.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u15.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1170.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1171.data b/english/lts/security/2017/dla-1171.data
deleted file mode 100644
index b6a560e11b1..00000000000
--- a/english/lts/security/2017/dla-1171.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1171-1 libxml-libxml-perl</define-tag>
-<define-tag report_date>2017-11-14</define-tag>
-<define-tag secrefs>CVE-2017-10672 Bug#866676</define-tag>
-<define-tag packages>libxml-libxml-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1171.wml b/english/lts/security/2017/dla-1171.wml
deleted file mode 100644
index 7bac6abdbac..00000000000
--- a/english/lts/security/2017/dla-1171.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The XML::LibXML perl module is affected by a "use-after-free"
-vulnerability which allows remote attackers to execute arbitrary code by
-controlling the arguments to a replaceChild() call.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0001+dfsg-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxml-libxml-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1171.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1172.data b/english/lts/security/2017/dla-1172.data
deleted file mode 100644
index 507edf9185a..00000000000
--- a/english/lts/security/2017/dla-1172.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1172-1 firefox-esr</define-tag>
-<define-tag report_date>2017-11-15</define-tag>
-<define-tag secrefs>CVE-2017-7826 CVE-2017-7828 CVE-2017-7830</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1172.wml b/english/lts/security/2017/dla-1172.wml
deleted file mode 100644
index bb10a68031e..00000000000
--- a/english/lts/security/2017/dla-1172.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees and other
-implementation errors may lead to the execution of arbitrary code, denial
-of service or bypass of the same origin policy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.5.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1172.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1173.data b/english/lts/security/2017/dla-1173.data
deleted file mode 100644
index 31e27db951b..00000000000
--- a/english/lts/security/2017/dla-1173.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1173-1 procmail</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-16844 Bug##876511</define-tag>
-<define-tag packages>procmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1173.wml b/english/lts/security/2017/dla-1173.wml
deleted file mode 100644
index c4d0c7960c7..00000000000
--- a/english/lts/security/2017/dla-1173.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a heap-based buffer overflow in procmail, a
-tool used to sort incoming mail into various directories and filter out spam
-messages.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in procmail version
-3.22-20+deb7u2.</p>
-
-<p>We recommend that you upgrade your procmail packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1173.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1174.data b/english/lts/security/2017/dla-1174.data
deleted file mode 100644
index c1ab93f8e38..00000000000
--- a/english/lts/security/2017/dla-1174.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1174-1 konversation</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-15923 Bug##881586</define-tag>
-<define-tag packages>konversation</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1174.wml b/english/lts/security/2017/dla-1174.wml
deleted file mode 100644
index 74d2b4d9be1..00000000000
--- a/english/lts/security/2017/dla-1174.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service vulnerability in the
-konversation IRC client related to parsing of color formatting codes.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in konversation version
-1.4-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your konversation packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1174.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1175.data b/english/lts/security/2017/dla-1175.data
deleted file mode 100644
index 1b1e1a61e50..00000000000
--- a/english/lts/security/2017/dla-1175.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1175-1 lynx-cur</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-1000211</define-tag>
-<define-tag packages>lynx-cur</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1175.wml b/english/lts/security/2017/dla-1175.wml
deleted file mode 100644
index af20203903e..00000000000
--- a/english/lts/security/2017/dla-1175.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after-free vulnerability in the
-HTML parser of lynx-cur, a terminal-based web browser. This could have
-led to memory/information disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in lynx-cur version
-2.8.8dev.12-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your lynx-cur packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1175.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1176.data b/english/lts/security/2017/dla-1176.data
deleted file mode 100644
index 7867023e0ee..00000000000
--- a/english/lts/security/2017/dla-1176.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1176-1 ming</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-9988 CVE-2017-9989 CVE-2017-11733</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1176.wml b/english/lts/security/2017/dla-1176.wml
deleted file mode 100644
index b308d59dc8b..00000000000
--- a/english/lts/security/2017/dla-1176.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Ming:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9988">CVE-2017-9988</a>
-
- <p>NULL pointer dereference in the readEncUInt30 function (util/read.c)
- in Ming <= 0.4.8, which allows attackers to cause a denial of service
- via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9989">CVE-2017-9989</a>
-
- <p>NULL pointer dereference in the outputABC_STRING_INFO function
- (util/outputtxt.c) in Ming <= 0.4.8, which allows attackers to cause
- a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11733">CVE-2017-11733</a>
-
- <p>NULL pointer dereference in the stackswap function (util/decompile.c)
- in Ming <= 0.4.8, which allows attackers to cause a denial of service
- via a crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.4.4-1.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1176.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1177.data b/english/lts/security/2017/dla-1177.data
deleted file mode 100644
index df7fbb0e381..00000000000
--- a/english/lts/security/2017/dla-1177.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1177-1 poppler</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-14975 CVE-2017-14976 CVE-2017-14977 CVE-2017-15565 Bug#879066 Bug#877952 Bug#877954 Bug#877957</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1177.wml b/english/lts/security/2017/dla-1177.wml
deleted file mode 100644
index 850db499ea4..00000000000
--- a/english/lts/security/2017/dla-1177.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that poppler, a PDF rendering library, was affected
-by several denial-of-service (application crash), null pointer
-dereferences and heap-based buffer over-read bugs:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14975">CVE-2017-14975</a>
-
- <p>The FoFiType1C::convertToType0 function in FoFiType1C.cc
- has a NULL pointer dereference vulnerability because a data structure
- is not initialized, which allows an attacker to launch a denial of
- service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14976">CVE-2017-14976</a>
-
- <p>The FoFiType1C::convertToType0 function in FoFiType1C.cc
- has a heap-based buffer over-read vulnerability if an out-of-bounds
- font dictionary index is encountered, which allows an attacker to
- launch a denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14977">CVE-2017-14977</a>
-
- <p>The FoFiTrueType::getCFFBlock function in FoFiTrueType.cc
- has a NULL pointer dereference vulnerability due to lack of validation
- of a table pointer, which allows an attacker to launch a denial of
- service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15565">CVE-2017-15565</a>
-
- <p>NULL Pointer Dereference exists in the GfxImageColorMap::getGrayLine()
- function in GfxState.cc via a crafted PDF document.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.18.4-6+deb7u4.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1177.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1178.data b/english/lts/security/2017/dla-1178.data
deleted file mode 100644
index 083944b4f64..00000000000
--- a/english/lts/security/2017/dla-1178.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1178-1 opensaml2</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-16853 Bug#881856</define-tag>
-<define-tag packages>opensaml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1178.wml b/english/lts/security/2017/dla-1178.wml
deleted file mode 100644
index 9534df05ef7..00000000000
--- a/english/lts/security/2017/dla-1178.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Rod Widdowson of Steading System Software LLP discovered a coding error
-in the OpenSAML library, causing the DynamicMetadataProvider class to
-fail configuring itself with the filters provided and omitting whatever
-checks they are intended to perform.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4.3-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your opensaml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1178.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1179.data b/english/lts/security/2017/dla-1179.data
deleted file mode 100644
index 8e4450109e3..00000000000
--- a/english/lts/security/2017/dla-1179.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1179-1 shibboleth-sp2</define-tag>
-<define-tag report_date>2017-11-18</define-tag>
-<define-tag secrefs>CVE-2017-16852 Bug#881857</define-tag>
-<define-tag packages>shibboleth-sp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1179.wml b/english/lts/security/2017/dla-1179.wml
deleted file mode 100644
index 69bfdd1cc8a..00000000000
--- a/english/lts/security/2017/dla-1179.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Rod Widdowson of Steading System Software LLP discovered a coding error
-in the <q>Dynamic</q> metadata plugin of the Shibboleth Service Provider,
-causing the plugin to fail configuring itself with the filters provided
-and omitting whatever checks they are intended to perform.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4.3+dfsg-5+deb7u2.</p>
-
-<p>We recommend that you upgrade your shibboleth-sp2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1179.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1180.data b/english/lts/security/2017/dla-1180.data
deleted file mode 100644
index 4e654639ec4..00000000000
--- a/english/lts/security/2017/dla-1180.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1180-1 libspring-ldap-java</define-tag>
-<define-tag report_date>2017-11-19</define-tag>
-<define-tag secrefs>CVE-2017-8028</define-tag>
-<define-tag packages>libspring-ldap-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1180.wml b/english/lts/security/2017/dla-1180.wml
deleted file mode 100644
index 5e9d1ecadc9..00000000000
--- a/english/lts/security/2017/dla-1180.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Schneider discovered that Spring-LDAP would allow authentication
-with an arbitrary password when the username is correct, no additional
-attributes are bound and when using LDAP BindAuthenticator with
-DefaultTlsDirContextAuthenticationStrategy as the authentication
-strategy and setting userSearch. This occurs because some LDAP vendors
-require an explicit operation for the LDAP bind to take effect.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.1.RELEASE-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your libspring-ldap-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1180.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1181.data b/english/lts/security/2017/dla-1181.data
deleted file mode 100644
index 28901bac0fb..00000000000
--- a/english/lts/security/2017/dla-1181.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1181-1 xen</define-tag>
-<define-tag report_date>2017-11-20</define-tag>
-<define-tag secrefs>CVE-2017-15588 CVE-2017-15589 CVE-2017-15592 CVE-2017-15593 CVE-2017-15595</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1181.wml b/english/lts/security/2017/dla-1181.wml
deleted file mode 100644
index f06cf96584c..00000000000
--- a/english/lts/security/2017/dla-1181.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15588">CVE-2017-15588</a>
-
- <p>Jann Horn discovered a race condition that can cause a stale TLB
- entry which might result in privilege escalation, denial of
- service or information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15589">CVE-2017-15589</a>
-
- <p>Roger Pau Monné discovered a hypervisor stack leak in the x86 I/O
- intercept code, resulting in information leaks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15592">CVE-2017-15592</a>
-
- <p>Andrew Cooper discovered that incorrect handling of self-linear
- shadow mappings for translated guests might result in denial
- of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15593">CVE-2017-15593</a>
-
- <p>Jan Beulich discovered that page type reference counts are
- mishandled which may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15595">CVE-2017-15595</a>
-
- <p>Jann Horn discovered that crafted page-table stacking might result
- in denial of service, privilege escalation or information leaks.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-10.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1181.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1182.data b/english/lts/security/2017/dla-1182.data
deleted file mode 100644
index 166923f565b..00000000000
--- a/english/lts/security/2017/dla-1182.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1182-1 ldns</define-tag>
-<define-tag report_date>2017-11-21</define-tag>
-<define-tag secrefs>CVE-2017-1000231 Bug#882015</define-tag>
-<define-tag packages>ldns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1182.wml b/english/lts/security/2017/dla-1182.wml
deleted file mode 100644
index 456101a7ac7..00000000000
--- a/english/lts/security/2017/dla-1182.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A security vulnerability has been discovered in ldns, a library and
-collection of utilities for DNS programming.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000231">CVE-2017-1000231</a>
-
- <p>The generic parser contained a double-free vulnerability which
- resulted in an application crash with unspecified impacts and attack
- vectors.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6.13-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your ldns packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1182.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1183.data b/english/lts/security/2017/dla-1183.data
deleted file mode 100644
index 2a43e738ce1..00000000000
--- a/english/lts/security/2017/dla-1183.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1183-1 samba</define-tag>
-<define-tag report_date>2017-11-21</define-tag>
-<define-tag secrefs>CVE-2017-15275</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1183.wml b/english/lts/security/2017/dla-1183.wml
deleted file mode 100644
index 920dfd95ee3..00000000000
--- a/english/lts/security/2017/dla-1183.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Volker Lendecke of SerNet and the Samba team discovered that Samba, a
-SMB/CIFS file, print, and login server for Unix, is prone to a heap
-memory information leak, where server allocated heap memory may be
-returned to the client without being cleared.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.6.6-6+deb7u15.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1183.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1184.data b/english/lts/security/2017/dla-1184.data
deleted file mode 100644
index a581977e5f6..00000000000
--- a/english/lts/security/2017/dla-1184.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1184-1 optipng</define-tag>
-<define-tag report_date>2017-11-21</define-tag>
-<define-tag secrefs>CVE-2017-1000229 Bug#882032</define-tag>
-<define-tag packages>optipng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1184.wml b/english/lts/security/2017/dla-1184.wml
deleted file mode 100644
index 58b4eaf6a84..00000000000
--- a/english/lts/security/2017/dla-1184.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An integer overflow vulnerability was found in optipng, an advanced
-PNG optimizer that also recognizes other external file formats. This
-may lead to arbitrary code execution when a maliciously crafted TIFF
-file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.6.4-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your optipng packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1184.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1185.data b/english/lts/security/2017/dla-1185.data
deleted file mode 100644
index 08ce6db8a4c..00000000000
--- a/english/lts/security/2017/dla-1185.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1185-1 sam2p</define-tag>
-<define-tag report_date>2017-11-22</define-tag>
-<define-tag secrefs>CVE-2017-16663</define-tag>
-<define-tag packages>sam2p</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1185.wml b/english/lts/security/2017/dla-1185.wml
deleted file mode 100644
index fcb6b385292..00000000000
--- a/english/lts/security/2017/dla-1185.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that sam2p, a utility to convert raster images and
-other image formats, was affected by an integer overflow vulnerability
-with resultant heap-based buffer overflow in input-bmp.ci because
-width and height multiplications occur unsafely. This may lead to an
-application crash or unspecified other impact when a maliciously
-crafted file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.49.1-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your sam2p packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1185.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1186.data b/english/lts/security/2017/dla-1186.data
deleted file mode 100644
index 1c3a1053666..00000000000
--- a/english/lts/security/2017/dla-1186.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1186-1 xorg-server</define-tag>
-<define-tag report_date>2017-11-22</define-tag>
-<define-tag secrefs>CVE-2017-2624 CVE-2017-12176 CVE-2017-12177 CVE-2017-12178 CVE-2017-12180 CVE-2017-12182 CVE-2017-12183 CVE-2017-12184 CVE-2017-12185 CVE-2017-12187 CVE-2017-13723</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1186.wml b/english/lts/security/2017/dla-1186.wml
deleted file mode 100644
index c79887c7169..00000000000
--- a/english/lts/security/2017/dla-1186.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the X.Org X server. An
-attacker who's able to connect to an X server could cause a denial of
-service or potentially the execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.12.4-6+deb7u8.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1186.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1187.data b/english/lts/security/2017/dla-1187.data
deleted file mode 100644
index fd1843ae1ce..00000000000
--- a/english/lts/security/2017/dla-1187.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1187-1 openjdk-7</define-tag>
-<define-tag report_date>2017-11-23</define-tag>
-<define-tag secrefs>CVE-2017-10274 CVE-2017-10281 CVE-2017-10285 CVE-2017-10295 CVE-2017-10345 CVE-2017-10346 CVE-2017-10347 CVE-2017-10348 CVE-2017-10349 CVE-2017-10350 CVE-2017-10355 CVE-2017-10356 CVE-2017-10357 CVE-2017-10388</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1187.wml b/english/lts/security/2017/dla-1187.wml
deleted file mode 100644
index a81f2ff20f9..00000000000
--- a/english/lts/security/2017/dla-1187.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in impersonation
-of Kerberos services, denial of service, unauthorized access, sandbox
-bypass or HTTP header injection.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u151-2.6.11-2~deb7u2.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1187.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1188.data b/english/lts/security/2017/dla-1188.data
deleted file mode 100644
index 57f00791d2b..00000000000
--- a/english/lts/security/2017/dla-1188.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1188-1 libxml2</define-tag>
-<define-tag report_date>2017-11-23</define-tag>
-<define-tag secrefs>CVE-2017-5130</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1188.wml b/english/lts/security/2017/dla-1188.wml
deleted file mode 100644
index da2a2f69e3e..00000000000
--- a/english/lts/security/2017/dla-1188.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Pranjal Jumde (@pjumde) reported an heap overflow in memory debug code of
-libxml2.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy10.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1188.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1189.data b/english/lts/security/2017/dla-1189.data
deleted file mode 100644
index ae6bf2f4a88..00000000000
--- a/english/lts/security/2017/dla-1189.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1189-1 python2.7</define-tag>
-<define-tag report_date>2017-11-24</define-tag>
-<define-tag secrefs>CVE-2017-1000158</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1189.wml b/english/lts/security/2017/dla-1189.wml
deleted file mode 100644
index d624b34433e..00000000000
--- a/english/lts/security/2017/dla-1189.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A minor security vulnerability has been discovered in Python 2.7, an
-interactive high-level object-oriented language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000158">CVE-2017-1000158</a>
-
- <p>CPython (the reference implementation of Python also commonly known
- as simply Python) versions 2.6 and 2.7 are vulnerable to an integer
- overflow and heap corruption, leading to possible arbitrary code
- execution. The nature of the error has to do with improper handling
- of large strings with escaped characters.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.7.3-6+deb7u4.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1189.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1190.data b/english/lts/security/2017/dla-1190.data
deleted file mode 100644
index 96adf188291..00000000000
--- a/english/lts/security/2017/dla-1190.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1190-1 python2.6</define-tag>
-<define-tag report_date>2017-11-24</define-tag>
-<define-tag secrefs>CVE-2017-1000158</define-tag>
-<define-tag packages>python2.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1190.wml b/english/lts/security/2017/dla-1190.wml
deleted file mode 100644
index df2a48a341b..00000000000
--- a/english/lts/security/2017/dla-1190.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A minor security vulnerability has been discovered in Python 2.7, an
-interactive high-level object-oriented language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000158">CVE-2017-1000158</a>
-
- <p>CPython (the reference implementation of Python also commonly known
- as simply Python) versions 2.6 and 2.7 are vulnerable to an integer
- overflow and heap corruption, leading to possible arbitrary code
- execution. The nature of the error has to do with improper handling
- of large strings with escaped characters.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.6.8-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your python2.6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1190.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1191.data b/english/lts/security/2017/dla-1191.data
deleted file mode 100644
index 3e1126bf51f..00000000000
--- a/english/lts/security/2017/dla-1191.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1191-1 python-werkzeug</define-tag>
-<define-tag report_date>2017-11-24</define-tag>
-<define-tag secrefs>CVE-2016-10516</define-tag>
-<define-tag packages>python-werkzeug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1191.wml b/english/lts/security/2017/dla-1191.wml
deleted file mode 100644
index 5b08f4739bd..00000000000
--- a/english/lts/security/2017/dla-1191.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
- <p>A security issue that allows XSS on the Werkzeug debugger allows
- remote attackers to inject arbitrary stuff via a field that
- contains an exception message.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.3+dfsg-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your python-werkzeug packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1191.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1192.data b/english/lts/security/2017/dla-1192.data
deleted file mode 100644
index 6641c93b116..00000000000
--- a/english/lts/security/2017/dla-1192.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1192-1 libofx</define-tag>
-<define-tag report_date>2017-11-26</define-tag>
-<define-tag secrefs>CVE-2017-2816 CVE-2017-14731</define-tag>
-<define-tag packages>libofx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1192.wml b/english/lts/security/2017/dla-1192.wml
deleted file mode 100644
index 40ab4396565..00000000000
--- a/english/lts/security/2017/dla-1192.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2816">CVE-2017-2816</a>
-
- <p>An exploitable buffer overflow vulnerability exists in the tag
- parsing functionality of LibOFX 0.9.11. A specially crafted OFX
- file can cause a write out of bounds resulting in a buffer
- overflow on the stack. An attacker can construct a malicious
- OFX file to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14731">CVE-2017-14731</a>
-
- <p>ofx_proc_file in ofx_preproc.cpp allows remote attackers to cause
- a denial of service (heap-based buffer over-read and application
- crash) via a crafted file</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.9.4-2.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libofx packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1192.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1193.data b/english/lts/security/2017/dla-1193.data
deleted file mode 100644
index 2b223e01a82..00000000000
--- a/english/lts/security/2017/dla-1193.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1193-1 roundcube</define-tag>
-<define-tag report_date>2017-11-28</define-tag>
-<define-tag secrefs>CVE-2017-16651</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1193.wml b/english/lts/security/2017/dla-1193.wml
deleted file mode 100644
index 03c3476089d..00000000000
--- a/english/lts/security/2017/dla-1193.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A file disclosure vulnerability was discovered in roundcube, a skinnable
-AJAX based webmail solution for IMAP servers.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16651">CVE-2017-16651</a>
-
- <p>An authenticated attacker can take advantage of this flaw to read
- roundcube's configuration files by uploading a specially crafted
- file attachment.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7.2-9+deb7u9.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1193.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1194.data b/english/lts/security/2017/dla-1194.data
deleted file mode 100644
index 329c4c02ec5..00000000000
--- a/english/lts/security/2017/dla-1194.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1194-1 libxml2</define-tag>
-<define-tag report_date>2017-11-30</define-tag>
-<define-tag secrefs>CVE-2017-16931 CVE-2017-16932</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1194.wml b/english/lts/security/2017/dla-1194.wml
deleted file mode 100644
index 878f244cc6b..00000000000
--- a/english/lts/security/2017/dla-1194.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16931">CVE-2017-16931</a>
-
- <p>parser.c in libxml2 before 2.9.5 mishandles parameter-entity
- references because the NEXTL macro calls the
- xmlParserHandlePEReference function in the case of a '%' character
- in a DTD name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16932">CVE-2017-16932</a>
-
- <p>parser.c in libxml2 before 2.9.5 does not prevent infinite
- recursion in parameter entities.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy11.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1194.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1195.data b/english/lts/security/2017/dla-1195.data
deleted file mode 100644
index 64e2daf29b9..00000000000
--- a/english/lts/security/2017/dla-1195.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1195-1 curl</define-tag>
-<define-tag report_date>2017-11-30</define-tag>
-<define-tag secrefs>CVE-2017-8817</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1195.wml b/english/lts/security/2017/dla-1195.wml
deleted file mode 100644
index 8410a73b5d9..00000000000
--- a/english/lts/security/2017/dla-1195.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8817">CVE-2017-8817</a>
-
- <p>Fuzzing by the OSS-Fuzz project led to the discovery of a read out of
- bounds flaw in the FTP wildcard function in libcurl. A malicious
- server could redirect a libcurl-based client to an URL using a
- wildcard pattern, triggering the out-of-bound read.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.26.0-1+wheezy23.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1195.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1196.data b/english/lts/security/2017/dla-1196.data
deleted file mode 100644
index 58bdf616278..00000000000
--- a/english/lts/security/2017/dla-1196.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1196-1 optipng</define-tag>
-<define-tag report_date>2017-11-30</define-tag>
-<define-tag secrefs>CVE-2017-16938 Bug#878839</define-tag>
-<define-tag packages>optipng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1196.wml b/english/lts/security/2017/dla-1196.wml
deleted file mode 100644
index 5c8776a8401..00000000000
--- a/english/lts/security/2017/dla-1196.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>optipng, an advanced PNG (Portable Network Graphics) optimizer, has
-been found vulnerable to a buffer overflow which allows remote
-attackers to cause a denial-of-service attack or other unspecified
-impact with a maliciously crafted GIF format file, related to an
-uncontrolled loop in the LZWReadByte function of the gifread.c file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.6.4-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your optipng packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1196.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1197.data b/english/lts/security/2017/dla-1197.data
deleted file mode 100644
index 5456ad54205..00000000000
--- a/english/lts/security/2017/dla-1197.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1197-1 sox</define-tag>
-<define-tag report_date>2017-11-30</define-tag>
-<define-tag secrefs>CVE-2017-11332 CVE-2017-11358 CVE-2017-11359 CVE-2017-15370 CVE-2017-15371 CVE-2017-15372 CVE-2017-15642 Bug#870328 Bug#878810 Bug#878809 Bug#878808 Bug#882236 Bug#882144</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1197.wml b/english/lts/security/2017/dla-1197.wml
deleted file mode 100644
index fa633eef43b..00000000000
--- a/english/lts/security/2017/dla-1197.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various security vulnerabilities were discovered in sox, a command
-line utility to convert audio formats, that may lead to a
-denial-of-service (application crash / infinite loop) or memory
-corruptions by processing a malformed input file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-14.4.0-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1197.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1198.data b/english/lts/security/2017/dla-1198.data
deleted file mode 100644
index 2e3518f475d..00000000000
--- a/english/lts/security/2017/dla-1198.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1198-1 libextractor</define-tag>
-<define-tag report_date>2017-12-4</define-tag>
-<define-tag secrefs>CVE-2017-15266 CVE-2017-15267 CVE-2017-15600 CVE-2017-15601 CVE-2017-15602 CVE-2017-15922 Bug#878314 Bug#880016</define-tag>
-<define-tag packages>libextractor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1198.wml b/english/lts/security/2017/dla-1198.wml
deleted file mode 100644
index fc3650571d1..00000000000
--- a/english/lts/security/2017/dla-1198.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Leon Zhao discovered several security vulnerabilities in libextractor,
-a universal library and command-line tool to obtain meta-data about
-files. NULL Pointer Dereferences, heap-based buffer overflows, integer
-signedness errors and out-of-bounds read may lead to a denial-of-service
-(application crash) or have other unspecified impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.6.3-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your libextractor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1198.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1199.data b/english/lts/security/2017/dla-1199.data
deleted file mode 100644
index 8c38e731a7b..00000000000
--- a/english/lts/security/2017/dla-1199.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1199-1 thunderbird</define-tag>
-<define-tag report_date>2017-12-9</define-tag>
-<define-tag secrefs>CVE-2017-7826 CVE-2017-7828 CVE-2017-7830</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1199.wml b/english/lts/security/2017/dla-1199.wml
deleted file mode 100644
index d322972fba5..00000000000
--- a/english/lts/security/2017/dla-1199.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, use after free and other
-implementation errors may lead to crashes or the execution of arbitrary
-code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.5.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1199.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1200.data b/english/lts/security/2017/dla-1200.data
deleted file mode 100644
index d644ec38033..00000000000
--- a/english/lts/security/2017/dla-1200.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1200-1 linux</define-tag>
-<define-tag report_date>2017-12-10</define-tag>
-<define-tag secrefs>CVE-2016-10208 CVE-2017-8824 CVE-2017-8831 CVE-2017-12190 CVE-2017-13080 CVE-2017-14051 CVE-2017-15115 CVE-2017-1526 CVE-2017-15299 CVE-2017-15649 CVE-2017-15868 CVE-2017-1652 CVE-2017-16527 CVE-2017-16529 CVE-2017-16531 CVE-2017-1653 CVE-2017-16533 CVE-2017-16535 CVE-2017-16536 CVE-2017-1653 CVE-2017-16643 CVE-2017-16649 CVE-2017-16939 CVE-2017-1000 Bug#865303 Bug#865416</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1200.wml b/english/lts/security/2017/dla-1200.wml
deleted file mode 100644
index 2d500c694ce..00000000000
--- a/english/lts/security/2017/dla-1200.wml
+++ /dev/null
@@ -1,227 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10208">CVE-2016-10208</a>
-
- <p>Sergej Schumilo and Ralf Spenneberg discovered that a crafted ext4
- filesystem could trigger memory corruption when it is mounted. A
- user that can provide a device or filesystem image to be mounted
- could use this for denial of service (crash or data corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8824">CVE-2017-8824</a>
-
- <p>Mohamed Ghannam discovered that the DCCP implementation did not
- correctly manage resources when a socket is disconnected and
- reconnected, potentially leading to a use-after-free. A local
- user could use this for denial of service (crash or data
- corruption) or possibly for privilege escalation. On systems that
- do not already have the dccp module loaded, this can be mitigated
- by disabling it:
- echo &gt;&gt; /etc/modprobe.d/disable-dccp.conf install dccp false</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8831">CVE-2017-8831</a>
-
- <p>Pengfei Wang discovered that the saa7164 video capture driver
- re-reads data from a PCI device after validating it. A physically
- present user able to attach a specially designed PCI device could
- use this for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12190">CVE-2017-12190</a>
-
- <p>Vitaly Mayatskikh discovered that the block layer did not
- correctly count page references for raw I/O from user-space. This
- can be exploited by a guest VM with access to a host SCSI device
- for denial of service (memory exhaustion) or potentially for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13080">CVE-2017-13080</a>
-
- <p>A vulnerability was found in the WPA2 protocol that could lead to
- reinstallation of the same Group Temporal Key (GTK), which
- substantially reduces the security of wifi encryption. This is
- one of the issues collectively known as <q>KRACK</q>.</p>
-
- <p>Updates to GTKs are usually handled by the wpa package, where this
- issue was already fixed (DLA-1150-1). However, some wifi devices
- can remain active and update GTKs autonomously while the system is
- suspended. The kernel must also check for and ignore key
- reinstallation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14051">CVE-2017-14051</a>
-
- <p><q>shqking</q> reported that the qla2xxx SCSI host driver did not
- correctly validate I/O to the <q>optrom</q> sysfs attribute of the
- devices it creates. This is unlikely to have any security
- impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15115">CVE-2017-15115</a>
-
- <p>Vladis Dronov reported that the SCTP implementation did not
- correctly handle "peel-off" of an association to another net
- namespace. This leads to a use-after-free, which a local user can
- exploit for denial of service (crash or data corruption) or
- possibly for privilege escalation. On systems that do not already
- have the sctp module loaded, this can be mitigated by disabling
- it:
- echo &gt;&gt; /etc/modprobe.d/disable-sctp.conf install sctp false</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15265">CVE-2017-15265</a>
-
- <p>Michael23 Yu reported a race condition in the ALSA sequencer
- subsystem involving creation and deletion of ports, which could
- lead to a use-after-free. A local user with access to an ALSA
- sequencer device can use this for denial of service (crash or data
- loss) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15299">CVE-2017-15299</a>
-
- <p>Eric Biggers discovered that the KEYS subsystem did not correctly
- handle update of an uninstantiated key, leading to a null
- dereference. A local user can use this for denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15649">CVE-2017-15649</a>
-
- <p><q>nixioaming</q> reported a race condition in the packet socket
- (AF_PACKET) implementation involving rebinding to a fanout group,
- which could lead to a use-after-free. A local user with the
- CAP_NET_RAW capability can use this for denial of service (crash
- or data corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15868">CVE-2017-15868</a>
-
- <p>Al Viro found that the Bluebooth Network Encapsulation Protocol
- (BNEP) implementation did not validate the type of the second
- socket passed to the BNEPCONNADD ioctl(), which could lead to
- memory corruption. A local user with the CAP_NET_ADMIN capability
- can use this for denial of service (crash or data corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16525">CVE-2017-16525</a>
-
- <p>Andrey Konovalov reported that the USB serial console
- implementation did not correctly handle disconnection of unusual
- serial devices, leading to a use-after-free. A similar issue was
- found in the case where setup of a serial console fails. A
- physically present user with a specially designed USB device can
- use this to cause a denial of service (crash or data corruption)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16527">CVE-2017-16527</a>
-
- <p>Andrey Konovalov reported that the USB sound mixer driver did not
- correctly cancel I/O in case it failed to probe a device, which
- could lead to a use-after-free. A physically present user with a
- specially designed USB device can use this to cause a denial of
- service (crash or data corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16529">CVE-2017-16529</a>
-
- <p>Andrey Konovalov reported that the USB sound driver did not fully
- validate descriptor lengths, which could lead to a buffer
- over-read. A physically present user with a specially designed
- USB device may be able to use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16531">CVE-2017-16531</a>
-
- <p>Andrey Konovalov reported that the USB core did not validate IAD
- lengths, which could lead to a buffer over-read. A physically
- present user with a specially designed USB device may be able to
- use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16532">CVE-2017-16532</a>
-
- <p>Andrey Konovalov reported that the USB test driver did not
- correctly handle devices with specific combinations of endpoints.
- A physically present user with a specially designed USB device can
- use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16533">CVE-2017-16533</a>
-
- <p>Andrey Konovalov reported that the USB HID driver did not fully
- validate descriptor lengths, which could lead to a buffer
- over-read. A physically present user with a specially designed
- USB device may be able to use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16535">CVE-2017-16535</a>
-
- <p>Andrey Konovalov reported that the USB core did not validate BOS
- descriptor lengths, which could lead to a buffer over-read. A
- physically present user with a specially designed USB device may
- be able to use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16536">CVE-2017-16536</a>
-
- <p>Andrey Konovalov reported that the cx231xx video capture driver
- did not fully validate the device endpoint configuration, which
- could lead to a null dereference. A physically present user with
- a specially designed USB device can use this to cause a denial of
- service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16537">CVE-2017-16537</a>
-
- <p>Andrey Konovalov reported that the imon RC driver did not fully
- validate the device interface configuration, which could lead to a
- null dereference. A physically present user with a specially
- designed USB device can use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16643">CVE-2017-16643</a>
-
- <p>Andrey Konovalov reported that the gtco tablet driver did not
- fully validate descriptor lengths, which could lead to a buffer
- over-read. A physically present user with a specially designed
- USB device may be able to use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16649">CVE-2017-16649</a>
-
- <p>Bjørn Mork found that the cdc_ether network driver did not
- validate the device's maximum segment size, potentially leading to
- a division by zero. A physically present user with a specially
- designed USB device can use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16939">CVE-2017-16939</a>
-
- <p>Mohamed Ghannam reported (through Beyond Security's SecuriTeam
- Secure Disclosure program) that the IPsec (xfrm) implementation
- did not correctly handle some failure cases when dumping policy
- information through netlink. A local user with the CAP_NET_ADMIN
- capability can use this for denial of service (crash or data
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000407">CVE-2017-1000407</a>
-
- <p>Andrew Honig reported that the KVM implementation for Intel
- processors allowed direct access to host I/O port 0x80, which
- is not generally safe. On some systems this allows a guest
- VM to cause a denial of service (crash) of the host.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.96-2. This version also includes bug fixes from upstream versions
-up to and including 3.2.96. It also fixes some regressions caused by
-the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-1000364">CVE-2017-1000364</a>,
-which was included in DLA-993-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1200.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1201.data b/english/lts/security/2017/dla-1201.data
deleted file mode 100644
index 3c9ac8c1b12..00000000000
--- a/english/lts/security/2017/dla-1201.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1201-1 libxcursor</define-tag>
-<define-tag report_date>2017-12-10</define-tag>
-<define-tag secrefs>CVE-2017-16612 Bug#883792</define-tag>
-<define-tag packages>libxcursor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1201.wml b/english/lts/security/2017/dla-1201.wml
deleted file mode 100644
index 41ae961f4b1..00000000000
--- a/english/lts/security/2017/dla-1201.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libXcursor, a X cursor management library, is
-prone to several heap overflows when parsing malicious files. An
-attacker can take advantage of these flaws for arbitrary code execution,
-if a user is tricked into processing a specially crafted cursor file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.1.13-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxcursor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1201.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1202.data b/english/lts/security/2017/dla-1202.data
deleted file mode 100644
index d6c5d566830..00000000000
--- a/english/lts/security/2017/dla-1202.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1202-1 firefox-esr</define-tag>
-<define-tag report_date>2017-12-10</define-tag>
-<define-tag secrefs>CVE-2017-7843</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1202.wml b/english/lts/security/2017/dla-1202.wml
deleted file mode 100644
index e918159d446..00000000000
--- a/english/lts/security/2017/dla-1202.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the private browsing mode in Firefox was
-able to write persistent data to a database, which could lead
-to websites tracking users even when browsing in this mode.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.5.2esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1202.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1203-2.data b/english/lts/security/2017/dla-1203-2.data
deleted file mode 100644
index aa4e523da01..00000000000
--- a/english/lts/security/2017/dla-1203-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1203-2 xrdp</define-tag>
-<define-tag report_date>2017-12-13</define-tag>
-<define-tag packages>xrdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1203-2.wml b/english/lts/security/2017/dla-1203-2.wml
deleted file mode 100644
index f03c25902f1..00000000000
--- a/english/lts/security/2017/dla-1203-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was added by the patch introduced in version 0.5.0-2+deb7u2 to
-fix <a href="https://security-tracker.debian.org/tracker/CVE-2017-16927">CVE-2017-16927</a>:
-xrdp-sesman started to segfault in libscp.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.0-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your xrdp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1203-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1203.data b/english/lts/security/2017/dla-1203.data
deleted file mode 100644
index efc3675bb6e..00000000000
--- a/english/lts/security/2017/dla-1203.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1203-1 xrdp</define-tag>
-<define-tag report_date>2017-12-11</define-tag>
-<define-tag secrefs>CVE-2017-16927</define-tag>
-<define-tag packages>xrdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1203.wml b/english/lts/security/2017/dla-1203.wml
deleted file mode 100644
index 8b24a6e6160..00000000000
--- a/english/lts/security/2017/dla-1203.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager
-in xrdp uses an untrusted integer as a write length, which allows local users
-to cause a denial of service (buffer overflow and application crash) or
-possibly have unspecified other impact via a crafted input stream.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.0-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your xrdp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1203.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1204.data b/english/lts/security/2017/dla-1204.data
deleted file mode 100644
index 741e8cc4497..00000000000
--- a/english/lts/security/2017/dla-1204.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1204-1 evince</define-tag>
-<define-tag report_date>2017-12-11</define-tag>
-<define-tag secrefs>CVE-2017-1000159</define-tag>
-<define-tag packages>evince</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1204.wml b/english/lts/security/2017/dla-1204.wml
deleted file mode 100644
index f8bbf1245cb..00000000000
--- a/english/lts/security/2017/dla-1204.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an arbitrary command injection in the
-evince PDF viewer.</p>
-
-<p>A specially-crafted embedded DVI filename could be exploited to run
-commands as the current user when <q>printing</q> to PDF.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in evince version
-3.4.0-3.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your evince packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1204.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1205.data b/english/lts/security/2017/dla-1205.data
deleted file mode 100644
index 1925d319ec2..00000000000
--- a/english/lts/security/2017/dla-1205.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1205-1 simplesamlphp</define-tag>
-<define-tag report_date>2017-12-12</define-tag>
-<define-tag secrefs>CVE-2017-12867 CVE-2017-12868 CVE-2017-12869 CVE-2017-12872 CVE-2017-12873 CVE-2017-12874</define-tag>
-<define-tag packages>simplesamlphp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1205.wml b/english/lts/security/2017/dla-1205.wml
deleted file mode 100644
index 9055b04f11d..00000000000
--- a/english/lts/security/2017/dla-1205.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The simplesamlphp package in wheezy is vulnerable to multiple attacks
-on authentication-related code, leading to unauthorized access and
-information disclosure.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12867">CVE-2017-12867</a>
-
- <p>The SimpleSAML_Auth_TimeLimitedToken class allows attackers with
- access to a secret token to extend its validity period by manipulating
- the prepended time offset.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12869">CVE-2017-12869</a>
-
- <p>The multiauth module allows remote attackers to bypass authentication
- context restrictions and use an authentication source defined in
- config/authsources.php via vectors related to improper validation of
- user input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12872">CVE-2017-12872</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-12868">CVE-2017-12868</a>
-
- <p>The (1) Htpasswd authentication source in the authcrypt module and (2)
- SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow
- remote iattackers to conduct timing side-channel attacks by leveraging
- use of the standard comparison operator to compare secret material
- against user input.</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2017-12868">CVE-2017-12868</a>
- was a about an improper fix of <a href="https://security-tracker.debian.org/tracker/CVE-2017-12872">CVE-2017-12872</a> in the
- initial patch released by upstream. We have used the correct patch.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12873">CVE-2017-12873</a>
-
- <p>SimpleSAMLphp might allow attackers to obtain sensitive information,
- gain unauthorized access, or have unspecified other impacts by
- leveraging incorrect persistent NameID generation when an Identity
- Provider (IdP) is misconfigured.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12874">CVE-2017-12874</a>
-
- <p>The InfoCard module for SimpleSAMLphp allows attackers to spoof
- XML messages by leveraging an incorrect check of return values in
- signature validation utilities.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.2-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your simplesamlphp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1205.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1206.data b/english/lts/security/2017/dla-1206.data
deleted file mode 100644
index f998ff063c1..00000000000
--- a/english/lts/security/2017/dla-1206.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1206-1 tiff</define-tag>
-<define-tag report_date>2017-12-13</define-tag>
-<define-tag secrefs>CVE-2017-9935 Bug#866109</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1206.wml b/english/lts/security/2017/dla-1206.wml
deleted file mode 100644
index cad5774bbef..00000000000
--- a/english/lts/security/2017/dla-1206.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf
-function in tools/tiff2pdf.c. This heap overflow could lead to different
-damages. For example, a crafted TIFF document can lead to an out-of-bounds read
-in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in
-t2p_readwrite_pdf_image, or a double free in t2p_free. Given these
-possibilities, it probably could cause arbitrary code execution.</p>
-
-<p>This overflow is linked to an underlying assumption that all pages in a tiff
-document will have the same transfer function. There is nothing in the tiff
-standard that says this needs to be the case.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u17.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1206.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1207.data b/english/lts/security/2017/dla-1207.data
deleted file mode 100644
index 9e23e830119..00000000000
--- a/english/lts/security/2017/dla-1207.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1207-1 erlang</define-tag>
-<define-tag report_date>2017-12-15</define-tag>
-<define-tag secrefs>CVE-2017-1000385</define-tag>
-<define-tag packages>erlang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1207.wml b/english/lts/security/2017/dla-1207.wml
deleted file mode 100644
index 40ecaa19cfe..00000000000
--- a/english/lts/security/2017/dla-1207.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An erlang TLS server configured with cipher suites using RSA key exchange,
-may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA
-Bleichenbacher attack) against RSA, which when exploited, may result in
-plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM)
-attack, despite the attacker not having gained access to the server's
-private key itself.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-15.b.1-dfsg-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your erlang packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1207.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1208.data b/english/lts/security/2017/dla-1208.data
deleted file mode 100644
index cfe87624d4f..00000000000
--- a/english/lts/security/2017/dla-1208.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1208-1 reportbug</define-tag>
-<define-tag report_date>2017-12-15</define-tag>
-<define-tag secrefs>Bug#878088</define-tag>
-<define-tag packages>reportbug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1208.wml b/english/lts/security/2017/dla-1208.wml
deleted file mode 100644
index 33525f08d77..00000000000
--- a/english/lts/security/2017/dla-1208.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Reportbug, a tool designed to make the reporting of bugs in Debian
-easier, was further enhanced to automatically detect bug reports for
-potential regressions caused by a security update. After user
-confirmation an additional email with a copy of the report will be
-sent to the debian-lts mailing list.</p>
-
-<p>This change requires a new dependency, python-requests, which will be
-installed automatically.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in version
-6.4.4+deb7u2.</p>
-
-<p>We recommend that you upgrade your reportbug packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1208.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1209.data b/english/lts/security/2017/dla-1209.data
deleted file mode 100644
index 0926f783f47..00000000000
--- a/english/lts/security/2017/dla-1209.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1209-1 sensible-utils</define-tag>
-<define-tag report_date>2017-12-15</define-tag>
-<define-tag secrefs>CVE-2017-17512 Bug##881767</define-tag>
-<define-tag packages>sensible-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1209.wml b/english/lts/security/2017/dla-1209.wml
deleted file mode 100644
index 1e4bdeb945e..00000000000
--- a/english/lts/security/2017/dla-1209.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability in sensible-browser, a
-utility to start the most suitable web browser based on your environment
-or configuration.</p>
-
-<p>Remote attackers could conduct argument-injection attacks via speciallycrafted URIs.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in sensible-utils version
-0.0.7+deb7u1.</p>
-
-<p>We recommend that you upgrade your sensible-utils packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1209.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1210.data b/english/lts/security/2017/dla-1210.data
deleted file mode 100644
index 0f37df07566..00000000000
--- a/english/lts/security/2017/dla-1210.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1210-1 kildclient</define-tag>
-<define-tag report_date>2017-12-16</define-tag>
-<define-tag secrefs>CVE-2017-17511</define-tag>
-<define-tag packages>kildclient</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1210.wml b/english/lts/security/2017/dla-1210.wml
deleted file mode 100644
index 663cad320a7..00000000000
--- a/english/lts/security/2017/dla-1210.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a command-injection vulnerability in
-kildclient, a <q>MUD</q> multiplayer real-time virtual world game.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in kildclient version
-2.11.1-1+deb7u1. Thanks to Eduardo M Kalinowski for help in preparing this
-update.</p>
-
-<p>We recommend that you upgrade your kildclient packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1210.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1211.data b/english/lts/security/2017/dla-1211.data
deleted file mode 100644
index 6e16300778b..00000000000
--- a/english/lts/security/2017/dla-1211.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1211-1 libxml2</define-tag>
-<define-tag report_date>2017-12-18</define-tag>
-<define-tag secrefs>CVE-2017-15412</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1211.wml b/english/lts/security/2017/dla-1211.wml
deleted file mode 100644
index 545f7751f6b..00000000000
--- a/english/lts/security/2017/dla-1211.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15412">CVE-2017-15412</a>
-
- <p>It was detected that some function calls in the XPath extensions
- functions could result in memory corruption due to <q>use after free</q>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.0+dfsg1-7+wheezy12.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1211.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1212.data b/english/lts/security/2017/dla-1212.data
deleted file mode 100644
index eec7a054a8b..00000000000
--- a/english/lts/security/2017/dla-1212.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1212-1 otrs2</define-tag>
-<define-tag report_date>2017-12-19</define-tag>
-<define-tag secrefs>CVE-2017-15864 CVE-2017-16664 CVE-2017-16854 CVE-2017-16921</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1212.wml b/english/lts/security/2017/dla-1212.wml
deleted file mode 100644
index fe22c839392..00000000000
--- a/english/lts/security/2017/dla-1212.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Four vulnerabilities were discovered in the Open Ticket Request System
-which could result in information disclosure or the execution of arbitrary
-shell commands by logged-in agents.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.3.18-1~deb7u2.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1212.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1213.data b/english/lts/security/2017/dla-1213.data
deleted file mode 100644
index 496d021e719..00000000000
--- a/english/lts/security/2017/dla-1213.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1213-1 openafs</define-tag>
-<define-tag report_date>2017-12-20</define-tag>
-<define-tag secrefs>CVE-2017-17432</define-tag>
-<define-tag packages>openafs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1213.wml b/english/lts/security/2017/dla-1213.wml
deleted file mode 100644
index 858ed0feaf8..00000000000
--- a/english/lts/security/2017/dla-1213.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17432">CVE-2017-17432</a>
- <p>It was discovered that malformed jumbogram packets could result in
- denial of service against OpenAFS, an implementation of the Andrew
- distributed file system.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6.1-3+deb7u8.</p>
-
-<p>We recommend that you upgrade your openafs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1213.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1214.data b/english/lts/security/2017/dla-1214.data
deleted file mode 100644
index e92a542c73d..00000000000
--- a/english/lts/security/2017/dla-1214.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1214-1 libreoffice</define-tag>
-<define-tag report_date>2017-12-20</define-tag>
-<define-tag secrefs>CVE-2017-12607 CVE-2017-12608</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1214.wml b/english/lts/security/2017/dla-1214.wml
deleted file mode 100644
index 9c3dc37d8a7..00000000000
--- a/english/lts/security/2017/dla-1214.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Marcin Noga discovered two vulnerabilities in LibreOffice, which could
-result in the execution of arbitrary code if a malformed PPT or DOC
-document is opened.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:3.5.4+dfsg2-0+deb7u10.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1214.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1215.data b/english/lts/security/2017/dla-1215.data
deleted file mode 100644
index b04e40e8961..00000000000
--- a/english/lts/security/2017/dla-1215.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1215-1 otrs2</define-tag>
-<define-tag report_date>2017-12-20</define-tag>
-<define-tag secrefs>CVE-2017-17476 Bug#884801</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1215.wml b/english/lts/security/2017/dla-1215.wml
deleted file mode 100644
index 7074dd86626..00000000000
--- a/english/lts/security/2017/dla-1215.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Francesco Sirocco discovered a flaw in otrs2, the Open Ticket Request
-System, which could result in session information disclosure when cookie
-support is disabled. A remote attacker can take advantage of this flaw
-to take over an agent's session if the agent is tricked into clicking a
-link in a specially crafted mail.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.3.18-1~deb7u3.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1215.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1216.data b/english/lts/security/2017/dla-1216.data
deleted file mode 100644
index 20ee88d575d..00000000000
--- a/english/lts/security/2017/dla-1216.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1216-1 wordpress</define-tag>
-<define-tag report_date>2017-12-21</define-tag>
-<define-tag secrefs>CVE-2017-17091 CVE-2017-17092 CVE-2017-17093 CVE-2017-17094 Bug#883314</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1216.wml b/english/lts/security/2017/dla-1216.wml
deleted file mode 100644
index 6ef3f6dc3df..00000000000
--- a/english/lts/security/2017/dla-1216.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17091">CVE-2017-17091</a>
-
- <p>wp-admin/user-new.php in WordPress sets the newbloguser
- key to a string that can be directly derived from the user ID, which
- allows remote attackers to bypass intended access restrictions by
- entering this string.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17092">CVE-2017-17092</a>
-
- <p>wp-includes/functions.php in WordPress does not require the
- unfiltered_html capability for upload of .js files, which might
- allow remote attackers to conduct XSS attacks via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17093">CVE-2017-17093</a>
-
- <p>wp-includes/general-template.php in WordPress does not properly
- restrict the lang attribute of an HTML element, which might allow
- attackers to conduct XSS attacks via the language setting of a site.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17094">CVE-2017-17094</a>
-
- <p>wp-includes/feed.php in WordPress does not properly
- restrict enclosures in RSS and Atom fields, which might allow
- attackers to conduct XSS attacks via a crafted URL.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u20.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1216.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1217.data b/english/lts/security/2017/dla-1217.data
deleted file mode 100644
index 31c2f77386c..00000000000
--- a/english/lts/security/2017/dla-1217.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1217-1 irssi</define-tag>
-<define-tag report_date>2017-12-23</define-tag>
-<define-tag secrefs>CVE-2017-5193 CVE-2017-5194 CVE-2017-5356 CVE-2017-15227 CVE-2017-15228 CVE-2017-15721 CVE-2017-15722 Bug#879521</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1217.wml b/english/lts/security/2017/dla-1217.wml
deleted file mode 100644
index b6f2022a0bb..00000000000
--- a/english/lts/security/2017/dla-1217.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Irssi, a terminal based
-IRC client, which may lead to denial of service or other unspecified
-impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.15-5+deb7u4.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1217.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1218.data b/english/lts/security/2017/dla-1218.data
deleted file mode 100644
index 5c30b09507f..00000000000
--- a/english/lts/security/2017/dla-1218.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1218-1 rsync</define-tag>
-<define-tag report_date>2017-12-22</define-tag>
-<define-tag secrefs>CVE-2017-16548 CVE-2017-17433 CVE-2017-17434</define-tag>
-<define-tag packages>rsync</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1218.wml b/english/lts/security/2017/dla-1218.wml
deleted file mode 100644
index b02dbaa08b5..00000000000
--- a/english/lts/security/2017/dla-1218.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in rsync, a fast, versatile,
-remote (and local) file-copying tool, allowing a remote attacker to
-bypass intended access restrictions or cause a denial of service.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.9-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your rsync packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1218.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1219.data b/english/lts/security/2017/dla-1219.data
deleted file mode 100644
index f0bca3b6b4a..00000000000
--- a/english/lts/security/2017/dla-1219.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1219-1 enigmail</define-tag>
-<define-tag report_date>2017-12-23</define-tag>
-<define-tag secrefs>CVE-2017-17843 CVE-2017-17844 CVE-2017-17845 CVE-2017-17846 CVE-2017-17847 CVE-2017-17848</define-tag>
-<define-tag packages>enigmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1219.wml b/english/lts/security/2017/dla-1219.wml
deleted file mode 100644
index 49637c1c209..00000000000
--- a/english/lts/security/2017/dla-1219.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Enigmail, an OpenPGP
-extension for Thunderbird, which could result in a loss of
-confidentiality, faked signatures, plain text leaks and denial of
-service. Additional information can be found under
-<a href="https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf">https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.9.9-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your enigmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1219.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1220.data b/english/lts/security/2017/dla-1220.data
deleted file mode 100644
index a3dadbb11d7..00000000000
--- a/english/lts/security/2017/dla-1220.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1220-1 gimp</define-tag>
-<define-tag report_date>2017-12-23</define-tag>
-<define-tag secrefs>CVE-2017-17784 CVE-2017-17785 CVE-2017-17786 CVE-2017-17787 CVE-2017-17788 CVE-2017-17789</define-tag>
-<define-tag packages>gimp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1220.wml b/english/lts/security/2017/dla-1220.wml
deleted file mode 100644
index 2b39d924ad9..00000000000
--- a/english/lts/security/2017/dla-1220.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hanno Böck found several buffer overflows in GIMP, the GNU Image
-Manipulation Program, which could lead to application crash or other
-unspecified behaviour if a user opened untrusted input files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.8.2-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your gimp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1220.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1221.data b/english/lts/security/2017/dla-1221.data
deleted file mode 100644
index 0da43e37f27..00000000000
--- a/english/lts/security/2017/dla-1221.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1221-1 ruby1.9.1</define-tag>
-<define-tag report_date>2017-12-25</define-tag>
-<define-tag secrefs>CVE-2017-17405 CVE-2017-17790</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1221.wml b/english/lts/security/2017/dla-1221.wml
deleted file mode 100644
index f2b85418b53..00000000000
--- a/english/lts/security/2017/dla-1221.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the interpreter for the
-Ruby language. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17405">CVE-2017-17405</a>
-
- <p>A command injection vulnerability in Net::FTP might allow a
- malicious FTP server the execution of arbitrary commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17790">CVE-2017-17790</a>
-
- <p>A command injection vulnerability in lib/resolv.rb's lazy_initialze
- might allow a command injection attack. However untrusted input to
- this function is rather unlikely.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.3.194-8.1+deb7u7.</p>
-
-<p>We recommend that you upgrade your ruby1.9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1221.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1222.data b/english/lts/security/2017/dla-1222.data
deleted file mode 100644
index 5861c3d80e4..00000000000
--- a/english/lts/security/2017/dla-1222.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1222-1 ruby1.8</define-tag>
-<define-tag report_date>2017-12-25</define-tag>
-<define-tag secrefs>CVE-2017-17405 CVE-2017-17790</define-tag>
-<define-tag packages>ruby1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1222.wml b/english/lts/security/2017/dla-1222.wml
deleted file mode 100644
index a04e9fb785a..00000000000
--- a/english/lts/security/2017/dla-1222.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the interpreter for the
-Ruby language. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17405">CVE-2017-17405</a>
-
- <p>A command injection vulnerability in Net::FTP might allow a
- malicious FTP server the execution of arbitrary commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17790">CVE-2017-17790</a>
-
- <p>A command injection vulnerability in lib/resolv.rb's lazy_initialze
- might allow a command injection attack. However untrusted input to
- this function is rather unlikely.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.7.358-7.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your ruby1.8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1222.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1223.data b/english/lts/security/2017/dla-1223.data
deleted file mode 100644
index 373707d0f17..00000000000
--- a/english/lts/security/2017/dla-1223.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1223-1 thunderbird</define-tag>
-<define-tag report_date>2017-12-27</define-tag>
-<define-tag secrefs>CVE-2017-7829 CVE-2017-7846 CVE-2017-7847 CVE-2017-7848</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1223.wml b/english/lts/security/2017/dla-1223.wml
deleted file mode 100644
index d8452c1054d..00000000000
--- a/english/lts/security/2017/dla-1223.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client including information leaks, unintended JavaScript execution and
-sender address spoofing.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.5.2-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1223.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1224.data b/english/lts/security/2017/dla-1224.data
deleted file mode 100644
index f739c7bead7..00000000000
--- a/english/lts/security/2017/dla-1224.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1224-1 mercurial</define-tag>
-<define-tag report_date>2017-12-28</define-tag>
-<define-tag secrefs>CVE-2017-17458</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1224.wml b/english/lts/security/2017/dla-1224.wml
deleted file mode 100644
index 35a454bf241..00000000000
--- a/english/lts/security/2017/dla-1224.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was found in the Mercurial version control system
-which could lead to remote arbitrary code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17458">CVE-2017-17458</a>
-
- <p>A specially malformed Mercurial repository could cause Git
- subrepositories to run arbitrary code in the form of a
- .git/hooks/post-update script checked into the parent repository.
- Typical use of Mercurial prevents construction of such repositories,
- but they can be created programmatically.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.2-4+deb7u6.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1224.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1225.data b/english/lts/security/2017/dla-1225.data
deleted file mode 100644
index 433fe7be285..00000000000
--- a/english/lts/security/2017/dla-1225.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1225-1 asterisk</define-tag>
-<define-tag report_date>2017-12-30</define-tag>
-<define-tag secrefs>CVE-2017-17090 Bug#883342</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1225.wml b/english/lts/security/2017/dla-1225.wml
deleted file mode 100644
index 02dc40ae1ba..00000000000
--- a/english/lts/security/2017/dla-1225.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been discovered in Asterisk, an open source PBX and
-telephony toolkit, which may result in resource exhaustion and denial of
-service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17090">CVE-2017-17090</a>
-
- <p>memory leak from chan_skinny.
- If the chan_skinny (AKA SCCP protocol) channel driver is flooded with
- certain requests it can cause the asterisk process to use excessive
- amounts of virtual memory eventually causing asterisk to stop processing
- requests of any kind. The chan_skinny driver has been updated to release
- memory allocations in a correct manner thereby preventing any possiblity
- of exhaustion.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.8.13.1~dfsg1-3+deb7u8.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1225.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-1226.data b/english/lts/security/2017/dla-1226.data
deleted file mode 100644
index 149edfb2e6c..00000000000
--- a/english/lts/security/2017/dla-1226.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1226-1 wireshark</define-tag>
-<define-tag report_date>2017-12-31</define-tag>
-<define-tag secrefs>CVE-2017-11408 CVE-2017-17083 CVE-2017-17084 CVE-2017-17085</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-1226.wml b/english/lts/security/2017/dla-1226.wml
deleted file mode 100644
index f99e98faaee..00000000000
--- a/english/lts/security/2017/dla-1226.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that wireshark, a network protocol analyzer, contained
-several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,
-NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the
-execution of arbitrary code.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u8.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-1226.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-547-2.data b/english/lts/security/2017/dla-547-2.data
deleted file mode 100644
index b1a40b33623..00000000000
--- a/english/lts/security/2017/dla-547-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-547-2 graphicsmagick</define-tag>
-<define-tag report_date>2017-3-28</define-tag>
-<define-tag secrefs>CVE-2016-5240 Bug#N/A</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-547-2.wml b/english/lts/security/2017/dla-547-2.wml
deleted file mode 100644
index 100d81f049b..00000000000
--- a/english/lts/security/2017/dla-547-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-5240">CVE-2016-5240</a>
-was improperly applied which resulted in
-GraphicsMagick crashing instead of entering an infinite loop with the
-given proof of concept.</p>
-
-<p>Furthermore, the original announcement mistakently used the identifier
-"DLA 574-1" instead of the correct one, "DLA 547-1".</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u6.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-547-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-610-2.data b/english/lts/security/2017/dla-610-2.data
deleted file mode 100644
index 9b66c832eee..00000000000
--- a/english/lts/security/2017/dla-610-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-610-2 tiff3</define-tag>
-<define-tag report_date>2017-1-30</define-tag>
-<define-tag secrefs>Bug#852610</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-610-2.wml b/english/lts/security/2017/dla-610-2.wml
deleted file mode 100644
index 9a3bac9f3df..00000000000
--- a/english/lts/security/2017/dla-610-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Version 3.9.6-11+deb7u1 and 3.9.6-11+deb7u2 introduced changes that
-resulted in libtiff writing out invalid tiff files when the compression
-scheme in use relies on codec-specific TIFF tags embedded in the image.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u3.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-610-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-613-2.data b/english/lts/security/2017/dla-613-2.data
deleted file mode 100644
index db71e49a5f5..00000000000
--- a/english/lts/security/2017/dla-613-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-613-2 roundcube</define-tag>
-<define-tag report_date>2017-7-27</define-tag>
-<define-tag secrefs>Bug#843795 Bug#851214</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-613-2.wml b/english/lts/security/2017/dla-613-2.wml
deleted file mode 100644
index 7beb7d0a4a6..00000000000
--- a/english/lts/security/2017/dla-613-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA-613-1 caused a regression. A
-missing null parameter set the $task variable in the rcmail_url()
-function to a boolean value which led to service not available errors
-when viewing attached images. Updated packages are now available to
-correct this issue.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7.2-9+deb7u8.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-613-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-684-2.data b/english/lts/security/2017/dla-684-2.data
deleted file mode 100644
index 7f69fa6e788..00000000000
--- a/english/lts/security/2017/dla-684-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-684-2 libx11</define-tag>
-<define-tag report_date>2017-1-14</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-684-2.wml b/english/lts/security/2017/dla-684-2.wml
deleted file mode 100644
index f083af12dd5..00000000000
--- a/english/lts/security/2017/dla-684-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A possible invalid free was introduced in libx11 2:1.5.0-1+deb7u3,
-which could lead to application crashes or other issues.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.5.0-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-684-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-693-2.data b/english/lts/security/2017/dla-693-2.data
deleted file mode 100644
index cd1502e3f7d..00000000000
--- a/english/lts/security/2017/dla-693-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-693-2 tiff</define-tag>
-<define-tag report_date>2017-2-7</define-tag>
-<define-tag secrefs>Bug#852610</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-693-2.wml b/english/lts/security/2017/dla-693-2.wml
deleted file mode 100644
index 381c7ee3395..00000000000
--- a/english/lts/security/2017/dla-693-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Version 4.0.2-6+deb7u7 introduced changes that resulted in libtiff
-being unable to write out tiff files when the compression scheme
-in use relies on codec-specific TIFF tags embedded in the image.</p>
-
-<p>This problem manifested itself with errors like those:<br>
-$ tiffcp -r 16 -c jpeg sample.tif out.tif<br>
-_TIFFVGetField: out.tif: Invalid tag <q>Predictor</q> (not supported by codec).<br>
-_TIFFVGetField: out.tif: Invalid tag <q>BadFaxLines</q> (not supported by codec).<br>
-tiffcp: tif_dirwrite.c:687: TIFFWriteDirectorySec: Assertion `0' failed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u10.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-693-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-761-2.data b/english/lts/security/2017/dla-761-2.data
deleted file mode 100644
index 93a1e45aafa..00000000000
--- a/english/lts/security/2017/dla-761-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-761-2 python-bottle</define-tag>
-<define-tag report_date>2017-1-15</define-tag>
-<define-tag secrefs>Bug#850176</define-tag>
-<define-tag packages>python-bottle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-761-2.wml b/english/lts/security/2017/dla-761-2.wml
deleted file mode 100644
index 4cfa9adef91..00000000000
--- a/english/lts/security/2017/dla-761-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for python-bottle issued as DLA 761-1 would cause a crash
-if a unicode string was used in a header. Updated packages are now
-available to correct this issue.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.11-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your python-bottle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-761-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-770-2.data b/english/lts/security/2017/dla-770-2.data
deleted file mode 100644
index cd0e658b240..00000000000
--- a/english/lts/security/2017/dla-770-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-770-2 libphp-phpmailer</define-tag>
-<define-tag report_date>2017-1-3</define-tag>
-<define-tag secrefs>CVE-2016-10033 Bug#849365</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-770-2.wml b/english/lts/security/2017/dla-770-2.wml
deleted file mode 100644
index 742169a4cee..00000000000
--- a/english/lts/security/2017/dla-770-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski discovered that PHPMailer, a popular library to send
-email from PHP applications, allowed a remote attacker to execute
-code if they were able to provide a crafted Sender address.</p>
-
-<p>Note that for this issue also <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045">CVE-2016-10045</a> was assigned, which is a
-regression in the original patch proposed for <a href="https://security-tracker.debian.org/tracker/CVE-2016-10033">CVE-2016-10033</a>. Because
-the origial patch was not applied in Debian, Debian was not vulnerable
-to <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045">CVE-2016-10045</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1-1.2.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-770-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-772.data b/english/lts/security/2017/dla-772.data
deleted file mode 100644
index 718f3f45c33..00000000000
--- a/english/lts/security/2017/dla-772.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-772-1 linux</define-tag>
-<define-tag report_date>2017-1-1</define-tag>
-<define-tag secrefs>CVE-2012-6704 CVE-2015-1350 CVE-2015-8962 CVE-2015-8963 CVE-2015-8964 CVE-2016-7097 CVE-2016-7910 CVE-2016-7911 CVE-2016-7915 CVE-2016-8399 CVE-2016-8633 CVE-2016-8645 CVE-2016-8655 CVE-2016-9178 CVE-2016-9555 CVE-2016-9576 CVE-2016-9756 CVE-2016-9793 CVE-2016-9794 CVE-2016-10088 Bug#770492</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-772.wml b/english/lts/security/2017/dla-772.wml
deleted file mode 100644
index 62c8dce9453..00000000000
--- a/english/lts/security/2017/dla-772.wml
+++ /dev/null
@@ -1,167 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6704">CVE-2012-6704</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9793">CVE-2016-9793</a>
-
- <p>Eric Dumazet found that a local user with CAP_NET_ADMIN capability
- could set a socket's buffer size to be negative, leading to a
- denial of service or other security impact. Additionally, in
- kernel versions prior to 3.5, any user could do this if sysctl
- net.core.rmem_max was changed to a very large value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1350">CVE-2015-1350</a> / #770492
-
- <p>Ben Harris reported that local users could remove set-capability
- attributes from any file visible to them, allowing a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8962">CVE-2015-8962</a>
-
- <p>Calvin Owens fouund that removing a SCSI device while it was being
- accessed through the SCSI generic (sg) driver led to a double
- free, possibly causing a denial of service (crash or memory
- corruption) or privilege escalation. This could be exploited by
- local users with permision to access a SCSI device node.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8963">CVE-2015-8963</a>
-
- <p>Sasha Levin reported that hot-unplugging a CPU resulted in a
- use-after-free by the performance events (perf) subsystem,
- possibly causing a denial of service (crash or memory corruption)
- or privilege escalation. This could by exploited by any local
- user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8964">CVE-2015-8964</a>
-
- <p>It was found that the terminal/serial (tty) subsystem did not
- reliably reset the terminal buffer state when the terminal line
- discipline was changed. This could allow a local user with access
- to a terminal device to read sensitive information from kernel
- memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7097">CVE-2016-7097</a>
-
- <p>Jan Kara found that changing the POSIX ACL of a file never cleared
- its set-group-ID flag, which should be done if the user changing
- it is not a member of the group-owner. In some cases, this would
- allow the user-owner of an executable to gain the privileges of
- the group-owner.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7910">CVE-2016-7910</a>
-
- <p>Vegard Nossum discovered that a memory allocation failure while
- handling a read of /proc/diskstats or /proc/partitions could lead
- to a use-after-free, possibly causing a denial of service (crash
- or memory corruption) or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7911">CVE-2016-7911</a>
-
- <p>Dmitry Vyukov reported that a race between ioprio_get() and
- ioprio_set() system calls could result in a use-after-free,
- possibly causing a denial of service (crash) or leaking sensitive
- information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7915">CVE-2016-7915</a>
-
- <p>Benjamin Tissoires found that HID devices could trigger an out-of
- bounds memory access in the HID core. A physically present user
- could possibly use this for denial of service (crash) or to leak
- sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8399">CVE-2016-8399</a>
-
- <p>Qidan He reported that the IPv4 ping socket implementation did
- not validate the length of packets to be sent. A user with
- permisson to use ping sockets could cause an out-of-bounds read,
- possibly resulting in a denial of service or information leak.
- However, on Debian systems no users have permission to create ping
- sockets by default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8633">CVE-2016-8633</a>
-
- <p>Eyal Itkin reported that the IP-over-Firewire driver
- (firewire-net) did not validate the offset or length in link-layer
- fragmentation headers. This allowed a remote system connected by
- Firewire to write to memory after a packet buffer, leading to a
- denial of service (crash) or remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8645">CVE-2016-8645</a>
-
- <p>Marco Grassi reported that if a socket filter (BPF program)
- attached to a TCP socket truncates or removes the TCP header, this
- could cause a denial of service (crash). This was exploitable by
- any local user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8655">CVE-2016-8655</a>
-
- <p>Philip Pettersson found that the implementation of packet sockets
- (AF_PACKET family) had a race condition between enabling a
- transmit ring buffer and changing the version of buffers used,
- which could result in a use-after-free. A local user with the
- CAP_NET_ADMIN capability could exploit this for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9178">CVE-2016-9178</a>
-
- <p>Al Viro found that a failure to read data from user memory might
- lead to a information leak on the x86 architecture (amd64 or i386).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9555">CVE-2016-9555</a>
-
- <p>Andrey Konovalov reported that the SCTP implementation does not
- validate <q>out of the blue</q> packet chunk lengths early enough. A
- remote system able could use this to cause a denial of service
- (crash) or other security impact for systems using SCTP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9576">CVE-2016-9576</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-10088">CVE-2016-10088</a>
-
- <p>Dmitry Vyukov reported that using splice() with the SCSI generic
- driver led to kernel memory corruption. Local users with
- permision to access a SCSI device node could exploit this for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9756">CVE-2016-9756</a>
-
- <p>Dmitry Vyukov reported that KVM for the x86 architecture (amd64 or
- i386) did not correctly handle the failure of certain instructions
- that require software emulation on older processors. This could
- be exploited by guest systems to leak sensitive information or for
- denial of service (log spam).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9794">CVE-2016-9794</a>
-
- <p>Baozeng Ding reported a race condition in the ALSA (sound)
- subsystem that could result in a use-after-free. Local users with
- access to a PCM sound device could exploit this for denial of
- service (crash or memory corruption) or other security impact.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.84-1. This version also includes bug fixes from upstream version
-3.2.84 and updates the PREEMPT_RT featureset to version 3.2.84-rt122.
-Finally, this version adds the option to mitigate security issues in
-the performance events (perf) subsystem by disabling use by
-unprivileged users. This can be done by setting sysctl
-kernel.perf_event_paranoid=3.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.39-1 which will be included in the next point release (8.6).</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-772.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-773-2.data b/english/lts/security/2017/dla-773-2.data
deleted file mode 100644
index 8e6cc02d8b2..00000000000
--- a/english/lts/security/2017/dla-773-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-773-2 python-crypto</define-tag>
-<define-tag report_date>2017-1-4</define-tag>
-<define-tag secrefs>CVE-2013-7459 Bug##849495 Bug##850025 Bug##850077</define-tag>
-<define-tag packages>python-crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-773-2.wml b/english/lts/security/2017/dla-773-2.wml
deleted file mode 100644
index 6843c87dfce..00000000000
--- a/english/lts/security/2017/dla-773-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a regression in the recent update to
-python-crypto, a cryptographic algorithms and protocols for Python.</p>
-
-<p>We now raise a warning (not an error) on invalid input to avoid regressions in
-python-paramiko, duplicity. etc. introduced in in 2.6-4+deb7u4. Thanks to
-Salvatore Bonaccorso and Sebastian Ramacher.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-crypto version
-2.6-4+deb7u5.</p>
-
-<p>We recommend that you upgrade your python-crypto packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-773-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-773-3.data b/english/lts/security/2017/dla-773-3.data
deleted file mode 100644
index 93d2338ef19..00000000000
--- a/english/lts/security/2017/dla-773-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-773-3 python-crypto</define-tag>
-<define-tag report_date>2017-1-5</define-tag>
-<define-tag secrefs>CVE-2013-7459 Bug##849495 Bug##850025 Bug##850077</define-tag>
-<define-tag packages>python-crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-773-3.wml b/english/lts/security/2017/dla-773-3.wml
deleted file mode 100644
index 107f595917e..00000000000
--- a/english/lts/security/2017/dla-773-3.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the previous attempt to fix the regression in
-python-crypto, a cryptographic algorithms and protocols for Python, was
-incorrect.</p>
-
-<p>This regression was initially introduced in 2.6-4+deb7u4 and not correctly
-fixed in 2.6-4+deb7u5. We now really print a warning (not raise an exception)
-on invalid input. Thanks to Salvatore Bonaccorso and Sebastian Ramacher.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-crypto version
-2.6-4+deb7u6.</p>
-
-<p>We recommend that you upgrade your python-crypto packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-773-3.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-773-4.data b/english/lts/security/2017/dla-773-4.data
deleted file mode 100644
index fdac6e3fd17..00000000000
--- a/english/lts/security/2017/dla-773-4.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-773-4 python-crypto</define-tag>
-<define-tag report_date>2017-1-10</define-tag>
-<define-tag packages>python-crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-773-4.wml b/english/lts/security/2017/dla-773-4.wml
deleted file mode 100644
index 00045e6014d..00000000000
--- a/english/lts/security/2017/dla-773-4.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous security updates for python-crypto (DLA-773-1, DLA-773-2 &amp;
-DLA-773-3) were not available on non-amd64 architectures.</p>
-
-<p>This was due to the testsuite failing to exit gracefully when <q>multiprocessing</q>
-based tests were not functioning or available, such as on the Debian buildd
-network.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-crypto version
-2.6-4+deb7u7. There has been no change to the codepath associated with the
-original CVE (2013-7459).</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-773-4.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-773.data b/english/lts/security/2017/dla-773.data
deleted file mode 100644
index adbe9747b57..00000000000
--- a/english/lts/security/2017/dla-773.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-773-1 python-crypto</define-tag>
-<define-tag report_date>2017-1-1</define-tag>
-<define-tag secrefs>CVE-2013-7459 Bug#849495</define-tag>
-<define-tag packages>python-crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-773.wml b/english/lts/security/2017/dla-773.wml
deleted file mode 100644
index 64e70bcceca..00000000000
--- a/english/lts/security/2017/dla-773.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability in python-crypto, a library of
-cryptographic algorithms and protocols for Python. Calling AES.new with an
-invalid parameter could crash the Python interpreter:</p>
-
-<p><url "https://github.com/dlitz/pycrypto/issues/176"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-crypto version
-2.6-4+deb7u4.</p>
-
-<p>We recommend that you upgrade your python-crypto packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-773.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-774.data b/english/lts/security/2017/dla-774.data
deleted file mode 100644
index 052255350bc..00000000000
--- a/english/lts/security/2017/dla-774.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-774-1 postgresql-common</define-tag>
-<define-tag report_date>2017-1-1</define-tag>
-<define-tag packages>postgresql-common</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-774.wml b/english/lts/security/2017/dla-774.wml
deleted file mode 100644
index f6944c6e650..00000000000
--- a/english/lts/security/2017/dla-774.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability and a data loss bug have been found in
-postgresql-common, Debian's PostgreSQL database cluster management
-tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1255">CVE-2016-1255</a>
-
- <p>Dawid Golunski discovered that a symlink in /var/log/postgresql/
- could be used by the <q>postgres</q> system user to write to arbitrary
- files on the filesystem the next time PostgreSQL is started by
- root.</p></li>
-
-<li>#614374
-
- <p>Rafał Kupka discovered that pg_upgradecluster did not properly
- upgrade databases that are owned by a non-login role (or group).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-134wheezy5.</p>
-
-<p>We recommend that you upgrade your postgresql-common packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-774.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-775.data b/english/lts/security/2017/dla-775.data
deleted file mode 100644
index cd42df5f2fd..00000000000
--- a/english/lts/security/2017/dla-775.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-775-1 hplip</define-tag>
-<define-tag report_date>2017-1-1</define-tag>
-<define-tag secrefs>CVE-2015-0839 Bug##787353</define-tag>
-<define-tag packages>hplip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-775.wml b/english/lts/security/2017/dla-775.wml
deleted file mode 100644
index 8b911441cdb..00000000000
--- a/english/lts/security/2017/dla-775.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0839">CVE-2015-0839</a>
-
- <p>The hplip plugin download function verifies the driver using a
- short-key. This is not secure because it is trivial to
- generate keys with arbitrary key IDs.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.12.6-3.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your hplip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-775.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-776.data b/english/lts/security/2017/dla-776.data
deleted file mode 100644
index 4b3e885c62c..00000000000
--- a/english/lts/security/2017/dla-776.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-776-1 samba</define-tag>
-<define-tag report_date>2017-1-2</define-tag>
-<define-tag secrefs>CVE-2016-2125</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-776.wml b/english/lts/security/2017/dla-776.wml
deleted file mode 100644
index 8a6e63f3d56..00000000000
--- a/english/lts/security/2017/dla-776.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Simo Sorce of Red Hat discovered that the Samba client code always
-requests a forwardable ticket when using Kerberos authentication. A
-target server, which must be in the current or trusted domain/realm,
-is given a valid general purpose Kerberos <q>Ticket Granting Ticket</q>
-(TGT), which can be used to fully impersonate the authenticated user
-or service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.6.6-6+deb7u11.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-776.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-777.data b/english/lts/security/2017/dla-777.data
deleted file mode 100644
index b6b69685af1..00000000000
--- a/english/lts/security/2017/dla-777.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-777-1 libvncserver</define-tag>
-<define-tag report_date>2017-1-3</define-tag>
-<define-tag secrefs>CVE-2016-9941 CVE-2016-9942 Bug##850007 Bug##850008</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-777.wml b/english/lts/security/2017/dla-777.wml
deleted file mode 100644
index fea0f2f02c2..00000000000
--- a/english/lts/security/2017/dla-777.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities in libvncserver, a
-library to create/embed a VNC server:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9941">CVE-2016-9941</a>
-
- <p>Fix a heap-based buffer overflow that allows remote servers
- to cause a denial of service via a crafted FramebufferUpdate message
- containing a subrectangle outside of the drawing area.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9942">CVE-2016-9942</a>
-
- <p>Fix a heap-based buffer overflow that allow remote servers
- to cause a denial of service via a crafted FramebufferUpdate message with
- the <q>Ultra</q> type tile such that the LZO decompressed payload exceeds the
- size of the tile dimensions.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in libvncserver version
-0.9.9+dfsg-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-777.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-778.data b/english/lts/security/2017/dla-778.data
deleted file mode 100644
index 9e51dc4880f..00000000000
--- a/english/lts/security/2017/dla-778.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-778-1 pcsc-lite</define-tag>
-<define-tag report_date>2017-1-6</define-tag>
-<define-tag secrefs>CVE-2016-10109</define-tag>
-<define-tag packages>pcsc-lite</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-778.wml b/english/lts/security/2017/dla-778.wml
deleted file mode 100644
index 2cd59cbe938..00000000000
--- a/english/lts/security/2017/dla-778.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after-free and double-free vulnerability
-in pcsc-lite, a library to access smart cards that use the Windows(R) SCard
-interface ("PC/SC").</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in pcsc-lite version
-1.8.4-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your pcsc-lite packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-778.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-779.data b/english/lts/security/2017/dla-779.data
deleted file mode 100644
index c6782871d4a..00000000000
--- a/english/lts/security/2017/dla-779.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-779-1 tomcat7</define-tag>
-<define-tag report_date>2017-1-10</define-tag>
-<define-tag secrefs>CVE-2016-8745 Bug#849949</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-779.wml b/english/lts/security/2017/dla-779.wml
deleted file mode 100644
index 9490e0529e8..00000000000
--- a/english/lts/security/2017/dla-779.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A bug in the error handling of the send file code for the NIO HTTP
-connector resulted in the current Processor object being added to the
-Processor cache multiple times. This in turn meant that the same
-Processor could be used for concurrent requests. Sharing a Processor
-can result in information leakage between requests including, not
-limited to, session ID and the response body.</p>
-
-<p>In addition this update also addresses a regression when running
-Tomcat 7 with SecurityManager enabled due to an incomplete fix for
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-6816">CVE-2016-6816</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u9.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-779.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-780.data b/english/lts/security/2017/dla-780.data
deleted file mode 100644
index 0fcdc3066bf..00000000000
--- a/english/lts/security/2017/dla-780.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-780-1 libav</define-tag>
-<define-tag report_date>2017-1-12</define-tag>
-<define-tag secrefs>CVE-2016-7424</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-780.wml b/english/lts/security/2017/dla-780.wml
deleted file mode 100644
index da6197fb972..00000000000
--- a/english/lts/security/2017/dla-780.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in libav:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7424">CVE-2016-7424</a>
-
- <p>The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in
- libav 11.7 and earlier allows remote attackers to cause a denial
- of service (NULL pointer dereference and crash) via a crafted MP3
- file.</p></li>
-
-<li>(No CVE assigned)
-
- <p>The h264 codec is vulnerable to various crashes with invalid-free,
- corrupted double-linked list or out-of-bounds read.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6:0.8.19-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-780.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-781-2.data b/english/lts/security/2017/dla-781-2.data
deleted file mode 100644
index a4adfcbafc2..00000000000
--- a/english/lts/security/2017/dla-781-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-781-2 asterisk</define-tag>
-<define-tag report_date>2017-1-27</define-tag>
-<define-tag secrefs>CVE-2014-2287</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-781-2.wml b/english/lts/security/2017/dla-781-2.wml
deleted file mode 100644
index 78cdf32b4a3..00000000000
--- a/english/lts/security/2017/dla-781-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brad Barnett found that the recent security update of Asterisk could
-cause immediate SIP termination due to an incomplete fix for
-<a href="https://security-tracker.debian.org/tracker/CVE-2014-2287">CVE-2014-2287</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.8.13.1~dfsg1-3+deb7u6.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-781-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-781.data b/english/lts/security/2017/dla-781.data
deleted file mode 100644
index e13d44d16ca..00000000000
--- a/english/lts/security/2017/dla-781.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-781-1 asterisk</define-tag>
-<define-tag report_date>2017-1-13</define-tag>
-<define-tag secrefs>CVE-2014-2287 CVE-2016-7551 Bug#838832 Bug#741313</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-781.wml b/english/lts/security/2017/dla-781.wml
deleted file mode 100644
index 5283f9943bf..00000000000
--- a/english/lts/security/2017/dla-781.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in Asterisk, an Open
-Source PBX and telephony toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2287">CVE-2014-2287</a>
-
- <p>channels/chan_sip.c in Asterisk when chan_sip has a certain
- configuration, allows remote authenticated users to cause a denial
- of service (channel and file descriptor consumption) via an INVITE
- request with a (1) Session-Expires or (2) Min-SE header with a
- malformed or invalid value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7551">CVE-2016-7551</a>
-
- <p>The overlap dialing feature in chan_sip allows chan_sip to report
- to a device that the number that has been dialed is incomplete and
- more digits are required. If this functionality is used with a
- device that has performed username/password authentication RTP
- resources are leaked. This occurs because the code fails to release
- the old RTP resources before allocating new ones in this scenario.
- If all resources are used then RTP port exhaustion will occur and
- no RTP sessions are able to be set up.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.8.13.1~dfsg1-3+deb7u5.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-781.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-782.data b/english/lts/security/2017/dla-782.data
deleted file mode 100644
index 84b57c7a34c..00000000000
--- a/english/lts/security/2017/dla-782.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-782-1 icedove</define-tag>
-<define-tag report_date>2017-1-13</define-tag>
-<define-tag secrefs>CVE-2016-9893 CVE-2016-9895 CVE-2016-9897 CVE-2016-9898 CVE-2016-9899 CVE-2016-9900 CVE-2016-9904 CVE-2016-9905</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-782.wml b/english/lts/security/2017/dla-782.wml
deleted file mode 100644
index 9d0a8af9c6f..00000000000
--- a/english/lts/security/2017/dla-782.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Icedove, Debian's version of
-the Mozilla Thunderbird mail client: Multiple vulnerabilities may lead
-to the execution of arbitrary code, data leakage or bypass of the content
-security policy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.6.0-2.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-782.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-783.data b/english/lts/security/2017/dla-783.data
deleted file mode 100644
index 22096b9e66b..00000000000
--- a/english/lts/security/2017/dla-783.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-783-1 xen</define-tag>
-<define-tag report_date>2017-1-13</define-tag>
-<define-tag secrefs>CVE-2016-10013 CVE-2016-10024</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-783.wml b/english/lts/security/2017/dla-783.wml
deleted file mode 100644
index 456756da644..00000000000
--- a/english/lts/security/2017/dla-783.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10013">CVE-2016-10013</a> (xsa-204)
-
- <p>Xen mishandles SYSCALL singlestep during emulation which can lead to
- privilege escalation. The vulnerability is only exposed to 64-bit x86
- HVM guests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10024">CVE-2016-10024</a> (xsa-202)
-
- <p>PV guests may be able to mask interrupts causing a Denial of Service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-5.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-783.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-784.data b/english/lts/security/2017/dla-784.data
deleted file mode 100644
index 11e305dd844..00000000000
--- a/english/lts/security/2017/dla-784.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-784-1 gcc-mozilla</define-tag>
-<define-tag report_date>2017-1-14</define-tag>
-<define-tag packages>gcc-mozilla</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-784.wml b/english/lts/security/2017/dla-784.wml
deleted file mode 100644
index c2eb3ead2a9..00000000000
--- a/english/lts/security/2017/dla-784.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>GCC 4.8 has been packaged as gcc-mozilla for Debian 7. This package
-will be needed for future updates to firefox-esr and icedove, and
-possibly other packages that require new versions of GCC.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in gcc-mozilla version 4.8.4-0deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-784.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-785.data b/english/lts/security/2017/dla-785.data
deleted file mode 100644
index e685e9fb6f9..00000000000
--- a/english/lts/security/2017/dla-785.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-785-1 wireless-regdb</define-tag>
-<define-tag report_date>2017-1-16</define-tag>
-<define-tag packages>wireless-regdb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-785.wml b/english/lts/security/2017/dla-785.wml
deleted file mode 100644
index 9dde7a44b64..00000000000
--- a/english/lts/security/2017/dla-785.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in wireless-regdb 2016.06.10,
-reflecting changes to radio regulations in many countries and adding
-information about additional countries.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, the update is available as version
-2016.06.10-1~deb7u1. For Debian 8 <q>Jessie</q>, it is available as
-version 2016.06.10-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your wireless-regdb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-785.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-786.data b/english/lts/security/2017/dla-786.data
deleted file mode 100644
index 23e7fb083a6..00000000000
--- a/english/lts/security/2017/dla-786.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-786-1 botan1.10</define-tag>
-<define-tag report_date>2017-1-16</define-tag>
-<define-tag secrefs>CVE-2016-9132</define-tag>
-<define-tag packages>botan1.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-786.wml b/english/lts/security/2017/dla-786.wml
deleted file mode 100644
index 6b9ffdb0ac0..00000000000
--- a/english/lts/security/2017/dla-786.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an integer overflow vulnerability
-in botan, a cryptography library. This could occur while parsing
-untrusted inputs such as X.509 certificates.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-1.10.5-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your botan1.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-786.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-787.data b/english/lts/security/2017/dla-787.data
deleted file mode 100644
index 910524bb7ae..00000000000
--- a/english/lts/security/2017/dla-787.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-787-1 otrs2</define-tag>
-<define-tag report_date>2017-1-16</define-tag>
-<define-tag secrefs>CVE-2016-9139 Bug#843091</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-787.wml b/english/lts/security/2017/dla-787.wml
deleted file mode 100644
index 0839a07905f..00000000000
--- a/english/lts/security/2017/dla-787.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A cross-site sripting vulnerability (XSS) was discovered in OTRS, a
-ticket requesting system for the web. An attacker could trick an
-authenticated user into opening a malicious attachment which could
-lead to the execution of JavaScript in OTRS context.
-This update addresses the vulnerability by setting a strict default
-HTTP content security policy that forbids loading of third-party files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1.7+dfsg1-8+deb7u6.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-787.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-788.data b/english/lts/security/2017/dla-788.data
deleted file mode 100644
index eb06df85203..00000000000
--- a/english/lts/security/2017/dla-788.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-788-1 pdns-recursor</define-tag>
-<define-tag report_date>2017-1-16</define-tag>
-<define-tag secrefs>CVE-2016-9139</define-tag>
-<define-tag packages>pdns-recursor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-788.wml b/english/lts/security/2017/dla-788.wml
deleted file mode 100644
index 6120206ede6..00000000000
--- a/english/lts/security/2017/dla-788.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Florian Heinz and Martin Kluge reported that pdns-recursor, a recursive
-DNS server, parses all records present in a query regardless of whether
-they are needed or even legitimate, allowing a remote, unauthenticated
-attacker to cause an abnormal CPU usage load on the pdns server,
-resulting in a partial denial of service if the system becomes
-overloaded.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.3-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your pdns-recursor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-788.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-789.data b/english/lts/security/2017/dla-789.data
deleted file mode 100644
index 4b075d9a8a8..00000000000
--- a/english/lts/security/2017/dla-789.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-789-1 icoutils</define-tag>
-<define-tag report_date>2017-1-17</define-tag>
-<define-tag secrefs>CVE-2017-5208 CVE-2017-5331 CVE-2017-5332 CVE-2017-5333 Bug#850017</define-tag>
-<define-tag packages>icoutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-789.wml b/english/lts/security/2017/dla-789.wml
deleted file mode 100644
index 277b01ce94c..00000000000
--- a/english/lts/security/2017/dla-789.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5208">CVE-2017-5208</a>
-
- <p>Choongwoo Han reported[0] an exploitable crash in wrestool from
- icoutils. The command line tools is e.g. used in KDE's
- metadataparsing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5331">CVE-2017-5331</a>
-
- <p>It turned out that the correction for <a href="https://security-tracker.debian.org/tracker/CVE-2017-5208">CVE-2017-5208</a> was not enough
- so an additional correction was needed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5332">CVE-2017-5332</a>
-
- <p>But as I see it there are still combinations of the arguments which
- make the test succeed even though the the memory block identified by
- offset size is not fully inside memory total_size.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5333">CVE-2017-5333</a>
-
- <p>The memory check was not stringent enough on 64 bit systems.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.29.1-5deb7u1.</p>
-
-<p>We recommend that you upgrade your icoutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-789.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-790.data b/english/lts/security/2017/dla-790.data
deleted file mode 100644
index 652cfb05489..00000000000
--- a/english/lts/security/2017/dla-790.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-790-1 mapserver</define-tag>
-<define-tag report_date>2017-1-19</define-tag>
-<define-tag secrefs>CVE-2017-5522</define-tag>
-<define-tag packages>mapserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-790.wml b/english/lts/security/2017/dla-790.wml
deleted file mode 100644
index 6c91d835b5e..00000000000
--- a/english/lts/security/2017/dla-790.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that mapserver, a CGI-based framework for Internet
-map services, was vulnerable to a stack-based overflow. This issue
-allowed a remote user to crash the service, or potentially execute
-arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.0.1-3.2+deb7u4.</p>
-
-<p>We recommend that you upgrade your mapserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-790.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-791.data b/english/lts/security/2017/dla-791.data
deleted file mode 100644
index 6e5d896d325..00000000000
--- a/english/lts/security/2017/dla-791.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-791-1 libav</define-tag>
-<define-tag report_date>2017-1-19</define-tag>
-<define-tag secrefs>CVE-2016-9819 CVE-2016-9820 CVE-2016-9821 CVE-2016-9822</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-791.wml b/english/lts/security/2017/dla-791.wml
deleted file mode 100644
index 6d95cebc398..00000000000
--- a/english/lts/security/2017/dla-791.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple integer overflows have been discovered in libav 11.8 and earlier,
-allowing remote attackers to cause a crash via a crafted MP3 file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6:0.8.20-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-791.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-792.data b/english/lts/security/2017/dla-792.data
deleted file mode 100644
index b9fbb8a0594..00000000000
--- a/english/lts/security/2017/dla-792.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-792-1 libphp-swiftmailer</define-tag>
-<define-tag report_date>2017-1-19</define-tag>
-<define-tag secrefs>CVE-2016-10074 Bug#849626</define-tag>
-<define-tag packages>libphp-swiftmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-792.wml b/english/lts/security/2017/dla-792.wml
deleted file mode 100644
index baecdaf83a5..00000000000
--- a/english/lts/security/2017/dla-792.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski from legalhackers-com [1] discovered that the mail
-transport in Swift Mailer allowed remote attackers to pass extra
-parameters to the mail command and consequently execute arbitrary code
-via a \" (backslash double quote) in a crafted e-mail address in the
-From, ReturnPath, or Sender header.</p>
-
-<p>[1] <url "https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.5-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libphp-swiftmailer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-792.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-793.data b/english/lts/security/2017/dla-793.data
deleted file mode 100644
index 5300922265e..00000000000
--- a/english/lts/security/2017/dla-793.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-793-1 opus</define-tag>
-<define-tag report_date>2017-1-22</define-tag>
-<define-tag secrefs>CVE-2017-0381 Bug#851612</define-tag>
-<define-tag packages>opus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-793.wml b/english/lts/security/2017/dla-793.wml
deleted file mode 100644
index 5a450f9d8b7..00000000000
--- a/english/lts/security/2017/dla-793.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A remote code execution vulnerability was discovered in opus, an audio
-codec, that could enable an attacker using a specially crafted file to
-cause memory corruption during media file and data processing.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.14+20120615-1+nmu1+deb7u1.</p>
-
-<p>We recommend that you upgrade your opus packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-793.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-794.data b/english/lts/security/2017/dla-794.data
deleted file mode 100644
index 77d64a9d87f..00000000000
--- a/english/lts/security/2017/dla-794.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-794-1 groovy</define-tag>
-<define-tag report_date>2017-1-22</define-tag>
-<define-tag secrefs>CVE-2016-6814 Bug#851408</define-tag>
-<define-tag packages>groovy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-794.wml b/english/lts/security/2017/dla-794.wml
deleted file mode 100644
index a7affcf4af1..00000000000
--- a/english/lts/security/2017/dla-794.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that a flaw in Apache Groovy, a dynamic language for the
-Java Virtual Machine, allows remote code execution wherever
-deserialization occurs in the application. It is possible for an
-attacker to craft a special serialized object that will execute code
-directly when deserialized. All applications which rely on
-serialization and do not isolate the code which deserializes objects
-are subject to this vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.6-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your groovy packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-794.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-795.data b/english/lts/security/2017/dla-795.data
deleted file mode 100644
index 7ac8ac64226..00000000000
--- a/english/lts/security/2017/dla-795.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-795-1 tiff</define-tag>
-<define-tag report_date>2017-1-23</define-tag>
-<define-tag secrefs>CVE-2016-3622 CVE-2016-3623 CVE-2016-3624 CVE-2016-3945 CVE-2016-3990 CVE-2016-9533 CVE-2016-9534 CVE-2016-9535 CVE-2016-9536 CVE-2016-9537 CVE-2016-9538 CVE-2016-9540 CVE-2016-10092 CVE-2016-10093 CVE-2017-5225 Bug#846837 Bug#820365 Bug#836570 Bug#851297</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-795.wml b/english/lts/security/2017/dla-795.wml
deleted file mode 100644
index 487673d3f8c..00000000000
--- a/english/lts/security/2017/dla-795.wml
+++ /dev/null
@@ -1,124 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Numerous security vulnerabilities have been found through fuzzing on
-various tiff-related binaries. Crafted TIFF images allows remote
-attacks to cause denial of service or, in certain cases arbitrary code
-execution through divide-by-zero, out of bunds write, integer and heap
-overflow.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3622">CVE-2016-3622</a>
-
- <p>The fpAcc function in tif_predict.c in the tiff2rgba tool in
- LibTIFF 4.0.6 and earlier allows remote attackers to cause a
- denial of service (divide-by-zero error) via a crafted TIFF image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3623">CVE-2016-3623</a>
-
- <p>The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote
- attackers to cause a denial of service (divide-by-zero) by setting
- the (1) v or (2) h parameter to 0. (Fixed along with
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-3624">CVE-2016-3624</a>.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3624">CVE-2016-3624</a>
-
- <p>The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and
- earlier allows remote attackers to cause a denial of service
- (out-of-bounds write) by setting the "-v" option to -1.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3945">CVE-2016-3945</a>
-
- <p>Multiple integer overflows in the (1) cvt_by_strip and (2)
- cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and
- earlier, when -b mode is enabled, allow remote attackers to cause
- a denial of service (crash) or execute arbitrary code via a
- crafted TIFF image, which triggers an out-of-bounds write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3990">CVE-2016-3990</a>
-
- <p>Heap-based buffer overflow in the horizontalDifference8 function
- in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote
- attackers to cause a denial of service (crash) or execute
- arbitrary code via a crafted TIFF image to tiffcp.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9533">CVE-2016-9533</a>
-
- <p>tif_pixarlog.c in libtiff 4.0.6 has out-of-bounds write
- vulnerabilities in heap allocated buffers. Reported as MSVR 35094,
- aka "PixarLog horizontalDifference heap-buffer-overflow."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9534">CVE-2016-9534</a>
-
- <p>tif_write.c in libtiff 4.0.6 has an issue in the error code path
- of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp
- members. Reported as MSVR 35095, aka "TIFFFlushData1
- heap-buffer-overflow."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9535">CVE-2016-9535</a>
-
- <p>tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions
- that can lead to assertion failures in debug mode, or buffer
- overflows in release mode, when dealing with unusual tile size
- like YCbCr with subsampling. Reported as MSVR 35105, aka
- "Predictor heap-buffer-overflow."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9536">CVE-2016-9536</a>
-
- <p>tools/tiff2pdf.c in libtiff 4.0.6 has out-of-bounds write
- vulnerabilities in heap allocated buffers in
- t2p_process_jpeg_strip(). Reported as MSVR 35098, aka
- "t2p_process_jpeg_strip heap-buffer-overflow."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9537">CVE-2016-9537</a>
-
- <p>tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write
- vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096,
- and MSVR 35097.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9538">CVE-2016-9538</a>
-
- <p>tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in
- readContigStripsIntoBuffer() because of a uint16 integer
- overflow. Reported as MSVR 35100.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9540">CVE-2016-9540</a>
-
- <p>tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on
- tiled images with odd tile width versus image width. Reported as
- MSVR 35103, aka cpStripToTile heap-buffer-overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10092">CVE-2016-10092</a>
-
- <p>heap-buffer-overflow in tiffcrop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10093">CVE-2016-10093</a>
-
- <p>uint32 underflow/overflow that can cause heap-based buffer
- overflow in tiffcp</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5225">CVE-2017-5225</a>
-
- <p>LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in
- the tools/tiffcp resulting in DoS or code execution via a crafted
- BitsPerSample value.</p></li>
-
-<li>Bug #846837
-
- <p>heap-based buffer verflow in TIFFFillStrip (tif_read.c)</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u9.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-795.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-796.data b/english/lts/security/2017/dla-796.data
deleted file mode 100644
index bf645afc303..00000000000
--- a/english/lts/security/2017/dla-796.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-795-1 hesiod</define-tag>
-<define-tag report_date>2017-1-23</define-tag>
-<define-tag secrefs>CVE-2016-10151 CVE-2016-10152 Bug##852094 Bug#852093</define-tag>
-<define-tag packages>hesiod</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-796.wml b/english/lts/security/2017/dla-796.wml
deleted file mode 100644
index efcb42c70d4..00000000000
--- a/english/lts/security/2017/dla-796.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities in hesiod, Project
-Athena's DNS-based directory service:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10151">CVE-2016-10151</a>
-
- <p>A weak SUID check allowing privilege elevation.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10152">CVE-2016-10152</a>
-
- <p>Use of a hard-coded DNS fallback domain
- (athena.mit.edu) if configuration file could not be read.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in hesiod version
-3.0.2-21+deb7u1.</p>
-
-<p>We recommend that you upgrade your hesiod packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-795.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-797.data b/english/lts/security/2017/dla-797.data
deleted file mode 100644
index cb8ac62db57..00000000000
--- a/english/lts/security/2017/dla-797.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-797-1 mysql-5.5</define-tag>
-<define-tag report_date>2017-1-25</define-tag>
-<define-tag secrefs>CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3258 CVE-2017-3265 CVE-2017-3291 CVE-2017-3312 CVE-2017-3313 CVE-2017-3317 CVE-2017-3318 Bug#851233</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-797.wml b/english/lts/security/2017/dla-797.wml
deleted file mode 100644
index 17cdd717e8f..00000000000
--- a/english/lts/security/2017/dla-797.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.54, which includes additional changes, such as performance
-improvements, bug fixes, new features, and possibly incompatible
-changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html"></li>
-<li><a href="http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html">http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.54-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-797.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-798.data b/english/lts/security/2017/dla-798.data
deleted file mode 100644
index e00966bf140..00000000000
--- a/english/lts/security/2017/dla-798.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-798-1 pdns</define-tag>
-<define-tag report_date>2017-1-25</define-tag>
-<define-tag secrefs>CVE-2016-2120 CVE-2016-7068 CVE-2016-7072 CVE-2016-7073 CVE-2016-7074</define-tag>
-<define-tag packages>pdns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-798.wml b/english/lts/security/2017/dla-798.wml
deleted file mode 100644
index efdec4aba02..00000000000
--- a/english/lts/security/2017/dla-798.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in pdns, an authoritative
-DNS server. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2120">CVE-2016-2120</a>
-
- <p>Mathieu Lafon discovered that pdns does not properly validate
- records in zones. An authorized user can take advantage of this flaw
- to crash server by inserting a specially crafted record in a zone
- under their control and then sending a DNS query for that record.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7068">CVE-2016-7068</a>
-
- <p>Florian Heinz and Martin Kluge reported that pdns parses all records
- present in a query regardless of whether they are needed or even
- legitimate, allowing a remote, unauthenticated attacker to cause an
- abnormal CPU usage load on the pdns server, resulting in a partial
- denial of service if the system becomes overloaded.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7072">CVE-2016-7072</a>
-
- <p>Mongo discovered that the webserver in pdns is susceptible to a
- denial-of-service vulnerability. A remote, unauthenticated attacker
- to cause a denial of service by opening a large number of f TCP
- connections to the web server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7073">CVE-2016-7073</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-7074">CVE-2016-7074</a>
-
- <p>Mongo discovered that pdns does not sufficiently validate TSIG
- signatures, allowing an attacker in position of man-in-the-middle to
- alter the content of an AXFR.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1-4.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your pdns packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-798.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-799.data b/english/lts/security/2017/dla-799.data
deleted file mode 100644
index d2d1dd276e7..00000000000
--- a/english/lts/security/2017/dla-799.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-799-1 ming</define-tag>
-<define-tag report_date>2017-1-26</define-tag>
-<define-tag secrefs>CVE-2016-9264 CVE-2016-9265 CVE-2016-9266 CVE-2016-9827 CVE-2016-9828 CVE-2016-9829 CVE-2016-9831 Bug#843928</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-799.wml b/english/lts/security/2017/dla-799.wml
deleted file mode 100644
index 7aa3c904c23..00000000000
--- a/english/lts/security/2017/dla-799.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security issues have been found in Ming. They may lead
-to the execution of arbitrary code or causing application crash.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9264">CVE-2016-9264</a>
-
- <p>global-buffer-overflow in printMP3Headers</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9265">CVE-2016-9265</a>
-
- <p>divide-by-zero in printMP3Headers</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9266">CVE-2016-9266</a>
-
- <p>left shift in listmp3.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9827">CVE-2016-9827</a>
-
- <p>listswf: heap-based buffer overflow in _iprintf</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9828">CVE-2016-9828</a>
-
- <p>listswf: heap-based buffer overflow in _iprintf</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9829">CVE-2016-9829</a>
-
- <p>listswf: NULL pointer dereference in dumpBuffer</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9831">CVE-2016-9831</a>
-
- <p>listswf: heap-based buffer overflow in parseSWF_RGBA</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.4.4-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-799.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-800.data b/english/lts/security/2017/dla-800.data
deleted file mode 100644
index b141728928f..00000000000
--- a/english/lts/security/2017/dla-800.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-800-1 firefox-esr</define-tag>
-<define-tag report_date>2017-1-26</define-tag>
-<define-tag secrefs>CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 CVE-2017-5378 CVE-2017-5380 CVE-2017-5383 CVE-2017-5386 CVE-2017-5390 CVE-2017-5396</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-800.wml b/english/lts/security/2017/dla-800.wml
deleted file mode 100644
index 5108916b0a2..00000000000
--- a/english/lts/security/2017/dla-800.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees and other
-implementation errors may lead to the execution of arbitrary code or
-information leaks or privilege escalation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.7.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-800.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-801.data b/english/lts/security/2017/dla-801.data
deleted file mode 100644
index 226daba0c7a..00000000000
--- a/english/lts/security/2017/dla-801.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-801-1 libxpm</define-tag>
-<define-tag report_date>2017-1-26</define-tag>
-<define-tag secrefs>CVE-2016-10164</define-tag>
-<define-tag packages>libxpm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-801.wml b/english/lts/security/2017/dla-801.wml
deleted file mode 100644
index 6af269899b3..00000000000
--- a/english/lts/security/2017/dla-801.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Stoeckmann discovered a vulnerability in the libXpm library
-that could cause a malicious attacker to execute arbitrary code
-via a specially crafted XPM file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:3.5.10-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libxpm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-801.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-802.data b/english/lts/security/2017/dla-802.data
deleted file mode 100644
index d5882f3afbc..00000000000
--- a/english/lts/security/2017/dla-802.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-802-1 openjdk-7</define-tag>
-<define-tag report_date>2017-1-26</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-802.wml b/english/lts/security/2017/dla-802.wml
deleted file mode 100644
index 5a8e0d47aba..00000000000
--- a/english/lts/security/2017/dla-802.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>openjdk-7 7u111-2.6.7-2~deb7u1 backported the security fixes from
-7u121. openjdk-7 has now been updated to the full 7u121 version,
-which includes extra bug fixes and other improvements.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u121-2.6.8-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-802.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-803.data b/english/lts/security/2017/dla-803.data
deleted file mode 100644
index d8f4dae53d8..00000000000
--- a/english/lts/security/2017/dla-803.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-803-1 lcms2</define-tag>
-<define-tag report_date>2017-1-26</define-tag>
-<define-tag secrefs>CVE-2016-10165 Bug#https://bugs.debian.org/852627</define-tag>
-<define-tag packages>lcms2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-803.wml b/english/lts/security/2017/dla-803.wml
deleted file mode 100644
index a6889c5e892..00000000000
--- a/english/lts/security/2017/dla-803.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out of bounds read was found in lcms2, which can lead to heap memory
-leak or denial of service via a specially-crafted ICC profile.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2+git20110628-2.2+deb7u2.</p>
-
-<p>We recommend that you upgrade your lcms2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-803.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-804.data b/english/lts/security/2017/dla-804.data
deleted file mode 100644
index 43a6afa5b06..00000000000
--- a/english/lts/security/2017/dla-804.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-804-1 libgd2</define-tag>
-<define-tag report_date>2017-1-29</define-tag>
-<define-tag secrefs>CVE-2016-9317 CVE-2016-10167 CVE-2016-10168</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-804.wml b/english/lts/security/2017/dla-804.wml
deleted file mode 100644
index 77dad4562e5..00000000000
--- a/english/lts/security/2017/dla-804.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the GD Graphics Library.
-They may lead to the execution of arbitrary code or causing
-application crash.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9317">CVE-2016-9317</a>
-
- <p>Signed integer overflow in gd_io.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10167">CVE-2016-10167</a>
-
- <p>Improper handling of issing image data can cause crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10168">CVE-2016-10168</a>
-
- <p>GD2 stores the number of horizontal and vertical chunks as words
- (i.e. 2 byte unsigned). These values are multiplied and assigned to
- an int when reading the image, what can cause integer overflows.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.36~rc1~dfsg-6.1+deb7u8.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-804.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-805.data b/english/lts/security/2017/dla-805.data
deleted file mode 100644
index ef123280294..00000000000
--- a/english/lts/security/2017/dla-805.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-805-1 bind9</define-tag>
-<define-tag report_date>2017-1-29</define-tag>
-<define-tag secrefs>CVE-2016-9131 CVE-2016-9147 CVE-2016-9444</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-805.wml b/english/lts/security/2017/dla-805.wml
deleted file mode 100644
index 00c8e1c3dc4..00000000000
--- a/english/lts/security/2017/dla-805.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several denial-of-service vulnerabilities (assertion failures) were
-discovered in BIND, a DNS server implementation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9131">CVE-2016-9131</a>
-
- <p>A crafted upstream response to an ANY query could cause an
- assertion failure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9147">CVE-2016-9147</a>
-
- <p>A crafted upstream response with self-contradicting DNSSEC data
- could cause an assertion failure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9444">CVE-2016-9444</a>
-
- <p>Specially-crafted upstream responses with a DS record could cause
- an assertion failure.</p></li>
-
-</ul>
-
-<p>These vulnerabilities predominantly affect DNS servers providing
-recursive service. Client queries to authoritative-only servers
-cannot trigger these assertion failures. These vulnerabilities are
-present whether or not DNSSEC validation is enabled in the server
-configuration.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u14.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-805.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-806.data b/english/lts/security/2017/dla-806.data
deleted file mode 100644
index 858c4b69eb8..00000000000
--- a/english/lts/security/2017/dla-806.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-806-1 zoneminder</define-tag>
-<define-tag report_date>2017-1-29</define-tag>
-<define-tag secrefs>CVE-2016-10140</define-tag>
-<define-tag packages>zoneminder</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-806.wml b/english/lts/security/2017/dla-806.wml
deleted file mode 100644
index 1a2738be31e..00000000000
--- a/english/lts/security/2017/dla-806.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Information disclosure and authentication bypass vulnerability exists in
-the Apache HTTP Server configuration bundled with ZoneMinder v1.30.0,
-which allows a remote unauthenticated attacker to browse all directories
-in the web root, e.g., a remote unauthenticated attacker can view all
-CCTV images on the server.</p>
-
-<p>For new installations, the new config file will be automatically
-installed. For existing installations, please follow the instructions in
-NEWS, which will be viewed during upgrade.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.25.0-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your zoneminder packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-806.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-807.data b/english/lts/security/2017/dla-807.data
deleted file mode 100644
index 36ba11975e3..00000000000
--- a/english/lts/security/2017/dla-807.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-807-1 imagemagick</define-tag>
-<define-tag report_date>2017-1-30</define-tag>
-<define-tag secrefs>CVE-2016-10144 CVE-2016-10145 CVE-2016-10146 CVE-2017-5506 CVE-2017-5507 CVE-2017-5508 CVE-2017-5510 CVE-2017-5511 Bug##851485 Bug##851483 Bug##851380 Bug##851383 Bug##851382 Bug##851381 Bug##851</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-807.wml b/english/lts/security/2017/dla-807.wml
deleted file mode 100644
index cd453dd41e9..00000000000
--- a/english/lts/security/2017/dla-807.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Numerous vulnerabilities were discovered in ImageMagick, an image
-manipulation program. Issues include memory leaks, out of bound reads
-and missing checks.</p>
-
-<p>This update also includes an update of the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-8677">CVE-2016-8677</a> which
-was incomplete in the previous version.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u11.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-807.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-808.data b/english/lts/security/2017/dla-808.data
deleted file mode 100644
index 5221e27a2c7..00000000000
--- a/english/lts/security/2017/dla-808.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-808-1 ruby-archive-tar-minitar</define-tag>
-<define-tag report_date>2017-1-30</define-tag>
-<define-tag secrefs>CVE-2016-10173 Bug#853249</define-tag>
-<define-tag packages>ruby-archive-tar-minitar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-808.wml b/english/lts/security/2017/dla-808.wml
deleted file mode 100644
index 7ed78b57589..00000000000
--- a/english/lts/security/2017/dla-808.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been found that rubygem archive-tar-minitar allows attackers to
-overwrite arbitrary files during archive extraction via a .. (dot dot)
-in an extracted filename.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.2-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your ruby-archive-tar-minitar packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-808.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-809.data b/english/lts/security/2017/dla-809.data
deleted file mode 100644
index 087444eb143..00000000000
--- a/english/lts/security/2017/dla-809.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-809-1 tcpdump</define-tag>
-<define-tag report_date>2017-1-30</define-tag>
-<define-tag secrefs>CVE-2016-7922 CVE-2016-7923 CVE-2016-7924 CVE-2016-7925 CVE-2016-7926 CVE-2016-7927 CVE-2016-7928 CVE-2016-7929 CVE-2016-7930 CVE-2016-7931 CVE-2016-7932 CVE-2016-7933 CVE-2016-7934 CVE-2016-7935 CVE-2016-7936 CVE-2016-7937 CVE-2016-7938 CVE-2016-7939 CVE-2016-7940 CVE-2016-7973 CVE-2016-7974 CVE-2016-7975 CVE-2016-7983 CVE-2016-7984 CVE-2016-7985 CVE-2016-7986 CVE-2016-7992 CVE-2016-7993 CVE-2016-8574 CVE-2016-8575 CVE-2017-5202 CVE-2017-5203 CVE-2017-5204 CVE-2017-5205 CVE-2017-5341 CVE-2017-5342 CVE-2017-5482 CVE-2017-5483 CVE-2017-5484 CVE-2017-5485 CVE-2017-5486</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-809.wml b/english/lts/security/2017/dla-809.wml
deleted file mode 100644
index dd0308e6047..00000000000
--- a/english/lts/security/2017/dla-809.wml
+++ /dev/null
@@ -1,188 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in tcpdump, a command-line
-network traffic analyzer. These vulnerabilities might result in denial of
-service or the execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7922">CVE-2016-7922</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7923">CVE-2016-7923</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7924">CVE-2016-7924</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7925">CVE-2016-7925</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7926">CVE-2016-7926</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7927">CVE-2016-7927</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7928">CVE-2016-7928</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7929">CVE-2016-7929</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7930">CVE-2016-7930</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7931">CVE-2016-7931</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7932">CVE-2016-7932</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7933">CVE-2016-7933</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7934">CVE-2016-7934</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7935">CVE-2016-7935</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7936">CVE-2016-7936</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7937">CVE-2016-7937</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7938">CVE-2016-7938</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7939">CVE-2016-7939</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7940">CVE-2016-7940</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7973">CVE-2016-7973</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7974">CVE-2016-7974</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7975">CVE-2016-7975</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7983">CVE-2016-7983</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7984">CVE-2016-7984</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7985">CVE-2016-7985</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7986">CVE-2016-7986</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7992">CVE-2016-7992</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7993">CVE-2016-7993</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8574">CVE-2016-8574</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8575">CVE-2016-8575</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5202">CVE-2017-5202</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5203">CVE-2017-5203</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5204">CVE-2017-5204</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5205">CVE-2017-5205</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5341">CVE-2017-5341</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5342">CVE-2017-5342</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5482">CVE-2017-5482</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5483">CVE-2017-5483</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5484">CVE-2017-5484</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5485">CVE-2017-5485</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5486">CVE-2017-5486</a>
-
- <p>Buffer overflow in parser.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.9.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your tcpdump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-809.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-810.data b/english/lts/security/2017/dla-810.data
deleted file mode 100644
index 498279a534e..00000000000
--- a/english/lts/security/2017/dla-810.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-810-1 libarchive</define-tag>
-<define-tag report_date>2017-1-31</define-tag>
-<define-tag secrefs>CVE-2017-5601 Bug##853278</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-810.wml b/english/lts/security/2017/dla-810.wml
deleted file mode 100644
index 54b50986c42..00000000000
--- a/english/lts/security/2017/dla-810.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a heap buffer overflow in libarchive,
-a multi-format archive and compression library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libarchive version
-3.0.4-3+wheezy5+deb7u1.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-810.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-811.data b/english/lts/security/2017/dla-811.data
deleted file mode 100644
index 776b3213e26..00000000000
--- a/english/lts/security/2017/dla-811.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-811-1 libplist</define-tag>
-<define-tag report_date>2017-1-31</define-tag>
-<define-tag secrefs>CVE-2017-5209 CVE-2017-5545 Bug#851196 Bug#852385</define-tag>
-<define-tag packages>libplist</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-811.wml b/english/lts/security/2017/dla-811.wml
deleted file mode 100644
index 773ca33203d..00000000000
--- a/english/lts/security/2017/dla-811.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been fixed in libplist:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5209">CVE-2017-5209</a>
-
- <p>Out of bounds read when parsing specially crafted Apple plist file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5545">CVE-2017-5545</a>
-
- <p>Heap buffer overflow via crafted Apple plist file</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libplist packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-811.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-812.data b/english/lts/security/2017/dla-812.data
deleted file mode 100644
index 0c9965c4def..00000000000
--- a/english/lts/security/2017/dla-812.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-812-1 ikiwiki</define-tag>
-<define-tag report_date>2017-1-31</define-tag>
-<define-tag secrefs>CVE-2016-9646 CVE-2016-10026 CVE-2017-0356</define-tag>
-<define-tag packages>ikiwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-812.wml b/english/lts/security/2017/dla-812.wml
deleted file mode 100644
index ce1950511ff..00000000000
--- a/english/lts/security/2017/dla-812.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in ikiwiki, a wiki compiler:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9646">CVE-2016-9646</a>
-
- <p>Commit metadata forgery</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10026">CVE-2016-10026</a>
-
- <p>Authorization bypass when reverting changes</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0356">CVE-2017-0356</a>
-
- <p>Authentication bypass via repeated parameters</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.20120629.2+deb7u2.</p>
-
-<p>We recommend that you upgrade your ikiwiki packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-812.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-813.data b/english/lts/security/2017/dla-813.data
deleted file mode 100644
index 443c31afd0a..00000000000
--- a/english/lts/security/2017/dla-813.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-813-1 wordpress</define-tag>
-<define-tag report_date>2017-2-1</define-tag>
-<define-tag secrefs>CVE-2017-5488 CVE-2017-5489 CVE-2017-5490 CVE-2017-5491 CVE-2017-5492 CVE-2017-5493 CVE-2017-5610 CVE-2017-5611 CVE-2017-5612 Bug#851310 Bug#852767</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-813.wml b/english/lts/security/2017/dla-813.wml
deleted file mode 100644
index 0ce8def2881..00000000000
--- a/english/lts/security/2017/dla-813.wml
+++ /dev/null
@@ -1,86 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5488">CVE-2017-5488</a>
-
-<p>Multiple cross-site scripting (XSS) vulnerabilities in
-wp-admin/update-core.php in WordPress before 4.7.1 allow remote
-attackers to inject arbitrary web script or HTML via the name or
-version header of a plugin.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5489">CVE-2017-5489</a>
-
-<p>Cross-site request forgery (CSRF) vulnerability in WordPress before
-4.7.1 allows remote attackers to hijack the authentication of
-unspecified victims via vectors involving a Flash file upload.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5490">CVE-2017-5490</a>
-
-<p>Cross-site scripting (XSS) vulnerability in the theme-name fallback
-functionality in wp-includes/class-wp-theme.php in WordPress before
-4.7.1 allows remote attackers to inject arbitrary web script or HTML
-via a crafted directory name of a theme, related to
-wp-admin/includes/class-theme-installer-skin.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5491">CVE-2017-5491</a>
-
-<p>wp-mail.php in WordPress before 4.7.1 might allow remote attackers to
-bypass intended posting restrictions via a spoofed mail server with the
-mail.example.com name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5492">CVE-2017-5492</a>
-
-<p>Cross-site request forgery (CSRF) vulnerability in the widget-editing
-accessibility-mode feature in WordPress before 4.7.1 allows remote
-attackers to hijack the authentication of unspecified victims for
-requests that perform a widgets-access action, related to
-wp-admin/includes/class-wp-screen.php and wp-admin/widgets.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5493">CVE-2017-5493</a>
-
-<p>wp-includes/ms-functions.php in the Multisite WordPress API in WordPress
-before 4.7.1 does not properly choose random numbers for keys, which
-makes it easier for remote attackers to bypass intended access
-restrictions via a crafted site signup or user signup.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5610">CVE-2017-5610</a>
-
-<p>wp-admin/includes/class-wp-press-this.php in Press This in WordPress
-before 4.7.2 does not properly restrict visibility of a
-taxonomy-assignment user interface, which allows remote attackers to
-bypass intended access restrictions by reading terms.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5611">CVE-2017-5611</a>
-
-<p>SQL injection vulnerability in wp-includes/class-wp-query.php in
-WP_Query in WordPress before 4.7.2 allows remote attackers to execute
-arbitrary SQL commands by leveraging the presence of an affected
-plugin or theme that mishandles a crafted post type name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5612">CVE-2017-5612</a>
-
-<p>Cross-site scripting (XSS) vulnerability in
-wp-admin/includes/class-wp-posts-list-table.php in the posts list
-table in WordPress before 4.7.2 allows remote attackers to inject
-arbitrary web script or HTML via a crafted excerpt.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u13.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-813.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-814.data b/english/lts/security/2017/dla-814.data
deleted file mode 100644
index 731658c1f16..00000000000
--- a/english/lts/security/2017/dla-814.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-814-1 openssl</define-tag>
-<define-tag report_date>2017-2-1</define-tag>
-<define-tag secrefs>CVE-2016-7056 CVE-2016-8610 CVE-2017-3731</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-814.wml b/english/lts/security/2017/dla-814.wml
deleted file mode 100644
index 66c7aea55fc..00000000000
--- a/english/lts/security/2017/dla-814.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in OpenSSL:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7056">CVE-2016-7056</a>
-
- <p>A local timing attack was discovered against ECDSA P-256.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8610">CVE-2016-8610</a>
-
- <p>It was discovered that no limit was imposed on alert packets during
- an SSL handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3731">CVE-2017-3731</a>
-
- <p>Robert Swiecki discovered that the RC4-MD5 cipher when running on
- 32 bit systems could be forced into an out-of-bounds read, resulting
- in denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.1t-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-814.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-815.data b/english/lts/security/2017/dla-815.data
deleted file mode 100644
index 1640d1f44e5..00000000000
--- a/english/lts/security/2017/dla-815.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-815-1 ntfs-3g</define-tag>
-<define-tag report_date>2017-2-2</define-tag>
-<define-tag secrefs>CVE-2017-0358</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-815.wml b/english/lts/security/2017/dla-815.wml
deleted file mode 100644
index a213eb7d130..00000000000
--- a/english/lts/security/2017/dla-815.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write
-NTFS driver for FUSE, does not scrub the environment before executing
-modprobe with elevated privileges. A local user can take advantage of
-this flaw for local root privilege escalation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:2012.1.15AR.5-2.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your ntfs-3g packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-815.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-816.data b/english/lts/security/2017/dla-816.data
deleted file mode 100644
index 2659e783627..00000000000
--- a/english/lts/security/2017/dla-816.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-816-1 svgsalamander</define-tag>
-<define-tag report_date>2017-2-3</define-tag>
-<define-tag secrefs>CVE-2017-5617 Bug##853134</define-tag>
-<define-tag packages>svgsalamander</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-816.wml b/english/lts/security/2017/dla-816.wml
deleted file mode 100644
index e9ad0cf1987..00000000000
--- a/english/lts/security/2017/dla-816.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Luc Lynx discovered a Server-Side Request Forgery in svgSalamander
-allowing access to the trusted network with specially crafted SVG files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0~svn95-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your svgsalamander packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-816.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-817.data b/english/lts/security/2017/dla-817.data
deleted file mode 100644
index c85f2dd06ba..00000000000
--- a/english/lts/security/2017/dla-817.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-817-1 libphp-phpmailer</define-tag>
-<define-tag report_date>2017-2-6</define-tag>
-<define-tag secrefs>CVE-2017-5223 Bug##853232</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-817.wml b/english/lts/security/2017/dla-817.wml
deleted file mode 100644
index 356a6eb4ec2..00000000000
--- a/english/lts/security/2017/dla-817.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a local file disclosure vulnerability in
-libphp-phpmailer, a email transfer class for PHP, where insufficient parsing of
-HTML messages could potentially be used by attacker to read a local file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libphp-phpmailer version
-5.1-1.3+deb7u1.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-817.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-818.data b/english/lts/security/2017/dla-818.data
deleted file mode 100644
index 21856ea23e3..00000000000
--- a/english/lts/security/2017/dla-818.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-818-1 php5</define-tag>
-<define-tag report_date>2017-2-7</define-tag>
-<define-tag secrefs>CVE-2016-2554 CVE-2016-3141 CVE-2016-3142 CVE-2016-4342 CVE-2016-9934 CVE-2016-9935 CVE-2016-10158 CVE-2016-10159 CVE-2016-10160 CVE-2016-10161</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-818.wml b/english/lts/security/2017/dla-818.wml
deleted file mode 100644
index 95526cec09e..00000000000
--- a/english/lts/security/2017/dla-818.wml
+++ /dev/null
@@ -1,124 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in PHP (recursive acronym for PHP:
-Hypertext Preprocessor), a widely-used open source general-purpose
-scripting language that is especially suited for web development and can
-be embedded into HTML.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2554">CVE-2016-2554</a>
-
- <p>Stack-based buffer overflow in ext/phar/tar.c allows remote
- attackers to cause a denial of service (application crash) or
- possibly have unspecified other impact via a crafted TAR archive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3141">CVE-2016-3141</a>
-
- <p>Use-after-free vulnerability in wddx.c in the WDDX extension allows
- remote attackers to cause a denial of service (memory corruption and
- application crash) or possibly have unspecified other impact by
- triggering a wddx_deserialize call on XML data containing a crafted
- var element.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3142">CVE-2016-3142</a>
-
- <p>The phar_parse_zipfile function in zip.c in the PHAR extension in
- PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to
- obtain sensitive information from process memory or cause a denial
- of service (out-of-bounds read and application crash) by placing a
- PK\x05\x06 signature at an invalid location.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4342">CVE-2016-4342</a>
-
- <p>ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18,
- and 7.x before 7.0.3 mishandles zero-length uncompressed data, which
- allows remote attackers to cause a denial of service (heap memory
- corruption) or possibly have unspecified other impact via a crafted
- (1) TAR, (2) ZIP, or (3) PHAR archive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9934">CVE-2016-9934</a>
-
- <p>ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows
- remote attackers to cause a denial of service (NULL pointer
- dereference) via crafted serialized data in a wddxPacket XML
- document, as demonstrated by a PDORow string.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9935">CVE-2016-9935</a>
-
- <p>The php_wddx_push_element function in ext/wddx/wddx.c in PHP before
- 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a
- denial of service (out-of-bounds read and memory corruption) or
- possibly have unspecified other impact via an empty boolean element
- in a wddxPacket XML document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10158">CVE-2016-10158</a>
-
- <p>The exif_convert_any_to_int function in ext/exif/exif.c in PHP
- before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows
- remote attackers to cause a denial of service (application crash)
- via crafted EXIF data that triggers an attempt to divide the minimum
- representable negative integer by -1.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10159">CVE-2016-10159</a>
-
- <p>Integer overflow in the phar_parse_pharfile function in
- ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows
- remote attackers to cause a denial of service (memory consumption or
- application crash) via a truncated manifest entry in a PHAR archive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10160">CVE-2016-10160</a>
-
- <p>Off-by-one error in the phar_parse_pharfile function in
- ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows
- remote attackers to cause a denial of service (memory corruption) or
- possibly execute arbitrary code via a crafted PHAR archive with an
- alias mismatch.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10161">CVE-2016-10161</a>
-
- <p>The object_common1 function in ext/standard/var_unserializer.c in
- PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1
- allows remote attackers to cause a denial of service (buffer
- over-read and application crash) via crafted serialized data that is
- mishandled in a finish_nested_data call.</p></li>
-
-<li>BUG-71323
-
- <p>Output of stream_get_meta_data can be falsified by its input</p></li>
-
-<li>BUG-70979
-
- <p>Crash on bad SOAP request</p></li>
-
-<li>BUG-71039
-
- <p>exec functions ignore length but look for NULL termination</p></li>
-
-<li>BUG-71459
-
- <p>Integer overflow in iptcembed()</p></li>
-
-<li>BUG-71391
-
- <p>NULL Pointer Dereference in phar_tar_setupmetadata()</p></li>
-
-<li>BUG-71335
-
- <p>Type confusion vulnerability in WDDX packet deserialization</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u7.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-818.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-819-2.data b/english/lts/security/2017/dla-819-2.data
deleted file mode 100644
index 48fdb03fa05..00000000000
--- a/english/lts/security/2017/dla-819-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-819-2 mysql-5.5</define-tag>
-<define-tag report_date>2017-2-10</define-tag>
-<define-tag secrefs><not assigned yet> Bug##854713</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-819-2.wml b/english/lts/security/2017/dla-819-2.wml
deleted file mode 100644
index 704bddfa049..00000000000
--- a/english/lts/security/2017/dla-819-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is a correction of DLA 819-1 that mentioned that
-mysql-5.5 5.5.47-0+deb7u2 was corrected. The corrected package
-version was 5.5.54-0+deb7u2.</p>
-
-<p>For completeness the text from DLA 819-1 is available below with
-only corrected version information. No other changes.</p>
-
-<p>It has been found that the C client library for MySQL
-(libmysqlclient.so) has use-after-free vulnerability which
-can cause crash of applications using that MySQL client.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.54-0+deb7u2.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-819-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-819.data b/english/lts/security/2017/dla-819.data
deleted file mode 100644
index 42b7fd6f75e..00000000000
--- a/english/lts/security/2017/dla-819.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-819-1 mysql-5.5</define-tag>
-<define-tag report_date>2017-2-9</define-tag>
-<define-tag secrefs><not assigned yet> Bug##854713</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-819.wml b/english/lts/security/2017/dla-819.wml
deleted file mode 100644
index 520fd434a60..00000000000
--- a/english/lts/security/2017/dla-819.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been found that the C client library for MySQL
-(libmysqlclient.so) has use-after-free vulnerability which
-can cause crash of applications using that MySQL client.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.47-0+deb7u2.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-819.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-820.data b/english/lts/security/2017/dla-820.data
deleted file mode 100644
index e5ebce2235e..00000000000
--- a/english/lts/security/2017/dla-820.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-820-1 viewvc</define-tag>
-<define-tag report_date>2017-2-9</define-tag>
-<define-tag secrefs>CVE-2017-5938 Bug#854681</define-tag>
-<define-tag packages>viewvc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-820.wml b/english/lts/security/2017/dla-820.wml
deleted file mode 100644
index 8d05ed7c1bb..00000000000
--- a/english/lts/security/2017/dla-820.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Thomas Gerbet discovered that viewvc, a web interface for CVS and
-Subversion repositories, did not properly sanitize user input. This
-issue resulted in a potential Cross-Site Scripting vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.5-1.4+deb7u1.</p>
-
-<p>We recommend that you upgrade your viewvc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-820.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-821.data b/english/lts/security/2017/dla-821.data
deleted file mode 100644
index 3695c5169bb..00000000000
--- a/english/lts/security/2017/dla-821.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-821-1 openjdk-7</define-tag>
-<define-tag report_date>2017-2-11</define-tag>
-<define-tag secrefs>CVE-2016-5546 CVE-2016-5547 CVE-2016-5548 CVE-2016-5552 CVE-2017-3231 CVE-2017-3241 CVE-2017-3252 CVE-2017-3253 CVE-2017-3260 CVE-2017-3261 CVE-2017-3272 CVE-2017-3289</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-821.wml b/english/lts/security/2017/dla-821.wml
deleted file mode 100644
index 032b4f5cba9..00000000000
--- a/english/lts/security/2017/dla-821.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in the bypass of
-Java sandbox restrictions, denial of service, arbitrary code execution,
-incorrect parsing or URLs/LDAP DNs or cryptoraphice timing side channel
-attacks.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u121-2.6.8-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-821.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-822.data b/english/lts/security/2017/dla-822.data
deleted file mode 100644
index 438e3d591fe..00000000000
--- a/english/lts/security/2017/dla-822.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-822-1 vim</define-tag>
-<define-tag report_date>2017-2-13</define-tag>
-<define-tag secrefs>CVE-2017-5953 Bug##854969</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-822.wml b/english/lts/security/2017/dla-822.wml
deleted file mode 100644
index c58baae1fa2..00000000000
--- a/english/lts/security/2017/dla-822.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in Vim where a malformed spell file
-could cause an integer overflow which is used as the size for memory
-allocation, resulting in a subsequent buffer overflow.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:7.3.547-7+deb7u2.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>Cheers,</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-822.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-823-2.data b/english/lts/security/2017/dla-823-2.data
deleted file mode 100644
index e0ef3bb9920..00000000000
--- a/english/lts/security/2017/dla-823-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-823-2 tomcat7</define-tag>
-<define-tag report_date>2017-2-22</define-tag>
-<define-tag secrefs>CVE-2017-6056 Bug#854551</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-823-2.wml b/english/lts/security/2017/dla-823-2.wml
deleted file mode 100644
index 67a7e6098da..00000000000
--- a/english/lts/security/2017/dla-823-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for tomcat7 issued as DLA-823-1 caused that the server could
-return HTTP 400 errors under certain circumstances. Updated packages are
-now available to correct this issue. For reference, the original
-advisory text follows.</p>
-
-<p>It was discovered that a programming error in the processing of HTTPS
-requests in the Apache Tomcat servlet and JSP engine may result in
-denial of service via an infinite loop.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u11.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-823-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-823.data b/english/lts/security/2017/dla-823.data
deleted file mode 100644
index 48acc4464b7..00000000000
--- a/english/lts/security/2017/dla-823.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-823-1 tomcat7</define-tag>
-<define-tag report_date>2017-2-14</define-tag>
-<define-tag secrefs>not yet available Bug#854551</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-823.wml b/english/lts/security/2017/dla-823.wml
deleted file mode 100644
index c05fe8d74ea..00000000000
--- a/english/lts/security/2017/dla-823.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that a programming error in the processing of HTTPS
-requests in the Apache Tomcat servlet and JSP engine may result in
-denial of service via an infinite loop.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u10.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-823.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-824.data b/english/lts/security/2017/dla-824.data
deleted file mode 100644
index d7deab78f1e..00000000000
--- a/english/lts/security/2017/dla-824.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-824-1 libevent</define-tag>
-<define-tag report_date>2017-2-15</define-tag>
-<define-tag secrefs>CVE-2016-10195 CVE-2016-10196 CVE-2016-10197 Bug#854092</define-tag>
-<define-tag packages>libevent</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-824.wml b/english/lts/security/2017/dla-824.wml
deleted file mode 100644
index 5822c0e4d60..00000000000
--- a/english/lts/security/2017/dla-824.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libevent, an asynchronous
-event notification library. They would lead to Denial Of Service via
-application crash, or remote code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.19-stable-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your libevent packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-824.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-825.data b/english/lts/security/2017/dla-825.data
deleted file mode 100644
index b9e6e675caa..00000000000
--- a/english/lts/security/2017/dla-825.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-825-1 spice</define-tag>
-<define-tag report_date>2017-2-17</define-tag>
-<define-tag secrefs>CVE-2016-9577 CVE-2016-9578 Bug#854336</define-tag>
-<define-tag packages>spice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-825.wml b/english/lts/security/2017/dla-825.wml
deleted file mode 100644
index 25a735cd724..00000000000
--- a/english/lts/security/2017/dla-825.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in spice, a SPICE protocol
-client and server library. The Common Vulnerabilities and Exposures
-project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9577">CVE-2016-9577</a>
-
- <p>Frediano Ziglio of Red Hat discovered a buffer overflow
- vulnerability in the main_channel_alloc_msg_rcv_buf function. An
- authenticated attacker can take advantage of this flaw to cause a
- denial of service (spice server crash), or possibly, execute
- arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9578">CVE-2016-9578</a>
-
- <p>Frediano Ziglio of Red Hat discovered that spice does not properly
- validate incoming messages. An attacker able to connect to the
- spice server could send crafted messages which would cause the
- process to crash.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.11.0-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your spice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-825.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-826.data b/english/lts/security/2017/dla-826.data
deleted file mode 100644
index 40598c79fc1..00000000000
--- a/english/lts/security/2017/dla-826.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-826-1 wireshark</define-tag>
-<define-tag report_date>2017-2-17</define-tag>
-<define-tag secrefs>CVE-2017-6014 Bug#855408</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-826.wml b/english/lts/security/2017/dla-826.wml
deleted file mode 100644
index 8be7dfb6450..00000000000
--- a/english/lts/security/2017/dla-826.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was denial of service vulnerability in wireshark,
-a network traffic analyzer.</p>
-
-<p>A malformed NATO Ground Moving Target Indicator Format ("STANAG 4607") capture
-file could cause a memory exhausion/infinite loop.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in wireshark version
-1.12.1+g01b65bf-4+deb8u6~deb7u6.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-826.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-827.data b/english/lts/security/2017/dla-827.data
deleted file mode 100644
index 2838daa03ee..00000000000
--- a/english/lts/security/2017/dla-827.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-827-1 gst-plugins-base0.10</define-tag>
-<define-tag report_date>2017-2-18</define-tag>
-<define-tag secrefs>CVE-2017-5837 CVE-2017-5844</define-tag>
-<define-tag packages>gst-plugins-base0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-827.wml b/english/lts/security/2017/dla-827.wml
deleted file mode 100644
index ce7a37677da..00000000000
--- a/english/lts/security/2017/dla-827.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that it is possible to trigger a floating point
-exception in GStreamer via specially crafted files, causing a denial
-of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.36-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-827.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-828.data b/english/lts/security/2017/dla-828.data
deleted file mode 100644
index 7d5a29fa25d..00000000000
--- a/english/lts/security/2017/dla-828.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-828-1 gst-plugins-good0.10</define-tag>
-<define-tag report_date>2017-2-18</define-tag>
-<define-tag secrefs>CVE-2016-10198 CVE-2017-5840</define-tag>
-<define-tag packages>gst-plugins-good0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-828.wml b/english/lts/security/2017/dla-828.wml
deleted file mode 100644
index 6f70829a3fc..00000000000
--- a/english/lts/security/2017/dla-828.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two memory handling issues were found in gst-plugins-good0.10:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10198">CVE-2016-10198</a>
-
- <p>An invalid read can be triggered in the aacparse element via a
- maliciously crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5840">CVE-2017-5840</a>
-
- <p>An out of bounds heap read can be triggered in the qtdemux element
- via a maliciously crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.31-3+nmu1+deb7u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-good0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-828.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-829.data b/english/lts/security/2017/dla-829.data
deleted file mode 100644
index de45c69dda7..00000000000
--- a/english/lts/security/2017/dla-829.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-829-1 gst-plugins-ugly0.10</define-tag>
-<define-tag report_date>2017-2-18</define-tag>
-<define-tag secrefs>CVE-2017-5846 CVE-2017-5847</define-tag>
-<define-tag packages>gst-plugins-ugly0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-829.wml b/english/lts/security/2017/dla-829.wml
deleted file mode 100644
index 9bac85e561c..00000000000
--- a/english/lts/security/2017/dla-829.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two memory management issues were found in the asfdemux element of the
-GStreamer <q>ugly</q> plugin collection, which can be triggered via a
-maliciously crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.19-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-ugly0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-829.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-830.data b/english/lts/security/2017/dla-830.data
deleted file mode 100644
index d3deec20144..00000000000
--- a/english/lts/security/2017/dla-830.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-830-1 gst-plugins-bad0.10</define-tag>
-<define-tag report_date>2017-2-18</define-tag>
-<define-tag secrefs>CVE-2017-5843 CVE-2017-5848</define-tag>
-<define-tag packages>gst-plugins-bad0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-830.wml b/english/lts/security/2017/dla-830.wml
deleted file mode 100644
index 33b3b6581bc..00000000000
--- a/english/lts/security/2017/dla-830.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some memory management issues were found in the GStreamer <q>bad</q> plugins:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5843">CVE-2017-5843</a>
-
- <p>A use after free issue was found in the mxfdemux element, which can
- can be triggered via a maliciously crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5848">CVE-2017-5848</a>
-
- <p>The psdemux was vulnerable to several invalid reads, which could be
- triggered via a maliciously crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10.23-7.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-830.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-831.data b/english/lts/security/2017/dla-831.data
deleted file mode 100644
index f6c766d6560..00000000000
--- a/english/lts/security/2017/dla-831.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-831-1 gtk-vnc</define-tag>
-<define-tag report_date>2017-2-20</define-tag>
-<define-tag secrefs>CVE-2017-5884 CVE-2017-5885 Bug#854450</define-tag>
-<define-tag packages>gtk-vnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-831.wml b/english/lts/security/2017/dla-831.wml
deleted file mode 100644
index d465401fdaa..00000000000
--- a/english/lts/security/2017/dla-831.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Josef Gajdusek discovered two vulnerabilities in gtk-vnc, a VNC viewer
-widget for GTK:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5884">CVE-2017-5884</a>
-
- <p>Fix bounds checking for RRE, hextile &amp; copyrec encodings. This bug
- allowed a remote server to cause a denial of service by buffer
- overflow via a carefully crafted message containing subrectangles
- outside the drawing area.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5885">CVE-2017-5885</a>
-
- <p>Correctly validate color map range indexes. This bug allowed a
- remote server to cause a denial of service by buffer overflow via
- a carefully crafted message with out-of-range colour values.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.0-3.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your gtk-vnc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-831.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-832.data b/english/lts/security/2017/dla-832.data
deleted file mode 100644
index 916f5673a06..00000000000
--- a/english/lts/security/2017/dla-832.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-832-1 bitlbee</define-tag>
-<define-tag report_date>2017-2-23</define-tag>
-<define-tag secrefs>CVE-2016-10188 CVE-2016-10189 CVE-2017-5668</define-tag>
-<define-tag packages>bitlbee</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-832.wml b/english/lts/security/2017/dla-832.wml
deleted file mode 100644
index b435570156e..00000000000
--- a/english/lts/security/2017/dla-832.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5668">CVE-2017-5668</a>
-
- <p>Fix for incomplete fix for <q>Null pointer dereference with file
- transfer request from unknown contacts</q>.
- (Though this package wasn't in Wheezy with this issue, I
- mention it here.
- The fix was done with the second patch for <a href="https://security-tracker.debian.org/tracker/CVE-2016-10189">CVE-2016-10189</a>)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10189">CVE-2016-10189</a>
-
- <p>Null pointer dereference with file transfer request from unknown
- contacts.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10188">CVE-2016-10188</a>
-
- <p>deactivate any incoming file transfer for bitlbee
- This affects any libpurple protocol when used through BitlBee. It
- does not affect other libpurple-based clients such as pidgin.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in bitlbee version 3.0.5-1.2+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-832.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-833.data b/english/lts/security/2017/dla-833.data
deleted file mode 100644
index 26b41731e3b..00000000000
--- a/english/lts/security/2017/dla-833.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-833-1 linux</define-tag>
-<define-tag report_date>2017-2-22</define-tag>
-<define-tag secrefs>CVE-2014-9888 CVE-2014-9895 CVE-2016-6786 CVE-2016-6787 CVE-2016-8405 CVE-2017-5549 CVE-2017-6001 CVE-2017-6074</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-833.wml b/english/lts/security/2017/dla-833.wml
deleted file mode 100644
index 6b1d6fba0da..00000000000
--- a/english/lts/security/2017/dla-833.wml
+++ /dev/null
@@ -1,76 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or have other
-impacts.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9888">CVE-2014-9888</a>
-
- <p>Russell King found that on ARM systems, memory allocated for DMA
- buffers was mapped with executable permission. This made it
- easier to exploit other vulnerabilities in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9895">CVE-2014-9895</a>
-
- <p>Dan Carpenter found that the MEDIA_IOC_ENUM_LINKS ioctl on media
- devices resulted in an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6786">CVE-2016-6786</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-6787">CVE-2016-6787</a>
-
- <p>It was discovered that the performance events subsystem does not
- properly manage locks during certain migrations, allowing a local
- attacker to escalate privileges. This can be mitigated by
- disabling unprivileged use of performance events:
- sysctl kernel.perf_event_paranoid=3</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8405">CVE-2016-8405</a>
-
- <p>Peter Pi of Trend Micro discovered that the frame buffer video
- subsystem does not properly check bounds while copying color maps to
- userspace, causing a heap buffer out-of-bounds read, leading to
- information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5549">CVE-2017-5549</a>
-
- <p>It was discovered that the KLSI KL5KUSB105 serial USB device
- driver could log the contents of uninitialised kernel memory,
- resulting in an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6001">CVE-2017-6001</a>
-
- <p>Di Shen discovered a race condition between concurrent calls to
- the performance events subsystem, allowing a local attacker to
- escalate privileges. This flaw exists because of an incomplete fix
- of <a href="https://security-tracker.debian.org/tracker/CVE-2016-6786">CVE-2016-6786</a>.
- This can be mitigated by disabling unprivileged
- use of performance events: sysctl kernel.perf_event_paranoid=3</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6074">CVE-2017-6074</a>
-
- <p>Andrey Konovalov discovered a use-after-free vulnerability in the
- DCCP networking code, which could result in denial of service or
- local privilege escalation. On systems that do not already have
- the dccp module loaded, this can be mitigated by disabling it:
- echo &gt;&gt; /etc/modprobe.d/disable-dccp.conf install dccp false</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.84-2.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.39-1+deb8u1 or earlier.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-833.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-834.data b/english/lts/security/2017/dla-834.data
deleted file mode 100644
index 14326f6cdee..00000000000
--- a/english/lts/security/2017/dla-834.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-834-1 phpmyadmin</define-tag>
-<define-tag report_date>2017-2-24</define-tag>
-<define-tag secrefs>CVE-2016-6621</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-834.wml b/english/lts/security/2017/dla-834.wml
deleted file mode 100644
index d9107d81e99..00000000000
--- a/english/lts/security/2017/dla-834.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A server-side request forgery vulnerability was reported for the setup
-script in phpmyadmin, a MYSQL web administration tool. This flaw may
-allow an unauthenticated attacker to brute-force MYSQL passwords,
-detect internal hostnames or opened ports on the internal network.
-Additionally there was a race condition between writing configuration
-and administrator moving it allowing unauthenticated users to read or
-alter it. Debian users who configured phpmyadmin via debconf and used
-the default configuration for Apache 2 or Lighttpd were never affected.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:3.4.11.1-2+deb7u8.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-834.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-835.data b/english/lts/security/2017/dla-835.data
deleted file mode 100644
index 9fffbd8717e..00000000000
--- a/english/lts/security/2017/dla-835.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-835-1 cakephp</define-tag>
-<define-tag report_date>2017-2-24</define-tag>
-<define-tag secrefs>CVE-2016-4793</define-tag>
-<define-tag packages>cakephp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-835.wml b/english/lts/security/2017/dla-835.wml
deleted file mode 100644
index e971a0596a1..00000000000
--- a/english/lts/security/2017/dla-835.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski from legalhackers.com discovered that cakephp, an
-application development framework for PHP, contains a vulnerability
-that allows attackers to spoof the source IP address. It would allow
-them to bypass access control lists, or the injection of malicious
-data which, if treated as sanitized by an unaware CakePHP-based
-application, can lead to other vulnerabilities such as SQL injection,
-XSS or command injection.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.15-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your cakephp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-835.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-836-2.data b/english/lts/security/2017/dla-836-2.data
deleted file mode 100644
index d40cdb8cabd..00000000000
--- a/english/lts/security/2017/dla-836-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-836-2 munin</define-tag>
-<define-tag report_date>2017-3-3</define-tag>
-<define-tag secrefs>Bug#856455 Bug#856536</define-tag>
-<define-tag packages>munin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-836-2.wml b/english/lts/security/2017/dla-836-2.wml
deleted file mode 100644
index 10d71af09c0..00000000000
--- a/english/lts/security/2017/dla-836-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update for munin issued as DLA-836-1 caused a regression in the
-zooming functionality in munin-cgi-graph. Updated packages are now
-available to correct this issue. For reference, the original advisory
-text follows.</p>
-
-<p>Stevie Trujillo discovered a command injection vulnerability in munin,
-a network-wide graphing framework. The CGI script for drawing graphs
-allowed to pass arbitrary GET parameters to local shell command,
-allowing command execution as the user that runs the webserver.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.6-4+deb7u4.</p>
-
-<p>We recommend that you upgrade your munin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-836-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-836.data b/english/lts/security/2017/dla-836.data
deleted file mode 100644
index 25b78be5f3a..00000000000
--- a/english/lts/security/2017/dla-836.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-836-1 munin</define-tag>
-<define-tag report_date>2017-2-25</define-tag>
-<define-tag secrefs>CVE-2017-6188 Bug#855705</define-tag>
-<define-tag packages>munin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-836.wml b/english/lts/security/2017/dla-836.wml
deleted file mode 100644
index cdbfd04ea2d..00000000000
--- a/english/lts/security/2017/dla-836.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Stevie Trujillo discovered a command injection vulnerability in munin,
-a network-wide graphing framework. The CGI script for drawing graphs
-allowed to pass arbitrary GET parameters to local shell command,
-allowing command execution as the user that runs the webserver.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.6-4+deb7u3.</p>
-
-<p>We recommend that you upgrade your munin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-836.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-837.data b/english/lts/security/2017/dla-837.data
deleted file mode 100644
index 05cef98258b..00000000000
--- a/english/lts/security/2017/dla-837.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-837-1 radare2</define-tag>
-<define-tag report_date>2017-2-26</define-tag>
-<define-tag secrefs>CVE-2017-6197 Bug#856063</define-tag>
-<define-tag packages>radare2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-837.wml b/english/lts/security/2017/dla-837.wml
deleted file mode 100644
index e6c4c2d58f4..00000000000
--- a/english/lts/security/2017/dla-837.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6197">CVE-2017-6197</a>
-
- <p>The r_read_* functions in libr/include/r_endian.h in radare2 1.2.1
- allows remote attackers to cause a denial of service (NULL pointer
- dereference and application crash) via a crafted binary file, as
- demonstrated by the r_read_le32 function.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your radare2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-837.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-838.data b/english/lts/security/2017/dla-838.data
deleted file mode 100644
index 7f23ec2fe71..00000000000
--- a/english/lts/security/2017/dla-838.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-838-1 shadow</define-tag>
-<define-tag report_date>2017-2-26</define-tag>
-<define-tag secrefs>CVE-2017-2616 Bug#855943</define-tag>
-<define-tag packages>shadow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-838.wml b/english/lts/security/2017/dla-838.wml
deleted file mode 100644
index 11c827b93b9..00000000000
--- a/english/lts/security/2017/dla-838.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tobias Stoeckmann discovered that su does not properly handle clearing a
-child PID. A local attacker can take advantage of this flaw to send
-SIGKILL to other processes with root privileges, resulting in denial of
-service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.5.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your shadow packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-838.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-839-2.data b/english/lts/security/2017/dla-839-2.data
deleted file mode 100644
index 1feead1183b..00000000000
--- a/english/lts/security/2017/dla-839-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-839-2 tnef</define-tag>
-<define-tag report_date>2017-3-24</define-tag>
-<define-tag secrefs>CVE-2017-6307 CVE-2017-6308 CVE-2017-6309 CVE-2017-6310 Bug#857342</define-tag>
-<define-tag packages>tnef</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-839-2.wml b/english/lts/security/2017/dla-839-2.wml
deleted file mode 100644
index 92beb2b4e63..00000000000
--- a/english/lts/security/2017/dla-839-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>While fixing the above mentioned CVEs, upstream introduced a regression.
-The new patches added for this upload take care of that.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.9-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your tnef packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-839-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-839.data b/english/lts/security/2017/dla-839.data
deleted file mode 100644
index 7564763f75f..00000000000
--- a/english/lts/security/2017/dla-839.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-839-1 tnef</define-tag>
-<define-tag report_date>2017-2-27</define-tag>
-<define-tag secrefs>CVE-2017-6307 CVE-2017-6308 CVE-2017-6309 CVE-2017-6310</define-tag>
-<define-tag packages>tnef</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-839.wml b/english/lts/security/2017/dla-839.wml
deleted file mode 100644
index 88f886c807b..00000000000
--- a/english/lts/security/2017/dla-839.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6307">CVE-2017-6307</a>
-
- <p>An issue was discovered in tnef before 1.4.13. Two OOB Writes have
- been identified in src/mapi_attr.c:mapi_attr_read(). These might
- lead to invalid read and write operations, controlled by an attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6308">CVE-2017-6308</a>
-
- <p>An issue was discovered in tnef before 1.4.13. Several Integer
- Overflows, which can lead to Heap Overflows, have been identified
- in the functions that wrap memory allocation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6309">CVE-2017-6309</a>
-
- <p>An issue was discovered in tnef before 1.4.13. Two type confusions
- have been identified in the parse_file() function. These might lead
- to invalid read and write operations, controlled by an attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6310">CVE-2017-6310</a>
-
- <p>An issue was discovered in tnef before 1.4.13. Four type confusions
- have been identified in the file_add_mapi_attrs() function.
- These might lead to invalid read and write operations, controlled
- by an attacker.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.9-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your tnef packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-839.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-840.data b/english/lts/security/2017/dla-840.data
deleted file mode 100644
index 4973316a75d..00000000000
--- a/english/lts/security/2017/dla-840.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-840-1 libplist</define-tag>
-<define-tag report_date>2017-2-28</define-tag>
-<define-tag secrefs>CVE-2017-5834 CVE-2017-5835 Bug#854000</define-tag>
-<define-tag packages>libplist</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-840.wml b/english/lts/security/2017/dla-840.wml
deleted file mode 100644
index d4e0e0b781f..00000000000
--- a/english/lts/security/2017/dla-840.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libplist, a library for
-reading and writing the Apple binary and XML property lists format. A
-maliciously crafted plist file could cause an application to crash by
-triggering a heap-based buffer overflow and memory allocation error in
-the plist_from_bin function.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libplist packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-840.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-841-2.data b/english/lts/security/2017/dla-841-2.data
deleted file mode 100644
index fe92a7efeca..00000000000
--- a/english/lts/security/2017/dla-841-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-841-2 apache2</define-tag>
-<define-tag report_date>2017-7-29</define-tag>
-<define-tag secrefs>CVE-2015-0253 CVE-2016-8743 Bug#858373</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-841-2.wml b/english/lts/security/2017/dla-841-2.wml
deleted file mode 100644
index a9a54abe578..00000000000
--- a/english/lts/security/2017/dla-841-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-8743">CVE-2016-8743</a>
-introduced a regression which would segfault
-apache workers under certain conditions (#858373), an issue similar to
-previously fixed <a href="https://security-tracker.debian.org/tracker/CVE-2015-0253">CVE-2015-0253</a>.</p>
-
-<p>The issue was introduced in DLA-841-1 and the associated
-2.2.22-13+deb7u8 package version. For Debian 7 <q>Wheezy</q>, these
-problems have been fixed in version 2.2.22-13+deb7u11.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-841-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-841.data b/english/lts/security/2017/dla-841.data
deleted file mode 100644
index 372c0ce025d..00000000000
--- a/english/lts/security/2017/dla-841.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-841-1 apache2</define-tag>
-<define-tag report_date>2017-2-28</define-tag>
-<define-tag secrefs>CVE-2016-8743</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-841.wml b/english/lts/security/2017/dla-841.wml
deleted file mode 100644
index 736dfad3479..00000000000
--- a/english/lts/security/2017/dla-841.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This upload fixes a security vulnerability in the header parsing code.</p>
-
-<p>David Dennerline, of IBM Security's X-Force Researchers, and Régis
-Leroy discovered problems in the way Apache handled a broad pattern of
-unusual whitespace patterns in HTTP requests. In some configurations,
-this could lead to response splitting or cache pollution
-vulnerabilities. To fix these issues, this update makes Apache httpd
-be more strict in what HTTP requests it accepts.</p>
-
-<p>If this causes problems with non-conforming clients, some checks can
-be relaxed by adding the new directive <q>HttpProtocolOptions unsafe</q> to
-the configuration. More information is available at</p>
-
-<p><url "https://httpd.apache.org/docs/current/mod/core.html#httpprotocoloptions"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.22-13+deb7u8.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-841.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-842.data b/english/lts/security/2017/dla-842.data
deleted file mode 100644
index 7aa4138e2c2..00000000000
--- a/english/lts/security/2017/dla-842.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-842-1 qemu-kvm</define-tag>
-<define-tag report_date>2017-2-28</define-tag>
-<define-tag secrefs>CVE-2017-2615 CVE-2017-2620 CVE-2017-5898 CVE-2017-5973</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-842.wml b/english/lts/security/2017/dla-842.wml
deleted file mode 100644
index 707e113cf67..00000000000
--- a/english/lts/security/2017/dla-842.wml
+++ /dev/null
@@ -1,68 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in qemu-kvm, a full
-virtualization solution for Linux hosts on x86 hardware with x86 guests.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2615">CVE-2017-2615</a>
-
- <p>The Cirrus CLGD 54xx VGA Emulator in qemu-kvm is vulnerable to an
- out-of-bounds access issue. It could occur while copying VGA data
- via bitblt copy in backward mode.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS OR potentially execute arbitrary
- code on the host with privileges of qemu-kvm process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2620">CVE-2017-2620</a>
-
- <p>The Cirrus CLGD 54xx VGA Emulator in qemu-kvm is vulnerable to an
- out-of-bounds access issue. It could occur while copying VGA data
- in cirrus_bitblt_cputovideo.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS OR potentially execute arbitrary
- code on the host with privileges of qemu-kvm process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5898">CVE-2017-5898</a>
-
- <p>The CCID Card device emulator support is vulnerable to an integer
- overflow flaw. It could occur while passing message via
- command/responses packets to and from the host.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- qemu-kvm process on the host resulting in a DoS.</p>
-
- <p>This issue does not affect the qemu-kvm binaries in Debian but we
- apply the patch to the sources to stay in sync with the qemu
- package.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5973">CVE-2017-5973</a>
-
- <p>The USB xHCI controller emulator support in qemu-kvm is vulnerable
- to an infinite loop issue. It could occur while processing control
- transfer descriptors' sequence in xhci_kick_epctx.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- qemu-kvm process resulting in a DoS.</p></li>
-
-</ul>
-
-<p>This update also updates the fix <a href="https://security-tracker.debian.org/tracker/CVE-2016-9921">CVE-2016-9921</a>
-since it was too strict and broke certain guests.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u20.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-842.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-843.data b/english/lts/security/2017/dla-843.data
deleted file mode 100644
index 64f17cee0d7..00000000000
--- a/english/lts/security/2017/dla-843.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-843-1 bind9</define-tag>
-<define-tag report_date>2017-2-28</define-tag>
-<define-tag secrefs>CVE-2017-3135</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-843.wml b/english/lts/security/2017/dla-843.wml
deleted file mode 100644
index 45ac8636540..00000000000
--- a/english/lts/security/2017/dla-843.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3135">CVE-2017-3135</a>
- <p>Assertion failure when using DNS64 and RPZ can lead to crash.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u15.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-843.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-844.data b/english/lts/security/2017/dla-844.data
deleted file mode 100644
index e753c05a8a4..00000000000
--- a/english/lts/security/2017/dla-844.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-844-1 libquicktime</define-tag>
-<define-tag report_date>2017-3-1</define-tag>
-<define-tag secrefs>CVE-2016-2399 Bug#855099</define-tag>
-<define-tag packages>libquicktime</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-844.wml b/english/lts/security/2017/dla-844.wml
deleted file mode 100644
index 783dd1c38a5..00000000000
--- a/english/lts/security/2017/dla-844.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Marco <q>nemux</q> Romano discovered that an integer overflow in the
-quicktime_read_pascal function in libquicktime 1.2.4 and earlier
-allows remote attackers to cause a denial of service or possibly have
-other unspecified impact via a crafted hdlr MP4 atom.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.2.4-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your libquicktime packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-844.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-845.data b/english/lts/security/2017/dla-845.data
deleted file mode 100644
index 2d2c1ab5b98..00000000000
--- a/english/lts/security/2017/dla-845.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-845-1 qemu</define-tag>
-<define-tag report_date>2017-3-1</define-tag>
-<define-tag secrefs>CVE-2017-2615 CVE-2017-2620 CVE-2017-5898 CVE-2017-5973</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-845.wml b/english/lts/security/2017/dla-845.wml
deleted file mode 100644
index 04198e70e11..00000000000
--- a/english/lts/security/2017/dla-845.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in qemu, a fast processor
-emulator. The Common Vulnerabilities and Exposures project identifies
-the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2615">CVE-2017-2615</a>
-
- <p>The Cirrus CLGD 54xx VGA Emulator in qemu is vulnerable to an
- out-of-bounds access issue. It could occur while copying VGA data
- via bitblt copy in backward mode.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS OR potentially execute arbitrary
- code on the host with privileges of Qemu process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2620">CVE-2017-2620</a>
-
- <p>The Cirrus CLGD 54xx VGA Emulator in qemu is vulnerable to an
- out-of-bounds access issue. It could occur while copying VGA data
- in cirrus_bitblt_cputovideo.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS OR potentially execute arbitrary
- code on the host with privileges of Qemu process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5898">CVE-2017-5898</a>
-
- <p>The CCID Card device emulator support is vulnerable to an integer
- overflow flaw. It could occur while passing message via
- command/responses packets to and from the host.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process on host resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5973">CVE-2017-5973</a>
-
- <p>The USB xHCI controller emulator support in qemu is vulnerable
- to an infinite loop issue. It could occur while processing control
- transfer descriptors' sequence in xhci_kick_epctx.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS.</p></li>
-
-</ul>
-
-<p>This update also updates the fix <a href="https://security-tracker.debian.org/tracker/CVE-2016-9921">CVE-2016-9921</a>
-since it was too strict and broke certain guests.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u20.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-845.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-846.data b/english/lts/security/2017/dla-846.data
deleted file mode 100644
index e005334667f..00000000000
--- a/english/lts/security/2017/dla-846.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-846-1 libzip-ruby</define-tag>
-<define-tag report_date>2017-3-6</define-tag>
-<define-tag secrefs>CVE-2017-5946 Bug#856269</define-tag>
-<define-tag packages>libzip-ruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-846.wml b/english/lts/security/2017/dla-846.wml
deleted file mode 100644
index e5fef030bbb..00000000000
--- a/english/lts/security/2017/dla-846.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libzip-ruby, a Ruby module for reading and
-writing zip files, is prone to a directory traversal vulnerability. An
-attacker can take advantage of this flaw to overwrite arbitrary files
-during archive extraction via a .. (dot dot) in an extracted filename.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.4-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libzip-ruby packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-846.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-847.data b/english/lts/security/2017/dla-847.data
deleted file mode 100644
index bb4ace57447..00000000000
--- a/english/lts/security/2017/dla-847.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-847-1 texlive-base</define-tag>
-<define-tag report_date>2017-3-8</define-tag>
-<define-tag secrefs>CVE-2016-10243</define-tag>
-<define-tag packages>texlive-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-847.wml b/english/lts/security/2017/dla-847.wml
deleted file mode 100644
index 0baa76d8bb1..00000000000
--- a/english/lts/security/2017/dla-847.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The TeX system allows for calling external programs from within the TeX
-source code. This has been restricted to a small set of programs since a
-long time ago.</p>
-
-<p>Unfortunately it turned out that one program in the list, mpost, allows
-in turn to specify other programs to be run, which allows arbitrary code
-execution when compiling a TeX document.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2012.20120611-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your texlive-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-847.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-848.data b/english/lts/security/2017/dla-848.data
deleted file mode 100644
index 571d9b270cd..00000000000
--- a/english/lts/security/2017/dla-848.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-848-1 freetype</define-tag>
-<define-tag report_date>2017-3-7</define-tag>
-<define-tag secrefs>CVE-2016-10244 Bug##856971</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-848.wml b/english/lts/security/2017/dla-848.wml
deleted file mode 100644
index 9eb44de93d1..00000000000
--- a/english/lts/security/2017/dla-848.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service vulnerability in freetype,
-a font rendering library.</p>
-
-<p>The parse_charstrings function did not ensure that a font contains a glyph
-name, which allowed remote attackers to cause a denial of service via a
-specially-crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in freetype version
-2.4.9-1.1+deb7u4.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-848.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-849.data b/english/lts/security/2017/dla-849.data
deleted file mode 100644
index 992267556c3..00000000000
--- a/english/lts/security/2017/dla-849.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-849-1 linux</define-tag>
-<define-tag report_date>2017-3-9</define-tag>
-<define-tag secrefs>CVE-2016-9588 CVE-2017-2636 CVE-2017-5669 CVE-2017-5986 CVE-2017-6214 CVE-2017-6345 CVE-2017-6346 CVE-2017-6348 CVE-2017-6353</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-849.wml b/english/lts/security/2017/dla-849.wml
deleted file mode 100644
index 30e49e30695..00000000000
--- a/english/lts/security/2017/dla-849.wml
+++ /dev/null
@@ -1,91 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or have other
-impacts.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9588">CVE-2016-9588</a>
-
- <p>Jim Mattson discovered that the KVM implementation for Intel x86
- processors does not properly handle #BP and #OF exceptions in an
- L2 (nested) virtual machine. A local attacker in an L2 guest VM
- can take advantage of this flaw to cause a denial of service for
- the L1 guest VM.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2636">CVE-2017-2636</a>
-
- <p>Alexander Popov discovered a race condition flaw in the n_hdlc
- line discipline that can lead to a double free. A local
- unprivileged user can take advantage of this flaw for privilege
- escalation. On systems that do not already have the n_hdlc module
- loaded, this can be mitigated by disabling it:
- echo &gt;&gt; /etc/modprobe.d/disable-n_hdlc.conf install n_hdlc false</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5669">CVE-2017-5669</a>
-
- <p>Gareth Evans reported that privileged users can map memory at
- address 0 through the shmat() system call. This could make it
- easier to exploit other kernel security vulnerabilities via a
- set-UID program.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5986">CVE-2017-5986</a>
-
- <p>Alexander Popov reported a race condition in the SCTP
- implementation that can be used by local users to cause a
- denial-of-service (crash). The initial fix for this was incorrect
- and introduced further security issues (<a href="https://security-tracker.debian.org/tracker/CVE-2017-6353">CVE-2017-6353</a>). This
- update includes a later fix that avoids those. On systems that do
- not already have the sctp module loaded, this can be mitigated by
- disabling it:
- echo &gt;&gt; /etc/modprobe.d/disable-sctp.conf install sctp false</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6214">CVE-2017-6214</a>
-
- <p>Dmitry Vyukov reported a bug in the TCP implementation's handling
- of urgent data in the splice() system call. This can be used by a
- remote attacker for denial-of-service (hang) against applications
- that read from TCP sockets with splice().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6345">CVE-2017-6345</a>
-
- <p>Andrey Konovalov reported that the LLC type 2 implementation
- incorrectly assigns socket buffer ownership. This might be usable
- by a local user to cause a denial-of-service (memory corruption or
- crash) or privilege escalation. On systems that do not already have
- the llc2 module loaded, this can be mitigated by disabling it:
- echo &gt;&gt; /etc/modprobe.d/disable-llc2.conf install llc2 false</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6346">CVE-2017-6346</a>
-
- <p>Dmitry Vyukov reported a race condition in the raw packet (af_packet)
- fanout feature. Local users with the CAP_NET_RAW capability (in any
- user namespace) can use this for denial-of-service and possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6348">CVE-2017-6348</a>
-
- <p>Dmitry Vyukov reported that the general queue implementation in
- the IrDA subsystem does not properly manage multiple locks,
- possibly allowing local users to cause a denial-of-service
- (deadlock) via crafted operations on IrDA devices.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.86-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.39-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-849.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-850.data b/english/lts/security/2017/dla-850.data
deleted file mode 100644
index 4c03e6e7036..00000000000
--- a/english/lts/security/2017/dla-850.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-850-1 vim</define-tag>
-<define-tag report_date>2017-3-10</define-tag>
-<define-tag secrefs>CVE-2017-6349 CVE-2017-6350 Bug##856266</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-850.wml b/english/lts/security/2017/dla-850.wml
deleted file mode 100644
index 8296e72e1c7..00000000000
--- a/english/lts/security/2017/dla-850.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6349">CVE-2017-6349</a>
-
- <p>An integer overflow at a u_read_undo memory allocation site would occur
- for vim before patch 8.0.0377, if it does not properly validate values
- for tree length when reading a corrupted undo file, which may lead to
- resultant buffer overflows.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6350">CVE-2017-6350</a>
-
- <p>An integer overflow at an unserialize_uep memory allocation site would
- occur for vim before patch 8.0.0378, if it does not properly validate
- values for tree length when reading a corrupted undo file, which may
- lead to resultant buffer overflows.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:7.3.547-7+deb7u3.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-850.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-851.data b/english/lts/security/2017/dla-851.data
deleted file mode 100644
index 2293a7fc816..00000000000
--- a/english/lts/security/2017/dla-851.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-851-1 wget</define-tag>
-<define-tag report_date>2017-3-9</define-tag>
-<define-tag secrefs>CVE-2017-6508 Bug##857073</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-851.wml b/english/lts/security/2017/dla-851.wml
deleted file mode 100644
index b175a101428..00000000000
--- a/english/lts/security/2017/dla-851.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a header injection vulnerability in wget (a tool
-to retrieve files from the web) which allowed remote attackers to inject
-arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in wget version
-1.13.4-3+deb7u4.</p>
-
-<p>We recommend that you upgrade your wget packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-851.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-852.data b/english/lts/security/2017/dla-852.data
deleted file mode 100644
index 7cba7bbd73f..00000000000
--- a/english/lts/security/2017/dla-852.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-852-1 firefox-esr</define-tag>
-<define-tag report_date>2017-3-10</define-tag>
-<define-tag secrefs>CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-852.wml b/english/lts/security/2017/dla-852.wml
deleted file mode 100644
index 050d37b3131..00000000000
--- a/english/lts/security/2017/dla-852.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees and other
-implementation errors may lead to the execution of arbitrary code, ASLR
-bypass, information disclosure or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.8.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-852.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-853.data b/english/lts/security/2017/dla-853.data
deleted file mode 100644
index b2045481740..00000000000
--- a/english/lts/security/2017/dla-853.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-853-1 pidgin</define-tag>
-<define-tag report_date>2017-3-11</define-tag>
-<define-tag secrefs>CVE-2017-2640</define-tag>
-<define-tag packages>pidgin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-853.wml b/english/lts/security/2017/dla-853.wml
deleted file mode 100644
index fed22be2623..00000000000
--- a/english/lts/security/2017/dla-853.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that an invalid XML file can trigger an out-of-bound
-memory access in Pidgin, a multi-protocol instant messaging client,
-when it is sent by a malicious server. This might lead to a crash or,
-in some extreme cases, to remote code execution in the client-side.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.10.10-1~deb7u3.</p>
-
-<p>We recommend that you upgrade your pidgin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-853.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-854.data b/english/lts/security/2017/dla-854.data
deleted file mode 100644
index 06b81afb8c0..00000000000
--- a/english/lts/security/2017/dla-854.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-854-1 icoutils</define-tag>
-<define-tag report_date>2017-3-13</define-tag>
-<define-tag secrefs>CVE-2017-6009 CVE-2017-6010 CVE-2017-6011 Bug#854054 Bug#854050</define-tag>
-<define-tag packages>icoutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-854.wml b/english/lts/security/2017/dla-854.wml
deleted file mode 100644
index 9f464d75b63..00000000000
--- a/english/lts/security/2017/dla-854.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Icoutils is a set of programs that deal with MS Windows icons and
-cursors. Resources such as icons and cursors can be extracted from
-MS Windows executable and library files with wrestool.</p>
-
-<p>Three vulnerabilities has been found in these tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6009">CVE-2017-6009</a>
-
- <p>A buffer overflow was observed in wrestool.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6010">CVE-2017-6010</a>
-
- <p>A buffer overflow was observed in the extract_icons function.
- This issue can be triggered by processing a corrupted ico file
- and will result in an icotool crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6011">CVE-2017-6011</a>
-
- <p>An out-of-bounds read leading to a buffer overflow was observed
- icotool.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.29.1-5deb7u2.</p>
-
-<p>We recommend that you upgrade your icoutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-854.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-855.data b/english/lts/security/2017/dla-855.data
deleted file mode 100644
index 28a3ccf96e4..00000000000
--- a/english/lts/security/2017/dla-855.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-855-1 roundcube</define-tag>
-<define-tag report_date>2017-3-13</define-tag>
-<define-tag secrefs>CVE-2017-6820 Bug#857473</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-855.wml b/english/lts/security/2017/dla-855.wml
deleted file mode 100644
index 35fc13c24d5..00000000000
--- a/english/lts/security/2017/dla-855.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Roundcube, a webmail solution for IMAP servers, was susceptible to
-a cross-site-scripting (XSS) vulnerability via a crafted Cascading
-Style Sheets (CSS) token sequence within an SVG element or HTML message.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7.2-9+deb7u6.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-855.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-856.data b/english/lts/security/2017/dla-856.data
deleted file mode 100644
index 3c2d33ff8a2..00000000000
--- a/english/lts/security/2017/dla-856.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-856-1 tzdata</define-tag>
-<define-tag report_date>2017-3-16</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-856.wml b/english/lts/security/2017/dla-856.wml
deleted file mode 100644
index 8aef429deac..00000000000
--- a/english/lts/security/2017/dla-856.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2017a. Notable
-changes are:</p>
-
-<ul>
-<li>Mongolia no longer observes DST.</li>
-<li>Magallanes region diverges from Santiago starting 2017-05-13,
- the America/Punta_Arenas zone has been added.</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2017a-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-856.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-857.data b/english/lts/security/2017/dla-857.data
deleted file mode 100644
index 410a3d539e3..00000000000
--- a/english/lts/security/2017/dla-857.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-857-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2017-3-16</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-857.wml b/english/lts/security/2017/dla-857.wml
deleted file mode 100644
index ab8bdeb9470..00000000000
--- a/english/lts/security/2017/dla-857.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2017a for the
-Perl bindings. For the list of changes, see DLA-856-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2017a.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-857.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-858.data b/english/lts/security/2017/dla-858.data
deleted file mode 100644
index ccb1f9243fe..00000000000
--- a/english/lts/security/2017/dla-858.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-858-1 wireshark</define-tag>
-<define-tag report_date>2017-3-17</define-tag>
-<define-tag secrefs>CVE-2017-5596 CVE-2017-5597 CVE-2017-6467 CVE-2017-6468 CVE-2017-6469 CVE-2017-6470 CVE-2017-6471 CVE-2017-6472 CVE-2017-6473 CVE-2017-6474</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-858.wml b/english/lts/security/2017/dla-858.wml
deleted file mode 100644
index e2950cbd5df..00000000000
--- a/english/lts/security/2017/dla-858.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Wireshark, a network protocol analyzer,
-contained several vulnerabilities in the dissectors for ASTERIX,
-DHCPv6, LDSS, IAX2, WSP and RTMPT and the NetScaler and K12 file
-parsers, that could lead to various crashes, denial-of-service, or
-execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u7.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-858.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-859.data b/english/lts/security/2017/dla-859.data
deleted file mode 100644
index e73f39478d6..00000000000
--- a/english/lts/security/2017/dla-859.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-859-1 calibre</define-tag>
-<define-tag report_date>2017-3-17</define-tag>
-<define-tag secrefs>CVE-2016-10187 Bug#853004</define-tag>
-<define-tag packages>calibre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-859.wml b/english/lts/security/2017/dla-859.wml
deleted file mode 100644
index 56aac4b317a..00000000000
--- a/english/lts/security/2017/dla-859.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was found that a javascript present in the book can access files on the
-computer using XMLHttpRequest.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.51+dfsg1-0.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your calibre packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-859.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-860.data b/english/lts/security/2017/dla-860.data
deleted file mode 100644
index b0aec9637fe..00000000000
--- a/english/lts/security/2017/dla-860.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-860-1 wordpress</define-tag>
-<define-tag report_date>2017-3-17</define-tag>
-<define-tag secrefs>CVE-2017-6814 CVE-2017-6815 CVE-2017-6816 Bug#857026</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-860.wml b/english/lts/security/2017/dla-860.wml
deleted file mode 100644
index a4edec76f4d..00000000000
--- a/english/lts/security/2017/dla-860.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6814">CVE-2017-6814</a>
-
- <p>Cross-Site Scripting (XSS) vulnerability via media file metadata</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6815">CVE-2017-6815</a>
-
- <p>Control characters can trick redirect URL validation in
- wp-includes/pluggable.php</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6816">CVE-2017-6816</a>
-
- <p>Unintended files can be deleted by administrators using the plugin
- deletion functionality</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u14.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-860.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-861.data b/english/lts/security/2017/dla-861.data
deleted file mode 100644
index d2c7c552345..00000000000
--- a/english/lts/security/2017/dla-861.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-861-1 r-base</define-tag>
-<define-tag report_date>2017-3-17</define-tag>
-<define-tag secrefs>CVE-2016-8714 Bug##857466</define-tag>
-<define-tag packages>r-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-861.wml b/english/lts/security/2017/dla-861.wml
deleted file mode 100644
index 8146b7be39f..00000000000
--- a/english/lts/security/2017/dla-861.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An exploitable buffer overflow vulnerability exists in the
-LoadEncoding functionality of the R programming language. A
-specially crafted R script can cause a buffer overflow
-resulting in a memory corruption. An attacker can send a
-malicious R script to trigger this vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2.15.1-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your r-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-861.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-862.data b/english/lts/security/2017/dla-862.data
deleted file mode 100644
index 4e950bbd044..00000000000
--- a/english/lts/security/2017/dla-862.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-862-1 sitesummary</define-tag>
-<define-tag report_date>2017-3-19</define-tag>
-<define-tag secrefs>Bug#852623</define-tag>
-<define-tag packages>sitesummary</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-862.wml b/english/lts/security/2017/dla-862.wml
deleted file mode 100644
index 500c8eb4d1b..00000000000
--- a/english/lts/security/2017/dla-862.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-8743">CVE-2016-8743</a>
-in apache2 2.2.22-13+deb7u8 (DLA-841-1) caused
-#852623 in sitesummary, breaking the sitesummary-upload functionality.
-To address this sitesummary-upload needs to be changed to send CRLF (\r\n)
-line endings to be compliant with the apache security fixes for HTTP requests.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.1.8+deb7u2.</p>
-
-<p>We recommend that you upgrade your sitesummary packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-862.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-863.data b/english/lts/security/2017/dla-863.data
deleted file mode 100644
index 741ecf0a5e0..00000000000
--- a/english/lts/security/2017/dla-863.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-863-1 deluge</define-tag>
-<define-tag report_date>2017-3-19</define-tag>
-<define-tag secrefs>CVE-2017-7178 Bug##857903</define-tag>
-<define-tag packages>deluge</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-863.wml b/english/lts/security/2017/dla-863.wml
deleted file mode 100644
index 0816bf87337..00000000000
--- a/english/lts/security/2017/dla-863.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a cross-site request forgery vulnerability in
-the WebUI component of the <q>deluge</q> Bittorrent client.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in deluge version
-1.3.3-2+nmu1+deb7u1.</p>
-
-<p>We recommend that you upgrade your deluge packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-863.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-864.data b/english/lts/security/2017/dla-864.data
deleted file mode 100644
index 1d3d4ac7407..00000000000
--- a/english/lts/security/2017/dla-864.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-864-1 jhead</define-tag>
-<define-tag report_date>2017-3-22</define-tag>
-<define-tag secrefs>CVE-2016-3822 Bug##858213</define-tag>
-<define-tag packages>jhead</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-864.wml b/english/lts/security/2017/dla-864.wml
deleted file mode 100644
index 728337c0fc7..00000000000
--- a/english/lts/security/2017/dla-864.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability in jhead, a tool to manipulate
-the non-image part of EXIF-compliant JPEG files; remote attackers were able to
-execute arbitrary code via crafted image data.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in jhead version
-1:2.95-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your jhead packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-864.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-865.data b/english/lts/security/2017/dla-865.data
deleted file mode 100644
index 8bdf2f8d6e5..00000000000
--- a/english/lts/security/2017/dla-865.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-865-1 suricata</define-tag>
-<define-tag report_date>2017-3-22</define-tag>
-<define-tag secrefs>CVE-2017-7177 Bug##856649</define-tag>
-<define-tag packages>suricata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-865.wml b/english/lts/security/2017/dla-865.wml
deleted file mode 100644
index 4e0a4f79dbd..00000000000
--- a/english/lts/security/2017/dla-865.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability in suricata, an intrusion
-detection tool; the IP protocol was not being used to match fragments with
-their packets allowing a carefully constructed packet (with a different
-protocol) to be matched, thus creating a packet that would not be
-re-assembled by the destination host.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in suricata version
-1.2.1-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your suricata packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-865.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-866.data b/english/lts/security/2017/dla-866.data
deleted file mode 100644
index 3d25963be97..00000000000
--- a/english/lts/security/2017/dla-866.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-866-1 libxslt</define-tag>
-<define-tag report_date>2017-3-23</define-tag>
-<define-tag secrefs>CVE-2017-5029 Bug#858546</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-866.wml b/english/lts/security/2017/dla-866.wml
deleted file mode 100644
index 6123c5e4dd8..00000000000
--- a/english/lts/security/2017/dla-866.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libxslt is vulnerable to an integer overflow in the xsltAddTextString
-function that can be exploited to trigger an out of bounds write on 64-bit
-systems.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-1.1.26-14.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-866.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-867.data b/english/lts/security/2017/dla-867.data
deleted file mode 100644
index 54b3c7c2a41..00000000000
--- a/english/lts/security/2017/dla-867.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-867-1 audiofile</define-tag>
-<define-tag report_date>2017-3-23</define-tag>
-<define-tag secrefs>CVE-2017-6829 CVE-2017-6830 CVE-2017-6831 CVE-2017-6832 CVE-2017-6833 CVE-2017-6834 CVE-2017-6835 CVE-2017-6836 CVE-2017-6837 CVE-2017-6838 CVE-2017-6839 Bug#857651</define-tag>
-<define-tag packages>audiofile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-867.wml b/english/lts/security/2017/dla-867.wml
deleted file mode 100644
index d30041db193..00000000000
--- a/english/lts/security/2017/dla-867.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities has been found in audiofile.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6829">CVE-2017-6829</a>
-
- <p>Allows remote attackers to cause a denial of service (crash) via a
- crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6830">CVE-2017-6830</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6834">CVE-2017-6834</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6831">CVE-2017-6831</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6832">CVE-2017-6832</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6838">CVE-2017-6838</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6839">CVE-2017-6839</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6836">CVE-2017-6836</a>
-
- <p>Heap-based buffer overflow in that allows remote attackers to cause
- a denial of service (crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6833">CVE-2017-6833</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6835">CVE-2017-6835</a>
-
- <p>The runPull function allows remote attackers to cause a denial of
- service (divide-by-zero error and crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6837">CVE-2017-6837</a>
-
- <p>Allows remote attackers to cause a denial of service (crash) via
- vectors related to a large number of coefficients.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.3.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your audiofile packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-867.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-868.data b/english/lts/security/2017/dla-868.data
deleted file mode 100644
index b499835f7f5..00000000000
--- a/english/lts/security/2017/dla-868.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-868-1 imagemagick</define-tag>
-<define-tag report_date>2017-3-24</define-tag>
-<define-tag secrefs>CVE-2016-10062 CVE-2017-6498 CVE-2017-6500 Bug#849439 Bug#856878 Bug#856879</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-868.wml b/english/lts/security/2017/dla-868.wml
deleted file mode 100644
index cdfa4574c89..00000000000
--- a/english/lts/security/2017/dla-868.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been discovered in ImageMagick, a popular set of
-programs and libraries for image manipulation. These issues include
-denial of service and memory buffer over-read.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u12.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-868.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-869.data b/english/lts/security/2017/dla-869.data
deleted file mode 100644
index da48d2fc7e3..00000000000
--- a/english/lts/security/2017/dla-869.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-869-1 cgiemail</define-tag>
-<define-tag report_date>2017-3-24</define-tag>
-<define-tag secrefs>CVE-2017-5613 CVE-2017-5614 CVE-2017-5615 CVE-2017-5616 Bug#852031</define-tag>
-<define-tag packages>cgiemail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-869.wml b/english/lts/security/2017/dla-869.wml
deleted file mode 100644
index cb522117b0b..00000000000
--- a/english/lts/security/2017/dla-869.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The cPanel Security Team discovered several security vulnerabilities in
-cgiemail, a CGI program used to create HTML forms for sending mails:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5613">CVE-2017-5613</a>
-
- <p>A format string injection vulnerability allowed to supply arbitrary
- format strings to cgiemail and cgiecho. A local attacker with
- permissions to provide a cgiemail template could use this
- vulnerability to execute code as webserver user.
- Format strings in cgiemail tempaltes are now restricted to simple
- %s, %U and %H sequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5614">CVE-2017-5614</a>
-
- <p>An open redirect vulnerability in cgiemail and cgiecho binaries
- could be exploited by a local attacker to force redirect to an
- arbitrary URL. These redirects are now limited to the domain that
- handled the request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5615">CVE-2017-5615</a>
-
- <p>A vulnerability in cgiemail and cgiecho binaries allowed injection
- of additional HTTP headers. Newline characters are now stripped
- from the redirect location to protect against this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5616">CVE-2017-5616</a>
-
- <p>Missing escaping of the addendum parameter lead to a reflected
- cross-site (XSS) vulnerability in cgiemail and cgiecho binaries.
- The output is now html escaped.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.6-37+deb7u1.</p>
-
-<p>We recommend that you upgrade your cgiemail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-869.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-870.data b/english/lts/security/2017/dla-870.data
deleted file mode 100644
index b2964608615..00000000000
--- a/english/lts/security/2017/dla-870.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-870-1 libplist</define-tag>
-<define-tag report_date>2017-3-24</define-tag>
-<define-tag secrefs>CVE-2017-6435 CVE-2017-6436 CVE-2017-6439</define-tag>
-<define-tag packages>libplist</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-870.wml b/english/lts/security/2017/dla-870.wml
deleted file mode 100644
index bf2ba0fdf40..00000000000
--- a/english/lts/security/2017/dla-870.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>More vulnerabilities were discovered in libplist, a library for
-reading and writing the Apple binary and XML property lists format.
-A maliciously crafted plist file could cause a denial-of-service
-(application crash) by triggering a heap-based buffer overflow or
-memory allocation error in the parse_string_node function.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libplist packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-870.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-871.data b/english/lts/security/2017/dla-871.data
deleted file mode 100644
index 6eaa447323c..00000000000
--- a/english/lts/security/2017/dla-871.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-871-1 python3.2</define-tag>
-<define-tag report_date>2017-3-25</define-tag>
-<define-tag secrefs>CVE-2016-0772</define-tag>
-<define-tag packages>python3.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-871.wml b/english/lts/security/2017/dla-871.wml
deleted file mode 100644
index dfbb5b04d05..00000000000
--- a/english/lts/security/2017/dla-871.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a TLS stripping vulnerability in the smptlib
-library distributed with the CPython interpreter.</p>
-
-<p>The library did not return an error if StartTLS failed, which might have
-allowed man-in-the-middle attackers to bypass the TLS protections by leveraging
-a network position to block the StartTLS command.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python3.2 version
-3.2.3-7+deb7u1.</p>
-
-<p>We recommend that you upgrade your python3.2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-871.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-872.data b/english/lts/security/2017/dla-872.data
deleted file mode 100644
index ae68873e324..00000000000
--- a/english/lts/security/2017/dla-872.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-872-1 xrdp</define-tag>
-<define-tag report_date>2017-3-27</define-tag>
-<define-tag secrefs>CVE-2017-6967 Bug#858143</define-tag>
-<define-tag packages>xrdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-872.wml b/english/lts/security/2017/dla-872.wml
deleted file mode 100644
index 23d3542a9f6..00000000000
--- a/english/lts/security/2017/dla-872.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that xrdp, a Remote Desktop Protocol (RDP) server,
-calls the PAM function auth_start_session() in an incorrect location,
-leading to PAM session modules not being properly initialized, with a
-potential consequence of incorrect configurations or elevation of
-privileges, aka a pam_limits.so bypass.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.0-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your xrdp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-872.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-873.data b/english/lts/security/2017/dla-873.data
deleted file mode 100644
index 16d5ee774df..00000000000
--- a/english/lts/security/2017/dla-873.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-873-1 apt-cacher</define-tag>
-<define-tag report_date>2017-3-27</define-tag>
-<define-tag secrefs>Bug##858739</define-tag>
-<define-tag packages>apt-cacher</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-873.wml b/english/lts/security/2017/dla-873.wml
deleted file mode 100644
index 9c2c1a69019..00000000000
--- a/english/lts/security/2017/dla-873.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a HTTP response splitting vulnerability in
-apt-cacher, a proxy server for Debian/Ubuntu software repositories.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in apt-cacher version
-1.7.6+deb7u1.</p>
-
-<p>We recommend that you upgrade your apt-cacher packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-873.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-874.data b/english/lts/security/2017/dla-874.data
deleted file mode 100644
index c07fdb573d2..00000000000
--- a/english/lts/security/2017/dla-874.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-874-1 jbig2dec</define-tag>
-<define-tag report_date>2017-3-27</define-tag>
-<define-tag secrefs>CVE-2016-9601</define-tag>
-<define-tag packages>jbig2dec</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-874.wml b/english/lts/security/2017/dla-874.wml
deleted file mode 100644
index 87b8be2bc1d..00000000000
--- a/english/lts/security/2017/dla-874.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the JBIG2 decoder library,
-which may lead to lead to denial of service or the execution of arbitrary
-code if a malformed image file (usually embedded in a PDF document) is
-opened.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.13-4~deb7u1.</p>
-
-<p>For the stable distribution (jessie), this problem has been fixed in
-version 0.13-4~deb8u1.</p>
-
-<p>For the upcoming stable distribution (stretch) and for the unstable
-distribution (sid), this problem has been fixed in version 0.13-4.</p>
-
-<p>We recommend that you upgrade your jbig2dec packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-874.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-875.data b/english/lts/security/2017/dla-875.data
deleted file mode 100644
index 386b8c14098..00000000000
--- a/english/lts/security/2017/dla-875.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-875-1 php5</define-tag>
-<define-tag report_date>2017-3-27</define-tag>
-<define-tag secrefs>CVE-2016-7478 CVE-2016-7479 CVE-2017-7272</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-875.wml b/english/lts/security/2017/dla-875.wml
deleted file mode 100644
index 3aec05a24b7..00000000000
--- a/english/lts/security/2017/dla-875.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in PHP (recursive acronym for PHP:
-Hypertext Preprocessor), a widely-used open source general-purpose
-scripting language that is especially suited for web development and can
-be embedded into HTML.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7478">CVE-2016-7478</a>
-
- <p>Zend/zend_exceptions.c in PHP allows remote attackers to
- cause a denial of service (infinite loop) via a crafted Exception
- object in serialized data, a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2015-8876">CVE-2015-8876</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7479">CVE-2016-7479</a>
-
- <p>During the unserialization process, resizing the <q>properties</q> hash
- table of a serialized object may lead to use-after-free. A remote
- attacker may exploit this bug to gain the ability of arbitrary code
- execution. Even though the property table issue only affects PHP 7
- this change also prevents a wide range of other __wakeup() based
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7272">CVE-2017-7272</a>
-
- <p>The fsockopen() function will use the port number which is defined
- in hostname instead of the port number passed to the second
- parameter of the function. This misbehavior may introduce another
- attack vector for an already known application vulnerability (e.g.
- Server Side Request Forgery).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u8.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-875.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-876.data b/english/lts/security/2017/dla-876.data
deleted file mode 100644
index d1469602507..00000000000
--- a/english/lts/security/2017/dla-876.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-876-1 eject</define-tag>
-<define-tag report_date>2017-3-28</define-tag>
-<define-tag secrefs>CVE-2017-6964 Bug##858872</define-tag>
-<define-tag packages>eject</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-876.wml b/english/lts/security/2017/dla-876.wml
deleted file mode 100644
index fc5cfb36474..00000000000
--- a/english/lts/security/2017/dla-876.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ilja Van Sprundel discovered that eject (a tool to eject CD/DVD drives) did not
-properly handle errors returned from setuid/setgid.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in eject version
-2.1.5+deb1+cvs20081104-13+deb7u1.</p>
-
-<p>We recommend that you upgrade your eject packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-876.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-877.data b/english/lts/security/2017/dla-877.data
deleted file mode 100644
index caa62732e4f..00000000000
--- a/english/lts/security/2017/dla-877.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-877-1 tiff</define-tag>
-<define-tag report_date>2017-3-28</define-tag>
-<define-tag secrefs>CVE-2016-10266 CVE-2016-10267 CVE-2016-10268 CVE-2016-10269</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-877.wml b/english/lts/security/2017/dla-877.wml
deleted file mode 100644
index f27bbbc13a3..00000000000
--- a/english/lts/security/2017/dla-877.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libtiff is vulnerable to multiple buffer overflows and integer overflows
-that can lead to application crashes (denial of service) or worse.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10266">CVE-2016-10266</a>
-
- <p>Integer overflow that can lead to divide-by-zero in
- TIFFReadEncodedStrip (tif_read.c).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10267">CVE-2016-10267</a>
-
- <p>Divide-by-zero error in OJPEGDecodeRaw (tif_ojpeg.c).
-
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-10268">CVE-2016-10268</a></p>
-
- <p>Heap-based buffer overflow in TIFFReverseBits (tif_swab.c).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10269">CVE-2016-10269</a>
-
- <p>Heap-based buffer overflow in _TIFFmemcpy (tif_unix.c).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u11.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-877.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-878.data b/english/lts/security/2017/dla-878.data
deleted file mode 100644
index 689867c5cd5..00000000000
--- a/english/lts/security/2017/dla-878.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-878-1 libytnef</define-tag>
-<define-tag report_date>2017-3-28</define-tag>
-<define-tag secrefs>CVE-2017-6298 CVE-2017-6299 CVE-2017-6300 CVE-2017-6301 CVE-2017-6302 CVE-2017-6303 CVE-2017-6304 CVE-2017-6305 CVE-2017-6801 CVE-2017-6802</define-tag>
-<define-tag packages>libytnef</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-878.wml b/english/lts/security/2017/dla-878.wml
deleted file mode 100644
index 3d47588c3c2..00000000000
--- a/english/lts/security/2017/dla-878.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6298">CVE-2017-6298</a>
-
- <p>Null Pointer Deref / calloc return value not checked</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6299">CVE-2017-6299</a>
-
- <p>Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6300">CVE-2017-6300</a>
-
- <p>Buffer Overflow in version field in lib/tnef-types.h</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6301">CVE-2017-6301</a>
-
- <p>Out of Bounds Reads</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6302">CVE-2017-6302</a>
-
- <p>Integer Overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6303">CVE-2017-6303</a>
-
- <p>Invalid Write and Integer Overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6304">CVE-2017-6304</a>
-
- <p>Out of Bounds read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6305">CVE-2017-6305</a>
-
- <p>Out of Bounds read and write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6801">CVE-2017-6801</a>
-
- <p>Out-of-bounds access with fields of Size 0 in TNEFParse() in libytnef</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6802">CVE-2017-6802</a>
-
- <p>Heap-based buffer over-read on incoming Compressed RTF Streams,
- related to DecompressRTF() in libytnef</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.5-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your libytnef packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-878.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-879.data b/english/lts/security/2017/dla-879.data
deleted file mode 100644
index cda554172c9..00000000000
--- a/english/lts/security/2017/dla-879.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-879-1 firebird2.5</define-tag>
-<define-tag report_date>2017-3-29</define-tag>
-<define-tag secrefs>CVE-2017-6369 Bug#858641</define-tag>
-<define-tag packages>firebird2.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-879.wml b/english/lts/security/2017/dla-879.wml
deleted file mode 100644
index 262cfcbb4a0..00000000000
--- a/english/lts/security/2017/dla-879.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>George Noseevich discovered that firebird2.5, a relational database
-system, did not properly check User-Defined Functions (UDF), thus
-allowing remote authenticated users to execute arbitrary code on the
-firebird server.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.5.2.26540.ds4-1~deb7u3.</p>
-
-<p>We recommend that you upgrade your firebird2.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-879.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-880.data b/english/lts/security/2017/dla-880.data
deleted file mode 100644
index 76e8bde059f..00000000000
--- a/english/lts/security/2017/dla-880.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-880-1 tiff3</define-tag>
-<define-tag report_date>2017-3-30</define-tag>
-<define-tag secrefs>CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 CVE-2015-8784 CVE-2016-9533 CVE-2016-9534 CVE-2016-9535</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-880.wml b/english/lts/security/2017/dla-880.wml
deleted file mode 100644
index 4863b9b6869..00000000000
--- a/english/lts/security/2017/dla-880.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>tiff3 is affected by multiple issues that can result at least in denial of
-services of applications using libtiff4. Crafted TIFF files can be
-provided to trigger: abort() calls via failing assertions, buffer overruns
-(both in read and write mode).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8781">CVE-2015-8781</a>
-
- <p>tif_luv.c in libtiff allows attackers to cause a denial of service
- (out-of-bounds write) via an invalid number of samples per pixel in a
- LogL compressed TIFF image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8782">CVE-2015-8782</a>
-
- <p>tif_luv.c in libtiff allows attackers to cause a denial of service
- (out-of-bounds writes) via a crafted TIFF image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8783">CVE-2015-8783</a>
-
- <p>tif_luv.c in libtiff allows attackers to cause a denial of service
- (out-of-bounds reads) via a crafted TIFF image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8784">CVE-2015-8784</a>
-
- <p>The NeXTDecode function in tif_next.c in LibTIFF allows remote
- attackers to cause a denial of service (out-of-bounds write) via a
- crafted TIFF image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9533">CVE-2016-9533</a>
-
- <p>tif_pixarlog.c in libtiff 4.0.6 has out-of-bounds write
- vulnerabilities in heap allocated buffers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9534">CVE-2016-9534</a>
-
- <p>tif_write.c in libtiff 4.0.6 has an issue in the error code path of
- TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp
- members. </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9535">CVE-2016-9535</a>
-
- <p>tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions
- that can lead to assertion failures in debug mode, or buffer
- overflows in release mode, when dealing with unusual tile size
- like YCbCr with subsampling.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u4.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-880.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-881.data b/english/lts/security/2017/dla-881.data
deleted file mode 100644
index 9cf87e1cb46..00000000000
--- a/english/lts/security/2017/dla-881.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-881-1 ejabberd</define-tag>
-<define-tag report_date>2017-4-1</define-tag>
-<define-tag secrefs>CVE-2014-8760 Bug#767521 Bug#767535</define-tag>
-<define-tag packages>ejabberd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-881.wml b/english/lts/security/2017/dla-881.wml
deleted file mode 100644
index 5ce86e9d207..00000000000
--- a/english/lts/security/2017/dla-881.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that ejabberd does not enforce the starttls_required
-setting when compression is used, which causes clients to establish
-connections without encryption.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2.1.10-4+deb7u2.</p>
-
-<p>This update also disables the insecure SSLv3.</p>
-
-<p>We recommend that you upgrade your ejabberd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-881.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-882.data b/english/lts/security/2017/dla-882.data
deleted file mode 100644
index 1d26504e95b..00000000000
--- a/english/lts/security/2017/dla-882.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-882-1 tryton-server</define-tag>
-<define-tag report_date>2017-4-4</define-tag>
-<define-tag secrefs>CVE-2017-0360</define-tag>
-<define-tag packages>tryton-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-882.wml b/english/lts/security/2017/dla-882.wml
deleted file mode 100644
index 1aac9ffc9ba..00000000000
--- a/english/lts/security/2017/dla-882.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a path suffix injection attack in
-tryton-server, a general purpose application platform.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in tryton-server version
-2.2.4-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your tryton-server packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-882.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-883.data b/english/lts/security/2017/dla-883.data
deleted file mode 100644
index 474aa0338b3..00000000000
--- a/english/lts/security/2017/dla-883.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-883-1 curl</define-tag>
-<define-tag report_date>2017-4-4</define-tag>
-<define-tag secrefs>CVE-2017-7407</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-883.wml b/english/lts/security/2017/dla-883.wml
deleted file mode 100644
index 46bcd78a081..00000000000
--- a/english/lts/security/2017/dla-883.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a buffer read overrun vulnerability in curl,
-a tool for downloading files from the internet, etc.</p>
-
-<p>If a "%" ended the --write-out parameter, the string's trailing NUL would be
-skipped and memory past the end of the buffer could be accessed and potentially
-displayed as part of the output.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in curl version
-7.26.0-1+wheezy18+deb7u1.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-883.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-884.data b/english/lts/security/2017/dla-884.data
deleted file mode 100644
index 518caf16316..00000000000
--- a/english/lts/security/2017/dla-884.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-884-1 collectd</define-tag>
-<define-tag report_date>2017-4-4</define-tag>
-<define-tag secrefs>CVE-2017-7401 Bug##859494</define-tag>
-<define-tag packages>collectd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-884.wml b/english/lts/security/2017/dla-884.wml
deleted file mode 100644
index d4df2793f19..00000000000
--- a/english/lts/security/2017/dla-884.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an infinite loop vulnerability in collectd, a
-statistics collection and monitoring daemon.</p>
-
-<p>When a correct <q>Signature part</q> is received by an instance configured without
-the AuthFile option, an endless loop occurs in the parse_packet routine due to
-a missing pointer increment to the next unprocessed part.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in collectd version
-5.1.0-3+deb7u3.</p>
-
-<p>We recommend that you upgrade your collectd packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-884.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-885.data b/english/lts/security/2017/dla-885.data
deleted file mode 100644
index 6d7bdff771e..00000000000
--- a/english/lts/security/2017/dla-885.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-885-1 python-django</define-tag>
-<define-tag report_date>2017-4-5</define-tag>
-<define-tag secrefs>CVE-2017-7233 CVE-2017-7234 Bug##859515 Bug##859516</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-885.wml b/english/lts/security/2017/dla-885.wml
deleted file mode 100644
index b841c9a66d1..00000000000
--- a/english/lts/security/2017/dla-885.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities in python-django, a
-high-level Python web development framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7233">CVE-2017-7233</a> (#859515)
-
-<p>Open redirect and possible XSS attack via
-user-supplied numeric redirect URLs. Django relies on user input in some cases
-(e.g. django.contrib.auth.views.login() and i18n) to redirect the user to an
-<q>on success</q> URL. The security check for these redirects (namely is_safe_url())
-considered some numeric URLs (e.g. http:999999999) <q>safe</q> when they shouldn't
-be. Also, if a developer relied on is_safe_url() to provide safe redirect
-targets and puts such a URL into a link, they could suffer from an XSS attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7234">CVE-2017-7234</a> (#895516)
-
-<p>Open redirect vulnerability in
-django.views.static.serve; A maliciously crafted URL to a Django site using the
-serve() view could redirect to any other domain. The view no longer does any
-redirects as they don't provide any known, useful functionality.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in python-django version
-1.4.22-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-885.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-886.data b/english/lts/security/2017/dla-886.data
deleted file mode 100644
index 09817d2adf3..00000000000
--- a/english/lts/security/2017/dla-886.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-886-1 tzdata</define-tag>
-<define-tag report_date>2017-4-7</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-886.wml b/english/lts/security/2017/dla-886.wml
deleted file mode 100644
index d2a72309186..00000000000
--- a/english/lts/security/2017/dla-886.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2017b. Notable
-changes are:</p>
-<ul>
-<li>Haiti resumed observance of DST in 2017.</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2017b-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-886.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-887.data b/english/lts/security/2017/dla-887.data
deleted file mode 100644
index 786867b1d70..00000000000
--- a/english/lts/security/2017/dla-887.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-887-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2017-4-7</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-887.wml b/english/lts/security/2017/dla-887.wml
deleted file mode 100644
index fec29b015ae..00000000000
--- a/english/lts/security/2017/dla-887.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2017b for the
-Perl bindings. For the list of changes, see DLA-886-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2017b.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-887.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-888.data b/english/lts/security/2017/dla-888.data
deleted file mode 100644
index 650ec6ea8bd..00000000000
--- a/english/lts/security/2017/dla-888.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-888-1 logback</define-tag>
-<define-tag report_date>2017-4-7</define-tag>
-<define-tag secrefs>CVE-2017-5929 Bug#857343</define-tag>
-<define-tag packages>logback</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-888.wml b/english/lts/security/2017/dla-888.wml
deleted file mode 100644
index 048592f3afe..00000000000
--- a/english/lts/security/2017/dla-888.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that logback, a flexible logging library for Java,
-would deserialize data from untrusted sockets which may lead to the
-execution of arbitrary code. This issue has been resolved by adding a
-whitelist to use only trusted classes.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.0.4-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your logback packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-888.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-889.data b/english/lts/security/2017/dla-889.data
deleted file mode 100644
index afd1403731e..00000000000
--- a/english/lts/security/2017/dla-889.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-889-1 potrace</define-tag>
-<define-tag report_date>2017-4-9</define-tag>
-<define-tag secrefs>CVE-2016-8685 Bug#843861</define-tag>
-<define-tag packages>potrace</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-889.wml b/english/lts/security/2017/dla-889.wml
deleted file mode 100644
index 53efe005bc6..00000000000
--- a/english/lts/security/2017/dla-889.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that potrace, an utility to transform bitmaps into
-vector graphics, was affected by an integer overflow in the findnext
-function, allowing remote attackers to cause a denial of service
-(invalid memory access and crash) via a crafted BMP image.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your potrace packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-889.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-890.data b/english/lts/security/2017/dla-890.data
deleted file mode 100644
index 46d27cd276e..00000000000
--- a/english/lts/security/2017/dla-890.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-890-1 ming</define-tag>
-<define-tag report_date>2017-4-10</define-tag>
-<define-tag secrefs>CVE-2017-7578</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-890.wml b/english/lts/security/2017/dla-890.wml
deleted file mode 100644
index 76fc01613bb..00000000000
--- a/english/lts/security/2017/dla-890.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were multiple heap-based buffer overflows in ming,
-a library to generate SWF (Flash) files.</p>
-
-<p>The updated packages prevent a crash in the <q>listswf</q> utility due to a
-heap-based buffer overflow in the parseSWF_RGBA function and several other
-functions in parser.c.</p>
-
-<p>AddressSanitizer flagged them as invalid writes <q>of size 1</q> but the heap could
-be written to multiple times. The overflows are caused by a pointer behind the
-bounds of a statically allocated array of structs of type SWF_GRADIENTRECORD.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in ming version
-1:0.4.4-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-890.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-891.data b/english/lts/security/2017/dla-891.data
deleted file mode 100644
index 06d103ae35e..00000000000
--- a/english/lts/security/2017/dla-891.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-891-1 libnl</define-tag>
-<define-tag report_date>2017-4-10</define-tag>
-<define-tag secrefs>CVE-2017-0553</define-tag>
-<define-tag packages>libnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-891.wml b/english/lts/security/2017/dla-891.wml
deleted file mode 100644
index d8796369aa4..00000000000
--- a/english/lts/security/2017/dla-891.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an integer overflow vulnerability in libnl,
-a library used for interprocess communication (IPC).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libnl version
-1.1-7+deb7u1.</p>
-
-<p>We recommend that you upgrade your libnl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-891.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-892.data b/english/lts/security/2017/dla-892.data
deleted file mode 100644
index 435131cf4c5..00000000000
--- a/english/lts/security/2017/dla-892.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-892-1 libnl3</define-tag>
-<define-tag report_date>2017-4-10</define-tag>
-<define-tag secrefs>CVE-2017-0553 Bug##859948</define-tag>
-<define-tag packages>libnl3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-892.wml b/english/lts/security/2017/dla-892.wml
deleted file mode 100644
index 2b660458e7f..00000000000
--- a/english/lts/security/2017/dla-892.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an integer overflow in libnl3, a library for
-dealing with netlink sockets.</p>
-
-<p>A missing check in nlmsg_reserve() could have allowed a malicious application
-to execute arbitrary code within the context of the WiFi service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libnl3 version
-3.2.7-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your libnl3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-892.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-893.data b/english/lts/security/2017/dla-893.data
deleted file mode 100644
index 9f1c145a257..00000000000
--- a/english/lts/security/2017/dla-893.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-893-1 bouncycastle</define-tag>
-<define-tag report_date>2017-4-10</define-tag>
-<define-tag secrefs>CVE-2015-6644</define-tag>
-<define-tag packages>bouncycastle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-893.wml b/english/lts/security/2017/dla-893.wml
deleted file mode 100644
index 5be3e4d0403..00000000000
--- a/english/lts/security/2017/dla-893.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An information disclosure vulnerability was discovered in Bouncy
-Castle, a Java library which consists of various cryptographic
-algorithms. The Galois/Counter mode (GCM) implementation was missing a
-boundary check that could enable a local application to gain access to
-user's private information.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.44+dfsg-3.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your bouncycastle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-893.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-894.data b/english/lts/security/2017/dla-894.data
deleted file mode 100644
index 8f465f45b26..00000000000
--- a/english/lts/security/2017/dla-894.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-894-1 samba</define-tag>
-<define-tag report_date>2017-4-11</define-tag>
-<define-tag secrefs>CVE-2017-2619</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-894.wml b/english/lts/security/2017/dla-894.wml
deleted file mode 100644
index 428d3cca3f4..00000000000
--- a/english/lts/security/2017/dla-894.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn of Google discovered a time-of-check, time-of-use race
-condition in Samba, a SMB/CIFS file, print, and login server for Unix. A
-malicious client can take advantage of this flaw by exploting a symlink
-race to access areas of the server file system not exported under a
-share definition.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.6.6-6+deb7u12.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-894.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-895.data b/english/lts/security/2017/dla-895.data
deleted file mode 100644
index c346795e1eb..00000000000
--- a/english/lts/security/2017/dla-895.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-895-1 openoffice.org-dictionaries</define-tag>
-<define-tag report_date>2017-4-14</define-tag>
-<define-tag secrefs>Bug##646693</define-tag>
-<define-tag packages>openoffice.org-dictionaries</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-895.wml b/english/lts/security/2017/dla-895.wml
deleted file mode 100644
index 42554d9c639..00000000000
--- a/english/lts/security/2017/dla-895.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The dictionaries provided by this package had an unversioned conflict
-against the thunderbird package (which so far was not part of wheezy).</p>
-
-<p>Since the next update of Icedove introduces a thunderbird package the
-dictionaries would become unusable in Icedove so the (unneeded) conflict
-was dropped.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.3.0~rc10-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your openoffice.org-dictionaries packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-895.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-896.data b/english/lts/security/2017/dla-896.data
deleted file mode 100644
index 55c95faec51..00000000000
--- a/english/lts/security/2017/dla-896.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-896-1 icedove</define-tag>
-<define-tag report_date>2017-4-19</define-tag>
-<define-tag secrefs>CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 CVE-2017-5378 CVE-2017-5380 CVE-2017-5383 CVE-2017-5390 CVE-2017-5396 CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410</define-tag>
-<define-tag packages>icedove</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-896.wml b/english/lts/security/2017/dla-896.wml
deleted file mode 100644
index 02908072cf4..00000000000
--- a/english/lts/security/2017/dla-896.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, buffer overflows and other
-implementation errors may lead to the execution of arbitrary code or spoofing.</p>
-
-<p>With version 45.8 Debian drops it's custom branding from the Icedove package
-and ships the mail client as Thunderbird again. Please see the link below for
-further information:
- <a href="https://wiki.debian.org/Thunderbird">https://wiki.debian.org/Thunderbird</a></p>
-
-<p>Transition packages for the Icedove packages are provided which
-automatically upgrade to the new version. Since new binary packages need
-to be installed, make sure to allow that in your upgrade procedure (e.g.
-by using "apt-get dist-upgrade" instead of "apt-get upgrade").</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:45.8.0-3~deb7u1.</p>
-
-<p>We recommend that you upgrade your icedove packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-896.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-897.data b/english/lts/security/2017/dla-897.data
deleted file mode 100644
index d100bdd133e..00000000000
--- a/english/lts/security/2017/dla-897.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-897-1 qbittorrent</define-tag>
-<define-tag report_date>2017-4-16</define-tag>
-<define-tag secrefs>CVE-2017-6503 CVE-2017-6504</define-tag>
-<define-tag packages>qbittorrent</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-897.wml b/english/lts/security/2017/dla-897.wml
deleted file mode 100644
index fea9a6e1a27..00000000000
--- a/english/lts/security/2017/dla-897.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6503">CVE-2017-6503</a>
-
- <p>WebUI in qBittorrent before 3.3.11 did not escape many values,
- which could potentially lead to XSS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6504">CVE-2017-6504</a>
-
- <p>WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options
- header, which could potentially lead to clickjacking.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.9.8-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your qbittorrent packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-897.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-898.data b/english/lts/security/2017/dla-898.data
deleted file mode 100644
index cee76bfde72..00000000000
--- a/english/lts/security/2017/dla-898.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-898-1 libosip2</define-tag>
-<define-tag report_date>2017-4-16</define-tag>
-<define-tag secrefs>CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853</define-tag>
-<define-tag packages>libosip2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-898.wml b/english/lts/security/2017/dla-898.wml
deleted file mode 100644
index 6cc5fb31cdd..00000000000
--- a/english/lts/security/2017/dla-898.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10324">CVE-2016-10324</a>
-
- <p>In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to
- a heap buffer overflow in the osip_clrncpy() function defined in
- osipparser2/osip_port.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10325">CVE-2016-10325</a>
-
- <p>In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
- heap buffer overflow in the _osip_message_to_str() function defined
- in osipparser2/osip_message_to_str.c, resulting in a remote DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10326">CVE-2016-10326</a>
-
- <p>In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to
- a heap buffer overflow in the osip_body_to_str() function defined
- in osipparser2/osip_body.c, resulting in a remote DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7853">CVE-2017-7853</a>
-
- <p>In libosip2 in GNU oSIP 5.0.0, a malformed SIP message can lead to a
- heap buffer overflow in the msg_osip_body_parse() function defined
- in osipparser2/osip_message_parse.c, resulting in a remote DoS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.0-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your libosip2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-898.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-899.data b/english/lts/security/2017/dla-899.data
deleted file mode 100644
index e54c18153f0..00000000000
--- a/english/lts/security/2017/dla-899.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-899-1 feh</define-tag>
-<define-tag report_date>2017-4-17</define-tag>
-<define-tag secrefs>CVE-2017-7875 Bug#860367</define-tag>
-<define-tag packages>feh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-899.wml b/english/lts/security/2017/dla-899.wml
deleted file mode 100644
index 984529a7fd9..00000000000
--- a/english/lts/security/2017/dla-899.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Stoeckmann discovered it was possible to trigger an
-out-of-boundary heap write with the image viewer feh while receiving
-an IPC message.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your feh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-899.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-900.data b/english/lts/security/2017/dla-900.data
deleted file mode 100644
index e22338ce567..00000000000
--- a/english/lts/security/2017/dla-900.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-900-1 freetype</define-tag>
-<define-tag report_date>2017-4-17</define-tag>
-<define-tag secrefs>CVE-2016-10328 Bug#860303</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-900.wml b/english/lts/security/2017/dla-900.wml
deleted file mode 100644
index dc5d415b6ce..00000000000
--- a/english/lts/security/2017/dla-900.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Freetype 2 font engine was vulnerable to an out-of-bounds write
-caused by a heap-based buffer overflow in the cff_parser_run function
-in cff/cffparse.c.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4.9-1.1+deb7u5.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-900.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-901.data b/english/lts/security/2017/dla-901.data
deleted file mode 100644
index 8e73a3c3cef..00000000000
--- a/english/lts/security/2017/dla-901.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-901-1 radare2</define-tag>
-<define-tag report_date>2017-4-17</define-tag>
-<define-tag secrefs>CVE-2017-6448</define-tag>
-<define-tag packages>radare2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-901.wml b/english/lts/security/2017/dla-901.wml
deleted file mode 100644
index faacb55407e..00000000000
--- a/english/lts/security/2017/dla-901.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6448">CVE-2017-6448</a>
-
- <p>The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in
- radare2 1.2.1 allows remote attackers to cause a denial of
- service (stack-based buffer overflow and application crash) or
- possibly have unspecified other impact via a crafted DEX file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your radare2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-901.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-902.data b/english/lts/security/2017/dla-902.data
deleted file mode 100644
index b5ba8c74567..00000000000
--- a/english/lts/security/2017/dla-902.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-902-1 imagemagick</define-tag>
-<define-tag report_date>2017-4-18</define-tag>
-<define-tag secrefs>CVE-2017-7606 CVE-2017-7619 Bug#859771 Bug#859769</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-902.wml b/english/lts/security/2017/dla-902.wml
deleted file mode 100644
index 9b23ecfdd0d..00000000000
--- a/english/lts/security/2017/dla-902.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in imagemagick that allow
-remote attackers to cause a denial of service (application crash and
-infinite loop) or possibly other unspecified impact via a crafted image.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u13.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-902.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-903.data b/english/lts/security/2017/dla-903.data
deleted file mode 100644
index 0f26c8cc8bd..00000000000
--- a/english/lts/security/2017/dla-903.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-903-1 hunspell-en-us</define-tag>
-<define-tag report_date>2017-4-20</define-tag>
-<define-tag packages>hunspell-en-us</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-903.wml b/english/lts/security/2017/dla-903.wml
deleted file mode 100644
index ed5adab2a05..00000000000
--- a/english/lts/security/2017/dla-903.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The dictionary provided by this package had an unnecessary unversioned
-conflict against the thunderbird package which recently got reintroduced
-into Wheezy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-20070829-6+deb7u1.</p>
-
-<p>We recommend that you upgrade your hunspell-en-us packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-903.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-904.data b/english/lts/security/2017/dla-904.data
deleted file mode 100644
index 4cbc91da267..00000000000
--- a/english/lts/security/2017/dla-904.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-904-1 uzbek-wordlist</define-tag>
-<define-tag report_date>2017-4-20</define-tag>
-<define-tag packages>uzbek-wordlist</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-904.wml b/english/lts/security/2017/dla-904.wml
deleted file mode 100644
index 9978f9b04b4..00000000000
--- a/english/lts/security/2017/dla-904.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The dictionary provided by this package had an unnecessary unversioned
-conflict against the thunderbird package which recently got reintroduced
-into Wheezy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-0.6-3.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your uzbek-wordlist packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-904.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-905.data b/english/lts/security/2017/dla-905.data
deleted file mode 100644
index 7e58ed1c83c..00000000000
--- a/english/lts/security/2017/dla-905.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-905-1 ghostscript</define-tag>
-<define-tag report_date>2017-4-20</define-tag>
-<define-tag secrefs>CVE-2016-10219 CVE-2016-10220 CVE-2017-5951</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-905.wml b/english/lts/security/2017/dla-905.wml
deleted file mode 100644
index 1307dd5d6fa..00000000000
--- a/english/lts/security/2017/dla-905.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ghostscript is vulnerable to multiple issues that can lead
-to denial of service when processing untrusted content.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10219">CVE-2016-10219</a>
-
- <p>Application crash with division by 0 in scan conversion code triggered
- through crafted content.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10220">CVE-2016-10220</a>
-
- <p>Application crash with a segfault in gx_device_finalize() triggered
- through crafted content.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5951">CVE-2017-5951</a>
-
- <p>Application crash with a segfault in ref_stack_index() triggered
- through crafted content.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.05~dfsg-6.3+deb7u5.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-905.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-906.data b/english/lts/security/2017/dla-906.data
deleted file mode 100644
index 28dd459c4d4..00000000000
--- a/english/lts/security/2017/dla-906.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-906-1 firefox-esr</define-tag>
-<define-tag report_date>2017-4-21</define-tag>
-<define-tag secrefs>CVE-2017-5429 CVE-2017-5432 CVE-2017-5433 CVE-2017-5434 CVE-2017-5435 CVE-2017-5436 CVE-2017-5438 CVE-2017-5439 CVE-2017-5440 CVE-2017-5441 CVE-2017-5442 CVE-2017-5443 CVE-2017-5444 CVE-2017-5445 CVE-2017-5446 CVE-2017-5447 CVE-2017-5448 CVE-2017-5459 CVE-2017-5460 CVE-2017-5461 CVE-2017-5462 CVE-2017-5464 CVE-2017-5465 CVE-2017-5469</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-906.wml b/english/lts/security/2017/dla-906.wml
deleted file mode 100644
index 4eea1c30cc1..00000000000
--- a/english/lts/security/2017/dla-906.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees, buffer
-overflows and other implementation errors may lead to the execution of
-arbitrary code, information disclosure or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-45.9.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-906.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-907.data b/english/lts/security/2017/dla-907.data
deleted file mode 100644
index 648cbea4444..00000000000
--- a/english/lts/security/2017/dla-907.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-907-1 xen</define-tag>
-<define-tag report_date>2017-4-21</define-tag>
-<define-tag secrefs>CVE-2017-7228 Bug##859560</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-907.wml b/english/lts/security/2017/dla-907.wml
deleted file mode 100644
index 18f160163d7..00000000000
--- a/english/lts/security/2017/dla-907.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7228">CVE-2017-7228</a> (XSA-212)
-
- <p>An insufficient check on XENMEM_exchange may allow PV guests to access
- all of system memory.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-6.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-907.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-908.data b/english/lts/security/2017/dla-908.data
deleted file mode 100644
index 13fa10e51fb..00000000000
--- a/english/lts/security/2017/dla-908.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-908-1 chicken</define-tag>
-<define-tag report_date>2017-4-23</define-tag>
-<define-tag secrefs>CVE-2017-6949 Bug#858057</define-tag>
-<define-tag packages>chicken</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-908.wml b/english/lts/security/2017/dla-908.wml
deleted file mode 100644
index 01d19b01ff5..00000000000
--- a/english/lts/security/2017/dla-908.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that CHICKEN did not sanitize the size argument when
-allocating SRFI-4 vectors, which could lead to segfaults or buffer
-overflows with some sizes.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.7.0-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your chicken packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-908.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-909.data b/english/lts/security/2017/dla-909.data
deleted file mode 100644
index 6fc48462b2e..00000000000
--- a/english/lts/security/2017/dla-909.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-909-1 libcroco</define-tag>
-<define-tag report_date>2017-4-23</define-tag>
-<define-tag secrefs>CVE-2017-7960 CVE-2017-7961 Bug#860961</define-tag>
-<define-tag packages>libcroco</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-909.wml b/english/lts/security/2017/dla-909.wml
deleted file mode 100644
index 062842f6ff1..00000000000
--- a/english/lts/security/2017/dla-909.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7960">CVE-2017-7960</a>
-
- <p>A heap-based buffer over-read vulnerability could be triggered
- remotely via a crafted CSS file to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7961">CVE-2017-7961</a>
-
- <p>An <q>outside the range of representable values of type long</q>
- undefined behavior issue was found in libcroco, which might
- allow remote attackers to cause a denial of service (application
- crash) or possibly have unspecified other impact via a crafted
- CSS file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.6.6-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libcroco packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-909.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-910.data b/english/lts/security/2017/dla-910.data
deleted file mode 100644
index 2728c311962..00000000000
--- a/english/lts/security/2017/dla-910.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-910-1 libreoffice</define-tag>
-<define-tag report_date>2017-4-23</define-tag>
-<define-tag secrefs>CVE-2017-3157 CVE-2017-7870</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-910.wml b/english/lts/security/2017/dla-910.wml
deleted file mode 100644
index e105dd850d6..00000000000
--- a/english/lts/security/2017/dla-910.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3157">CVE-2017-3157</a>
-
- <p>Ben Hayak discovered that objects embedded in Writer and Calc
- documents may result in information disclosure. Please see
- <a href="https://www.libreoffice.org/about-us/security/advisories/cve-2017-3157/">https://www.libreoffice.org/about-us/security/advisories/cve-2017-3157/</a>
- for additional information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7870">CVE-2017-7870</a>
-
- <p>An out-of-bounds write caused by a heap-based buffer overflow was
- found in the Polygon class.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:3.5.4+dfsg2-0+deb7u9.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-910.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-911.data b/english/lts/security/2017/dla-911.data
deleted file mode 100644
index 9eb9f7f4eec..00000000000
--- a/english/lts/security/2017/dla-911.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-911-1 tiff</define-tag>
-<define-tag report_date>2017-4-24</define-tag>
-<define-tag secrefs>CVE-2017-7592 CVE-2017-7593 CVE-2017-7594 CVE-2017-7595 CVE-2017-7596 CVE-2017-7597 CVE-2017-7598 CVE-2017-7599 CVE-2017-7600 CVE-2017-7601 CVE-2017-7602 Bug#859998 Bug#860000 Bug#860001 Bug#860003</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-911.wml b/english/lts/security/2017/dla-911.wml
deleted file mode 100644
index 4ef2c8e09e3..00000000000
--- a/english/lts/security/2017/dla-911.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the tiff image library
-that may allow remote attackers to cause a denial of service
-(application crash), to obtain sensitive information from process
-memory or possibly have unspecified other impact via a crafted image</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u12.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-911.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-912.data b/english/lts/security/2017/dla-912.data
deleted file mode 100644
index 53384e32026..00000000000
--- a/english/lts/security/2017/dla-912.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-912-1 tiff3</define-tag>
-<define-tag report_date>2017-4-24</define-tag>
-<define-tag secrefs>CVE-2017-7593 CVE-2017-7594 CVE-2017-7595 CVE-2017-7596 CVE-2017-7597 CVE-2017-7599 CVE-2017-7600 CVE-2017-7601 Bug#860000 Bug#860001 Bug#860003</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-912.wml b/english/lts/security/2017/dla-912.wml
deleted file mode 100644
index 31747b04286..00000000000
--- a/english/lts/security/2017/dla-912.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the tiff3 image library
-that may allow remote attackers to cause a denial of service
-(application crash), to obtain sensitive information from process
-memory or possibly have unspecified other impact via a crafted image.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u5.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-912.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-913.data b/english/lts/security/2017/dla-913.data
deleted file mode 100644
index bb0f982df95..00000000000
--- a/english/lts/security/2017/dla-913.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-913-1 activemq</define-tag>
-<define-tag report_date>2017-4-24</define-tag>
-<define-tag secrefs>CVE-2015-7559 Bug#860866</define-tag>
-<define-tag packages>activemq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-913.wml b/english/lts/security/2017/dla-913.wml
deleted file mode 100644
index 97a423b68e4..00000000000
--- a/english/lts/security/2017/dla-913.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Apache ActiveMQ exposed a remote shutdown command in
-the ActiveMQConnection class. An attacker could use this flaw to
-achieve denial of service on a client.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.6.0+dfsg-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your activemq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-913.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-914.data b/english/lts/security/2017/dla-914.data
deleted file mode 100644
index 43889229d0e..00000000000
--- a/english/lts/security/2017/dla-914.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-914-1 minicom</define-tag>
-<define-tag report_date>2017-4-24</define-tag>
-<define-tag secrefs>CVE-2017-7467 Bug#860940</define-tag>
-<define-tag packages>minicom</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-914.wml b/english/lts/security/2017/dla-914.wml
deleted file mode 100644
index 1ba2c11eec9..00000000000
--- a/english/lts/security/2017/dla-914.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7467">CVE-2017-7467</a>
-
- <p>Out of bounds write in vt100.c</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.6.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your minicom packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-914.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-915.data b/english/lts/security/2017/dla-915.data
deleted file mode 100644
index 25685fd0b37..00000000000
--- a/english/lts/security/2017/dla-915.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-915-1 botan1.10</define-tag>
-<define-tag report_date>2017-4-25</define-tag>
-<define-tag secrefs>CVE-2017-2801 Bug#860072</define-tag>
-<define-tag packages>botan1.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-915.wml b/english/lts/security/2017/dla-915.wml
deleted file mode 100644
index aadd55d16b3..00000000000
--- a/english/lts/security/2017/dla-915.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A bug in X509 DN string comparisons could result in out of bound reads.
-This could result in information leakage, denial of service, or
-potentially incorrect certificate validation results.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10.5-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your botan1.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-915.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-916.data b/english/lts/security/2017/dla-916.data
deleted file mode 100644
index ca7188469c2..00000000000
--- a/english/lts/security/2017/dla-916.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-916-1 mysql-5.5</define-tag>
-<define-tag report_date>2017-4-25</define-tag>
-<define-tag secrefs>CVE-2016-5483 CVE-2017-3302 CVE-2017-3305 CVE-2017-3308 CVE-2017-3309 CVE-2017-3329 CVE-2017-3453 CVE-2017-3456 CVE-2017-3461 CVE-2017-3462 CVE-2017-3463 CVE-2017-3464 CVE-2017-3600 Bug#854713 Bug#860544</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-916.wml b/english/lts/security/2017/dla-916.wml
deleted file mode 100644
index 36cb21ed18f..00000000000
--- a/english/lts/security/2017/dla-916.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.55, which includes additional changes, such as performance
-improvements, bug fixes, new features, and possibly incompatible
-changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
-Patch Update advisory for further details:</p>
-
-<ul>
-<li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-55.html"></li>
-<li><a href="http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html">http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.55-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-916.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-917.data b/english/lts/security/2017/dla-917.data
deleted file mode 100644
index 46b95f20e5a..00000000000
--- a/english/lts/security/2017/dla-917.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-917-1 rtmpdump</define-tag>
-<define-tag report_date>2017-4-25</define-tag>
-<define-tag secrefs>CVE-2015-8270 CVE-2015-8271 CVE-2015-8272</define-tag>
-<define-tag packages>rtmpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-917.wml b/english/lts/security/2017/dla-917.wml
deleted file mode 100644
index b34e3bb6d67..00000000000
--- a/english/lts/security/2017/dla-917.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in rtmpdump and the librtmp
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8270">CVE-2015-8270</a>
-
- <p>A bug in AMF3ReadString in librtmp can cause a denial of service via
- application crash to librtmp users that talk to a malicious server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8271">CVE-2015-8271</a>
-
- <p>The AMF3_Decode function in librtmp doesn't properly validate its
- input, which can lead to arbitrary code execution when talking
- to a malicious attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8272">CVE-2015-8272</a>
-
- <p>A bug in rtmpsrv can lead to a crash when talking to a malicious
- client.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4+20111222.git4e06e21-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your rtmpdump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-917.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-918.data b/english/lts/security/2017/dla-918.data
deleted file mode 100644
index e6d2c6a06c4..00000000000
--- a/english/lts/security/2017/dla-918.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-918-1 freetype</define-tag>
-<define-tag report_date>2017-4-26</define-tag>
-<define-tag secrefs>CVE-2017-8105 Bug#861220 Bug#860303</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-918.wml b/english/lts/security/2017/dla-918.wml
deleted file mode 100644
index 6ad2af7cec0..00000000000
--- a/english/lts/security/2017/dla-918.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that an out of bounds write caused by a heap-based buffer
-overflow could be triggered in freetype via a crafted font.</p>
-
-<p>This update also reverts the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2016-10328">CVE-2016-10328</a>, as it was
-determined that freetype 2.4.9 is not affected by that issue.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4.9-1.1+deb7u6.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-918.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-919.data b/english/lts/security/2017/dla-919.data
deleted file mode 100644
index 19ab948262b..00000000000
--- a/english/lts/security/2017/dla-919.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-919-1 weechat</define-tag>
-<define-tag report_date>2017-4-26</define-tag>
-<define-tag secrefs>CVE-2017-8073 Bug#861121</define-tag>
-<define-tag packages>weechat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-919.wml b/english/lts/security/2017/dla-919.wml
deleted file mode 100644
index 4bf46563920..00000000000
--- a/english/lts/security/2017/dla-919.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>WeeChat before allows a remote crash by sending a filename via DCC to
-the IRC plugin.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.3.8-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your weechat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-919.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-920.data b/english/lts/security/2017/dla-920.data
deleted file mode 100644
index 2a788ba0866..00000000000
--- a/english/lts/security/2017/dla-920.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-920-1 jasper</define-tag>
-<define-tag report_date>2017-4-26</define-tag>
-<define-tag secrefs>CVE-2016-9591 CVE-2016-10251</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-920.wml b/english/lts/security/2017/dla-920.wml
deleted file mode 100644
index f3cd118e050..00000000000
--- a/english/lts/security/2017/dla-920.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9591">CVE-2016-9591</a>
-
- <p>Use-after-free on heap in jas_matrix_destroy
- The vulnerability exists in code responsible for re-encoding the
- decoded input image file to a JP2 image. The vulnerability is
- caused by not setting related pointers to be null after the
- pointers are freed (i.e. missing Setting-Pointer-Null operations
- after free). The vulnerability can further cause double-free.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10251">CVE-2016-10251</a>
-
- <p>Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in
- JasPer before 1.900.20 allows remote attackers to have unspecified
- impact via a crafted file, which triggers use of an uninitialized
- value.</p>
-
-<li>Additional fix for TEMP-CVE from last upload to avoid hassle with
- SIZE_MAX</li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.900.1-13+deb7u6.</p>
-
-<p>We recommend that you upgrade your jasper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-920.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-921.data b/english/lts/security/2017/dla-921.data
deleted file mode 100644
index 1536dab0b9b..00000000000
--- a/english/lts/security/2017/dla-921.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-921-1 slurm-llnl</define-tag>
-<define-tag report_date>2017-4-27</define-tag>
-<define-tag secrefs>CVE-2016-10030 Bug#850491</define-tag>
-<define-tag packages>slurm-llnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-921.wml b/english/lts/security/2017/dla-921.wml
deleted file mode 100644
index 95d89e66068..00000000000
--- a/english/lts/security/2017/dla-921.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>With this vulnerability arbitrary files can be overwritten on nodes
-running jobs provided that the user can run a job that is able to
-trigger a failure of a Prolog script.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your slurm-llnl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-921.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-922.data b/english/lts/security/2017/dla-922.data
deleted file mode 100644
index 9f9dbeeca4a..00000000000
--- a/english/lts/security/2017/dla-922.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-922-1 linux</define-tag>
-<define-tag report_date>2017-4-28</define-tag>
-<define-tag secrefs>CVE-2016-2188 CVE-2016-9604 CVE-2016-10200 CVE-2017-2647 CVE-2017-2671 CVE-2017-5967 CVE-2017-5970 CVE-2017-6951 CVE-2017-7184 CVE-2017-7261 CVE-2017-7273 CVE-2017-7294 CVE-2017-7308 CVE-2017-7472 CVE-2017-7616 CVE-2017-7618</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-922.wml b/english/lts/security/2017/dla-922.wml
deleted file mode 100644
index 0b1fb2276cb..00000000000
--- a/english/lts/security/2017/dla-922.wml
+++ /dev/null
@@ -1,133 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or have other
-impacts.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2188">CVE-2016-2188</a>
-
- <p>Ralf Spenneberg of OpenSource Security reported that the iowarrior
- device driver did not sufficiently validate USB descriptors. This
- allowed a physically present user with a specially designed USB
- device to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9604">CVE-2016-9604</a>
-
- <p>It was discovered that the keyring subsystem allowed a process to
- set a special internal keyring as its session keyring. The
- security impact in this version of the kernel is unknown.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10200">CVE-2016-10200</a>
-
- <p>Baozeng Ding and Andrey Konovalov reported a race condition in the
- L2TP implementation which could corrupt its table of bound
- sockets. A local user could use this to cause a denial of service
- (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2647">CVE-2017-2647</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6951">CVE-2017-6951</a>
-
- <p>idl3r reported that the keyring subsystem would allow a process
- to search for <q>dead</q> keys, causing a null pointer dereference.
- A local user could use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2671">CVE-2017-2671</a>
-
- <p>Daniel Jiang discovered a race condition in the ping socket
- implementation. A local user with access to ping sockets could
- use this to cause a denial of service (crash) or possibly for
- privilege escalation. This feature is not accessible to any
- users by default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5967">CVE-2017-5967</a>
-
- <p>Xing Gao reported that the /proc/timer_list file showed
- information about all processes, not considering PID namespaces.
- If timer debugging was enabled by a privileged user, this leaked
- information to processes contained in PID namespaces.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5970">CVE-2017-5970</a>
-
- <p>Andrey Konovalov discovered a denial-of-service flaw in the IPv4
- networking code. This can be triggered by a local or remote
- attacker if a local UDP or raw socket has the IP_RETOPTS option
- enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7184">CVE-2017-7184</a>
-
- <p>Chaitin Security Research Lab discovered that the net xfrm
- subsystem did not sufficiently validate replay state parameters,
- allowing a heap buffer overflow. This can be used by a local user
- with the CAP_NET_ADMIN capability for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7261">CVE-2017-7261</a>
-
- <p>Vladis Dronov and Murray McAllister reported that the vmwgfx
- driver did not sufficiently validate rendering surface parameters.
- In a VMware guest, this can be used by a local user to cause a
- denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7273">CVE-2017-7273</a>
-
- <p>Benoit Camredon reported that the hid-cypress driver did not
- sufficiently validate HID reports. This possibly allowed a
- physically present user with a specially designed USB device to
- cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7294">CVE-2017-7294</a>
-
- <p>Li Qiang reported that the vmwgfx driver did not sufficiently
- validate rendering surface parameters. In a VMware guest, this
- can be used by a local user to cause a denial of service (crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7308">CVE-2017-7308</a>
-
- <p>Andrey Konovalov reported that the packet socket (AF_PACKET)
- implementation did not sufficiently validate buffer parameters.
- This can be used by a local user with the CAP_NET_RAW capability
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7472">CVE-2017-7472</a>
-
- <p>Eric Biggers reported that the keyring subsystem allowed a thread
- to create new thread keyrings repeatedly, causing a memory leak.
- This can be used by a local user to cause a denial of service
- (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7616">CVE-2017-7616</a>
-
- <p>Chris Salls reported an information leak in the 32-bit big-endian
- compatibility implementations of set_mempolicy() and mbind().
- This does not affect any architecture supported in Debian 7 LTS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7618">CVE-2017-7618</a>
-
- <p>Sabrina Dubroca reported that the cryptographic hash subsystem
- does not correctly handle submission of unaligned data to a
- device that is already busy, resulting in infinite recursion.
- On some systems this can be used by local users to cause a
- denial of service (crash).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.88-1. This version also includes bug fixes from upstream version
-3.2.88, and fixes some older security issues in the keyring, packet
-socket and cryptographic hash subsystems that do not have CVE IDs.</p>
-
-<p>For Debian 8 <q>Jessie</q>, most of these problems have been fixed in
-version 3.16.43-1 which will be part of the next point release.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-922.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-923.data b/english/lts/security/2017/dla-923.data
deleted file mode 100644
index 17d541a7d9d..00000000000
--- a/english/lts/security/2017/dla-923.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-923-1 partclone</define-tag>
-<define-tag report_date>2017-4-28</define-tag>
-<define-tag secrefs>CVE-2017-6596 Bug#857966</define-tag>
-<define-tag packages>partclone</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-923.wml b/english/lts/security/2017/dla-923.wml
deleted file mode 100644
index 13bd2c0eb57..00000000000
--- a/english/lts/security/2017/dla-923.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that partclone, an utility to backup partitions,
-was prone to a heap-based buffer overflow vulnerability due to
-insufficient validation of the partclone image header. This could allow
-remote attackers to cause a <q>Denial of Service attack</q> in the context
-of the user running the affected application via a crafted partition
-image.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.2.48-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your partclone packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-923.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-924-2.data b/english/lts/security/2017/dla-924-2.data
deleted file mode 100644
index 05bc8510dae..00000000000
--- a/english/lts/security/2017/dla-924-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-924-2 tomcat7</define-tag>
-<define-tag report_date>2017-5-10</define-tag>
-<define-tag secrefs>Bug#861872</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-924-2.wml b/english/lts/security/2017/dla-924-2.wml
deleted file mode 100644
index c1509def857..00000000000
--- a/english/lts/security/2017/dla-924-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA-924-1 introduced a regression in
-Tomcat's APR protocol due to the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-5647">CVE-2017-5647</a> and prevented a
-successful sendfile request.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u13.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-924-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-924.data b/english/lts/security/2017/dla-924.data
deleted file mode 100644
index 06f3e0602a6..00000000000
--- a/english/lts/security/2017/dla-924.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-924-1 tomcat7</define-tag>
-<define-tag report_date>2017-4-28</define-tag>
-<define-tag secrefs>CVE-2017-5647 CVE-2017-5648 Bug#860068</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-924.wml b/english/lts/security/2017/dla-924.wml
deleted file mode 100644
index b1fa0a8c490..00000000000
--- a/english/lts/security/2017/dla-924.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5647">CVE-2017-5647</a>
-
- <p>A bug in the handling of the pipelined requests when send file was
- used resulted in the pipelined request being lost when send file
- processing of the previous request completed. This could result in
- responses appearing to be sent for the wrong request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5648">CVE-2017-5648</a>
-
- <p>It was noticed that some calls to application listeners did not use
- the appropriate facade object. When running an untrusted application
- under a SecurityManager, it was therefore possible for that
- untrusted application to retain a reference to the request or
- response object and thereby access and/or modify information
- associated with another web application.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u12.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-924.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-925.data b/english/lts/security/2017/dla-925.data
deleted file mode 100644
index fe5e16019e0..00000000000
--- a/english/lts/security/2017/dla-925.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-925-1 kedpm</define-tag>
-<define-tag report_date>2017-4-29</define-tag>
-<define-tag secrefs>CVE-2017-8296 Bug#860817</define-tag>
-<define-tag packages>kedpm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-925.wml b/english/lts/security/2017/dla-925.wml
deleted file mode 100644
index aa1d297317c..00000000000
--- a/english/lts/security/2017/dla-925.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An information disclosure vulnerability was found in kedpm, a password
-manager compatible with the figaro password manager file format. The
-history file can reveal the master password if it is provided on the
-commandline. The name of entries created or read in the password
-manager are also exposed in the history file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, the master password disclosure issue has been
-fixed in version 0.5.0-4+deb7u1. The entries issues has not been fixed
-as it requires a rearchitecture of the software.</p>
-
-<p>We recommend that you upgrade your kedpm packages. Note that kedpm has
-been removed from the upcoming Debian release ("stretch") and you
-should migrate to another password manager as kedpm was abandoned.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-925.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-926.data b/english/lts/security/2017/dla-926.data
deleted file mode 100644
index ed5765348df..00000000000
--- a/english/lts/security/2017/dla-926.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-926-1 batik</define-tag>
-<define-tag report_date>2017-4-29</define-tag>
-<define-tag secrefs>CVE-2017-5662 Bug#860566</define-tag>
-<define-tag packages>batik</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-926.wml b/english/lts/security/2017/dla-926.wml
deleted file mode 100644
index ce54bf30333..00000000000
--- a/english/lts/security/2017/dla-926.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Apache Batik before 1.9, files lying on the filesystem of the server
-which uses batik can be revealed to arbitrary users who send maliciously
-formed SVG files. The file types that can be shown depend on the user
-context in which the exploitable application is running. If the user is
-root a full compromise of the server - including confidential or
-sensitive files - would be possible. XXE can also be used to attack the
-availability of the server via denial of service as the references
-within a xml document can trivially trigger an amplification attack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.7+dfsg-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your batik packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-926.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-927.data b/english/lts/security/2017/dla-927.data
deleted file mode 100644
index dcec11811b8..00000000000
--- a/english/lts/security/2017/dla-927.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-927-1 fop</define-tag>
-<define-tag report_date>2017-4-29</define-tag>
-<define-tag secrefs>CVE-2017-5661 Bug#860567</define-tag>
-<define-tag packages>fop</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-927.wml b/english/lts/security/2017/dla-927.wml
deleted file mode 100644
index 003725c88ab..00000000000
--- a/english/lts/security/2017/dla-927.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Apache FOP before 2.2, files lying on the filesystem of the server
-which uses FOP can be revealed to arbitrary users who send maliciously
-formed SVG files. The file types that can be shown depend on the user
-context in which the exploitable application is running. If the user is
-root a full compromise of the server - including confidential or
-sensitive files - would be possible. XXE can also be used to attack the
-availability of the server via denial of service as the references
-within a xml document can trivially trigger an amplification attack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.0.dfsg2-6+deb7u1.</p>
-
-<p>We recommend that you upgrade your fop packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-927.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-928.data b/english/lts/security/2017/dla-928.data
deleted file mode 100644
index 34931a1d04a..00000000000
--- a/english/lts/security/2017/dla-928.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-928-1 libsndfile</define-tag>
-<define-tag report_date>2017-4-29</define-tag>
-<define-tag secrefs>CVE-2015-7805 CVE-2017-7585 CVE-2017-7586 CVE-2017-7741 CVE-2017-7742 Bug#860255</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-928.wml b/english/lts/security/2017/dla-928.wml
deleted file mode 100644
index 23b40376e5d..00000000000
--- a/english/lts/security/2017/dla-928.wml
+++ /dev/null
@@ -1,71 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in libsndfile, a popular library
-for reading/writing audio files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7585">CVE-2017-7585</a>
-
- <p>In libsndfile before 1.0.28, an error in the "flac_buffer_copy()"
- function (flac.c) can be exploited to cause a stack-based buffer
- overflow via a specially crafted FLAC file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7586">CVE-2017-7586</a>
-
- <p>In libsndfile before 1.0.28, an error in the "header_read()"
- function (common.c) when handling ID3 tags can be exploited to
- cause a stack-based buffer overflow via a specially crafted FLAC
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7741">CVE-2017-7741</a>
-
- <p>In libsndfile before 1.0.28, an error in the "flac_buffer_copy()"
- function (flac.c) can be exploited to cause a segmentation
- violation (with write memory access) via a specially crafted FLAC
- file during a resample attempt, a similar issue to
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-7585">CVE-2017-7585</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7742">CVE-2017-7742</a>
-
- <p>In libsndfile before 1.0.28, an error in the "flac_buffer_copy()"
- function (flac.c) can be exploited to cause a segmentation
- violation (with read memory access) via a specially crafted FLAC
- file during a resample attempt, a similar issue to
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-7585">CVE-2017-7585</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9496">CVE-2014-9496</a>
-
- <p>The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows
- attackers to have unspecified impact via vectors related to a (1)
- map offset or (2) rsrc marker, which triggers an out-of-bounds
- read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9756">CVE-2014-9756</a>
-
- <p>The psf_fwrite function in file_io.c in libsndfile allows
- attackers to cause a denial of service (divide-by-zero error and
- application crash) via unspecified vectors related to the
- headindex variable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7805">CVE-2015-7805</a>
-
- <p>Heap-based buffer overflow in libsndfile 1.0.25 allows remote
- attackers to have unspecified impact via the headindex value in
- the header in an AIFF file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.25-9.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-928.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-929.data b/english/lts/security/2017/dla-929.data
deleted file mode 100644
index 210146bcdf3..00000000000
--- a/english/lts/security/2017/dla-929.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-929-1 libpodofo</define-tag>
-<define-tag report_date>2017-4-29</define-tag>
-<define-tag secrefs>CVE-2015-8981 CVE-2017-5852 CVE-2017-5853 CVE-2017-5854 CVE-2017-5886 CVE-2017-6844 CVE-2017-7379 Bug#854599 Bug#854600 Bug#854601 Bug#854602 Bug#854604 Bug#859331</define-tag>
-<define-tag packages>libpodofo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-929.wml b/english/lts/security/2017/dla-929.wml
deleted file mode 100644
index 299aab7d19f..00000000000
--- a/english/lts/security/2017/dla-929.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several heap-based buffer overflows, integer overflows and NULL pointer
-dereferences have been discovered in libpodofo, a library for
-manipulating PDF files, that allow remote attackers to cause a denial
-of service (application crash) or other unspecified impact via a
-crafted PDF document.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.0-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libpodofo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-929.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-930.data b/english/lts/security/2017/dla-930.data
deleted file mode 100644
index baf7869e5f1..00000000000
--- a/english/lts/security/2017/dla-930.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-930-1 libxstream-java</define-tag>
-<define-tag report_date>2017-5-1</define-tag>
-<define-tag secrefs>CVE-2017-7957 Bug##861521</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-930.wml b/english/lts/security/2017/dla-930.wml
deleted file mode 100644
index e588311b408..00000000000
--- a/english/lts/security/2017/dla-930.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote application crash vulnerability in
-libxstream-java, a Java library to serialize objects to XML and back again.
-This was due to mishandled attempts to create an instance of the primitive type
-<q>void</q> during unmarshalling.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libxstream-java version
-1.4.2-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-930.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-931.data b/english/lts/security/2017/dla-931.data
deleted file mode 100644
index 36a4c94e6a7..00000000000
--- a/english/lts/security/2017/dla-931.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-931-1 freetype</define-tag>
-<define-tag report_date>2017-5-6</define-tag>
-<define-tag secrefs>CVE-2017-8287 Bug#861308</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-931.wml b/english/lts/security/2017/dla-931.wml
deleted file mode 100644
index f70c63ba1d4..00000000000
--- a/english/lts/security/2017/dla-931.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that a malformed font could result in denial of service
-or the execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.4.9-1.1+deb7u7.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-931.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-932.data b/english/lts/security/2017/dla-932.data
deleted file mode 100644
index e128e5c898e..00000000000
--- a/english/lts/security/2017/dla-932.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-932-1 ghostscript</define-tag>
-<define-tag report_date>2017-5-7</define-tag>
-<define-tag secrefs>CVE-2017-8291 Bug#861295</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-932.wml b/english/lts/security/2017/dla-932.wml
deleted file mode 100644
index 79b08a6968d..00000000000
--- a/english/lts/security/2017/dla-932.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in Ghostscript, the GPL PostScript/PDF
-interpreter, which may lead to the execution of arbitrary code or denial
-of service if a specially crafted Postscript file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.05~dfsg-6.3+deb7u6.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-932.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-933.data b/english/lts/security/2017/dla-933.data
deleted file mode 100644
index de97dd832bc..00000000000
--- a/english/lts/security/2017/dla-933.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-933-1 roundcube</define-tag>
-<define-tag report_date>2017-5-7</define-tag>
-<define-tag secrefs>CVE-2017-8114 Bug#861388</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-933.wml b/english/lts/security/2017/dla-933.wml
deleted file mode 100644
index c48f0d2931c..00000000000
--- a/english/lts/security/2017/dla-933.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Roundcube Webmail allows arbitrary password resets by authenticated users.
-The issue is caused by an improperly restricted exec call in the virtualmin
-and sasl drivers of the password plugin.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7.2-9+deb7u7.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-933.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-934.data b/english/lts/security/2017/dla-934.data
deleted file mode 100644
index 0b7afb51eae..00000000000
--- a/english/lts/security/2017/dla-934.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-934-1 radicale</define-tag>
-<define-tag report_date>2017-5-9</define-tag>
-<define-tag secrefs>CVE-2017-8342</define-tag>
-<define-tag packages>radicale</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-934.wml b/english/lts/security/2017/dla-934.wml
deleted file mode 100644
index 986326ff47b..00000000000
--- a/english/lts/security/2017/dla-934.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to
-timing oracles and simple brute-force attacks when using
-the htpasswd authentication method.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.7-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your radicale packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-934.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-935.data b/english/lts/security/2017/dla-935.data
deleted file mode 100644
index 810d155e2f1..00000000000
--- a/english/lts/security/2017/dla-935.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-935-1 lxterminal</define-tag>
-<define-tag report_date>2017-5-10</define-tag>
-<define-tag secrefs>CVE-2016-10369 Bug##862098</define-tag>
-<define-tag packages>lxterminal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-935.wml b/english/lts/security/2017/dla-935.wml
deleted file mode 100644
index a6f10f177c3..00000000000
--- a/english/lts/security/2017/dla-935.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a local denial of service vulnerability in
-lxterminal, the terminal emulator for the LXDE desktop environment.</p>
-
-<p>This was caused by an insecure use of temporary files for a socket file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in lxterminal version
-0.1.11-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your lxterminal packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-935.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-936.data b/english/lts/security/2017/dla-936.data
deleted file mode 100644
index 199c0984ef2..00000000000
--- a/english/lts/security/2017/dla-936.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-936-1 libtirpc</define-tag>
-<define-tag report_date>2017-5-10</define-tag>
-<define-tag secrefs>CVE-2017-8779 Bug#861834</define-tag>
-<define-tag packages>libtirpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-936.wml b/english/lts/security/2017/dla-936.wml
deleted file mode 100644
index 53d0eaea949..00000000000
--- a/english/lts/security/2017/dla-936.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Guido Vranken discovered that incorrect memory management in libtirpc,
-a transport-independent RPC library used by rpcbind and other programs
-may result in denial of service via memory exhaustion (depending on
-memory management settings).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.2.2-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your libtirpc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-936.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-937.data b/english/lts/security/2017/dla-937.data
deleted file mode 100644
index dd0e922346e..00000000000
--- a/english/lts/security/2017/dla-937.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-937-1 rpcbind</define-tag>
-<define-tag report_date>2017-5-10</define-tag>
-<define-tag secrefs>CVE-2017-8779 Bug#861835</define-tag>
-<define-tag packages>rpcbind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-937.wml b/english/lts/security/2017/dla-937.wml
deleted file mode 100644
index 811590818d5..00000000000
--- a/english/lts/security/2017/dla-937.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Guido Vranken discovered that incorrect memory management in libtirpc,
-a transport-independent RPC library used by rpcbind and other programs
-may result in denial of service via memory exhaustion (depending on
-memory management settings).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.2.0-8+deb7u2.</p>
-
-<p>We recommend that you upgrade your rpcbind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-937.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-938.data b/english/lts/security/2017/dla-938.data
deleted file mode 100644
index 7682dcf7433..00000000000
--- a/english/lts/security/2017/dla-938.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-938-1 git</define-tag>
-<define-tag report_date>2017-5-10</define-tag>
-<define-tag secrefs>CVE-2017-8386</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-938.wml b/english/lts/security/2017/dla-938.wml
deleted file mode 100644
index 77dd31153a0..00000000000
--- a/english/lts/security/2017/dla-938.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Timo Schmid of ERNW GmbH discovered that the Git git-shell, a restricted
-login shell for Git-only SSH access, allows a user to run an interactive
-pager by causing it to spawn "git upload-pack --help".</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.7.10.4-1+wheezy4.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-938.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-939.data b/english/lts/security/2017/dla-939.data
deleted file mode 100644
index f101b841bbc..00000000000
--- a/english/lts/security/2017/dla-939.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-939-1 qemu-kvm</define-tag>
-<define-tag report_date>2017-5-11</define-tag>
-<define-tag secrefs>CVE-2016-9603 CVE-2017-7718 CVE-2017-7980</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-939.wml b/english/lts/security/2017/dla-939.wml
deleted file mode 100644
index ae663e2d20b..00000000000
--- a/english/lts/security/2017/dla-939.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in qemu-kvm, a full
-virtualization solution on x86 hardware based on Quick
-Emulator(Qemu). The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9603">CVE-2016-9603</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator and the VNC
- display driver support is vulnerable to a heap buffer overflow
- issue. It could occur when Vnc client attempts to update its
- display after a vga operation is performed by a guest.</p>
-
- <p>A privileged user/process inside guest could use this flaw to crash
- the Qemu process resulting in DoS OR potentially leverage it to
- execute arbitrary code on the host with privileges of the Qemu
- process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7718">CVE-2017-7718</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
- vulnerable to an out-of-bounds access issue. It could occur while
- copying VGA data via bitblt functions cirrus_bitblt_rop_fwd_transp_
- and/or cirrus_bitblt_rop_fwd_.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7980">CVE-2017-7980</a>
-
- <p>qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
- vulnerable to an out-of-bounds r/w access issues. It could occur
- while copying VGA data via various bitblt functions.</p>
-
- <p>A privileged user inside guest could use this flaw to crash the
- Qemu process resulting in DoS OR potentially execute arbitrary code
- on a host with privileges of Qemu process on the host.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u21.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-939.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-940.data b/english/lts/security/2017/dla-940.data
deleted file mode 100644
index 48aef4493a5..00000000000
--- a/english/lts/security/2017/dla-940.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-940-1 sane-backends</define-tag>
-<define-tag report_date>2017-5-13</define-tag>
-<define-tag secrefs>CVE-2017-6318 Bug##854804</define-tag>
-<define-tag packages>sane-backends</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-940.wml b/english/lts/security/2017/dla-940.wml
deleted file mode 100644
index 19c63cfc575..00000000000
--- a/english/lts/security/2017/dla-940.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in sane-backends, an API library for
-scanners. It allowed remote attackers to obtain sensitive memory information
-via a crafted SANE_NET_CONTROL_OPTION packet.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in sane-backends version
-1.0.22-7.4+deb7u1.</p>
-
-<p>We recommend that you upgrade your sane-backends packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-940.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-941.data b/english/lts/security/2017/dla-941.data
deleted file mode 100644
index 53e6435b6bf..00000000000
--- a/english/lts/security/2017/dla-941.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-941-1 squirrelmail</define-tag>
-<define-tag report_date>2017-5-15</define-tag>
-<define-tag secrefs>CVE-2017-7692</define-tag>
-<define-tag packages>squirrelmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-941.wml b/english/lts/security/2017/dla-941.wml
deleted file mode 100644
index 2c0563889cd..00000000000
--- a/english/lts/security/2017/dla-941.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dawid Golunski and Filippo Cavallarin discovered that squirrelmail, a
-webmail application, incorrectly handled a user-supplied value. This
-would allow a logged-in user to run arbitrary commands on the server.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.4.23~svn20120406-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your squirrelmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-941.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-942.data b/english/lts/security/2017/dla-942.data
deleted file mode 100644
index 73f4ffa543a..00000000000
--- a/english/lts/security/2017/dla-942.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-942-1 jbig2dec</define-tag>
-<define-tag report_date>2017-5-15</define-tag>
-<define-tag secrefs>CVE-2017-7885 CVE-2017-7975 CVE-2017-7976</define-tag>
-<define-tag packages>jbig2dec</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-942.wml b/english/lts/security/2017/dla-942.wml
deleted file mode 100644
index 00004d99be3..00000000000
--- a/english/lts/security/2017/dla-942.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7885">CVE-2017-7885</a>
-
- <p>Artifex jbig2dec 0.13 has a heap-based buffer over-read leading to
- denial of service (application crash) or disclosure of sensitive
- information from process memory, because of an integer overflow
- in the jbig2_decode_symbol_dict function in jbig2_symbol_dict.c
- in libjbig2dec.a during operation on a crafted .jb2 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7975">CVE-2017-7975</a>
-
- <p>Artifex jbig2dec 0.13, as used in Ghostscript, allows out-of-bounds
- writes because of an integer overflow in the jbig2_build_huffman_table
- function in jbig2_huffman.c during operations on a crafted JBIG2 file,
- leading to a denial of service (application crash) or possibly
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7976">CVE-2017-7976</a>
-
- <p>Artifex jbig2dec 0.13 allows out-of-bounds writes and reads because
- of an integer overflow in the jbig2_image_compose function in
- jbig2_image.c during operations on a crafted .jb2 file, leading
- to a denial of service (application crash) or disclosure of
- sensitive information from process memory.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.13-4~deb7u2.</p>
-
-<p>We recommend that you upgrade your jbig2dec packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-942.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-943.data b/english/lts/security/2017/dla-943.data
deleted file mode 100644
index def7725bee7..00000000000
--- a/english/lts/security/2017/dla-943.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-943-1 deluge</define-tag>
-<define-tag report_date>2017-5-16</define-tag>
-<define-tag secrefs>Bug##862611</define-tag>
-<define-tag packages>deluge</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-943.wml b/english/lts/security/2017/dla-943.wml
deleted file mode 100644
index 2338499330f..00000000000
--- a/english/lts/security/2017/dla-943.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a directory traversal attack vulnerability in
-the web user interface web in the deluge bittorrent client.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in deluge version
-1.3.3-2+nmu1+deb7u2.</p>
-
-<p>We recommend that you upgrade your deluge packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-943.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-944.data b/english/lts/security/2017/dla-944.data
deleted file mode 100644
index 3348b349827..00000000000
--- a/english/lts/security/2017/dla-944.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-944-1 openvpn</define-tag>
-<define-tag report_date>2017-5-16</define-tag>
-<define-tag secrefs>CVE-2017-7479</define-tag>
-<define-tag packages>openvpn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-944.wml b/english/lts/security/2017/dla-944.wml
deleted file mode 100644
index 36a7de73c73..00000000000
--- a/english/lts/security/2017/dla-944.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Denial of Service due to Exhaustion of Packet-ID counter</p>
-
-<p>An authenticated client can cause the server's the packet-id counter to
-roll over, which would lead the server process to hit an ASSERT() and
-stop running. To make the server hit the ASSERT(), the client must first
-cause the server to send it 2^32 packets (at least 196GB).
-
-For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.1-8+deb7u4.</p>
-
-<p>We recommend that you upgrade your openvpn packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-944.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-945.data b/english/lts/security/2017/dla-945.data
deleted file mode 100644
index f27021011e1..00000000000
--- a/english/lts/security/2017/dla-945.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-945-1 mysql-connector-java</define-tag>
-<define-tag report_date>2017-5-16</define-tag>
-<define-tag secrefs>CVE-2017-3523 CVE-2017-3586 CVE-2017-3589</define-tag>
-<define-tag packages>mysql-connector-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-945.wml b/english/lts/security/2017/dla-945.wml
deleted file mode 100644
index f8823eb477b..00000000000
--- a/english/lts/security/2017/dla-945.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in mysql-connector-java that allow
-attackers to execute arbitrary code, insert or delete access to some
-of MySQL Connectors accessible data as well as unauthorized read
-access to a subset of the data.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.1.42-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-connector-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-945.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-946.data b/english/lts/security/2017/dla-946.data
deleted file mode 100644
index 69659d60a72..00000000000
--- a/english/lts/security/2017/dla-946.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-946-1 nss</define-tag>
-<define-tag report_date>2017-5-19</define-tag>
-<define-tag secrefs>CVE-2017-5461 CVE-2017-5462 Bug#862958</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-946.wml b/english/lts/security/2017/dla-946.wml
deleted file mode 100644
index 33ac4aa544a..00000000000
--- a/english/lts/security/2017/dla-946.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The NSS library is vulnerable to two security issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5461">CVE-2017-5461</a>
-
- <p>Out-of-bounds write in Base64 encoding. This can trigger a crash
- (denial of service) and might be exploitable for code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5462">CVE-2017-5462</a>
-
- <p>A flaw in DRBG number generation where the internal state V does not
- correctly carry bits over.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.26-1+debu7u3.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-946.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-947.data b/english/lts/security/2017/dla-947.data
deleted file mode 100644
index 4e313341c05..00000000000
--- a/english/lts/security/2017/dla-947.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-947-1 icu</define-tag>
-<define-tag report_date>2017-5-20</define-tag>
-<define-tag secrefs>CVE-2017-7867 CVE-2017-7868</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-947.wml b/english/lts/security/2017/dla-947.wml
deleted file mode 100644
index 47b63805e58..00000000000
--- a/english/lts/security/2017/dla-947.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that icu, the International Components for Unicode
-library, did not correctly validate its input. An attacker could use
-this problem to trigger an out-of-bound write through a heap-based
-buffer overflow, thus causing a denial of service via application
-crash, or potential execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.8.1.1-12+deb7u7.</p>
-
-<p>We recommend that you upgrade your icu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-947.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-948.data b/english/lts/security/2017/dla-948.data
deleted file mode 100644
index aad1c89bd98..00000000000
--- a/english/lts/security/2017/dla-948.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-948-1 dropbear</define-tag>
-<define-tag report_date>2017-5-21</define-tag>
-<define-tag secrefs>CVE-2017-9079</define-tag>
-<define-tag packages>dropbear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-948.wml b/english/lts/security/2017/dla-948.wml
deleted file mode 100644
index 19a6f59fa9d..00000000000
--- a/english/lts/security/2017/dla-948.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in Dropbear, a lightweight SSH2 server
-and client.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9079">CVE-2017-9079</a>
-
- <p>Jann Horn discovered a local information leak in parsing the
- .authorized_keys file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2012.55-1.3+deb7u2.</p>
-
-<p>We recommend that you upgrade your dropbear packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-948.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-949.data b/english/lts/security/2017/dla-949.data
deleted file mode 100644
index e5c4a9e4fa1..00000000000
--- a/english/lts/security/2017/dla-949.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-949-1 miniupnpc</define-tag>
-<define-tag report_date>2017-5-22</define-tag>
-<define-tag secrefs>CVE-2017-8798 Bug##862273</define-tag>
-<define-tag packages>miniupnpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-949.wml b/english/lts/security/2017/dla-949.wml
deleted file mode 100644
index 0cffd303de6..00000000000
--- a/english/lts/security/2017/dla-949.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a integer signedness error in the miniupnpc
-UPnP client that could allow remote attackers to cause a denial of service
-attack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in miniupnpc version
-1.5-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your miniupnpc packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-949.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-950.data b/english/lts/security/2017/dla-950.data
deleted file mode 100644
index e7569332346..00000000000
--- a/english/lts/security/2017/dla-950.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-950-1 libtasn1-3</define-tag>
-<define-tag report_date>2017-5-23</define-tag>
-<define-tag secrefs>CVE-2017-6891</define-tag>
-<define-tag packages>libtasn1-3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-950.wml b/english/lts/security/2017/dla-950.wml
deleted file mode 100644
index 4434fb59c12..00000000000
--- a/english/lts/security/2017/dla-950.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Secunia Research has discovered multiple vulnerabilities in GnuTLS
-libtasn1, which can be exploited by malicious people to compromise
-a vulnerable system.</p>
-
-<p>Two errors in the "asn1_find_node()" function (lib/parser_aux.c)
-can be exploited to cause a stacked-based buffer overflow.</p>
-
-<p>Successful exploitation of the vulnerabilities allows execution
-of arbitrary code but requires tricking a user into processing
-a specially crafted assignments file by e.g. asn1Coding utility.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2.13-2+deb7u4.</p>
-
-<p>We recommend that you upgrade your libtasn1-3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-950.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-951.data b/english/lts/security/2017/dla-951.data
deleted file mode 100644
index 4a43b4e8af1..00000000000
--- a/english/lts/security/2017/dla-951.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-951-1 samba</define-tag>
-<define-tag report_date>2017-5-24</define-tag>
-<define-tag secrefs>CVE-2017-7494</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-951.wml b/english/lts/security/2017/dla-951.wml
deleted file mode 100644
index 5c08c029349..00000000000
--- a/english/lts/security/2017/dla-951.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>steelo discovered a remote code execution vulnerability in Samba, a
-SMB/CIFS file, print, and login server for Unix. A malicious client with
-access to a writable share, can take advantage of this flaw by uploading
-a shared library and then cause the server to load and execute it.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:3.6.6-6+deb7u13.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-951.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-952.data b/english/lts/security/2017/dla-952.data
deleted file mode 100644
index 8c16d344f1a..00000000000
--- a/english/lts/security/2017/dla-952.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-952-1 kde4libs</define-tag>
-<define-tag report_date>2017-5-25</define-tag>
-<define-tag secrefs>CVE-2013-2074 CVE-2017-6410 CVE-2017-8422 Bug#856890</define-tag>
-<define-tag packages>kde4libs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-952.wml b/english/lts/security/2017/dla-952.wml
deleted file mode 100644
index 85635741886..00000000000
--- a/english/lts/security/2017/dla-952.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in kde4libs, the core libraries
-for all KDE 4 applications. The Common Vulnerabilities and Exposures
-project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6410">CVE-2017-6410</a>
-
- <p>Itzik Kotler, Yonatan Fridburg and Amit Klein of Safebreach Labs
- reported that URLs are not sanitized before passing them to
- FindProxyForURL, potentially allowing a remote attacker to obtain
- sensitive information via a crafted PAC file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8422">CVE-2017-8422</a>
-
- <p>Sebastian Krahmer from SUSE discovered that the KAuth framework
- contains a logic flaw in which the service invoking dbus is not
- properly checked. This flaw allows spoofing the identity of the
- caller and gaining root privileges from an unprivileged account.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2074">CVE-2013-2074</a>
-
- <p>It was discovered that KIO would show web authentication
- credentials in some error cases.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4:4.8.4-4+deb7u3.</p>
-
-<p>We recommend that you upgrade your kde4libs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-952.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-953.data b/english/lts/security/2017/dla-953.data
deleted file mode 100644
index 2f356d441f6..00000000000
--- a/english/lts/security/2017/dla-953.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-953-1 graphicsmagick</define-tag>
-<define-tag report_date>2017-5-26</define-tag>
-<define-tag secrefs>CVE-2017-9098 Bug#862967</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-953.wml b/english/lts/security/2017/dla-953.wml
deleted file mode 100644
index 912d5060c41..00000000000
--- a/english/lts/security/2017/dla-953.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chris Evans discovered that graphicsmagick used uninitialized memory
-in the RLE decoder, allowing an remote attacker to leak sensitive
-information from process memory space.</p>
-
-<p>More information are available at:
-<a href="https://scarybeastsecurity.blogspot.de/2017/05/bleed-continues-18-byte-file-14k-bounty.html">https://scarybeastsecurity.blogspot.de/2017/05/bleed-continues-18-byte-file-14k-bounty.html</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u7.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-953.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-954.data b/english/lts/security/2017/dla-954.data
deleted file mode 100644
index c7f71e98029..00000000000
--- a/english/lts/security/2017/dla-954.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-954-1 openjdk-7</define-tag>
-<define-tag report_date>2017-5-26</define-tag>
-<define-tag secrefs>CVE-2017-3509 CVE-2017-3511 CVE-2017-3526 CVE-2017-3533 CVE-2017-3539 CVE-2017-3544</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-954.wml b/english/lts/security/2017/dla-954.wml
deleted file mode 100644
index c0faf9a6616..00000000000
--- a/english/lts/security/2017/dla-954.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in privilege
-escalation, denial of service, newline injection in SMTP or use of
-insecure cryptography.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u131-2.6.9-2~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-954.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-955.data b/english/lts/security/2017/dla-955.data
deleted file mode 100644
index 7316c62f82e..00000000000
--- a/english/lts/security/2017/dla-955.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-955-1 rzip</define-tag>
-<define-tag report_date>2017-5-26</define-tag>
-<define-tag secrefs>CVE-2017-8364 Bug#861614</define-tag>
-<define-tag packages>rzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-955.wml b/english/lts/security/2017/dla-955.wml
deleted file mode 100644
index 6281464e25b..00000000000
--- a/english/lts/security/2017/dla-955.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Agostino Sarubbo of Gentoo discovered a heap buffer overflow write
-in the rzip program when uncompressing maliciously crafted files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your rzip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-955.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-956.data b/english/lts/security/2017/dla-956.data
deleted file mode 100644
index 2e9ea4368f6..00000000000
--- a/english/lts/security/2017/dla-956.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-956-1 libsndfile</define-tag>
-<define-tag report_date>2017-5-28</define-tag>
-<define-tag secrefs>CVE-2017-8361 CVE-2017-8362 CVE-2017-8363 CVE-2017-8365</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-956.wml b/english/lts/security/2017/dla-956.wml
deleted file mode 100644
index 007cd00b347..00000000000
--- a/english/lts/security/2017/dla-956.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8361">CVE-2017-8361</a>
-
- <p>The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows
- remote attackers to cause a denial of service (buffer overflow and
- application crash) or possibly have unspecified other impact via a
- crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8362">CVE-2017-8362</a>
-
- <p>The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows
- remote attackers to cause a denial of service (invalid read and
- application crash) via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8363">CVE-2017-8363</a>
-
- <p>The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows
- remote attackers to cause a denial of service (heap-based buffer
- over-read and application crash) via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8365">CVE-2017-8365</a>
-
- <p>The i2les_array function in pcm.c in libsndfile 1.0.28 allows
- remote attackers to cause a denial of service (buffer over-read
- and application crash) via a crafted audio file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.25-9.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-956.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-957.data b/english/lts/security/2017/dla-957.data
deleted file mode 100644
index 096ae82f005..00000000000
--- a/english/lts/security/2017/dla-957.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-957-1 bind9</define-tag>
-<define-tag report_date>2017-5-28</define-tag>
-<define-tag secrefs>CVE-2017-3136 CVE-2017-3137 CVE-2017-3138</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-957.wml b/english/lts/security/2017/dla-957.wml
deleted file mode 100644
index bdf5f4cedf5..00000000000
--- a/english/lts/security/2017/dla-957.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3136">CVE-2017-3136</a>
-
- <p>Oleg Gorokhov of Yandex discovered that BIND does not properly
- handle certain queries when using DNS64 with the "break-dnssec yes;"
- option, allowing a remote attacker to cause a denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3137">CVE-2017-3137</a>
-
- <p>It was discovered that BIND makes incorrect assumptions about the
- ordering of records in the answer section of a response containing
- CNAME or DNAME resource records, leading to situations where BIND
- exits with an assertion failure. An attacker can take advantage of
- this condition to cause a denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3138">CVE-2017-3138</a>
-
- <p>Mike Lalumiere of Dyn, Inc. discovered that BIND can exit with a
- REQUIRE assertion failure if it receives a null command string on
- its control channel. Note that the fix applied in Debian is only
- applied as a hardening measure. Details about the issue can be found
- at <a href="https://kb.isc.org/article/AA-01471">https://kb.isc.org/article/AA-01471</a>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u16.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-957.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-958.data b/english/lts/security/2017/dla-958.data
deleted file mode 100644
index cad70f8b70c..00000000000
--- a/english/lts/security/2017/dla-958.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-958-1 libonig</define-tag>
-<define-tag report_date>2017-5-28</define-tag>
-<define-tag secrefs>CVE-2017-9224 CVE-2017-9226 CVE-2017-9227 CVE-2017-9228 CVE-2017-9229 Bug#863312 Bug#863314 Bug#863315 Bug#863316 Bug#863318</define-tag>
-<define-tag packages>libonig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-958.wml b/english/lts/security/2017/dla-958.wml
deleted file mode 100644
index be90b90c025..00000000000
--- a/english/lts/security/2017/dla-958.wml
+++ /dev/null
@@ -1,69 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9224">CVE-2017-9224</a>
-
- <p>An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
- Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack
- out-of-bounds read occurs in match_at() during regular expression
- searching. A logical error involving order of validation and access in
- match_at() could result in an out-of-bounds read from a stack buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9226">CVE-2017-9226</a>
-
- <p>An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
- Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap
- out-of-bounds write or read occurs in next_state_val() during regular
- expression compilation. Octal numbers larger than 0xff are not handled
- correctly in fetch_token() and fetch_token_in_cc(). A malformed regular
- expression containing an octal number in the form of '\700' would
- produce an invalid code point value larger than 0xff in
- next_state_val(), resulting in an out-of-bounds write memory
- corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9227">CVE-2017-9227</a>
-
- <p>An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
- Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack
- out-of-bounds read occurs in mbc_enc_len() during regular expression
- searching. Invalid handling of reg-&gt;dmin in forward_search_range()
- could result in an invalid pointer dereference, as an out-of-bounds
- read from a stack buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9228">CVE-2017-9228</a>
-
- <p>An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
- Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap
- out-of-bounds write occurs in bitset_set_range() during regular
- expression compilation due to an uninitialized variable from an
- incorrect state transition. An incorrect state transition in
- parse_char_class() could create an execution path that leaves a
- critical local variable uninitialized until it's used as an index,
- resulting in an out-of-bounds write memory corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9229">CVE-2017-9229</a>
-
- <p>An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
- Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs
- in left_adjust_char_head() during regular expression compilation.
- Invalid handling of reg-&gt;dmax in forward_search_range() could result in
- an invalid pointer dereference, normally as an immediate
- denial-of-service condition.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.9.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libonig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-958.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-959.data b/english/lts/security/2017/dla-959.data
deleted file mode 100644
index 348a31481c3..00000000000
--- a/english/lts/security/2017/dla-959.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-959-1 libical</define-tag>
-<define-tag report_date>2017-5-28</define-tag>
-<define-tag secrefs>CVE-2016-5824 CVE-2016-9584 Bug##860451 Bug##852034</define-tag>
-<define-tag packages>libical</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-959.wml b/english/lts/security/2017/dla-959.wml
deleted file mode 100644
index 7cc87cba35d..00000000000
--- a/english/lts/security/2017/dla-959.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after-free vulnerability in the libical
-iCalendar library. Remote attackers could cause a denial of service and
-possibly read heap memory via a specially crafted .ICS file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libical version
-0.48-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libical packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-959.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-960.data b/english/lts/security/2017/dla-960.data
deleted file mode 100644
index 3d50585de8a..00000000000
--- a/english/lts/security/2017/dla-960.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-960-1 imagemagick</define-tag>
-<define-tag report_date>2017-5-29</define-tag>
-<define-tag secrefs>CVE-2014-8354 CVE-2014-8355 CVE-2014-8562 CVE-2014-8716 CVE-2014-9841 CVE-2015-8900 CVE-2015-8901 CVE-2015-8902 CVE-2015-8903 CVE-2017-7941 CVE-2017-7943 CVE-2017-8343 CVE-2017-8344 CVE-2017-8345 CVE-2017-8346 CVE-2017-8347 CVE-2017-8348 CVE-2017-8349 CVE-2017-8350 CVE-2017-8351 CVE-2017-8352 CVE-2017-8353 CVE-2017-8354 CVE-2017-8355 CVE-2017-8356 CVE-2017-8357 CVE-2017-8765 CVE-2017-8830 CVE-2017-9098 CVE-2017-9141 CVE-2017-9142 CVE-2017-9143 CVE-2017-9144 Bug#767240 Bug#767240 Bug#768494 Bug#773834 Bug#860734 Bug#860736 Bug#862572 Bug#862574</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-960.wml b/english/lts/security/2017/dla-960.wml
deleted file mode 100644
index 68dc7dc4509..00000000000
--- a/english/lts/security/2017/dla-960.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This update fixes several vulnerabilities in imagemagick: Various memory
-handling problems and cases of missing or incomplete input sanitising
-may result in denial of service, memory disclosure, or the execution of
-arbitrary code if malformed PCX, DCM, JPEG, PSD, HDR, MIFF, PDB, VICAR,
-SGI, SVG, AAI, MNG, EXR, MAT, SFW, JNG, PCD, XWD, PICT, BMP, MTV, SUN,
-EPT, ICON, DDS, or ART files are processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-6.7.7.10-5+deb7u14.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-960.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-961.data b/english/lts/security/2017/dla-961.data
deleted file mode 100644
index 98b45639f09..00000000000
--- a/english/lts/security/2017/dla-961.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-961-1 mosquitto</define-tag>
-<define-tag report_date>2017-5-30</define-tag>
-<define-tag secrefs>CVE-2017-7650</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-961.wml b/english/lts/security/2017/dla-961.wml
deleted file mode 100644
index 3c229e474c5..00000000000
--- a/english/lts/security/2017/dla-961.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7650">CVE-2017-7650</a>
-
-<p>Pattern based ACLs can be bypassed by clients that set their username/client id to ‘#’ or ‘+’.
-This allows locally or remotely connected clients to access MQTT topics that they do have the rights to.
-The same issue may be present in third party authentication/access control plugins for Mosquitto.</p>
-
-<p>The vulnerability only comes into effect where pattern based ACLs are in use,
-or potentially where third party plugins are in use.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.15-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-961.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-962.data b/english/lts/security/2017/dla-962.data
deleted file mode 100644
index cb19cd32b75..00000000000
--- a/english/lts/security/2017/dla-962.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-962-1 tnef</define-tag>
-<define-tag report_date>2017-5-29</define-tag>
-<define-tag secrefs>CVE-2017-8911</define-tag>
-<define-tag packages>tnef</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-962.wml b/english/lts/security/2017/dla-962.wml
deleted file mode 100644
index 96bcb990f54..00000000000
--- a/english/lts/security/2017/dla-962.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8911">CVE-2017-8911</a>
-
- <p>An integer underflow has been identified in the unicode_to_utf8()
- function in tnef 1.4.14. This might lead to invalid write
- operations, controlled by an attacker.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.9-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your tnef packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-962.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-963.data b/english/lts/security/2017/dla-963.data
deleted file mode 100644
index b8785baa2ca..00000000000
--- a/english/lts/security/2017/dla-963.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-963-1 exiv2</define-tag>
-<define-tag report_date>2017-5-29</define-tag>
-<define-tag secrefs>CVE-2017-9239 Bug#863410</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-963.wml b/english/lts/security/2017/dla-963.wml
deleted file mode 100644
index af37e38a7d4..00000000000
--- a/english/lts/security/2017/dla-963.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the exiv2 library fails to parse some crafted
-tiff images, leading to denial of service via application crash.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.23-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-963.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-964.data b/english/lts/security/2017/dla-964.data
deleted file mode 100644
index d5e76c833a6..00000000000
--- a/english/lts/security/2017/dla-964.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-964-1 xen</define-tag>
-<define-tag report_date>2017-6-1</define-tag>
-<define-tag secrefs>CVE-2016-9932 CVE-2017-7995 CVE-2017-8903 CVE-2017-8904 CVE-2017-8905</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-964.wml b/english/lts/security/2017/dla-964.wml
deleted file mode 100644
index 95daa5a6ee3..00000000000
--- a/english/lts/security/2017/dla-964.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9932">CVE-2016-9932</a> (XSA-200)
-
- <p>CMPXCHG8B emulation allows local HVM guest OS users to obtain sensitive
- information from host stack memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7995">CVE-2017-7995</a>
-
- <p>Description
- Xen checks access permissions to MMIO ranges only after accessing them,
- allowing host PCI device space memory reads.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8903">CVE-2017-8903</a> (XSA-213)
-
- <p>Xen mishandles page tables after an IRET hypercall which can lead to
- arbitrary code execution on the host OS. The vulnerability is only exposed
- to 64-bit PV guests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8904">CVE-2017-8904</a> (XSA-214)
-
- <p>Xen mishandles the <q>contains segment descriptors</q> property during
- GNTTABOP_transfer. This might allow PV guest OS users to execute arbitrary
- code on the host OS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8905">CVE-2017-8905</a> (XSA-215)
-
- <p>Xen mishandles a failsafe callback which might allow PV guest OS users to
- execute arbitrary code on the host OS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-8.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-964.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-965.data b/english/lts/security/2017/dla-965.data
deleted file mode 100644
index 99946d75655..00000000000
--- a/english/lts/security/2017/dla-965.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-965-1 qemu-kvm</define-tag>
-<define-tag report_date>2017-5-31</define-tag>
-<define-tag secrefs>CVE-2016-9602 CVE-2017-7377 CVE-2017-7471 CVE-2017-7493 CVE-2017-8086</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-965.wml b/english/lts/security/2017/dla-965.wml
deleted file mode 100644
index 7b9684a62f9..00000000000
--- a/english/lts/security/2017/dla-965.wml
+++ /dev/null
@@ -1,73 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in qemu-kvm, a full
-virtualization solution for Linux hosts on x86 hardware with x86 guests
-based on the Quick Emulator(Qemu).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9602">CVE-2016-9602</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an improper link
- following issue. It could occur while accessing symbolic link files
- on a shared host directory.</p>
-
- <p>A privileged user inside guest could use this flaw to access host file
- system beyond the shared folder and potentially escalating their
- privileges on a host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7377">CVE-2017-7377</a>
-
- <p>Quick Emulator(Qemu) built with the virtio-9p back-end support is
- vulnerable to a memory leakage issue. It could occur while doing a I/O
- operation via v9fs_create/v9fs_lcreate routine.</p>
-
- <p>A privileged user/process inside guest could use this flaw to leak
- host memory resulting in Dos.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7471">CVE-2017-7471</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an improper access
- control issue. It could occur while accessing files on a shared host
- directory.</p>
-
- <p>A privileged user inside guest could use this flaw to access host file
- system beyond the shared folder and potentially escalating their
- privileges on a host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7493">CVE-2017-7493</a>
-
- <p>Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
- Plan 9 File System(9pfs) support, is vulnerable to an improper access
- control issue. It could occur while accessing virtfs metadata files
- in mapped-file security mode.</p>
-
- <p>A guest user could use this flaw to escalate their privileges inside
- guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8086">CVE-2017-8086</a>
-
- <p>Quick Emulator(Qemu) built with the virtio-9p back-end support is
- vulnerable to a memory leakage issue. It could occur while querying
- file system extended attributes via 9pfs_list_xattr() routine.</p>
-
- <p>A privileged user/process inside guest could use this flaw to leak
- host memory resulting in Dos.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u22.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-965.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-966.data b/english/lts/security/2017/dla-966.data
deleted file mode 100644
index 0e15e0aa829..00000000000
--- a/english/lts/security/2017/dla-966.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-966-1 pngquant</define-tag>
-<define-tag report_date>2017-5-30</define-tag>
-<define-tag secrefs>CVE-2016-5735 Bug#863469</define-tag>
-<define-tag packages>pngquant</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-966.wml b/english/lts/security/2017/dla-966.wml
deleted file mode 100644
index af82354be87..00000000000
--- a/english/lts/security/2017/dla-966.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that pngquant is susceptible to a buffer overflow write
-issue triggered by a maliciously crafted png image, which could lead
-into denial of service or other issues.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0-4.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your pngquant packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-966.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-967.data b/english/lts/security/2017/dla-967.data
deleted file mode 100644
index 3c388e81ccd..00000000000
--- a/english/lts/security/2017/dla-967.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-967-1 gajim</define-tag>
-<define-tag report_date>2017-5-30</define-tag>
-<define-tag secrefs>CVE-2016-10376 Bug#863445</define-tag>
-<define-tag packages>gajim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-967.wml b/english/lts/security/2017/dla-967.wml
deleted file mode 100644
index fba99dfcd94..00000000000
--- a/english/lts/security/2017/dla-967.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gajim implements XEP-0146, an XMPP extension to run commands remotely
-from another client. However it was found that malicious servers can
-trigger commands, which could lead to leaking private conversations
-from encrypted sessions. To solve this, XEP-0146 support has been
-disabled by default.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.15.1-4.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your gajim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-967.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-968.data b/english/lts/security/2017/dla-968.data
deleted file mode 100644
index d9822e9d4b7..00000000000
--- a/english/lts/security/2017/dla-968.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-968-1 libpodofo</define-tag>
-<define-tag report_date>2017-5-30</define-tag>
-<define-tag secrefs>CVE-2017-6840 CVE-2017-6842 CVE-2017-6843 CVE-2017-6847 CVE-2017-6848 CVE-2017-7378 CVE-2017-7380 CVE-2017-7381 CVE-2017-7382 CVE-2017-7383 Bug#861557 Bug#861564 Bug#859330 Bug#859329</define-tag>
-<define-tag packages>libpodofo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-968.wml b/english/lts/security/2017/dla-968.wml
deleted file mode 100644
index f01cf03482a..00000000000
--- a/english/lts/security/2017/dla-968.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several heap-based buffer overflows and NULL pointer
-dereferences have been discovered in libpodofo, a library for
-manipulating PDF files, that allow remote attackers to cause a denial
-of service (application crash) or other unspecified impact via a
-crafted PDF document.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.0-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your libpodofo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-968.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-969.data b/english/lts/security/2017/dla-969.data
deleted file mode 100644
index 1e34b38efd9..00000000000
--- a/english/lts/security/2017/dla-969.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-969-1 tiff</define-tag>
-<define-tag report_date>2017-5-30</define-tag>
-<define-tag secrefs>CVE-2016-3658 CVE-2016-10371 Bug#862929</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-969.wml b/english/lts/security/2017/dla-969.wml
deleted file mode 100644
index 911bbaa519d..00000000000
--- a/english/lts/security/2017/dla-969.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been discovered in libtiff, a library
-providing support for the Tag Image File Format, which may result in
-denial of service (out-of-bounds read or assertion failure) via a
-crafted TIFF file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u13.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-969.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-970.data b/english/lts/security/2017/dla-970.data
deleted file mode 100644
index 40f5460dc62..00000000000
--- a/english/lts/security/2017/dla-970.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-970-1 sudo</define-tag>
-<define-tag report_date>2017-5-30</define-tag>
-<define-tag secrefs>CVE-2017-1000367 Bug#863731</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-970.wml b/english/lts/security/2017/dla-970.wml
deleted file mode 100644
index 51e896e1343..00000000000
--- a/english/lts/security/2017/dla-970.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Security team discovered that sudo, a program designed to
-provide limited super user privileges to specific users, does not
-properly parse "/proc/[pid]/stat" to read the device number of the tty
-from field 7 (tty_nr). A sudoers user can take advantage of this flaw on
-an SELinux-enabled system to obtain full root privileges.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-1.8.5p2-1+nmu3+deb7u3.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.10p3-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-970.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-971.data b/english/lts/security/2017/dla-971.data
deleted file mode 100644
index 1269970533c..00000000000
--- a/english/lts/security/2017/dla-971.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-971-1 nss</define-tag>
-<define-tag report_date>2017-5-31</define-tag>
-<define-tag secrefs>CVE-2017-7502 Bug#863839</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-971.wml b/english/lts/security/2017/dla-971.wml
deleted file mode 100644
index f4e9c5b44d0..00000000000
--- a/english/lts/security/2017/dla-971.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7502">CVE-2017-7502</a>
-
- <p>A null pointer dereference vulnerability in NSS was found when server
- receives empty SSLv2 messages. This issue was introduced with the recent
- removal of SSLv2 protocol from upstream code in 3.24.0 and introduction
- of dedicated parser able to handle just sslv2-style hello messages.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-2:3.26-1+debu7u4.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-971.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-972.data b/english/lts/security/2017/dla-972.data
deleted file mode 100644
index e1c6dc1fcf1..00000000000
--- a/english/lts/security/2017/dla-972.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-972-1 openldap</define-tag>
-<define-tag report_date>2017-6-1</define-tag>
-<define-tag secrefs>CVE-2017-9287 Bug##863563</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-972.wml b/english/lts/security/2017/dla-972.wml
deleted file mode 100644
index 82e268a9b62..00000000000
--- a/english/lts/security/2017/dla-972.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a double-free vulnerability in the
-<q>openldap</q> LDAP server.</p>
-
-<p>A user with access to search the directory could crash slapd by issuing
-a search requesting a <q>Paged Results</q> value set to zero.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in openldap version
-2.4.31-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-972.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-973.data b/english/lts/security/2017/dla-973.data
deleted file mode 100644
index 6a839fe132c..00000000000
--- a/english/lts/security/2017/dla-973.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-973-1 strongswan</define-tag>
-<define-tag report_date>2017-6-1</define-tag>
-<define-tag secrefs>CVE-2017-9022 CVE-2017-9023</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-973.wml b/english/lts/security/2017/dla-973.wml
deleted file mode 100644
index e5d7dde7561..00000000000
--- a/english/lts/security/2017/dla-973.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two denial of service vulnerabilities were identified in strongSwan, an
-IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9022">CVE-2017-9022</a>
-
- <p>RSA public keys passed to the gmp plugin aren't validated sufficiently
- before attempting signature verification, so that invalid input might
- lead to a floating point exception and crash of the process.
- A certificate with an appropriately prepared public key sent by a peer
- could be used for a denial-of-service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9023">CVE-2017-9023</a>
-
- <p>ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
- parsing X.509 certificates with extensions that use such types. This could
- lead to infinite looping of the thread parsing a specifically crafted
- certificate.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.5.2-1.5+deb7u9.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-973.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-974.data b/english/lts/security/2017/dla-974.data
deleted file mode 100644
index f6fdaa78079..00000000000
--- a/english/lts/security/2017/dla-974.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-974-1 picocom</define-tag>
-<define-tag report_date>2017-6-1</define-tag>
-<define-tag secrefs>CVE-2015-9059 Bug##863671</define-tag>
-<define-tag packages>picocom</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-974.wml b/english/lts/security/2017/dla-974.wml
deleted file mode 100644
index d9e4767d45f..00000000000
--- a/english/lts/security/2017/dla-974.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a command injection vulnerability in
-picocom, a dumb-terminal emulation program.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in picocom version
-1.7-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your picocom packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-974.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-975.data b/english/lts/security/2017/dla-975.data
deleted file mode 100644
index 032a8bd9035..00000000000
--- a/english/lts/security/2017/dla-975.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-975-1 wordpress</define-tag>
-<define-tag report_date>2017-6-2</define-tag>
-<define-tag secrefs>CVE-2017-8295 CVE-2017-9061 CVE-2017-9062 CVE-2017-9063 CVE-2017-9064 CVE-2017-9065 Bug#862053 Bug#862816</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-975.wml b/english/lts/security/2017/dla-975.wml
deleted file mode 100644
index 1b36d8d707b..00000000000
--- a/english/lts/security/2017/dla-975.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8295">CVE-2017-8295</a>
-
- <p>Potential unauthorized password reset vulnerability. More
- information are available at:</p>
-
- <p><url "https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html"></p>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9061">CVE-2017-9061</a>
-
- <p>A cross-site scripting (XSS) vulnerability exists when someone
- attempts to upload very large files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9062">CVE-2017-9062</a>
-
- <p>Improper handling of post meta data values in the XML-RPC API.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9063">CVE-2017-9063</a>
-
- <p>Cross-site scripting (XSS) vulnerability in the customizer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9064">CVE-2017-9064</a>
-
- <p>A Cross Site Request Forgery (CSRF) vulnerability exists in the
- filesystem credentials dialog.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9065">CVE-2017-9065</a>
-
- <p>Lack of capability checks for post meta data in the XML-RPC API.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u15.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-975.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-976.data b/english/lts/security/2017/dla-976.data
deleted file mode 100644
index 4a4b1c1e921..00000000000
--- a/english/lts/security/2017/dla-976.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-976-1 yodl</define-tag>
-<define-tag report_date>2017-6-5</define-tag>
-<define-tag secrefs>CVE-2016-10375</define-tag>
-<define-tag packages>yodl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-976.wml b/english/lts/security/2017/dla-976.wml
deleted file mode 100644
index dc2159d4056..00000000000
--- a/english/lts/security/2017/dla-976.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hanno Bock discovered that there was a buffer over-read vulnerability in
-the yodl ("Your Own Document Language") document processor.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in yodl version
-3.00.0-6+deb7u1.</p>
-
-<p>We recommend that you upgrade your yodl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-976.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-977.data b/english/lts/security/2017/dla-977.data
deleted file mode 100644
index bc5f1a6df3c..00000000000
--- a/english/lts/security/2017/dla-977.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-977-1 freeradius</define-tag>
-<define-tag report_date>2017-6-5</define-tag>
-<define-tag secrefs>CVE-2014-2015 CVE-2015-4680 CVE-2017-9148 Bug#742820 Bug#789623 Bug#863673</define-tag>
-<define-tag packages>freeradius</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-977.wml b/english/lts/security/2017/dla-977.wml
deleted file mode 100644
index 65684927d38..00000000000
--- a/english/lts/security/2017/dla-977.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in FreeRADIUS, a high-performance and
-highly configurable RADIUS server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2015">CVE-2014-2015</a>
-
- <p>A stack-based buffer overflow was found in the normify function in
- the rlm_pap module, which can be attacked by existing users to
- cause denial of service or other issues.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4680">CVE-2015-4680</a>
-
- <p>It was discovered that freeradius failed to check revocation of
- intermediate CA certificates, thus accepting client certificates
- issued by revoked certificates from intermediate CAs.</p>
-
- <p>Note that to enable checking of intermediate CA certificates, it
- is necessary to enable the check_all_crl option of the EAP TLS
- section in eap.conf. This is only necessary for servers using
- certificates signed by intermediate CAs. Servers that use
- self-signed CAs are unaffected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9148">CVE-2017-9148</a>
-
- <p>The TLS session cache fails to reliably prevent resumption of an
- unauthenticated session, which allows remote attackers (such as
- malicious 802.1X supplicants) to bypass authentication via PEAP or
- TTLS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.1.12+dfsg-1.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your freeradius packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-977.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-978.data b/english/lts/security/2017/dla-978.data
deleted file mode 100644
index 7a4b0366d07..00000000000
--- a/english/lts/security/2017/dla-978.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-978-1 perl</define-tag>
-<define-tag report_date>2017-6-5</define-tag>
-<define-tag secrefs>CVE-2017-6512 Bug#863870</define-tag>
-<define-tag packages>perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-978.wml b/english/lts/security/2017/dla-978.wml
deleted file mode 100644
index 9dcf645e732..00000000000
--- a/english/lts/security/2017/dla-978.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The cPanel Security Team reported a time of check to time of use
-(TOCTTOU) race condition flaw in File::Path, a core module from Perl to
-create or remove directory trees. An attacker can take advantage of this
-flaw to set the mode on an attacker-chosen file to an attacker-chosen
-value.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.14.2-21+deb7u5.</p>
-
-<p>We recommend that you upgrade your perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-978.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-979.data b/english/lts/security/2017/dla-979.data
deleted file mode 100644
index 8d2e9c7f1c3..00000000000
--- a/english/lts/security/2017/dla-979.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-979-1 debian-security-support</define-tag>
-<define-tag report_date>2017-6-7</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-979.wml b/english/lts/security/2017/dla-979.wml
deleted file mode 100644
index 56343f0d10e..00000000000
--- a/english/lts/security/2017/dla-979.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Besides bringing the package up to date regarding translations this
-update marks several packages as no longer supported by wheezy-lts:</p>
-
-<p>autotrace, inspircd, ioquake3, kfreebsd-8, kfreebsd-9, matrixssl,
-teeworlds and trn</p>
-
-<p>For the reasoning please see the links provided in</p>
-
- <p>/usr/share/debian-security-support/security-support-ended.deb8</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2017.06.02+deb7u1.</p>
-
-<p>We recommend that you upgrade your debian-security-support packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-979.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-980.data b/english/lts/security/2017/dla-980.data
deleted file mode 100644
index 70f91f1d1a8..00000000000
--- a/english/lts/security/2017/dla-980.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-980-1 ming</define-tag>
-<define-tag report_date>2017-6-6</define-tag>
-<define-tag secrefs>CVE-2017-8782</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-980.wml b/english/lts/security/2017/dla-980.wml
deleted file mode 100644
index bbcdf55ca36..00000000000
--- a/english/lts/security/2017/dla-980.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that ming, a library to parse and generate SWF (Flash)
-files, is susceptible to an integer overflow that would lead into
-out of bound memory writes via a maliciously crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.4.4-1.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-980.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-981.data b/english/lts/security/2017/dla-981.data
deleted file mode 100644
index 7f8d1ac24b8..00000000000
--- a/english/lts/security/2017/dla-981.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-981-1 apng2gif</define-tag>
-<define-tag report_date>2017-6-7</define-tag>
-<define-tag secrefs>CVE-2017-6960 Bug##854367</define-tag>
-<define-tag packages>apng2gif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-981.wml b/english/lts/security/2017/dla-981.wml
deleted file mode 100644
index f47d76312d4..00000000000
--- a/english/lts/security/2017/dla-981.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that apng2gif was vulnerable to an integer overflow
-resulting in a heap-based buffer over-read/write. A remote attacker
-could use this flaw to cause a denial of service (application crash)
-via a crafted APNG file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.5-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your apng2gif packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-981.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-982.data b/english/lts/security/2017/dla-982.data
deleted file mode 100644
index 0ee0429c8e2..00000000000
--- a/english/lts/security/2017/dla-982.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-982-1 tor</define-tag>
-<define-tag report_date>2017-6-10</define-tag>
-<define-tag secrefs>CVE-2017-0376 Bug#864424</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-982.wml b/english/lts/security/2017/dla-982.wml
deleted file mode 100644
index 0dd215b328f..00000000000
--- a/english/lts/security/2017/dla-982.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It has been discovered that Tor, a connection-based low-latency
-anonymous communication system, contains a flaw in the hidden service
-code. A remote attacker can take advantage of this flaw to cause a
-hidden service to crash with an assertion failure (TROVE-2017-005).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-0.2.4.29-1.</p>
-
-<p>We recommend that you upgrade your tor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-982.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-983.data b/english/lts/security/2017/dla-983.data
deleted file mode 100644
index fae22c335cc..00000000000
--- a/english/lts/security/2017/dla-983.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-983-1 tiff3</define-tag>
-<define-tag report_date>2017-6-13</define-tag>
-<define-tag secrefs>CVE-2016-10095 CVE-2017-9147 CVE-2017-9403 CVE-2017-9404</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-983.wml b/english/lts/security/2017/dla-983.wml
deleted file mode 100644
index 1677299a9ea..00000000000
--- a/english/lts/security/2017/dla-983.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>tiff3 was affected by multiple memory leaks (<a href="https://security-tracker.debian.org/tracker/CVE-2017-9403">CVE-2017-9403</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-9404">CVE-2017-9404</a>)
-that could result in denial of service. Furthermore, while the current
-version in Debian was already patched for _TIFFVGetField issues
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-10095">CVE-2016-10095</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-9147">CVE-2017-9147</a>),
-we replaced our Debian-specific patches
-by the upstream provided patches to stay closer to upstream.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u6.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-983.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-984.data b/english/lts/security/2017/dla-984.data
deleted file mode 100644
index 1cc2c09fe24..00000000000
--- a/english/lts/security/2017/dla-984.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-984-1 tiff</define-tag>
-<define-tag report_date>2017-6-13</define-tag>
-<define-tag secrefs>CVE-2016-10095 CVE-2017-9147 CVE-2017-9403 CVE-2017-9404 Bug#863185 850316</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-984.wml b/english/lts/security/2017/dla-984.wml
deleted file mode 100644
index ccadbf14dfc..00000000000
--- a/english/lts/security/2017/dla-984.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>tiff was affected by multiple memory leaks (<a href="https://security-tracker.debian.org/tracker/CVE-2017-9403">CVE-2017-9403</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-9404">CVE-2017-9404</a>)
-that could result in denial of service. Furthermore, while the current
-version in Debian was already patched for _TIFFVGetField issues
-(<a href="https://security-tracker.debian.org/tracker/CVE-2016-10095">CVE-2016-10095</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-9147">CVE-2017-9147</a>),
-we replaced our Debian-specific patches
-by the upstream provided patches to stay closer to upstream.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u14.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-984.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-985.data b/english/lts/security/2017/dla-985.data
deleted file mode 100644
index 18b107c6a32..00000000000
--- a/english/lts/security/2017/dla-985.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-985-1 libsndfile</define-tag>
-<define-tag report_date>2017-6-15</define-tag>
-<define-tag secrefs>CVE-2017-6892 Bug##864704</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-985.wml b/english/lts/security/2017/dla-985.wml
deleted file mode 100644
index 78701b43c5a..00000000000
--- a/english/lts/security/2017/dla-985.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability in libsndfile, a library for
-reading/writing audio files. A specially-crafted AIFF ("Audio Interchange File
-Format") file could result in an out-of-bounds memory read.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libsndfile version
-1.0.25-9.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-985.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-986.data b/english/lts/security/2017/dla-986.data
deleted file mode 100644
index b82c3c9cf6c..00000000000
--- a/english/lts/security/2017/dla-986.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-986-1 zookeeper</define-tag>
-<define-tag report_date>2017-6-15</define-tag>
-<define-tag secrefs>CVE-2017-5637 Bug#863811</define-tag>
-<define-tag packages>zookeeper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-986.wml b/english/lts/security/2017/dla-986.wml
deleted file mode 100644
index cc0aff387c8..00000000000
--- a/english/lts/security/2017/dla-986.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Zookeeper, a service for maintaining
-configuration information, didn't restrict access to the computationally
-expensive wchp/wchc commands which could result in denial of service by
-elevated CPU consumption.</p>
-
-<p>This update disables those two commands by default. The new
-configuration option <q>4lw.commands.whitelist</q> can be used to whitelist
-commands selectively (and the full set of commands can be restored
-with '*')</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.4.5+dfsg-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your zookeeper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-986.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-987.data b/english/lts/security/2017/dla-987.data
deleted file mode 100644
index ba7dfe52daf..00000000000
--- a/english/lts/security/2017/dla-987.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-987-1 request-tracker4</define-tag>
-<define-tag report_date>2017-6-15</define-tag>
-<define-tag secrefs>CVE-2016-6127 CVE-2017-5361 CVE-2017-5943 CVE-2017-5944</define-tag>
-<define-tag packages>request-tracker4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-987.wml b/english/lts/security/2017/dla-987.wml
deleted file mode 100644
index 4f30da9279b..00000000000
--- a/english/lts/security/2017/dla-987.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Request Tracker, an
-extensible trouble-ticket tracking system. The Common Vulnerabilities
-and Exposures project identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6127">CVE-2016-6127</a>
-
- <p>It was discovered that Request Tracker is vulnerable to a cross-site
- scripting (XSS) attack if an attacker uploads a malicious file with
- a certain content type. Installations which use the
- AlwaysDownloadAttachments config setting are unaffected by this
- flaw. The applied fix addresses all existant and future uploaded
- attachments.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5361">CVE-2017-5361</a>
-
- <p>It was discovered that Request Tracker is vulnerable to timing
- side-channel attacks for user passwords.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5943">CVE-2017-5943</a>
-
- <p>It was discovered that Request Tracker is prone to an information
- leak of cross-site request forgery (CSRF) verification tokens if a
- user is tricked into visiting a specially crafted URL by an
- attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5944">CVE-2017-5944</a>
-
- <p>It was discovered that Request Tracker is prone to a remote code
- execution vulnerability in the dashboard subscription interface. A
- privileged attacker can take advantage of this flaw through
- carefully-crafted saved search names to cause unexpected code to be
- executed. The applied fix addresses all existant and future saved
- searches.</p></li>
-
-</ul>
-
-<p>Additionally to the above mentioned CVEs, this update works around
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-7686">CVE-2015-7686</a>
-in Email::Address which could induce a denial of service
-of Request Tracker itself.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.7-5+deb7u5.</p>
-
-<p>We recommend that you upgrade your request-tracker4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-987.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-988.data b/english/lts/security/2017/dla-988.data
deleted file mode 100644
index 74623720e8d..00000000000
--- a/english/lts/security/2017/dla-988.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-988-1 rt-authen-externalauth</define-tag>
-<define-tag report_date>2017-6-16</define-tag>
-<define-tag secrefs>CVE-2017-5361</define-tag>
-<define-tag packages>rt-authen-externalauth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-988.wml b/english/lts/security/2017/dla-988.wml
deleted file mode 100644
index d6107b30af4..00000000000
--- a/english/lts/security/2017/dla-988.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that RT::Authen::ExternalAuth, an external
-authentication module for Request Tracker, is vulnerable to timing
-side-channel attacks for user passwords. Only ExternalAuth in DBI
-(database) mode is vulnerable.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.10-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your rt-authen-externalauth packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-988.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-989.data b/english/lts/security/2017/dla-989.data
deleted file mode 100644
index 96269841b97..00000000000
--- a/english/lts/security/2017/dla-989.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-989-1 jython</define-tag>
-<define-tag report_date>2017-6-18</define-tag>
-<define-tag secrefs>CVE-2016-4000 Bug#864859</define-tag>
-<define-tag packages>jython</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-989.wml b/english/lts/security/2017/dla-989.wml
deleted file mode 100644
index 33ecb6121d3..00000000000
--- a/english/lts/security/2017/dla-989.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alvaro Munoz and Christian Schneider discovered that Jython, an
-implementation of the Python language seamlessly integrated with Java,
-would execute arbitrary code when deserializing objects.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.5.2-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your jython packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-989.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-990.data b/english/lts/security/2017/dla-990.data
deleted file mode 100644
index ec2f5b76d5e..00000000000
--- a/english/lts/security/2017/dla-990.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-990-1 expat</define-tag>
-<define-tag report_date>2017-6-18</define-tag>
-<define-tag secrefs>CVE-2017-9233</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-990.wml b/english/lts/security/2017/dla-990.wml
deleted file mode 100644
index c9faafb5c92..00000000000
--- a/english/lts/security/2017/dla-990.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an infinite loop vulnerability in expat, a XML
-parsing C library:</p>
-
-<p><url "https://libexpat.github.io/doc/cve-2017-9233/"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in expat version
-2.1.0-1+deb7u5.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-990.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-991.data b/english/lts/security/2017/dla-991.data
deleted file mode 100644
index c44b8fbc290..00000000000
--- a/english/lts/security/2017/dla-991.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-991-1 firefox-esr</define-tag>
-<define-tag report_date>2017-6-18</define-tag>
-<define-tag secrefs>CVE-2017-5470 CVE-2017-5472 CVE-2017-7749 CVE-2017-7750 CVE-2017-7751 CVE-2017-7752 CVE-2017-7754 CVE-2017-7756 CVE-2017-7757 CVE-2017-7758 CVE-2017-7764 CVE-2017-7771 CVE-2017-7772 CVE-2017-7773 CVE-2017-7774 CVE-2017-7776 CVE-2017-7777 CVE-2017-7778</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-991.wml b/english/lts/security/2017/dla-991.wml
deleted file mode 100644
index 4e711c2c775..00000000000
--- a/english/lts/security/2017/dla-991.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees, buffer overflows
-and other implementation errors may lead to the execution of arbitrary
-code, denial of service or domain spoofing.</p>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 45.x series has ended, so starting with this update we're now
-following the 52.x releases.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.2.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-991.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-992.data b/english/lts/security/2017/dla-992.data
deleted file mode 100644
index 5036d6a4805..00000000000
--- a/english/lts/security/2017/dla-992.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-992-1 eglibc</define-tag>
-<define-tag report_date>2017-6-19</define-tag>
-<define-tag secrefs>CVE-2017-1000366</define-tag>
-<define-tag packages>eglibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-992.wml b/english/lts/security/2017/dla-992.wml
deleted file mode 100644
index 164ce907c63..00000000000
--- a/english/lts/security/2017/dla-992.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Labs discovered various problems in the dynamic
-linker of the GNU C Library which allow local privilege escalation by
-clashing the stack. For the full details, please refer to their advisory
-published at:
-<a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt">https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.13-38+deb7u12.</p>
-
-<p>We recommend that you upgrade your eglibc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-992.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-993-2.data b/english/lts/security/2017/dla-993-2.data
deleted file mode 100644
index 6d89d4b54cb..00000000000
--- a/english/lts/security/2017/dla-993-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-993-2 linux</define-tag>
-<define-tag report_date>2017-6-27</define-tag>
-<define-tag secrefs>Bug#865303</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-993-2.wml b/english/lts/security/2017/dla-993-2.wml
deleted file mode 100644
index 3c0ae573985..00000000000
--- a/english/lts/security/2017/dla-993-2.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA-993-1 caused regressions for some
-applications using Java - including jsvc, LibreOffice and Scilab - due
-to the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-1000364">CVE-2017-1000364</a>. Updated packages are now available to
-correct this issue. For reference, the relevant part of the original
-advisory text follows.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000364">CVE-2017-1000364</a>
-
- <p>The Qualys Research Labs discovered that the size of the stack guard
- page is not sufficiently large. The stack-pointer can jump over the
- guard-page and moving from the stack into another memory region
- without accessing the guard-page. In this case no page-fault
- exception is raised and the stack extends into the other memory
- region. An attacker can exploit this flaw for privilege escalation.</p>
-
- <p>The default stack gap protection is set to 256 pages and can be
- configured via the stack_guard_gap kernel parameter on the kernel
- command line.</p>
-
- <p>Further details can be found at
- <a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt">https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt</a></p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-3.2.89-2.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.16.43-2+deb8u2.</p>
-
-<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
-4.9.30-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-993-2.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-993.data b/english/lts/security/2017/dla-993.data
deleted file mode 100644
index bd7b8472529..00000000000
--- a/english/lts/security/2017/dla-993.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-993-1 linux</define-tag>
-<define-tag report_date>2017-6-20</define-tag>
-<define-tag secrefs>CVE-2017-0605 CVE-2017-7487 CVE-2017-7645 CVE-2017-7895 CVE-2017-8890 CVE-2017-8924 CVE-2017-8925 CVE-2017-9074 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 CVE-2017-9242 CVE-2017-1000364</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-993.wml b/english/lts/security/2017/dla-993.wml
deleted file mode 100644
index de2f81217e0..00000000000
--- a/english/lts/security/2017/dla-993.wml
+++ /dev/null
@@ -1,117 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0605">CVE-2017-0605</a>
-
- <p>A buffer overflow flaw was discovered in the trace subsystem.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7487">CVE-2017-7487</a>
-
- <p>Li Qiang reported a reference counter leak in the ipxitf_ioctl
- function which may result into a use-after-free vulnerability,
- triggerable when a IPX interface is configured.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7645">CVE-2017-7645</a>
-
- <p>Tuomas Haanpaa and Matti Kamunen from Synopsys Ltd discovered that
- the NFSv2 and NFSv3 server implementations are vulnerable to an
- out-of-bounds memory access issue while processing arbitrarily long
- arguments sent by NFSv2/NFSv3 PRC clients, leading to a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7895">CVE-2017-7895</a>
-
- <p>Ari Kauppi from Synopsys Ltd discovered that the NFSv2 and NFSv3
- server implementations do not properly handle payload bounds
- checking of WRITE requests. A remote attacker with write access to a
- NFS mount can take advantage of this flaw to read chunks of
- arbitrary memory from both kernel-space and user-space.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8890">CVE-2017-8890</a>
-
- <p>It was discovered that the net_csk_clone_lock() function allows a
- remote attacker to cause a double free leading to a denial of
- service or potentially have other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8924">CVE-2017-8924</a>
-
- <p>Johan Hovold found that the io_ti USB serial driver could leak
- sensitive information if a malicious USB device was connected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8925">CVE-2017-8925</a>
-
- <p>Johan Hovold found a reference counter leak in the omninet USB
- serial driver, resulting in a use-after-free vulnerability. This
- can be triggered by a local user permitted to open tty devices.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9074">CVE-2017-9074</a>
-
- <p>Andrey Konovalov reported that the IPv6 fragmentation
- implementation could read beyond the end of a packet buffer. A
- local user or guest VM might be able to use this to leak sensitive
- information or to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9075">CVE-2017-9075</a>
-
- <p>Andrey Konovalov reported that the SCTP/IPv6 implementation
- wrongly initialised address lists on connected sockets, resulting
- in a use-after-free vulnerability, a similar issue to
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-8890">CVE-2017-8890</a>.
- This can be triggered by any local user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9076">CVE-2017-9076</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-9077">CVE-2017-9077</a>
-
- <p>Cong Wang found that the TCP/IPv6 and DCCP/IPv6 implementations
- wrongly initialised address lists on connected sockets, a similar
- issue to <a href="https://security-tracker.debian.org/tracker/CVE-2017-9075">CVE-2017-9075</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9242">CVE-2017-9242</a>
-
- <p>Andrey Konovalov reported a packet buffer overrun in the IPv6
- implementation. A local user could use this for denial of service
- (memory corruption; crash) and possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000364">CVE-2017-1000364</a>
-
- <p>The Qualys Research Labs discovered that the size of the stack guard
- page is not sufficiently large. The stack-pointer can jump over the
- guard-page and moving from the stack into another memory region
- without accessing the guard-page. In this case no page-fault
- exception is raised and the stack extends into the other memory
- region. An attacker can exploit this flaw for privilege escalation.</p>
-
- <p>The default stack gap protection is set to 256 pages and can be
- configured via the stack_guard_gap kernel parameter on the kernel
- command line.</p>
-
- <p>Further details can be found at
- <a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt">https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt</a></p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.89-1. This version also includes bug fixes from upstream version
-3.2.89.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.43-2+deb8u1.</p>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4.9.30-2+deb9u1 or earlier versions before the stretch release.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-993.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-994.data b/english/lts/security/2017/dla-994.data
deleted file mode 100644
index 6188d52b8e1..00000000000
--- a/english/lts/security/2017/dla-994.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-994-1 zziplib</define-tag>
-<define-tag report_date>2017-6-20</define-tag>
-<define-tag secrefs>CVE-2017-5974 CVE-2017-5975 CVE-2017-5976 CVE-2017-5978 CVE-2017-5979 CVE-2017-5980 CVE-2017-5981</define-tag>
-<define-tag packages>zziplib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-994.wml b/english/lts/security/2017/dla-994.wml
deleted file mode 100644
index b925ee48dee..00000000000
--- a/english/lts/security/2017/dla-994.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5974">CVE-2017-5974</a>
-
- <p>Heap-based buffer overflow in the __zzip_get32 function in fetch.c
- in zziplib allows remote attackers to cause a denial of service
- (crash) via a crafted ZIP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5975">CVE-2017-5975</a>
-
- <p>Heap-based buffer overflow in the __zzip_get64 function in fetch.c
- in zziplib allows remote attackers to cause a denial of service
- (crash) via a crafted ZIP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5976">CVE-2017-5976</a>
-
- <p>Heap-based buffer overflow in the zzip_mem_entry_extra_block
- function in memdisk.c in zziplib allows remote attackers to cause
- a denial of service (crash) via a crafted ZIP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5978">CVE-2017-5978</a>
-
- <p>The zzip_mem_entry_new function in memdisk.c in zziplib allows
- remote attackers to cause a denial of service (out-of-bounds
- read and crash) via a crafted ZIP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5979">CVE-2017-5979</a>
-
- <p>The prescan_entry function in fseeko.c in zziplib allows remote
- attackers to cause a denial of service (NULL pointer dereference
- and crash) via a crafted ZIP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5980">CVE-2017-5980</a>
-
- <p>The zzip_mem_entry_new function in memdisk.c in zziplib allows
- remote attackers to cause a denial of service (NULL pointer
- dereference and crash) via a crafted ZIP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5981">CVE-2017-5981</a>
-
- <p>seeko.c in zziplib allows remote attackers to cause a denial of
- service (assertion failure and crash) via a crafted ZIP file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.13.56-1.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your zziplib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-994.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-995.data b/english/lts/security/2017/dla-995.data
deleted file mode 100644
index 77108e495e0..00000000000
--- a/english/lts/security/2017/dla-995.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-995-1 swftools</define-tag>
-<define-tag report_date>2017-6-20</define-tag>
-<define-tag secrefs>CVE-2017-8400 CVE-2017-8401</define-tag>
-<define-tag packages>swftools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-995.wml b/english/lts/security/2017/dla-995.wml
deleted file mode 100644
index 0203ba9d3e8..00000000000
--- a/english/lts/security/2017/dla-995.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8400">CVE-2017-8400</a>
-
- <p>In SWFTools 0.9.2, an out-of-bounds write of heap data can occur in
- the function png_load() in lib/png.c:755. This issue can be triggered
- by a malformed PNG file that is mishandled by png2swf.
- Attackers could exploit this issue for DoS; it might cause arbitrary
- code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8401">CVE-2017-8401</a>
-
- <p>In SWFTools 0.9.2, an out-of-bounds read of heap data can occur in
- the function png_load() in lib/png.c:724. This issue can be triggered
- by a malformed PNG file that is mishandled by png2swf.
- Attackers could exploit this issue for DoS.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.2+ds1-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your swftools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-995.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-996.data b/english/lts/security/2017/dla-996.data
deleted file mode 100644
index 332ed926f12..00000000000
--- a/english/lts/security/2017/dla-996.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-996-1 tomcat7</define-tag>
-<define-tag report_date>2017-6-20</define-tag>
-<define-tag secrefs>CVE-2017-5664 Bug#864447</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-996.wml b/english/lts/security/2017/dla-996.wml
deleted file mode 100644
index e298404adee..00000000000
--- a/english/lts/security/2017/dla-996.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The error page mechanism of the Java Servlet Specification requires
-that, when an error occurs and an error page is configured for the
-error that occurred, the original request and response are forwarded
-to the error page. This means that the request is presented to the
-error page with the original HTTP method. If the error page is a
-static file, expected behaviour is to serve content of the file as if
-processing a GET request, regardless of the actual HTTP method. The
-Default Servlet in Apache Tomcat did not do this. Depending on the
-original request this could lead to unexpected and undesirable results
-for static error pages including, if the DefaultServlet is configured
-to permit writes, the replacement or removal of the custom error page.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u14.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-996.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-997.data b/english/lts/security/2017/dla-997.data
deleted file mode 100644
index 140c0ded58d..00000000000
--- a/english/lts/security/2017/dla-997.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-997-1 libffi</define-tag>
-<define-tag report_date>2017-6-21</define-tag>
-<define-tag secrefs>CVE-2017-1000376</define-tag>
-<define-tag packages>libffi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-997.wml b/english/lts/security/2017/dla-997.wml
deleted file mode 100644
index 839193f34dd..00000000000
--- a/english/lts/security/2017/dla-997.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libffi requests an executable stack allowing attackers to more easily trigger
-arbitrary code execution by overwriting the stack. Please note that libffi is
-used by a number of other libraries.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.0.10-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your libffi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-997.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-998.data b/english/lts/security/2017/dla-998.data
deleted file mode 100644
index a966dacef1f..00000000000
--- a/english/lts/security/2017/dla-998.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-998-1 c-ares</define-tag>
-<define-tag report_date>2017-6-22</define-tag>
-<define-tag secrefs>CVE-2017-1000381</define-tag>
-<define-tag packages>c-ares</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-998.wml b/english/lts/security/2017/dla-998.wml
deleted file mode 100644
index 2dde51b4a43..00000000000
--- a/english/lts/security/2017/dla-998.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000381">CVE-2017-1000381</a>
-
- <p>The c-ares function ares_parse_naptr_reply(), which is used for
- parsing NAPTR responses, could be triggered to read memory
- outside of the given input buffer if the passed in DNS response
- packet was crafted in a particular way.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.1-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your c-ares packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-998.data"
-# $Id: $
diff --git a/english/lts/security/2017/dla-999.data b/english/lts/security/2017/dla-999.data
deleted file mode 100644
index 196a5db736f..00000000000
--- a/english/lts/security/2017/dla-999.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-999-1 openvpn</define-tag>
-<define-tag report_date>2017-6-22</define-tag>
-<define-tag secrefs>CVE-2017-7520 Bug##865480</define-tag>
-<define-tag packages>openvpn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2017/dla-999.wml b/english/lts/security/2017/dla-999.wml
deleted file mode 100644
index 89068d3e6ea..00000000000
--- a/english/lts/security/2017/dla-999.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were multiple out-of-bounds memory read
-vulnerabilities in openvpn, a popular virtual private network (VPN) daemon.</p>
-
-<p>If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
-attacker could cause the client to crash or disclose at most 96 bytes of stack
-memory, likely to contain the proxy password.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in openvpn version
-2.2.1-8+deb7u5.</p>
-
-<p>We recommend that you upgrade your openvpn packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2017/dla-999.data"
-# $Id: $
diff --git a/english/lts/security/2017/index.wml b/english/lts/security/2017/index.wml
deleted file mode 100644
index ade5ccb2d9f..00000000000
--- a/english/lts/security/2017/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2017</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2017' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2018/Makefile b/english/lts/security/2018/Makefile
deleted file mode 100644
index 01440ef2679..00000000000
--- a/english/lts/security/2018/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2018
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
diff --git a/english/lts/security/2018/dla-1227.data b/english/lts/security/2018/dla-1227.data
deleted file mode 100644
index 2f40acccda7..00000000000
--- a/english/lts/security/2018/dla-1227.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1227-1 imagemagick</define-tag>
-<define-tag report_date>2018-1-1</define-tag>
-<define-tag secrefs>CVE-2017-17504 CVE-2017-17682 CVE-2017-17879 CVE-2017-17914 Bug#885340 Bug#885942 Bug#885125</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1227.wml b/english/lts/security/2018/dla-1227.wml
deleted file mode 100644
index 1d823c36676..00000000000
--- a/english/lts/security/2018/dla-1227.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in ImageMagick, an
-image manipulation program, that allow remote attackers to cause a
-denial of service (CPU exhaustion via an infinite loop), heap-based
-buffer overreads or possibly other unspecified impact via a crafted
-image file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u19.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1227.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1228.data b/english/lts/security/2018/dla-1228.data
deleted file mode 100644
index 17d0cadb78f..00000000000
--- a/english/lts/security/2018/dla-1228.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1228-1 poppler</define-tag>
-<define-tag report_date>2018-1-3</define-tag>
-<define-tag secrefs>CVE-2017-1000456</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1228.wml b/english/lts/security/2018/dla-1228.wml
deleted file mode 100644
index debcbbc3d7e..00000000000
--- a/english/lts/security/2018/dla-1228.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jason Crain discovered a overflow vulnerability in the poppler PDF
-rendering library.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in poppler version
-0.18.4-6+deb7u5.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1228.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1229.data b/english/lts/security/2018/dla-1229.data
deleted file mode 100644
index 34ba18e76fb..00000000000
--- a/english/lts/security/2018/dla-1229.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1229-1 imagemagick</define-tag>
-<define-tag report_date>2018-1-4</define-tag>
-<define-tag secrefs>CVE-2017-1000445 CVE-2017-1000476 Bug##886281</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1229.wml b/english/lts/security/2018/dla-1229.wml
deleted file mode 100644
index 0ab61d51ad6..00000000000
--- a/english/lts/security/2018/dla-1229.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities in the imagemagick
-image manipulation program:</p>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000445">CVE-2017-1000445</a>
- <p>A null pointer dereference in the MagickCore
- component which could lead to denial of service.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000476">CVE-2017-1000476</a>
- <p>A potential denial of service attack via CPU
- exhaustion.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in imagemagick version
-8:6.7.7.10-5+deb7u20.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1229.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1230.data b/english/lts/security/2018/dla-1230.data
deleted file mode 100644
index 454c440c720..00000000000
--- a/english/lts/security/2018/dla-1230.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1230-1 xen</define-tag>
-<define-tag report_date>2018-1-5</define-tag>
-<define-tag secrefs>CVE-2017-17044 CVE-2017-17045 CVE-2017-17563 CVE-2017-17564 CVE-2017-17565 CVE-2017-17566</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1230.wml b/english/lts/security/2018/dla-1230.wml
deleted file mode 100644
index 929b6150815..00000000000
--- a/english/lts/security/2018/dla-1230.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, information leaks, privilege escalation
-or the execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-11.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1230.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1231.data b/english/lts/security/2018/dla-1231.data
deleted file mode 100644
index 9fc953c9427..00000000000
--- a/english/lts/security/2018/dla-1231.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1231-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-1-8</define-tag>
-<define-tag secrefs>CVE-2017-17498 CVE-2017-17500 CVE-2017-17501 CVE-2017-17502 CVE-2017-17503 CVE-2017-17782 CVE-2017-17912 CVE-2017-17915 Bug#884905</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1231.wml b/english/lts/security/2018/dla-1231.wml
deleted file mode 100644
index dd3a1767943..00000000000
--- a/english/lts/security/2018/dla-1231.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The NSFocus Security Team discovered multiple security issues in
-Graphicsmagick, a collection of image processing tools. Several
-heap-based buffer over-reads may lead to a denial-of-service
-(application crash) or possibly have other unspecified impact when
-processing a crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u16.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1231.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1232.data b/english/lts/security/2018/dla-1232.data
deleted file mode 100644
index 42586e07fcf..00000000000
--- a/english/lts/security/2018/dla-1232.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1232-1 linux</define-tag>
-<define-tag report_date>2018-1-7</define-tag>
-<define-tag secrefs>CVE-2017-5754 CVE-2017-17558 CVE-2017-17741 CVE-2017-17805 CVE-2017-17806 CVE-2017-17807</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1232.wml b/english/lts/security/2018/dla-1232.wml
deleted file mode 100644
index 862f02179a5..00000000000
--- a/english/lts/security/2018/dla-1232.wml
+++ /dev/null
@@ -1,76 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5754">CVE-2017-5754</a>
-
- <p>Multiple researchers have discovered a vulnerability in Intel
- processors, enabling an attacker controlling an unprivileged
- process to read memory from arbitrary addresses, including from
- the kernel and all other processes running on the system.</p>
-
- <p>This specific attack has been named Meltdown and is addressed in
- the Linux kernel for the Intel x86-64 architecture by a patch set
- named Kernel Page Table Isolation, enforcing a near complete
- separation of the kernel and userspace address maps and preventing
- the attack. This solution might have a performance impact, and can
- be disabled at boot time by passing `pti=off' to the kernel
- command line.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17558">CVE-2017-17558</a>
-
- <p>Andrey Konovalov reported that that USB core did not correctly
- handle some error conditions during initialisation. A physically
- present user with a specially designed USB device can use this to
- cause a denial of service (crash or memory corruption), or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17741">CVE-2017-17741</a>
-
- <p>Dmitry Vyukov reported that the KVM implementation for x86 would
- over-read data from memory when emulating an MMIO write if the
- kvm_mmio tracepoint was enabled. A guest virtual machine might be
- able to use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17805">CVE-2017-17805</a>
-
- <p>It was discovered that some implementations of the Salsa20 block
- cipher did not correctly handle zero-length input. A local user
- could use this to cause a denial of service (crash) or possibly
- have other security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17806">CVE-2017-17806</a>
-
- <p>It was discovered that the HMAC implementation could be used with
- an underlying hash algorithm that requires a key, which was not
- intended. A local user could use this to cause a denial of
- service (crash or memory corruption), or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17807">CVE-2017-17807</a>
-
- <p>Eric Biggers discovered that the KEYS subsystem lacked a check for
- write permission when adding keys to a process's default keyring.
- A local user could use this to cause a denial of service or to
- obtain sensitive information.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.96-3.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1232.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1233.data b/english/lts/security/2018/dla-1233.data
deleted file mode 100644
index 2f3c2d8bc7c..00000000000
--- a/english/lts/security/2018/dla-1233.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1233-1 gifsicle</define-tag>
-<define-tag report_date>2018-1-8</define-tag>
-<define-tag secrefs>CVE-2017-1000421</define-tag>
-<define-tag packages>gifsicle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1233.wml b/english/lts/security/2018/dla-1233.wml
deleted file mode 100644
index 208ebe44ad6..00000000000
--- a/english/lts/security/2018/dla-1233.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after-free vulnerability in
-gifsicle, a command-line tool for manipulating GIF images.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in gifsicle version
-1.67-1.1~deb7u1.</p>
-
-<p>We recommend that you upgrade your gifsicle packages.</p>
-
-<p>(Thanks to Herbert Parentes Fortes Neto for his help in preparing this
-update.)</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1233.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1234-2.data b/english/lts/security/2018/dla-1234-2.data
deleted file mode 100644
index de69bb81852..00000000000
--- a/english/lts/security/2018/dla-1234-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1234-2 gdk-pixbuf</define-tag>
-<define-tag report_date>2018-1-9</define-tag>
-<define-tag secrefs>Bug#886721</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1234-2.wml b/english/lts/security/2018/dla-1234-2.wml
deleted file mode 100644
index 2b34049adc7..00000000000
--- a/english/lts/security/2018/dla-1234-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The patch introduced in DLA-1234-1 had a problem that caused
-gdk-pixbuf's gif module to fail to load.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.26.1-1+deb7u8.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1234-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1234.data b/english/lts/security/2018/dla-1234.data
deleted file mode 100644
index 54f0457004a..00000000000
--- a/english/lts/security/2018/dla-1234.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1234-1 gdk-pixbuf</define-tag>
-<define-tag report_date>2018-1-8</define-tag>
-<define-tag secrefs>CVE-2017-1000422</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1234.wml b/english/lts/security/2018/dla-1234.wml
deleted file mode 100644
index fb9601da446..00000000000
--- a/english/lts/security/2018/dla-1234.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were several integer overflows in
-gdk-pixbuf, a library to manipulate images for the GTK graphics toolkit.
-This could have led to memory corruption and potential code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in gdk-pixbuf version
-2.26.1-1+deb7u7.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1234.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1235.data b/english/lts/security/2018/dla-1235.data
deleted file mode 100644
index 613f774b68e..00000000000
--- a/english/lts/security/2018/dla-1235.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1235-1 opencv</define-tag>
-<define-tag report_date>2018-1-8</define-tag>
-<define-tag secrefs>CVE-2017-17760 CVE-2017-1000450</define-tag>
-<define-tag packages>opencv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1235.wml b/english/lts/security/2018/dla-1235.wml
deleted file mode 100644
index b72f976f884..00000000000
--- a/english/lts/security/2018/dla-1235.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Opencv 3.3 and earlier has problems while reading data, which might
-result in either buffer overflows or integer overflows.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.1-11+deb7u3.</p>
-
-<p>We recommend that you upgrade your opencv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1235.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1236.data b/english/lts/security/2018/dla-1236.data
deleted file mode 100644
index 8416675bfd2..00000000000
--- a/english/lts/security/2018/dla-1236.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1236-1 plexus-utils</define-tag>
-<define-tag report_date>2018-1-9</define-tag>
-<define-tag secrefs>CVE-2017-1000487</define-tag>
-<define-tag packages>plexus-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1236.wml b/english/lts/security/2018/dla-1236.wml
deleted file mode 100644
index ed297cd6a4f..00000000000
--- a/english/lts/security/2018/dla-1236.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Charles Duffy discovered that the Commandline class in plexus-utils, a
-collection of components used by Apache Maven, does not correctly
-quote the contents of double-quoted strings. An attacker may use this
-flaw to inject arbitrary shell commands.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.5.15-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your plexus-utils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1236.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1237.data b/english/lts/security/2018/dla-1237.data
deleted file mode 100644
index a76936ba4d0..00000000000
--- a/english/lts/security/2018/dla-1237.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1237-1 plexus-utils2</define-tag>
-<define-tag report_date>2018-1-9</define-tag>
-<define-tag secrefs>CVE-2017-1000487</define-tag>
-<define-tag packages>plexus-utils2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1237.wml b/english/lts/security/2018/dla-1237.wml
deleted file mode 100644
index f8b22b224e9..00000000000
--- a/english/lts/security/2018/dla-1237.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Charles Duffy discovered that the Commandline class in plexus-utils2, a
-collection of components used by Apache Maven, does not correctly
-quote the contents of double-quoted strings. An attacker may use this
-flaw to inject arbitrary shell commands.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.5-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your plexus-utils2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1237.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1238.data b/english/lts/security/2018/dla-1238.data
deleted file mode 100644
index efeecca0152..00000000000
--- a/english/lts/security/2018/dla-1238.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1238-1 awstats</define-tag>
-<define-tag report_date>2018-1-10</define-tag>
-<define-tag secrefs>CVE-2017-1000501 Bug#885835</define-tag>
-<define-tag packages>awstats</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1238.wml b/english/lts/security/2018/dla-1238.wml
deleted file mode 100644
index 49de6939538..00000000000
--- a/english/lts/security/2018/dla-1238.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the
-handling of the <q>config</q> and <q>migrate</q> parameters resulting in unauthenticated
-remote code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0~dfsg-7+deb7u1.</p>
-
-<p>We recommend that you upgrade your awstats packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1238.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1239.data b/english/lts/security/2018/dla-1239.data
deleted file mode 100644
index f53ebdf9256..00000000000
--- a/english/lts/security/2018/dla-1239.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1239-1 poco</define-tag>
-<define-tag report_date>2018-1-10</define-tag>
-<define-tag secrefs>CVE-2017-1000472</define-tag>
-<define-tag packages>poco</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1239.wml b/english/lts/security/2018/dla-1239.wml
deleted file mode 100644
index 11ff4741c68..00000000000
--- a/english/lts/security/2018/dla-1239.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO
-C++ Libraries before 1.8 does not properly restrict the filename value
-in the ZIP header, which allows attackers to conduct absolute path
-traversal attacks during the ZIP decompression, and possibly create or
-overwrite arbitrary files, via a crafted ZIP file, related to a <q>file
-path injection vulnerability</q>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.6p1-4+deb7u1.</p>
-
-<p>We recommend that you upgrade your poco packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1239.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1240.data b/english/lts/security/2018/dla-1240.data
deleted file mode 100644
index 6c090f612ac..00000000000
--- a/english/lts/security/2018/dla-1240.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1240-1 ming</define-tag>
-<define-tag report_date>2018-1-11</define-tag>
-<define-tag secrefs>CVE-2017-11732 CVE-2017-16883 CVE-2017-16898</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1240.wml b/english/lts/security/2018/dla-1240.wml
deleted file mode 100644
index 30a942cfeaf..00000000000
--- a/english/lts/security/2018/dla-1240.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Ming:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11732">CVE-2017-11732</a>
-
- <p>heap-based buffer overflow vulnerability in the function dcputs
- (util/decompile.c) in Ming <= 0.4.8, which allows attackers to
- cause a denial of service via a crafted SWF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16883">CVE-2017-16883</a>
-
- <p>NULL pointer dereference vulnerability in the function outputSWF_TEXT_RECORD
- (util/outputscript.c) in Ming <= 0.4.8, which allows attackers
- to cause a denial of service via a crafted SWF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16898">CVE-2017-16898</a>
-
- <p>global buffer overflow vulnerability in the function printMP3Headers
- (util/listmp3.c) in Ming <= 0.4.8, which allows attackers to cause a
- denial of service via a crafted SWF file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.4.4-1.1+deb7u6.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1240.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1241.data b/english/lts/security/2018/dla-1241.data
deleted file mode 100644
index 13667580c81..00000000000
--- a/english/lts/security/2018/dla-1241.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1241-1 libkohana2-php</define-tag>
-<define-tag report_date>2018-1-14</define-tag>
-<define-tag secrefs>CVE-2016-10510</define-tag>
-<define-tag packages>libkohana2-php</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1241.wml b/english/lts/security/2018/dla-1241.wml
deleted file mode 100644
index 57bbdca5221..00000000000
--- a/english/lts/security/2018/dla-1241.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>David Sopas discovered that Kohana, a PHP framework, was vulnerable to
-a Cross-site scripting (XSS) attack that allowed remote attackers to
-inject arbitrary web script or HTML by bypassing the strip_image_tags
-protection mechanism in system/classes/Kohana/Security.php. This issue
-was resolved by permanently removing the strip_image_tags function.
-Users are advised to sanitize user input by using external libraries
-instead.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.4-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libkohana2-php packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1241.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1242.data b/english/lts/security/2018/dla-1242.data
deleted file mode 100644
index 13e9496d77d..00000000000
--- a/english/lts/security/2018/dla-1242.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1242-1 xmltooling</define-tag>
-<define-tag report_date>2018-1-14</define-tag>
-<define-tag secrefs>CVE-2018-0486</define-tag>
-<define-tag packages>xmltooling</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1242.wml b/english/lts/security/2018/dla-1242.wml
deleted file mode 100644
index 4d15fdd4d01..00000000000
--- a/english/lts/security/2018/dla-1242.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Philip Huppert discovered the Shibboleth service provider is vulnerable
-to impersonation attacks and information disclosure due to mishandling
-of DTDs in the XMLTooling XML parsing library. For additional details
-please refer to the upstream advisory at</p>
-
-<p><url "https://shibboleth.net/community/advisories/secadv_20180112.txt"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.2-5+deb7u2.</p>
-
-<p>We recommend that you upgrade your xmltooling packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1242.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1243.data b/english/lts/security/2018/dla-1243.data
deleted file mode 100644
index b2bb4842cd2..00000000000
--- a/english/lts/security/2018/dla-1243.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1243-1 xbmc</define-tag>
-<define-tag report_date>2018-1-16</define-tag>
-<define-tag secrefs>CVE-2017-8314 Bug#863230</define-tag>
-<define-tag packages>xbmc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1243.wml b/english/lts/security/2018/dla-1243.wml
deleted file mode 100644
index 24d55bce38b..00000000000
--- a/english/lts/security/2018/dla-1243.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Check Point Research Team discovered that the XBMC media center
-allows arbitrary file write when a malicious subtitle file is
-downloaded in zip format. This update requires the new dependency
-libboost-regex1.49.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:11.0~git20120510.82388d5-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your xbmc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1243.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1244.data b/english/lts/security/2018/dla-1244.data
deleted file mode 100644
index 4fba66b05be..00000000000
--- a/english/lts/security/2018/dla-1244.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1244-1 ca-certificates</define-tag>
-<define-tag report_date>2018-1-15</define-tag>
-<define-tag secrefs>Bug#858064 Bug#858539</define-tag>
-<define-tag packages>ca-certificates</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1244.wml b/english/lts/security/2018/dla-1244.wml
deleted file mode 100644
index 53fd84a9f94..00000000000
--- a/english/lts/security/2018/dla-1244.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This release does a complete update of the CA list. This includes
-removing the StartCom and WoSign certificates to as they are now
-untrusted by the major browser vendors.</p>
-
-<p>This includes 1024-bit root certificates (#858064) and untrusted StartCom and
-WoSign certificates (#858539) which have been removed, as they are deemed to
-untrustworthy.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-20130119+deb7u2.</p>
-
-<p>We recommend that you upgrade your ca-certificates packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1244.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1245.data b/english/lts/security/2018/dla-1245.data
deleted file mode 100644
index a31fb650c64..00000000000
--- a/english/lts/security/2018/dla-1245.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1245-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-1-16</define-tag>
-<define-tag secrefs>CVE-2018-5685 Bug#887158</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1245.wml b/english/lts/security/2018/dla-1245.wml
deleted file mode 100644
index b7cc85b6039..00000000000
--- a/english/lts/security/2018/dla-1245.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in GraphicsMagick, a collection of
-image processing tools, which may result in a denial of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5685">CVE-2018-5685</a>
-
- <p>An infinite loop and application hang has been discovered in the
- ReadBMPImage function (coders/bmp.c). Remote attackers could
- leverage this vulnerability to cause a denial of service via an
- image file with a crafted bit-field mask value.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u17.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1245.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1246.data b/english/lts/security/2018/dla-1246.data
deleted file mode 100644
index b3f6fd3787a..00000000000
--- a/english/lts/security/2018/dla-1246.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1246-1 transmission</define-tag>
-<define-tag report_date>2018-1-18</define-tag>
-<define-tag secrefs>CVE-2018-5702 Bug#886990</define-tag>
-<define-tag packages>transmission</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1246.wml b/english/lts/security/2018/dla-1246.wml
deleted file mode 100644
index e429697a35c..00000000000
--- a/english/lts/security/2018/dla-1246.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered a vulnerability in the Transmission BitTorrent
-client; insecure RPC handling between the Transmission daemon and the
-client interface(s) may result in the execution of arbitrary code if a
-user visits a malicious website while Transmission is running.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.52-3+nmu3.</p>
-
-<p>We recommend that you upgrade your transmission packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1246.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1247.data b/english/lts/security/2018/dla-1247.data
deleted file mode 100644
index 0f37a9ffb5c..00000000000
--- a/english/lts/security/2018/dla-1247.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1247-1 rsync</define-tag>
-<define-tag report_date>2018-1-19</define-tag>
-<define-tag secrefs>CVE-2018-5764 Bug##887588</define-tag>
-<define-tag packages>rsync</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1247.wml b/english/lts/security/2018/dla-1247.wml
deleted file mode 100644
index 6f5efd6b348..00000000000
--- a/english/lts/security/2018/dla-1247.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an injection vulnerability in the rsync
-file-copying tool.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in rsync version
-3.0.9-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your rsync packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1247.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1248.data b/english/lts/security/2018/dla-1248.data
deleted file mode 100644
index 46d0b87d043..00000000000
--- a/english/lts/security/2018/dla-1248.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1248-1 libgd2</define-tag>
-<define-tag report_date>2018-1-19</define-tag>
-<define-tag secrefs>CVE-2018-5711 Bug##887485</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1248.wml b/english/lts/security/2018/dla-1248.wml
deleted file mode 100644
index a75fa99de6f..00000000000
--- a/english/lts/security/2018/dla-1248.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial-of-service attack in the
-libgd2 image library. A corrupt file could have exploited a signedness
-confusion leading to an infinite loop.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libgd2 version
-2.0.36~rc1~dfsg-6.1+deb7u11.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1248.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1249-2.data b/english/lts/security/2018/dla-1249-2.data
deleted file mode 100644
index d9fd82f4fd4..00000000000
--- a/english/lts/security/2018/dla-1249-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1249-2 smarty3</define-tag>
-<define-tag report_date>2018-2-1</define-tag>
-<define-tag secrefs>CVE-2017-1000480 Bug##886460</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1249-2.wml b/english/lts/security/2018/dla-1249-2.wml
deleted file mode 100644
index 3efe718ceb6..00000000000
--- a/english/lts/security/2018/dla-1249-2.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was previously discovered that there was a code-injection vulnerability in
-smarty3, a PHP template engine. A via specially-crafted filename in comments
-could result in arbitrary code execution.</p>
-
-<p>However, the fix in 3.1.10-2+deb7u2 was incorrect. For Debian 7 <q>Wheezy</q>,
-this regression has been addressed in smarty3 version 3.1.10-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1249-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1249.data b/english/lts/security/2018/dla-1249.data
deleted file mode 100644
index ad27e42ead5..00000000000
--- a/english/lts/security/2018/dla-1249.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1249-1 smarty3</define-tag>
-<define-tag report_date>2018-1-19</define-tag>
-<define-tag secrefs>CVE-2017-1000480 Bug##886460</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1249.wml b/english/lts/security/2018/dla-1249.wml
deleted file mode 100644
index 81ebe054e57..00000000000
--- a/english/lts/security/2018/dla-1249.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a code-injection vulnerability in smarty3,
-a PHP template engine.</p>
-
-<p>A via specially-crafted filename in comments could result in arbitray code
-execution. Thanks to Mike Gabriel for backporting the patch.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in smarty3 version
-3.1.10-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1249.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1250.data b/english/lts/security/2018/dla-1250.data
deleted file mode 100644
index a987024ef3e..00000000000
--- a/english/lts/security/2018/dla-1250.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1250-1 mysql-5.5</define-tag>
-<define-tag report_date>2018-1-19</define-tag>
-<define-tag secrefs>CVE-2018-2562 CVE-2018-2622 CVE-2018-2640 CVE-2018-2665 CVE-2018-2668</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1250.wml b/english/lts/security/2018/dla-1250.wml
deleted file mode 100644
index af0cd945cca..00000000000
--- a/english/lts/security/2018/dla-1250.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.59, which includes additional changes. Please see the MySQL
-5.5 Release Notes and Oracle's Critical Patch Update advisory for
-further details:</p>
-
-<ul>
- <li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html"></li>
- <li><a href="http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html">http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.59-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1250.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1251.data b/english/lts/security/2018/dla-1251.data
deleted file mode 100644
index c12f6252ea9..00000000000
--- a/english/lts/security/2018/dla-1251.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1251-1 php5</define-tag>
-<define-tag report_date>2018-1-20</define-tag>
-<define-tag secrefs>CVE-2018-5712</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1251.wml b/english/lts/security/2018/dla-1251.wml
deleted file mode 100644
index c10b50ff779..00000000000
--- a/english/lts/security/2018/dla-1251.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that PHP5 was vulnerable to a reflected cross-site
-scripting (XSS) attack on the PHAR 404 error page by manipulating the
-URI of a request for a .phar file. This issue is only exploitable if
-the web server is configured to handle phar files using PHP5.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u12.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1251.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1252.data b/english/lts/security/2018/dla-1252.data
deleted file mode 100644
index 6f35275d221..00000000000
--- a/english/lts/security/2018/dla-1252.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1252-1 couchdb</define-tag>
-<define-tag report_date>2018-1-21</define-tag>
-<define-tag secrefs>CVE-2017-12635 CVE-2017-12636</define-tag>
-<define-tag packages>couchdb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1252.wml b/english/lts/security/2018/dla-1252.wml
deleted file mode 100644
index 471fa40f9ab..00000000000
--- a/english/lts/security/2018/dla-1252.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12635">CVE-2017-12635</a>
-
- <p>Prevent non-admin users to give themselves admin privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12636">CVE-2017-12636</a>
-
- <p>Blacklist some configuration options to prevent execution of
- arbitrary shell commands as the CouchDB user</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.0-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your couchdb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1252.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1253.data b/english/lts/security/2018/dla-1253.data
deleted file mode 100644
index 808bcccde92..00000000000
--- a/english/lts/security/2018/dla-1253.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1253-1 openocd</define-tag>
-<define-tag report_date>2018-1-21</define-tag>
-<define-tag secrefs>CVE-2018-5704 Bug#887488</define-tag>
-<define-tag packages>openocd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1253.wml b/english/lts/security/2018/dla-1253.wml
deleted file mode 100644
index 190455f1d6c..00000000000
--- a/english/lts/security/2018/dla-1253.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>OpenOCD, an on-chip JTAG debug solution for ARM and MIPS systems, does
-not block attempts to use HTTP POST for sending data to localhost, which
-allows remote attackers to conduct cross-protocol scripting attacks,
-and consequently execute arbitrary commands, via a crafted web site.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.5.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your openocd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1253.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1254.data b/english/lts/security/2018/dla-1254.data
deleted file mode 100644
index d89f49689a7..00000000000
--- a/english/lts/security/2018/dla-1254.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1254-1 lucene-solr</define-tag>
-<define-tag report_date>2018-1-21</define-tag>
-<define-tag secrefs>CVE-2017-12629</define-tag>
-<define-tag packages>lucene-solr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1254.wml b/english/lts/security/2018/dla-1254.wml
deleted file mode 100644
index 98d5f17c612..00000000000
--- a/english/lts/security/2018/dla-1254.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Michael Stepankin and Olga Barinova discovered a remote code execution
-vulnerability in Apache Solr by exploiting XML External Entity
-processing (XXE) in conjunction with use of a Config API add-listener
-command to reach the RunExecutableListener class. To resolve this
-issue the RunExecutableListener class has been removed and resolving
-of external entities in the CoreParser class disallowed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.0+dfsg-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your lucene-solr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1254.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1255.data b/english/lts/security/2018/dla-1255.data
deleted file mode 100644
index 188460f2cc9..00000000000
--- a/english/lts/security/2018/dla-1255.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1255-1 bind9</define-tag>
-<define-tag report_date>2018-1-21</define-tag>
-<define-tag secrefs>CVE-2017-3145</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1255.wml b/english/lts/security/2018/dla-1255.wml
deleted file mode 100644
index 6edbcc9f7d1..00000000000
--- a/english/lts/security/2018/dla-1255.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jayachandran Palanisamy of Cygate AB reported that BIND, a DNS server
-implementation, was improperly sequencing cleanup operations, leading in
-some cases to a use-after-free error, triggering an assertion failure
-and crash in named.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:9.8.4.dfsg.P1-6+nmu2+deb7u19.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1255.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1256.data b/english/lts/security/2018/dla-1256.data
deleted file mode 100644
index be00eec4ea1..00000000000
--- a/english/lts/security/2018/dla-1256.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1256-1 firefox-esr</define-tag>
-<define-tag report_date>2018-1-24</define-tag>
-<define-tag secrefs>CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1256.wml b/english/lts/security/2018/dla-1256.wml
deleted file mode 100644
index 6a6137d6680..00000000000
--- a/english/lts/security/2018/dla-1256.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors, use-after-frees and other
-implementation errors may lead to the execution of arbitrary code or denial
-of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.6.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1256.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1257.data b/english/lts/security/2018/dla-1257.data
deleted file mode 100644
index f4a4c313a02..00000000000
--- a/english/lts/security/2018/dla-1257.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1257-1 openssh</define-tag>
-<define-tag report_date>2018-1-26</define-tag>
-<define-tag secrefs>CVE-2016-10708</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1257.wml b/english/lts/security/2018/dla-1257.wml
deleted file mode 100644
index eb9c46f4991..00000000000
--- a/english/lts/security/2018/dla-1257.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>OpenSSH was found to be vulnerable to out of order NEWKEYS messages
-which could crash the daemon, resulting in a denial of service attack.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:6.0p1-4+deb7u7.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1257.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1258.data b/english/lts/security/2018/dla-1258.data
deleted file mode 100644
index 300c54fd871..00000000000
--- a/english/lts/security/2018/dla-1258.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1258-1 wireshark</define-tag>
-<define-tag report_date>2018-1-26</define-tag>
-<define-tag secrefs>CVE-2018-5334 CVE-2018-5335 CVE-2018-5336</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1258.wml b/english/lts/security/2018/dla-1258.wml
deleted file mode 100644
index ff8a2657d98..00000000000
--- a/english/lts/security/2018/dla-1258.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Kamil Frankowicz and Young found that several parsers of wireshark could
-be crashed by malformed packets.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u9.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1258.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1259.data b/english/lts/security/2018/dla-1259.data
deleted file mode 100644
index b9687f346a9..00000000000
--- a/english/lts/security/2018/dla-1259.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1259-1 tiff</define-tag>
-<define-tag report_date>2018-1-27</define-tag>
-<define-tag secrefs>CVE-2017-18013 Bug#885985</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1259.wml b/english/lts/security/2018/dla-1259.wml
deleted file mode 100644
index d103d21606e..00000000000
--- a/english/lts/security/2018/dla-1259.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in the libtiff image processing
-library which may result in an application crash and denial of
-service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18013">CVE-2017-18013</a>
-
- <p>NULL pointer dereference via crafted TIFF image</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u18.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1259.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1260.data b/english/lts/security/2018/dla-1260.data
deleted file mode 100644
index b77eea4f781..00000000000
--- a/english/lts/security/2018/dla-1260.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1260-1 tiff3</define-tag>
-<define-tag report_date>2018-1-27</define-tag>
-<define-tag secrefs>CVE-2017-18013 Bug#885985</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1260.wml b/english/lts/security/2018/dla-1260.wml
deleted file mode 100644
index c69a6414260..00000000000
--- a/english/lts/security/2018/dla-1260.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in the libtiff image processing
-library which may result in an application crash and denial of
-service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18013">CVE-2017-18013</a>
-
- <p>NULL pointer dereference via crafted TIFF image</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u9.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1260.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1261.data b/english/lts/security/2018/dla-1261.data
deleted file mode 100644
index ab9ec12ad69..00000000000
--- a/english/lts/security/2018/dla-1261.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1261-1 clamav</define-tag>
-<define-tag report_date>2018-1-28</define-tag>
-<define-tag secrefs>CVE-2017-12374 CVE-2017-12375 CVE-2017-12376 CVE-2017-12377 CVE-2017-12378 CVE-2017-12379 CVE-2017-12380 Bug#888484 Bug#824196</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1261.wml b/english/lts/security/2018/dla-1261.wml
deleted file mode 100644
index 592fccd1960..00000000000
--- a/english/lts/security/2018/dla-1261.wml
+++ /dev/null
@@ -1,89 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in clamav, the ClamAV
-AntiVirus toolkit for Unix. Effects range from denial of service to
-potential arbitrary code execution. Additionally, this version fixes
-a longstanding issue that has recently resurfaced whereby a malformed
-virus signature database can cause an application crash and denial of
-service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12374">CVE-2017-12374</a>
-
- <p>ClamAV has a use-after-free condition arising from a lack of input
- validation. A remote attacker could exploit this vulnerability with
- a crafted email message to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12375">CVE-2017-12375</a>
-
- <p>ClamAV has a buffer overflow vulnerability arising from a lack of
- input validation. An unauthenticated remote attacker could send a
- crafted email message to the affected device, triggering a buffer
- overflow and potentially a denial of service when the malicious
- message is scanned.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12376">CVE-2017-12376</a>
-
- <p>ClamAV has a buffer overflow vulnerability arising from improper
- input validation when handling Portable Document Format (PDF) files.
- An unauthenticated remote attacker could send a crafted PDF file to
- the affected device, triggering a buffer overflow and potentially a
- denial of service or arbitrary code execution when the malicious
- file is scanned.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12377">CVE-2017-12377</a>
-
- <p>ClamAV has a heap overflow vulnerability arising from improper input
- validation when handling mew packets. An attacker could exploit this
- by sending a crafted message to the affected device, triggering a
- denial of service or possible arbitrary code execution when the
- malicious file is scanned.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12378">CVE-2017-12378</a>
-
- <p>ClamAV has a buffer overread vulnerability arising from improper
- input validation when handling tape archive (TAR) files. An
- unauthenticated remote attacker could send a crafted TAR file to
- the affected device, triggering a buffer overread and potentially a
- denial of service when the malicious file is scanned.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12379">CVE-2017-12379</a>
-
- <p>ClamAV has a buffer overflow vulnerability arising from improper
- input validation in the message parsing function. An unauthenticated
- remote attacker could send a crafted email message to the affected
- device, triggering a buffer overflow and potentially a denial of
- service or arbitrary code execution when the malicious message is
- scanned.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12380">CVE-2017-12380</a>
-
- <p>ClamAV has a NULL dereference vulnerability arising from improper
- input validation in the message parsing function. An unauthenticated
- remote attacker could send a crafted email message to the affected
- device, triggering a NULL pointer dereference, which may result in a
- denial of service.</p>
-
-<li>Debian Bug #824196
-
- <p>A malformed virus signature database could cause an application
- crash and denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.99.2+dfsg-0+deb7u4.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1261.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1262.data b/english/lts/security/2018/dla-1262.data
deleted file mode 100644
index b23a575e387..00000000000
--- a/english/lts/security/2018/dla-1262.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1262-1 thunderbird</define-tag>
-<define-tag report_date>2018-1-29</define-tag>
-<define-tag secrefs>CVE-2018-5089 CVE-2018-5095 CVE-2018-5096 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117 Bug#885157 Bug#885158 Bug#887766</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1262.wml b/english/lts/security/2018/dla-1262.wml
deleted file mode 100644
index 31792426f9a..00000000000
--- a/english/lts/security/2018/dla-1262.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Thunderbird mail
-client: Multiple memory safety errors, use after free, integer overflows
-and other implementation errors may lead to crashes or the execution of
-arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.6.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1262.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1263.data b/english/lts/security/2018/dla-1263.data
deleted file mode 100644
index a942637e060..00000000000
--- a/english/lts/security/2018/dla-1263.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1263-1 debian-security-support</define-tag>
-<define-tag report_date>2018-1-29</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1263.wml b/english/lts/security/2018/dla-1263.wml
deleted file mode 100644
index 2570e7450c9..00000000000
--- a/english/lts/security/2018/dla-1263.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update marks several packages as no longer supported by wheezy-lts:</p>
-
-<p>teamspeak-server, teamspeak-client, libstruts1.2-java, nvidia-graphics-drivers,
-glassfish, jbossas4, libnet-ping-external-perl, mp3gain, tor,
-jasperreports.</p>
-
-<p>For the reasoning please see the links provided in</p>
-
- <p>/usr/share/debian-security-support/security-support-ended.deb8</p>
-
-<p>Furthermore it marks swftools as only safe to use for trusted input.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2018.01.29~deb7u1.</p>
-
-<p>We recommend that you upgrade your debian-security-support packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1263.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1264.data b/english/lts/security/2018/dla-1264.data
deleted file mode 100644
index dbfef659344..00000000000
--- a/english/lts/security/2018/dla-1264.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1264-1 unbound</define-tag>
-<define-tag report_date>2018-1-30</define-tag>
-<define-tag secrefs>CVE-2017-15105 Bug#887733</define-tag>
-<define-tag packages>unbound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1264.wml b/english/lts/security/2018/dla-1264.wml
deleted file mode 100644
index 33cd8a6e903..00000000000
--- a/english/lts/security/2018/dla-1264.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ralph Dolmans and Karst Koymans found a flaw in the way unbound
-validated wildcard-synthesized NSEC records. An improperly validated
-wildcard NSEC record could be used to prove the non-existence
-(NXDOMAIN answer) of an existing wildcard record, or trick unbound
-into accepting a NODATA proof.</p>
-
-<p>For more information please refer to the upstream advisory at
-<url "https://unbound.net/downloads/CVE-2017-15105.txt">.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.17-3+deb7u3.</p>
-
-<p>We recommend that you upgrade your unbound packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1264.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1265.data b/english/lts/security/2018/dla-1265.data
deleted file mode 100644
index 8ba64e68392..00000000000
--- a/english/lts/security/2018/dla-1265.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1265-1 krb5</define-tag>
-<define-tag report_date>2018-1-31</define-tag>
-<define-tag secrefs>CVE-2013-1418 CVE-2014-5351 CVE-2014-5353 CVE-2014-5355 CVE-2016-3119 CVE-2016-3120 Bug#728845 Bug#762479 Bug#773226 Bug#778647 Bug#819468 Bug#832572</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1265.wml b/english/lts/security/2018/dla-1265.wml
deleted file mode 100644
index 6182836704f..00000000000
--- a/english/lts/security/2018/dla-1265.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Kerberos, a system for authenticating users and services on a network,
-was affected by several vulnerabilities. The Common Vulnerabilities
-and Exposures project identifies the following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1418">CVE-2013-1418</a>
-
- <p>Kerberos allows remote attackers to cause a denial of service
- (NULL pointer dereference and daemon crash) via a crafted request
- when multiple realms are configured.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5351">CVE-2014-5351</a>
-
- <p>Kerberos sends old keys in a response to a -randkey -keepold
- request, which allows remote authenticated users to forge tickets by
- leveraging administrative access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5353">CVE-2014-5353</a>
-
- <p>When the KDC uses LDAP, allows remote authenticated users to cause a
- denial of service (daemon crash) via a successful LDAP query with no
- results, as demonstrated by using an incorrect object type for a
- password policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-5355">CVE-2014-5355</a>
-
- <p>Kerberos expects that a krb5_read_message data field is represented
- as a string ending with a '\0' character, which allows remote
- attackers to (1) cause a denial of service (NULL pointer
- dereference) via a zero-byte version string or (2) cause a denial of
- service (out-of-bounds read) by omitting the '\0' character,</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3119">CVE-2016-3119</a>
-
- <p>Kerberos allows remote authenticated users to cause a denial of
- service (NULL pointer dereference and daemon crash) via a crafted
- request to modify a principal.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3120">CVE-2016-3120</a>
-
- <p>Kerberos allows remote authenticated users to cause a denial of
- service (NULL pointer dereference and daemon crash) via an S4U2Self
- request.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.10.1+dfsg-5+deb7u9.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1265.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1266.data b/english/lts/security/2018/dla-1266.data
deleted file mode 100644
index ee432884fd4..00000000000
--- a/english/lts/security/2018/dla-1266.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1266-1 squid3</define-tag>
-<define-tag report_date>2018-2-2</define-tag>
-<define-tag secrefs>CVE-2018-1000024 CVE-2018-1000027 Bug#888719 Bug#888720</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1266.wml b/english/lts/security/2018/dla-1266.wml
deleted file mode 100644
index d67eeff7f2d..00000000000
--- a/english/lts/security/2018/dla-1266.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Squid, a high-performance proxy caching server for web clients, has been
-found vulnerable to denial of service attacks associated with ESI
-response processing and intermediate CA certificate downloading.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000024">CVE-2018-1000024</a>
-
- <p>Incorrect pointer handling resulted in the ability of a remote
- server to return a crafted ESI response which could trigger a denial
- of service for all clients accessing the Squid service. This issue
- affects the Squid custom ESI parser. </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000027">CVE-2018-1000027</a>
-
- <p>Incorrect pointer handling resulted in the possibility of a remote
- client delivering certain HTTP requests in conjunction with certain
- trusted server reponses involving the processing of ESI responses or
- downloading of intermediate CA certificates to trigger a denial of
- service for all clients accessing the squid service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1.20-2.2+deb7u8.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1266.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1267.data b/english/lts/security/2018/dla-1267.data
deleted file mode 100644
index aa66e03b126..00000000000
--- a/english/lts/security/2018/dla-1267.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1267-1 squid</define-tag>
-<define-tag report_date>2018-2-2</define-tag>
-<define-tag secrefs>CVE-2018-1000027 Bug#888720</define-tag>
-<define-tag packages>squid</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1267.wml b/english/lts/security/2018/dla-1267.wml
deleted file mode 100644
index dd52a972f2f..00000000000
--- a/english/lts/security/2018/dla-1267.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Squid, a high-performance proxy caching server for web clients, has been
-found vulnerable to denial of service attacks associated with ESI
-response processing and intermediate CA certificate downloading.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000027">CVE-2018-1000027</a>
-
- <p>Incorrect pointer handling resulted in the possibility of a remote
- client delivering certain HTTP requests in conjunction with certain
- trusted server reponses involving the processing of ESI responses or
- downloading of intermediate CA certificates to trigger a denial of
- service for all clients accessing the squid service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.7.STABLE9-4.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your squid packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1267.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1268.data b/english/lts/security/2018/dla-1268.data
deleted file mode 100644
index 1026ebb57db..00000000000
--- a/english/lts/security/2018/dla-1268.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1268-1 p7zip</define-tag>
-<define-tag report_date>2018-2-2</define-tag>
-<define-tag secrefs>CVE-2017-17969 Bug#888297</define-tag>
-<define-tag packages>p7zip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1268.wml b/english/lts/security/2018/dla-1268.wml
deleted file mode 100644
index 659919b5396..00000000000
--- a/english/lts/security/2018/dla-1268.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The p7zip package has a heap-based buffer overflow in the
-NCompress::NShrink::CDecoder::CodeReal method in 7-Zip which allows
-remote attackers to cause a denial of service (out-of-bounds write) or
-potentially execute arbitrary code via a crafted ZIP archive.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.20.1~dfsg.1-4+deb7u3.</p>
-
-<p>We recommend that you upgrade your p7zip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1268.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1269.data b/english/lts/security/2018/dla-1269.data
deleted file mode 100644
index 5ff3715d1c9..00000000000
--- a/english/lts/security/2018/dla-1269.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1269-1 dokuwiki</define-tag>
-<define-tag report_date>2018-2-4</define-tag>
-<define-tag secrefs>CVE-2017-18123 Bug##889281</define-tag>
-<define-tag packages>dokuwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1269.wml b/english/lts/security/2018/dla-1269.wml
deleted file mode 100644
index 0b15d559db7..00000000000
--- a/english/lts/security/2018/dla-1269.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that an XHR/AJAX call did not properly encode user
-input in the <q>dokuwiki</q> wiki platform. This resulted in a reflected file
-download vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in dokuwiki version
-0.0.20120125b-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your dokuwiki packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1269.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1270.data b/english/lts/security/2018/dla-1270.data
deleted file mode 100644
index 18de71c7739..00000000000
--- a/english/lts/security/2018/dla-1270.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1270-1 xen</define-tag>
-<define-tag report_date>2018-2-6</define-tag>
-<define-tag secrefs>CVE-2016-9603 CVE-2016-9637 CVE-2017-2620</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1270.wml b/english/lts/security/2018/dla-1270.wml
deleted file mode 100644
index 4bd8507942d..00000000000
--- a/english/lts/security/2018/dla-1270.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in privilege escalation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-12.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Please note that <a href="https://security-tracker.debian.org/tracker/CVE-2017-15590">CVE-2017-15590</a> (XSA-237) will *not* be fixed in wheezy as
-the patches are too intrusive to backport.
-The vulnerability can be mitigated by not passing through physical devices
-to untrusted guests.
-More information can be found on <a href="https://xenbits.xen.org/xsa/advisory-237.html">https://xenbits.xen.org/xsa/advisory-237.html</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1270.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1271.data b/english/lts/security/2018/dla-1271.data
deleted file mode 100644
index 47909ad6312..00000000000
--- a/english/lts/security/2018/dla-1271.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1271-1 postgresql-9.1</define-tag>
-<define-tag report_date>2018-2-7</define-tag>
-<define-tag secrefs>CVE-2018-1053</define-tag>
-<define-tag packages>postgresql-9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1271.wml b/english/lts/security/2018/dla-1271.wml
deleted file mode 100644
index e39a2ea7c8d..00000000000
--- a/english/lts/security/2018/dla-1271.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerabilities has been found in the PostgreSQL database system:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1053">CVE-2018-1053</a>
-
- <p>Tom Lane discovered that pg_upgrade, a tool used to upgrade
- PostgreSQL database clusters, creates temporary files containing
- password hashes that are world-readable.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-9.1.24lts2-0+deb7u2.</p>
-
-<p>We recommend that you upgrade your postgresql-9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1271.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1272.data b/english/lts/security/2018/dla-1272.data
deleted file mode 100644
index 35abbdd67de..00000000000
--- a/english/lts/security/2018/dla-1272.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1272-1 mailman</define-tag>
-<define-tag report_date>2018-2-9</define-tag>
-<define-tag secrefs>CVE-2018-5950 Bug#888201</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1272.wml b/english/lts/security/2018/dla-1272.wml
deleted file mode 100644
index b7c20d0baa2..00000000000
--- a/english/lts/security/2018/dla-1272.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The mailman package has a Cross-site scripting (XSS) vulnerability in
-the web UI before 2.1.26 which allows remote attackers to inject
-arbitrary web script or HTML via a user-options URL</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:2.1.15-1+deb7u3</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1272.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1273.data b/english/lts/security/2018/dla-1273.data
deleted file mode 100644
index 09518cdb5c1..00000000000
--- a/english/lts/security/2018/dla-1273.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1273-1 simplesamlphp</define-tag>
-<define-tag report_date>2018-2-9</define-tag>
-<define-tag secrefs>CVE-2017-18121 CVE-2017-18122 CVE-2018-6521 Bug#889286</define-tag>
-<define-tag packages>simplesamlphp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1273.wml b/english/lts/security/2018/dla-1273.wml
deleted file mode 100644
index 9bd000ae777..00000000000
--- a/english/lts/security/2018/dla-1273.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>simplesamlphp, an authentication and federation application has been
-found vulnerable to Cross Site Scripting (XSS), signature validation
-byepass and using insecure connection charset.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18121">CVE-2017-18121</a>
-
- <p>A Cross Site Scripting (XSS) issue has been found in the
- consentAdmin module of SimpleSAMLphp through 1.14.15, allowing an
- attacker to manually craft links that a victim can open, executing
- arbitrary javascript code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18122">CVE-2017-18122</a>
-
- <p>A signature-validation bypass issue was discovered in SimpleSAMLphp
- through 1.14.16. Service Provider using SAML 1.1 will regard as
- valid any unsigned SAML response containing more than one signed
- assertion, provided that the signature of at least one of the
- assertions is valid. Attributes contained in all the assertions
- received will be merged and the entityID of the first assertion
- received will be used, allowing an attacker to impersonate any user
- of any IdP given an assertion signed by the targeted IdP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6521">CVE-2018-6521</a>
-
- <p>The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the
- MySQL utf8 charset, which truncates queries upon encountering
- four-byte characters. There might be a scenario in which this allows
- remote attackers to bypass intended access restrictions.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.2-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your simplesamlphp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1273.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1274.data b/english/lts/security/2018/dla-1274.data
deleted file mode 100644
index f1837ec0880..00000000000
--- a/english/lts/security/2018/dla-1274.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1274-1 exim4</define-tag>
-<define-tag report_date>2018-2-10</define-tag>
-<define-tag secrefs>CVE-2018-6789 Bug#890000</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1274.wml b/english/lts/security/2018/dla-1274.wml
deleted file mode 100644
index 1e183c03746..00000000000
--- a/english/lts/security/2018/dla-1274.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Meh Chang discovered a buffer overflow flaw in a utility function used
-in the SMTP listener of Exim, a mail transport agent. A remote attacker
-can take advantage of this flaw to cause a denial of service, or
-potentially the execution of arbitrary code via a specially crafted
-message.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this problem has been fixed in version
-4.80-7+deb7u6.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1274.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1275.data b/english/lts/security/2018/dla-1275.data
deleted file mode 100644
index cc85d7b244a..00000000000
--- a/english/lts/security/2018/dla-1275.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1275-1 uwsgi</define-tag>
-<define-tag report_date>2018-2-10</define-tag>
-<define-tag secrefs>CVE-2018-6758 Bug#889753</define-tag>
-<define-tag packages>uwsgi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1275.wml b/english/lts/security/2018/dla-1275.wml
deleted file mode 100644
index f098e7e7354..00000000000
--- a/english/lts/security/2018/dla-1275.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the uwsgi_expand_path function in utils.c in
-Unbit uWSGI, an application container server, has a stack-based buffer
-overflow via a large directory length that can cause a
-denial-of-service (application crash) or stack corruption.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.3+dfsg-5+deb7u2.</p>
-
-<p>We recommend that you upgrade your uwsgi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1275.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1276.data b/english/lts/security/2018/dla-1276.data
deleted file mode 100644
index fb065081ef7..00000000000
--- a/english/lts/security/2018/dla-1276.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1276-1 tomcat-native</define-tag>
-<define-tag report_date>2018-2-11</define-tag>
-<define-tag secrefs>CVE-2017-15698</define-tag>
-<define-tag packages>tomcat-native</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1276.wml b/english/lts/security/2018/dla-1276.wml
deleted file mode 100644
index 1e678b19a76..00000000000
--- a/english/lts/security/2018/dla-1276.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jonas Klempel discovered that, when parsing the AIA-Extension field of
-a client certificate, Apache Tomcat Native did not correctly handle
-fields longer than 127 bytes. The result of the parsing error was to
-skip the
-OCSP check. It was therefore possible for client certificates that
-should have been rejected (if the OCSP check had been made) to be
-accepted. Users not using OCSP checks are not affected by this
-vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.24-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your tomcat-native packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1276.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1277.data b/english/lts/security/2018/dla-1277.data
deleted file mode 100644
index bf97d49a1a5..00000000000
--- a/english/lts/security/2018/dla-1277.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1277-1 audacity</define-tag>
-<define-tag report_date>2018-2-12</define-tag>
-<define-tag secrefs>CVE-2016-2540</define-tag>
-<define-tag packages>audacity</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1277.wml b/english/lts/security/2018/dla-1277.wml
deleted file mode 100644
index 15e927899c9..00000000000
--- a/english/lts/security/2018/dla-1277.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Chris Navarrete from Fortinet's FortiGuard Labs discovered that Audacity,
-a multi-track audio editor, contains a vulnerability such that a .wav
-file with a crafted FORMATCHUNK structure (many channels) can result in
-a denial of service (memory corruption and application crash).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.0.1-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your audacity packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1277.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1278.data b/english/lts/security/2018/dla-1278.data
deleted file mode 100644
index 6e4b0daab47..00000000000
--- a/english/lts/security/2018/dla-1278.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1278-1 librsvg</define-tag>
-<define-tag report_date>2018-2-12</define-tag>
-<define-tag secrefs>CVE-2018-1000041</define-tag>
-<define-tag packages>librsvg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1278.wml b/english/lts/security/2018/dla-1278.wml
deleted file mode 100644
index c8805d7288f..00000000000
--- a/english/lts/security/2018/dla-1278.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an input validation vulnerability in
-the librsvg renderer library that could result in data being leaked to
-remote attackers via a specially-crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in librsvg version
-2.36.1-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your librsvg packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1278.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1279.data b/english/lts/security/2018/dla-1279.data
deleted file mode 100644
index c440f3e5882..00000000000
--- a/english/lts/security/2018/dla-1279.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1279-1 clamav</define-tag>
-<define-tag report_date>2018-2-12</define-tag>
-<define-tag secrefs>CVE-2017-6419 CVE-2017-11423</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1279.wml b/english/lts/security/2018/dla-1279.wml
deleted file mode 100644
index 1cc07d751db..00000000000
--- a/english/lts/security/2018/dla-1279.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6419">CVE-2017-6419</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-11423">CVE-2017-11423</a>
-
- <p>Two vulnerabilities have been fixed that can be used for denial of
- service or maybe unspecified impact via drafted files
- (heap-based buffer overflow and stack-based buffer over-read causing
- application crash)</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.99.2+dfsg-0+deb7u5.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1279.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1280.data b/english/lts/security/2018/dla-1280.data
deleted file mode 100644
index 62698a46665..00000000000
--- a/english/lts/security/2018/dla-1280.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1280-1 pound</define-tag>
-<define-tag report_date>2018-2-12</define-tag>
-<define-tag secrefs>CVE-2016-10711 Bug#888786</define-tag>
-<define-tag packages>pound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1280.wml b/english/lts/security/2018/dla-1280.wml
deleted file mode 100644
index 078a9525170..00000000000
--- a/english/lts/security/2018/dla-1280.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A request smuggling vulnerability was discovered in pound that may allow
-attackers to send a specially crafted http request to a web server or
-reverse proxy while pound may see a different set of requests.
-This facilitates several possible exploitations, such as partial cache
-poisoning, bypassing firewall protection and XSS.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.6-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your pound packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1280.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1281.data b/english/lts/security/2018/dla-1281.data
deleted file mode 100644
index 26f402d0da1..00000000000
--- a/english/lts/security/2018/dla-1281.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1281-1 advancecomp</define-tag>
-<define-tag report_date>2018-2-13</define-tag>
-<define-tag secrefs>CVE-2018-1056 Bug#889270</define-tag>
-<define-tag packages>advancecomp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1281.wml b/english/lts/security/2018/dla-1281.wml
deleted file mode 100644
index ce64eb59506..00000000000
--- a/english/lts/security/2018/dla-1281.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Joonun Jang discovered that the advzip tool in advancecomp, a
-collection of recompression utilities, was prone to a heap-based
-buffer overflow. This might allow an attacker to cause a
-denial-of-service (application crash) or other unspecified impact via
-a crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.15-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your advancecomp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1281.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1282.data b/english/lts/security/2018/dla-1282.data
deleted file mode 100644
index 8d985540421..00000000000
--- a/english/lts/security/2018/dla-1282.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1282-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-2-14</define-tag>
-<define-tag secrefs>CVE-2018-6799</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1282.wml b/english/lts/security/2018/dla-1282.wml
deleted file mode 100644
index ab4fa991131..00000000000
--- a/english/lts/security/2018/dla-1282.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A denial of service vulnerability has been discovered in graphicsmagick,
- a collection of image processing tools and associated libraries.</p>
-
-<p>A specially crafted file can be used to produce a denial of service
-(heap overwrite) or possible other unspecified impact by exploiting a
-defect related to unused pixel staging area in the AcquireCacheNexus
-function in magick/pixel_cache.c.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u18.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1282.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1283-2.data b/english/lts/security/2018/dla-1283-2.data
deleted file mode 100644
index 699218d92a9..00000000000
--- a/english/lts/security/2018/dla-1283-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1283-2 python-crypto</define-tag>
-<define-tag report_date>2018-4-9</define-tag>
-<define-tag packages>python-crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1283-2.wml b/english/lts/security/2018/dla-1283-2.wml
deleted file mode 100644
index 61ce1bb2693..00000000000
--- a/english/lts/security/2018/dla-1283-2.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This is an update to DLA-1283-1. In DLA-1283-1 it is claimed that the issue
-described in <a href="https://security-tracker.debian.org/tracker/CVE-2018-6594">CVE-2018-6594</a> is fixed. It turns out that the fix is partial and
-upstream has decided not to fix the issue as it would break compatibility and
-that ElGamal encryption was not intended to work on its own.</p>
-
-<p>The recommendation is still to upgrade python-crypto packages. In addition
-please take into account that the fix is not complete. If you have an
-application using python-crypto is implementing ElGamal encryption you should
-consider changing to some other encryption method.</p>
-
-<p>There will be no further update to python-crypto for this specific CVE. A fix
-would break compatibility, the problem has been ignored by regular Debian
-Security team due to its minor nature and in addition to that we are close to
-the end of life of the Wheezy security support.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6594">CVE-2018-6594</a>
-
-<p>python-crypto generated weak ElGamal key parameters, which allowed attackers to
-obtain sensitive information by reading ciphertext data (i.e., it did not have
-semantic security in face of a ciphertext-only attack).</p></li>
-
-</ul>
-
-<p>We recommend that you upgrade your python-crypto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in python-crypto version 2.6-4+deb7u8</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1283-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1283.data b/english/lts/security/2018/dla-1283.data
deleted file mode 100644
index 6fc21c35ac1..00000000000
--- a/english/lts/security/2018/dla-1283.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1283-1 python-crypto</define-tag>
-<define-tag report_date>2018-2-15</define-tag>
-<define-tag secrefs>CVE-2018-6594 Bug#889999</define-tag>
-<define-tag packages>python-crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1283.wml b/english/lts/security/2018/dla-1283.wml
deleted file mode 100644
index 0e2e5e9f74f..00000000000
--- a/english/lts/security/2018/dla-1283.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>python-crypto generated weak ElGamal key parameters, which allowed attackers to
-obtain sensitive information by reading ciphertext data (i.e., it did not have
-semantic security in face of a ciphertext-only attack).</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.6-4+deb7u8.</p>
-
-<p>We recommend that you upgrade your python-crypto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1283.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1284.data b/english/lts/security/2018/dla-1284.data
deleted file mode 100644
index 04083b3fa14..00000000000
--- a/english/lts/security/2018/dla-1284.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1284-1 leptonlib</define-tag>
-<define-tag report_date>2018-2-15</define-tag>
-<define-tag secrefs>CVE-2018-3836 Bug#889759</define-tag>
-<define-tag packages>leptonlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1284.wml b/english/lts/security/2018/dla-1284.wml
deleted file mode 100644
index 99fcfe41c97..00000000000
--- a/english/lts/security/2018/dla-1284.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Talosintelligence discovered a command injection vulnerability in the
-gplotMakeOutput function of leptonlib. A specially crafted gplot
-rootname argument can cause a command injection resulting in arbitrary
-code execution. An attacker can provide a malicious path as input to an
-application that passes attacker data to this function to trigger this
-vulnerability.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.69-3.1+deb7u1.</p>
-
-<p>We recommend that you upgrade your leptonlib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1284.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1285.data b/english/lts/security/2018/dla-1285.data
deleted file mode 100644
index c95473f7611..00000000000
--- a/english/lts/security/2018/dla-1285.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1285-1 bind9</define-tag>
-<define-tag report_date>2018-2-16</define-tag>
-<define-tag secrefs>CVE-2018-5735 Bug#889285</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1285.wml b/english/lts/security/2018/dla-1285.wml
deleted file mode 100644
index 50c16843014..00000000000
--- a/english/lts/security/2018/dla-1285.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>BIND, a DNS server implementation, was found to be vulnerable to a denial
-of service flaw was found in the handling of DNSSEC validation. A remote
-attacker could use this flaw to make named exit unexpectedly with an
-assertion failure via a specially crafted DNS response. This issue is
-closely related to <a href="https://security-tracker.debian.org/tracker/CVE-2017-3139">CVE-2017-3139</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.8.4.dfsg.P1-6+nmu2+deb7u20.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1285.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1286.data b/english/lts/security/2018/dla-1286.data
deleted file mode 100644
index 5250a95ea4a..00000000000
--- a/english/lts/security/2018/dla-1286.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1286-1 quagga</define-tag>
-<define-tag report_date>2018-2-16</define-tag>
-<define-tag secrefs>CVE-2018-5379 CVE-2018-5380 CVE-2018-5381</define-tag>
-<define-tag packages>quagga</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1286.wml b/english/lts/security/2018/dla-1286.wml
deleted file mode 100644
index d6a8a3f2ba3..00000000000
--- a/english/lts/security/2018/dla-1286.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in Quagga, a routing
-daemon. The Common Vulnerabilities and Exposures project identifies the
-following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5378">CVE-2018-5378</a>
-
- <p>It was discovered that the Quagga BGP daemon, bgpd, does not
- properly bounds check data sent with a NOTIFY to a peer, if an
- attribute length is invalid. A configured BGP peer can take
- advantage of this bug to read memory from the bgpd process or cause
- a denial of service (daemon crash).</p>
-
- <p><url "https://www.quagga.net/security/Quagga-2018-0543.txt"></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5379">CVE-2018-5379</a>
-
- <p>It was discovered that the Quagga BGP daemon, bgpd, can double-free
- memory when processing certain forms of UPDATE message, containing
- cluster-list and/or unknown attributes, resulting in a denial of
- service (bgpd daemon crash).</p>
-
- <p><url "https://www.quagga.net/security/Quagga-2018-1114.txt"></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5380">CVE-2018-5380</a>
-
- <p>It was discovered that the Quagga BGP daemon, bgpd, does not
- properly handle internal BGP code-to-string conversion tables.</p>
-
- <p><url "https://www.quagga.net/security/Quagga-2018-1550.txt"></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5381">CVE-2018-5381</a>
-
- <p>It was discovered that the Quagga BGP daemon, bgpd, can enter an
- infinite loop if sent an invalid OPEN message by a configured peer.
- A configured peer can take advantage of this flaw to cause a denial
- of service (bgpd daemon not responding to any other events; BGP
- sessions will drop and not be reestablished; unresponsive CLI
- interface).</p>
-
- <p><url "https://www.quagga.net/security/Quagga-2018-1975.txt"></p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.99.22.4-1+wheezy3+deb7u3.</p>
-
-<p>We recommend that you upgrade your quagga packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1286.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1287.data b/english/lts/security/2018/dla-1287.data
deleted file mode 100644
index ca8acb1af35..00000000000
--- a/english/lts/security/2018/dla-1287.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1287-1 zziplib</define-tag>
-<define-tag report_date>2018-2-20</define-tag>
-<define-tag secrefs>CVE-2018-6869</define-tag>
-<define-tag packages>zziplib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1287.wml b/english/lts/security/2018/dla-1287.wml
deleted file mode 100644
index cea69b39b40..00000000000
--- a/english/lts/security/2018/dla-1287.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a uncontrolled memory allocation issue
-in zziplib, a ZIP archive library. Remote attackers could leverage this
-vulnerability to cause a denial of service via a specially-crafted file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in zziplib version
-0.13.56-1.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your zziplib packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1287.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1288.data b/english/lts/security/2018/dla-1288.data
deleted file mode 100644
index d115c729084..00000000000
--- a/english/lts/security/2018/dla-1288.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1288-1 cups</define-tag>
-<define-tag report_date>2018-2-22</define-tag>
-<define-tag secrefs>CVE-2017-18190</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1288.wml b/english/lts/security/2018/dla-1288.wml
deleted file mode 100644
index 6d72ef2e596..00000000000
--- a/english/lts/security/2018/dla-1288.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in the CUPS printer
-framework where remote attackers could execute arbitrary commands by
-sending POST requests to the CUPS daemon in conjunction with DNS
-rebinding.</p>
-
-<p>This was caused by a whitelisted <q>localhost.localdomain</q> entry.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in cups version
-1.5.3-5+deb7u7.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1288.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1289.data b/english/lts/security/2018/dla-1289.data
deleted file mode 100644
index e42c2195b05..00000000000
--- a/english/lts/security/2018/dla-1289.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1289-1 irssi</define-tag>
-<define-tag report_date>2018-2-22</define-tag>
-<define-tag secrefs>CVE-2018-7050 CVE-2018-7051 CVE-2018-7052 Bug##890676 Bug##890677 Bug##890678</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1289.wml b/english/lts/security/2018/dla-1289.wml
deleted file mode 100644
index f52414d8b1f..00000000000
--- a/english/lts/security/2018/dla-1289.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there where a number of vulnerabilities in irssi,
-the terminal based IRC client:</p>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7050">CVE-2018-7050</a>
- <p>Null pointer dereference for an <q>empty</q> nick.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7051">CVE-2018-7051</a>
- <p>Certain nick names could result in out-of-bounds
- access when printing theme strings.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7052">CVE-2018-7052</a>
- <p>When the number of windows exceeds the available space, a
- crash could occur due to another NULL pointer dereference.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in irssi version
-0.8.15-5+deb7u5.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1289.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1290.data b/english/lts/security/2018/dla-1290.data
deleted file mode 100644
index 24862d6a81c..00000000000
--- a/english/lts/security/2018/dla-1290.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1290-1 libvpx</define-tag>
-<define-tag report_date>2018-2-24</define-tag>
-<define-tag secrefs>CVE-2017-13194</define-tag>
-<define-tag packages>libvpx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1290.wml b/english/lts/security/2018/dla-1290.wml
deleted file mode 100644
index e8d7a1e1f51..00000000000
--- a/english/lts/security/2018/dla-1290.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13194">CVE-2017-13194</a>
- <p>Fix for a flaw in libvpx related to odd frame width, which may lead
- to a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your libvpx packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1290.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1291.data b/english/lts/security/2018/dla-1291.data
deleted file mode 100644
index df472d9ab06..00000000000
--- a/english/lts/security/2018/dla-1291.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1291-1 tzdata</define-tag>
-<define-tag report_date>2018-2-24</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1291.wml b/english/lts/security/2018/dla-1291.wml
deleted file mode 100644
index 746d4355b4f..00000000000
--- a/english/lts/security/2018/dla-1291.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018c. Notable
-changes are:
-<ul>
-<li>São Tomé and Príncipe switched from +00 to +01.</li>
-<li>Brazil's DST will now start on November's first Sunday.</li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2018c-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1291.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1292.data b/english/lts/security/2018/dla-1292.data
deleted file mode 100644
index 5831e7a8c06..00000000000
--- a/english/lts/security/2018/dla-1292.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1292-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2018-2-24</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1292.wml b/english/lts/security/2018/dla-1292.wml
deleted file mode 100644
index 99374c2177f..00000000000
--- a/english/lts/security/2018/dla-1292.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018c for the
-Perl bindings. For the list of changes, see DLA-1291-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2018c.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1292.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1293.data b/english/lts/security/2018/dla-1293.data
deleted file mode 100644
index 6b476a0538e..00000000000
--- a/english/lts/security/2018/dla-1293.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1293-1 imagemagick</define-tag>
-<define-tag report_date>2018-2-25</define-tag>
-<define-tag secrefs>CVE-2018-7443 Bug##891291</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1293.wml b/english/lts/security/2018/dla-1293.wml
deleted file mode 100644
index 5ba2fb68abb..00000000000
--- a/english/lts/security/2018/dla-1293.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote denial of service
-vulnerability in the imagemagick graphics library via a speciallycrafted TIFF file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in imagemagick
-version 8:6.7.7.10-5+deb7u21.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1293.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1294.data b/english/lts/security/2018/dla-1294.data
deleted file mode 100644
index 07e7c928984..00000000000
--- a/english/lts/security/2018/dla-1294.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1294-1 golang</define-tag>
-<define-tag report_date>2018-2-25</define-tag>
-<define-tag secrefs>CVE-2018-7187</define-tag>
-<define-tag packages>golang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1294.wml b/english/lts/security/2018/dla-1294.wml
deleted file mode 100644
index cb486fd3d79..00000000000
--- a/english/lts/security/2018/dla-1294.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an arbitrary command execution
-vulnerability in the Go programming language.</p>
-
-<p>The <q>go get</q> implementation did not correctly validate <q>import path</q>
-statements for "://" which allowed remote attackers to execute arbitrary
-OS commands via a crafted web site.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in golang version
-2:1.0.2-1.1+deb7u3.</p>
-
-<p>We recommend that you upgrade your golang packages. The Debian LTS team
-would like to thank Abhijith PA for preparing this update.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1294.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1295.data b/english/lts/security/2018/dla-1295.data
deleted file mode 100644
index a04316b91f7..00000000000
--- a/english/lts/security/2018/dla-1295.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1295-1 drupal7</define-tag>
-<define-tag report_date>2018-2-28</define-tag>
-<define-tag secrefs>CVE-2017-6927 CVE-2017-6928 CVE-2017-6929 CVE-2017-6932 Bug#891152 Bug#891150 Bug#891153 Bug#891154</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1295.wml b/english/lts/security/2018/dla-1295.wml
deleted file mode 100644
index 981c33cff5f..00000000000
--- a/english/lts/security/2018/dla-1295.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in the Drupal content
-management framework. For additional information, please refer to the
-upstream advisory at <a href="https://www.drupal.org/sa-core-2018-001.">https://www.drupal.org/sa-core-2018-001.</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.14-2+deb7u17.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1295.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1296.data b/english/lts/security/2018/dla-1296.data
deleted file mode 100644
index 8697971b3fa..00000000000
--- a/english/lts/security/2018/dla-1296.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1296-1 xmltooling</define-tag>
-<define-tag report_date>2018-2-28</define-tag>
-<define-tag secrefs>CVE-2018-0489</define-tag>
-<define-tag packages>xmltooling</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1296.wml b/english/lts/security/2018/dla-1296.wml
deleted file mode 100644
index 41560b356cd..00000000000
--- a/english/lts/security/2018/dla-1296.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Kelby Ludwig and Scott Cantor discovered that the Shibboleth service
-provider is vulnerable to impersonation attacks and information
-disclosure due to incorrect XML parsing. For additional details please
-refer to the upstream advisory at
-<a href="https://shibboleth.net/community/advisories/secadv_20180227.txt">https://shibboleth.net/community/advisories/secadv_20180227.txt</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.2-5+deb7u3.</p>
-
-<p>We recommend that you upgrade your xmltooling packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1296.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1297.data b/english/lts/security/2018/dla-1297.data
deleted file mode 100644
index a494268aff0..00000000000
--- a/english/lts/security/2018/dla-1297.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1297-1 freexl</define-tag>
-<define-tag report_date>2018-3-1</define-tag>
-<define-tag secrefs>CVE-2018-7435 CVE-2018-7436 CVE-2018-7437 CVE-2018-7438 CVE-2018-7439</define-tag>
-<define-tag packages>freexl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1297.wml b/english/lts/security/2018/dla-1297.wml
deleted file mode 100644
index 7ecd69e89a3..00000000000
--- a/english/lts/security/2018/dla-1297.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Leon reported five heap-based buffer-overflow vulnerabilities in FreeXL.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7435">CVE-2018-7435</a>
-
- <p>There is a heap-based buffer over-read in the freexl::destroy_cell
- function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7436">CVE-2018-7436</a>
-
- <p>There is a heap-based buffer over-read in a pointer dereference of
- the parse_SST function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7437">CVE-2018-7437</a>
-
- <p>There is a heap-based buffer over-read in a memcpy call of the
- parse_SST function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7438">CVE-2018-7438</a>
-
- <p>There is a heap-based buffer over-read in the parse_unicode_string
- function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7439">CVE-2018-7439</a>
-
- <p>There is a heap-based buffer over-read in the function
- read_mini_biff_next_record.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.0b-1+deb7u5.</p>
-
-<p>We recommend that you upgrade your freexl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1297.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1298.data b/english/lts/security/2018/dla-1298.data
deleted file mode 100644
index 30a7ff11c3a..00000000000
--- a/english/lts/security/2018/dla-1298.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1297-1 simplesamlphp</define-tag>
-<define-tag report_date>2018-3-2</define-tag>
-<define-tag secrefs>CVE-2016-9814 CVE-2016-9955</define-tag>
-<define-tag packages>simplesamlphp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1298.wml b/english/lts/security/2018/dla-1298.wml
deleted file mode 100644
index d51adb6daff..00000000000
--- a/english/lts/security/2018/dla-1298.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in SimpleSAMLphp, a
-framework for authentication, primarily via the SAML protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9814">CVE-2016-9814</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9955">CVE-2016-9955</a>
-
- <p>An incorrect check of return values in the signature validation
- utilities allowed an attacker to get invalid signatures accepted
- as valid in the rare case of an error occurring during validation.</p></li>
-
-<li>SSPSA-201802-01 (no CVE yet)
-
- <p>Critical signature validation vulnerability.</p></li>
-
-</ul>
-
-<p>In addition this update adds a patch to solve excessive resource
-consumption in case of SimpleSAMLphp processing a large metadata file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.2-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your simplesamlphp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1297.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1299.data b/english/lts/security/2018/dla-1299.data
deleted file mode 100644
index efdd0a5d3b1..00000000000
--- a/english/lts/security/2018/dla-1299.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1299-1 libjgraphx-java</define-tag>
-<define-tag report_date>2018-3-4</define-tag>
-<define-tag secrefs>CVE-2017-18197 Bug##891796</define-tag>
-<define-tag packages>libjgraphx-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1299.wml b/english/lts/security/2018/dla-1299.wml
deleted file mode 100644
index 5f6426c541d..00000000000
--- a/english/lts/security/2018/dla-1299.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a potential XML External Entity (XXE)
-attack in libjgraphx-java, a diagramming library for Java applications.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in libjgraphx-java version
-1.4.1.0-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your libjgraphx-java packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1299.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1300.data b/english/lts/security/2018/dla-1300.data
deleted file mode 100644
index df582eb8c5d..00000000000
--- a/english/lts/security/2018/dla-1300.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1300-1 xen</define-tag>
-<define-tag report_date>2018-3-6</define-tag>
-<define-tag secrefs>CVE-2018-7540 CVE-2018-7541</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1300.wml b/english/lts/security/2018/dla-1300.wml
deleted file mode 100644
index 3f6dd7d6505..00000000000
--- a/english/lts/security/2018/dla-1300.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, informations leaks or privilege
-escalation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-13.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1300.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1301.data b/english/lts/security/2018/dla-1301.data
deleted file mode 100644
index a09ef129efe..00000000000
--- a/english/lts/security/2018/dla-1301.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1301-1 tomcat7</define-tag>
-<define-tag report_date>2018-3-6</define-tag>
-<define-tag secrefs>CVE-2018-1304 CVE-2018-1305</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1301.wml b/english/lts/security/2018/dla-1301.wml
deleted file mode 100644
index 194b73a1de0..00000000000
--- a/english/lts/security/2018/dla-1301.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1304">CVE-2018-1304</a>
-
- <p>The URL pattern of "" (the empty string) which exactly maps to the
- context root was not correctly handled in Apache Tomcat when used
- as part of a security constraint definition. This caused the
- constraint to be ignored. It was, therefore, possible for
- unauthorized users to gain access to web application resources that
- should have been protected. Only security constraints with a URL
- pattern of the empty string were affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1305">CVE-2018-1305</a>
-
- <p>Security constraints defined by annotations of Servlets in Apache
- Tomcat were only applied once a Servlet had been loaded. Because
- security constraints defined in this way apply to the URL pattern
- and any URLs below that point, it was possible - depending on the
- order Servlets were loaded - for some security constraints not to be
- applied. This could have exposed resources to users who were not
- authorized to access them.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.0.28-4+deb7u18.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1301.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1302.data b/english/lts/security/2018/dla-1302.data
deleted file mode 100644
index ba9e5036689..00000000000
--- a/english/lts/security/2018/dla-1302.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1302-1 leptonlib</define-tag>
-<define-tag report_date>2018-3-7</define-tag>
-<define-tag secrefs>CVE-2018-7186 CVE-2018-7440 Bug#890548 Bug#891932</define-tag>
-<define-tag packages>leptonlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1302.wml b/english/lts/security/2018/dla-1302.wml
deleted file mode 100644
index 9d841ab0ee5..00000000000
--- a/english/lts/security/2018/dla-1302.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Different flaws have been found in leptonlib, an image processing
-library. </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7186">CVE-2018-7186</a>
-
- <p>Leptonica did not limit the number of characters in a %s format
- argument to fscanf or sscanf, that made it possible to remote
- attackers to cause a denial of service (stack-based buffer overflow)
- or possibly have unspecified other impact via a long string.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7440">CVE-2018-7440</a>
-
- <p>The gplotMakeOutput function allowed command injection via a
- $(command) approach in the gplot rootname argument. This issue
- existed because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-3836">CVE-2018-3836</a>.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.69-3.1+deb7u2.</p>
-
-<p>We recommend that you upgrade your leptonlib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1302.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1303.data b/english/lts/security/2018/dla-1303.data
deleted file mode 100644
index ac0867d30dd..00000000000
--- a/english/lts/security/2018/dla-1303.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1303-1 python-django</define-tag>
-<define-tag report_date>2018-3-8</define-tag>
-<define-tag secrefs>CVE-2018-7536 CVE-2018-7537</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1303.wml b/english/lts/security/2018/dla-1303.wml
deleted file mode 100644
index de2967b490f..00000000000
--- a/english/lts/security/2018/dla-1303.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several functions were extremely slow to evaluate certain inputs due to
-catastrophic backtracking vulnerabilities in several regular expressions.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7536">CVE-2018-7536</a>
-
- <p>The django.utils.html.urlize() function was extremely slow to evaluate
- certain inputs due to catastrophic backtracking vulnerabilities in two
- regular expressions. The urlize() function is used to implement the urlize
- and urlizetrunc template filters, which were thus vulnerable.</p>
-
- <p>The problematic regular expressions are replaced with parsing logic that
- behaves similarly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7537">CVE-2018-7537</a>
-
- <p>If django.utils.text.Truncator’s chars() and words() methods were passed
- the html=True argument, they were extremely slow to evaluate certain inputs
- due to a catastrophic backtracking vulnerability in a regular expression.
- The chars() and words() methods are used to implement the truncatechars_html
- and truncatewords_html template filters, which were thus vulnerable.</p>
-
- <p>The backtracking problem in the regular expression is fixed.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.22-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1303.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1304.data b/english/lts/security/2018/dla-1304.data
deleted file mode 100644
index 2919a068d48..00000000000
--- a/english/lts/security/2018/dla-1304.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1304-1 zsh</define-tag>
-<define-tag report_date>2018-3-9</define-tag>
-<define-tag secrefs>CVE-2014-10070 CVE-2014-10071 CVE-2014-10072 CVE-2016-10714 CVE-2017-18206</define-tag>
-<define-tag packages>zsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1304.wml b/english/lts/security/2018/dla-1304.wml
deleted file mode 100644
index be5808c6bd8..00000000000
--- a/english/lts/security/2018/dla-1304.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were multiple vulnerabilities in the
-<q>zsh</q> shell:</p>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-10070">CVE-2014-10070</a>
- <p>Fix a privilege-elevation issue if the
- environment has not been properly sanitized.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-10071">CVE-2014-10071</a>
- <p>Prevent a buffer overflow for very long file
- descriptors in the <q>&gt;&amp; fd</q> syntax.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-10072">CVE-2014-10072</a>
- <p>Correct a buffer overflow when scanning very long
- directory paths for symbolic links.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10714">CVE-2016-10714</a>
- <p>Fix an off-by-one error that was resulting in
- undersized buffers that were intended to support PATH_MAX.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18206">CVE-2017-18206</a>
- <p>Fix a buffer overflow in symlink expansion.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in zsh version
-4.3.17-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your zsh packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1304.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1305.data b/english/lts/security/2018/dla-1305.data
deleted file mode 100644
index 0df7c921bef..00000000000
--- a/english/lts/security/2018/dla-1305.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1305-1 ming</define-tag>
-<define-tag report_date>2018-3-11</define-tag>
-<define-tag secrefs>CVE-2018-5251 CVE-2018-5294 CVE-2018-6315 CVE-2018-6359</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1305.wml b/english/lts/security/2018/dla-1305.wml
deleted file mode 100644
index 620fe7b17ef..00000000000
--- a/english/lts/security/2018/dla-1305.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Ming:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5251">CVE-2018-5251</a>
-
- <p>Integer signedness error vulnerability (left shift of a negative value) in
- the readSBits function (util/read.c). Remote attackers can leverage this
- vulnerability to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5294">CVE-2018-5294</a>
-
- <p>Integer overflow vulnerability (caused by an out-of-range left shift) in
- the readUInt32 function (util/read.c). Remote attackers could leverage this
- vulnerability to cause a denial-of-service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6315">CVE-2018-6315</a>
-
- <p>Integer overflow and resultant out-of-bounds read in the
- outputSWF_TEXT_RECORD function (util/outputscript.c). Remote attackers
- could leverage this vulnerability to cause a denial of service or
- unspecified other impact via a crafted SWF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6359">CVE-2018-6359</a>
-
- <p>Use-after-free vulnerability in the decompileIF function
- (util/decompile.c). Remote attackers could leverage this vulnerability to
- cause a denial of service or unspecified other impact via a crafted SWF
- file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.4.4-1.1+deb7u7.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1305.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1306.data b/english/lts/security/2018/dla-1306.data
deleted file mode 100644
index 96f6d54a58d..00000000000
--- a/english/lts/security/2018/dla-1306.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1306-1 vips</define-tag>
-<define-tag report_date>2018-3-11</define-tag>
-<define-tag secrefs>CVE-2018-7998 Bug##892589</define-tag>
-<define-tag packages>vips</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1306.wml b/english/lts/security/2018/dla-1306.wml
deleted file mode 100644
index 046e4c87f7d..00000000000
--- a/english/lts/security/2018/dla-1306.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was NULL function pointer dereference
-vulnerability in vips, an image processing system for very large images.</p>
-
-<p>Remote attackers could cause a denial of service via a specially-crafted
-image file which occurred due to a race condition involving a failed
-image load and other worker threads.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in vips version
-7.28.5-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your vips packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1306.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1307.data b/english/lts/security/2018/dla-1307.data
deleted file mode 100644
index b06100aab84..00000000000
--- a/english/lts/security/2018/dla-1307.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1307-1 clamav</define-tag>
-<define-tag report_date>2018-3-16</define-tag>
-<define-tag secrefs>CVE-2018-0202 CVE-2018-1000085</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1307.wml b/english/lts/security/2018/dla-1307.wml
deleted file mode 100644
index 8eda2783344..00000000000
--- a/english/lts/security/2018/dla-1307.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Some vulnerabilities have been found in ClamAV, an open source antivirus
-engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0202">CVE-2018-0202</a>
-
- <p>It was found that ClamAV didn't process certain PDF files correctly,
- relating to a heap overflow. Specially crafted PDFs could yield ClamAV
- to crash, resulting in a denial-of-service or potentially execution of
- arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000085">CVE-2018-1000085</a>
-
- <p>Hanno Böck discovered that ClamAV didn't process XAR files correctly.
- Malformed XAR files could cause ClamAV to crash by an out of bounds
- heap read. This could result in a denial-of-service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.99.4+dfsg-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1307.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1308.data b/english/lts/security/2018/dla-1308.data
deleted file mode 100644
index 25ca780bc75..00000000000
--- a/english/lts/security/2018/dla-1308.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1308-1 firefox-esr</define-tag>
-<define-tag report_date>2018-3-15</define-tag>
-<define-tag secrefs>CVE-2018-5125 CVE-2018-5127 CVE-2018-5129 CVE-2018-5130 CVE-2018-5131 CVE-2018-5144 CVE-2018-5145</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1308.wml b/english/lts/security/2018/dla-1308.wml
deleted file mode 100644
index c6ebbd5a1d2..00000000000
--- a/english/lts/security/2018/dla-1308.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors and other implementation errors
-may lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.7.1esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1308.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1309.data b/english/lts/security/2018/dla-1309.data
deleted file mode 100644
index ec4c69c5391..00000000000
--- a/english/lts/security/2018/dla-1309.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1309-1 curl</define-tag>
-<define-tag report_date>2018-3-18</define-tag>
-<define-tag secrefs>CVE-2018-1000120 CVE-2018-1000121 CVE-2018-1000122</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1309.wml b/english/lts/security/2018/dla-1309.wml
deleted file mode 100644
index d87db24dc85..00000000000
--- a/english/lts/security/2018/dla-1309.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were found in cURL, an URL transfer library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000120">CVE-2018-1000120</a>
-
- <p>Duy Phan Thanh reported that curl could be fooled into writing a zero byte
- out of bounds when curl was told to work on an FTP URL, with the setting to
- only issue a single CWD command. The issue could be triggered if the
- directory part of the URL contained a "%00" sequence.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000121">CVE-2018-1000121</a>
-
- <p>Dario Weisser reported that curl might dereference a near-NULL address when
- getting an LDAP URL. A malicious server that sends a particularly crafted
- response could made crash applications that allowed LDAP URL relying on
- libcurl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000122">CVE-2018-1000122</a>
-
- <p>OSS-fuzz and Max Dymond found that curl can be tricked into copying data
- beyond the end of its heap based buffer when asked to transfer an RTSP URL.
- curl could calculate a wrong data length to copy from the read buffer.
- This could lead to information leakage or a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.26.0-1+wheezy25.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1309.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1310.data b/english/lts/security/2018/dla-1310.data
deleted file mode 100644
index 672a0d8fc34..00000000000
--- a/english/lts/security/2018/dla-1310.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1310-1 exempi</define-tag>
-<define-tag report_date>2018-3-21</define-tag>
-<define-tag secrefs>CVE-2017-18233 CVE-2017-18234 CVE-2017-18236 CVE-2017-18238 CVE-2018-7728 CVE-2018-7730</define-tag>
-<define-tag packages>exempi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1310.wml b/english/lts/security/2018/dla-1310.wml
deleted file mode 100644
index 21915b5ba6f..00000000000
--- a/english/lts/security/2018/dla-1310.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various issues were discovered in exempi, a library to parse XMP
-metadata that may cause a denial-of-service or may have other
-unspecified impact via crafted files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18233">CVE-2017-18233</a>
-
- <p>An Integer overflow in the Chunk class in RIFF.cpp allows remote
- attackers to cause a denial of service (infinite loop) via crafted
- XMP data in an .avi file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18234">CVE-2017-18234</a>
-
- <p>An issue was discovered that allows remote attackers to cause a
- denial of service (invalid memcpy with resultant use-after-free)
- or possibly have unspecified other impact via a .pdf file containing
- JPEG data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18236">CVE-2017-18236</a>
-
- <p>The ASF_Support::ReadHeaderObject function in ASF_Support.cpp allows
- remote attackers to cause a denial of service (infinite loop) via a
- crafted .asf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18238">CVE-2017-18238</a>
-
- <p>The TradQT_Manager::ParseCachedBoxes function in
- QuickTime_Support.cpp allows remote attackers to cause
- a denial of service (infinite loop) via crafted XMP data in
- a .qt file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7728">CVE-2018-7728</a>
-
- <p>TIFF_Handler.cpp mishandles a case of a zero length, leading to a
- heap-based buffer over-read in the MD5Update() function in
- MD5.cpp.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7730">CVE-2018-7730</a>
-
- <p>A certain case of a 0xffffffff length is mishandled in
- PSIR_FileWriter.cpp, leading to a heap-based buffer over-read
- in the PSD_MetaHandler::CacheFileData() function.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.0-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your exempi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1310.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1311.data b/english/lts/security/2018/dla-1311.data
deleted file mode 100644
index 5c043fcb2a1..00000000000
--- a/english/lts/security/2018/dla-1311.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1311-1 adminer</define-tag>
-<define-tag report_date>2018-3-22</define-tag>
-<define-tag secrefs>CVE-2018-7667 Bug##893668</define-tag>
-<define-tag packages>adminer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1311.wml b/english/lts/security/2018/dla-1311.wml
deleted file mode 100644
index ebfc6ccee07..00000000000
--- a/english/lts/security/2018/dla-1311.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a server-side request forgery exploit in
-adminer, a web-based database administration tool.</p>
-
-<p>Adminer allowed unauthenticated connections to be initiated to arbitrary
-systems and ports which could bypass external firewalls to identify
-internal hosts or perform port scanning of other servers.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in adminer version
-3.3.3-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your adminer packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1311.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1312.data b/english/lts/security/2018/dla-1312.data
deleted file mode 100644
index 9f4f7963149..00000000000
--- a/english/lts/security/2018/dla-1312.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1312-1 libvorbisidec</define-tag>
-<define-tag report_date>2018-3-22</define-tag>
-<define-tag secrefs>CVE-2018-5147</define-tag>
-<define-tag packages>libvorbisidec</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1312.wml b/english/lts/security/2018/dla-1312.wml
deleted file mode 100644
index 42dd45034af..00000000000
--- a/english/lts/security/2018/dla-1312.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Huzaifa Sidhpurwala discovered that an out-of-bounds memory write in the
-codebook parsing code of the Libtremor multimedia library could result
-in the execution of arbitrary code if a malformed Vorbis file is opened.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.2+svn18153-0.2+deb7u1.</p>
-
-<p>We recommend that you upgrade your libvorbisidec packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1312.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1313.data b/english/lts/security/2018/dla-1313.data
deleted file mode 100644
index e9c9767b1a6..00000000000
--- a/english/lts/security/2018/dla-1313.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1313-1 isc-dhcp</define-tag>
-<define-tag report_date>2018-3-22</define-tag>
-<define-tag secrefs>CVE-2018-5732 CVE-2018-5733</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1313.wml b/english/lts/security/2018/dla-1313.wml
deleted file mode 100644
index 8a90637a3e9..00000000000
--- a/english/lts/security/2018/dla-1313.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the ISC DHCP client,
-relay and server. The Common Vulnerabilities and Exposures project
-identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5732">CVE-2018-5732</a>
-
- <p>Felix Wilhelm of the Google Security Team discovered that the DHCP
- client is prone to an out-of-bound memory access vulnerability when
- processing specially constructed DHCP options responses, resulting
- in potential execution of arbitrary code by a malicious DHCP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5733">CVE-2018-5733</a>
-
- <p>Felix Wilhelm of the Google Security Team discovered that the DHCP
- server does not properly handle reference counting when processing
- client requests. A malicious client can take advantage of this flaw
- to cause a denial of service (dhcpd crash) by sending large amounts
- of traffic.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.2.2.dfsg.1-5+deb70u9.</p>
-
-<p>We recommend that you upgrade your isc-dhcp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1313.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1314.data b/english/lts/security/2018/dla-1314.data
deleted file mode 100644
index 6d522b0a477..00000000000
--- a/english/lts/security/2018/dla-1314.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1314-1 simplesamlphp</define-tag>
-<define-tag report_date>2018-3-23</define-tag>
-<define-tag secrefs>CVE-2018-7711</define-tag>
-<define-tag packages>simplesamlphp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1314.wml b/english/lts/security/2018/dla-1314.wml
deleted file mode 100644
index 95d9b299eed..00000000000
--- a/english/lts/security/2018/dla-1314.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cure53 discovered that in SimpleSAMLphp, in rare circumstances an
-invalid signature on the SAML 2.0 HTTP Redirect binding could be
-considered valid.</p>
-
-<p>Additionally this update fixes a regression introduced in DLA-1298
-by the backported patch for SSA-201802-01/<a href="https://security-tracker.debian.org/tracker/CVE-2018-7644">CVE-2018-7644</a>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.2-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your simplesamlphp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1314.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1315.data b/english/lts/security/2018/dla-1315.data
deleted file mode 100644
index 228f17279fe..00000000000
--- a/english/lts/security/2018/dla-1315.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1315-1 libvirt</define-tag>
-<define-tag report_date>2018-3-24</define-tag>
-<define-tag secrefs>CVE-2018-1064 CVE-2018-5748 Bug#887700</define-tag>
-<define-tag packages>libvirt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1315.wml b/english/lts/security/2018/dla-1315.wml
deleted file mode 100644
index 7e9f004a743..00000000000
--- a/english/lts/security/2018/dla-1315.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Daniel P. Berrange and Peter Krempa of Red Hat discovered a flaw in
-libvirt, a virtualization API. A lack of restriction for the amount of
-data read by QEMU Monitor socket can lead to a denial of service by
-exhaustion of memory resources.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.12.3-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libvirt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1315.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1316.data b/english/lts/security/2018/dla-1316.data
deleted file mode 100644
index b886082b923..00000000000
--- a/english/lts/security/2018/dla-1316.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1316-1 freeplane</define-tag>
-<define-tag report_date>2018-3-24</define-tag>
-<define-tag secrefs>CVE-2018-1000069 Bug#893663</define-tag>
-<define-tag packages>freeplane</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1316.wml b/english/lts/security/2018/dla-1316.wml
deleted file mode 100644
index f29542e71dc..00000000000
--- a/english/lts/security/2018/dla-1316.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Wojciech Reguła discovered that Freeplane, a program for working with
-mind maps, was affected by a XML External Entity (XXE) vulnerability in
-its mindmap loader that could compromise a user's machine by opening a
-specially crafted mind map file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.3-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your freeplane packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1316.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1317.data b/english/lts/security/2018/dla-1317.data
deleted file mode 100644
index f2d633a98da..00000000000
--- a/english/lts/security/2018/dla-1317.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1317-1 net-snmp</define-tag>
-<define-tag report_date>2018-3-26</define-tag>
-<define-tag secrefs>CVE-2018-1000116 Bug##894110</define-tag>
-<define-tag packages>net-snmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1317.wml b/english/lts/security/2018/dla-1317.wml
deleted file mode 100644
index f76a594bd21..00000000000
--- a/english/lts/security/2018/dla-1317.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a heap corruption vulnerability in the
-net-snmp framework which exchanges server management information in a
-network.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in net-snmp version
-5.7.2.1+dfsg-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your net-snmp packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1317.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1318.data b/english/lts/security/2018/dla-1318.data
deleted file mode 100644
index e0ad847971a..00000000000
--- a/english/lts/security/2018/dla-1318.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1318-1 irssi</define-tag>
-<define-tag report_date>2018-3-26</define-tag>
-<define-tag secrefs>CVE-2018-7051 Bug##890677</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1318.wml b/english/lts/security/2018/dla-1318.wml
deleted file mode 100644
index 31e7d71f8a1..00000000000
--- a/english/lts/security/2018/dla-1318.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in the irssi IRC client where
-certain nick names could result in out-of-bounds access when printing
-theme strings.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in irssi version
-0.8.15-5+deb7u6. It was incorrectly missing from the upload of
-0.8.15-5+deb7u5 announced as part of DLA-1289-1. Thanks to Ben Hutchings
-and Matus Uhlhar.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1318.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1319.data b/english/lts/security/2018/dla-1319.data
deleted file mode 100644
index 4c4423b4377..00000000000
--- a/english/lts/security/2018/dla-1319.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1319-1 firefox-esr</define-tag>
-<define-tag report_date>2018-3-26</define-tag>
-<define-tag secrefs>CVE-2018-5146 CVE-2018-5147</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1319.wml b/english/lts/security/2018/dla-1319.wml
deleted file mode 100644
index 2120f61c298..00000000000
--- a/english/lts/security/2018/dla-1319.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Richard Zhu and Huzaifa Sidhpurwala discovered that an out-of-bounds
-memory write when playing Vorbis media files could result in the
-execution of arbitrary code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.7.2esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1319.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1320.data b/english/lts/security/2018/dla-1320.data
deleted file mode 100644
index 505a71c0fa8..00000000000
--- a/english/lts/security/2018/dla-1320.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1320-1 samba</define-tag>
-<define-tag report_date>2018-3-27</define-tag>
-<define-tag secrefs>CVE-2018-1050</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1320.wml b/english/lts/security/2018/dla-1320.wml
deleted file mode 100644
index 6d5136d9cd6..00000000000
--- a/english/lts/security/2018/dla-1320.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
-print, and login server for Unix. The Common Vulnerabilities and
-Exposures project identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1050">CVE-2018-1050</a>
-
- <p>It was discovered that Samba is prone to a denial of service
- attack when the RPC spoolss service is configured to be run as an
- external daemon. Thanks for Jeremy Allison for the patch.</p>
-
- <p><url "https://www.samba.org/samba/security/CVE-2018-1050.html"></p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.6-6+deb7u16.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1320.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1321.data b/english/lts/security/2018/dla-1321.data
deleted file mode 100644
index 686471a9741..00000000000
--- a/english/lts/security/2018/dla-1321.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1321-1 firefox-esr</define-tag>
-<define-tag report_date>2018-3-27</define-tag>
-<define-tag secrefs>CVE-2018-5148</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1321.wml b/english/lts/security/2018/dla-1321.wml
deleted file mode 100644
index 9eedae4e9e4..00000000000
--- a/english/lts/security/2018/dla-1321.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jesse Schwartzentruber discovered a use-after-free vulnerability
-in Firefox, which could be exploited to trigger an application
-crash or arbitrary code execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.7.3esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1321.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1322.data b/english/lts/security/2018/dla-1322.data
deleted file mode 100644
index 3b723ff8cef..00000000000
--- a/english/lts/security/2018/dla-1322.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1322-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-3-28</define-tag>
-<define-tag secrefs>CVE-2017-18219 CVE-2017-18220 CVE-2017-18229 CVE-2017-18230 CVE-2017-18231 CVE-2018-9018</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1322.wml b/english/lts/security/2018/dla-1322.wml
deleted file mode 100644
index 93553ff1611..00000000000
--- a/english/lts/security/2018/dla-1322.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various security issues were discovered in Graphicsmagick, a collection
-of image processing tools.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18219">CVE-2017-18219</a>
-
- <p>An allocation failure vulnerability was found in the function
- ReadOnePNGImage in coders/png.c, which allows attackers to cause a
- denial of service via a crafted file that triggers an attempt at a
- large png_pixels array allocation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18220">CVE-2017-18220</a>
-
- <p>The ReadOneJNGImage and ReadJNGImage functions in coders/png.c allow
- remote attackers to cause a denial of service or possibly have
- unspecified other impact via a crafted file, a related issue
- to <a href="https://security-tracker.debian.org/tracker/CVE-2017-11403">CVE-2017-11403</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18229">CVE-2017-18229</a>
-
- <p>An allocation failure vulnerability was found in the function
- ReadTIFFImage in coders/tiff.c, which allows attackers to cause a
- denial of service via a crafted file, because file size is not
- properly used to restrict scanline, strip, and tile allocations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18230">CVE-2017-18230</a>
-
- <p>A NULL pointer dereference vulnerability was found in the function
- ReadCINEONImage in coders/cineon.c, which allows attackers to cause
- a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18231">CVE-2017-18231</a>
-
- <p>A NULL pointer dereference vulnerability was found in the function
- ReadEnhMetaFile in coders/emf.c, which allows attackers to cause
- a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9018">CVE-2018-9018</a>
-
- <p>There is a divide-by-zero error in the ReadMNGImage function of
- coders/png.c. Remote attackers could leverage this vulnerability to
- cause a crash and denial of service via a crafted mng file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.16-1.1+deb7u19.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1322.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1323.data b/english/lts/security/2018/dla-1323.data
deleted file mode 100644
index a9544041a2a..00000000000
--- a/english/lts/security/2018/dla-1323.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1323-1 tzdata</define-tag>
-<define-tag report_date>2018-3-28</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1323.wml b/english/lts/security/2018/dla-1323.wml
deleted file mode 100644
index 1a615f496f7..00000000000
--- a/english/lts/security/2018/dla-1323.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018d. Notable
-changes are:
-
-<p>Palestine started Daylight Saving Time (DST) on March 24,
- rather than on March 31st.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2018d-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1323.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1324.data b/english/lts/security/2018/dla-1324.data
deleted file mode 100644
index 6b4588ea3e2..00000000000
--- a/english/lts/security/2018/dla-1324.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1324-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2018-3-28</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1324.wml b/english/lts/security/2018/dla-1324.wml
deleted file mode 100644
index 198528e62f6..00000000000
--- a/english/lts/security/2018/dla-1324.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018d for the
-Perl bindings. For the list of changes, see DLA-1323-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2018d.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1324.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1325.data b/english/lts/security/2018/dla-1325.data
deleted file mode 100644
index 11974f46a3c..00000000000
--- a/english/lts/security/2018/dla-1325.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1325-1 drupal7</define-tag>
-<define-tag report_date>2018-3-28</define-tag>
-<define-tag secrefs>CVE-2018-7600</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1325.wml b/english/lts/security/2018/dla-1325.wml
deleted file mode 100644
index 9996d8305ca..00000000000
--- a/english/lts/security/2018/dla-1325.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jasper Mattsson found a remote code execution vulnerability in the
-Drupal content management system. This potentially allows attackers to
-exploit multiple attack vectors on a Drupal site, which could result in
-the site being completely compromised.</p>
-
-<p>For further information please refer to the official upstream advisory
-at <a href="https://www.drupal.org/sa-core-2018-002.">https://www.drupal.org/sa-core-2018-002.</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.14-2+deb7u18.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1325.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1326.data b/english/lts/security/2018/dla-1326.data
deleted file mode 100644
index a8a4cd56275..00000000000
--- a/english/lts/security/2018/dla-1326.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1326-1 php5</define-tag>
-<define-tag report_date>2018-3-29</define-tag>
-<define-tag secrefs>CVE-2018-7584</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1326.wml b/english/lts/security/2018/dla-1326.wml
deleted file mode 100644
index cbf0af81b5b..00000000000
--- a/english/lts/security/2018/dla-1326.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Wei Lei and Liu Yang of Nanyang Technological University discovered a
-stack-based buffer overflow in PHP5 when parsing a malformed HTTP
-response which can be exploited to cause a denial-of-service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u13.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1326.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1327.data b/english/lts/security/2018/dla-1327.data
deleted file mode 100644
index 24bf66dca0c..00000000000
--- a/english/lts/security/2018/dla-1327.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1327-1 thunderbird</define-tag>
-<define-tag report_date>2018-3-29</define-tag>
-<define-tag secrefs>CVE-2018-5125 CVE-2018-5127 CVE-2018-5129 CVE-2018-5144 CVE-2018-5145 CVE-2018-5146</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1327.wml b/english/lts/security/2018/dla-1327.wml
deleted file mode 100644
index 715cf61f25b..00000000000
--- a/english/lts/security/2018/dla-1327.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code, denial of service or information
-disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.7.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1327.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1328.data b/english/lts/security/2018/dla-1328.data
deleted file mode 100644
index be13e588939..00000000000
--- a/english/lts/security/2018/dla-1328.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1328-1 xerces-c</define-tag>
-<define-tag report_date>2018-3-29</define-tag>
-<define-tag secrefs>CVE-2017-12627 Bug#894050</define-tag>
-<define-tag packages>xerces-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1328.wml b/english/lts/security/2018/dla-1328.wml
deleted file mode 100644
index ac10bdf3f02..00000000000
--- a/english/lts/security/2018/dla-1328.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alberto Garcia, Francisco Oca and Suleman Ali of Offensive Research
-discovered that the Xerces-C XML parser mishandles certain kinds of
-external DTD references, resulting in dereference of a NULL pointer
-while processing the path to the DTD. The bug allows for a denial of
-service attack in applications that allow DTD processing and do not
-prevent external DTD usage, and could conceivably result in remote code
-execution.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.1.1-3+deb7u5.</p>
-
-<p>We recommend that you upgrade your xerces-c packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1328.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1329.data b/english/lts/security/2018/dla-1329.data
deleted file mode 100644
index 81924c2b0b5..00000000000
--- a/english/lts/security/2018/dla-1329.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1329-1 memcached</define-tag>
-<define-tag report_date>2018-3-29</define-tag>
-<define-tag secrefs>CVE-2018-1000127 Bug##894404</define-tag>
-<define-tag packages>memcached</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1329.wml b/english/lts/security/2018/dla-1329.wml
deleted file mode 100644
index 5d246ac5353..00000000000
--- a/english/lts/security/2018/dla-1329.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>memcached version prior to 1.4.37 contains an Integer Overflow
-vulnerability that can result in data corruption and deadlocks. This
-attack is exploitable via network connectivity to the memcached
-service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.4.13-0.2+deb7u4.</p>
-
-<p>We recommend that you upgrade your memcached packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1329.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1330.data b/english/lts/security/2018/dla-1330.data
deleted file mode 100644
index 5a2e7382a1b..00000000000
--- a/english/lts/security/2018/dla-1330.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1330-1 openssl</define-tag>
-<define-tag report_date>2018-3-30</define-tag>
-<define-tag secrefs>CVE-2018-0739</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1330.wml b/english/lts/security/2018/dla-1330.wml
deleted file mode 100644
index b51f1e106e1..00000000000
--- a/english/lts/security/2018/dla-1330.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that constructed ASN.1 types with a recursive
-definition could exceed the stack, potentially leading to a denial of
-service.</p>
-
-<p>Details can be found in the upstream advisory: <a href="https://www.openssl.org/news/secadv/20180327.txt">https://www.openssl.org/news/secadv/20180327.txt</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.0.1t-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1330.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1331.data b/english/lts/security/2018/dla-1331.data
deleted file mode 100644
index 73e297e68e6..00000000000
--- a/english/lts/security/2018/dla-1331.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1331-1 mercurial</define-tag>
-<define-tag report_date>2018-3-30</define-tag>
-<define-tag secrefs>CVE-2018-1000132 Bug#892964</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1331.wml b/english/lts/security/2018/dla-1331.wml
deleted file mode 100644
index 43319c7c745..00000000000
--- a/english/lts/security/2018/dla-1331.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mercurial version 4.5 and earlier contains a Incorrect Access Control
-(CWE-285) vulnerability in Protocol server that can result in
-Unauthorized data access. This attack appear to be exploitable via
-network connectivity. This vulnerability appears to have been fixed in
-4.5.1.</p>
-
-<p>This update also fixes a regression inroduced in 2.2.2-4+deb7u5 which
-makes the testsuite fail non-deterministically.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.2-4+deb7u7.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1331.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1332.data b/english/lts/security/2018/dla-1332.data
deleted file mode 100644
index bbf6bcbfa99..00000000000
--- a/english/lts/security/2018/dla-1332.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1332-1 libvncserver</define-tag>
-<define-tag report_date>2018-3-30</define-tag>
-<define-tag secrefs>CVE-2018-7225 Bug#894045</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1332.wml b/english/lts/security/2018/dla-1332.wml
deleted file mode 100644
index 4a26cdd16da..00000000000
--- a/english/lts/security/2018/dla-1332.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libvncserver version through 0.9.11. does not sanitize msg.cct.length
-which may result in access to uninitialized and potentially sensitive
-data or possibly unspecified other impact (e.g., an integer overflow)
-via specially crafted VNC packets.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.9.9+dfsg-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1332.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1333.data b/english/lts/security/2018/dla-1333.data
deleted file mode 100644
index fe19b5c3fc1..00000000000
--- a/english/lts/security/2018/dla-1333.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1333-1 dovecot</define-tag>
-<define-tag report_date>2018-3-31</define-tag>
-<define-tag secrefs>CVE-2017-14461 CVE-2017-15130 CVE-2017-15132</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1333.wml b/english/lts/security/2018/dla-1333.wml
deleted file mode 100644
index 01dae69968c..00000000000
--- a/english/lts/security/2018/dla-1333.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the Dovecot email
-server. The Common Vulnerabilities and Exposures project identifies the
-following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14461">CVE-2017-14461</a>
-
- <p>Aleksandar Nikolic of Cisco Talos and <q>flxflndy</q> discovered that
- Dovecot does not properly parse invalid email addresses, which may
- cause a crash or leak memory contents to an attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15130">CVE-2017-15130</a>
-
- <p>It was discovered that TLS SNI config lookups may lead to excessive
- memory usage, causing imap-login/pop3-login VSZ limit to be reached
- and the process restarted, resulting in a denial of service. Only
- Dovecot configurations containing local_name { } or local { }
- configuration blocks are affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15132">CVE-2017-15132</a>
-
- <p>It was discovered that Dovecot contains a memory leak flaw in the
- login process on aborted SASL authentication.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:2.1.7-7+deb7u2.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1333.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1334.data b/english/lts/security/2018/dla-1334.data
deleted file mode 100644
index 57fa026e3ee..00000000000
--- a/english/lts/security/2018/dla-1334.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1334-1 mosquitto</define-tag>
-<define-tag report_date>2018-3-31</define-tag>
-<define-tag secrefs>CVE-2017-7651 CVE-2017-7652</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1334.wml b/english/lts/security/2018/dla-1334.wml
deleted file mode 100644
index b58c2837e9f..00000000000
--- a/english/lts/security/2018/dla-1334.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7651">CVE-2017-7651</a>
- <p>A crafted CONNECT packet from an unauthenticated client could
- result in extraordinary memory consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7652">CVE-2017-7652</a>
-
- <p>In case all sockets/file descriptors are exhausted, a SIGHUP
- signal to reload the configuration could result in default
- config values (especially bad security settings)</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.15-2+deb7u3.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1334.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1335.data b/english/lts/security/2018/dla-1335.data
deleted file mode 100644
index 5140204eaa1..00000000000
--- a/english/lts/security/2018/dla-1335.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1335-1 zsh</define-tag>
-<define-tag report_date>2018-3-31</define-tag>
-<define-tag secrefs>CVE-2018-1071 CVE-2018-1083 Bug#894044 Bug#894043</define-tag>
-<define-tag packages>zsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1335.wml b/english/lts/security/2018/dla-1335.wml
deleted file mode 100644
index 38fb80b9f06..00000000000
--- a/english/lts/security/2018/dla-1335.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in the Z shell.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1071">CVE-2018-1071</a>
-
- <p>Stack-based buffer overflow in the exec.c:hashcmd() function.
- A local attacker could exploit this to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1083">CVE-2018-1083</a>
-
- <p>Buffer overflow in the shell autocomplete functionality. A local
- unprivileged user can create a specially crafted directory path which
- leads to code execution in the context of the user who tries to use
- autocomplete to traverse the before mentioned path. If the user
- affected is privileged, this leads to privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.3.17-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your zsh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1335.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1336.data b/english/lts/security/2018/dla-1336.data
deleted file mode 100644
index 3bcd5509535..00000000000
--- a/english/lts/security/2018/dla-1336.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1336-1 rubygems</define-tag>
-<define-tag report_date>2018-4-1</define-tag>
-<define-tag secrefs>CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-201</define-tag>
-<define-tag packages>rubygems</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1336.wml b/english/lts/security/2018/dla-1336.wml
deleted file mode 100644
index 42c4cc34a08..00000000000
--- a/english/lts/security/2018/dla-1336.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in rubygems, a package management framework
-for Ruby. </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000075">CVE-2018-1000075</a>
-
- <p>A negative size vulnerability in ruby gem package tar header that could
- cause an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000076">CVE-2018-1000076</a>
-
- <p>Ruby gems package improperly verifies cryptographic signatures. A mis-signed
- gem could be installed if the tarball contains multiple gem signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000077">CVE-2018-1000077</a>
-
- <p>An improper input validation vulnerability in ruby gems specification
- homepage attribute could allow malicious gem to set an invalid homepage
- URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000078">CVE-2018-1000078</a>
-
- <p>Cross Site Scripting (XSS) vulnerability in gem server display of homepage
- attribute</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.24-1+deb7u2.</p>
-
-<p>We recommend that you upgrade your rubygems packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1336.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1337.data b/english/lts/security/2018/dla-1337.data
deleted file mode 100644
index d74be7f1300..00000000000
--- a/english/lts/security/2018/dla-1337.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1337-1 jruby</define-tag>
-<define-tag report_date>2018-4-2</define-tag>
-<define-tag secrefs>CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-201</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1337.wml b/english/lts/security/2018/dla-1337.wml
deleted file mode 100644
index 1c35e3d206a..00000000000
--- a/english/lts/security/2018/dla-1337.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in the rubygems package management
-framework, embedded in JRuby, a pure-Java implementation of the Ruby
-programming language. </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000075">CVE-2018-1000075</a>
-
- <p>A negative size vulnerability in ruby gem package tar header that could
- cause an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000076">CVE-2018-1000076</a>
-
- <p>Ruby gems package improperly verifies cryptographic signatures. A mis-signed
- gem could be installed if the tarball contains multiple gem signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000077">CVE-2018-1000077</a>
-
- <p>An improper input validation vulnerability in ruby gems specification
- homepage attribute could allow malicious gem to set an invalid homepage
- URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000078">CVE-2018-1000078</a>
-
- <p>Cross Site Scripting (XSS) vulnerability in gem server display of homepage
- attribute</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.5.6-5+deb7u1.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1337.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1338.data b/english/lts/security/2018/dla-1338.data
deleted file mode 100644
index 7380e8669ee..00000000000
--- a/english/lts/security/2018/dla-1338.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1338-1 beep</define-tag>
-<define-tag report_date>2018-4-3</define-tag>
-<define-tag secrefs>CVE-2018-0492 Bug##894667</define-tag>
-<define-tag packages>beep</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1338.wml b/english/lts/security/2018/dla-1338.wml
deleted file mode 100644
index ab64ee48764..00000000000
--- a/english/lts/security/2018/dla-1338.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a local privilege escalation
-vulnerability in beep, an <q>advanced PC speaker beeper</q>.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in beep version
-1.3-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your beep packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1338.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1339.data b/english/lts/security/2018/dla-1339.data
deleted file mode 100644
index 6591cefd61c..00000000000
--- a/english/lts/security/2018/dla-1339.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1339-1 openjdk-7</define-tag>
-<define-tag report_date>2018-4-3</define-tag>
-<define-tag secrefs>CVE-2018-2579 CVE-2018-2588 CVE-2018-2599 CVE-2018-2602 CVE-2018-2603 CVE-2018-2618 CVE-2018-2629 CVE-2018-2633 CVE-2018-2634 CVE-2018-2637 CVE-2018-2641 CVE-2018-2663 CVE-2018-2677 CVE-2018-2678 Bug#891330</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1339.wml b/english/lts/security/2018/dla-1339.wml
deleted file mode 100644
index 87add32048c..00000000000
--- a/english/lts/security/2018/dla-1339.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in denial of
-service, unauthorized access, sandbox bypass or HTTP header injection.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7u171-2.6.13-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1339.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1340.data b/english/lts/security/2018/dla-1340.data
deleted file mode 100644
index 02334cb618b..00000000000
--- a/english/lts/security/2018/dla-1340.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1340-1 sam2p</define-tag>
-<define-tag report_date>2018-4-6</define-tag>
-<define-tag secrefs>CVE-2018-7487 CVE-2018-7551 CVE-2018-7552 CVE-2018-7553 CVE-2018-7554</define-tag>
-<define-tag packages>sam2p</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1340.wml b/english/lts/security/2018/dla-1340.wml
deleted file mode 100644
index 5d42025de07..00000000000
--- a/english/lts/security/2018/dla-1340.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple invalid frees and buffer-overflow vulnerabilities were
-discovered in sam2p, a utility to convert raster images and
-other image formats, that may lead to a denial-of-service (application
-crash) or unspecified other impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.49.1-1+deb7u3.</p>
-
-<p>We recommend that you upgrade your sam2p packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1340.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1341.data b/english/lts/security/2018/dla-1341.data
deleted file mode 100644
index 4bc80e16066..00000000000
--- a/english/lts/security/2018/dla-1341.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1341-1 sdl-image1.2</define-tag>
-<define-tag report_date>2018-4-6</define-tag>
-<define-tag secrefs>CVE-2017-12122 CVE-2017-14440 CVE-2017-14441 CVE-2017-14442 CVE-2017-14448 CVE-2017-14450</define-tag>
-<define-tag packages>sdl-image1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1341.wml b/english/lts/security/2018/dla-1341.wml
deleted file mode 100644
index 7511d8f42c6..00000000000
--- a/english/lts/security/2018/dla-1341.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Lilith of Cisco Talos discovered several buffer overflow
-vulnerabilities in the SDL Image library which can be leveraged by
-attackers to execute arbitrary code via specially crafted image files.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.12-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your sdl-image1.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1341.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1342.data b/english/lts/security/2018/dla-1342.data
deleted file mode 100644
index f403e1b5409..00000000000
--- a/english/lts/security/2018/dla-1342.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1342-1 ldap-account-manager</define-tag>
-<define-tag report_date>2018-4-9</define-tag>
-<define-tag secrefs>CVE-2018-8763</define-tag>
-<define-tag packages>ldap-account-manager</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1342.wml b/english/lts/security/2018/dla-1342.wml
deleted file mode 100644
index 882fb3231f5..00000000000
--- a/english/lts/security/2018/dla-1342.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Michal Kedzior found two vulnerabilities in LDAP Account Manager, a web
-front-end for LDAP directories.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8763">CVE-2018-8763</a>
-
- <p>The found Reflected Cross Site Scripting (XSS) vulnerability might
- allow an attacker to execute JavaScript code in the browser of the
- victim or to redirect her to a malicious website if the victim clicks
- on a specially crafted link.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.7-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your ldap-account-manager packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1342.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1343.data b/english/lts/security/2018/dla-1343.data
deleted file mode 100644
index 3502a452f49..00000000000
--- a/english/lts/security/2018/dla-1343.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1343-1 ming</define-tag>
-<define-tag report_date>2018-4-9</define-tag>
-<define-tag secrefs>CVE-2018-6358 CVE-2018-7867 CVE-2018-7868 CVE-2018-7870 CVE-2018-7871 CVE-2018-7872 CVE-2018-7875 CVE-2018-9165</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1343.wml b/english/lts/security/2018/dla-1343.wml
deleted file mode 100644
index 33bcdfe2a40..00000000000
--- a/english/lts/security/2018/dla-1343.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Ming:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6358">CVE-2018-6358</a>
-
- <p>Heap-based buffer overflow vulnerability in the printDefineFont2 function
- (util/listfdb.c). Remote attackers might leverage this vulnerability to
- cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7867">CVE-2018-7867</a>
-
- <p>Heap-based buffer overflow vulnerability in the getString function
- (util/decompile.c) during a RegisterNumber sprintf. Remote attackers might
- leverage this vulnerability to cause a denial of service via a crafted swf
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7868">CVE-2018-7868</a>
-
- <p>Heap-based buffer over-read vulnerability in the getName function
- (util/decompile.c) for CONSTANT8 data. Remote attackers might leverage this
- vulnerability to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7870">CVE-2018-7870</a>
-
- <p>Invalid memory address dereference in the getString function
- (util/decompile.c) for CONSTANT16 data. Remote attackers might leverage this
- vulnerability to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7871">CVE-2018-7871</a>
-
- <p>Heap-based buffer over-read vulnerability in the getName function
- (util/decompile.c) for CONSTANT16 data. Remote attackers might leverage this
- vulnerability to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7872">CVE-2018-7872</a>
-
- <p>Invalid memory address dereference in the getName function
- (util/decompile.c) for CONSTANT16 data. Remote attackers might leverage this
- vulnerability to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7875">CVE-2018-7875</a>
-
- <p>Heap-based buffer over-read vulnerability in the getName function
- (util/decompile.c) for CONSTANT8 data. Remote attackers might leverage this
- vulnerability to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9165">CVE-2018-9165</a>
-
- <p>The pushdup function (util/decompile.c) performs shallow copy of String
- elements (instead of deep copy), allowing simultaneous change of multiple
- elements of the stack, which indirectly makes the library vulnerable to a
- NULL pointer dereference in getName (util/decompile.c). Remote attackers
- might leverage this vulnerability to cause dos via a crafted swf file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.4.4-1.1+deb7u8.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1343.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1344.data b/english/lts/security/2018/dla-1344.data
deleted file mode 100644
index 7c80233cfa1..00000000000
--- a/english/lts/security/2018/dla-1344.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1344-1 squirrelmail</define-tag>
-<define-tag report_date>2018-4-16</define-tag>
-<define-tag secrefs>CVE-2018-8741 Bug#893202</define-tag>
-<define-tag packages>squirrelmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1344.wml b/english/lts/security/2018/dla-1344.wml
deleted file mode 100644
index 10e748f1696..00000000000
--- a/english/lts/security/2018/dla-1344.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Florian Grunow and Birk Kauer of ERNW discovered a path traversal
-vulnerability in SquirrelMail, a webmail application, allowing an
-authenticated remote attacker to retrieve or delete arbitrary files
-via mail attachment.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2:1.4.23~svn20120406-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your squirrelmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1344.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1345.data b/english/lts/security/2018/dla-1345.data
deleted file mode 100644
index c8fe0e2c7be..00000000000
--- a/english/lts/security/2018/dla-1345.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1345-1 perl</define-tag>
-<define-tag report_date>2018-4-14</define-tag>
-<define-tag secrefs>CVE-2018-6913</define-tag>
-<define-tag packages>perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1345.wml b/english/lts/security/2018/dla-1345.wml
deleted file mode 100644
index 2cf4067091b..00000000000
--- a/english/lts/security/2018/dla-1345.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>GwanYeong Kim reported that 'pack()' could cause a heap buffer write
-overflow with a large item count.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.14.2-21+deb7u6.</p>
-
-<p>We recommend that you upgrade your perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1345.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1346.data b/english/lts/security/2018/dla-1346.data
deleted file mode 100644
index 7d22962ff0e..00000000000
--- a/english/lts/security/2018/dla-1346.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1346-1 tiff</define-tag>
-<define-tag report_date>2018-4-16</define-tag>
-<define-tag secrefs>CVE-2018-7456 Bug#891288</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1346.wml b/english/lts/security/2018/dla-1346.wml
deleted file mode 100644
index 11b317db0fc..00000000000
--- a/english/lts/security/2018/dla-1346.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A NULL Pointer Dereference was discovered in the TIFFPrintDirectory
-function (tif_print.c) when using the tiffinfo tool to print crafted
-TIFF information. This vulnerability could be leveraged by remote
-attackers to cause a crash of the application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u19.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1346.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1347.data b/english/lts/security/2018/dla-1347.data
deleted file mode 100644
index 27981b7d73d..00000000000
--- a/english/lts/security/2018/dla-1347.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1347-1 tiff3</define-tag>
-<define-tag report_date>2018-4-16</define-tag>
-<define-tag secrefs>CVE-2018-7456 Bug#891288</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1347.wml b/english/lts/security/2018/dla-1347.wml
deleted file mode 100644
index 1a47195947a..00000000000
--- a/english/lts/security/2018/dla-1347.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A NULL Pointer Dereference was discovered in the TIFFPrintDirectory
-function (tif_print.c) when using the tiffinfo tool to print crafted
-TIFF information. This vulnerability could be leveraged by remote
-attackers to cause a crash of the application.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u10.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1347.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1348.data b/english/lts/security/2018/dla-1348.data
deleted file mode 100644
index bb1b18cd007..00000000000
--- a/english/lts/security/2018/dla-1348.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1348-1 patch</define-tag>
-<define-tag report_date>2018-4-16</define-tag>
-<define-tag secrefs>CVE-2018-1000156 Bug##894993</define-tag>
-<define-tag packages>patch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1348.wml b/english/lts/security/2018/dla-1348.wml
deleted file mode 100644
index 1d9e81c1c9d..00000000000
--- a/english/lts/security/2018/dla-1348.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an input validation vulnerability in the
-patch(1) utility where an ed(1) script embedded in a regular input file
-could result in arbitrary code execution. This was reported by Rachel
-Kroll [0] et al.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in patch version
-2.6.1-3+deb7u1.</p>
-
-<p>We recommend that you upgrade your patch packages.</p>
-
- <p>[0] <a href="https://rachelbythebay.com/w/2018/04/05/bangpatch/">https://rachelbythebay.com/w/2018/04/05/bangpatch/</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1348.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1349.data b/english/lts/security/2018/dla-1349.data
deleted file mode 100644
index 67cc99a33d4..00000000000
--- a/english/lts/security/2018/dla-1349.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1349-1 linux-tools</define-tag>
-<define-tag report_date>2018-4-16</define-tag>
-<define-tag secrefs>Bug#693667 Bug#696957 Bug#708994</define-tag>
-<define-tag packages>linux-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1349.wml b/english/lts/security/2018/dla-1349.wml
deleted file mode 100644
index 5ff6bb4b3e0..00000000000
--- a/english/lts/security/2018/dla-1349.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update doesn't fix a vulnerability in linux-tools, but provides
-support for building Linux kernel modules with the <q>retpoline</q>
-mitigation for <a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a> (Spectre variant 2).</p>
-
-<p>This update also includes bug fixes from the upstream Linux 3.2 stable
-branch up to and including 3.2.101.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.101-1.</p>
-
-<p>We recommend that you upgrade your linux-tools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1349.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1350.data b/english/lts/security/2018/dla-1350.data
deleted file mode 100644
index 2ed0257496f..00000000000
--- a/english/lts/security/2018/dla-1350.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1350-1 qemu-kvm</define-tag>
-<define-tag report_date>2018-4-17</define-tag>
-<define-tag secrefs>CVE-2018-7550 Bug#892041</define-tag>
-<define-tag packages>qemu-kvm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1350.wml b/english/lts/security/2018/dla-1350.wml
deleted file mode 100644
index a1ee7a0068c..00000000000
--- a/english/lts/security/2018/dla-1350.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The load_multiboot function in hw/i386/multiboot.c in Quick Emulator
-(aka QEMU) allows local guest OS users to execute arbitrary code on
-the QEMU host via a mh_load_end_addr value greater than
-mh_bss_end_addr, which triggers an out-of-bounds read or write memory
-access.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u25.</p>
-
-<p>We recommend that you upgrade your qemu-kvm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1350.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1351.data b/english/lts/security/2018/dla-1351.data
deleted file mode 100644
index e6c0b7b84db..00000000000
--- a/english/lts/security/2018/dla-1351.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1351-1 qemu</define-tag>
-<define-tag report_date>2018-4-17</define-tag>
-<define-tag secrefs>CVE-2018-7550 Bug#892041</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1351.wml b/english/lts/security/2018/dla-1351.wml
deleted file mode 100644
index 93a8ec23917..00000000000
--- a/english/lts/security/2018/dla-1351.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The load_multiboot function in hw/i386/multiboot.c in Quick Emulator
-(aka QEMU) allows local guest OS users to execute arbitrary code on
-the QEMU host via a mh_load_end_addr value greater than
-mh_bss_end_addr, which triggers an out-of-bounds read or write memory
-access.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.2+dfsg-6+deb7u25.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1351.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1352.data b/english/lts/security/2018/dla-1352.data
deleted file mode 100644
index ef74aacfcde..00000000000
--- a/english/lts/security/2018/dla-1352.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1352-1 jruby</define-tag>
-<define-tag report_date>2018-4-17</define-tag>
-<define-tag secrefs>CVE-2018-1000074</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1352.wml b/english/lts/security/2018/dla-1352.wml
deleted file mode 100644
index 437f5520c1d..00000000000
--- a/english/lts/security/2018/dla-1352.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An unsafe object deserialization vulnerability was found in jruby, a
-100% pure-Java implementation of Ruby. An attacker can use this flaw
-to run arbitrary code when gem owner is run on a specially crafted
-YAML file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.5.6-5+deb7u2.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1352.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1353.data b/english/lts/security/2018/dla-1353.data
deleted file mode 100644
index 5b107c0e431..00000000000
--- a/english/lts/security/2018/dla-1353.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1353-1 wireshark</define-tag>
-<define-tag report_date>2018-4-18</define-tag>
-<define-tag secrefs>CVE-2018-7322 CVE-2018-7323 CVE-2018-7324 CVE-2018-7332 CVE-2018-7334 CVE-2018-7335 CVE-2018-7336 CVE-2018-7337 CVE-2018-7417 CVE-2018-7418 CVE-2018-7419 CVE-2018-7420</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1353.wml b/english/lts/security/2018/dla-1353.wml
deleted file mode 100644
index a1e810ad259..00000000000
--- a/english/lts/security/2018/dla-1353.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that wireshark, a network protocol analyzer, contained
-several vulnerabilities that could result in infinite loops in different
-dissectors. Other issues are related to crash in dissectors that are
-caused by special crafted and malformed packets.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u10.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1353.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1354.data b/english/lts/security/2018/dla-1354.data
deleted file mode 100644
index a7b8e83bfb8..00000000000
--- a/english/lts/security/2018/dla-1354.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1354-1 opencv</define-tag>
-<define-tag report_date>2018-4-18</define-tag>
-<define-tag secrefs>CVE-2018-5268 CVE-2018-5269 Bug#886674 Bug#886675</define-tag>
-<define-tag packages>opencv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1354.wml b/english/lts/security/2018/dla-1354.wml
deleted file mode 100644
index c711ca392b9..00000000000
--- a/english/lts/security/2018/dla-1354.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in OpenCV, the <q>Open Computer Vision
-Library</q>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5268">CVE-2018-5268</a>
-
- <p>In OpenCV 3.3.1, a heap-based buffer overflow happens in
- cv::Jpeg2KDecoder::readComponent8u in
- modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted
- image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5269">CVE-2018-5269</a>
-
- <p>In OpenCV 3.3.1, an assertion failure happens in
- cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp
- because of an incorrect integer cast.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.1-11+deb7u4.</p>
-
-<p>We recommend that you upgrade your opencv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1354.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1355.data b/english/lts/security/2018/dla-1355.data
deleted file mode 100644
index 6e5711a1aea..00000000000
--- a/english/lts/security/2018/dla-1355.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1355-1 mysql-5.5</define-tag>
-<define-tag report_date>2018-4-19</define-tag>
-<define-tag secrefs>CVE-2018-2755 CVE-2018-2761 CVE-2018-2771 CVE-2018-2773 CVE-2018-2781 CVE-2018-2813 CVE-2018-2817 CVE-2018-2818 CVE-2018-2819</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1355.wml b/english/lts/security/2018/dla-1355.wml
deleted file mode 100644
index 47b624fffc4..00000000000
--- a/english/lts/security/2018/dla-1355.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.60, which includes additional changes. Please see the MySQL
-5.5 Release Notes and Oracle's Critical Patch Update advisory for
-further details:</p>
-
-<ul>
- <li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-60.html"></li>
- <li><a href="http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html">http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html</a></li>
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.5.60-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1355.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1356.data b/english/lts/security/2018/dla-1356.data
deleted file mode 100644
index 3aa4de4cd32..00000000000
--- a/english/lts/security/2018/dla-1356.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1356-1 libreoffice</define-tag>
-<define-tag report_date>2018-4-19</define-tag>
-<define-tag secrefs>CVE-2018-10119 CVE-2018-10120</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1356.wml b/english/lts/security/2018/dla-1356.wml
deleted file mode 100644
index ebe7c7b5c72..00000000000
--- a/english/lts/security/2018/dla-1356.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fuzzing by the OSS-Fuzz project found two memory safety issues
-in LibreOffice, which could result in an application crash or
-possibly other unspecified impact.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:3.5.4+dfsg2-0+deb7u11.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1356.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1357.data b/english/lts/security/2018/dla-1357.data
deleted file mode 100644
index 1d3b96a37c6..00000000000
--- a/english/lts/security/2018/dla-1357.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1357-1 gunicorn</define-tag>
-<define-tag report_date>2018-4-22</define-tag>
-<define-tag secrefs>CVE-2018-1000164 Bug##896548</define-tag>
-<define-tag packages>gunicorn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1357.wml b/english/lts/security/2018/dla-1357.wml
deleted file mode 100644
index 76ac35eeb8f..00000000000
--- a/english/lts/security/2018/dla-1357.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in the gunicorn HTTP server for
-Python applicatons where CRLF sequences could result in an attacker tricking
-the server into returning arbitrary headers.</p>
-
-<p>For more information and background, please see:</p>
-
- <p><url "https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in gunicorn version
-0.14.5-3+deb7u2.</p>
-
-<p>We recommend that you upgrade your gunicorn packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1357.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1358.data b/english/lts/security/2018/dla-1358.data
deleted file mode 100644
index 085af089ba0..00000000000
--- a/english/lts/security/2018/dla-1358.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1358-1 ruby1.9.1</define-tag>
-<define-tag report_date>2018-4-23</define-tag>
-<define-tag secrefs>CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 CVE-2018-1000075 CVE-2018-1000 CVE-2018-1000077 CVE-2018-1000078</define-tag>
-<define-tag packages>ruby1.9.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1358.wml b/english/lts/security/2018/dla-1358.wml
deleted file mode 100644
index 32492692389..00000000000
--- a/english/lts/security/2018/dla-1358.wml
+++ /dev/null
@@ -1,86 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were found in the interpreter for the Ruby
-language. The Common Vulnerabilities and Exposures project identifies the
-following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17742">CVE-2017-17742</a>
-
- <p>Aaron Patterson reported that WEBrick bundled with Ruby was vulnerable to
- an HTTP response splitting vulnerability. It was possible for an attacker
- to inject fake HTTP responses if a script accepted an external input and
- output it without modifications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6914">CVE-2018-6914</a>
-
- <p>ooooooo_q discovered a directory traversal vulnerability in the
- Dir.mktmpdir method in the tmpdir library. It made it possible for
- attackers to create arbitrary directories or files via a .. (dot dot) in
- the prefix argument.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8777">CVE-2018-8777</a>
-
- <p>Eric Wong reported an out-of-memory DoS vulnerability related to a large
- request in WEBrick bundled with Ruby.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8778">CVE-2018-8778</a>
-
- <p>aerodudrizzt found a buffer under-read vulnerability in the Ruby
- String#unpack method. If a big number was passed with the specifier @,
- the number was treated as a negative value, and an out-of-buffer read
- occurred. Attackers could read data on heaps if an script accepts an
- external input as the argument of String#unpack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8779">CVE-2018-8779</a>
-
- <p>ooooooo_q reported that the UNIXServer.open and UNIXSocket.open
- methods of the socket library bundled with Ruby did not check for NUL
- bytes in the path argument. The lack of check made the methods
- vulnerable to unintentional socket creation and unintentional socket
- access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8780">CVE-2018-8780</a>
-
- <p>ooooooo_q discovered an unintentional directory traversal in
- some methods in Dir, by the lack of checking for NUL bytes in their
- parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000075">CVE-2018-1000075</a>
-
- <p>A negative size vulnerability in ruby gem package tar header that could
- cause an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000076">CVE-2018-1000076</a>
-
- <p>Ruby gems package improperly verifies cryptographic signatures. A mis-signed
- gem could be installed if the tarball contains multiple gem signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000077">CVE-2018-1000077</a>
-
- <p>An improper input validation vulnerability in ruby gems specification
- homepage attribute could allow malicious gem to set an invalid homepage
- URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000078">CVE-2018-1000078</a>
-
- <p>Cross Site Scripting (XSS) vulnerability in gem server display of homepage
- attribute</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.9.3.194-8.1+deb7u8.</p>
-
-<p>We recommend that you upgrade your ruby1.9.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1358.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1359.data b/english/lts/security/2018/dla-1359.data
deleted file mode 100644
index 6f33529f642..00000000000
--- a/english/lts/security/2018/dla-1359.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1359-1 ruby1.8</define-tag>
-<define-tag report_date>2018-4-23</define-tag>
-<define-tag secrefs>CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780</define-tag>
-<define-tag packages>ruby1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1359.wml b/english/lts/security/2018/dla-1359.wml
deleted file mode 100644
index dce56a113bd..00000000000
--- a/english/lts/security/2018/dla-1359.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in the interpreter for the Ruby
-language. The Common Vulnerabilities and Exposures project identifies the
-following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17742">CVE-2017-17742</a>
-
- <p>Aaron Patterson reported that WEBrick bundled with Ruby was vulnerable to
- an HTTP response splitting vulnerability. It was possible for an attacker
- to inject fake HTTP responses if a script accepted an external input and
- output it without modifications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6914">CVE-2018-6914</a>
-
- <p>ooooooo_q discovered a directory traversal vulnerability in the
- Dir.mktmpdir method in the tmpdir library. It made it possible for
- attackers to create arbitrary directories or files via a .. (dot dot) in
- the prefix argument.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8777">CVE-2018-8777</a>
-
- <p>Eric Wong reported an out-of-memory DoS vulnerability related to a large
- request in WEBrick bundled with Ruby.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8778">CVE-2018-8778</a>
-
- <p>aerodudrizzt found a buffer under-read vulnerability in the Ruby
- String#unpack method. If a big number was passed with the specifier @,
- the number was treated as a negative value, and an out-of-buffer read
- occurred. Attackers could read data on heaps if an script accepts an
- external input as the argument of String#unpack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8779">CVE-2018-8779</a>
-
- <p>ooooooo_q reported that the UNIXServer.open and UNIXSocket.open
- methods of the socket library bundled with Ruby did not check for NUL
- bytes in the path argument. The lack of check made the methods
- vulnerable to unintentional socket creation and unintentional socket
- access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8780">CVE-2018-8780</a>
-
- <p>ooooooo_q discovered an unintentional directory traversal in
- some methods in Dir, by the lack of checking for NUL bytes in their
- parameter.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.8.7.358-7.1+deb7u6.</p>
-
-<p>We recommend that you upgrade your ruby1.8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1359.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1360.data b/english/lts/security/2018/dla-1360.data
deleted file mode 100644
index 04a6db43fbc..00000000000
--- a/english/lts/security/2018/dla-1360.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1360-1 lucene-solr</define-tag>
-<define-tag report_date>2018-4-24</define-tag>
-<define-tag secrefs>CVE-2018-1308 Bug##896604</define-tag>
-<define-tag packages>lucene-solr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1360.wml b/english/lts/security/2018/dla-1360.wml
deleted file mode 100644
index 2a0623b7063..00000000000
--- a/english/lts/security/2018/dla-1360.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an XML external entity expansion (XXE)
-vulnerability in lucene-solr, a search engine library for Java.</p>
-
-<p>It could be exploited to read arbitrary local files from the Solr server
-or the internal network. For Debian 7 <q>Wheezy</q>, this issue has been fixed
-in lucene-solr version 3.6.0+dfsg-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your lucene-solr packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1360.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1361.data b/english/lts/security/2018/dla-1361.data
deleted file mode 100644
index 08d47eec57c..00000000000
--- a/english/lts/security/2018/dla-1361.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1361-1 psensor</define-tag>
-<define-tag report_date>2018-4-24</define-tag>
-<define-tag secrefs>CVE-2014-10073 Bug#896195</define-tag>
-<define-tag packages>psensor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1361.wml b/english/lts/security/2018/dla-1361.wml
deleted file mode 100644
index bbf5d456cb3..00000000000
--- a/english/lts/security/2018/dla-1361.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that psensor, a server for monitoring hardware
-sensors remotely, was prone to a directory traversal vulnerability
-because the create_response function in server/server.c lacks a check
-for whether a file is under the webserver directory.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.6.2.17-2+deb7u1.</p>
-
-<p>We recommend that you upgrade your psensor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1361.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1362.data b/english/lts/security/2018/dla-1362.data
deleted file mode 100644
index f290d7c84f9..00000000000
--- a/english/lts/security/2018/dla-1362.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1362-1 gcc-4.9-backport</define-tag>
-<define-tag report_date>2018-4-25</define-tag>
-<define-tag packages>gcc-4.9-backport</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1362.wml b/english/lts/security/2018/dla-1362.wml
deleted file mode 100644
index 19eeda09e0e..00000000000
--- a/english/lts/security/2018/dla-1362.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>GCC 4.9 has been packaged as gcc-4.9-backport for Debian 7. This
-package will be needed by future updates to linux, and possibly other
-packages, to implement the <q>retpoline</q> mitigation for <a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>
-(Spectre variant 2).</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in gcc-4.9-backport version 4.9.2-10+deb7u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1362.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1363.data b/english/lts/security/2018/dla-1363.data
deleted file mode 100644
index 779eb8904eb..00000000000
--- a/english/lts/security/2018/dla-1363.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1363-1 ghostscript</define-tag>
-<define-tag report_date>2018-4-25</define-tag>
-<define-tag secrefs>CVE-2018-10194 Bug#896069</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1363.wml b/english/lts/security/2018/dla-1363.wml
deleted file mode 100644
index eaaf2ad10d6..00000000000
--- a/english/lts/security/2018/dla-1363.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the set_text_distance function in
-base/gdevpdts.c in the pdfwrite component in Ghostscript does not
-prevent overflows in text-positioning calculation, which allows remote
-attackers to cause a denial of service (application crash) or possibly
-have unspecified other impact via a crafted PDF document.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-9.05~dfsg-6.3+deb7u8.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1363.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1364.data b/english/lts/security/2018/dla-1364.data
deleted file mode 100644
index 125f5e62e42..00000000000
--- a/english/lts/security/2018/dla-1364.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1364-1 openslp-dfsg</define-tag>
-<define-tag report_date>2018-4-25</define-tag>
-<define-tag secrefs>CVE-2017-17833</define-tag>
-<define-tag packages>openslp-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1364.wml b/english/lts/security/2018/dla-1364.wml
deleted file mode 100644
index 907cac32e57..00000000000
--- a/english/lts/security/2018/dla-1364.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17833">CVE-2017-17833</a>
-
- <p>An issue has been found in openslp that is related to heap memory
- corruption, which may result in a denial-of-service or remote
- code execution.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.2.1-9+deb7u2.</p>
-
-<p>We recommend that you upgrade your openslp-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1364.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1365.data b/english/lts/security/2018/dla-1365.data
deleted file mode 100644
index 7b0e238ad38..00000000000
--- a/english/lts/security/2018/dla-1365.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1365-1 drupal7</define-tag>
-<define-tag report_date>2018-4-26</define-tag>
-<define-tag secrefs>CVE-2018-7602 Bug#895778</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1365.wml b/english/lts/security/2018/dla-1365.wml
deleted file mode 100644
index 2828cd825a5..00000000000
--- a/english/lts/security/2018/dla-1365.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A remote code execution vulnerability has been found within multiple
-subsystems of Drupal. This potentially allows attackers to exploit
-multiple attack vectors on a Drupal site, which could result in the
-site being compromised.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-7.14-2+deb7u19.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1365.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1366.data b/english/lts/security/2018/dla-1366.data
deleted file mode 100644
index 4c9255e4a3e..00000000000
--- a/english/lts/security/2018/dla-1366.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1366-1 wordpress</define-tag>
-<define-tag report_date>2018-4-27</define-tag>
-<define-tag secrefs>CVE-2018-10100 CVE-2018-10102 Bug#895034</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1366.wml b/english/lts/security/2018/dla-1366.wml
deleted file mode 100644
index 7d907fb2e17..00000000000
--- a/english/lts/security/2018/dla-1366.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10100">CVE-2018-10100</a>
-
- <p>The redirection URL for the login page was not validated or sanitized
- if forced to use HTTPS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10102">CVE-2018-10102</a>
-
- <p>The version string was not escaped in the get_the_generator function,
- and could lead to cross-site scripting (XSS) in a generator tag.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.6.1+dfsg-1~deb7u21.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1366.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1367.data b/english/lts/security/2018/dla-1367.data
deleted file mode 100644
index 52df9ab4a3a..00000000000
--- a/english/lts/security/2018/dla-1367.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1367-1 slurm-llnl</define-tag>
-<define-tag report_date>2018-4-28</define-tag>
-<define-tag secrefs>CVE-2018-7033</define-tag>
-<define-tag packages>slurm-llnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1367.wml b/english/lts/security/2018/dla-1367.wml
deleted file mode 100644
index c0e694eca8b..00000000000
--- a/english/lts/security/2018/dla-1367.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7033">CVE-2018-7033</a>
- <p>An issue that could be used for SQL Injection attacks against
- SlurmDBD has been fixed.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.3.4-2+deb7u2.</p>
-
-<p>We recommend that you upgrade your slurm-llnl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1367.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1368.data b/english/lts/security/2018/dla-1368.data
deleted file mode 100644
index c4649833e43..00000000000
--- a/english/lts/security/2018/dla-1368.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1368-1 libvorbis</define-tag>
-<define-tag report_date>2018-4-30</define-tag>
-<define-tag secrefs>CVE-2017-11333 CVE-2017-14632 CVE-2017-14633 CVE-2018-5146</define-tag>
-<define-tag packages>libvorbis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1368.wml b/english/lts/security/2018/dla-1368.wml
deleted file mode 100644
index e18afc33023..00000000000
--- a/english/lts/security/2018/dla-1368.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Serious vulnerabilities were found in the libvorbis library, commonly
-used to encode and decode audio in OGG containers.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14633">CVE-2017-14633</a>
-
- <p>In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read
- vulnerability exists in the function mapping0_forward() in
- mapping0.c, which may lead to DoS when operating on a crafted
- audio file with vorbis_analysis().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14632">CVE-2017-14632</a>
-
- <p>Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon
- freeing uninitialized memory in the function
- vorbis_analysis_headerout() in info.c when vi->channels<=0, a
- similar issue to Mozilla bug 550184.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11333">CVE-2017-11333</a>
-
- <p>The vorbis_analysis_wrote function in lib/block.c in Xiph.Org
- libvorbis 1.3.5 allows remote attackers to cause a denial of
- service (OOM) via a crafted wav file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5146">CVE-2018-5146</a>
-
- <p>out-of-bounds memory write in the codeboook parsing code of the
- Libvorbis multimedia library could result in the execution of
- arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.3.2-1.3+deb7u1.</p>
-
-<p>We recommend that you upgrade your libvorbis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1368.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1369.data b/english/lts/security/2018/dla-1369.data
deleted file mode 100644
index 2394f81299a..00000000000
--- a/english/lts/security/2018/dla-1369.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1369-1 linux</define-tag>
-<define-tag report_date>2018-5-2</define-tag>
-<define-tag secrefs>CVE-2017-0861 CVE-2017-5715 CVE-2017-13166 CVE-2017-16526 CVE-2017-16911 CVE-2017-16912 CVE-2017-16913 CVE-2017-1691 CVE-2017-18017 CVE-2017-18203 CVE-2017-18216 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332 CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927 CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757 CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004 CVE-2018-1000199 Bug#887106</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1369.wml b/english/lts/security/2018/dla-1369.wml
deleted file mode 100644
index cc5a975640c..00000000000
--- a/english/lts/security/2018/dla-1369.wml
+++ /dev/null
@@ -1,241 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0861">CVE-2017-0861</a>
-
- <p>Robb Glasser reported a potential use-after-free in the ALSA (sound)
- PCM core. We believe this was not possible in practice.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>
-
- <p>Multiple researchers have discovered a vulnerability in various
- processors supporting speculative execution, enabling an attacker
- controlling an unprivileged process to read memory from arbitrary
- addresses, including from the kernel and all other processes
- running on the system.</p>
-
- <p>This specific attack has been named Spectre variant 2 (branch
- target injection) and is mitigated for the x86 architecture (amd64
- and i386) by using the <q>retpoline</q> compiler feature which allows
- indirect branches to be isolated from speculative execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13166">CVE-2017-13166</a>
-
- <p>A bug in the 32-bit compatibility layer of the v4l2 ioctl handling
- code has been found. Memory protections ensuring user-provided
- buffers always point to userland memory were disabled, allowing
- destination addresses to be in kernel space. On a 64-bit kernel
- (amd64 flavour) a local user with access to a suitable video
- device can exploit this to overwrite kernel memory, leading to
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16526">CVE-2017-16526</a>
-
- <p>Andrey Konovalov reported that the UWB subsystem may dereference
- an invalid pointer in an error case. A local user might be able
- to use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16911">CVE-2017-16911</a>
-
- <p>Secunia Research reported that the USB/IP vhci_hcd driver exposed
- kernel heap addresses to local users. This information could aid the
- exploitation of other vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16912">CVE-2017-16912</a>
-
- <p>Secunia Research reported that the USB/IP stub driver failed to
- perform a range check on a received packet header field, leading
- to an out-of-bounds read. A remote user able to connect to the
- USB/IP server could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16913">CVE-2017-16913</a>
-
- <p>Secunia Research reported that the USB/IP stub driver failed to
- perform a range check on a received packet header field, leading
- to excessive memory allocation. A remote user able to connect to
- the USB/IP server could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16914">CVE-2017-16914</a>
-
- <p>Secunia Research reported that the USB/IP stub driver failed to
- check for an invalid combination of fields in a recieved packet,
- leading to a null pointer dereference. A remote user able to
- connect to the USB/IP server could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18017">CVE-2017-18017</a>
-
- <p>Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module
- failed to validate TCP header lengths, potentially leading to a
- use-after-free. If this module is loaded, it could be used by a
- remote attacker for denial of service or possibly for code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18203">CVE-2017-18203</a>
-
- <p>Hou Tao reported that there was a race condition in creation and
- deletion of device-mapper (DM) devices. A local user could
- potentially use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18216">CVE-2017-18216</a>
-
- <p>Alex Chen reported that the OCFS2 filesystem failed to hold a
- necessary lock during nodemanager sysfs file operations,
- potentially leading to a null pointer dereference. A local user
- could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1068">CVE-2018-1068</a>
-
- <p>The syzkaller tool found that the 32-bit compatibility layer of
- ebtables did not sufficiently validate offset values. On a 64-bit
- kernel (amd64 flavour), a local user with the CAP_NET_ADMIN
- capability could use this to overwrite kernel memory, possibly
- leading to privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1092">CVE-2018-1092</a>
-
- <p>Wen Xu reported that a crafted ext4 filesystem image would
- trigger a null dereference when mounted. A local user able
- to mount arbitrary filesystems could use this for denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5332">CVE-2018-5332</a>
-
- <p>Mohamed Ghannam reported that the RDS protocol did not
- sufficiently validate RDMA requests, leading to an out-of-bounds
- write. A local attacker on a system with the rds module loaded
- could use this for denial of service or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5333">CVE-2018-5333</a>
-
- <p>Mohamed Ghannam reported that the RDS protocol did not properly
- handle an error case, leading to a null pointer dereference. A
- local attacker on a system with the rds module loaded could
- possibly use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5750">CVE-2018-5750</a>
-
- <p>Wang Qize reported that the ACPI sbshc driver logged a kernel heap
- address. This information could aid the exploitation of other
- vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5803">CVE-2018-5803</a>
-
- <p>Alexey Kodanev reported that the SCTP protocol did not range-check
- the length of chunks to be created. A local or remote user could
- use this to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6927">CVE-2018-6927</a>
-
- <p>Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did
- not check for negative parameter values, which might lead to a
- denial of service or other security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7492">CVE-2018-7492</a>
-
- <p>The syzkaller tool found that the RDS protocol was lacking a null
- pointer check. A local attacker on a system with the rds module
- loaded could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7566">CVE-2018-7566</a>
-
- <p>范龙飞 (Fan LongFei) reported a race condition in the ALSA (sound)
- sequencer core, between write and ioctl operations. This could
- lead to an out-of-bounds access or use-after-free. A local user
- with access to a sequencer device could use this for denial of
- service or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7740">CVE-2018-7740</a>
-
- <p>Nic Losby reported that the hugetlbfs filesystem's mmap operation
- did not properly range-check the file offset. A local user with
- access to files on a hugetlbfs filesystem could use this to cause
- a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7757">CVE-2018-7757</a>
-
- <p>Jason Yan reported a memory leak in the SAS (Serial-Attached
- SCSI) subsystem. A local user on a system with SAS devices
- could use this to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7995">CVE-2018-7995</a>
-
- <p>Seunghun Han reported a race condition in the x86 MCE
- (Machine Check Exception) driver. This is unlikely to have
- any security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8781">CVE-2018-8781</a>
-
- <p>Eyal Itkin reported that the udl (DisplayLink) driver's mmap
- operation did not properly range-check the file offset. A local
- user with access to a udl framebuffer device could exploit this to
- overwrite kernel memory, leading to privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8822">CVE-2018-8822</a>
-
- <p>Dr Silvio Cesare of InfoSect reported that the ncpfs client
- implementation did not validate reply lengths from the server. An
- ncpfs server could use this to cause a denial of service or
- remote code execution in the client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000004">CVE-2018-1000004</a>
-
- <p>Luo Quan reported a race condition in the ALSA (sound) sequencer
- core, between multiple ioctl operations. This could lead to a
- deadlock or use-after-free. A local user with access to a
- sequencer device could use this for denial of service or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000199">CVE-2018-1000199</a>
-
- <p>Andy Lutomirski discovered that the ptrace subsystem did not
- sufficiently validate hardware breakpoint settings. Local users
- can use this to cause a denial of service, or possibly for
- privilege escalation, on x86 (amd64 and i386) and possibly other
- architectures.</p></li>
-
-</ul>
-
-<p>Additionally, some mitigations for <a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-are included in this release:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-
- <p>Multiple researchers have discovered a vulnerability in various
- processors supporting speculative execution, enabling an attacker
- controlling an unprivileged process to read memory from arbitrary
- addresses, including from the kernel and all other processes
- running on the system.</p>
-
- <p>This specific attack has been named Spectre variant 1
- (bounds-check bypass) and is mitigated by identifying vulnerable
- code sections (array bounds checking followed by array access) and
- replacing the array access with the speculation-safe
- array_index_nospec() function.</p>
-
- <p>More use sites will be added over time.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.101-1. This version also includes bug fixes from upstream versions
-up to and including 3.2.101. It also fixes a regression in the
-procfs hidepid option in the previous version (Debian bug #887106).</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1369.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1370.data b/english/lts/security/2018/dla-1370.data
deleted file mode 100644
index 88e2a891c19..00000000000
--- a/english/lts/security/2018/dla-1370.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1370-1 quassel</define-tag>
-<define-tag report_date>2018-5-4</define-tag>
-<define-tag secrefs>CVE-2018-1000178</define-tag>
-<define-tag packages>quassel</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1370.wml b/english/lts/security/2018/dla-1370.wml
deleted file mode 100644
index 7d2bfa627c8..00000000000
--- a/english/lts/security/2018/dla-1370.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the Quassel IRC client was vulnerable to a remote
-code execution vulnerability due to insufficient checks in the
-deserializer code.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.8.0-1+deb7u4.</p>
-
-<p>We recommend that you upgrade your quassel packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1370.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1371.data b/english/lts/security/2018/dla-1371.data
deleted file mode 100644
index 93f32d96861..00000000000
--- a/english/lts/security/2018/dla-1371.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1371-1 tzdata</define-tag>
-<define-tag report_date>2018-5-5</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1371.wml b/english/lts/security/2018/dla-1371.wml
deleted file mode 100644
index 892961759b8..00000000000
--- a/english/lts/security/2018/dla-1371.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018e. Notable
-changes are:</p>
-<p> North Korea switches back to +09 on 2018-05-05.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2018e-0+deb7u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1371.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1372.data b/english/lts/security/2018/dla-1372.data
deleted file mode 100644
index ac9b2037191..00000000000
--- a/english/lts/security/2018/dla-1372.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1372-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2018-5-5</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1372.wml b/english/lts/security/2018/dla-1372.wml
deleted file mode 100644
index adf9e729380..00000000000
--- a/english/lts/security/2018/dla-1372.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018e for the
-Perl bindings. For the list of changes, see DLA-1371-1.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:1.58-1+2018e.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1372.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1373.data b/english/lts/security/2018/dla-1373.data
deleted file mode 100644
index 0ed6ce5ffe6..00000000000
--- a/english/lts/security/2018/dla-1373.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1373-1 php5</define-tag>
-<define-tag report_date>2018-5-9</define-tag>
-<define-tag secrefs>CVE-2018-10545 CVE-2018-10547 CVE-2018-10548</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1373.wml b/english/lts/security/2018/dla-1373.wml
deleted file mode 100644
index 185317a3e57..00000000000
--- a/english/lts/security/2018/dla-1373.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in PHP (recursive acronym for PHP:
-Hypertext Preprocessor), a widely-used open source general-purpose
-scripting language that is especially suited for web development and can
-be embedded into HTML.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10545">CVE-2018-10545</a>
-
- <p>Dumpable FPM child processes allow bypassing opcache access
- controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call,
- allowing one user (in a multiuser environment) to obtain sensitive
- information from the process memory of a second user's PHP
- applications by running gcore on the PID of the PHP-FPM worker
- process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10547">CVE-2018-10547</a>
-
- <p>There is a reflected XSS on the PHAR 403 and 404 error pages via
- request data of a request for a .phar file. NOTE: this vulnerability
- exists because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-5712">CVE-2018-5712</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10548">CVE-2018-10548</a>
-
- <p>ext/ldap/ldap.c allows remote LDAP servers to cause a denial of
- service (NULL pointer dereference and application crash) because of
- mishandling of the ldap_get_dn return value.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-5.4.45-0+deb7u14.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1373.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1374.data b/english/lts/security/2018/dla-1374.data
deleted file mode 100644
index 591f44fd5ce..00000000000
--- a/english/lts/security/2018/dla-1374.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1374-1 firebird2.5</define-tag>
-<define-tag report_date>2018-5-11</define-tag>
-<define-tag secrefs>CVE-2017-11509</define-tag>
-<define-tag packages>firebird2.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1374.wml b/english/lts/security/2018/dla-1374.wml
deleted file mode 100644
index b17fadfbd55..00000000000
--- a/english/lts/security/2018/dla-1374.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An authenticated remote attacker can execute arbitrary code in Firebird SQL
-Server versions 2.5.7 and 3.0.2 by executing a malformed SQL statement. The
-only known solution is to disable external UDF libraries from being loaded. In
-order to achieve this, the default configuration has changed to UdfAccess=None.
-This will prevent the fbudf module from being loaded, but may also break other
-functionality relying on modules.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.5.2.26540.ds4-1~deb7u4.</p>
-
-<p>We recommend that you upgrade your firebird2.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1374.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1375.data b/english/lts/security/2018/dla-1375.data
deleted file mode 100644
index b551fa5b791..00000000000
--- a/english/lts/security/2018/dla-1375.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1375-1 wget</define-tag>
-<define-tag report_date>2018-5-11</define-tag>
-<define-tag secrefs>CVE-2018-0494 Bug#898076</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1375.wml b/english/lts/security/2018/dla-1375.wml
deleted file mode 100644
index cf34cbadba0..00000000000
--- a/english/lts/security/2018/dla-1375.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Harry Sintonen have discovered a cookie injection vulnerability in
-wget caused by insufficient input validation, enabling an external
-attacker to inject arbitrary cookie values cookie jar file, adding new
-or replacing existing cookie values.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.13.4-3+deb7u6.</p>
-
-<p>We recommend that you upgrade your wget packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1375.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1376.data b/english/lts/security/2018/dla-1376.data
deleted file mode 100644
index ff7cde0c276..00000000000
--- a/english/lts/security/2018/dla-1376.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1376-1 firefox-esr</define-tag>
-<define-tag report_date>2018-5-11</define-tag>
-<define-tag secrefs>CVE-2018-5150 CVE-2018-5154 CVE-2018-5155 CVE-2018-5157 CVE-2018-5158 CVE-2018-5159 CVE-2018-5168 CVE-2018-5178 CVE-2018-5183</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1376.wml b/english/lts/security/2018/dla-1376.wml
deleted file mode 100644
index 67e993591c8..00000000000
--- a/english/lts/security/2018/dla-1376.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors and other implementation errors
-may lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-52.8.0esr-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1376.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1377.data b/english/lts/security/2018/dla-1377.data
deleted file mode 100644
index 79f078eb65a..00000000000
--- a/english/lts/security/2018/dla-1377.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1377-1 tiff</define-tag>
-<define-tag report_date>2018-5-14</define-tag>
-<define-tag secrefs>CVE-2018-8905 Bug#893806</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1377.wml b/english/lts/security/2018/dla-1377.wml
deleted file mode 100644
index 7da6611f953..00000000000
--- a/english/lts/security/2018/dla-1377.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer overflow was discovered in the LZWDecodeCompat
-function in tif_lzw.c (LibTIFF 4.0.9 and earlier). This vulnerability
-might be leveraged by remote attackers to crash the client via a
-crafted TIFF LZW file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u20.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1377.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1378.data b/english/lts/security/2018/dla-1378.data
deleted file mode 100644
index d0d4d58ab64..00000000000
--- a/english/lts/security/2018/dla-1378.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1378-1 tiff3</define-tag>
-<define-tag report_date>2018-5-14</define-tag>
-<define-tag secrefs>CVE-2018-8905 Bug#893806</define-tag>
-<define-tag packages>tiff3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1378.wml b/english/lts/security/2018/dla-1378.wml
deleted file mode 100644
index 800940dc3a1..00000000000
--- a/english/lts/security/2018/dla-1378.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer overflow was discovered in the LZWDecodeCompat
-function in tif_lzw.c (LibTIFF 4.0.9 and earlier). This vulnerability
-might be leveraged by remote attackers to crash the client via a
-crafted TIFF LZW file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.9.6-11+deb7u11.</p>
-
-<p>We recommend that you upgrade your tiff3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1378.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1379.data b/english/lts/security/2018/dla-1379.data
deleted file mode 100644
index c0ee87f2c70..00000000000
--- a/english/lts/security/2018/dla-1379.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1379-1 curl</define-tag>
-<define-tag report_date>2018-5-16</define-tag>
-<define-tag secrefs>CVE-2018-1000301 Bug##898856</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1379.wml b/english/lts/security/2018/dla-1379.wml
deleted file mode 100644
index 5d686d171ee..00000000000
--- a/english/lts/security/2018/dla-1379.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in the curl a command-line tool
-for downloading (eg.) data over HTTP.</p>
-
-<p>curl could have be tricked into reading data beyond the end of a heap
-based buffer used to store downloaded content.</p>
-
-<p>For more information, please see upstream's advisory at:</p>
-
- <p><url "https://curl.haxx.se/docs/adv_2018-b138.html"></p>
-
-<p>For Debian 7 <q>Wheezy</q>, this issue has been fixed in curl version
-7.26.0-1+wheezy25+deb7u1.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1379.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1380.data b/english/lts/security/2018/dla-1380.data
deleted file mode 100644
index dd2d3fbbf8b..00000000000
--- a/english/lts/security/2018/dla-1380.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1380-1 libmad</define-tag>
-<define-tag report_date>2018-5-18</define-tag>
-<define-tag secrefs>CVE-2017-8372 CVE-2017-8373 CVE-2017-8374</define-tag>
-<define-tag packages>libmad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1380.wml b/english/lts/security/2018/dla-1380.wml
deleted file mode 100644
index 8e872e92e75..00000000000
--- a/english/lts/security/2018/dla-1380.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in MAD, an MPEG audio decoder
-library, which could result in denial of service if a malformed audio
-file is processed.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-0.15.1b-7+deb7u1.</p>
-
-<p>We recommend that you upgrade your libmad packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1380.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1381.data b/english/lts/security/2018/dla-1381.data
deleted file mode 100644
index 0c28f56a5b6..00000000000
--- a/english/lts/security/2018/dla-1381.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1381-1 imagemagick</define-tag>
-<define-tag report_date>2018-5-23</define-tag>
-<define-tag secrefs>CVE-2017-18271 CVE-2017-18273 CVE-2018-11251</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1381.wml b/english/lts/security/2018/dla-1381.wml
deleted file mode 100644
index 6a7a96bbc03..00000000000
--- a/english/lts/security/2018/dla-1381.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in ImageMagick, an
-image manipulation program, that allow remote attackers to cause a
-denial of service via CPU exhaustion (infinite loop) or heap-based
-buffer overreads with a crafted image file.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-8:6.7.7.10-5+deb7u22.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1381.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1382.data b/english/lts/security/2018/dla-1382.data
deleted file mode 100644
index c5f7848a4f3..00000000000
--- a/english/lts/security/2018/dla-1382.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1382-1 thunderbird</define-tag>
-<define-tag report_date>2018-5-25</define-tag>
-<define-tag secrefs>CVE-2018-5150 CVE-2018-5154 CVE-2018-5155 CVE-2018-5159 CVE-2018-5161 CVE-2018-5162 CVE-2018-5168 CVE-2018-5170 CVE-2018-5178 CVE-2018-5183 CVE-2018-5184 CVE-2018-5185</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1382.wml b/english/lts/security/2018/dla-1382.wml
deleted file mode 100644
index acd93b203d6..00000000000
--- a/english/lts/security/2018/dla-1382.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code, denial of service or attacks on
-encrypted emails.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:52.8.0-1~deb7u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1382.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1383.data b/english/lts/security/2018/dla-1383.data
deleted file mode 100644
index 4e3a3cdb05c..00000000000
--- a/english/lts/security/2018/dla-1383.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1383-1 xen</define-tag>
-<define-tag report_date>2018-5-25</define-tag>
-<define-tag secrefs>CVE-2018-8897 CVE-2018-10981 CVE-2018-10982</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1383.wml b/english/lts/security/2018/dla-1383.wml
deleted file mode 100644
index 86b414be766..00000000000
--- a/english/lts/security/2018/dla-1383.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, informations leaks or privilege
-escalation.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.1.6.lts1-14.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1383.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1384.data b/english/lts/security/2018/dla-1384.data
deleted file mode 100644
index 7d640dcf862..00000000000
--- a/english/lts/security/2018/dla-1384.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1384-1 xdg-utils</define-tag>
-<define-tag report_date>2018-5-25</define-tag>
-<define-tag secrefs>CVE-2017-18266 Bug#898317</define-tag>
-<define-tag packages>xdg-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1384.wml b/english/lts/security/2018/dla-1384.wml
deleted file mode 100644
index 55843059a14..00000000000
--- a/english/lts/security/2018/dla-1384.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was found that the open_envvar function in xdg-utils does not
-validate strings before launching the program specified by the BROWSER
-environment variable, which might allow remote attackers to conduct
-argument-injection attacks via a crafted URL.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.1.0~rc1+git20111210-6+deb7u4.</p>
-
-<p>We recommend that you upgrade your xdg-utils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1384.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1385.data b/english/lts/security/2018/dla-1385.data
deleted file mode 100644
index c385fbbc5f3..00000000000
--- a/english/lts/security/2018/dla-1385.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1385-1 batik</define-tag>
-<define-tag report_date>2018-5-25</define-tag>
-<define-tag secrefs>CVE-2018-8013 Bug#899374</define-tag>
-<define-tag packages>batik</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1385.wml b/english/lts/security/2018/dla-1385.wml
deleted file mode 100644
index e17dafa28ff..00000000000
--- a/english/lts/security/2018/dla-1385.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Man Yue Mo discovered a security vulnerability in Apache Batik, an SVG
-image library. A missing check for the class type before calling
-newInstance when deserializing a subclass of AbstractDocument could
-lead to information disclosure.</p>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.7+dfsg-3+deb7u3.</p>
-
-<p>We recommend that you upgrade your batik packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1385.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1386.data b/english/lts/security/2018/dla-1386.data
deleted file mode 100644
index 09478f89511..00000000000
--- a/english/lts/security/2018/dla-1386.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1386-1 ming</define-tag>
-<define-tag report_date>2018-5-26</define-tag>
-<define-tag secrefs>CVE-2018-7866 CVE-2018-7873 CVE-2018-7876 CVE-2018-9009 CVE-2018-9132</define-tag>
-<define-tag packages>ming</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1386.wml b/english/lts/security/2018/dla-1386.wml
deleted file mode 100644
index 42317815d3f..00000000000
--- a/english/lts/security/2018/dla-1386.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Ming:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7866">CVE-2018-7866</a>
-
- <p>NULL pointer dereference in the newVar3 function (util/decompile.c).
- Remote attackers might leverage this vulnerability to cause a denial
- of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7873">CVE-2018-7873</a>
-
- <p>Heap-based buffer overflow vulnerability in the getString function
- (util/decompile.c). Remote attackers might leverage this vulnerability
- to cause a denial of service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7876">CVE-2018-7876</a>
-
- <p>Integer overflow and resulting memory exhaustion in the
- parseSWF_ACTIONRECORD function (util/parser.c). Remote attackers might
- leverage this vulnerability to cause a denial of service via a crafted
- swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9009">CVE-2018-9009</a>
-
- <p>Various heap-based buffer overflow vulnerabilites in util/decompiler.c.
- Remote attackers might leverage this vulnerability to cause a denial of
- service via a crafted swf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9132">CVE-2018-9132</a>
-
- <p>NULL pointer dereference in the getInt function (util/decompile.c).
- Remote attackers might leverage this vulnerability to cause a denial
- of service via a crafted swf file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:0.4.4-1.1+deb7u9.</p>
-
-<p>We recommend that you upgrade your ming packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1386.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1387.data b/english/lts/security/2018/dla-1387.data
deleted file mode 100644
index 1cbf5b2044f..00000000000
--- a/english/lts/security/2018/dla-1387.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1387-1 cups</define-tag>
-<define-tag report_date>2018-5-26</define-tag>
-<define-tag secrefs>CVE-2017-18248</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1387.wml b/english/lts/security/2018/dla-1387.wml
deleted file mode 100644
index f65c72c1134..00000000000
--- a/english/lts/security/2018/dla-1387.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18248">CVE-2017-18248</a>
- <p>It was found that by submitting a print job with an invalid username,
- the CUPS server can be crashed, when D-Bus support is enabled (which
- is the case for Debian).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.5.3-5+deb7u8.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1387.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1388.data b/english/lts/security/2018/dla-1388.data
deleted file mode 100644
index 8a47ceec1d2..00000000000
--- a/english/lts/security/2018/dla-1388.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1388-1 wireshark</define-tag>
-<define-tag report_date>2018-5-28</define-tag>
-<define-tag secrefs>CVE-2018-9258 CVE-2018-9260 CVE-2018-9261 CVE-2018-9263 CVE-2018-9268 CVE-2018-9269 CVE-2018-9270 CVE-2018-11358 CVE-2018-11362</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1388.wml b/english/lts/security/2018/dla-1388.wml
deleted file mode 100644
index b83d0ef4f3e..00000000000
--- a/english/lts/security/2018/dla-1388.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues that could result in a crash within different dissectors
-have been fixed. Other issues are related to memory leaks or heap-based
-buffer overflows.</p>
-
-<p>All issue could be caused by special crafted and malformed packets.</p>
-
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u6~deb7u11.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1388.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1389.data b/english/lts/security/2018/dla-1389.data
deleted file mode 100644
index d560fe09434..00000000000
--- a/english/lts/security/2018/dla-1389.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1389-1 apache2</define-tag>
-<define-tag report_date>2018-5-30</define-tag>
-<define-tag secrefs>CVE-2017-15710 CVE-2018-1301 CVE-2018-1312</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1389.wml b/english/lts/security/2018/dla-1389.wml
deleted file mode 100644
index 049e9dc7f6c..00000000000
--- a/english/lts/security/2018/dla-1389.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been found in the Apache HTTPD server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15710">CVE-2017-15710</a>
-
- <p>Alex Nichols and Jakob Hirsch reported that mod_authnz_ldap, if
- configured with AuthLDAPCharsetConfig, could cause an of bound write
- if supplied with a crafted Accept-Language header. This could
- potentially be used for a Denial of Service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1301">CVE-2018-1301</a>
-
- <p>Robert Swiecki reported that a specially crafted request could have
- crashed the Apache HTTP Server, due to an out of bound access after
- a size limit is reached by reading the HTTP header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1312">CVE-2018-1312</a>
-
- <p>Nicolas Daniels discovered that when generating an HTTP Digest
- authentication challenge, the nonce sent by mod_auth_digest to
- prevent reply attacks was not correctly generated using a
- pseudo-random seed. In a cluster of servers using a common Digest
- authentication configuration, HTTP requests could be replayed across
- servers by an attacker without detection.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-2.2.22-13+deb7u13.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1389.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1390.data b/english/lts/security/2018/dla-1390.data
deleted file mode 100644
index c7872894239..00000000000
--- a/english/lts/security/2018/dla-1390.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1390-1 procps</define-tag>
-<define-tag report_date>2018-5-31</define-tag>
-<define-tag secrefs>CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 Bug##899170</define-tag>
-<define-tag packages>procps</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1390.wml b/english/lts/security/2018/dla-1390.wml
deleted file mode 100644
index db837d69c10..00000000000
--- a/english/lts/security/2018/dla-1390.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Labs discovered multiple vulnerabilities in procps,
-a set of command line and full screen utilities for browsing procfs. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1122">CVE-2018-1122</a>
-
- <p>top read its configuration from the current working directory if no
- $HOME was configured. If top were started from a directory writable
- by the attacker (such as /tmp) this could result in local privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1123">CVE-2018-1123</a>
-
- <p>Denial of service against the ps invocation of another user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1124">CVE-2018-1124</a>
-
- <p>An integer overflow in the file2strvec() function of libprocps could
- result in local privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1125">CVE-2018-1125</a>
-
- <p>A stack-based buffer overflow in pgrep could result in denial
- of service for a user using pgrep for inspecting a specially
- crafted process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1126">CVE-2018-1126</a>
-
- <p>Incorrect integer size parameters used in wrappers for standard C
- allocators could cause integer truncation and lead to integer
- overflow issues.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-1:3.3.3.3+deb7u1.</p>
-
-<p>We recommend that you upgrade your procps packages.</p>
-
-<p>The Debian LTS team would like to thank Abhijith PA for preparing this update.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1390.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1391.data b/english/lts/security/2018/dla-1391.data
deleted file mode 100644
index 62db946b832..00000000000
--- a/english/lts/security/2018/dla-1391.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1391-1 tiff</define-tag>
-<define-tag report_date>2018-5-31</define-tag>
-<define-tag secrefs>CVE-2017-11613 CVE-2018-5784 Bug##869823 Bug##890441</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1391.wml b/english/lts/security/2018/dla-1391.wml
deleted file mode 100644
index 64ef5de3bef..00000000000
--- a/english/lts/security/2018/dla-1391.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the libtiff library and
-the included tools, which may result in denial of service:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11613">CVE-2017-11613</a>
-
- <p>Ddenial of service vulnerability in the TIFFOpen function. A crafted
- input will lead to a denial of service attack and can either make the
- system hand or trigger the OOM killer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5784">CVE-2018-5784</a>
-
- <p>There is an uncontrolled resource consumption in TIFFSetDirectory function
- of src/libtiff/tif_dir.c, which can cause denial of service through a
- crafted tif file.</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-4.0.2-6+deb7u21.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1391.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1392.data b/english/lts/security/2018/dla-1392.data
deleted file mode 100644
index e7f1932c690..00000000000
--- a/english/lts/security/2018/dla-1392.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1392-1 linux</define-tag>
-<define-tag report_date>2018-6-1</define-tag>
-<define-tag secrefs>CVE-2018-1093 CVE-2018-1130 CVE-2018-8897 CVE-2018-10940 Bug#898100</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1392.wml b/english/lts/security/2018/dla-1392.wml
deleted file mode 100644
index 8477114c1df..00000000000
--- a/english/lts/security/2018/dla-1392.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a denial of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1093">CVE-2018-1093</a>
-
- <p>Wen Xu reported that a crafted ext4 filesystem image could trigger
- an out-of-bounds read in the ext4_valid_block_bitmap() function. A
- local user able to mount arbitrary filesystems could use this for
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1130">CVE-2018-1130</a>
-
- <p>The syzbot software found that the DCCP implementation of
- sendmsg() does not check the socket state, potentially leading
- to a null pointer dereference. A local user could use this to
- cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8897">CVE-2018-8897</a>
-
- <p>Nick Peterson of Everdox Tech LLC discovered that #DB exceptions
- that are deferred by MOV SS or POP SS are not properly handled,
- allowing an unprivileged user to crash the kernel and cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10940">CVE-2018-10940</a>
-
- <p>Dan Carpenter reported that the cdrom driver does not correctly
- validate the parameter to the CDROM_MEDIA_CHANGED ioctl. A user
- with access to a cdrom device could use this to cause a denial of
- service (crash).</p></li>
-
-</ul>
-
-<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
-3.2.102-1. This version also includes bug fixes from upstream version
-3.2.102, including a fix for a regression in the SCTP implementation
-in version 3.2.101.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1392.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1393.data b/english/lts/security/2018/dla-1393.data
deleted file mode 100644
index 8fbf09f4ed7..00000000000
--- a/english/lts/security/2018/dla-1393.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1393-1 </define-tag>
-<define-tag report_date>2018-6-1</define-tag>
-<define-tag packages></define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1393.wml b/english/lts/security/2018/dla-1393.wml
deleted file mode 100644
index 24a4cc2cf57..00000000000
--- a/english/lts/security/2018/dla-1393.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>Debian 7 Long Term Support reaching end-of-life</define-tag>
-<define-tag moreinfo>
-<p>
-The Debian Long Term Support (LTS) Team hereby announces that Debian 7
-"Wheezy" support has reached its end-of-life on May 31, 2018,
-five years after its initial release on May 4, 2013.
-</p>
-<p>
-Debian will not provide further security updates for Debian 7. A
-subset of Wheezy packages will be supported by external parties.
-Detailed information can be found at [Extended LTS].
-</p>
-<p>
-The LTS Team will prepare the transition to Debian 8 "Jessie", which
-is the current oldstable release. The LTS team will take over support
-from the Security Team on June 17, 2018.
-</p>
-<p>
-Debian 8 will also receive Long Term Support for five years after its
-initial release with support ending on June 30, 2020. The supported
-architectures include amd64, i386, armel and armhf.
-</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1393.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1394.data b/english/lts/security/2018/dla-1394.data
deleted file mode 100644
index 0d3617e4272..00000000000
--- a/english/lts/security/2018/dla-1394.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1394-1 imagemagick</define-tag>
-<define-tag report_date>2018-6-26</define-tag>
-<define-tag secrefs>CVE-2018-11251 CVE-2018-12599 CVE-2018-12600</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1394.wml b/english/lts/security/2018/dla-1394.wml
deleted file mode 100644
index 6db434bf669..00000000000
--- a/english/lts/security/2018/dla-1394.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities were discovered in ImageMagick, an
-image manipulation program, that allow remote attackers to cause denial
-of service (application crash) or out of bounds memory access via
-crafted SUN, BMP, or DIB image files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8:6.8.9.9-5+deb8u13.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1394.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1395.data b/english/lts/security/2018/dla-1395.data
deleted file mode 100644
index 4774b20003e..00000000000
--- a/english/lts/security/2018/dla-1395.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1395-1 php-horde-image</define-tag>
-<define-tag report_date>2018-6-22</define-tag>
-<define-tag secrefs>CVE-2017-9774 CVE-2017-14650 Bug##865505 Bug#876400</define-tag>
-<define-tag packages>php-horde-image</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1395.wml b/english/lts/security/2018/dla-1395.wml
deleted file mode 100644
index afbacc0873c..00000000000
--- a/english/lts/security/2018/dla-1395.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two remote code execution
-vulnerabilities in php-horde-image, the image processing library for the
-Horde <url "https://www.horde.org/"> groupware tool:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9774">CVE-2017-9774</a>
- <p>A remote code execution vulnerability (RCE) that was
- exploitable by a logged-in user sending a maliciously crafted HTTP GET
- request to various image backends.</p>
-
- <p>Note that the fix applied upstream has a regression in that it ignores
- the <q>force aspect ratio</q> option; see <a href="https://github.com/horde/Image/pull/1">https://github.com/horde/Image/pull/1</a>.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14650">CVE-2017-14650</a>
- <p>Another RCE that was exploitable by a logged-in
- user sending a maliciously crafted GET request specifically to the <q>im</q>
- image backend.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in php-horde-image
-version 2.1.0-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-image packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1395.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1396.data b/english/lts/security/2018/dla-1396.data
deleted file mode 100644
index d28a5257b3b..00000000000
--- a/english/lts/security/2018/dla-1396.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1396-1 redis</define-tag>
-<define-tag report_date>2018-6-26</define-tag>
-<define-tag secrefs>CVE-2018-11218 CVE-2018-11219 CVE-2018-12326 Bug##901495 Bug##902410</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1396.wml b/english/lts/security/2018/dla-1396.wml
deleted file mode 100644
index 241a6ecbaca..00000000000
--- a/english/lts/security/2018/dla-1396.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were a number of vulnerabilities in redis,
-a persistent key-value database:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11218">CVE-2018-11218</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-11219">CVE-2018-11219</a>
- <p>Multiple heap
- corruption and integer overflow vulnerabilities. (#901495)</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12326">CVE-2018-12326</a>
- <p>Buffer overflow in the "redis-cli" tool which could
- have allowed an attacker to achieve code execution and/or escalate to
- higher privileges via a crafted command line. (#902410)</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in redis version
-2:2.8.17-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1396.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1397.data b/english/lts/security/2018/dla-1397.data
deleted file mode 100644
index fe5e4bc19f5..00000000000
--- a/english/lts/security/2018/dla-1397.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1397-1 php5</define-tag>
-<define-tag report_date>2018-6-26</define-tag>
-<define-tag secrefs>CVE-2018-7584 CVE-2018-10545 CVE-2018-10546 CVE-2018-10547 CVE-2018-10548 CVE-2018-10549</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1397.wml b/english/lts/security/2018/dla-1397.wml
deleted file mode 100644
index 59de60cb41d..00000000000
--- a/english/lts/security/2018/dla-1397.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in PHP, a widely-used open source
-general purpose scripting language:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7584">CVE-2018-7584</a>
-
-<p>A stack-buffer-overflow while parsing HTTP response results in copying a
-large string and possible memory corruption and/or denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10545">CVE-2018-10545</a>
-
-<p>Dumpable FPM child processes allow bypassing opcache access controls
-resulting in potential information disclosure where one user can obtain
-information about another user's running PHP applications</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10546">CVE-2018-10546</a>
-
-<p>An invalid sequence of bytes can trigger an infinite loop in the stream
-filter convert.iconv</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10547">CVE-2018-10547</a>
-
-<p>A previous fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-5712">CVE-2018-5712</a> may not be complete, resulting in an
-additional vulnerability in the form of a reflected XSS in the PHAR 403
-and 404 error pages</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10548">CVE-2018-10548</a>
-
-<p>A malicious remote LDAP server can send a crafted response that will
-cause a denial of service (NULL pointer dereference resulting in an
-application crash)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10549">CVE-2018-10549</a>
-
-<p>A crafted JPEG file can case an out-of-bounds read and heap buffer
-overflow</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.36+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1397.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1398.data b/english/lts/security/2018/dla-1398.data
deleted file mode 100644
index f0ebed7b68b..00000000000
--- a/english/lts/security/2018/dla-1398.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1398-1 php-horde-crypt</define-tag>
-<define-tag report_date>2018-6-27</define-tag>
-<define-tag secrefs>CVE-2017-7413 CVE-2017-7414 Bug#859635</define-tag>
-<define-tag packages>php-horde-crypt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1398.wml b/english/lts/security/2018/dla-1398.wml
deleted file mode 100644
index f5c5ac3b9a7..00000000000
--- a/english/lts/security/2018/dla-1398.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that in Horde-Crypt, a cryptographic library and part
-of the PHP Horde framework, a command injection was possible when a
-Horde user used the PGP features to view an encrypted email.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.5.0-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-crypt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1398.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1399.data b/english/lts/security/2018/dla-1399.data
deleted file mode 100644
index 8c35e6b8cc8..00000000000
--- a/english/lts/security/2018/dla-1399.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1399-1 ruby-passenger</define-tag>
-<define-tag report_date>2018-6-27</define-tag>
-<define-tag secrefs>CVE-2015-7519 CVE-2018-12029 Bug#864651</define-tag>
-<define-tag packages>ruby-passenger</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1399.wml b/english/lts/security/2018/dla-1399.wml
deleted file mode 100644
index d54acd24337..00000000000
--- a/english/lts/security/2018/dla-1399.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two flaws were discovered in ruby-passenger for Ruby Rails and Rack
-support that allowed attackers to spoof HTTP headers or exploit a race
-condition which made privilege escalation under certain conditions
-possible.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7519">CVE-2015-7519</a>
-
- <p>Remote attackers could spoof headers passed to applications by using
- an underscore character instead of a dash character in an HTTP
- header as demonstrated by an X_User header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12029">CVE-2018-12029</a>
-
- <p>A vulnerability was discovered by the Pulse Security team. It was
- exploitable only when running a non-standard
- passenger_instance_registry_dir, via a race condition where after a
- file was created, there was a window in which it could be replaced
- with a symlink before it was chowned via the path and not the file
- descriptor. If the symlink target was to a file which would be
- executed by root such as root's crontab file, then privilege
- escalation was possible. This is now mitigated by using fchown().</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.0.53-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-passenger packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1399.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1400-2.data b/english/lts/security/2018/dla-1400-2.data
deleted file mode 100644
index 1288683af61..00000000000
--- a/english/lts/security/2018/dla-1400-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1400-2 tomcat7</define-tag>
-<define-tag report_date>2018-7-1</define-tag>
-<define-tag secrefs>Bug#902670</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1400-2.wml b/english/lts/security/2018/dla-1400-2.wml
deleted file mode 100644
index 3e8df956a65..00000000000
--- a/english/lts/security/2018/dla-1400-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update of Tomcat 7 announced as DLA-1400-1 introduced a
-regression for applications that make use of the Equinox OSGi
-framework. The MANIFEST file of tomcat-jdbc.jar in libtomcat7-java
-contains an invalid version number which was automatically derived
-from the Debian package version. This caused an OSGi exception.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in version
-7.0.56-3+really7.0.88-2.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1400-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1400.data b/english/lts/security/2018/dla-1400.data
deleted file mode 100644
index e4fbfd1e439..00000000000
--- a/english/lts/security/2018/dla-1400.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1400-1 tomcat7</define-tag>
-<define-tag report_date>2018-6-27</define-tag>
-<define-tag secrefs>CVE-2017-7674 CVE-2017-12616 CVE-2018-1304 CVE-2018-1305 CVE-2018-8014 Bug#802312 Bug#898935</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1400.wml b/english/lts/security/2018/dla-1400.wml
deleted file mode 100644
index cf7fb641dc1..00000000000
--- a/english/lts/security/2018/dla-1400.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7674">CVE-2017-7674</a>
-
- <p>The CORS Filter in Apache Tomcat did not add an HTTP Vary header
- indicating that the response varies depending on Origin. This
- permitted client and server side cache poisoning in some
- circumstances.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12616">CVE-2017-12616</a>
-
- <p>When using a VirtualDirContext with Apache Tomcat it was possible to
- bypass security constraints and/or view the source code of JSPs for
- resources served by the VirtualDirContext using a specially crafted
- request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1304">CVE-2018-1304</a>
-
- <p>The URL pattern of "" (the empty string) which exactly maps to the
- context root was not correctly handled in Apache Tomcat when used as
- part of a security constraint definition. This caused the constraint
- to be ignored. It was, therefore, possible for unauthorized users to
- gain access to web application resources that should have been
- protected. Only security constraints with a URL pattern of the empty
- string were affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1305">CVE-2018-1305</a>
-
- <p>Security constraints defined by annotations of Servlets in Apache
- Tomcat were only applied once a Servlet had been loaded. Because
- security constraints defined in this way apply to the URL pattern
- and any URLs below that point, it was possible - depending on the
- order Servlets were loaded - for some security constraints not to be
- applied. This could have exposed resources to users who were not
- authorized to access them.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8014">CVE-2018-8014</a>
-
- <p>The defaults settings for the CORS filter provided in Apache Tomcat
- are insecure and enable <q>supportsCredentials</q> for all origins. It is
- expected that users of the CORS filter will have configured it
- appropriately for their environment rather than using it in the
- default configuration. Therefore, it is expected that most users
- will not be impacted by this issue.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.0.56-3+really7.0.88-1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1400.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1401.data b/english/lts/security/2018/dla-1401.data
deleted file mode 100644
index 35083c88bd3..00000000000
--- a/english/lts/security/2018/dla-1401.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1401-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-6-27</define-tag>
-<define-tag secrefs>CVE-2016-3716 CVE-2016-3717 CVE-2016-3718 CVE-2016-5241 CVE-2016-7446 CVE-2016-7447 CVE-2016-7448 CVE-2016-7449 CVE-2017-11636 CVE-2017-11643 CVE-2017-12937 CVE-2017-13063 CVE-2017-13064 CVE-2017-13065 CVE-2017-13134 CVE-2017-14314 CVE-2017-14733 CVE-2017-16353 CVE-2017-16669 CVE-2017-17498 CVE-2017-17500 CVE-2017-17501 CVE-2017-17502 CVE-2017-17503 CVE-2017-17782 CVE-2017-17912 CVE-2017-17915 Bug#870149 Bug#870157 Bug#872574 Bug#873130 Bug#873129 Bug#873119 Bug#873099 Bug#881524</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1401.wml b/english/lts/security/2018/dla-1401.wml
deleted file mode 100644
index 46aa8202020..00000000000
--- a/english/lts/security/2018/dla-1401.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various security issues were discovered in Graphicsmagick, a collection
-of image processing tools. Heap-based buffer overflows or overreads may
-lead to a denial of service or disclosure of in-memory information or
-other unspecified impact by processing a malformed image file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.20-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1401.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1402.data b/english/lts/security/2018/dla-1402.data
deleted file mode 100644
index ffb9cc681f3..00000000000
--- a/english/lts/security/2018/dla-1402.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1402-1 exiv2</define-tag>
-<define-tag report_date>2018-6-28</define-tag>
-<define-tag secrefs>CVE-2018-10958 CVE-2018-10998 CVE-2018-10999 CVE-2018-11531 CVE-2018-12264 CVE-2018-12265 Bug#901706 Bug#901707</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1402.wml b/english/lts/security/2018/dla-1402.wml
deleted file mode 100644
index a87d429828c..00000000000
--- a/english/lts/security/2018/dla-1402.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in exiv2, a C++ library and
-a command line utility to manage image metadata, resulting in denial of
-service, heap-based buffer over-read/overflow, memory exhaustion, and
-application crash.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.24-4.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1402.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1403.data b/english/lts/security/2018/dla-1403.data
deleted file mode 100644
index 18d10d18bff..00000000000
--- a/english/lts/security/2018/dla-1403.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1403-1 zendframework</define-tag>
-<define-tag report_date>2018-6-28</define-tag>
-<define-tag secrefs>CVE-2016-4861</define-tag>
-<define-tag packages>zendframework</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1403.wml b/english/lts/security/2018/dla-1403.wml
deleted file mode 100644
index 2baddfec75e..00000000000
--- a/english/lts/security/2018/dla-1403.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4861">CVE-2016-4861</a>
- <p>Allowing remote attackers to conduct SQL injection attacks by
- leveraging failure to remove comments from an SQL statement
- before validation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.12.9+dfsg-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your zendframework packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1403.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1404.data b/english/lts/security/2018/dla-1404.data
deleted file mode 100644
index 5e31e079222..00000000000
--- a/english/lts/security/2018/dla-1404.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1404-1 lava-server</define-tag>
-<define-tag report_date>2018-6-28</define-tag>
-<define-tag secrefs>CVE-2018-12564</define-tag>
-<define-tag packages>lava-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1404.wml b/english/lts/security/2018/dla-1404.wml
deleted file mode 100644
index c2e1a1cbb1b..00000000000
--- a/english/lts/security/2018/dla-1404.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12564">CVE-2018-12564</a>
- <p>Using the feature to add URLs in the submit page, a user might be
- able to read any file on the server that is readable by lavaserver
- and consists of valid yaml.
- So with this patch the feature is disabled again.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2014.09.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your lava-server packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1404.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1405.data b/english/lts/security/2018/dla-1405.data
deleted file mode 100644
index ccf1a9f99be..00000000000
--- a/english/lts/security/2018/dla-1405.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1405-1 libgcrypt20</define-tag>
-<define-tag report_date>2018-6-29</define-tag>
-<define-tag secrefs>CVE-2018-0495</define-tag>
-<define-tag packages>libgcrypt20</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1405.wml b/english/lts/security/2018/dla-1405.wml
deleted file mode 100644
index fe5976e4224..00000000000
--- a/english/lts/security/2018/dla-1405.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Libgcrypt is prone to a local side-channel attack
-allowing recovery of ECDSA private keys.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.6.3-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your libgcrypt20 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1405.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1406.data b/english/lts/security/2018/dla-1406.data
deleted file mode 100644
index 2133261b01c..00000000000
--- a/english/lts/security/2018/dla-1406.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1406-1 firefox-esr</define-tag>
-<define-tag report_date>2018-6-29</define-tag>
-<define-tag secrefs>CVE-2018-5156 CVE-2018-5188 CVE-2018-12359 CVE-2018-12360 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1406.wml b/english/lts/security/2018/dla-1406.wml
deleted file mode 100644
index 3431476dd99..00000000000
--- a/english/lts/security/2018/dla-1406.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security issues have been found in the Mozilla Firefox web
-browser: Multiple memory safety errors and other implementation errors may
-lead to the execution of arbitrary code, denial of service, cross-site
-request forgery or information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-52.9.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1406.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1407.data b/english/lts/security/2018/dla-1407.data
deleted file mode 100644
index 08428b1d5d1..00000000000
--- a/english/lts/security/2018/dla-1407.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1407-1 mariadb-10.0</define-tag>
-<define-tag report_date>2018-6-29</define-tag>
-<define-tag secrefs>CVE-2017-10268 CVE-2017-10378 CVE-2018-2562 CVE-2018-2612 CVE-2018-2622 CVE-2018-2640 CVE-2018-2665 CVE-2018-2668 CVE-2018-2755 CVE-2018-2761 CVE-2018-2766 CVE-2018-2771 CVE-2018-2781 CVE-2018-2782 CVE-2018-2784 CVE-2018-2787 CVE-2018-2813 CVE-2018-2817 CVE-2018-2819</define-tag>
-<define-tag packages>mariadb-10.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1407.wml b/english/lts/security/2018/dla-1407.wml
deleted file mode 100644
index 912367307f4..00000000000
--- a/english/lts/security/2018/dla-1407.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MariaDB database server. The
-vulnerabilities are addressed by upgrading MariaDB to the new upstream
-version 10.0.35. Please see the MariaDB 10.0 Release Notes for further
-details:</p>
-
-<ul>
- <li><url "https://mariadb.com/kb/en/mariadb/mariadb-10033-release-notes/"></li>
- <li><a href="https://mariadb.com/kb/en/mariadb/mariadb-10034-release-notes/">https://mariadb.com/kb/en/mariadb/mariadb-10034-release-notes/</a></li>
- <li><a href="https://mariadb.com/kb/en/mariadb/mariadb-10035-release-notes/">https://mariadb.com/kb/en/mariadb/mariadb-10035-release-notes/</a></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-10.0.35-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1407.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1408.data b/english/lts/security/2018/dla-1408.data
deleted file mode 100644
index 3e193150679..00000000000
--- a/english/lts/security/2018/dla-1408.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1408-1 simplesamlphp</define-tag>
-<define-tag report_date>2018-6-29</define-tag>
-<define-tag secrefs>CVE-2017-12868 CVE-2017-12872</define-tag>
-<define-tag packages>simplesamlphp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1408.wml b/english/lts/security/2018/dla-1408.wml
deleted file mode 100644
index ad6b2452eeb..00000000000
--- a/english/lts/security/2018/dla-1408.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12872">CVE-2017-12872</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-12868">CVE-2017-12868</a>
-
- <p>The (1) Htpasswd authentication source in the authcrypt module and (2)
- SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow
- remote attackers to conduct timing side-channel attacks by leveraging
- use of the standard comparison operator to compare secret material
- against user input.</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2017-12868">CVE-2017-12868</a> was a about an improper fix of <a href="https://security-tracker.debian.org/tracker/CVE-2017-12872">CVE-2017-12872</a> in the
- initial patch released by upstream. We have used the correct patch.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.13.1-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your simplesamlphp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1408.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1409.data b/english/lts/security/2018/dla-1409.data
deleted file mode 100644
index a64c84442f5..00000000000
--- a/english/lts/security/2018/dla-1409.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1409-1 mosquitto</define-tag>
-<define-tag report_date>2018-6-29</define-tag>
-<define-tag secrefs>CVE-2017-7651 CVE-2017-7652 CVE-2017-7652</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1409.wml b/english/lts/security/2018/dla-1409.wml
deleted file mode 100644
index 956db2f7b35..00000000000
--- a/english/lts/security/2018/dla-1409.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7651">CVE-2017-7651</a>
- <p>fix to avoid extraordinary memory consumption by crafted
- CONNECT packet from unauthenticated client</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7652">CVE-2017-7652</a>
- <p>in case all sockets/file descriptors are exhausted, this is a
- fix to avoid default config values after reloading configuration
- by SIGHUP signal</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.4-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1409.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1410.data b/english/lts/security/2018/dla-1410.data
deleted file mode 100644
index 1f9d131b2c6..00000000000
--- a/english/lts/security/2018/dla-1410.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1410-1 python-pysaml2</define-tag>
-<define-tag report_date>2018-7-1</define-tag>
-<define-tag secrefs>CVE-2017-1000433 Bug#886423</define-tag>
-<define-tag packages>python-pysaml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1410.wml b/english/lts/security/2018/dla-1410.wml
deleted file mode 100644
index 3874192c42c..00000000000
--- a/english/lts/security/2018/dla-1410.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Pysaml2, a Python implementation of the Security Assertion Markup
-Language, would accept any password when run with Python optimizations
-enabled. This allows attackers to log in as any user without knowing
-their password.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in version
-2.0.0-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your python-pysaml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1410.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1411.data b/english/lts/security/2018/dla-1411.data
deleted file mode 100644
index 27347a1cdfc..00000000000
--- a/english/lts/security/2018/dla-1411.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1411-1 tiff</define-tag>
-<define-tag report_date>2018-7-2</define-tag>
-<define-tag secrefs>CVE-2017-11613 CVE-2018-5784 CVE-2018-7456 CVE-2018-8905 CVE-2018-10963 Bug#869823 Bug#898348 Bug#890441 Bug#891288 Bug#893806</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1411.wml b/english/lts/security/2018/dla-1411.wml
deleted file mode 100644
index 79ff1c1c62c..00000000000
--- a/english/lts/security/2018/dla-1411.wml
+++ /dev/null
@@ -1,69 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in TIFF, the Tag Image File Format
-library, that allowed remote attackers to cause a denial-of-service or
-other unspecified impact via a crafted image file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11613">CVE-2017-11613</a>
-
-<p>DoS vulnerability:
- A crafted input will lead to a denial of service attack. During the
- TIFFOpen process, td_imagelength is not checked. The value of
- td_imagelength can be directly controlled by an input file. In the
- ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc
- function is called based on td_imagelength. If the value of
- td_imagelength is set close to the amount of system memory, it will
- hang the system or trigger the OOM killer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10963">CVE-2018-10963</a>
-
-<p>DoS vulnerability:
- The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF
- allows remote attackers to cause a denial of service (assertion
- failure and application crash) via a crafted file, a different
- vulnerability than <a href="https://security-tracker.debian.org/tracker/CVE-2017-13726">CVE-2017-13726</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5784">CVE-2018-5784</a>
-
-<p>DoS vulnerability:
- In LibTIFF, there is an uncontrolled resource consumption in the
- TIFFSetDirectory function of tif_dir.c. Remote attackers could
- leverage this vulnerability to cause a denial of service via a
- crafted tif file.
- This occurs because the declared number of directory entries is not
- validated against the actual number of directory entries.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7456">CVE-2018-7456</a>
-
-<p>NULL Pointer Dereference:
- A NULL Pointer Dereference occurs in the function TIFFPrintDirectory
- in tif_print.c in LibTIFF when using the tiffinfo tool to print
- crafted TIFF information, a different vulnerability than
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-18013">CVE-2017-18013</a>. (This affects an earlier part of the
- TIFFPrintDirectory function that was not addressed by the
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-18013">CVE-2017-18013</a> patch.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8905">CVE-2018-8905</a>
-
-<p>Heap-based buffer overflow:
- In LibTIFF, a heap-based buffer overflow occurs in the function
- LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as
- demonstrated by tiff2ps.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.0.3-12.3+deb8u6.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1411.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1412.data b/english/lts/security/2018/dla-1412.data
deleted file mode 100644
index d3b5798dcf8..00000000000
--- a/english/lts/security/2018/dla-1412.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1412-1 cups</define-tag>
-<define-tag report_date>2018-7-3</define-tag>
-<define-tag secrefs>CVE-2017-18190 CVE-2017-18248</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1412.wml b/english/lts/security/2018/dla-1412.wml
deleted file mode 100644
index e2f1a06f14f..00000000000
--- a/english/lts/security/2018/dla-1412.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities affecting the cups printing server were found
-which can lead to arbitrary IPP command execution and denial of
-service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18190">CVE-2017-18190</a>
-
- <p>A localhost.localdomain whitelist entry in valid_host() in
- scheduler/client.c in CUPS before 2.2.2 allows remote attackers to
- execute arbitrary IPP commands by sending POST requests to the
- CUPS daemon in conjunction with DNS rebinding. The
- localhost.localdomain name is often resolved via a DNS server
- (neither the OS nor the web browser is responsible for ensuring
- that localhost.localdomain is 127.0.0.1).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18248">CVE-2017-18248</a>
-
- <p>The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when
- D-Bus support is enabled, can be crashed by remote attackers by
- sending print jobs with an invalid username, related to a D-Bus
- notification.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.5-11+deb8u3.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1412.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1413.data b/english/lts/security/2018/dla-1413.data
deleted file mode 100644
index 15fa6ac239f..00000000000
--- a/english/lts/security/2018/dla-1413.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1413-1 dokuwiki</define-tag>
-<define-tag report_date>2018-7-5</define-tag>
-<define-tag secrefs>CVE-2017-18123 Bug#889281</define-tag>
-<define-tag packages>dokuwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1413.wml b/english/lts/security/2018/dla-1413.wml
deleted file mode 100644
index 65eb097627c..00000000000
--- a/english/lts/security/2018/dla-1413.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The call parameter of /lib/exe/ajax.php in DokuWiki through
-2017-02-19e does not properly encode user input, which leads to a
-reflected file download vulnerability, and allows remote attackers to
-run arbitrary programs.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.0.20140505.a+dfsg-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your dokuwiki packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1413.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1414-2.data b/english/lts/security/2018/dla-1414-2.data
deleted file mode 100644
index 75ecbed6a40..00000000000
--- a/english/lts/security/2018/dla-1414-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1414-2 mercurial</define-tag>
-<define-tag report_date>2018-7-27</define-tag>
-<define-tag secrefs>CVE-2017-17458</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1414-2.wml b/english/lts/security/2018/dla-1414-2.wml
deleted file mode 100644
index 3d4b2ffe1df..00000000000
--- a/english/lts/security/2018/dla-1414-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for arbitrary code execution documented in <a href="https://security-tracker.debian.org/tracker/CVE-2017-17458">CVE-2017-17458</a> was
-incomplete in the previous upload. A more exhaustive change was
-implemented upstream and completely disables non-Mercurial
-subrepositories unless users changed the subrepos.allowed setting.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.1.2-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1414-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1414.data b/english/lts/security/2018/dla-1414.data
deleted file mode 100644
index 445be7a0b63..00000000000
--- a/english/lts/security/2018/dla-1414.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1414-1 mercurial</define-tag>
-<define-tag report_date>2018-7-5</define-tag>
-<define-tag secrefs>CVE-2017-9462 CVE-2017-17458 CVE-2018-1000132 Bug#861243 Bug#892964 Bug#901050</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1414.wml b/english/lts/security/2018/dla-1414.wml
deleted file mode 100644
index 36faeab6a52..00000000000
--- a/english/lts/security/2018/dla-1414.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Some security vulnerabilities were found in Mercurial which allow
-authenticated users to trigger arbitrary code execution and
-unauthorized data access in certain server configuration. Malformed
-patches and repositories can also lead to crashes and arbitrary code
-execution on clients.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9462">CVE-2017-9462</a>
-
- <p>In Mercurial before 4.1.3, "hg serve --stdio" allows remote
- authenticated users to launch the Python debugger, and
- consequently execute arbitrary code, by using --debugger as a
- repository name.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17458">CVE-2017-17458</a>
-
- <p>In Mercurial before 4.4.1, it is possible that a specially
- malformed repository can cause Git subrepositories to run
- arbitrary code in the form of a .git/hooks/post-update script
- checked into the repository. Typical use of Mercurial prevents
- construction of such repositories, but they can be created
- programmatically.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000132">CVE-2018-1000132</a>
-
- <p>Mercurial version 4.5 and earlier contains a Incorrect Access
- Control (CWE-285) vulnerability in Protocol server that can result
- in Unauthorized data access. This attack appear to be exploitable
- via network connectivity. This vulnerability appears to have been
- fixed in 4.5.1.</p>
-
-<li>OVE-20180430-0001
-
- <p>mpatch: be more careful about parsing binary patch data</p></li>
-
-<li>OVE-20180430-0002
-
- <p>mpatch: protect against underflow in mpatch_apply</p></li>
-
-<li>OVE-20180430-0004
-
- <p>mpatch: ensure fragment start isn't past the end of orig</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.1.2-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1414.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1415.data b/english/lts/security/2018/dla-1415.data
deleted file mode 100644
index a8a45082246..00000000000
--- a/english/lts/security/2018/dla-1415.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1415-1 phpmyadmin</define-tag>
-<define-tag report_date>2018-7-6</define-tag>
-<define-tag secrefs>CVE-2016-6609 CVE-2016-6614 CVE-2016-6615 CVE-2016-6616 CVE-2016-6618 CVE-2016-6619 CVE-2016-6620 CVE-2016-6621 CVE-2016-6622 CVE-2016-9865 CVE-2017-18264</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1415.wml b/english/lts/security/2018/dla-1415.wml
deleted file mode 100644
index 09d940058ce..00000000000
--- a/english/lts/security/2018/dla-1415.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in phpMyAdmin, the web-based MySQL
-administration interface, including SQL injection attacks, denial of
-service, arbitrary code execution, cross-site scripting, server-side
-request forgery, authentication bypass, and file system traversal.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4:4.2.12-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1415.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1416.data b/english/lts/security/2018/dla-1416.data
deleted file mode 100644
index 2f6b30f1479..00000000000
--- a/english/lts/security/2018/dla-1416.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1416-1 libsoup2.4</define-tag>
-<define-tag report_date>2018-7-6</define-tag>
-<define-tag secrefs>CVE-2018-12910</define-tag>
-<define-tag packages>libsoup2.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1416.wml b/english/lts/security/2018/dla-1416.wml
deleted file mode 100644
index 9f0bf7068f9..00000000000
--- a/english/lts/security/2018/dla-1416.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Soup HTTP library performed insuffient
-validation of cookie requests which could result in an out-of-bounds
-memory read.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.48.0-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libsoup2.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1416.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1417.data b/english/lts/security/2018/dla-1417.data
deleted file mode 100644
index 30e0f6786d3..00000000000
--- a/english/lts/security/2018/dla-1417.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1417-1 ca-certificates</define-tag>
-<define-tag report_date>2018-7-7</define-tag>
-<define-tag secrefs>Bug##858064 Bug##858539 Bug##867461 Bug##894070</define-tag>
-<define-tag packages>ca-certificates</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1417.wml b/english/lts/security/2018/dla-1417.wml
deleted file mode 100644
index b090685f182..00000000000
--- a/english/lts/security/2018/dla-1417.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There have been a number of updates to the set of Certificate Authority
-(CA) certificates that are considered <q>valid</q> or otherwise should be
-trusted.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in ca-certificates
-version 20141019+deb8u4.</p>
-
-<p>We recommend that you upgrade your ca-certificates packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1417.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1418.data b/english/lts/security/2018/dla-1418.data
deleted file mode 100644
index 7711d393d7f..00000000000
--- a/english/lts/security/2018/dla-1418.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1418-1 bouncycastle</define-tag>
-<define-tag report_date>2018-7-7</define-tag>
-<define-tag secrefs>CVE-2016-1000338 CVE-2016-1000339 CVE-2016-1000341 CVE-2016-1000342 CVE-2016-1000343 CVE-2016-1000345 CVE-2016-1000346</define-tag>
-<define-tag packages>bouncycastle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1418.wml b/english/lts/security/2018/dla-1418.wml
deleted file mode 100644
index 41b7a049f0f..00000000000
--- a/english/lts/security/2018/dla-1418.wml
+++ /dev/null
@@ -1,81 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in Bouncy
-Castle, a Java implementation of cryptographic algorithms.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000338">CVE-2016-1000338</a>
-
- <p>DSA does not fully validate ASN.1 encoding of signature on
- verification. It is possible to inject extra elements in the
- sequence making up the signature and still have it validate, which
- in some cases may allow the introduction of <q>invisible</q> data into a
- signed structure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000339">CVE-2016-1000339</a>
-
- <p>Previously the primary engine class used for AES was AESFastEngine.
- Due to the highly table driven approach used in the algorithm it
- turns out that if the data channel on the CPU can be monitored the
- lookup table accesses are sufficient to leak information on the AES
- key being used. There was also a leak in AESEngine although it was
- substantially less. AESEngine has been modified to remove any signs
- of leakage and is now the primary AES class for the BC JCE provider.
- Use of AESFastEngine is now only recommended where otherwise deemed
- appropriate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000341">CVE-2016-1000341</a>
-
- <p>DSA signature generation is vulnerable to timing attack. Where
- timings can be closely observed for the generation of signatures,
- the lack of blinding may allow an attacker to gain information about
- the signature's k value and ultimately the private value as well.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000342">CVE-2016-1000342</a>
-
- <p>ECDSA does not fully validate ASN.1 encoding of signature on
- verification. It is possible to inject extra elements in the
- sequence making up the signature and still have it validate, which
- in some cases may allow the introduction of <q>invisible</q> data into a
- signed structure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000343">CVE-2016-1000343</a>
-
- <p>The DSA key pair generator generates a weak private key if used with
- default values. If the JCA key pair generator is not explicitly
- initialised with DSA parameters, 1.55 and earlier generates a
- private value assuming a 1024 bit key size. In earlier releases this
- can be dealt with by explicitly passing parameters to the key pair
- generator.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000345">CVE-2016-1000345</a>
-
- <p>The DHIES/ECIES CBC mode is vulnerable to padding oracle attack. In
- an environment where timings can be easily observed, it is possible
- with enough observations to identify when the decryption is failing
- due to padding.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1000346">CVE-2016-1000346</a>
-
- <p>In the Bouncy Castle JCE Provider the other party DH public key is
- not fully validated. This can cause issues as invalid keys can be
- used to reveal details about the other party's private key where
- static Diffie-Hellman is in use. As of this release the key
- parameters are checked on agreement calculation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.49+dfsg-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your bouncycastle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1418.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1419.data b/english/lts/security/2018/dla-1419.data
deleted file mode 100644
index 97d8cf01e74..00000000000
--- a/english/lts/security/2018/dla-1419.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1419-1 ruby-sprockets</define-tag>
-<define-tag report_date>2018-7-12</define-tag>
-<define-tag secrefs>CVE-2018-3760 Bug##901913</define-tag>
-<define-tag packages>ruby-sprockets</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1419.wml b/english/lts/security/2018/dla-1419.wml
deleted file mode 100644
index 8c8809d3f2a..00000000000
--- a/english/lts/security/2018/dla-1419.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a discovered a path traversal flaw
-in ruby-sprockets, a Rack-based asset packaging system. A remote
-attacker could take advantage of this flaw to read arbitrary files
-outside an application's root directory via "file://" requests.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in ruby-sprockets version
-2.12.3-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-sprockets packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1419.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1420.data b/english/lts/security/2018/dla-1420.data
deleted file mode 100644
index 4d3e6a65a9b..00000000000
--- a/english/lts/security/2018/dla-1420.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1420-1 cinnamon</define-tag>
-<define-tag report_date>2018-7-13</define-tag>
-<define-tag secrefs>CVE-2018-13054 Bug##903201</define-tag>
-<define-tag packages>cinnamon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1420.wml b/english/lts/security/2018/dla-1420.wml
deleted file mode 100644
index 28310dcd955..00000000000
--- a/english/lts/security/2018/dla-1420.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a symlink attack in the Cinnamon
-desktop environment.</p>
-
-<p>An attacker could overwrite an arbitrary file on the filesystem via
-a $HOME/.face icon file (as the cinnamon-settings-users.py GUI runs
-as root).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in cinnamon version
-2.2.16-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your cinnamon packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1420.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1421.data b/english/lts/security/2018/dla-1421.data
deleted file mode 100644
index 3768037b80c..00000000000
--- a/english/lts/security/2018/dla-1421.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1421-1 ruby2.1</define-tag>
-<define-tag report_date>2018-7-14</define-tag>
-<define-tag secrefs>CVE-2015-9096 CVE-2016-2339 CVE-2016-7798 CVE-2017-0898 CVE-2017-0899 CVE-2017-0900 CVE-2017-0901 CVE-2017-0902 CVE-2017-0903 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 CVE-2017-17405 CVE-2017-17742 CVE-2017-17790 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-2018-1000078 CVE-2018-1000079 Bug#851161</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1421.wml b/english/lts/security/2018/dla-1421.wml
deleted file mode 100644
index 3b7c00da09c..00000000000
--- a/english/lts/security/2018/dla-1421.wml
+++ /dev/null
@@ -1,160 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in the interpreter for the Ruby
-language. The Common Vulnerabilities and Exposures project identifies the
-following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9096">CVE-2015-9096</a>
-
- <p>SMTP command injection in Net::SMTP via CRLF sequences in a RCPT TO
- or MAIL FROM command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2339">CVE-2016-2339</a>
-
- <p>Exploitable heap overflow in Fiddle::Function.new.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7798">CVE-2016-7798</a>
-
- <p>Incorrect handling of initialization vector in the GCM mode in the
- OpenSSL extension.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0898">CVE-2017-0898</a>
-
- <p>Buffer underrun vulnerability in Kernel.sprintf.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0899">CVE-2017-0899</a>
-
- <p>ANSI escape sequence vulnerability in RubyGems.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0900">CVE-2017-0900</a>
-
- <p>DoS vulnerability in the RubyGems query command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0901">CVE-2017-0901</a>
-
- <p>gem installer allowed a malicious gem to overwrite arbitrary files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0902">CVE-2017-0902</a>
-
- <p>RubyGems DNS request hijacking vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0903">CVE-2017-0903</a>
-
- <p>Max Justicz reported that RubyGems is prone to an unsafe object
- deserialization vulnerability. When parsed by an application which
- processes gems, a specially crafted YAML formatted gem specification
- can lead to remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10784">CVE-2017-10784</a>
-
- <p>Yusuke Endoh discovered an escape sequence injection vulnerability in
- the Basic authentication of WEBrick. An attacker can take advantage of
- this flaw to inject malicious escape sequences to the WEBrick log and
- potentially execute control characters on the victim's terminal
- emulator when reading logs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14033">CVE-2017-14033</a>
-
- <p>asac reported a buffer underrun vulnerability in the OpenSSL
- extension. A remote attacker could take advantage of this flaw to
- cause the Ruby interpreter to crash leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14064">CVE-2017-14064</a>
-
- <p>Heap memory disclosure in the JSON library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17405">CVE-2017-17405</a>
-
- <p>A command injection vulnerability in Net::FTP might allow a
- malicious FTP server to execute arbitrary commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17742">CVE-2017-17742</a>
-
- <p>Aaron Patterson reported that WEBrick bundled with Ruby was vulnerable
- to an HTTP response splitting vulnerability. It was possible for an
- attacker to inject fake HTTP responses if a script accepted an
- external input and output it without modifications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17790">CVE-2017-17790</a>
-
- <p>A command injection vulnerability in lib/resolv.rb's lazy_initialze
- might allow a command injection attack. However untrusted input to
- this function is rather unlikely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6914">CVE-2018-6914</a>
-
- <p>ooooooo_q discovered a directory traversal vulnerability in the
- Dir.mktmpdir method in the tmpdir library. It made it possible for
- attackers to create arbitrary directories or files via a .. (dot dot)
- in the prefix argument.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8777">CVE-2018-8777</a>
-
- <p>Eric Wong reported an out-of-memory DoS vulnerability related to a
- large request in WEBrick bundled with Ruby.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8778">CVE-2018-8778</a>
-
- <p>aerodudrizzt found a buffer under-read vulnerability in the Ruby
- String#unpack method. If a big number was passed with the specifier @,
- the number was treated as a negative value, and an out-of-buffer read
- occurred. Attackers could read data on heaps if an script accepts an
- external input as the argument of String#unpack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8779">CVE-2018-8779</a>
-
- <p>ooooooo_q reported that the UNIXServer.open and UNIXSocket.open
- methods of the socket library bundled with Ruby did not check for NUL
- bytes in the path argument. The lack of check made the methods
- vulnerable to unintentional socket creation and unintentional socket
- access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8780">CVE-2018-8780</a>
-
- <p>ooooooo_q discovered an unintentional directory traversal in
- some methods in Dir, by the lack of checking for NUL bytes in their
- parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000075">CVE-2018-1000075</a>
-
- <p>A negative size vulnerability in ruby gem package tar header that could
- cause an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000076">CVE-2018-1000076</a>
-
- <p>RubyGems package improperly verifies cryptographic signatures. A mis-signed
- gem could be installed if the tarball contains multiple gem signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000077">CVE-2018-1000077</a>
-
- <p>An improper input validation vulnerability in RubyGems specification
- homepage attribute could allow malicious gem to set an invalid homepage
- URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000078">CVE-2018-1000078</a>
-
- <p>Cross Site Scripting (XSS) vulnerability in gem server display of homepage
- attribute.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000079">CVE-2018-1000079</a>
-
- <p>Path Traversal vulnerability during gem installation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.5-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1421.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1422-2.data b/english/lts/security/2018/dla-1422-2.data
deleted file mode 100644
index 42ee6a7f48b..00000000000
--- a/english/lts/security/2018/dla-1422-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1422-2 linux</define-tag>
-<define-tag report_date>2018-7-15</define-tag>
-<define-tag secrefs>CVE-2017-5715 CVE-2017-5753 CVE-2018-1066 CVE-2018-1093 CVE-2018-1130 CVE-2018-3665 CVE-2018-5814 CVE-2018-9422 CVE-2018-10853 CVE-2018-10940 CVE-2018-11506 CVE-2018-1223 CVE-2018-1000204 Bug#898165</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1422-2.wml b/english/lts/security/2018/dla-1422-2.wml
deleted file mode 100644
index d52ca7a934a..00000000000
--- a/english/lts/security/2018/dla-1422-2.wml
+++ /dev/null
@@ -1,155 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous update to linux failed to build for the armhf (ARM EABI
-hard-float) architecture. This update corrects that. For all other
-architectures, there is no need to upgrade or reboot again. For
-reference, the relevant part of the original advisory text follows.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>
-
- <p>Multiple researchers have discovered a vulnerability in various
- processors supporting speculative execution, enabling an attacker
- controlling an unprivileged process to read memory from arbitrary
- addresses, including from the kernel and all other processes
- running on the system.</p>
-
- <p>This specific attack has been named Spectre variant 2 (branch
- target injection) and is mitigated for the x86 architecture (amd64
- and i386) by using new microcoded features.</p>
-
- <p>This mitigation requires an update to the processor's microcode,
- which is non-free. For recent Intel processors, this is included
- in the intel-microcode package from version 3.20180425.1~deb8u1.
- For other processors, it may be included in an update to the
- system BIOS or UEFI firmware, or in a later update to the
- amd64-microcode package.</p>
-
- <p>This vulnerability was already mitigated for the x86 architecture
- by the <q>retpoline</q> feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-
- <p>Further instances of code that was vulnerable to Spectre variant 1
- (bounds-check bypass) have been mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1066">CVE-2018-1066</a>
-
- <p>Dan Aloni reported to Red Hat that the CIFS client implementation
- would dereference a null pointer if the server sent an invalid
- response during NTLMSSP setup negotiation. This could be used by a
- malicious server for denial of service.</p>
-
- <p>The previously applied mitigation for this issue was not
- appropriate for Linux 3.16 and has been replaced by an alternate
- fix.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1093">CVE-2018-1093</a>
-
- <p>Wen Xu reported that a crafted ext4 filesystem image could trigger
- an out-of-bounds read in the ext4_valid_block_bitmap() function. A
- local user able to mount arbitrary filesystems could use this for
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1130">CVE-2018-1130</a>
-
- <p>The syzbot software found that the DCCP implementation of
- sendmsg() does not check the socket state, potentially leading
- to a null pointer dereference. A local user could use this to
- cause a denial of service (crash). </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3665">CVE-2018-3665</a>
-
- <p>Multiple researchers have discovered that some Intel x86
- processors can speculatively read floating-point and vector
- registers even when access to those registers is disabled. The
- Linux kernel's <q>lazy FPU</q> feature relies on that access control to
- avoid saving and restoring those registers for tasks that do not
- use them, and was enabled by default on x86 processors that do
- not support the XSAVEOPT instruction.</p>
-
- <p>If <q>lazy FPU</q> is enabled on one of the affected processors, an
- attacker controlling an unprivileged process may be able to read
- sensitive information from other users' processes or the kernel.
- This specifically affects processors based on the <q>Nehalem</q> and
- <q>Westemere</q> core designs.
-
- This issue has been mitigated by disabling <q>lazy FPU</q> by default
- on all x86 processors that support the FXSAVE and FXRSTOR
- instructions, which includes all processors known to be affected
- and most processors that perform speculative execution. It can
- also be mitigated by adding the kernel parameter: eagerfpu=on</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5814">CVE-2018-5814</a>
-
- <p>Jakub Jirasek reported race conditions in the USB/IP host driver.
- A malicious client could use this to cause a denial of service
- (crash or memory corruption), and possibly to execute code, on a
- USB/IP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9422">CVE-2018-9422</a>
-
- <p>It was reported that the futex() system call could be used by an
- unprivileged user for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10853">CVE-2018-10853</a>
-
- <p>Andy Lutomirski and Mika Penttilä reported that KVM for x86
- processors did not perform a necessary privilege check when
- emulating certain instructions. This could be used by an
- unprivileged user in a guest VM to escalate their privileges
- within the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10940">CVE-2018-10940</a>
-
- <p>Dan Carpenter reported that the optical disc driver (cdrom) does
- not correctly validate the parameter to the CDROM_MEDIA_CHANGED
- ioctl. A user with access to a cdrom device could use this to
- cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11506">CVE-2018-11506</a>
-
- <p>Piotr Gabriel Kosinski and Daniel Shapira reported that the
- SCSI optical disc driver (sr) did not allocate a sufficiently
- large buffer for sense data. A user with access to a SCSI
- optical disc device that can produce more than 64 bytes of
- sense data could use this to cause a denial of service (crash
- or memory corruption), and possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12233">CVE-2018-12233</a>
-
- <p>Shankara Pailoor reported that a crafted JFS filesystem image
- could trigger a denial of service (memory corruption). This
- could possibly also be used for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000204">CVE-2018-1000204</a>
-
- <p>The syzbot software found that the SCSI generic driver (sg) would
- in some circumstances allow reading data from uninitialised
- buffers, which could include sensitive information from the kernel
- or other tasks. However, only privileged users with the
- CAP_SYS_ADMIN or CAP_SYS_RAWIO capability were allowed to do this,
- so this has little or no security impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.57-1. This update additionally fixes Debian bug #898165, and
-includes many more bug fixes from stable update 3.16.57.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1422-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1422.data b/english/lts/security/2018/dla-1422.data
deleted file mode 100644
index 65c8a9ebbdc..00000000000
--- a/english/lts/security/2018/dla-1422.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1422-1 linux</define-tag>
-<define-tag report_date>2018-7-14</define-tag>
-<define-tag secrefs>CVE-2017-5715 CVE-2017-5753 CVE-2018-1066 CVE-2018-1093 CVE-2018-1130 CVE-2018-3665 CVE-2018-5814 CVE-2018-9422 CVE-2018-10853 CVE-2018-10940 CVE-2018-11506 CVE-2018-1223 CVE-2018-1000204 Bug#898165</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1422.wml b/english/lts/security/2018/dla-1422.wml
deleted file mode 100644
index 3fab5b63d8d..00000000000
--- a/english/lts/security/2018/dla-1422.wml
+++ /dev/null
@@ -1,153 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<p>This update is not yet available for the armhf (ARM EABI hard-float)
-architecture.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>
-
- <p>Multiple researchers have discovered a vulnerability in various
- processors supporting speculative execution, enabling an attacker
- controlling an unprivileged process to read memory from arbitrary
- addresses, including from the kernel and all other processes
- running on the system.</p>
-
- <p>This specific attack has been named Spectre variant 2 (branch
- target injection) and is mitigated for the x86 architecture (amd64
- and i386) by using new microcoded features.</p>
-
- <p>This mitigation requires an update to the processor's microcode,
- which is non-free. For recent Intel processors, this is included
- in the intel-microcode package from version 3.20180425.1~deb8u1.
- For other processors, it may be included in an update to the
- system BIOS or UEFI firmware, or in a later update to the
- amd64-microcode package.</p>
-
- <p>This vulnerability was already mitigated for the x86 architecture
- by the <q>retpoline</q> feature.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-
- <p>Further instances of code that was vulnerable to Spectre variant 1
- (bounds-check bypass) have been mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1066">CVE-2018-1066</a>
-
- <p>Dan Aloni reported to Red Hat that the CIFS client implementation
- would dereference a null pointer if the server sent an invalid
- response during NTLMSSP setup negotiation. This could be used by a
- malicious server for denial of service.</p>
-
- <p>The previously applied mitigation for this issue was not
- appropriate for Linux 3.16 and has been replaced by an alternate
- fix.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1093">CVE-2018-1093</a>
-
- <p>Wen Xu reported that a crafted ext4 filesystem image could trigger
- an out-of-bounds read in the ext4_valid_block_bitmap() function. A
- local user able to mount arbitrary filesystems could use this for
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1130">CVE-2018-1130</a>
-
- <p>The syzbot software found that the DCCP implementation of
- sendmsg() does not check the socket state, potentially leading
- to a null pointer dereference. A local user could use this to
- cause a denial of service (crash). </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3665">CVE-2018-3665</a>
-
- <p>Multiple researchers have discovered that some Intel x86
- processors can speculatively read floating-point and vector
- registers even when access to those registers is disabled. The
- Linux kernel's <q>lazy FPU</q> feature relies on that access control to
- avoid saving and restoring those registers for tasks that do not
- use them, and was enabled by default on x86 processors that do
- not support the XSAVEOPT instruction.</p>
-
- <p>If <q>lazy FPU</q> is enabled on one of the affected processors, an
- attacker controlling an unprivileged process may be able to read
- sensitive information from other users' processes or the kernel.
- This specifically affects processors based on the <q>Nehalem</q> and
- <q>Westemere</q> core designs.
-
- This issue has been mitigated by disabling <q>lazy FPU</q> by default
- on all x86 processors that support the FXSAVE and FXRSTOR
- instructions, which includes all processors known to be affected
- and most processors that perform speculative execution. It can
- also be mitigated by adding the kernel parameter: eagerfpu=on</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5814">CVE-2018-5814</a>
-
- <p>Jakub Jirasek reported race conditions in the USB/IP host driver.
- A malicious client could use this to cause a denial of service
- (crash or memory corruption), and possibly to execute code, on a
- USB/IP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9422">CVE-2018-9422</a>
-
- <p>It was reported that the futex() system call could be used by an
- unprivileged user for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10853">CVE-2018-10853</a>
-
- <p>Andy Lutomirski and Mika Penttilä reported that KVM for x86
- processors did not perform a necessary privilege check when
- emulating certain instructions. This could be used by an
- unprivileged user in a guest VM to escalate their privileges
- within the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10940">CVE-2018-10940</a>
-
- <p>Dan Carpenter reported that the optical disc driver (cdrom) does
- not correctly validate the parameter to the CDROM_MEDIA_CHANGED
- ioctl. A user with access to a cdrom device could use this to
- cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11506">CVE-2018-11506</a>
-
- <p>Piotr Gabriel Kosinski and Daniel Shapira reported that the
- SCSI optical disc driver (sr) did not allocate a sufficiently
- large buffer for sense data. A user with access to a SCSI
- optical disc device that can produce more than 64 bytes of
- sense data could use this to cause a denial of service (crash
- or memory corruption), and possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12233">CVE-2018-12233</a>
-
- <p>Shankara Pailoor reported that a crafted JFS filesystem image
- could trigger a denial of service (memory corruption). This
- could possibly also be used for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000204">CVE-2018-1000204</a>
-
- <p>The syzbot software found that the SCSI generic driver (sg) would
- in some circumstances allow reading data from uninitialised
- buffers, which could include sensitive information from the kernel
- or other tasks. However, only privileged users with the
- CAP_SYS_ADMIN or CAP_SYS_RAWIO capability were allowed to do this,
- so this has little or no security impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.57-1. This update additionally fixes Debian bug #898165, and
-includes many more bug fixes from stable update 3.16.57.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1422.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1423.data b/english/lts/security/2018/dla-1423.data
deleted file mode 100644
index 9124bb2107a..00000000000
--- a/english/lts/security/2018/dla-1423.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1423-1 linux-4.9</define-tag>
-<define-tag report_date>2018-7-18</define-tag>
-<define-tag secrefs>CVE-2017-5753 CVE-2017-18255 CVE-2018-1118 CVE-2018-1120 CVE-2018-1130 CVE-2018-3639 CVE-2018-5814 CVE-2018-10021 CVE-2018-10087 CVE-2018-10124 CVE-2018-10853 CVE-2018-1087 CVE-2018-10877 CVE-2018-10878 CVE-2018-10879 CVE-2018-1088 CVE-2018-10881 CVE-2018-10882 CVE-2018-10883 CVE-2018-1094 CVE-2018-11506 CVE-2018-12233 CVE-2018-1000204 Bug#860900 Bug#872907 Bug#892057 Bug#896775 Bug#897590 Bug#898137</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1423.wml b/english/lts/security/2018/dla-1423.wml
deleted file mode 100644
index b2b1066b042..00000000000
--- a/english/lts/security/2018/dla-1423.wml
+++ /dev/null
@@ -1,169 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Linux 4.9 has been packaged for Debian 8 as linux-4.9. This provides
-a supported upgrade path for systems that currently use kernel
-packages from the "jessie-backports" suite.</p>
-
-<p>There is no need to upgrade systems using Linux 3.16, as that kernel
-version will also continue to be supported in the LTS period.</p>
-
-<p>This backport does not include the following binary packages:</p>
-
- <p>hyperv-daemons libcpupower1 libcpupower-dev libusbip-dev
- linux-compiler-gcc-4.9-x86 linux-cpupower linux-libc-dev usbip</p>
-
-<p>Older versions of most of those are built from other source packages
-in Debian 8.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-
- <p>Further instances of code that was vulnerable to Spectre variant 1
- (bounds-check bypass) have been mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18255">CVE-2017-18255</a>
-
- <p>It was discovered that the performance events subsystem did not
- properly validate the value of the
- kernel.perf_cpu_time_max_percent sysctl. Setting a large value
- could have an unspecified security impact. However, only a
- privileged user can set this sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1118">CVE-2018-1118</a>
-
- <p>The syzbot software found that the vhost driver did not initialise
- message buffers which would later be read by user processes. A
- user with access to the /dev/vhost-net device could use this to
- read sensitive information from the kernel or other users'
- processes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1120">CVE-2018-1120</a>
-
- <p>Qualys reported that a user able to mount FUSE filesystems can
- create a process such that when another process attempting to read
- its command line will be blocked for an arbitrarily long time.
- This could be used for denial of service, or to aid in exploiting
- a race condition in the other program.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1130">CVE-2018-1130</a>
-
- <p>The syzbot software found that the DCCP implementation of
- sendmsg() does not check the socket state, potentially leading
- to a null pointer dereference. A local user could use this to
- cause a denial of service (crash). </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a>
-
- <p>Multiple researchers have discovered that Speculative Store Bypass
- (SSB), a feature implemented in many processors, could be used to
- read sensitive information from another context. In particular,
- code in a software sandbox may be able to read sensitive
- information from outside the sandbox. This issue is also known as
- Spectre variant 4.</p>
-
- <p>This update allows the issue to be mitigated on some x86
- processors by disabling SSB. This requires an update to the
- processor's microcode, which is non-free. It may be included in
- an update to the system BIOS or UEFI firmware, or in a future
- update to the intel-microcode or amd64-microcode packages.</p>
-
- <p>Disabling SSB can reduce performance significantly, so by default
- it is only done in tasks that use the seccomp feature.
- Applications that require this mitigation should request it
- explicitly through the prctl() system call. Users can control
- where the mitigation is enabled with the spec_store_bypass_disable
- kernel parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5814">CVE-2018-5814</a>
-
- <p>Jakub Jirasek reported race conditions in the USB/IP host driver.
- A malicious client could use this to cause a denial of service
- (crash or memory corruption), and possibly to execute code, on a
- USB/IP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10021">CVE-2018-10021</a>
-
- <p>A physically present attacker who unplugs a SAS cable can cause a
- denial of service (memory leak and WARN).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10087">CVE-2018-10087</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10124">CVE-2018-10124</a>
-
- <p>zhongjiang found that the wait4() and kill() system call
- implementations did not check for the invalid pid value of
- INT_MIN. If a user passed this value, the behaviour of the code
- was formally undefined and might have had a security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10853">CVE-2018-10853</a>
-
- <p>Andy Lutomirski and Mika Penttilä reported that KVM for x86
- processors did not perform a necessary privilege check when
- emulating certain instructions. This could be used by an
- unprivileged user in a guest VM to escalate their privileges
- within the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10876">CVE-2018-10876</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-10877">CVE-2018-10877</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-10878">CVE-2018-10878</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-10879">CVE-2018-10879</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-10880">CVE-2018-10880</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-10881">CVE-2018-10881</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-10882">CVE-2018-10882</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-10883">CVE-2018-10883</a></p>
-
- <p>Wen Xu at SSLab, Gatech, reported that crafted ext4 filesystem
- images could trigger a crash or memory corruption. A local user
- able to mount arbitrary filesystems, or an attacker providing
- filesystems to be mounted, could use this for denial of service or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10940">CVE-2018-10940</a>
-
- <p>Dan Carpenter reported that the optical disc driver (cdrom) does
- not correctly validate the parameter to the CDROM_MEDIA_CHANGED
- ioctl. A user with access to a cdrom device could use this to
- cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11506">CVE-2018-11506</a>
-
- <p>Piotr Gabriel Kosinski and Daniel Shapira reported that the
- SCSI optical disc driver (sr) did not allocate a sufficiently
- large buffer for sense data. A user with access to a SCSI
- optical disc device that can produce more than 64 bytes of
- sense data could use this to cause a denial of service (crash
- or memory corruption), and possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12233">CVE-2018-12233</a>
-
- <p>Shankara Pailoor reported that a crafted JFS filesystem image
- could trigger a denial of service (memory corruption). This
- could possibly also be used for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000204">CVE-2018-1000204</a>
-
- <p>The syzbot software found that the SCSI generic driver (sg) would
- in some circumstances allow reading data from uninitialised
- buffers, which could include sensitive information from the kernel
- or other tasks. However, only privileged users with the
- CAP_SYS_ADMIN or CAP_SYS_RAWIO capability were allowed to do this,
- so this has little or no security impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.110-1~deb8u1. This update additionally fixes Debian bugs
-#860900, #872907, #892057, #896775, #897590, and #898137; and
-includes many more bug fixes from stable updates 4.9.89-4.9.110
-inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1423.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1424.data b/english/lts/security/2018/dla-1424.data
deleted file mode 100644
index 4e7ec534a07..00000000000
--- a/english/lts/security/2018/dla-1424.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1424-1 linux-latest-4.9</define-tag>
-<define-tag report_date>2018-7-18</define-tag>
-<define-tag packages>linux-latest-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1424.wml b/english/lts/security/2018/dla-1424.wml
deleted file mode 100644
index 287841ba490..00000000000
--- a/english/lts/security/2018/dla-1424.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Linux 4.9 has been packaged for Debian 8 as linux-4.9. This provides
-a supported upgrade path for systems that currently use kernel
-packages from the "jessie-backports" suite.</p>
-
-<p>However, "apt full-upgrade" will *not* automatically install the
-updated kernel packages. You should explicitly install one of the
-following metapackages first, as appropriate for your system:</p>
-
-<ul>
- <li>linux-image-4.9-686</li>
- <li>linux-image-4.9-686-pae</li>
- <li>linux-image-4.9-amd64</li>
- <li>linux-image-4.9-armmp</li>
- <li>linux-image-4.9-armmp-lpae</li>
- <li>linux-image-4.9-marvell</li>
-</ul>
-
-<p>For example, if the command "uname -r" currently shows
-"4.9.0-0.bpo.6-amd64", you should install linux-image-4.9-amd64.</p>
-
-<p>There is no need to upgrade systems using Linux 3.16, as that kernel
-version will also continue to be supported in the LTS period.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in linux-latest-4.9 version 80+deb9u5~deb8u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1424.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1425.data b/english/lts/security/2018/dla-1425.data
deleted file mode 100644
index 0d0e4b063fa..00000000000
--- a/english/lts/security/2018/dla-1425.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1425-1 thunderbird</define-tag>
-<define-tag report_date>2018-7-14</define-tag>
-<define-tag secrefs>CVE-2018-5188 CVE-2018-12359 CVE-2018-12360 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366 CVE-2018-12372 CVE-2018-12373 CVE-2018-12374</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1425.wml b/english/lts/security/2018/dla-1425.wml
deleted file mode 100644
index b64426f5090..00000000000
--- a/english/lts/security/2018/dla-1425.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code, denial of service or attacks on
-encrypted emails.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:52.9.1-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1425.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1426.data b/english/lts/security/2018/dla-1426.data
deleted file mode 100644
index b1905019b71..00000000000
--- a/english/lts/security/2018/dla-1426.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1426-1 cups</define-tag>
-<define-tag report_date>2018-7-14</define-tag>
-<define-tag secrefs>CVE-2018-4180 CVE-2018-4181 CVE-2018-6553</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1426.wml b/english/lts/security/2018/dla-1426.wml
deleted file mode 100644
index bd08187fae8..00000000000
--- a/english/lts/security/2018/dla-1426.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in CUPS, the Common UNIX Printing
-System. These issues have been identified with the following CVE ids:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4180">CVE-2018-4180</a>
-
- <p>Dan Bastone of Gotham Digital Science discovered that a local
- attacker with access to cupsctl could escalate privileges by setting
- an environment variable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4181">CVE-2018-4181</a>
-
- <p>Eric Rafaloff and John Dunlap of Gotham Digital Science discovered
- that a local attacker can perform limited reads of arbitrary files
- as root by manipulating cupsd.conf.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6553">CVE-2018-6553</a>
-
- <p>Dan Bastone of Gotham Digital Science discovered that an attacker
- can bypass the AppArmor cupsd sandbox by invoking the dnssd backend
- using an alternate name that has been hard linked to dnssd.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.5-11+deb8u4.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1426.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1427.data b/english/lts/security/2018/dla-1427.data
deleted file mode 100644
index 236c34ef275..00000000000
--- a/english/lts/security/2018/dla-1427.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1427-1 znc</define-tag>
-<define-tag report_date>2018-7-15</define-tag>
-<define-tag secrefs>CVE-2018-14055 CVE-2018-14056 Bug##903787 Bug##903788</define-tag>
-<define-tag packages>znc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1427.wml b/english/lts/security/2018/dla-1427.wml
deleted file mode 100644
index 49e244f93d9..00000000000
--- a/english/lts/security/2018/dla-1427.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two issues in znc, a modular IRC
-bouncer:</p>
-
-<ul>
-
- <li>There was insufficient validation of lines coming from the network
- allowing a non-admin user to escalate his privilege and inject rogue
- values into znc.conf. (<a href="https://security-tracker.debian.org/tracker/CVE-2018-14055">CVE-2018-14055</a>)</li>
-
- <li>A path traversal vulnerability (via "../" being embedded in a web skin
- name) to access files outside of the allowed directory.
- (<a href="https://security-tracker.debian.org/tracker/CVE-2018-14056">CVE-2018-14056</a>)</li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in znc version
-1.4-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your znc packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1427.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1428.data b/english/lts/security/2018/dla-1428.data
deleted file mode 100644
index 317883f716e..00000000000
--- a/english/lts/security/2018/dla-1428.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1428-1 389-ds-base</define-tag>
-<define-tag report_date>2018-7-15</define-tag>
-<define-tag secrefs>CVE-2015-1854 CVE-2017-15134 CVE-2018-1054 CVE-2018-1089 CVE-2018-10850</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1428.wml b/english/lts/security/2018/dla-1428.wml
deleted file mode 100644
index 175cc425115..00000000000
--- a/english/lts/security/2018/dla-1428.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1854">CVE-2015-1854</a>
-
- <p>A flaw was found while doing authorization of modrdn operations.
- An unauthenticated attacker able to issue an ldapmodrdn call to
- the directory server could perform unauthorized modifications
- of entries in the directory server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15134">CVE-2017-15134</a>
-
- <p>Improper handling of a search filter in slapi_filter_sprintf()
- in slapd/util.c can lead to remote server crash and denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1054">CVE-2018-1054</a>
-
- <p>When read access on &lt;attribute_name&gt; is enabled, a flaw in
- SetUnicodeStringFromUTF_8 function in collate.c, can lead to
- out-of-bounds memory operations.
- This might result in a server crash, caused by unauthorized
- users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1089">CVE-2018-1089</a>
-
- <p>Any user (anonymous or authenticated) can crash ns-slapd with a
- crafted ldapsearch query with very long filter value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10850">CVE-2018-10850</a>
-
- <p>Due to a race condition the server could crash in turbo mode
- (because of high traffic) or when a worker reads several requests
- in the read buffer (more_data). Thus an anonymous attacker could
- trigger a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.3.5-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1428.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1429.data b/english/lts/security/2018/dla-1429.data
deleted file mode 100644
index d5d4c30329d..00000000000
--- a/english/lts/security/2018/dla-1429.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1429-1 sssd</define-tag>
-<define-tag report_date>2018-7-16</define-tag>
-<define-tag secrefs>CVE-2018-10852 Bug#902860</define-tag>
-<define-tag packages>sssd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1429.wml b/english/lts/security/2018/dla-1429.wml
deleted file mode 100644
index fbe83518f22..00000000000
--- a/english/lts/security/2018/dla-1429.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules
-from SSSD has too wide permissions, which means that anyone who can send a
-message using the same raw protocol that sudo and SSSD use can read the sudo
-rules available for any user.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.11.7-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your sssd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1429.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1430.data b/english/lts/security/2018/dla-1430.data
deleted file mode 100644
index 952479c1530..00000000000
--- a/english/lts/security/2018/dla-1430.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1430-1 taglib</define-tag>
-<define-tag report_date>2018-7-18</define-tag>
-<define-tag secrefs>CVE-2018-11439</define-tag>
-<define-tag packages>taglib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1430.wml b/english/lts/security/2018/dla-1430.wml
deleted file mode 100644
index 62308fa6319..00000000000
--- a/english/lts/security/2018/dla-1430.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11439">CVE-2018-11439</a>
- <p>Fix for a heap-based buffer over-read via a crafted audio file.</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.9.1-2.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your taglib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1430.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1431.data b/english/lts/security/2018/dla-1431.data
deleted file mode 100644
index b9d984281ee..00000000000
--- a/english/lts/security/2018/dla-1431.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1431-1 ant</define-tag>
-<define-tag report_date>2018-7-19</define-tag>
-<define-tag secrefs>CVE-2018-10886</define-tag>
-<define-tag packages>ant</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1431.wml b/english/lts/security/2018/dla-1431.wml
deleted file mode 100644
index d31711544a1..00000000000
--- a/english/lts/security/2018/dla-1431.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>unzip and untar target tasks in ant allows the extraction of files
-outside the target directory. A crafted zip or tar file submitted to
-an Ant build could create or overwrite arbitrary files with the
-privileges of the user running Ant.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.9.4-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your ant packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1431.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1432.data b/english/lts/security/2018/dla-1432.data
deleted file mode 100644
index 79eb96683d8..00000000000
--- a/english/lts/security/2018/dla-1432.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1432-1 gpac</define-tag>
-<define-tag report_date>2018-7-19</define-tag>
-<define-tag secrefs>CVE-2018-13005 CVE-2018-13006 Bug#902782</define-tag>
-<define-tag packages>gpac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1432.wml b/english/lts/security/2018/dla-1432.wml
deleted file mode 100644
index 89f0494ac95..00000000000
--- a/english/lts/security/2018/dla-1432.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two heap buffer over read conditions were found in gpac.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13005">CVE-2018-13005</a>
-
- <p>Due to an error in a while loop condition, the function urn_Read in
- isomedia/box_code_base.c has a heap-based buffer over-read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13006">CVE-2018-13006</a>
-
- <p>Due to an error in a strlen call, there is a heap-based buffer over-read
- in the isomedia/box_dump.c function hdlr_dump.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.0+svn5324~dfsg1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your gpac packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1432.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1433.data b/english/lts/security/2018/dla-1433.data
deleted file mode 100644
index 2abba8e9502..00000000000
--- a/english/lts/security/2018/dla-1433.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1433-1 openjpeg2</define-tag>
-<define-tag report_date>2018-7-19</define-tag>
-<define-tag secrefs>CVE-2015-1239 CVE-2016-5139</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1433.wml b/english/lts/security/2018/dla-1433.wml
deleted file mode 100644
index 2ee57feda30..00000000000
--- a/english/lts/security/2018/dla-1433.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1239">CVE-2015-1239</a>
-
- <p>Fix for denial of service (process crash) via a crafted PDF.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5139">CVE-2016-5139</a>
-
- <p>Fix for integer overflows, allowing a denial of service
- (heap-based buffer overflow) or possibly have unspecified
- other impact via crafted JPEG 2000 data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.0-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1433.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1434.data b/english/lts/security/2018/dla-1434.data
deleted file mode 100644
index 28b617b067a..00000000000
--- a/english/lts/security/2018/dla-1434.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1434-1 linux-base</define-tag>
-<define-tag report_date>2018-7-20</define-tag>
-<define-tag secrefs>Bug#702482 Bug#761614</define-tag>
-<define-tag packages>linux-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1434.wml b/english/lts/security/2018/dla-1434.wml
deleted file mode 100644
index 93b09a8e749..00000000000
--- a/english/lts/security/2018/dla-1434.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The linux-base package has been updated to support the package of
-Linux 4.9 that was recently added to Debian 8. This resolves a
-dependency that was not satisfiable by the jessie and jessie-security
-suites.</p>
-
-<p>This update also fixes a bug in version ordering in the linux-version
-command, corrects the package name printed by the perf command when
-linux-perf-4.9 is needed, and adds bash-completion support for the
-perf command.</p>
-
-<p>For Debian 8 <q>Jessie</q>, the new version is 4.5~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1434.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1435.data b/english/lts/security/2018/dla-1435.data
deleted file mode 100644
index b2e8635528d..00000000000
--- a/english/lts/security/2018/dla-1435.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1435-1 dnsmasq</define-tag>
-<define-tag report_date>2018-7-20</define-tag>
-<define-tag secrefs>Bug#860064</define-tag>
-<define-tag packages>dnsmasq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1435.wml b/english/lts/security/2018/dla-1435.wml
deleted file mode 100644
index 4cfa465d67e..00000000000
--- a/english/lts/security/2018/dla-1435.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The dns-root-data update to 2017072601~deb8u2 broke dnsmasq's
-init script, making dnsmasq no longer start when dns-root-data
-was installed.</p>
-
-<p>This update fixes dnsmasq's parsing of dns-root-data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.72-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your dnsmasq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1435.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1436.data b/english/lts/security/2018/dla-1436.data
deleted file mode 100644
index 43bb82543a7..00000000000
--- a/english/lts/security/2018/dla-1436.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1436-1 gosa</define-tag>
-<define-tag report_date>2018-7-20</define-tag>
-<define-tag secrefs>CVE-2018-1000528 Bug#902723</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1436.wml b/english/lts/security/2018/dla-1436.wml
deleted file mode 100644
index 76d338283d9..00000000000
--- a/english/lts/security/2018/dla-1436.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Fabian Henneke discovered a cross-site scripting vulnerability in the
-password change form of GOsa, a web-based LDAP administration program.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.4+reloaded2-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your gosa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1436.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1437-2.data b/english/lts/security/2018/dla-1437-2.data
deleted file mode 100644
index fea6ac7c9f9..00000000000
--- a/english/lts/security/2018/dla-1437-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1437-2 slurm-llnl</define-tag>
-<define-tag report_date>2018-8-8</define-tag>
-<define-tag secrefs>CVE-2018-10995 Bug#893044</define-tag>
-<define-tag packages>slurm-llnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1437-2.wml b/english/lts/security/2018/dla-1437-2.wml
deleted file mode 100644
index f6ce87b08c8..00000000000
--- a/english/lts/security/2018/dla-1437-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update for slurm-llnl introduced a regression in the fix for
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-10995">CVE-2018-10995</a> which broke accounting.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-14.03.9-5+deb8u4.</p>
-
-<p>We recommend that you upgrade your slurm-llnl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1437-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1437.data b/english/lts/security/2018/dla-1437.data
deleted file mode 100644
index 872293c4f9c..00000000000
--- a/english/lts/security/2018/dla-1437.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1437-1 slurm-llnl</define-tag>
-<define-tag report_date>2018-7-21</define-tag>
-<define-tag secrefs>CVE-2018-7033 CVE-2018-10995</define-tag>
-<define-tag packages>slurm-llnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1437.wml b/english/lts/security/2018/dla-1437.wml
deleted file mode 100644
index d8be662e7ce..00000000000
--- a/english/lts/security/2018/dla-1437.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7033">CVE-2018-7033</a>
- <p>Fix for issue in accounting_storage/mysql plugin by always
- escaping strings within the slurmdbd.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10995">CVE-2018-10995</a>
-
- <p>Fix for mishandling of user names (aka user_name fields) and
- group ids (aka gid fields).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.03.9-5+deb8u3.</p>
-
-<p>We recommend that you upgrade your slurm-llnl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1437.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1438.data b/english/lts/security/2018/dla-1438.data
deleted file mode 100644
index dfcd9d234df..00000000000
--- a/english/lts/security/2018/dla-1438.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1438-1 opencv</define-tag>
-<define-tag report_date>2018-7-22</define-tag>
-<define-tag secrefs>CVE-2016-1516 CVE-2017-12597 CVE-2017-12598 CVE-2017-12599 CVE-2017-12601 CVE-2017-12603 CVE-2017-12604 CVE-2017-12605 CVE-2017-12606 CVE-2017-12862 CVE-2017-12863 CVE-2017-12864 CVE-2017-14136 CVE-2017-17760 CVE-2017-1000450 CVE-2018-5268 CVE-2018-5269</define-tag>
-<define-tag packages>opencv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1438.wml b/english/lts/security/2018/dla-1438.wml
deleted file mode 100644
index 1ce78d9aa14..00000000000
--- a/english/lts/security/2018/dla-1438.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Early versions of opencv have problems while reading data, which might
-result in either buffer overflows, out-of bounds errors or integer
-overflows.
-Further assertion errors might happen due to incorrect integer cast.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.9.1+dfsg-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your opencv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1438.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1439.data b/english/lts/security/2018/dla-1439.data
deleted file mode 100644
index 94420bc67c2..00000000000
--- a/english/lts/security/2018/dla-1439.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1439-1 resiprocate</define-tag>
-<define-tag report_date>2018-7-24</define-tag>
-<define-tag secrefs>CVE-2017-11521 CVE-2018-12584</define-tag>
-<define-tag packages>resiprocate</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1439.wml b/english/lts/security/2018/dla-1439.wml
deleted file mode 100644
index cccfa662744..00000000000
--- a/english/lts/security/2018/dla-1439.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12584">CVE-2018-12584</a>
- <p>A flaw in function ConnectionBase::preparseNewBytes of
- resip/stack/ConnectionBase.cxx has been detected, that
- allows remote attackers to cause a denial of service
- (buffer overflow) or possibly execute arbitrary code
- when TLS communication is enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11521">CVE-2017-11521</a>
-
- <p>A flaw in function SdpContents::Session::Medium::parse of
- resip/stack/SdpContents.cxx has been detected, that allows
- remote attackers to cause a denial of service (memory
- consumption) by triggering many media connections.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.9.7-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your resiprocate packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1439.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1440.data b/english/lts/security/2018/dla-1440.data
deleted file mode 100644
index ef3c370f832..00000000000
--- a/english/lts/security/2018/dla-1440.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1440-1 libarchive-zip-perl</define-tag>
-<define-tag report_date>2018-7-24</define-tag>
-<define-tag secrefs>CVE-2018-10860 Bug#902882</define-tag>
-<define-tag packages>libarchive-zip-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1440.wml b/english/lts/security/2018/dla-1440.wml
deleted file mode 100644
index bed367df23f..00000000000
--- a/english/lts/security/2018/dla-1440.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The libarchive-zip-perl package is vulnerable to a directory traversal
-attack in Archive::Zip. It was found that the Archive::Zip module did
-not properly sanitize paths while extracting zip files. An attacker
-able to provide a specially crafted archive for processing could use
-this flaw to write or overwrite arbitrary files in the context of the
-Perl interpreter.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.39-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libarchive-zip-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1440.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1441.data b/english/lts/security/2018/dla-1441.data
deleted file mode 100644
index bcca6237966..00000000000
--- a/english/lts/security/2018/dla-1441.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1441-1 sympa</define-tag>
-<define-tag report_date>2018-7-24</define-tag>
-<define-tag secrefs>CVE-2018-1000550</define-tag>
-<define-tag packages>sympa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1441.wml b/english/lts/security/2018/dla-1441.wml
deleted file mode 100644
index 65ed167cbce..00000000000
--- a/english/lts/security/2018/dla-1441.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been discovered in Sympa, a modern mailing list
-manager, that allows write access to files on the server filesystem.
-This flaw allows to create or modify any file writable by the Sympa
-user, located on the server filesystem, using the function of Sympa
-web interface template file saving.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.1.23~dfsg-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your sympa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1441.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1442-2.data b/english/lts/security/2018/dla-1442-2.data
deleted file mode 100644
index b0818312ca5..00000000000
--- a/english/lts/security/2018/dla-1442-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1442-2 mailman</define-tag>
-<define-tag report_date>2018-7-27</define-tag>
-<define-tag secrefs>Bug#904680</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1442-2.wml b/english/lts/security/2018/dla-1442-2.wml
deleted file mode 100644
index add8d6a5461..00000000000
--- a/english/lts/security/2018/dla-1442-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update of mailman announced as DLA-1442-1 introduced a
-regression due to an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-13796">CVE-2018-13796</a> that broke the
-admin and listinfo overview pages.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1.18-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1442-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1442.data b/english/lts/security/2018/dla-1442.data
deleted file mode 100644
index ef622b36fd5..00000000000
--- a/english/lts/security/2018/dla-1442.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1442-1 mailman</define-tag>
-<define-tag report_date>2018-7-24</define-tag>
-<define-tag secrefs>CVE-2018-0618 CVE-2018-13796 Bug#903674</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1442.wml b/english/lts/security/2018/dla-1442.wml
deleted file mode 100644
index 6b9cf6f4518..00000000000
--- a/english/lts/security/2018/dla-1442.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two flaws were discovered in mailman, a web-based mailing list manager.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0618">CVE-2018-0618</a>
-
- <p>Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc.
- discovered that mailman is prone to a cross-site scripting flaw
- allowing a malicious listowner to inject scripts into the listinfo
- page, due to not validated input in the host_name field.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13796">CVE-2018-13796</a>
-
- <p>Hammad Qureshi discovered a content spoofing vulnerability with
- invalid list name messages in the web UI.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1.18-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1442.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1443.data b/english/lts/security/2018/dla-1443.data
deleted file mode 100644
index b6aec9ecb7a..00000000000
--- a/english/lts/security/2018/dla-1443.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1443-1 evolution-data-server</define-tag>
-<define-tag report_date>2018-7-25</define-tag>
-<define-tag secrefs>CVE-2016-10727</define-tag>
-<define-tag packages>evolution-data-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1443.wml b/english/lts/security/2018/dla-1443.wml
deleted file mode 100644
index aa6f61c9a59..00000000000
--- a/english/lts/security/2018/dla-1443.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a protocol implementation error in
-evolution-data-server where <q>STARTTLS not supported</q> errors from IMAP
-servers were ignored leading to the use of insecure connections without
-the user's knowledge or consent.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in evolution-data-server
-version 3.12.9~git20141128.5242b0-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your evolution-data-server packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1443.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1444.data b/english/lts/security/2018/dla-1444.data
deleted file mode 100644
index 7293d3219a6..00000000000
--- a/english/lts/security/2018/dla-1444.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1444-1 vim-syntastic</define-tag>
-<define-tag report_date>2018-7-26</define-tag>
-<define-tag secrefs>CVE-2018-11319</define-tag>
-<define-tag packages>vim-syntastic</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1444.wml b/english/lts/security/2018/dla-1444.wml
deleted file mode 100644
index 810623410b5..00000000000
--- a/english/lts/security/2018/dla-1444.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11319">CVE-2018-11319</a>
- <p>The improper handling of search for configuration files might be
- exploited for arbitrary code execution via a malicious gcc plugin.</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.5.0-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your vim-syntastic packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1444.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1445-2.data b/english/lts/security/2018/dla-1445-2.data
deleted file mode 100644
index df2c7e405ad..00000000000
--- a/english/lts/security/2018/dla-1445-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1445-2 busybox</define-tag>
-<define-tag report_date>2018-8-2</define-tag>
-<define-tag packages>busybox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1445-2.wml b/english/lts/security/2018/dla-1445-2.wml
deleted file mode 100644
index d9f9f737302..00000000000
--- a/english/lts/security/2018/dla-1445-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update of busybox announced as DLA-1445-1 introduced a
-regression due to an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-9261">CVE-2015-9261</a>. It was no
-longer possible to decompress gzip archives which exceeded a certain
-file size.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.22.0-9+deb8u3.</p>
-
-<p>We recommend that you upgrade your busybox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1445-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1445-3.data b/english/lts/security/2018/dla-1445-3.data
deleted file mode 100644
index dd75a1fecc3..00000000000
--- a/english/lts/security/2018/dla-1445-3.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1445-3 busybox</define-tag>
-<define-tag report_date>2018-8-3</define-tag>
-<define-tag packages>busybox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1445-3.wml b/english/lts/security/2018/dla-1445-3.wml
deleted file mode 100644
index 41e768e3369..00000000000
--- a/english/lts/security/2018/dla-1445-3.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the security update of busybox announced as
-DLA-1445-1 to prevent the exploitation of <a href="https://security-tracker.debian.org/tracker/CVE-2011-5325">CVE-2011-5325</a>, a symlinking
-attack, was too strict in case of cpio archives. This update restores
-the old behavior.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.22.0-9+deb8u4.</p>
-
-<p>We recommend that you upgrade your busybox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1445-3.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1445.data b/english/lts/security/2018/dla-1445.data
deleted file mode 100644
index ad98418444d..00000000000
--- a/english/lts/security/2018/dla-1445.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1445-1 busybox</define-tag>
-<define-tag report_date>2018-7-27</define-tag>
-<define-tag secrefs>CVE-2011-5325 CVE-2014-9645 CVE-2015-9261 CVE-2016-2147 CVE-2016-2148 CVE-2017-15873 CVE-2017-16544 CVE-2018-1000517 Bug#902724 Bug#882258 Bug#879732 Bug#818497 Bug#818499 Bug#803097 Bug#802702</define-tag>
-<define-tag packages>busybox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1445.wml b/english/lts/security/2018/dla-1445.wml
deleted file mode 100644
index c334acdff8d..00000000000
--- a/english/lts/security/2018/dla-1445.wml
+++ /dev/null
@@ -1,91 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Busybox, utility programs for small and embedded systems, was affected
-by several security vulnerabilities. The Common Vulnerabilities and
-Exposures project identifies the following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-5325">CVE-2011-5325</a>
-
- <p>A path traversal vulnerability was found in Busybox implementation
- of tar. tar will extract a symlink that points outside of the
- current working directory and then follow that symlink when
- extracting other files. This allows for a directory traversal
- attack when extracting untrusted tarballs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1813">CVE-2013-1813</a>
-
- <p>When device node or symlink in /dev should be created inside
- 2-or-deeper subdirectory (/dev/dir1/dir2.../node), the intermediate
- directories are created with incorrect permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4607">CVE-2014-4607</a>
-
- <p>An integer overflow may occur when processing any variant of a
- <q>literal run</q> in the lzo1x_decompress_safe function. Each of these
- three locations is subject to an integer overflow when processing
- zero bytes. This exposes the code that copies literals to memory
- corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9645">CVE-2014-9645</a>
-
- <p>The add_probe function in modutils/modprobe.c in BusyBox allows
- local users to bypass intended restrictions on loading kernel
- modules via a / (slash) character in a module name, as demonstrated
- by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none
- /" command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2147">CVE-2016-2147</a>
-
- <p>Integer overflow in the DHCP client (udhcpc) in BusyBox allows
- remote attackers to cause a denial of service (crash) via a
- malformed RFC1035-encoded domain name, which triggers an
- out-of-bounds heap write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2148">CVE-2016-2148</a>
-
- <p>Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox
- allows remote attackers to have unspecified impact via vectors
- involving OPTION_6RD parsing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15873">CVE-2017-15873</a>
-
- <p>The get_next_block function in archival/libarchive
- /decompress_bunzip2.c in BusyBox has an Integer Overflow that may
- lead to a write access violation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16544">CVE-2017-16544</a>
-
- <p>In the add_match function in libbb/lineedit.c in BusyBox, the tab
- autocomplete feature of the shell, used to get a list of filenames
- in a directory, does not sanitize filenames and results in executing
- any escape sequence in the terminal. This could potentially result
- in code execution, arbitrary file writes, or other attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000517">CVE-2018-1000517</a>
-
- <p>BusyBox contains a Buffer Overflow vulnerability in
- Busybox wget that can result in a heap-based buffer overflow.
- This attack appears to be exploitable via network connectivity.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9621">CVE-2015-9621</a>
-
- <p>Unziping a specially crafted zip file results in a computation of an
- invalid pointer and a crash reading an invalid address.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.22.0-9+deb8u2.</p>
-
-<p>We recommend that you upgrade your busybox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1445.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1446.data b/english/lts/security/2018/dla-1446.data
deleted file mode 100644
index dc7e1c94ad7..00000000000
--- a/english/lts/security/2018/dla-1446.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1446-1 intel-microcode</define-tag>
-<define-tag report_date>2018-7-27</define-tag>
-<define-tag secrefs>CVE-2018-3639 CVE-2018-3640</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1446.wml b/english/lts/security/2018/dla-1446.wml
deleted file mode 100644
index 8964fcdb8e8..00000000000
--- a/english/lts/security/2018/dla-1446.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security researchers identified two software analysis methods that, if
-used for malicious purposes, have the potential to improperly gather
-sensitive data from multiple types of computing devices with different
-vendors’ processors and operating systems.</p>
-
-<p>This update requires an update to the intel-microcode package, which
-is non-free. Users who have already installed the version from
-jessie-backports-sloppy do not need to upgrade.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a>
-
- <p>Speculative Store Bypass (SSB) – also known as Variant 4</p>
-
- <p>Systems with microprocessors utilizing speculative execution and
- speculative execution of memory reads before the addresses of all
- prior memory writes are known may allow unauthorized disclosure of
- information to an attacker with local user access via a side-channel
- analysis.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3640">CVE-2018-3640</a>
-
- <p>Rogue System Register Read (RSRE) – also known as Variant 3a</p>
-
- <p>Systems with microprocessors utilizing speculative execution and
- that perform speculative reads of system registers may allow
- unauthorized disclosure of system parameters to an attacker with
- local user access via a side-channel analysis.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.20180703.2~deb8u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1446.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1447.data b/english/lts/security/2018/dla-1447.data
deleted file mode 100644
index bade15a5c0b..00000000000
--- a/english/lts/security/2018/dla-1447.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1447-1 libidn</define-tag>
-<define-tag report_date>2018-7-27</define-tag>
-<define-tag secrefs>CVE-2017-14062 Bug#873903</define-tag>
-<define-tag packages>libidn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1447.wml b/english/lts/security/2018/dla-1447.wml
deleted file mode 100644
index 39fa6424925..00000000000
--- a/english/lts/security/2018/dla-1447.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An integer overflow vulnerability was discovered in libidn, the GNU library for
-Internationalized Domain Names (IDNs), in its Punycode handling (a Unicode
-characters to ASCII encoding) allowing a remote attacker to cause a denial of
-service against applications using the library.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.29-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your libidn packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1447.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1448.data b/english/lts/security/2018/dla-1448.data
deleted file mode 100644
index afdd10a1cdd..00000000000
--- a/english/lts/security/2018/dla-1448.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1448-1 policykit-1</define-tag>
-<define-tag report_date>2018-7-28</define-tag>
-<define-tag secrefs>CVE-2018-1116 Bug##903563</define-tag>
-<define-tag packages>policykit-1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1448.wml b/english/lts/security/2018/dla-1448.wml
deleted file mode 100644
index aa0955a6724..00000000000
--- a/english/lts/security/2018/dla-1448.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service vulnerability in
-policykit-1, a framework for managing administrative policies and
-privileges.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in policykit-1 version
-0.105-15~deb8u3.</p>
-
-<p>We recommend that you upgrade your policykit-1 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1448.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1449.data b/english/lts/security/2018/dla-1449.data
deleted file mode 100644
index 54173a87e96..00000000000
--- a/english/lts/security/2018/dla-1449.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1449-1 openssl</define-tag>
-<define-tag report_date>2018-7-28</define-tag>
-<define-tag secrefs>CVE-2018-0732 CVE-2018-0737 Bug#895844</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1449.wml b/english/lts/security/2018/dla-1449.wml
deleted file mode 100644
index e0eab920eb5..00000000000
--- a/english/lts/security/2018/dla-1449.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues were discovered in OpenSSL, the Secure Sockets Layer toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0732">CVE-2018-0732</a>
-
- <p>Denial of service by a malicious server that sends a very large
- prime value to the client during TLS handshake.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0737">CVE-2018-0737</a>
-
- <p>Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and
- Luis Manuel Alvarez Tapia discovered that the OpenSSL RSA Key
- generation algorithm has been shown to be vulnerable to a cache
- timing side channel attack. An attacker with sufficient access to
- mount cache timing attacks during the RSA key generation process
- could recover the private key.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.1t-1+deb8u9.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1449.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1450.data b/english/lts/security/2018/dla-1450.data
deleted file mode 100644
index c356722b3a3..00000000000
--- a/english/lts/security/2018/dla-1450.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1450-1 tomcat8</define-tag>
-<define-tag report_date>2018-7-29</define-tag>
-<define-tag secrefs>CVE-2018-1304 CVE-2018-1305 Bug#802312</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1450.wml b/english/lts/security/2018/dla-1450.wml
deleted file mode 100644
index 617a1585dd9..00000000000
--- a/english/lts/security/2018/dla-1450.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1304">CVE-2018-1304</a>
-
- <p>The URL pattern of "" (the empty string) which exactly maps to the
- context root was not correctly handled in Apache Tomcat when used as
- part of a security constraint definition. This caused the constraint
- to be ignored. It was, therefore, possible for unauthorized users to
- gain access to web application resources that should have been
- protected. Only security constraints with a URL pattern of the empty
- string were affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1305">CVE-2018-1305</a>
-
- <p>Security constraints defined by annotations of Servlets in Apache
- Tomcat were only applied once a Servlet had been loaded. Because
- security constraints defined in this way apply to the URL pattern
- and any URLs below that point, it was possible - depending on the
- order Servlets were loaded - for some security constraints not to be
- applied. This could have exposed resources to users who were not
- authorized to access them.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8.0.14-1+deb8u12.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1450.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1451.data b/english/lts/security/2018/dla-1451.data
deleted file mode 100644
index 0001c26e75d..00000000000
--- a/english/lts/security/2018/dla-1451.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1451-1 wireshark</define-tag>
-<define-tag report_date>2018-7-29</define-tag>
-<define-tag secrefs>CVE-2018-14339 CVE-2018-14340 CVE-2018-14341 CVE-2018-14342 CVE-2018-14343 CVE-2018-14368 CVE-2018-14369</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1451.wml b/english/lts/security/2018/dla-1451.wml
deleted file mode 100644
index 8be791a46f3..00000000000
--- a/english/lts/security/2018/dla-1451.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14339">CVE-2018-14339</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-14340">CVE-2018-14340</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-14341">CVE-2018-14341</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-14342">CVE-2018-14342</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-14343">CVE-2018-14343</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-14368">CVE-2018-14368</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-14369">CVE-2018-14369</a>
- <p>Due to several flaws different dissectors could go in infinite
- loop or could be crashed by malicious packets.</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u15.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1451.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1452.data b/english/lts/security/2018/dla-1452.data
deleted file mode 100644
index 65060ebcc88..00000000000
--- a/english/lts/security/2018/dla-1452.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1452-1 wordpress</define-tag>
-<define-tag report_date>2018-7-30</define-tag>
-<define-tag secrefs>CVE-2016-5836 CVE-2018-12895 Bug#902876</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1452.wml b/english/lts/security/2018/dla-1452.wml
deleted file mode 100644
index f8f9b452395..00000000000
--- a/english/lts/security/2018/dla-1452.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in wordpress, a web blogging
-tool. The Common Vulnerabilities and Exposures project identifies the
-following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5836">CVE-2016-5836</a>
-
- <p>The oEmbed protocol implementation in WordPress before 4.5.3 allows
- remote attackers to cause a denial of service via unspecified
- vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12895">CVE-2018-12895</a>
-
- <p>A vulnerability was discovered in Wordpress, a web blogging tool. It
- allowed remote attackers with specific roles to execute arbitrary
- code.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1+dfsg-1+deb8u18.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1452.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1453.data b/english/lts/security/2018/dla-1453.data
deleted file mode 100644
index 8f4e6935b9c..00000000000
--- a/english/lts/security/2018/dla-1453.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1453-1 tomcat7</define-tag>
-<define-tag report_date>2018-7-30</define-tag>
-<define-tag secrefs>CVE-2018-8034</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1453.wml b/english/lts/security/2018/dla-1453.wml
deleted file mode 100644
index 4cb6227b777..00000000000
--- a/english/lts/security/2018/dla-1453.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The host name verification in Tomcat when using TLS with the WebSocket
-client was missing. It is now enabled by default.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.0.56-3+really7.0.90-1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1453.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1454.data b/english/lts/security/2018/dla-1454.data
deleted file mode 100644
index 0bda748432a..00000000000
--- a/english/lts/security/2018/dla-1454.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1454-1 network-manager-vpnc</define-tag>
-<define-tag report_date>2018-7-31</define-tag>
-<define-tag secrefs>CVE-2018-10900 Bug#904255</define-tag>
-<define-tag packages>network-manager-vpnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1454.wml b/english/lts/security/2018/dla-1454.wml
deleted file mode 100644
index c908636c3f2..00000000000
--- a/english/lts/security/2018/dla-1454.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Denis Andzakovic discovered that network-manager-vpnc, a plugin to
-provide VPNC support for NetworkManager, is prone to a privilege
-escalation vulnerability. A newline character can be used to inject a
-Password helper parameter into the configuration data passed to vpnc,
-allowing a local user with privileges to modify a system connection to
-execute arbitrary commands as root.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.10.0-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your network-manager-vpnc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1454.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1455.data b/english/lts/security/2018/dla-1455.data
deleted file mode 100644
index 1ca42a531bb..00000000000
--- a/english/lts/security/2018/dla-1455.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1455-1 mutt</define-tag>
-<define-tag report_date>2018-8-2</define-tag>
-<define-tag secrefs>CVE-2018-14349 CVE-2018-14350 CVE-2018-14351 CVE-2018-1435 CVE-2018-14353 CVE-2018-14354 CVE-2018-14355 CVE-2018-1435 CVE-2018-14357 CVE-2018-14358 CVE-2018-14359 CVE-2018-1436 CVE-2018-14361 CVE-2018-14362 CVE-2018-14363 Bug#904051</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1455.wml b/english/lts/security/2018/dla-1455.wml
deleted file mode 100644
index 684e7616e76..00000000000
--- a/english/lts/security/2018/dla-1455.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in mutt, a sophisticated
-text-based Mail User Agent, resulting in denial of service, stack-based
-buffer overflow, arbitrary command execution, and directory traversal
-flaws.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.23-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1455.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1456.data b/english/lts/security/2018/dla-1456.data
deleted file mode 100644
index 1e83a6b7807..00000000000
--- a/english/lts/security/2018/dla-1456.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1456-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-8-3</define-tag>
-<define-tag secrefs>CVE-2016-5239 CVE-2017-6335 CVE-2017-9098 CVE-2017-11102 CVE-2017-11140 CVE-2017-11403 CVE-2017-11637 CVE-2017-1163 CVE-2017-11641 CVE-2017-11642 CVE-2017-12935 CVE-2017-1293 CVE-2017-13737 CVE-2017-13775 CVE-2017-13776 CVE-2017-1377 CVE-2017-14504 CVE-2017-14994 CVE-2017-14997 CVE-2017-1527 CVE-2017-15930 CVE-2017-16352 CVE-2017-16545 CVE-2017-1654 CVE-2017-18219 CVE-2017-18220 CVE-2017-18229 CVE-2017-1823 CVE-2017-18231 CVE-2018-5685 CVE-2018-6799 CVE-2018-9018 Bug#867746 Bug#870153 Bug#870154 Bug#870156 Bug#870155 Bug#872576 Bug#872575 Bug#878511</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1456.wml b/english/lts/security/2018/dla-1456.wml
deleted file mode 100644
index f8f9a168631..00000000000
--- a/english/lts/security/2018/dla-1456.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various vulnerabilities were discovered in graphicsmagick, a collection
-of image processing tools and associated libraries, resulting in denial
-of service, information disclosure, and a variety of buffer overflows
-and overreads.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.20-3+deb8u4.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1456.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1457.data b/english/lts/security/2018/dla-1457.data
deleted file mode 100644
index 6b0339bc11b..00000000000
--- a/english/lts/security/2018/dla-1457.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1457-1 ant</define-tag>
-<define-tag report_date>2018-8-5</define-tag>
-<define-tag secrefs>TEMP-0904191-9063D5 Bug#904191</define-tag>
-<define-tag packages>ant</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1457.wml b/english/lts/security/2018/dla-1457.wml
deleted file mode 100644
index 8f78b5b1b35..00000000000
--- a/english/lts/security/2018/dla-1457.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-10886">CVE-2018-10886</a> was incomplete in the previous upload. New
-changes was implemented upstream which check and resolve symlinks
-before expanding the archives.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.9.4-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your ant packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1457.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1458.data b/english/lts/security/2018/dla-1458.data
deleted file mode 100644
index e9732483387..00000000000
--- a/english/lts/security/2018/dla-1458.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1458-1 xml-security-c</define-tag>
-<define-tag report_date>2018-8-6</define-tag>
-<define-tag secrefs>not yet available Bug#905332</define-tag>
-<define-tag packages>xml-security-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1458.wml b/english/lts/security/2018/dla-1458.wml
deleted file mode 100644
index 64e50b31c40..00000000000
--- a/english/lts/security/2018/dla-1458.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Apache XML Security for C++ library performed
-insufficient validation of KeyInfo hints, which could result in denial
-of service via NULL pointer dereferences when processing malformed XML
-data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.7.2-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your xml-security-c packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1458.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1459.data b/english/lts/security/2018/dla-1459.data
deleted file mode 100644
index 4d4cf066d8b..00000000000
--- a/english/lts/security/2018/dla-1459.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1459-1 cgit</define-tag>
-<define-tag report_date>2018-8-6</define-tag>
-<define-tag secrefs>CVE-2018-14912 Bug##905382</define-tag>
-<define-tag packages>cgit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1459.wml b/english/lts/security/2018/dla-1459.wml
deleted file mode 100644
index 9013860ecb4..00000000000
--- a/english/lts/security/2018/dla-1459.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a directory traversal vulnerability in
-cgit, a web frontend for Git repositories.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in cgit version
-0.10.2.git2.0.1-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your cgit packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1459.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1460.data b/english/lts/security/2018/dla-1460.data
deleted file mode 100644
index a1714b500df..00000000000
--- a/english/lts/security/2018/dla-1460.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1460-1 libmspack</define-tag>
-<define-tag report_date>2018-8-6</define-tag>
-<define-tag secrefs>CVE-2018-14681 CVE-2018-14682 CVE-2018-14679 CVE-2018-14680 Bug##904799 Bug##904800 Bug##904801 Bug##904802</define-tag>
-<define-tag packages>libmspack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1460.wml b/english/lts/security/2018/dla-1460.wml
deleted file mode 100644
index 81530b85636..00000000000
--- a/english/lts/security/2018/dla-1460.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were several vulnerabilities in
-libsmpack, a library used to handle Microsoft compression formats.</p>
-
-<p>A remote attacker could craft malicious .CAB, .CHM or .KWAJ files
-and use these flaws to cause a denial of service via application
-crash, or potentially execute arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in libmspack
-version 0.5-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libmspack packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1460.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1461.data b/english/lts/security/2018/dla-1461.data
deleted file mode 100644
index f1a87540cfe..00000000000
--- a/english/lts/security/2018/dla-1461.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1461-1 clamav</define-tag>
-<define-tag report_date>2018-8-20</define-tag>
-<define-tag secrefs>CVE-2018-0360 CVE-2018-0361 Bug#902601 Bug#903896 Bug#905044</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1461.wml b/english/lts/security/2018/dla-1461.wml
deleted file mode 100644
index 6599bccf4a2..00000000000
--- a/english/lts/security/2018/dla-1461.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ClamAV, an anti-virus utility for Unix, has released the version 0.100.1.
-Installing this new version is required to make use of all current virus
-signatures and to avoid warnings.</p>
-
-<p>This version also fixes two security issues discovered after version 0.100.0:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0360">CVE-2018-0360</a>
-
- <p>Integer overflow with a resultant infinite loop via a crafted Hangul Word
- Processor file. Reported by Secunia Research at Flexera.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0361">CVE-2018-0361</a>
-
- <p>PDF object length check, unreasonably long time to parse a relatively small
- file. Reported by aCaB.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.100.1+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1461.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1462.data b/english/lts/security/2018/dla-1462.data
deleted file mode 100644
index 4f1317c02eb..00000000000
--- a/english/lts/security/2018/dla-1462.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1462-1 wpa</define-tag>
-<define-tag report_date>2018-8-9</define-tag>
-<define-tag secrefs>CVE-2018-14526 Bug#905739</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1462.wml b/english/lts/security/2018/dla-1462.wml
deleted file mode 100644
index 26258669d43..00000000000
--- a/english/lts/security/2018/dla-1462.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerability was discovered in wpa_supplicant.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14526">CVE-2018-14526</a>
-
- <p>An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0
- through 2.6. Under certain conditions, the integrity of EAPOL-Key
- messages is not checked, leading to a decryption oracle. An attacker
- within range of the Access Point and client can abuse the
- vulnerability to recover sensitive information.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS.">https://wiki.debian.org/LTS.</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1462.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1463.data b/english/lts/security/2018/dla-1463.data
deleted file mode 100644
index d9d7a4c5c8f..00000000000
--- a/english/lts/security/2018/dla-1463.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1463-1 sam2p</define-tag>
-<define-tag report_date>2018-8-10</define-tag>
-<define-tag secrefs>CVE-2018-12578 CVE-2018-12601</define-tag>
-<define-tag packages>sam2p</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1463.wml b/english/lts/security/2018/dla-1463.wml
deleted file mode 100644
index c1ac49f020b..00000000000
--- a/english/lts/security/2018/dla-1463.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various vulnerabilities leading to denial of service or possible unspecified
-other impacts were discovered in sam2p, an utility to convert raster images to
-EPS, PDF, and other formats.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12578">CVE-2018-12578</a>
-
- <p>A heap-buffer-overflow in bmp_compress1_row. Thanks to Peter Szabo for
- providing a fix.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12601">CVE-2018-12601</a>
-
- <p>A heap-buffer-overflow in function ReadImage, in file input-tga.ci. Thanks
- to Peter Szabo for providing a fix.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.49.2-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your sam2p packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1463.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1464.data b/english/lts/security/2018/dla-1464.data
deleted file mode 100644
index b3b707d73a6..00000000000
--- a/english/lts/security/2018/dla-1464.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1464-1 postgresql-9.4</define-tag>
-<define-tag report_date>2018-8-15</define-tag>
-<define-tag secrefs>CVE-2018-10915</define-tag>
-<define-tag packages>postgresql-9.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1464.wml b/english/lts/security/2018/dla-1464.wml
deleted file mode 100644
index 12e59180d2d..00000000000
--- a/english/lts/security/2018/dla-1464.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An unprivileged user of dblink or postgres_fdw could bypass the checks
-intended to prevent use of server-side credentials, such as a ~/.pgpass
-file owned by the operating-system user running the server. Servers
-allowing peer authentication on local connections are particularly
-vulnerable. Other attacks such as SQL injection into a postgres_fdw
-session are also possible. Attacking postgres_fdw in this way requires
-the ability to create a foreign server object with selected connection
-parameters, but any user with access to dblink could exploit the
-problem. In general, an attacker with the ability to select the
-connection parameters for a libpq-using application could cause
-mischief, though other plausible attack scenarios are harder to think
-of. Our thanks to Andrew Krasichkov for reporting this issue.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.4.19-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1464.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1465.data b/english/lts/security/2018/dla-1465.data
deleted file mode 100644
index b96256b68ab..00000000000
--- a/english/lts/security/2018/dla-1465.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1465-1 blender</define-tag>
-<define-tag report_date>2018-8-13</define-tag>
-<define-tag secrefs>CVE-2017-2899 CVE-2017-2900 CVE-2017-2901 CVE-2017-2902 CVE-2017-2903 CVE-2017-2904 CVE-2017-2905 CVE-2017-2906 CVE-2017-2907 CVE-2017-2908 CVE-2017-2918 CVE-2017-12081 CVE-2017-12082 CVE-2017-12086 CVE-2017-12099 CVE-2017-12100 CVE-2017-12101 CVE-2017-12102 CVE-2017-12103 CVE-2017-12104 CVE-2017-12105</define-tag>
-<define-tag packages>blender</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1465.wml b/english/lts/security/2018/dla-1465.wml
deleted file mode 100644
index b04c0fc8fb2..00000000000
--- a/english/lts/security/2018/dla-1465.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in various parsers of
-Blender, a 3D modeller/ renderer. Malformed .blend model files and
-malformed multimedia files (AVI, BMP, HDR, CIN, IRIS, PNG, TIFF) may
-result in the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.72.b+dfsg0-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your blender packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1465.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1466.data b/english/lts/security/2018/dla-1466.data
deleted file mode 100644
index 8ab7e0201fe..00000000000
--- a/english/lts/security/2018/dla-1466.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1466-1 linux-4.9</define-tag>
-<define-tag report_date>2018-8-15</define-tag>
-<define-tag secrefs>CVE-2018-5390 CVE-2018-5391 CVE-2018-13405 Bug#893393 Bug#903122 Bug#903767 Bug#903776 Bug#903838 Bug#903914</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1466.wml b/english/lts/security/2018/dla-1466.wml
deleted file mode 100644
index afe85d17d46..00000000000
--- a/english/lts/security/2018/dla-1466.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation or denial of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5390">CVE-2018-5390</a>
-
- <p>(SegmentSmack)</p>
-
- <p>Juha-Matti Tilli discovered that a remote attacker can trigger the
- worst case code paths for TCP stream reassembly with low rates of
- specially crafted packets, leading to remote denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5391">CVE-2018-5391</a>
-
- <p>(FragmentSmack)</p>
-
- <p>Juha-Matti Tilli discovered a flaw in the way the Linux kernel
- handled reassembly of fragmented IPv4 and IPv6 packets. A remote
- attacker can take advantage of this flaw to trigger time and
- calculation expensive fragment reassembly algorithms by sending
- specially crafted packets, leading to remote denial of service.</p>
-
- <p>This is mitigated by reducing the default limits on memory usage
- for incomplete fragmented packets. The same mitigation can be
- achieved without the need to reboot, by setting the sysctls:</p>
-
- <p>net.ipv4.ipfrag_high_thresh = 262144<br>
- net.ipv6.ip6frag_high_thresh = 262144<br>
- net.ipv4.ipfrag_low_thresh = 196608<br>
- net.ipv6.ip6frag_low_thresh = 196608</p>
-
- <p>The default values may still be increased by local configuration
- if necessary.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13405">CVE-2018-13405</a>
-
- <p>Jann Horn discovered that the inode_init_owner function in
- fs/inode.c in the Linux kernel allows local users to create files
- with an unintended group ownership allowing attackers to escalate
- privileges by making a plain file executable and SGID.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.110-3+deb9u2~deb8u1. This update includes fixes for several
-regressions in the latest point release.</p>
-
-<p>The earlier version 4.9.110-3+deb9u1~deb8u1 included all the above
-fixes except for <a href="https://security-tracker.debian.org/tracker/CVE-2018-5391">CVE-2018-5391</a>,
-which may be mitigated as explained above.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1466.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1467.data b/english/lts/security/2018/dla-1467.data
deleted file mode 100644
index 6ca557998c1..00000000000
--- a/english/lts/security/2018/dla-1467.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1467-1 ruby-zip</define-tag>
-<define-tag report_date>2018-8-15</define-tag>
-<define-tag secrefs>CVE-2018-1000544 Bug#902720</define-tag>
-<define-tag packages>ruby-zip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1467.wml b/english/lts/security/2018/dla-1467.wml
deleted file mode 100644
index 086a414f5af..00000000000
--- a/english/lts/security/2018/dla-1467.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that rubyzip, a Ruby module for reading and writing zip
-files, contained a Directory Traversal vulnerability that can be
-exploited to write arbitrary files to the filesystem.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.1.6-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your ruby-zip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1467.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1468.data b/english/lts/security/2018/dla-1468.data
deleted file mode 100644
index 7567d13b900..00000000000
--- a/english/lts/security/2018/dla-1468.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1468-1 fuse</define-tag>
-<define-tag report_date>2018-8-15</define-tag>
-<define-tag secrefs>CVE-2018-10906</define-tag>
-<define-tag packages>fuse</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1468.wml b/english/lts/security/2018/dla-1468.wml
deleted file mode 100644
index 51878279e17..00000000000
--- a/english/lts/security/2018/dla-1468.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10906">CVE-2018-10906</a>
- <p>This is a fix for a restriction bypass of the <q>allow_other</q> option
- when SELinux is active.</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.9.3-15+deb8u3.</p>
-
-<p>We recommend that you upgrade your fuse packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1468.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1469.data b/english/lts/security/2018/dla-1469.data
deleted file mode 100644
index 74fbd31fb3c..00000000000
--- a/english/lts/security/2018/dla-1469.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1469-1 libxcursor</define-tag>
-<define-tag report_date>2018-8-18</define-tag>
-<define-tag secrefs>CVE-2015-9262 Bug##906012</define-tag>
-<define-tag packages>libxcursor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1469.wml b/english/lts/security/2018/dla-1469.wml
deleted file mode 100644
index 57ac85cae4b..00000000000
--- a/english/lts/security/2018/dla-1469.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service or (potentially code
-execution) vulnerability in libxcursor, a library designed to help locate
-and load cursors for the X Window System.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in libxcursor version
-1:1.1.14-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libxcursor packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1469.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1470.data b/english/lts/security/2018/dla-1470.data
deleted file mode 100644
index 2a634466db0..00000000000
--- a/english/lts/security/2018/dla-1470.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1470-1 confuse</define-tag>
-<define-tag report_date>2018-8-18</define-tag>
-<define-tag secrefs>CVE-2018-14447 Bug#904159</define-tag>
-<define-tag packages>confuse</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1470.wml b/english/lts/security/2018/dla-1470.wml
deleted file mode 100644
index fc76bb9f84c..00000000000
--- a/english/lts/security/2018/dla-1470.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out of bound read was discoverd in libConfuse, a configuration file parser
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14447">CVE-2018-14447</a>
-
- <p>An out of bound read in trim_whitespace, fixed thanks to
- Sebastian Roland &lt;seroland86@gmail.com&gt;.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your confuse packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1470.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1471.data b/english/lts/security/2018/dla-1471.data
deleted file mode 100644
index 8d9dd5579d7..00000000000
--- a/english/lts/security/2018/dla-1471.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1471-1 kamailio</define-tag>
-<define-tag report_date>2018-8-19</define-tag>
-<define-tag secrefs>CVE-2018-14767</define-tag>
-<define-tag packages>kamailio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1471.wml b/english/lts/security/2018/dla-1471.wml
deleted file mode 100644
index 8527cc2c068..00000000000
--- a/english/lts/security/2018/dla-1471.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14767">CVE-2018-14767</a>
- <p>Fix for missing input validation, which could result in denial of
- service and potentially the execution of arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.2.0-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your kamailio packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1471.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1472.data b/english/lts/security/2018/dla-1472.data
deleted file mode 100644
index e6cc7a65bbd..00000000000
--- a/english/lts/security/2018/dla-1472.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1472-1 libcgroup</define-tag>
-<define-tag report_date>2018-8-20</define-tag>
-<define-tag secrefs>CVE-2018-14348 Bug#906308</define-tag>
-<define-tag packages>libcgroup</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1472.wml b/english/lts/security/2018/dla-1472.wml
deleted file mode 100644
index 7fc08117cfd..00000000000
--- a/english/lts/security/2018/dla-1472.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The cgrulesengd daemon in libcgroup creates log files with world
-readable and writable permissions due to a reset of the file mode
-creation mask (umask(0)).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.41-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your libcgroup packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1472.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1473.data b/english/lts/security/2018/dla-1473.data
deleted file mode 100644
index a72d4a5671b..00000000000
--- a/english/lts/security/2018/dla-1473.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1473-1 otrs2</define-tag>
-<define-tag report_date>2018-8-21</define-tag>
-<define-tag secrefs>CVE-2018-14593</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1473.wml b/english/lts/security/2018/dla-1473.wml
deleted file mode 100644
index 79646cb39c2..00000000000
--- a/english/lts/security/2018/dla-1473.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Francesco Sirocco discovered a privilege escalation flaw in otrs2, the
-Open Ticket Request System. An attacker who is logged into OTRS as a
-user may escalate their privileges by accessing a specially crafted URL.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.3.18-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1473.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1474.data b/english/lts/security/2018/dla-1474.data
deleted file mode 100644
index df210ee70d8..00000000000
--- a/english/lts/security/2018/dla-1474.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1474-1 openssh</define-tag>
-<define-tag report_date>2018-8-21</define-tag>
-<define-tag secrefs>CVE-2018-15473 Bug##906236</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1474.wml b/english/lts/security/2018/dla-1474.wml
deleted file mode 100644
index 52283ef96d3..00000000000
--- a/english/lts/security/2018/dla-1474.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a user enumeration vulnerability in
-OpenSSH. A remote attacker couldtest whether a certain user exists
-on a target server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in openssh version
-1:6.7p1-5+deb8u5.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1474.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1475.data b/english/lts/security/2018/dla-1475.data
deleted file mode 100644
index 9ec02d13713..00000000000
--- a/english/lts/security/2018/dla-1475.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1475-1 tomcat-native</define-tag>
-<define-tag report_date>2018-8-22</define-tag>
-<define-tag secrefs>CVE-2018-8019 CVE-2018-8020</define-tag>
-<define-tag packages>tomcat-native</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1475.wml b/english/lts/security/2018/dla-1475.wml
deleted file mode 100644
index cfeea8ab27f..00000000000
--- a/english/lts/security/2018/dla-1475.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>When using an OCSP responder Tomcat Native did not correctly handle
-invalid responses. This allowed for revoked client certificates to be
-incorrectly identified. It was therefore possible for users to
-authenticate with revoked certificates when using mutual TLS. Users
-not using OCSP checks are not affected by this vulnerability.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.1.32~repack-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your tomcat-native packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1475.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1476.data b/english/lts/security/2018/dla-1476.data
deleted file mode 100644
index cb21c5bb1f7..00000000000
--- a/english/lts/security/2018/dla-1476.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1476-1 dropbear</define-tag>
-<define-tag report_date>2018-8-27</define-tag>
-<define-tag secrefs>CVE-2018-15599 Bug#906890</define-tag>
-<define-tag packages>dropbear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1476.wml b/english/lts/security/2018/dla-1476.wml
deleted file mode 100644
index 477219deda6..00000000000
--- a/english/lts/security/2018/dla-1476.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability in dropbear, a lightweight SSH2 server and client, making it
-possible to guess valid usernames has been found:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15599">CVE-2018-15599</a>
-
- <p>The recv_msg_userauth_request function in svr-auth.c in is prone
- to a user enumeration vulnerability, similar to
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-15473">CVE-2018-15473</a> in OpenSSH.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2014.65-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your dropbear packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1476.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1477.data b/english/lts/security/2018/dla-1477.data
deleted file mode 100644
index 7698caf318f..00000000000
--- a/english/lts/security/2018/dla-1477.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1477-1 libgit2</define-tag>
-<define-tag report_date>2018-8-25</define-tag>
-<define-tag secrefs>CVE-2018-10887 CVE-2018-10888 CVE-2018-15501</define-tag>
-<define-tag packages>libgit2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1477.wml b/english/lts/security/2018/dla-1477.wml
deleted file mode 100644
index 1c685014b1f..00000000000
--- a/english/lts/security/2018/dla-1477.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15501">CVE-2018-15501</a>
-
- <p>A potential out-of-bounds read when processing a <q>ng</q> smart packet
- might lead to a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10887">CVE-2018-10887</a>
-
- <p>A flaw has been discovered that may lead to an integer overflow which
- in turn leads to an out of bound read, allowing to read before the
- base object. This might be used to leak memory addresses or cause a
- Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10888">CVE-2018-10888</a>
-
- <p>A flaw may lead to an out-of-bound read while reading a binary delta
- file. This might result in a Denial of Service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.21.1-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libgit2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1477.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1478.data b/english/lts/security/2018/dla-1478.data
deleted file mode 100644
index befe888f694..00000000000
--- a/english/lts/security/2018/dla-1478.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1478-1 libextractor</define-tag>
-<define-tag report_date>2018-8-26</define-tag>
-<define-tag secrefs>CVE-2018-14346 CVE-2018-14347 Bug##904903 Bug##904905</define-tag>
-<define-tag packages>libextractor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1478.wml b/english/lts/security/2018/dla-1478.wml
deleted file mode 100644
index 78d98206298..00000000000
--- a/english/lts/security/2018/dla-1478.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities in libextractor,
-a library to obtain metadata from files of arbitrary type.</p>
-
-<ul>
- <li>A stack-based buffer overflow in unzip.c. (<a href="https://security-tracker.debian.org/tracker/CVE-2018-14346">CVE-2018-14346</a>)</li>
-
- <li>An infinite loop vulnerability in mpeg_extractor.c. (<a href="https://security-tracker.debian.org/tracker/CVE-2018-14347">CVE-2018-14347</a>)</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in libextractor
-version 1:1.3-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your libextractor packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1478.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1479.data b/english/lts/security/2018/dla-1479.data
deleted file mode 100644
index aee2c9eccc8..00000000000
--- a/english/lts/security/2018/dla-1479.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1479-1 twitter-bootstrap3</define-tag>
-<define-tag report_date>2018-8-27</define-tag>
-<define-tag secrefs>CVE-2018-14040 Bug#907414</define-tag>
-<define-tag packages>twitter-bootstrap3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1479.wml b/english/lts/security/2018/dla-1479.wml
deleted file mode 100644
index 9980775e6e0..00000000000
--- a/english/lts/security/2018/dla-1479.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Bootstrap framework was found to have cross-site scripting
-vulnerabilities in the <q>collapse</q> plugin.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.2.0+dfsg-1+deb7u1.</p>
-
-<p>We recommend that you upgrade your twitter-bootstrap3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1479.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1480.data b/english/lts/security/2018/dla-1480.data
deleted file mode 100644
index 61864e924b1..00000000000
--- a/english/lts/security/2018/dla-1480.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1480-1 ruby2.1</define-tag>
-<define-tag report_date>2018-8-27</define-tag>
-<define-tag secrefs>CVE-2016-2337 CVE-2018-1000073 CVE-2018-1000074 Bug#895778 Bug#851161</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1480.wml b/english/lts/security/2018/dla-1480.wml
deleted file mode 100644
index 2c0171eb059..00000000000
--- a/english/lts/security/2018/dla-1480.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Ruby 2.1.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2337">CVE-2016-2337</a>
-
- <p>Type confusion exists in _cancel_eval Ruby's TclTkIp class
- method. Attacker passing different type of object than String as
- <q>retval</q> argument can cause arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000073">CVE-2018-1000073</a>
-
- <p>RubyGems contains a Directory Traversal vulnerability in
- install_location function of package.rb that can result in path
- traversal when writing to a symlinked basedir outside of the root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000074">CVE-2018-1000074</a>
-
- <p>RubyGems contains a Deserialization of Untrusted Data
- vulnerability in owner command that can result in code
- execution. This attack appear to be exploitable via victim must
- run the <q>gem owner</q> command on a gem with a specially crafted YAML
- file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.5-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1480.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1481.data b/english/lts/security/2018/dla-1481.data
deleted file mode 100644
index 087e066761f..00000000000
--- a/english/lts/security/2018/dla-1481.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1481-1 linux-4.9</define-tag>
-<define-tag report_date>2018-8-28</define-tag>
-<define-tag secrefs>CVE-2018-3620 CVE-2018-3646 Bug#906769</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1481.wml b/english/lts/security/2018/dla-1481.wml
deleted file mode 100644
index 329607388ad..00000000000
--- a/english/lts/security/2018/dla-1481.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple researchers have discovered a vulnerability in the way the
-Intel processor designs have implemented speculative execution of
-instructions in combination with handling of page-faults. This flaw
-could allow an attacker controlling an unprivileged process to read
-memory from arbitrary (non-user controlled) addresses, including from
-the kernel and all other processes running on the system or cross
-guest/host boundaries to read host memory.</p>
-
-<p>To fully resolve these vulnerabilities it is also necessary to install
-updated CPU microcode (only available in Debian non-free). Common server
-class CPUs are covered in the update released as DLA 1446-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.110-3+deb9u4~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1481.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1482.data b/english/lts/security/2018/dla-1482.data
deleted file mode 100644
index 18b554055c5..00000000000
--- a/english/lts/security/2018/dla-1482.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1482-1 libx11</define-tag>
-<define-tag report_date>2018-8-29</define-tag>
-<define-tag secrefs>CVE-2018-14598 CVE-2018-14599 CVE-2018-14600</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1482.wml b/english/lts/security/2018/dla-1482.wml
deleted file mode 100644
index a5a45e6719c..00000000000
--- a/english/lts/security/2018/dla-1482.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in libx11, the client interface to the
-X Windows System. The functions XGetFontPath, XListExtensions, and
-XListFonts are vulnerable to an off-by-one override on malicious
-server responses. A malicious server could also send a reply in which
-the first string overflows, causing a variable set to NULL that will
-be freed later on, leading to a segmentation fault and Denial of
-Service. The function XListExtensions in ListExt.c interprets a
-variable as signed instead of unsigned, resulting in an out-of-bounds
-write (of up to 128 bytes), leading to a Denial of Service or possibly
-remote code execution.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:1.6.2-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1482.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1483.data b/english/lts/security/2018/dla-1483.data
deleted file mode 100644
index 5a255834401..00000000000
--- a/english/lts/security/2018/dla-1483.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1483-1 389-ds-base</define-tag>
-<define-tag report_date>2018-8-30</define-tag>
-<define-tag secrefs>CVE-2018-10871 CVE-2018-10935 Bug#906985</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1483.wml b/english/lts/security/2018/dla-1483.wml
deleted file mode 100644
index 4fdcf55a687..00000000000
--- a/english/lts/security/2018/dla-1483.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10871">CVE-2018-10871</a>
-
- <p>By default nsslapd-unhashed-pw-switch was set to <q>on</q>. So a copy of
- the unhashed password was kept in modifiers and was possibly logged in
- changelog and retroCL.</p>
-
- <p>Unless it is used by some plugin it does not require to keep unhashed
- passwords. The nsslapd-unhashed-pw-switch option is now <q>off</q> by
- default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10935">CVE-2018-10935</a>
-
- <p>It was discovered that any authenticated user doing a search using
- ldapsearch with extended controls for server side sorting could bring
- down the LDAP server itself.</p>
-
- <p>The fix is to check if we are able to index the provided value. If we
- are not, then slapd_qsort returns an error (LDAP_OPERATION_ERROR).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.3.5-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1483.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1484.data b/english/lts/security/2018/dla-1484.data
deleted file mode 100644
index a43d8c73705..00000000000
--- a/english/lts/security/2018/dla-1484.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1484-1 squirrelmail</define-tag>
-<define-tag report_date>2018-8-30</define-tag>
-<define-tag secrefs>CVE-2018-14950 CVE-2018-14951 CVE-2018-14952 CVE-2018-14953 CVE-2018-14954 CVE-2018-14955 Bug##905023</define-tag>
-<define-tag packages>squirrelmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1484.wml b/english/lts/security/2018/dla-1484.wml
deleted file mode 100644
index d34d4bc6a6b..00000000000
--- a/english/lts/security/2018/dla-1484.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were a number of Cross Site Scripting
-(XSS) vulnerabilities in the squirrelmail webmail client.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these issues has been fixed in squirrelmail
-version 2:1.4.23~svn20120406-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your squirrelmail packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1484.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1485.data b/english/lts/security/2018/dla-1485.data
deleted file mode 100644
index a9736b98cc7..00000000000
--- a/english/lts/security/2018/dla-1485.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1485-1 bind9</define-tag>
-<define-tag report_date>2018-8-30</define-tag>
-<define-tag secrefs>CVE-2018-5740</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1485.wml b/english/lts/security/2018/dla-1485.wml
deleted file mode 100644
index 7149ca2175c..00000000000
--- a/english/lts/security/2018/dla-1485.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5740">CVE-2018-5740</a>
- <p>The "deny-answer-aliases" feature in BIND has a flaw which can
- cause named to exit with an assertion failure.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:9.9.5.dfsg-9+deb8u16.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1485.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1486.data b/english/lts/security/2018/dla-1486.data
deleted file mode 100644
index c68a6e29e5b..00000000000
--- a/english/lts/security/2018/dla-1486.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1486-1 spice</define-tag>
-<define-tag report_date>2018-8-31</define-tag>
-<define-tag secrefs>CVE-2018-10873 Bug##906315</define-tag>
-<define-tag packages>spice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1486.wml b/english/lts/security/2018/dla-1486.wml
deleted file mode 100644
index 602381e32c2..00000000000
--- a/english/lts/security/2018/dla-1486.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in SPICE before version 0.14.1 where the
-generated code used for demarshalling messages lacked sufficient bounds
-checks. A malicious client or server, after authentication, could send
-specially crafted messages to its peer which would result in a crash or,
-potentially, other impacts.</p>
-
-<p>The issue has been fixed by upstream by bailing out with an error if the
-pointer to the start of some message data is strictly greater than the
-pointer to the end of the message data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.12.5-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your spice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1486.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1487.data b/english/lts/security/2018/dla-1487.data
deleted file mode 100644
index ad5670d7034..00000000000
--- a/english/lts/security/2018/dla-1487.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1487-1 libtirpc</define-tag>
-<define-tag report_date>2018-8-31</define-tag>
-<define-tag secrefs>CVE-2018-14622</define-tag>
-<define-tag packages>libtirpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1487.wml b/english/lts/security/2018/dla-1487.wml
deleted file mode 100644
index 584eaba0dc0..00000000000
--- a/english/lts/security/2018/dla-1487.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14622">CVE-2018-14622</a>
- <p>Fix for egmentation fault due to pointer becoming NULL.</p>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.2.5-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libtirpc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1487.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1488.data b/english/lts/security/2018/dla-1488.data
deleted file mode 100644
index 4e0464d04d1..00000000000
--- a/english/lts/security/2018/dla-1488.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1488-1 spice</define-tag>
-<define-tag report_date>2018-8-31</define-tag>
-<define-tag secrefs>CVE-2018-10873 Bug##906315</define-tag>
-<define-tag packages>spice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1488.wml b/english/lts/security/2018/dla-1488.wml
deleted file mode 100644
index 28d277d415e..00000000000
--- a/english/lts/security/2018/dla-1488.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in SPICE before version 0.14.1 where the
-generated code used for demarshalling messages lacked sufficient bounds
-checks. A malicious client or server, after authentication, could send
-specially crafted messages to its peer which would result in a crash or,
-potentially, other impacts.</p>
-
-<p>The issue has been fixed by upstream by bailing out with an error if the
-pointer to the start of some message data is strictly greater than the
-pointer to the end of the message data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.12.5-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your spice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1488.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1489.data b/english/lts/security/2018/dla-1489.data
deleted file mode 100644
index 3e3f8e5c730..00000000000
--- a/english/lts/security/2018/dla-1489.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1489-1 spice-gtk</define-tag>
-<define-tag report_date>2018-8-31</define-tag>
-<define-tag secrefs>CVE-2018-10873 Bug#906316</define-tag>
-<define-tag packages>spice-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1489.wml b/english/lts/security/2018/dla-1489.wml
deleted file mode 100644
index 813eda69928..00000000000
--- a/english/lts/security/2018/dla-1489.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in SPICE before version 0.14.1 where the
-generated code used for demarshalling messages lacked sufficient bounds
-checks. A malicious client or server, after authentication, could send
-specially crafted messages to its peer which would result in a crash or,
-potentially, other impacts.</p>
-
-<p>The issue has been fixed by upstream by bailing out with an error if the
-pointer to the start of some message data is strictly greater than the
-pointer to the end of the message data.</p>
-
-<p>The above issue and fix have already been announced for the <q>spice</q>
-Debian package (as DLA-1486-1 [1]). This announcement is about the
-"spice-gtk" Debian package (which ships some copies of code from the
-<q>spice</q> package, where the fix of this issue had to be applied).</p>
-
-<p>[1] <a href="https://lists.debian.org/debian-lts-announce/2018/08/msg00037.html">https://lists.debian.org/debian-lts-announce/2018/08/msg00037.html</a></p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.25-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your spice-gtk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1489.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1490.data b/english/lts/security/2018/dla-1490.data
deleted file mode 100644
index afe2e819930..00000000000
--- a/english/lts/security/2018/dla-1490.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1490-1 php5</define-tag>
-<define-tag report_date>2018-9-1</define-tag>
-<define-tag secrefs>CVE-2018-14851 CVE-2018-14883 Bug#890266</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1490.wml b/english/lts/security/2018/dla-1490.wml
deleted file mode 100644
index 600c855b8c0..00000000000
--- a/english/lts/security/2018/dla-1490.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been discovered in php5, a server-side,
-HTML-embedded scripting language. One (<a href="https://security-tracker.debian.org/tracker/CVE-2018-14851">CVE-2018-14851</a>) results in a
-potential denial of service (out-of-bounds read and application crash)
-via a crafted JPEG file. The other (<a href="https://security-tracker.debian.org/tracker/CVE-2018-14883">CVE-2018-14883</a>) is an Integer
-Overflow that leads to a heap-based buffer over-read.</p>
-
-<p>Additionally, a previously introduced patch for <a href="https://security-tracker.debian.org/tracker/CVE-2017-7272">CVE-2017-7272</a> was found
-to negatively affect existing PHP applications (#890266). As a result
-of the negative effects and the fact that the security team has marked
-the CVE in question as "ignore," the patch has been dropped.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.37+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1490.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1491.data b/english/lts/security/2018/dla-1491.data
deleted file mode 100644
index 8086ad049f9..00000000000
--- a/english/lts/security/2018/dla-1491.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1491-1 tomcat8</define-tag>
-<define-tag report_date>2018-9-2</define-tag>
-<define-tag secrefs>CVE-2018-1336 CVE-2018-8034</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1491.wml b/english/lts/security/2018/dla-1491.wml
deleted file mode 100644
index 61cae76f0e1..00000000000
--- a/english/lts/security/2018/dla-1491.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been discovered in the Tomcat servlet and JSP
-engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1336">CVE-2018-1336</a>
-
- <p>An improper handing of overflow in the UTF-8 decoder with
- supplementary characters can lead to an infinite loop in the decoder
- causing a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8034">CVE-2018-8034</a>
-
- <p>The host name verification when using TLS with the WebSocket client
- was missing. It is now enabled by default.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8.0.14-1+deb8u13.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1491.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1492.data b/english/lts/security/2018/dla-1492.data
deleted file mode 100644
index bede0bc1c30..00000000000
--- a/english/lts/security/2018/dla-1492.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1492-1 dojo</define-tag>
-<define-tag report_date>2018-9-3</define-tag>
-<define-tag secrefs>CVE-2018-15494 Bug##906540</define-tag>
-<define-tag packages>dojo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1492.wml b/english/lts/security/2018/dla-1492.wml
deleted file mode 100644
index d8fa073c136..00000000000
--- a/english/lts/security/2018/dla-1492.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a string injection vulnerability in
-the <q>dojo</q> Javascript library.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in dojo version
-1.10.2+dfsg-1+deb8u1 by Abhijith PA.</p>
-
-<p>We recommend that you upgrade your dojo packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1492.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1493.data b/english/lts/security/2018/dla-1493.data
deleted file mode 100644
index 188bd3f8c11..00000000000
--- a/english/lts/security/2018/dla-1493.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1493-1 xen</define-tag>
-<define-tag report_date>2018-9-6</define-tag>
-<define-tag secrefs>CVE-2016-4963 CVE-2017-14431</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1493.wml b/english/lts/security/2018/dla-1493.wml
deleted file mode 100644
index a44e17c7d64..00000000000
--- a/english/lts/security/2018/dla-1493.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor,
-which could result in denial of service, informations leaks or privilege
-escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.4.4lts1-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1493.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1494.data b/english/lts/security/2018/dla-1494.data
deleted file mode 100644
index 913a98dfbbd..00000000000
--- a/english/lts/security/2018/dla-1494.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1494-1 gdm3</define-tag>
-<define-tag report_date>2018-9-5</define-tag>
-<define-tag secrefs>CVE-2018-14424</define-tag>
-<define-tag packages>gdm3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1494.wml b/english/lts/security/2018/dla-1494.wml
deleted file mode 100644
index b3de1e8deca..00000000000
--- a/english/lts/security/2018/dla-1494.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The daemon in GDM does not properly unexport display objects from its
-D-Bus interface when they are destroyed, which allows a local attacker
-to trigger a use-after-free via a specially crafted sequence of D-Bus
-method calls, resulting in a denial of service or potential code
-execution.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.14.1-7+deb8u1.</p>
-
-<p>We recommend that you upgrade your gdm3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1494.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1495.data b/english/lts/security/2018/dla-1495.data
deleted file mode 100644
index e572e0be637..00000000000
--- a/english/lts/security/2018/dla-1495.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1495-1 git-annex</define-tag>
-<define-tag report_date>2018-9-5</define-tag>
-<define-tag secrefs>CVE-2017-12976 CVE-2018-10857 CVE-2018-10859 Bug#873088</define-tag>
-<define-tag packages>git-annex</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1495.wml b/english/lts/security/2018/dla-1495.wml
deleted file mode 100644
index de4711407b1..00000000000
--- a/english/lts/security/2018/dla-1495.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The git-annex package was found to have multiple vulnerabilities when
-operating on untrusted data that could lead to arbitrary command
-execution and encrypted data exfiltration.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12976">CVE-2017-12976</a>
-
- <p>git-annex before 6.20170818 allows remote attackers to execute
- arbitrary commands via an ssh URL with an initial dash character
- in the hostname, as demonstrated by an ssh://-eProxyCommand= URL,
- a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2017-9800">CVE-2017-9800</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-12836">CVE-2017-12836</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-1000116">CVE-2017-1000116</a>, and
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-1000117">CVE-2017-1000117</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10857">CVE-2018-10857</a>
-
- <p>git-annex is vulnerable to a private data exposure and
- exfiltration attack. It could expose the content of files located
- outside the git-annex repository, or content from a private web
- server on localhost or the LAN.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10859">CVE-2018-10859</a>
-
- <p>git-annex is vulnerable to an Information Exposure when decrypting
- files. A malicious server for a special remote could trick
- git-annex into decrypting a file that was encrypted to the user's
- gpg key. This attack could be used to expose encrypted data that
- was never stored in git-annex</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.20141125+oops-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your git-annex packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1495.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1496.data b/english/lts/security/2018/dla-1496.data
deleted file mode 100644
index 5d7323586dd..00000000000
--- a/english/lts/security/2018/dla-1496.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1496-1 lcms2</define-tag>
-<define-tag report_date>2018-9-6</define-tag>
-<define-tag secrefs>CVE-2018-16435 Bug##907983</define-tag>
-<define-tag packages>lcms2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1496.wml b/english/lts/security/2018/dla-1496.wml
deleted file mode 100644
index 1fc4a63785b..00000000000
--- a/english/lts/security/2018/dla-1496.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an integer overflow vulnerability
-in the <q>Little CMS 2</q> colour management library. A specially-crafted
-input file could lead to a heap-based buffer overflow.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in lcms2 version
-2.6-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your lcms2 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1496.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1497.data b/english/lts/security/2018/dla-1497.data
deleted file mode 100644
index b268b320139..00000000000
--- a/english/lts/security/2018/dla-1497.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1497-1 qemu</define-tag>
-<define-tag report_date>2018-9-6</define-tag>
-<define-tag secrefs>CVE-2015-8666 CVE-2016-2198 CVE-2016-6833 CVE-2016-6835 CVE-2016-8576 CVE-2016-8667 CVE-2016-8669 CVE-2016-9602 CVE-2016-9603 CVE-2016-9776 CVE-2016-9907 CVE-2016-9911 CVE-2016-9914 CVE-2016-9915 CVE-2016-9916 CVE-2016-9921 CVE-2016-9922 CVE-2016-10155 CVE-2017-2615 CVE-2017-2620 CVE-2017-5525 CVE-2017-5526 CVE-2017-5579 CVE-2017-5667 CVE-2017-5715 CVE-2017-5856 CVE-2017-5973 CVE-2017-5987 CVE-2017-6505 CVE-2017-7377 CVE-2017-7493 CVE-2017-7718 CVE-2017-7980 CVE-2017-8086 CVE-2017-8112 CVE-2017-8309 CVE-2017-8379 CVE-2017-9330 CVE-2017-9373 CVE-2017-9374 CVE-2017-9503 CVE-2017-10806 CVE-2017-10911 CVE-2017-11434 CVE-2017-14167 CVE-2017-15038 CVE-2017-15289 CVE-2017-16845 CVE-2017-18030 CVE-2017-18043 CVE-2018-5683 CVE-2018-7550 Bug#813193 Bug#834904 Bug#835031 Bug#840945 Bug#840950 Bug#847496 Bug#847951 Bug#847953</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1497.wml b/english/lts/security/2018/dla-1497.wml
deleted file mode 100644
index 0619b7ab509..00000000000
--- a/english/lts/security/2018/dla-1497.wml
+++ /dev/null
@@ -1,218 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in qemu, a fast processor emulator:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8666">CVE-2015-8666</a>
-
- <p>Heap-based buffer overflow in QEMU when built with the
- Q35-chipset-based PC system emulator</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2198">CVE-2016-2198</a>
-
- <p>Null pointer dereference in ehci_caps_write in the USB EHCI support
- that may result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6833">CVE-2016-6833</a>
-
- <p>Use after free while writing in the vmxnet3 device that could be used
- to cause a denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6835">CVE-2016-6835</a>
-
- <p>Buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device
- that could result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8576">CVE-2016-8576</a>
-
- <p>Infinite loop vulnerability in xhci_ring_fetch in the USB xHCI support</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8667">CVE-2016-8667</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8669">CVE-2016-8669</a>
-
- <p>Divide by zero errors in set_next_tick in the JAZZ RC4030 chipset
- emulator, and in serial_update_parameters of some serial devices, that
- could result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9602">CVE-2016-9602</a>
-
- <p>Improper link following with VirtFS</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9603">CVE-2016-9603</a>
-
- <p>Heap buffer overflow via vnc connection in the Cirrus CLGD 54xx VGA
- emulator support</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9776">CVE-2016-9776</a>
-
- <p>Infinite loop while receiving data in the ColdFire Fast Ethernet
- Controller emulator</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9907">CVE-2016-9907</a>
-
- <p>Memory leakage in the USB redirector usb-guest support </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9911">CVE-2016-9911</a>
-
- <p>Memory leakage in ehci_init_transfer in the USB EHCI support</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9914">CVE-2016-9914</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9915">CVE-2016-9915</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9916">CVE-2016-9916</a>
-
- <p>Plan 9 File System (9pfs): add missing cleanup operation in
- FileOperations, in the handle backend and in the proxy backend driver</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9921">CVE-2016-9921</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9922">CVE-2016-9922</a>
-
- <p>Divide by zero in cirrus_do_copy in the Cirrus CLGD 54xx VGA Emulator
- support </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10155">CVE-2016-10155</a>
-
- <p>Memory leak in hw/watchdog/wdt_i6300esb.c allowing local guest OS
- privileged users to cause a denial of service via a large number of
- device unplug operations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2615">CVE-2017-2615</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-2620">CVE-2017-2620</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-18030">CVE-2017-18030</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-5683">CVE-2018-5683</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-7718">CVE-2017-7718</a>
-
- <p>Out-of-bounds access issues in the Cirrus CLGD 54xx VGA emulator
- support, that could result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5525">CVE-2017-5525</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-5526">CVE-2017-5526</a>
-
- <p>Memory leakage issues in the ac97 and es1370 device emulation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5579">CVE-2017-5579</a>
-
- <p>Most memory leakage in the 16550A UART emulation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5667">CVE-2017-5667</a>
-
- <p>Out-of-bounds access during multi block SDMA transfer in the SDHCI
- emulation support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>
-
- <p>Mitigations against the Spectre v2 vulnerability. For more information
- please refer to <a href="https://www.qemu.org/2018/01/04/spectre/">https://www.qemu.org/2018/01/04/spectre/</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5856">CVE-2017-5856</a>
-
- <p>Memory leak in the MegaRAID SAS 8708EM2 Host Bus Adapter emulation
- support</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5973">CVE-2017-5973</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-5987">CVE-2017-5987</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-6505">CVE-2017-6505</a>
-
- <p>Infinite loop issues in the USB xHCI, in the transfer mode register
- of the SDHCI protocol, and the USB ohci_service_ed_list</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7377">CVE-2017-7377</a>
-
- <p>9pfs: host memory leakage via v9fs_create</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7493">CVE-2017-7493</a>
-
- <p>Improper access control issues in the host directory sharing via
- 9pfs support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7980">CVE-2017-7980</a>
-
- <p>Heap-based buffer overflow in the Cirrus VGA device that could allow
- local guest OS users to execute arbitrary code or cause a denial of
- service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8086">CVE-2017-8086</a>
-
- <p>9pfs: host memory leakage via v9pfs_list_xattr</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8112">CVE-2017-8112</a>
-
- <p>Infinite loop in the VMWare PVSCSI emulation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8309">CVE-2017-8309</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-8379">CVE-2017-8379</a>
-
- <p>Host memory leakage issues via the audio capture buffer and the
- keyboard input event handlers </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9330">CVE-2017-9330</a>
-
- <p>Infinite loop due to incorrect return value in USB OHCI that may
- result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9373">CVE-2017-9373</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-9374">CVE-2017-9374</a>
-
- <p>Host memory leakage during hot unplug in IDE AHCI and USB emulated
- devices that could result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9503">CVE-2017-9503</a>
-
- <p>Null pointer dereference while processing megasas command</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10806">CVE-2017-10806</a>
-
- <p>Stack buffer overflow in USB redirector</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10911">CVE-2017-10911</a>
-
- <p>Xen disk may leak stack data via response ring</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11434">CVE-2017-11434</a>
-
- <p>Out-of-bounds read while parsing Slirp/DHCP options</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14167">CVE-2017-14167</a>
-
- <p>Out-of-bounds access while processing multiboot headers that could
- result in the execution of arbitrary code</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15038">CVE-2017-15038</a>
-
- <p>9pfs: information disclosure when reading extended attributes</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15289">CVE-2017-15289</a>
-
- <p>Out-of-bounds write access issue in the Cirrus graphic adaptor that
- could result in denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16845">CVE-2017-16845</a>
-
- <p>Information leak in the PS/2 mouse and keyboard emulation support that
- could be exploited during instance migration </p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18043">CVE-2017-18043</a>
-
- <p>Integer overflow in the macro ROUND_UP (n, d) that could result in
- denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7550">CVE-2018-7550</a>
-
- <p>Incorrect handling of memory during multiboot that could may result in
- execution of arbitrary code</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u7.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1497.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1498.data b/english/lts/security/2018/dla-1498.data
deleted file mode 100644
index f27f8870889..00000000000
--- a/english/lts/security/2018/dla-1498.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1498-1 curl</define-tag>
-<define-tag report_date>2018-9-8</define-tag>
-<define-tag secrefs>CVE-2018-14618 CVE-2018-14618</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1498.wml b/english/lts/security/2018/dla-1498.wml
deleted file mode 100644
index 85ae98d791c..00000000000
--- a/english/lts/security/2018/dla-1498.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a an integer overflow vulnerability in
-curl, a command line tool for transferring data over HTTP, etc.</p>
-
-<p>For more information, please see:</p>
-
-<p><url "https://curl.haxx.se/docs/CVE-2018-14618.html"></p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in curl version
-7.38.0-4+deb8u12.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1498.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1499.data b/english/lts/security/2018/dla-1499.data
deleted file mode 100644
index 003c6b79c8d..00000000000
--- a/english/lts/security/2018/dla-1499.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1499-1 discount</define-tag>
-<define-tag report_date>2018-9-8</define-tag>
-<define-tag secrefs>CVE-2018-11468 CVE-2018-11503 CVE-2018-11504 CVE-2018-12495 Bug#901912</define-tag>
-<define-tag packages>discount</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1499.wml b/english/lts/security/2018/dla-1499.wml
deleted file mode 100644
index 96141002ec7..00000000000
--- a/english/lts/security/2018/dla-1499.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several heap-based buffer over-reads were found in discount, an
-implementation of the Markdown markup language in C, that allowed
-remote attackers to cause a denial-of-service via specially crafted
-files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.7-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your discount packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1499.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1500-2.data b/english/lts/security/2018/dla-1500-2.data
deleted file mode 100644
index 5e6b21df786..00000000000
--- a/english/lts/security/2018/dla-1500-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1500-2 openssh</define-tag>
-<define-tag report_date>2018-9-12</define-tag>
-<define-tag secrefs>Bug#908652</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1500-2.wml b/english/lts/security/2018/dla-1500-2.wml
deleted file mode 100644
index 9e6b03b11f7..00000000000
--- a/english/lts/security/2018/dla-1500-2.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The security update of OpenSSH announced as DLA 1500-1 introduced a bug in
-openssh-client: when X11 forwarding is enabled (via system-wide
-configuration in ssh_config or via -X command line switch), but no DISPLAY
-is set, the client produces a "DISPLAY "(null)" invalid; disabling X11
-forwarding" warning. These bug was introduced by the patch set to fix the
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-1908">CVE-2016-1908</a> issue. For reference, the following is the relevant section
-of the original announcement:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1908">CVE-2016-1908</a>
-
- <p>OpenSSH mishandled untrusted X11 forwarding when the X server disables
- the SECURITY extension. Untrusted connections could obtain trusted X11
- forwarding privileges. Reported by Thomas Hoger.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:6.7p1-5+deb8u7.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1500-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1500.data b/english/lts/security/2018/dla-1500.data
deleted file mode 100644
index 6e94274e78e..00000000000
--- a/english/lts/security/2018/dla-1500.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1500-1 openssh</define-tag>
-<define-tag report_date>2018-9-10</define-tag>
-<define-tag secrefs>CVE-2015-5352 CVE-2015-5600 CVE-2015-6563 CVE-2015-6564 CVE-2016-1908 CVE-2016-3115 CVE-2016-6515 CVE-2016-10009 CVE-2016-10011 CVE-2016-10012 CVE-2016-10708 CVE-2017-15906 Bug#790798 Bug#793616 Bug#795711 Bug#848716 Bug#848717</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1500.wml b/english/lts/security/2018/dla-1500.wml
deleted file mode 100644
index 0b0872035b9..00000000000
--- a/english/lts/security/2018/dla-1500.wml
+++ /dev/null
@@ -1,99 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been found in OpenSSH, a free implementation
-of the SSH protocol suite:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5352">CVE-2015-5352</a>
-
- <p>OpenSSH incorrectly verified time window deadlines for X connections.
- Remote attackers could take advantage of this flaw to bypass intended
- access restrictions. Reported by Jann Horn.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5600">CVE-2015-5600</a>
-
- <p>OpenSSH improperly restricted the processing of keyboard-interactive
- devices within a single connection, which could allow remote attackers
- to perform brute-force attacks or cause a denial of service, in a
- non-default configuration.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6563">CVE-2015-6563</a>
-
- <p>OpenSSH incorrectly handled usernames during PAM authentication. In
- conjunction with an additional flaw in the OpenSSH unprivileged child
- process, remote attackers could make use if this issue to perform user
- impersonation. Discovered by Moritz Jodeit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6564">CVE-2015-6564</a>
-
- <p>Moritz Jodeit discovered a use-after-free flaw in PAM support in
- OpenSSH, that could be used by remote attackers to bypass
- authentication or possibly execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1908">CVE-2016-1908</a>
-
- <p>OpenSSH mishandled untrusted X11 forwarding when the X server disables
- the SECURITY extension. Untrusted connections could obtain trusted X11
- forwarding privileges. Reported by Thomas Hoger.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3115">CVE-2016-3115</a>
-
- <p>OpenSSH improperly handled X11 forwarding data related to
- authentication credentials. Remote authenticated users could make use
- of this flaw to bypass intended shell-command restrictions. Identified
- by github.com/tintinweb.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6515">CVE-2016-6515</a>
-
- <p>OpenSSH did not limit password lengths for password authentication.
- Remote attackers could make use of this flaw to cause a denial of
- service via long strings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10009">CVE-2016-10009</a>
-
- <p>Jann Horn discovered an untrusted search path vulnerability in
- ssh-agent allowing remote attackers to execute arbitrary local
- PKCS#11 modules by leveraging control over a forwarded agent-socket.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10011">CVE-2016-10011</a>
-
- <p>Jann Horn discovered that OpenSSH did not properly consider the
- effects of realloc on buffer contents. This may allow local users to
- obtain sensitive private-key information by leveraging access to a
- privilege-separated child process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10012">CVE-2016-10012</a>
-
- <p>Guido Vranken discovered that the OpenSSH shared memory manager
- did not ensure that a bounds check was enforced by all compilers,
- which could allow local users to gain privileges by leveraging access
- to a sandboxed privilege-separation process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10708">CVE-2016-10708</a>
-
- <p>NULL pointer dereference and daemon crash via an out-of-sequence
- NEWKEYS message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15906">CVE-2017-15906</a>
-
- <p>Michal Zalewski reported that OpenSSH improperly prevent write
- operations in readonly mode, allowing attackers to create zero-length
- files.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:6.7p1-5+deb8u6.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1500.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1501.data b/english/lts/security/2018/dla-1501.data
deleted file mode 100644
index c8e41d09cc9..00000000000
--- a/english/lts/security/2018/dla-1501.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1501-1 libextractor</define-tag>
-<define-tag report_date>2018-9-11</define-tag>
-<define-tag secrefs>CVE-2018-16430 Bug##907987</define-tag>
-<define-tag packages>libextractor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1501.wml b/english/lts/security/2018/dla-1501.wml
deleted file mode 100644
index 5fa60eb4ad3..00000000000
--- a/english/lts/security/2018/dla-1501.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an out-of-bounds read vulnerability in
-libextractor, a library to extract meta-data from files of arbitrary type.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in libextractor version
-1:1.3-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your libextractor packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1501.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1502.data b/english/lts/security/2018/dla-1502.data
deleted file mode 100644
index f149f2a9eba..00000000000
--- a/english/lts/security/2018/dla-1502.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1502-1 mgetty</define-tag>
-<define-tag report_date>2018-9-12</define-tag>
-<define-tag secrefs>CVE-2018-16741</define-tag>
-<define-tag packages>mgetty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1502.wml b/english/lts/security/2018/dla-1502.wml
deleted file mode 100644
index ef427f6dc27..00000000000
--- a/english/lts/security/2018/dla-1502.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two input sanitization failures have been found in the faxrunq and faxq
-binaries in mgetty. An attacker could leverage them to insert commands
-via shell metacharacters in jobs id and have them executed with the
-privilege of the faxrunq/faxq user.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.1.36-2.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your mgetty packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1502.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1503.data b/english/lts/security/2018/dla-1503.data
deleted file mode 100644
index 5b6a96868fd..00000000000
--- a/english/lts/security/2018/dla-1503.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1503-1 kamailio</define-tag>
-<define-tag report_date>2018-9-12</define-tag>
-<define-tag secrefs>CVE-2018-16657 Bug##908324</define-tag>
-<define-tag packages>kamailio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1503.wml b/english/lts/security/2018/dla-1503.wml
deleted file mode 100644
index 48e7d96cbcb..00000000000
--- a/english/lts/security/2018/dla-1503.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service and a potential
-arbitrary code execution vulnerability in the kamailio SIP server.</p>
-
-<p>A specially-crafted SIP message with an invalid <q>Via</q> header could cause a
-segmentation fault and crash Kamailio due to missing input validation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in kamailio version
-4.2.0-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your kamailio packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1503.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1504.data b/english/lts/security/2018/dla-1504.data
deleted file mode 100644
index e4bfb301a42..00000000000
--- a/english/lts/security/2018/dla-1504.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1504-1 ghostscript</define-tag>
-<define-tag report_date>2018-9-13</define-tag>
-<define-tag secrefs>CVE-2018-11645 CVE-2018-15908 CVE-2018-15909 CVE-2018-15910 CVE-2018-15911 CVE-2018-16509 CVE-2018-16511 CVE-2018-16513 CVE-2018-16539 CVE-2018-16540 CVE-2018-16541 CVE-2018-16542 CVE-2018-16585 CVE-2018-16802 Bug#907332 Bug#908305 Bug#907703</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1504.wml b/english/lts/security/2018/dla-1504.wml
deleted file mode 100644
index 1a3cdfbbc27..00000000000
--- a/english/lts/security/2018/dla-1504.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered multiple vulnerabilities in Ghostscript, an
-interpreter for the PostScript language, which could result in denial of
-service, the creation of files or the execution of arbitrary code if a
-malformed Postscript file is processed (despite the dSAFER sandbox being
-enabled).</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.06~dfsg-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1504.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1505.data b/english/lts/security/2018/dla-1505.data
deleted file mode 100644
index 9514cdbe723..00000000000
--- a/english/lts/security/2018/dla-1505.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1505-1 zutils</define-tag>
-<define-tag report_date>2018-9-15</define-tag>
-<define-tag secrefs>CVE-2018-1000637 Bug#902936</define-tag>
-<define-tag packages>zutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1505.wml b/english/lts/security/2018/dla-1505.wml
deleted file mode 100644
index 401e05ce077..00000000000
--- a/english/lts/security/2018/dla-1505.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>zutils version prior to version 1.8-pre2 contains a buffer
-overflow vulnerability in zcat which happened with some
-input files when the '-v, --show-nonprinting' option was
-used (or indirectly enabled). This can result in potential
-denial of service or arbitrary code execution. This attack
-appear is exploitable via the victim openning a crafted
-compressed file and has been fixed in 1.8-pre2.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in
-version 1.3-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your zutils packages.</p>
-
-<p>Further information about Debian LTS security advisories,
-how to apply these updates to your system and frequently
-asked questions can be found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1505.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1506.data b/english/lts/security/2018/dla-1506.data
deleted file mode 100644
index 643c0cd4e0e..00000000000
--- a/english/lts/security/2018/dla-1506.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1506-1 intel-microcode</define-tag>
-<define-tag report_date>2018-9-16</define-tag>
-<define-tag secrefs>CVE-2018-3615 CVE-2018-3620 CVE-2018-3646</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1506.wml b/english/lts/security/2018/dla-1506.wml
deleted file mode 100644
index f435003a924..00000000000
--- a/english/lts/security/2018/dla-1506.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security researchers identified speculative execution side-channel
-methods which have the potential to improperly gather sensitive data
-from multiple types of computing devices with different vendors’
-processors and operating systems.</p>
-
-<p>This update requires an update to the intel-microcode package, which is
-non-free. It is related to DLA-1446-1 and adds more mitigations for
-additional types of Intel processors.</p>
-
-<p>For more information please also read the official Intel security
-advisories at:</p>
-
-<ul>
-<li><url "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00088.html"></li>
-<li><url "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"></li>
-<li><url "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html"></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.20180807a.1~deb8u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1506.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1507.data b/english/lts/security/2018/dla-1507.data
deleted file mode 100644
index 8eb2bec0eac..00000000000
--- a/english/lts/security/2018/dla-1507.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1507-1 libapache2-mod-perl2</define-tag>
-<define-tag report_date>2018-9-18</define-tag>
-<define-tag secrefs>CVE-2011-2767 Bug#644169</define-tag>
-<define-tag packages>libapache2-mod-perl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1507.wml b/english/lts/security/2018/dla-1507.wml
deleted file mode 100644
index 91d34f40f45..00000000000
--- a/english/lts/security/2018/dla-1507.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jan Ingvoldstad discovered that libapache2-mod-perl2 allows attackers to
-execute arbitrary Perl code by placing it in a user-owned .htaccess
-file, because (contrary to the documentation) there is no configuration
-option that permits Perl code for the administrator's control of HTTP
-request processing without also permitting unprivileged users to run
-Perl code in the context of the user account that runs Apache HTTP
-Server processes.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.9~1624218-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-perl2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1507.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1508.data b/english/lts/security/2018/dla-1508.data
deleted file mode 100644
index 7e2dd7d366c..00000000000
--- a/english/lts/security/2018/dla-1508.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1508-1 suricata</define-tag>
-<define-tag report_date>2018-9-19</define-tag>
-<define-tag secrefs>CVE-2016-10728</define-tag>
-<define-tag packages>suricata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1508.wml b/english/lts/security/2018/dla-1508.wml
deleted file mode 100644
index 40f3e1edc45..00000000000
--- a/english/lts/security/2018/dla-1508.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2016-10728">CVE-2016-10728</a>
- If an ICMPv4 error packet is received as the first packet on a flow
- in the to_client direction, it can lead to missed TCP/UDP detection
- in packets arriving afterwards.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.7-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your suricata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1508.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1509.data b/english/lts/security/2018/dla-1509.data
deleted file mode 100644
index d1d45e3a08d..00000000000
--- a/english/lts/security/2018/dla-1509.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1509-1 php5</define-tag>
-<define-tag report_date>2018-9-20</define-tag>
-<define-tag secrefs>CVE-2018-17082</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1509.wml b/english/lts/security/2018/dla-1509.wml
deleted file mode 100644
index 2ce9456e401..00000000000
--- a/english/lts/security/2018/dla-1509.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in php5, a server-side,
-HTML-embedded scripting language. The Apache2 component allows XSS via
-the body of a "Transfer-Encoding: chunked" request because of a defect
-in request handling.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.6.38+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1509.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1510.data b/english/lts/security/2018/dla-1510.data
deleted file mode 100644
index f8534cd86a7..00000000000
--- a/english/lts/security/2018/dla-1510.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1510-1 glusterfs</define-tag>
-<define-tag report_date>2018-9-20</define-tag>
-<define-tag secrefs>CVE-2018-10904 CVE-2018-10907 CVE-2018-10911 CVE-2018-10913 CVE-2018-10914 CVE-2018-10923 CVE-2018-10926 CVE-2018-10927 CVE-2018-10928 CVE-2018-10929 CVE-2018-10930 Bug#909215</define-tag>
-<define-tag packages>glusterfs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1510.wml b/english/lts/security/2018/dla-1510.wml
deleted file mode 100644
index baa389575b6..00000000000
--- a/english/lts/security/2018/dla-1510.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in GlusterFS, a
-clustered file system. Buffer overflows and path traversal issues may
-lead to information disclosure, denial-of-service or the execution of
-arbitrary code.</p>
-
-<p>To resolve the security vulnerabilities the following limitations were
-made in GlusterFS:</p>
-
-<ul>
- <li>open,read,write on special files like char and block are no longer
- permitted</li>
- <li>io-stat xlator can dump stat info only to /run/gluster directory</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.5.2-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your glusterfs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1510.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1511.data b/english/lts/security/2018/dla-1511.data
deleted file mode 100644
index 50dd9c0872a..00000000000
--- a/english/lts/security/2018/dla-1511.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1511-1 reportbug</define-tag>
-<define-tag report_date>2018-9-20</define-tag>
-<define-tag secrefs>Bug#878088</define-tag>
-<define-tag packages>reportbug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1511.wml b/english/lts/security/2018/dla-1511.wml
deleted file mode 100644
index 57dd27b097c..00000000000
--- a/english/lts/security/2018/dla-1511.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Reportbug, a tool designed to make the reporting of bugs in Debian
-easier, was further enhanced to automatically detect bug reports for
-potential regressions caused by a security update. After user
-confirmation an additional email with a copy of the report will be
-sent to the debian-lts mailing list.</p>
-
-<p>This change requires two new dependencies, python-requests and python-apt.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.6.3+deb8u2.</p>
-
-<p>We recommend that you upgrade your reportbug packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1511.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1512.data b/english/lts/security/2018/dla-1512.data
deleted file mode 100644
index caba6aebbfb..00000000000
--- a/english/lts/security/2018/dla-1512.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1512-1 sympa</define-tag>
-<define-tag report_date>2018-9-21</define-tag>
-<define-tag secrefs>CVE-2018-1000671 Bug#908165</define-tag>
-<define-tag packages>sympa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1512.wml b/english/lts/security/2018/dla-1512.wml
deleted file mode 100644
index 6d521e8d896..00000000000
--- a/english/lts/security/2018/dla-1512.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An Open Redirect vulnerability has been discovered in sympa. The
-<q>referer</q> parameter of the wwsympa.fcgi login action can result in
-Open redirection and potential Cross Site Scripting via data URIs.
-This attack appear to be exploitable via Victim browser opening a
-crafted URL supplied by the attacker.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.1.23~dfsg-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your sympa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1512.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1513.data b/english/lts/security/2018/dla-1513.data
deleted file mode 100644
index 24a9e0d16a7..00000000000
--- a/english/lts/security/2018/dla-1513.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1513-1 openafs</define-tag>
-<define-tag report_date>2018-9-21</define-tag>
-<define-tag secrefs>CVE-2018-16947 CVE-2018-16948 CVE-2018-16949 Bug#908616</define-tag>
-<define-tag packages>openafs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1513.wml b/english/lts/security/2018/dla-1513.wml
deleted file mode 100644
index 53f741db95e..00000000000
--- a/english/lts/security/2018/dla-1513.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in OpenAFS, a
-distributed file system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16947">CVE-2018-16947</a>
-
- <p>The backup tape controller process accepts incoming RPCs but does
- not require (or allow for) authentication of those RPCs. Handling
- those RPCs results in operations being performed with administrator
- credentials, including dumping/restoring volume contents and
- manipulating the backup database.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16948">CVE-2018-16948</a>
-
- <p>Several RPC server routines did not fully initialize their output
- variables before returning, leaking memory contents from both the
- stack and the heap. Because the OpenAFS cache manager functions as
- an Rx server for the AFSCB service, clients are also susceptible to
- information leakage.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16949">CVE-2018-16949</a>
-
- <p>Several data types used as RPC input variables were implemented as
- unbounded array types, limited only by the inherent 32-bit length
- field to 4GB. An unauthenticated attacker could send, or claim to
- send, large input values and consume server resources waiting for
- those inputs, denying service to other valid connections.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.6.9-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your openafs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1513.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1514.data b/english/lts/security/2018/dla-1514.data
deleted file mode 100644
index e76835dcca9..00000000000
--- a/english/lts/security/2018/dla-1514.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1514-1 texlive-bin</define-tag>
-<define-tag report_date>2018-9-22</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>texlive-bin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1514.wml b/english/lts/security/2018/dla-1514.wml
deleted file mode 100644
index 44bbe44d34a..00000000000
--- a/english/lts/security/2018/dla-1514.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nick Roessler from the University of Pennsylvania has found a buffer overflow
-in texlive-bin, the executables for TexLive, the popular distribution of TeX
-document production system.</p>
-
-<p>This buffer overflow can be used for arbitrary code execution by crafting a
-special type1 font (.pfb) and provide it to users running pdf(la)tex, dvips or
-luatex in a way that the font is loaded.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2014.20140926.35254-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your texlive-bin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1514.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1515.data b/english/lts/security/2018/dla-1515.data
deleted file mode 100644
index d64d7b82b84..00000000000
--- a/english/lts/security/2018/dla-1515.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1515-1 hylafax</define-tag>
-<define-tag report_date>2018-9-22</define-tag>
-<define-tag secrefs>CVE-2018-17141</define-tag>
-<define-tag packages>hylafax</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1515.wml b/english/lts/security/2018/dla-1515.wml
deleted file mode 100644
index d45fdd4eb8f..00000000000
--- a/english/lts/security/2018/dla-1515.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Luis Merino, Markus Vervier and Eric Sesterhenn discovered that missing
-input sanitising in the Hylafax fax software could potentially result in
-the execution of arbitrary code via a malformed fax message.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3:6.0.6-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your hylafax packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1515.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1516.data b/english/lts/security/2018/dla-1516.data
deleted file mode 100644
index 5e937dafbe1..00000000000
--- a/english/lts/security/2018/dla-1516.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1516-1 okular</define-tag>
-<define-tag report_date>2018-9-23</define-tag>
-<define-tag secrefs>CVE-2018-1000801</define-tag>
-<define-tag packages>okular</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1516.wml b/english/lts/security/2018/dla-1516.wml
deleted file mode 100644
index 597c123d2b9..00000000000
--- a/english/lts/security/2018/dla-1516.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Joran Herve discovered that the Okular document viewer was susceptible
-to directory traversal via malformed .okular files (annotated document
-archives), which could result in the creation of arbitrary files.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.14.2-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your okular packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1516.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1517.data b/english/lts/security/2018/dla-1517.data
deleted file mode 100644
index 58466aaa3d5..00000000000
--- a/english/lts/security/2018/dla-1517.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1517-1 dom4j</define-tag>
-<define-tag report_date>2018-9-24</define-tag>
-<define-tag secrefs>CVE-2018-1000632</define-tag>
-<define-tag packages>dom4j</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1517.wml b/english/lts/security/2018/dla-1517.wml
deleted file mode 100644
index 4f92bd86fd2..00000000000
--- a/english/lts/security/2018/dla-1517.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mario Areias discovered that dom4j, a XML framework for Java, was
-vulnerable to a XML injection attack. An attacker able to specify
-attributes or elements in the XML document might be able to modify the
-whole XML document.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.1+dfsg.3-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your dom4j packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1517.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1518.data b/english/lts/security/2018/dla-1518.data
deleted file mode 100644
index dd951101af3..00000000000
--- a/english/lts/security/2018/dla-1518.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1518-1 polarssl</define-tag>
-<define-tag report_date>2018-9-25</define-tag>
-<define-tag secrefs>CVE-2013-0169 CVE-2018-0497 CVE-2018-0498 CVE-2018-9988 CVE-2018-9989</define-tag>
-<define-tag packages>polarssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1518.wml b/english/lts/security/2018/dla-1518.wml
deleted file mode 100644
index bcb3ea992e2..00000000000
--- a/english/lts/security/2018/dla-1518.wml
+++ /dev/null
@@ -1,69 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities were discovered in polarssl, a lightweight crypto and
-SSL/TLS library (nowadays continued under the name mbedtls) which could
-result in plain text recovery via side-channel attacks.</p>
-
-<p>Two other minor vulnerabilities were discovered in polarssl which could
-result in arithmetic overflow errors.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0497">CVE-2018-0497</a>
-
- <p>As a protection against the Lucky Thirteen attack, the TLS code for
- CBC decryption in encrypt-then-MAC mode performs extra MAC
- calculations to compensate for variations in message size due to
- padding. The amount of extra MAC calculation to perform was based on
- the assumption that the bulk of the time is spent in processing
- 64-byte blocks, which is correct for most supported hashes but not for
- SHA-384. Correct the amount of extra work for SHA-384 (and SHA-512
- which is currently not used in TLS, and MD2 although no one should
- care about that).</p>
-
- <p>This is a regression fix for what <a href="https://security-tracker.debian.org/tracker/CVE-2013-0169">CVE-2013-0169</a> had been fixed this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0498">CVE-2018-0498</a>
-
- <p>The basis for the Lucky 13 family of attacks is for an attacker to be
- able to distinguish between (long) valid TLS-CBC padding and invalid
- TLS-CBC padding. Since our code sets padlen = 0 for invalid padding,
- the length of the input to the HMAC function gives information about
- that.</p>
-
- <p>Information about this length (modulo the MD/SHA block size) can be
- deduced from how much MD/SHA padding (this is distinct from TLS-CBC
- padding) is used. If MD/SHA padding is read from a (static) buffer, a
- local attacker could get information about how much is used via a
- cache attack targeting that buffer.</p>
-
- <p>Let's get rid of this buffer. Now the only buffer used is the
- internal MD/SHA one, which is always read fully by the process()
- function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9988">CVE-2018-9988</a>
-
- <p>Prevent arithmetic overflow on bounds check and add bound check
- before signature length read in ssl_parse_server_key_exchange().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9989">CVE-2018-9989</a>
-
- <p>Prevent arithmetic overflow on bounds check and add bound check
- before length read in ssl_parse_server_psk_hint()</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.9-2.1+deb8u4.</p>
-
-<p>We recommend that you upgrade your polarssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1518.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1519.data b/english/lts/security/2018/dla-1519.data
deleted file mode 100644
index c52e1e08f55..00000000000
--- a/english/lts/security/2018/dla-1519.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1519-1 python2.7</define-tag>
-<define-tag report_date>2018-9-25</define-tag>
-<define-tag secrefs>CVE-2017-1000158 CVE-2018-1060 CVE-2018-1061 CVE-2018-1000802</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1519.wml b/english/lts/security/2018/dla-1519.wml
deleted file mode 100644
index 339761cebec..00000000000
--- a/english/lts/security/2018/dla-1519.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in the CPython interpreter which
-can cause denial of service, information gain, and arbitrary code
-execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000158">CVE-2017-1000158</a>
-
- <p>CPython (aka Python) is vulnerable to an integer overflow in the
- PyString_DecodeEscape function in stringobject.c, resulting in
- heap-based buffer overflow (and possible arbitrary code execution)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1060">CVE-2018-1060</a>
-
- <p>python is vulnerable to catastrophic backtracking in pop3lib's
- apop() method. An attacker could use this flaw to cause denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1061">CVE-2018-1061</a>
-
- <p>python is vulnerable to catastrophic backtracking in the
- difflib.IS_LINE_JUNK method. An attacker could use this flaw to
- cause denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000802">CVE-2018-1000802</a>
-
- <p>Python Software Foundation Python (CPython) version 2.7 contains a
- CWE-77: Improper Neutralization of Special Elements used in a
- Command ('Command Injection') vulnerability in shutil module
- (make_archive function) that can result in Denial of service,
- Information gain via injection of arbitrary files on the system or
- entire drive. This attack appear to be exploitable via Passage of
- unfiltered user input to the function.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.7.9-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1519.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1520.data b/english/lts/security/2018/dla-1520.data
deleted file mode 100644
index 628855969fd..00000000000
--- a/english/lts/security/2018/dla-1520.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1520-1 python3.4</define-tag>
-<define-tag report_date>2018-9-26</define-tag>
-<define-tag secrefs>CVE-2017-1000158 CVE-2018-1060 CVE-2018-1061 CVE-2018-1000802</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1520.wml b/english/lts/security/2018/dla-1520.wml
deleted file mode 100644
index 2304217944a..00000000000
--- a/english/lts/security/2018/dla-1520.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in the CPython interpreter which
-can cause denial of service, information gain, and arbitrary code
-execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000158">CVE-2017-1000158</a>
-
- <p>CPython (aka Python) is vulnerable to an integer overflow in the
- PyString_DecodeEscape function in stringobject.c, resulting in
- heap-based buffer overflow (and possible arbitrary code execution)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1060">CVE-2018-1060</a>
-
- <p>python is vulnerable to catastrophic backtracking in pop3lib's
- apop() method. An attacker could use this flaw to cause denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1061">CVE-2018-1061</a>
-
- <p>python is vulnerable to catastrophic backtracking in the
- difflib.IS_LINE_JUNK method. An attacker could use this flaw to
- cause denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000802">CVE-2018-1000802</a>
-
- <p>Python Software Foundation Python (CPython) version 2.7 contains a
- CWE-77: Improper Neutralization of Special Elements used in a
- Command ('Command Injection') vulnerability in shutil module
- (make_archive function) that can result in Denial of service,
- Information gain via injection of arbitrary files on the system or
- entire drive. This attack appear to be exploitable via Passage of
- unfiltered user input to the function.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1520.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1521.data b/english/lts/security/2018/dla-1521.data
deleted file mode 100644
index cd61ce87d25..00000000000
--- a/english/lts/security/2018/dla-1521.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1521-1 otrs2</define-tag>
-<define-tag report_date>2018-9-26</define-tag>
-<define-tag secrefs>CVE-2018-16586 CVE-2018-16587</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1521.wml b/english/lts/security/2018/dla-1521.wml
deleted file mode 100644
index 801659b66a6..00000000000
--- a/english/lts/security/2018/dla-1521.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Fabien Arnoux discovered several security issues in email validation
-of otrs system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16586">CVE-2018-16586</a>
-
- <p>Load external image or CSS resources in browser when user opens a
- malicious email.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16587">CVE-2018-16587</a>
-
- <p>Remote deletions of arbitrary files that the OTRS web server user
- has write access when opening malicious email.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.18-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1521.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1522.data b/english/lts/security/2018/dla-1522.data
deleted file mode 100644
index a2100531864..00000000000
--- a/english/lts/security/2018/dla-1522.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1522-1 strongswan</define-tag>
-<define-tag report_date>2018-9-26</define-tag>
-<define-tag secrefs>CVE-2018-16151 CVE-2018-16152</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1522.wml b/english/lts/security/2018/dla-1522.wml
deleted file mode 100644
index 104a8a09900..00000000000
--- a/english/lts/security/2018/dla-1522.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Sze Yiu Chau and his team from Purdue University and The University of
-Iowa found several security issues in the gmp plugin for strongSwan,
-an IKE/IPsec suite.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16151">CVE-2018-16151</a>
-
- <p>The OID parser in the ASN.1 code in gmp allows any number of random
- bytes after a valid OID.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16152">CVE-2018-16152</a>
-
- <p>The algorithmIdentifier parser in the ASN.1 code in gmp doesn't
- enforce a NULL value for the optional parameter which is not used
- with any PKCS#1 algorithm.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.2.1-6+deb8u7.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1522.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1523.data b/english/lts/security/2018/dla-1523.data
deleted file mode 100644
index c65137ad442..00000000000
--- a/english/lts/security/2018/dla-1523.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1523-1 asterisk</define-tag>
-<define-tag report_date>2018-9-27</define-tag>
-<define-tag secrefs>CVE-2018-17281 Bug#909554</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1523.wml b/english/lts/security/2018/dla-1523.wml
deleted file mode 100644
index 302569988d8..00000000000
--- a/english/lts/security/2018/dla-1523.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sean Bright discovered that Asterisk, a PBX and telephony toolkit,
-contained a stack overflow vulnerability in the res_http_websocket.so
-module that allowed remote attackers to crash Asterisk via specially
-crafted HTTP requests to upgrade the connection to a websocket.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:11.13.1~dfsg-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1523.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1524.data b/english/lts/security/2018/dla-1524.data
deleted file mode 100644
index 68c619bcb56..00000000000
--- a/english/lts/security/2018/dla-1524.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1524-1 libxml2</define-tag>
-<define-tag report_date>2018-9-27</define-tag>
-<define-tag secrefs>CVE-2017-18258 CVE-2018-9251 CVE-2018-14404 CVE-2018-14567</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1524.wml b/english/lts/security/2018/dla-1524.wml
deleted file mode 100644
index 57296881623..00000000000
--- a/english/lts/security/2018/dla-1524.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14404">CVE-2018-14404</a>
- <p>Fix of a NULL pointer dereference which might result in a crash and
- thus in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14567">CVE-2018-14567</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-9251">CVE-2018-9251</a>
- <p>Approvement in LZMA error handling which prevents an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18258">CVE-2017-18258</a>
-
- <p>Limit available memory to 100MB to avoid exhaustive memory
- consumption by malicious files.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.9.1+dfsg1-5+deb8u7.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1524.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1525.data b/english/lts/security/2018/dla-1525.data
deleted file mode 100644
index d8bfe294245..00000000000
--- a/english/lts/security/2018/dla-1525.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1525-1 mosquitto</define-tag>
-<define-tag report_date>2018-9-28</define-tag>
-<define-tag secrefs>CVE-2017-7653 CVE-2017-7654 CVE-2017-9868</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1525.wml b/english/lts/security/2018/dla-1525.wml
deleted file mode 100644
index 856a8c061c6..00000000000
--- a/english/lts/security/2018/dla-1525.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7653">CVE-2017-7653</a>
-
- <p>As invalid UTF-8 strings are not correctly checked, an attacker could
- cause a denial of service to other clients by disconnecting
- them from the broker with special crafted topics.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7654">CVE-2017-7654</a>
-
- <p>Due to a memory leak unauthenticated clients can send special crafted
- CONNECT packets which could cause a denial of service in the broker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9868">CVE-2017-9868</a>
-
- <p>Due to wrong file permissions local users could obtain topic
- information from the mosquitto database.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.4-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1525.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1526.data b/english/lts/security/2018/dla-1526.data
deleted file mode 100644
index af43aca5852..00000000000
--- a/english/lts/security/2018/dla-1526.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1526-1 389-ds-base</define-tag>
-<define-tag report_date>2018-9-29</define-tag>
-<define-tag secrefs>CVE-2018-14624</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1526.wml b/english/lts/security/2018/dla-1526.wml
deleted file mode 100644
index 9c398b18e91..00000000000
--- a/english/lts/security/2018/dla-1526.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the emergency logging system in 389-ds-base (the
-389 Directory Server) is affected by a race condition caused by the
-invalidation of the concurrently used log file file descriptor without
-proper locking. This issue might be triggered by remote attackers to
-cause DoS (crash) and any other undefined behavior.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.3.5-4+deb8u3.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1526.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1527-2.data b/english/lts/security/2018/dla-1527-2.data
deleted file mode 100644
index 1dec0075a37..00000000000
--- a/english/lts/security/2018/dla-1527-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1527-2 ghostscript</define-tag>
-<define-tag report_date>2018-10-1</define-tag>
-<define-tag secrefs>Bug#909999</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1527-2.wml b/english/lts/security/2018/dla-1527-2.wml
deleted file mode 100644
index b328983f95f..00000000000
--- a/english/lts/security/2018/dla-1527-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Berkeley Roshan Churchill reported a regression for the recent
-security update for ghostscript, announced as DLA-1527-1, caused by an
-incomplete
-fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-16543">CVE-2018-16543</a>.
-The pdf2ps tool failed to produce any output and
-aborted with /rangecheck in .installpagedevice error.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.06~dfsg-2+deb8u10.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1527-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1527.data b/english/lts/security/2018/dla-1527.data
deleted file mode 100644
index fdce59d2e43..00000000000
--- a/english/lts/security/2018/dla-1527.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1527-1 ghostscript</define-tag>
-<define-tag report_date>2018-9-30</define-tag>
-<define-tag secrefs>CVE-2018-16543 CVE-2018-17183 Bug#908303</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1527.wml b/english/lts/security/2018/dla-1527.wml
deleted file mode 100644
index 496249f47f2..00000000000
--- a/english/lts/security/2018/dla-1527.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered multiple vulnerabilities in Ghostscript, an
-interpreter for the PostScript language, which could result in denial of
-service, the creation of files or the execution of arbitrary code if a
-malformed Postscript file is processed (despite the dSAFER sandbox being
-enabled).</p>
-
-<p>In addition this update changes the device to txtwrite for the
-ps2ascii tool to prevent an error due to the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-17183">CVE-2018-17183</a>.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.06~dfsg-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1527.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1528.data b/english/lts/security/2018/dla-1528.data
deleted file mode 100644
index 449d5329082..00000000000
--- a/english/lts/security/2018/dla-1528.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1528-1 strongswan</define-tag>
-<define-tag report_date>2018-10-2</define-tag>
-<define-tag secrefs>CVE-2018-17540</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1528.wml b/english/lts/security/2018/dla-1528.wml
deleted file mode 100644
index 1e2369cd81d..00000000000
--- a/english/lts/security/2018/dla-1528.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial-of-service vulnerability in
-strongswan, a virtual private network (VPN) client and server.</p>
-
-<p>Verification of an RSA signature with a very short public key caused an
-integer underflow in a length check that resulted in a heap buffer
-overflow.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in strongswan version
-5.2.1-6+deb8u8.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1528.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1529.data b/english/lts/security/2018/dla-1529.data
deleted file mode 100644
index ba429d6c055..00000000000
--- a/english/lts/security/2018/dla-1529.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1529-1 linux</define-tag>
-<define-tag report_date>2018-10-4</define-tag>
-<define-tag secrefs>CVE-2018-3620 CVE-2018-3639 CVE-2018-5391 CVE-2018-6554 CVE-2018-6555 CVE-2018-7755 CVE-2018-9363 CVE-2018-9516 CVE-2018-10021 CVE-2018-10323 CVE-2018-10876 CVE-2018-1087 CVE-2018-10878 CVE-2018-10879 CVE-2018-10880 CVE-2018-1088 CVE-2018-10882 CVE-2018-10883 CVE-2018-10902 CVE-2018-1309 CVE-2018-13094 CVE-2018-13405 CVE-2018-13406 CVE-2018-1460 CVE-2018-14617 CVE-2018-14633 CVE-2018-14634 CVE-2018-1467 CVE-2018-14734 CVE-2018-15572 CVE-2018-15594 CVE-2018-1627 CVE-2018-16658 CVE-2018-17182 Bug#898137</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1529.wml b/english/lts/security/2018/dla-1529.wml
deleted file mode 100644
index 1127340897b..00000000000
--- a/english/lts/security/2018/dla-1529.wml
+++ /dev/null
@@ -1,255 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3620">CVE-2018-3620</a>
-
- <p>Multiple researchers have discovered a vulnerability in the way
- the Intel processor designs have implemented speculative execution
- of instructions in combination with handling of page-faults. This
- flaw could allow an attacker controlling an unprivileged process
- to read memory from arbitrary (non-user controlled) addresses,
- including from the kernel and all other processes running on the
- system or cross guest/host boundaries to read host memory.</p>
-
- <p>This issue covers only attackers running normal processes. A
- related issue (<a href="https://security-tracker.debian.org/tracker/CVE-2018-3646">CVE-2018-3646</a>)
- exists with KVM guests, and is not yet fixed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a>
-
- <p>Multiple researchers have discovered that Speculative Store Bypass
- (SSB), a feature implemented in many processors, could be used to
- read sensitive information from another context. In particular,
- code in a software sandbox may be able to read sensitive
- information from outside the sandbox. This issue is also known as
- Spectre variant 4.</p>
-
- <p>This update allows the issue to be mitigated on some x86
- processors by disabling SSB. This requires an update to the
- processor's microcode, which is non-free. DLA 1446-1 and DLA
- 1506-1 provided this for some Intel processors. For other
- processors, it may be included in an update to the system BIOS or
- UEFI firmware, or in a future update to the intel-microcode or
- amd64-microcode packages.</p>
-
- <p>Disabling SSB can reduce performance significantly, so by default
- it is only done in tasks that use the seccomp feature.
- Applications that require this mitigation should request it
- explicitly through the prctl() system call. Users can control
- where the mitigation is enabled with the spec_store_bypass_disable
- kernel parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5391">CVE-2018-5391</a>
-
- <p>(FragmentSmack)</p>
-
- <p>Juha-Matti Tilli discovered a flaw in the way the Linux kernel
- handled reassembly of fragmented IPv4 and IPv6 packets. A remote
- attacker can take advantage of this flaw to trigger time and
- calculation expensive fragment reassembly algorithms by sending
- specially crafted packets, leading to remote denial of service.</p>
-
- <p>This is mitigated by reducing the default limits on memory usage
- for incomplete fragmented packets. The same mitigation can be
- achieved without the need to reboot, by setting the sysctls:</p>
-
- <p>net.ipv4.ipfrag_low_thresh = 196608<br>
- net.ipv6.ip6frag_low_thresh = 196608<br>
- net.ipv4.ipfrag_high_thresh = 262144<br>
- net.ipv6.ip6frag_high_thresh = 262144</p>
-
- <p>The default values may still be increased by local configuration
- if necessary.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6554">CVE-2018-6554</a>
-
- <p>A memory leak in the irda_bind function in the irda subsystem was
- discovered. A local user can take advantage of this flaw to cause a
- denial of service (memory consumption).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6555">CVE-2018-6555</a>
-
- <p>A flaw was discovered in the irda_setsockopt function in the irda
- subsystem, allowing a local user to cause a denial of service
- (use-after-free and system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7755">CVE-2018-7755</a>
-
- <p>Brian Belleville discovered a flaw in the fd_locked_ioctl function
- in the floppy driver in the Linux kernel. The floppy driver copies a
- kernel pointer to user memory in response to the FDGETPRM ioctl. A
- local user with access to a floppy drive device can take advantage
- of this flaw to discover the location kernel code and data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9363">CVE-2018-9363</a>
-
- <p>It was discovered that the Bluetooth HIDP implementation did not
- correctly check the length of received report messages. A paired
- HIDP device could use this to cause a buffer overflow, leading to
- denial of service (memory corruption or crash) or potentially
- remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9516">CVE-2018-9516</a>
-
- <p>It was discovered that the HID events interface in debugfs did not
- correctly limit the length of copies to user buffers. A local
- user with access to these files could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation. However, by default debugfs is only
- accessible by the root user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10021">CVE-2018-10021</a>
-
- <p>A physically present attacker who unplugs a SAS cable can cause a
- denial of service (memory leak and WARN).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10323">CVE-2018-10323</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-13093">CVE-2018-13093</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-13094">CVE-2018-13094</a>
-
- <p>Wen Xu from SSLab at Gatech reported several NULL pointer
- dereference flaws that may be triggered when mounting and
- operating a crafted XFS volume. An attacker able to mount
- arbitrary XFS volumes could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10876">CVE-2018-10876</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10877">CVE-2018-10877</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10878">CVE-2018-10878</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10879">CVE-2018-10879</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10880">CVE-2018-10880</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10881">CVE-2018-10881</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10882">CVE-2018-10882</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10883">CVE-2018-10883</a>
-
- <p>Wen Xu from SSLab at Gatech reported that crafted ext4 volumes
- could trigger a crash or memory corruption. An attacker able to
- mount arbitrary ext4 volumes could use this for denial of service
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10902">CVE-2018-10902</a>
-
- <p>It was discovered that the rawmidi kernel driver does not protect
- against concurrent access which leads to a double-realloc (double
- free) flaw. A local attacker can take advantage of this issue for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13405">CVE-2018-13405</a>
-
- <p>Jann Horn discovered that the inode_init_owner function in
- fs/inode.c in the Linux kernel allows local users to create files
- with an unintended group ownership allowing attackers to escalate
- privileges by making a plain file executable and SGID.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13406">CVE-2018-13406</a>
-
- <p>Dr Silvio Cesare of InfoSect reported a potential integer overflow
- in the uvesafb driver. A local user with permission to access
- such a device might be able to use this for denial of service or
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14609">CVE-2018-14609</a>
-
- <p>Wen Xu from SSLab at Gatech reported a potential null pointer
- dereference in the F2FS implementation. An attacker able to mount
- arbitrary F2FS volumes could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14617">CVE-2018-14617</a>
-
- <p>Wen Xu from SSLab at Gatech reported a potential null pointer
- dereference in the HFS+ implementation. An attacker able to mount
- arbitrary HFS+ volumes could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14633">CVE-2018-14633</a>
-
- <p>Vincent Pelletier discovered a stack-based buffer overflow flaw in
- the chap_server_compute_md5() function in the iSCSI target code. An
- unauthenticated remote attacker can take advantage of this flaw to
- cause a denial of service or possibly to get a non-authorized access
- to data exported by an iSCSI target.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14634">CVE-2018-14634</a>
-
- <p>Qualys reported an integer overflow in the initialisation of the
- stack for ELF executables, which can cause the stack to overlap
- the argument or environment strings. A local user may use this to
- defeat environment variable filtering in setuid programs, leading
- to privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14678">CVE-2018-14678</a>
-
- <p>M. Vefa Bicakci and Andy Lutomirski discovered a flaw in the
- kernel exit code used on amd64 systems running as Xen PV guests.
- A local user could use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14734">CVE-2018-14734</a>
-
- <p>A use-after-free bug was discovered in the InfiniBand
- communication manager. A local user could use this to cause a
- denial of service (crash or memory corruption) or possible for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15572">CVE-2018-15572</a>
-
- <p>Esmaiel Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, and
- Nael Abu-Ghazaleh, from University of California, Riverside,
- reported a variant of Spectre variant 2, dubbed SpectreRSB. A
- local user may be able to use this to read sensitive information
- from processes owned by other users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15594">CVE-2018-15594</a>
-
- <p>Nadav Amit reported that some indirect function calls used in
- paravirtualised guests were vulnerable to Spectre variant 2. A
- local user may be able to use this to read sensitive information
- from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16276">CVE-2018-16276</a>
-
- <p>Jann Horn discovered that the yurex driver did not correctly limit
- the length of copies to user buffers. A local user with access to
- a yurex device node could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16658">CVE-2018-16658</a>
-
- <p>It was discovered that the cdrom driver does not correctly
- validate the parameter to the CDROM_DRIVE_STATUS ioctl. A user
- with access to a cdrom device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17182">CVE-2018-17182</a>
-
- <p>Jann Horn discovered that the vmacache_flush_all function mishandles
- sequence number overflows. A local user can take advantage of this
- flaw to trigger a use-after-free, causing a denial of service
- (crash or memory corruption) or privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.59-1. This version also includes a fix for bug #898137 and
-several other fixes included in upstream stable updates.</p>
-
-<p>We recommend that you upgrade your linux packages. Since the kernel
-ABI and binary package names have changed, you will need to use an
-upgrade command that installs new dependencies, such as <q>apt upgrade</q>
-or "apt-get upgrade --with-new-pkgs".</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1529.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1530.data b/english/lts/security/2018/dla-1530.data
deleted file mode 100644
index 7e79cfcb228..00000000000
--- a/english/lts/security/2018/dla-1530.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1530-1 imagemagick</define-tag>
-<define-tag report_date>2018-10-3</define-tag>
-<define-tag secrefs>CVE-2018-16412 CVE-2018-16413 CVE-2018-16642 CVE-2018-16643 CVE-2018-16644 CVE-2018-16645 CVE-2018-16749</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1530.wml b/english/lts/security/2018/dla-1530.wml
deleted file mode 100644
index 87427bed4d0..00000000000
--- a/english/lts/security/2018/dla-1530.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities were discovered in ImageMagick, an
-image manipulation program, that allow remote attackers to cause denial
-of service (application crash, excessive memory allocation, or other
-unspecified effects) or out of bounds memory access via DCM, PWP, CALS,
-PICT, BMP, DIB, or PNG image files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8:6.8.9.9-5+deb8u14.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1530.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1531.data b/english/lts/security/2018/dla-1531.data
deleted file mode 100644
index cbc750ee4d8..00000000000
--- a/english/lts/security/2018/dla-1531.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1531-1 linux-4.9</define-tag>
-<define-tag report_date>2018-10-3</define-tag>
-<define-tag secrefs>CVE-2018-6554 CVE-2018-6555 CVE-2018-7755 CVE-2018-9363 CVE-2018-9516 CVE-2018-10902 CVE-2018-10938 CVE-2018-13099 CVE-2018-14609 CVE-2018-14617 CVE-2018-14633 CVE-2018-1467 CVE-2018-14734 CVE-2018-15572 CVE-2018-15594 CVE-2018-1627 CVE-2018-16658 CVE-2018-17182</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1531.wml b/english/lts/security/2018/dla-1531.wml
deleted file mode 100644
index c1d281e16d7..00000000000
--- a/english/lts/security/2018/dla-1531.wml
+++ /dev/null
@@ -1,153 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6554">CVE-2018-6554</a>
-
- <p>A memory leak in the irda_bind function in the irda subsystem was
- discovered. A local user can take advantage of this flaw to cause a
- denial of service (memory consumption).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6555">CVE-2018-6555</a>
-
- <p>A flaw was discovered in the irda_setsockopt function in the irda
- subsystem, allowing a local user to cause a denial of service
- (use-after-free and system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7755">CVE-2018-7755</a>
-
- <p>Brian Belleville discovered a flaw in the fd_locked_ioctl function
- in the floppy driver in the Linux kernel. The floppy driver copies a
- kernel pointer to user memory in response to the FDGETPRM ioctl. A
- local user with access to a floppy drive device can take advantage
- of this flaw to discover the location kernel code and data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9363">CVE-2018-9363</a>
-
- <p>It was discovered that the Bluetooth HIDP implementation did not
- correctly check the length of received report messages. A paired
- HIDP device could use this to cause a buffer overflow, leading to
- denial of service (memory corruption or crash) or potentially
- remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-9516">CVE-2018-9516</a>
-
- <p>It was discovered that the HID events interface in debugfs did not
- correctly limit the length of copies to user buffers. A local
- user with access to these files could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation. However, by default debugfs is only
- accessible by the root user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10902">CVE-2018-10902</a>
-
- <p>It was discovered that the rawmidi kernel driver does not protect
- against concurrent access which leads to a double-realloc (double
- free) flaw. A local attacker can take advantage of this issue for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10938">CVE-2018-10938</a>
-
- <p>Yves Younan from Cisco reported that the Cipso IPv4 module did not
- correctly check the length of IPv4 options. On custom kernels with
- CONFIG_NETLABEL enabled, a remote attacker could use this to cause
- a denial of service (hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13099">CVE-2018-13099</a>
-
- <p>Wen Xu from SSLab at Gatech reported a use-after-free bug in the
- F2FS implementation. An attacker able to mount a crafted F2FS
- volume could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14609">CVE-2018-14609</a>
-
- <p>Wen Xu from SSLab at Gatech reported a potential null pointer
- dereference in the F2FS implementation. An attacker able to mount
- arbitrary F2FS volumes could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14617">CVE-2018-14617</a>
-
- <p>Wen Xu from SSLab at Gatech reported a potential null pointer
- dereference in the HFS+ implementation. An attacker able to mount
- arbitrary HFS+ volumes could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14633">CVE-2018-14633</a>
-
- <p>Vincent Pelletier discovered a stack-based buffer overflow flaw in
- the chap_server_compute_md5() function in the iSCSI target code. An
- unauthenticated remote attacker can take advantage of this flaw to
- cause a denial of service or possibly to get a non-authorized access
- to data exported by an iSCSI target.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14678">CVE-2018-14678</a>
-
- <p>M. Vefa Bicakci and Andy Lutomirski discovered a flaw in the
- kernel exit code used on amd64 systems running as Xen PV guests.
- A local user could use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14734">CVE-2018-14734</a>
-
- <p>A use-after-free bug was discovered in the InfiniBand
- communication manager. A local user could use this to cause a
- denial of service (crash or memory corruption) or possible for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15572">CVE-2018-15572</a>
-
- <p>Esmaiel Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, and
- Nael Abu-Ghazaleh, from University of California, Riverside,
- reported a variant of Spectre variant 2, dubbed SpectreRSB. A
- local user may be able to use this to read sensitive information
- from processes owned by other users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15594">CVE-2018-15594</a>
-
- <p>Nadav Amit reported that some indirect function calls used in
- paravirtualised guests were vulnerable to Spectre variant 2. A
- local user may be able to use this to read sensitive information
- from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16276">CVE-2018-16276</a>
-
- <p>Jann Horn discovered that the yurex driver did not correctly limit
- the length of copies to user buffers. A local user with access to
- a yurex device node could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16658">CVE-2018-16658</a>
-
- <p>It was discovered that the cdrom driver does not correctly
- validate the parameter to the CDROM_DRIVE_STATUS ioctl. A user
- with access to a cdrom device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17182">CVE-2018-17182</a>
-
- <p>Jann Horn discovered that the vmacache_flush_all function mishandles
- sequence number overflows. A local user can take advantage of this
- flaw to trigger a use-after-free, causing a denial of service
- (crash or memory corruption) or privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.110-3+deb9u5~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1531.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1532.data b/english/lts/security/2018/dla-1532.data
deleted file mode 100644
index 6e0c7d141b5..00000000000
--- a/english/lts/security/2018/dla-1532.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1532-1 dnsmasq</define-tag>
-<define-tag report_date>2018-10-4</define-tag>
-<define-tag secrefs>Bug#907887</define-tag>
-<define-tag packages>dnsmasq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1532.wml b/english/lts/security/2018/dla-1532.wml
deleted file mode 100644
index 96bef22eca9..00000000000
--- a/english/lts/security/2018/dla-1532.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>dnsmasq, a DNS forwarder and DHCP server, ships the DNS Root Zone Key
-Signing Key (KSK), used as the DNSSEC trust anchor. ICANN will rollover
-the KSK in 11 October 2018, and DNS resolvers will need the new key
-(KSK-2017) to continue performing DNSSEC validation. This dnsmasq package
-update includes the latest key to prevent issues in scenarios where
-dnsmasq runs with DNSSEC enabled and it is using the trusted anchors file
-shipped with the package. Please note this is not the default
-configuration in Debian.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.72-3+deb8u4.</p>
-
-<p>We recommend that you upgrade your dnsmasq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1532.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1533.data b/english/lts/security/2018/dla-1533.data
deleted file mode 100644
index 18184596c00..00000000000
--- a/english/lts/security/2018/dla-1533.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1533-1 git</define-tag>
-<define-tag report_date>2018-10-5</define-tag>
-<define-tag secrefs>CVE-2018-17456</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1533.wml b/english/lts/security/2018/dla-1533.wml
deleted file mode 100644
index 07920cb442f..00000000000
--- a/english/lts/security/2018/dla-1533.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>joernchen of Phenoelit discovered that git, a fast, scalable,
-distributed revision control system, is prone to an arbitrary code
-execution vulnerability via a specially crafted .gitmodules file in a
-project cloned with --recurse-submodules.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1.4-2.1+deb8u7.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1533.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1534.data b/english/lts/security/2018/dla-1534.data
deleted file mode 100644
index 6c0eaf1a75b..00000000000
--- a/english/lts/security/2018/dla-1534.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1534-1 adplug</define-tag>
-<define-tag report_date>2018-10-7</define-tag>
-<define-tag secrefs>CVE-2018-17825</define-tag>
-<define-tag packages>adplug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1534.wml b/english/lts/security/2018/dla-1534.wml
deleted file mode 100644
index 025c3191916..00000000000
--- a/english/lts/security/2018/dla-1534.wml
+++ /dev/null
@@ -1,14 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a potential denial of service (DoS)
-attack due to double-free vulnerability in the <q>adplug</q> sound library.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in adplug version
-2.2.1+dfsg3-0.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your adplug packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1534.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1535.data b/english/lts/security/2018/dla-1535.data
deleted file mode 100644
index b884cb64f55..00000000000
--- a/english/lts/security/2018/dla-1535.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1535-1 php-horde</define-tag>
-<define-tag report_date>2018-10-7</define-tag>
-<define-tag secrefs>CVE-2017-16907 Bug#909739</define-tag>
-<define-tag packages>php-horde</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1535.wml b/english/lts/security/2018/dla-1535.wml
deleted file mode 100644
index fc2090b6ea4..00000000000
--- a/english/lts/security/2018/dla-1535.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Horde Application Framework written in PHP
-was affected by a Cross-site scripting vulnerability via the Color
-field in a Create Task List action. This may be used by attackers to
-bypass access controls.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.2.1+debian0-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your php-horde packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1535.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1536.data b/english/lts/security/2018/dla-1536.data
deleted file mode 100644
index 2d3c4850a16..00000000000
--- a/english/lts/security/2018/dla-1536.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1536-1 php-horde-core</define-tag>
-<define-tag report_date>2018-10-7</define-tag>
-<define-tag secrefs>CVE-2017-16907 Bug#909800</define-tag>
-<define-tag packages>php-horde-core</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1536.wml b/english/lts/security/2018/dla-1536.wml
deleted file mode 100644
index a547855076c..00000000000
--- a/english/lts/security/2018/dla-1536.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Horde Application Framework written in PHP
-was affected by a Cross-site scripting vulnerability via the Color
-field in a Create Task List action. This may be used by attackers to
-bypass access controls.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.15.0+debian0-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your php-horde-core packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1536.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1537.data b/english/lts/security/2018/dla-1537.data
deleted file mode 100644
index d087086db1f..00000000000
--- a/english/lts/security/2018/dla-1537.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1537-1 php-horde-kronolith</define-tag>
-<define-tag report_date>2018-10-7</define-tag>
-<define-tag secrefs>CVE-2017-16906 Bug#909737</define-tag>
-<define-tag packages>php-horde-kronolith</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1537.wml b/english/lts/security/2018/dla-1537.wml
deleted file mode 100644
index 151a29fb223..00000000000
--- a/english/lts/security/2018/dla-1537.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Horde Application Framework written in PHP
-was affected by a Cross-site scripting vulnerability via the URL
-field in a Calendar. This may be used by attackers to bypass access
-controls.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.2.2-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-kronolith packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1537.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1538.data b/english/lts/security/2018/dla-1538.data
deleted file mode 100644
index 4c47b3b5836..00000000000
--- a/english/lts/security/2018/dla-1538.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1538-1 tinc</define-tag>
-<define-tag report_date>2018-10-8</define-tag>
-<define-tag secrefs>CVE-2018-16737 CVE-2018-16758</define-tag>
-<define-tag packages>tinc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1538.wml b/english/lts/security/2018/dla-1538.wml
deleted file mode 100644
index ccbf9ed964b..00000000000
--- a/english/lts/security/2018/dla-1538.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in tinc, a Virtual Private
-Network (VPN) daemon. The Common Vulnerabilities and Exposures project
-identifies the following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16737">CVE-2018-16737</a>
-
- <p>Michael Yonli discovered a flaw in the implementation of the
- authentication protocol that could allow a remote attacker to
- establish an authenticated, one-way connection with another node.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16758">CVE-2018-16758</a>
-
- <p>Michael Yonli discovered that a man-in-the-middle that has
- intercepted a TCP connection might be able to disable encryption of
- UDP packets sent by a node.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.24-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your tinc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1538.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1539.data b/english/lts/security/2018/dla-1539.data
deleted file mode 100644
index 2a776001b3c..00000000000
--- a/english/lts/security/2018/dla-1539.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1539-1 samba</define-tag>
-<define-tag report_date>2018-10-8</define-tag>
-<define-tag secrefs>CVE-2018-10858 CVE-2018-10919</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1539.wml b/english/lts/security/2018/dla-1539.wml
deleted file mode 100644
index 0ad41f8a4b2..00000000000
--- a/english/lts/security/2018/dla-1539.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
-print, and login server for Unix. The Common Vulnerabilities and
-Exposures project identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10858">CVE-2018-10858</a>
-
- <p>Svyatoslav Phirsov discovered that insufficient input validation in
- libsmbclient allowed a malicious Samba server to write to the
- client's heap memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10919">CVE-2018-10919</a>
-
- <p>Phillip Kuhrt discovered that Samba when acting as an Active Domain
- controller disclosed some sensitive attributes.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.2.14+dfsg-0+deb8u10.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1539.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1540.data b/english/lts/security/2018/dla-1540.data
deleted file mode 100644
index 29918c6a255..00000000000
--- a/english/lts/security/2018/dla-1540.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1540-1 net-snmp</define-tag>
-<define-tag report_date>2018-10-9</define-tag>
-<define-tag secrefs>CVE-2018-18065 Bug#910638</define-tag>
-<define-tag packages>net-snmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1540.wml b/english/lts/security/2018/dla-1540.wml
deleted file mode 100644
index 59d84262b49..00000000000
--- a/english/lts/security/2018/dla-1540.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Magnus K. Stubman found that an authenticated remote attacker could
-crash an instance of Net-SNMP by sending a specially crafted UDP packet
-resulting in a denial-of-service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.7.2.1+dfsg-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your net-snmp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1540.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1541.data b/english/lts/security/2018/dla-1541.data
deleted file mode 100644
index 15f8ed28081..00000000000
--- a/english/lts/security/2018/dla-1541.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1541-1 jekyll</define-tag>
-<define-tag report_date>2018-10-10</define-tag>
-<define-tag secrefs>CVE-2018-17567 Bug#909933</define-tag>
-<define-tag packages>jekyll</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1541.wml b/english/lts/security/2018/dla-1541.wml
deleted file mode 100644
index 626d0b4174a..00000000000
--- a/english/lts/security/2018/dla-1541.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Parker Moore from Github Inc, discovered a vulnerability in include:
-setting in the config file of jekyll which allow arbitrary file reads.
-By simply including a symlink in the include array allowed the
-symlinked file to be read into the build when they shouldn’t actually
-be read in any circumstance.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.2.0+dfsg-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your jekyll packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1541.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1542.data b/english/lts/security/2018/dla-1542.data
deleted file mode 100644
index caf42025e31..00000000000
--- a/english/lts/security/2018/dla-1542.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1542-1 dnsruby</define-tag>
-<define-tag report_date>2018-10-11</define-tag>
-<define-tag secrefs>Bug#908887</define-tag>
-<define-tag packages>dnsruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1542.wml b/english/lts/security/2018/dla-1542.wml
deleted file mode 100644
index 0fa46d62439..00000000000
--- a/english/lts/security/2018/dla-1542.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>dnsruby is a feature-complete DNS(SEC) client for Ruby. It ships the DNS
-Root Key Signing Key (KSK), used as trust anchor to validate the
-authenticity of DNS records. This update includes the latest KSK
-(KSK-2017), that will be used by ICANN to sign the Root Zone today, 11
-October 2018.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.54-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your dnsruby packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1542.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1543.data b/english/lts/security/2018/dla-1543.data
deleted file mode 100644
index 0514ce9f267..00000000000
--- a/english/lts/security/2018/dla-1543.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1543-1 gnulib</define-tag>
-<define-tag report_date>2018-10-10</define-tag>
-<define-tag secrefs>CVE-2018-17942 Bug#910757</define-tag>
-<define-tag packages>gnulib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1543.wml b/english/lts/security/2018/dla-1543.wml
deleted file mode 100644
index a2f4e648251..00000000000
--- a/english/lts/security/2018/dla-1543.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ben Pfaff discovered that the convert_to_decimal function in the GNU
-Portability Library contains a heap-based buffer overflow because memory
-is not allocated for a trailing '\0' character during %f processing.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-20140202+stable-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your gnulib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1543.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1544.data b/english/lts/security/2018/dla-1544.data
deleted file mode 100644
index a5e794ee8c7..00000000000
--- a/english/lts/security/2018/dla-1544.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1544-1 tomcat7</define-tag>
-<define-tag report_date>2018-10-14</define-tag>
-<define-tag secrefs>CVE-2018-11784</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1544.wml b/english/lts/security/2018/dla-1544.wml
deleted file mode 100644
index 8d3663eed0a..00000000000
--- a/english/lts/security/2018/dla-1544.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sergey Bobrov discovered that when the default servlet returned a
-redirect to a directory (e.g. redirecting to /foo/ when the user
-requested /foo) a specially crafted URL could be used to cause the
-redirect to be generated to any URI of the attackers choice.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.0.56-3+really7.0.91-1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1544.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1545.data b/english/lts/security/2018/dla-1545.data
deleted file mode 100644
index e6481f4c79e..00000000000
--- a/english/lts/security/2018/dla-1545.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1545-1 tomcat8</define-tag>
-<define-tag report_date>2018-10-15</define-tag>
-<define-tag secrefs>CVE-2018-11784</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1545.wml b/english/lts/security/2018/dla-1545.wml
deleted file mode 100644
index 1daaa806c44..00000000000
--- a/english/lts/security/2018/dla-1545.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sergey Bobrov discovered that when the default servlet returned a
-redirect to a directory (e.g. redirecting to /foo/ when the user
-requested /foo) a specially crafted URL could be used to cause the
-redirect to be generated to any URI of the attackers choice.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-8.0.14-1+deb8u14.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1545.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1546.data b/english/lts/security/2018/dla-1546.data
deleted file mode 100644
index 8360737409e..00000000000
--- a/english/lts/security/2018/dla-1546.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1546-1 moin</define-tag>
-<define-tag report_date>2018-10-15</define-tag>
-<define-tag secrefs>CVE-2017-5934 Bug#910776</define-tag>
-<define-tag packages>moin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1546.wml b/english/lts/security/2018/dla-1546.wml
deleted file mode 100644
index f20ae124942..00000000000
--- a/english/lts/security/2018/dla-1546.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nitin Venkatesh discovered a cross-site scripting vulnerability in
-moin, a Python clone of WikiWiki. A remote attacker can conduct
-cross-site scripting attacks via the GUI editor's link dialogue.
-This only affects installations which have set up fckeditor
-(not enabled by default).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.9.8-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your moin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1546.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1547.data b/english/lts/security/2018/dla-1547.data
deleted file mode 100644
index 64a78c341f7..00000000000
--- a/english/lts/security/2018/dla-1547.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1547-1 libpdfbox-java</define-tag>
-<define-tag report_date>2018-10-16</define-tag>
-<define-tag secrefs>CVE-2018-11797 Bug##910390</define-tag>
-<define-tag packages>libpdfbox-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1547.wml b/english/lts/security/2018/dla-1547.wml
deleted file mode 100644
index e2438479d7a..00000000000
--- a/english/lts/security/2018/dla-1547.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial-of-service vulnerability in
-libpdfbox-java, a PDF library for Java.</p>
-
-<p>A malicious PDF file could have triggered an extremely long running
-computation when parsing the page tree.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in libpdfbox-java version
-1:1.8.7+dfsg-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libpdfbox-java packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1547.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1548.data b/english/lts/security/2018/dla-1548.data
deleted file mode 100644
index b239e0a61e0..00000000000
--- a/english/lts/security/2018/dla-1548.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1548-1 libssh</define-tag>
-<define-tag report_date>2018-10-18</define-tag>
-<define-tag secrefs>CVE-2018-10933 Bug#911149</define-tag>
-<define-tag packages>libssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1548.wml b/english/lts/security/2018/dla-1548.wml
deleted file mode 100644
index cb1527b3c2d..00000000000
--- a/english/lts/security/2018/dla-1548.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Peter Winter-Smith of NCC Group discovered that libssh, a tiny C SSH
-library, contains an authentication bypass vulnerability in the server
-code. An attacker can take advantage of this flaw to successfully
-authenticate without any credentials by presenting the server an
-SSH2_MSG_USERAUTH_SUCCESS message in place of the
-SSH2_MSG_USERAUTH_REQUEST message which the server would expect to
-initiate authentication.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.6.3-4+deb8u3.</p>
-
-<p>We recommend that you upgrade your libssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1548.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1549.data b/english/lts/security/2018/dla-1549.data
deleted file mode 100644
index 23b12e6adbb..00000000000
--- a/english/lts/security/2018/dla-1549.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1549-1 xen</define-tag>
-<define-tag report_date>2018-10-18</define-tag>
-<define-tag secrefs>CVE-2017-14316 CVE-2017-14317 CVE-2017-14319 CVE-2017-15588 CVE-2017-15589 CVE-2017-15590 CVE-2017-15597 CVE-2017-17046 CVE-2017-17563 CVE-2017-17564 CVE-2017-17565 CVE-2017-17566 CVE-2018-10471 CVE-2018-10982</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1549.wml b/english/lts/security/2018/dla-1549.wml
deleted file mode 100644
index 9db48b09b5f..00000000000
--- a/english/lts/security/2018/dla-1549.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, informations leaks or privilege
-escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.4.4lts2-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1549.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1550.data b/english/lts/security/2018/dla-1550.data
deleted file mode 100644
index 70f0bd42f8f..00000000000
--- a/english/lts/security/2018/dla-1550.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1550-1 drupal7</define-tag>
-<define-tag report_date>2018-10-19</define-tag>
-<define-tag secrefs>Bug##911336 Bug##911337</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1550.wml b/english/lts/security/2018/dla-1550.wml
deleted file mode 100644
index c289f8e1d8f..00000000000
--- a/english/lts/security/2018/dla-1550.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote code execution and an
-external URL injection vulnerability in the Drupal content
-management framework.</p>
-
-<p>For more information, please see:</p>
-
- <p><url "https://www.drupal.org/sa-core-2018-006"></p>
-
-<p>For Debian 8 <q>Jessie</q>, these issues have been fixed in drupal7
-version 7.32-1+deb8u13.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1550.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1551.data b/english/lts/security/2018/dla-1551.data
deleted file mode 100644
index 4c2747d68ad..00000000000
--- a/english/lts/security/2018/dla-1551.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1551-1 exiv2</define-tag>
-<define-tag report_date>2018-10-21</define-tag>
-<define-tag secrefs>CVE-2018-10958 CVE-2018-10999 CVE-2018-16336</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1551.wml b/english/lts/security/2018/dla-1551.wml
deleted file mode 100644
index 0e9a71b1819..00000000000
--- a/english/lts/security/2018/dla-1551.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in exiv2 (<a href="https://security-tracker.debian.org/tracker/CVE-2018-16336">CVE-2018-16336</a>), a C++
-library and a command line utility to manage image metadata, resulting
-in remote denial of service (heap-based buffer over-read/overflow) via
-a crafted image file.</p>
-
-<p>Additionally, this update includes a minor change to the patch for the
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-10958">CVE-2018-10958</a>/<a href="https://security-tracker.debian.org/tracker/CVE-2018-10999">CVE-2018-10999</a> vulnerability first addressed in DLA
-1402-1. The initial patch was overly restrictive and has been adjusted
-to remove the excessive restriction.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.24-4.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1551.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1552.data b/english/lts/security/2018/dla-1552.data
deleted file mode 100644
index 4dca0168bde..00000000000
--- a/english/lts/security/2018/dla-1552.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1552-1 ghostscript</define-tag>
-<define-tag report_date>2018-10-22</define-tag>
-<define-tag secrefs>CVE-2018-17961 CVE-2018-18073 CVE-2018-18284 Bug#910678 Bug#910758 Bug#911175</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1552.wml b/english/lts/security/2018/dla-1552.wml
deleted file mode 100644
index 85ffb3979d8..00000000000
--- a/english/lts/security/2018/dla-1552.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is a follow-up update for the recently discovered -dSAFER issues
-reported by Tavis Ormandy.</p>
-
-<p>Tavis Ormandy discovered multiple vulnerabilites in Ghostscript, an
-interpreter for the PostScript language, which could result in denial of
-service, the creation of files or the execution of arbitrary code if a
-malformed Postscript file is processed (despite the dSAFER sandbox being
-enabled).</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.06~dfsg-2+deb8u11.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1552.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1553.data b/english/lts/security/2018/dla-1553.data
deleted file mode 100644
index 8f2f49aea48..00000000000
--- a/english/lts/security/2018/dla-1553.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1553-1 clamav</define-tag>
-<define-tag report_date>2018-10-24</define-tag>
-<define-tag secrefs>CVE-2018-15378 Bug#910430</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1553.wml b/english/lts/security/2018/dla-1553.wml
deleted file mode 100644
index 358cf429ed8..00000000000
--- a/english/lts/security/2018/dla-1553.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>ClamAV is an anti-virus utility for Unix, whose upstream developers have
-released the version 0.100.2. Installing this new version is required to
-make use of all current virus signatures and to avoid warnings.</p>
-
-<p>This version also fixes a security issue discovered after version 0.100.1:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15378">CVE-2018-15378</a>
-
- <p>A vulnerability in ClamAV's MEW unpacker may allow unauthenticated
- remote offenders to cause a denial of service (DoS) via a specially
- crafted EXE file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.100.2+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1553.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1554-2.data b/english/lts/security/2018/dla-1554-2.data
deleted file mode 100644
index 10442c87556..00000000000
--- a/english/lts/security/2018/dla-1554-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1554-2 389-ds-base</define-tag>
-<define-tag report_date>2018-10-25</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1554-2.wml b/english/lts/security/2018/dla-1554-2.wml
deleted file mode 100644
index 18e55477b06..00000000000
--- a/english/lts/security/2018/dla-1554-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was found in the recent security update for 389-ds-base
-(the 389 Directory Server), announced as DLA-1554-2, caused by an
-incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-14648">CVE-2018-14648</a>.
-The regression caused the server
-to crash when processing requests with empty attributes.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.3.5-4+deb8u5.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1554-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1554.data b/english/lts/security/2018/dla-1554.data
deleted file mode 100644
index f591e703474..00000000000
--- a/english/lts/security/2018/dla-1554.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1554-1 389-ds-base</define-tag>
-<define-tag report_date>2018-10-25</define-tag>
-<define-tag secrefs>CVE-2018-14648</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1554.wml b/english/lts/security/2018/dla-1554.wml
deleted file mode 100644
index 33b457a241c..00000000000
--- a/english/lts/security/2018/dla-1554.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that 389-ds-base (the 389 Directory Server) is vulnerable
-to search queries with malformed values in the do_search() function
-(servers/slapd/search.c). Attackers could leverage this vulnerability by
-sending crafted queries in a loop to cause DoS.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.3.5-4+deb8u4.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1554.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1555.data b/english/lts/security/2018/dla-1555.data
deleted file mode 100644
index 81aa5b7223c..00000000000
--- a/english/lts/security/2018/dla-1555.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1555-1 libmspack</define-tag>
-<define-tag report_date>2018-10-26</define-tag>
-<define-tag secrefs>CVE-2018-18584 CVE-2018-18585</define-tag>
-<define-tag packages>libmspack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1555.wml b/english/lts/security/2018/dla-1555.wml
deleted file mode 100644
index 284f014fda3..00000000000
--- a/english/lts/security/2018/dla-1555.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18584">CVE-2018-18584</a>
- <p>Fixing the size of the CAB block input buffer, which is too small
- for the maximal Quantum block, prevents an out-of-bounds write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18585">CVE-2018-18585</a>
-
- <p>Blank filenames (having length zero or their 1st or 2nd byte is
- null) should be rejected.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your libmspack packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1555.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1556.data b/english/lts/security/2018/dla-1556.data
deleted file mode 100644
index 98ff7b8f6b3..00000000000
--- a/english/lts/security/2018/dla-1556.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1556-1 paramiko</define-tag>
-<define-tag report_date>2018-10-27</define-tag>
-<define-tag secrefs>CVE-2018-7750 CVE-2018-1000805</define-tag>
-<define-tag packages>paramiko</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1556.wml b/english/lts/security/2018/dla-1556.wml
deleted file mode 100644
index 7dc2ce8550a..00000000000
--- a/english/lts/security/2018/dla-1556.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000805">CVE-2018-1000805</a>
-
- <p>Fix to prevent malicious clients to trick the Paramiko server into
- thinking an unauthenticated client is authenticated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7750">CVE-2018-7750</a>
-
- <p>Fix check whether authentication is completed before processing
- other requests. A customized SSH client can simply skip the
- authentication step.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.15.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your paramiko packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1556.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1557.data b/english/lts/security/2018/dla-1557.data
deleted file mode 100644
index 44fea6d3aee..00000000000
--- a/english/lts/security/2018/dla-1557.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1557-1 tiff</define-tag>
-<define-tag report_date>2018-10-28</define-tag>
-<define-tag secrefs>CVE-2018-17100 CVE-2018-17101 CVE-2018-18557</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1557.wml b/english/lts/security/2018/dla-1557.wml
deleted file mode 100644
index 5b7dfe8f03f..00000000000
--- a/english/lts/security/2018/dla-1557.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17100">CVE-2018-17100</a>
- <p>An int32 overflow can cause a denial of service (application
- crash) or possibly have unspecified other impact via a crafted
- image file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17101">CVE-2018-17101</a>
-
- <p>Out-of-bounds writes can cause a denial of service (application
- crash) or possibly have unspecified other impact via a crafted
- image file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18557">CVE-2018-18557</a>
-
- <p>Out-of-bounds write due to ignoring buffer size can cause a denial
- of service (application crash) or possibly have unspecified other
- impact via a crafted image file</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.0.3-12.3+deb8u7.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1557.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1558.data b/english/lts/security/2018/dla-1558.data
deleted file mode 100644
index 5ff555026bc..00000000000
--- a/english/lts/security/2018/dla-1558.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1558-1 ruby2.1</define-tag>
-<define-tag report_date>2018-10-28</define-tag>
-<define-tag secrefs>CVE-2018-16395 CVE-2018-16396</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1558.wml b/english/lts/security/2018/dla-1558.wml
deleted file mode 100644
index 842b1c5471e..00000000000
--- a/english/lts/security/2018/dla-1558.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16395">CVE-2018-16395</a>
-
- <p>Fix for OpenSSL::X509::Name equality check.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16396">CVE-2018-16396</a>
-
- <p>Tainted flags are not propagated in Array#pack and String#unpack
- with some directives.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.5-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1558.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1559.data b/english/lts/security/2018/dla-1559.data
deleted file mode 100644
index f4189e0f6bb..00000000000
--- a/english/lts/security/2018/dla-1559.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1559-1 xen</define-tag>
-<define-tag report_date>2018-10-30</define-tag>
-<define-tag secrefs>CVE-2017-15592 CVE-2017-15593 CVE-2017-15594 CVE-2017-15595 CVE-2017-17044 CVE-2017-17045 CVE-2018-10472 CVE-2018-10981</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1559.wml b/english/lts/security/2018/dla-1559.wml
deleted file mode 100644
index fb87a8c1bba..00000000000
--- a/english/lts/security/2018/dla-1559.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, informations leaks or privilege
-escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.4.4lts3-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1559.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1560.data b/english/lts/security/2018/dla-1560.data
deleted file mode 100644
index cadbe01b6f6..00000000000
--- a/english/lts/security/2018/dla-1560.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1560-1 gnutls28</define-tag>
-<define-tag report_date>2018-10-30</define-tag>
-<define-tag secrefs>CVE-2018-10844 CVE-2018-10845 CVE-2018-10846</define-tag>
-<define-tag packages>gnutls28</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1560.wml b/english/lts/security/2018/dla-1560.wml
deleted file mode 100644
index a57342787d4..00000000000
--- a/english/lts/security/2018/dla-1560.wml
+++ /dev/null
@@ -1,82 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A set of vulnerabilities was discovered in GnuTLS which allowed
-attackers to do plain text recovery on TLS connections with certain
-cipher types.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10844">CVE-2018-10844</a>
-
- <p>It was found that the GnuTLS implementation of HMAC-SHA-256 was
- vulnerable to a Lucky thirteen style attack. Remote attackers
- could use this flaw to conduct distinguishing attacks and
- plaintext-recovery attacks via statistical analysis of timing data
- using crafted packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10845">CVE-2018-10845</a>
-
- <p>It was found that the GnuTLS implementation of HMAC-SHA-384 was
- vulnerable to a Lucky thirteen style attack. Remote attackers
- could use this flaw to conduct distinguishing attacks and plain
- text recovery attacks via statistical analysis of timing data
- using crafted packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10846">CVE-2018-10846</a>
-
- <p>A cache-based side channel in GnuTLS implementation that leads to
- plain text recovery in cross-VM attack setting was found. An
- attacker could use a combination of <q>Just in Time</q> Prime+probe
- attack in combination with Lucky-13 attack to recover plain text
- using crafted packets.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.30-0+deb8u1. It was found to be more practical to update to the
-latest upstream version of the 3.3.x branch since upstream's fixes
-were rather invasive and required cipher list changes anyways. This
-will facilitate future LTS updates as well.</p>
-
-<p>This change therefore also includes the following major policy
-changes, as documented in the NEWS file:</p>
-
-<ul>
-
- <li>ARCFOUR (RC4) and SSL 3.0 are no longer included in the default
- priorities list. Those have to be explicitly enabled, e.g., with
- a string like "NORMAL:+ARCFOUR-128" or "NORMAL:+VERS-SSL3.0",
- respectively.</li>
-
- <li>The ciphers utilizing HMAC-SHA384 and SHA256 have been removed
- from the default priority strings. They are not necessary for
- compatibility or other purpose and provide no advantage over
- their SHA1 counter-parts, as they all depend on the legacy TLS
- CBC block mode.</li>
-
- <li>Follow closely RFC5280 recommendations and use UTCTime for dates
- prior to 2050.</li>
-
- <li>Require strict DER encoding for certificates, OCSP requests,
- private keys, CRLs and certificate requests, in order to reduce
- issues due to the complexity of BER rules.</li>
-
- <li>Refuse to import v1 or v2 certificates that contain extensions.</li>
-
-</ul>
-
-<p>API and ABI compatibility is retained, however, although new symbols
-have been added. Many bugfixes are also included in the upload. See
-the provided upstream changelog for more details.</p>
-
-<p>We recommend that you upgrade your gnutls28 packages and do not expect
-significant breakage.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1560.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1561.data b/english/lts/security/2018/dla-1561.data
deleted file mode 100644
index 156afdfad9b..00000000000
--- a/english/lts/security/2018/dla-1561.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1561-1 phpldapadmin</define-tag>
-<define-tag report_date>2018-10-31</define-tag>
-<define-tag secrefs>CVE-2017-11107 Bug#867719</define-tag>
-<define-tag packages>phpldapadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1561.wml b/english/lts/security/2018/dla-1561.wml
deleted file mode 100644
index 6044d292d85..00000000000
--- a/english/lts/security/2018/dla-1561.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability
-in phpldapadmin, a web-based interface for administering LDAP servers.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.2-5.2+deb8u1.
-<p><b>Note</b>: the package changelog mistakenly refers to the non-existent
-<a href="https://security-tracker.debian.org/tracker/CVE-2016-11107">CVE-2016-11107</a>
-identifier. The proper identifier to refer to this issue
-is <a href="https://security-tracker.debian.org/tracker/CVE-2017-11107">CVE-2017-11107</a>.</p>
-
-<p>We recommend that you upgrade your phpldapadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1561.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1562-2.data b/english/lts/security/2018/dla-1562-2.data
deleted file mode 100644
index 7bedb988dcb..00000000000
--- a/english/lts/security/2018/dla-1562-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1562-2 poppler</define-tag>
-<define-tag report_date>2018-11-30</define-tag>
-<define-tag secrefs>CVE-2018-16646</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1562-2.wml b/english/lts/security/2018/dla-1562-2.wml
deleted file mode 100644
index 567282784b9..00000000000
--- a/english/lts/security/2018/dla-1562-2.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A regression issue has been resolved in the poppler PDF rendering
-shared library introduced with version 0.26.5-2+deb8u5.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16646">CVE-2018-16646</a>
-
- <p>In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may
- cause infinite recursion via a crafted file. A remote attacker can
- leverage this for a DoS attack.</p>
-
- <p>The previous solution in Debian LTS fixed the above issue in XRef.cc,
- the patches had been obtained from a merge request (#67) on upstream's
- Git development platform. Unfortunately, this merge request was declined
- by upstream and another merge request (#91) got applied instead. The
- fix now directly occurs in the Parser.cc file.</p>
-
- <p>This version of poppler now ships the changeset that got favorized by
- the poppler upstream developers (MR #91) and drops the patches from
- MR #67.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.26.5-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1562-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1562-3.data b/english/lts/security/2018/dla-1562-3.data
deleted file mode 100644
index 43e200ddc60..00000000000
--- a/english/lts/security/2018/dla-1562-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1562-3 poppler</define-tag>
-<define-tag report_date>2018-12-14</define-tag>
-<define-tag secrefs>CVE-2018-16646</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1562-3.wml b/english/lts/security/2018/dla-1562-3.wml
deleted file mode 100644
index 15d0c807a7f..00000000000
--- a/english/lts/security/2018/dla-1562-3.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A second regression issue has been resolved in the poppler PDF rendering
-shared library this time introduced with version 0.26.5-2+deb8u6 (see
-DLA 1562-2).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16646">CVE-2018-16646</a>
-
- <p>In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may
- cause infinite recursion via a crafted file. A remote attacker can
- leverage this for a DoS attack.</p>
-
- <p>The poppler upstream developers added two more regression fixes on top
- of the original fix (upstream merge request #91). These two patches
- have now been added to the poppler package in Debian jessie LTS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.26.5-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1562-3.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1562.data b/english/lts/security/2018/dla-1562.data
deleted file mode 100644
index df6aafdd474..00000000000
--- a/english/lts/security/2018/dla-1562.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1562-1 poppler</define-tag>
-<define-tag report_date>2018-10-31</define-tag>
-<define-tag secrefs>CVE-2017-18267 CVE-2018-10768 CVE-2018-13988 CVE-2018-16646 Bug#898357 Bug#909802</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1562.wml b/english/lts/security/2018/dla-1562.wml
deleted file mode 100644
index 35f50c44f06..00000000000
--- a/english/lts/security/2018/dla-1562.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various security issues were discovered in the poppler PDF rendering
-shared library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18267">CVE-2017-18267</a>
-
- <p>The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler
- through 0.64.0 allows remote attackers to cause a denial of service
- (infinite recursion) via a crafted PDF file, as demonstrated by
- pdftops.</p>
-
- <p>The applied fix in FoFiType1C::cvtGlyph prevents infinite recursion
- on such malformed documents.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10768">CVE-2018-10768</a>
-
- <p>A NULL pointer dereference in the AnnotPath::getCoordsLength function
- in Annot.h in Poppler 0.24.5 had been discovered. A crafted input
- will lead to a remote denial of service attack. Later versions of
- Poppler such as 0.41.0 are not affected.</p>
-
- <p>The applied patch fixes the crash on AnnotInk::draw for malformed
- documents.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13988">CVE-2018-13988</a>
-
- <p>Poppler through 0.62 contains an out of bounds read vulnerability due
- to an incorrect memory access that is not mapped in its memory space,
- as demonstrated by pdfunite. This can result in memory corruption and
- denial of service. This may be exploitable when a victim opens a
- specially crafted PDF file.</p>
-
- <p>The applied patch fixes crashes when Object has negative number.
- (Specs say, number has to be > 0 and gen >= 0).</p>
-
- <p>For Poppler in Debian jessie, the original upstream patch has been
- backported to Poppler's old Object API.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16646">CVE-2018-16646</a>
-
- <p>In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may
- cause infinite recursion via a crafted file. A remote attacker can
- leverage this for a DoS attack.</p>
-
- <p>A range of upstream patches has been applied to Poppler's XRef.cc in
- Debian jessie to consolidate a fix for this issue.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.26.5-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1562.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1563.data b/english/lts/security/2018/dla-1563.data
deleted file mode 100644
index f390e090101..00000000000
--- a/english/lts/security/2018/dla-1563.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1563-1 tzdata</define-tag>
-<define-tag report_date>2018-11-1</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1563.wml b/english/lts/security/2018/dla-1563.wml
deleted file mode 100644
index 2d05dc54281..00000000000
--- a/english/lts/security/2018/dla-1563.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>tzdata upstream released version 2018g.</p>
-
-<p>Notables changes since 2018e (previous version available in jessie)
-include:
-
-<ul>
-<li>Morocco switched to permanent +01 on 2018-10-27.</li>
-<li>Volgograd moved from +03 to +04 on 2018-10-28.</li>
-<li>Fiji ends DST 2019-01-13, not 2019-01-20.</li>
-<li>Most of Chile changes DST dates, effective 2019-04-06.</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2018g-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1563.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1564.data b/english/lts/security/2018/dla-1564.data
deleted file mode 100644
index d137cf7e42c..00000000000
--- a/english/lts/security/2018/dla-1564.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1564-1 mono</define-tag>
-<define-tag report_date>2018-11-1</define-tag>
-<define-tag secrefs>CVE-2009-0689</define-tag>
-<define-tag packages>mono</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1564.wml b/english/lts/security/2018/dla-1564.wml
deleted file mode 100644
index e446b617cdb..00000000000
--- a/english/lts/security/2018/dla-1564.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Mono’s string-to-double parser may crash, on
-specially crafted input. This could lead to arbitrary code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1002208">CVE-2018-1002208</a>
-
-<p>Mono embeds the sharplibzip library which is
-vulnerable to directory traversal, allowing attackers to write to
-arbitrary files via a ../ (dot dot slash) in a Zip archive entry that
-is mishandled during extraction. This vulnerability is also known as
-'Zip-Slip'.</p>
-
-<p>The Mono developers intend to entirely remove sharplibzip from the
-sources and do not plan to fix this issue. It is therefore recommended
-to fetch the latest sharplibzip version by using the nuget package
-manager instead. The embedded version should not be used with
-untrusted zip files.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.2.8+dfsg-10+deb8u1.</p>
-
-<p>We recommend that you upgrade your mono packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1564.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1565.data b/english/lts/security/2018/dla-1565.data
deleted file mode 100644
index 13ef1c240f8..00000000000
--- a/english/lts/security/2018/dla-1565.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1565-1 glusterfs</define-tag>
-<define-tag report_date>2018-11-5</define-tag>
-<define-tag secrefs>CVE-2018-14651 CVE-2018-14652 CVE-2018-14653 CVE-2018-14659 CVE-2018-14661</define-tag>
-<define-tag packages>glusterfs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1565.wml b/english/lts/security/2018/dla-1565.wml
deleted file mode 100644
index 21dc1a9f633..00000000000
--- a/english/lts/security/2018/dla-1565.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in GlusterFS, a
-clustered file system. Buffer overflows and path traversal issues may
-lead to information disclosure, denial-of-service or the execution of
-arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14651">CVE-2018-14651</a>
-
- <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-10927">CVE-2018-10927</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10928">CVE-2018-10928</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10929">CVE-2018-10929</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10930">CVE-2018-10930</a>, and
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-10926">CVE-2018-10926</a> was incomplete.
- A remote, authenticated attacker could use one of these flaws to
- execute arbitrary code, create arbitrary files, or cause denial of
- service on glusterfs server nodes via symlinks to relative paths.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14652">CVE-2018-14652</a>
-
- <p>The Gluster file system is vulnerable to a buffer overflow in the
- 'features/index' translator via the code handling the
- <q>GF_XATTR_CLRLK_CMD</q> xattr in the <q>pl_getxattr</q> function. A remote
- authenticated attacker could exploit this on a mounted volume to
- cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14653">CVE-2018-14653</a>
-
- <p>The Gluster file system is vulnerable to a heap-based buffer
- overflow in the <q>__server_getspec</q> function via the <q>gf_getspec_req</q>
- RPC message. A remote authenticated attacker could exploit this to
- cause a denial of service or other potential unspecified impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14659">CVE-2018-14659</a>
-
- <p>The Gluster file system is vulnerable to a denial of service attack
- via use of the <q>GF_XATTR_IOSTATS_DUMP_KEY</q> xattr. A remote,
- authenticated attacker could exploit this by mounting a Gluster
- volume and repeatedly calling 'setxattr(2)' to trigger a state dump
- and create an arbitrary number of files in the server's runtime
- directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14661">CVE-2018-14661</a>
-
- <p>It was found that usage of snprintf function in feature/locks
- translator of glusterfs server was vulnerable to a format string
- attack. A remote, authenticated attacker could use this flaw to
- cause remote denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.5.2-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your glusterfs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1565.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1566.data b/english/lts/security/2018/dla-1566.data
deleted file mode 100644
index 4465736e777..00000000000
--- a/english/lts/security/2018/dla-1566.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1566-1 mysql-5.5</define-tag>
-<define-tag report_date>2018-11-5</define-tag>
-<define-tag secrefs>CVE-2018-2767 CVE-2018-3058 CVE-2018-3063 CVE-2018-3066 CVE-2018-3070 CVE-2018-3081 CVE-2018-3133 CVE-2018-3174 CVE-2018-3282</define-tag>
-<define-tag packages>mysql-5.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1566.wml b/english/lts/security/2018/dla-1566.wml
deleted file mode 100644
index 42d186c75e6..00000000000
--- a/english/lts/security/2018/dla-1566.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been discovered in the MySQL database server. The
-vulnerabilities are addressed by upgrading MySQL to the new upstream
-version 5.5.62, which includes additional changes. Please see the MySQL
-5.5 Release Notes and Oracle's Critical Patch Update advisory for
-further details:</p>
-
-<ul>
- <li><url "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html"></li>
- <li><a href="https://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html">https://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html</a></li>
- <li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html">https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html</a></li>
- <li><a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html</a></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.5.62-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your mysql-5.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1566.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1567.data b/english/lts/security/2018/dla-1567.data
deleted file mode 100644
index 100f1d9e0e0..00000000000
--- a/english/lts/security/2018/dla-1567.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1567-1 gthumb</define-tag>
-<define-tag report_date>2018-11-5</define-tag>
-<define-tag secrefs>CVE-2018-18718 Bug##912290</define-tag>
-<define-tag packages>gthumb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1567.wml b/english/lts/security/2018/dla-1567.wml
deleted file mode 100644
index 0eb0d000879..00000000000
--- a/english/lts/security/2018/dla-1567.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18718">CVE-2018-18718</a> - CWE-415: Double Free
-<p>The product calls free() twice on the same memory address, potentially
-leading to modification of unexpected memory locations.</p>
-
-<p>There is a suspected double-free bug with
-static void add_themes_from_dir() dlg-contact-sheet.c. This method
-involves two successive calls of g_free(buffer) (line 354 and 373),
-and is likely to cause double-free of the buffer. One possible fix
-could be directly assigning the buffer to NULL after the first call
-of g_free(buffer). Thanks Tianjun Wu
-<a href="https://gitlab.gnome.org/GNOME/gthumb/issues/18">https://gitlab.gnome.org/GNOME/gthumb/issues/18</a></p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3:3.3.1-2.1+deb8u1</p>
-
-<p>We recommend that you upgrade your gthumb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1567.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1568.data b/english/lts/security/2018/dla-1568.data
deleted file mode 100644
index 50d641a3d2d..00000000000
--- a/english/lts/security/2018/dla-1568.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1568-1 curl</define-tag>
-<define-tag report_date>2018-11-6</define-tag>
-<define-tag secrefs>CVE-2016-7141 CVE-2016-7167 CVE-2016-9586 CVE-2018-16839 CVE-2018-16842 Bug#848958 Bug#837945 Bug#836918</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1568.wml b/english/lts/security/2018/dla-1568.wml
deleted file mode 100644
index c200b78c764..00000000000
--- a/english/lts/security/2018/dla-1568.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in cURL, an URL transfer
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7141">CVE-2016-7141</a>
-
- <p>When built with NSS and the libnsspem.so library is available at
- runtime, allows an remote attacker to hijack the authentication of a
- TLS connection by leveraging reuse of a previously loaded client
- certificate from file for a connection for which no certificate has
- been set, a different vulnerability than <a href="https://security-tracker.debian.org/tracker/CVE-2016-5420">CVE-2016-5420</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7167">CVE-2016-7167</a>
-
- <p>Multiple integer overflows in the (1) curl_escape, (2)
- curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape
- functions in libcurl allow attackers to have unspecified impact via
- a string of length 0xffffffff, which triggers a heap-based buffer
- overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9586">CVE-2016-9586</a>
-
- <p>Curl is vulnerable to a buffer overflow when doing a large floating
- point output in libcurl's implementation of the printf() functions.
- If there are any applications that accept a format string from the
- outside without necessary input filtering, it could allow remote
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16839">CVE-2018-16839</a>
-
- <p>Curl is vulnerable to a buffer overrun in the SASL authentication
- code that may lead to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16842">CVE-2018-16842</a>
-
- <p>Curl is vulnerable to a heap-based buffer over-read in the
- tool_msgs.c:voutf() function that may result in information exposure
- and denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.38.0-4+deb8u13.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1568.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1569-2.data b/english/lts/security/2018/dla-1569-2.data
deleted file mode 100644
index 411fad28f0b..00000000000
--- a/english/lts/security/2018/dla-1569-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1569-2 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2018-11-7</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1569-2.wml b/english/lts/security/2018/dla-1569-2.wml
deleted file mode 100644
index 7dd8a618cc7..00000000000
--- a/english/lts/security/2018/dla-1569-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous update of libdatetime-timezone-perl to tzdata version 2018g
-was incomplete due to a newly introduced rule type that this version of
-libdatetime-timezone-perl could not parse.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.75-2+2018g.1.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1569-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1569.data b/english/lts/security/2018/dla-1569.data
deleted file mode 100644
index 6598ec805a0..00000000000
--- a/english/lts/security/2018/dla-1569.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1569-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2018-11-7</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1569.wml b/english/lts/security/2018/dla-1569.wml
deleted file mode 100644
index f0398097152..00000000000
--- a/english/lts/security/2018/dla-1569.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018g for the
-Perl bindings. For the list of changes, see DLA-1363-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.75-2+2018g.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1569.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1570.data b/english/lts/security/2018/dla-1570.data
deleted file mode 100644
index 8f97edfedd1..00000000000
--- a/english/lts/security/2018/dla-1570.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1570-1 mariadb-10.0</define-tag>
-<define-tag report_date>2018-11-7</define-tag>
-<define-tag secrefs>CVE-2018-3143 CVE-2018-3156 CVE-2018-3174 CVE-2018-3251 CVE-2018-3282</define-tag>
-<define-tag packages>mariadb-10.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1570.wml b/english/lts/security/2018/dla-1570.wml
deleted file mode 100644
index 109b5b3372a..00000000000
--- a/english/lts/security/2018/dla-1570.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MariaDB database server. The
-vulnerabilities are addressed by upgrading MariaDB to the new upstream
-version 10.0.37. Please see the MariaDB 10.0 Release Notes for further
-details:</p>
-
-<p><url "https://mariadb.com/kb/en/mariadb/mariadb-10037-release-notes/"></p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-10.0.37-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1570.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1571.data b/english/lts/security/2018/dla-1571.data
deleted file mode 100644
index 1c3cd9f4a99..00000000000
--- a/english/lts/security/2018/dla-1571.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1571-1 firefox-esr</define-tag>
-<define-tag report_date>2018-11-7</define-tag>
-<define-tag secrefs>CVE-2018-12389 CVE-2018-12390 CVE-2018-12392 CVE-2018-12393 CVE-2018-12395 CVE-2018-12396 CVE-2018-12397</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1571.wml b/english/lts/security/2018/dla-1571.wml
deleted file mode 100644
index b89ab3c5adf..00000000000
--- a/english/lts/security/2018/dla-1571.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could result in the execution of arbitrary code,
-privilege escalation or information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.3.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1571.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1572.data b/english/lts/security/2018/dla-1572.data
deleted file mode 100644
index a8261767fe0..00000000000
--- a/english/lts/security/2018/dla-1572.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1572-1 nginx</define-tag>
-<define-tag report_date>2018-11-8</define-tag>
-<define-tag secrefs>CVE-2018-16845 Bug##913090</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1572.wml b/english/lts/security/2018/dla-1572.wml
deleted file mode 100644
index 730ed9c5962..00000000000
--- a/english/lts/security/2018/dla-1572.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service (DoS) vulnerability
-in the nginx web/proxy server.</p>
-
-<p>As there was no validation for the size of a 64-bit atom in an MP4 file,
-this could have led to a CPU hog when the size was 0, or various other
-problems due to integer underflow when the calculating atom data size,
-including segmentation faults or even worker-process memory disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in nginx version
-1.6.2-5+deb8u6.</p>
-
-<p>We recommend that you upgrade your nginx packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1572.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1573.data b/english/lts/security/2018/dla-1573.data
deleted file mode 100644
index dcb0d6d4df6..00000000000
--- a/english/lts/security/2018/dla-1573.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1573-1 firmware-nonfree</define-tag>
-<define-tag report_date>2018-11-13</define-tag>
-<define-tag secrefs>CVE-2016-0801 CVE-2017-0561 CVE-2017-9417 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-1308 Bug#620066 Bug#724970 Bug#769633 Bug#774914 Bug#790061 Bug#793544 Bug#793874 Bug#795303</define-tag>
-<define-tag packages>firmware-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1573.wml b/english/lts/security/2018/dla-1573.wml
deleted file mode 100644
index a22cae1f609..00000000000
--- a/english/lts/security/2018/dla-1573.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the firmware for
-Broadcom BCM43xx wifi chips that may lead to a privilege escalation
-or loss of confidentiality.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0801">CVE-2016-0801</a>
-
- <p>Broadgate Team discovered flaws in packet processing in the
- Broadcom wifi firmware and proprietary drivers that could lead to
- remote code execution. However, this vulnerability is not
- believed to affect the drivers used in Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0561">CVE-2017-0561</a>
-
- <p>Gal Beniamini of Project Zero discovered a flaw in the TDLS
- implementation in Broadcom wifi firmware. This could be exploited
- by an attacker on the same WPA2 network to execute code on the
- wifi microcontroller.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9417">CVE-2017-9417</a> /
- #869639
-
- <p>Nitay Artenstein of Exodus Intelligence discovered a flaw in the
- WMM implementation in Broadcom wifi firmware. This could be
- exploited by a nearby attacker to execute code on the wifi
- microcontroller.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13077">CVE-2017-13077</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-13078">CVE-2017-13078</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-13079">CVE-2017-13079</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-13080">CVE-2017-13080</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-13081">CVE-2017-13081</a>
-
- <p>Mathy Vanhoef of the imec-DistriNet research group of KU Leuven
- discovered multiple vulnerabilities in the WPA protocol used for
- authentication in wireless networks, dubbed <q>KRACK</q>.</p>
-
- <p>An attacker exploiting the vulnerabilities could force the
- vulnerable system to reuse cryptographic session keys, enabling a
- range of cryptographic attacks against the ciphers used in WPA1
- and WPA2.</p>
-
- <p>These vulnerabilities are only being fixed for certain Broadcom
- wifi chips, and might still be present in firmware for other wifi
- hardware.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-20161130-4~deb8u1. This version also adds new firmware and packages
-for use with Linux 4.9, and re-adds firmware-{adi,ralink} as
-transitional packages.</p>
-
-<p>We recommend that you upgrade your firmware-nonfree packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1573.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1574.data b/english/lts/security/2018/dla-1574.data
deleted file mode 100644
index 841e769d61e..00000000000
--- a/english/lts/security/2018/dla-1574.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1574-1 imagemagick</define-tag>
-<define-tag report_date>2018-11-12</define-tag>
-<define-tag secrefs>CVE-2018-18025</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1574.wml b/english/lts/security/2018/dla-1574.wml
deleted file mode 100644
index d34113ecbb4..00000000000
--- a/english/lts/security/2018/dla-1574.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18025">CVE-2018-18025</a>
- <p>Fix for heap-based buffer over-read which can result in a denial of
- service via a crafted file.</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-8:6.8.9.9-5+deb8u15.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1574.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1575.data b/english/lts/security/2018/dla-1575.data
deleted file mode 100644
index 6c8a50f9bb9..00000000000
--- a/english/lts/security/2018/dla-1575.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1575-1 thunderbird</define-tag>
-<define-tag report_date>2018-11-12</define-tag>
-<define-tag secrefs>CVE-2017-16541 CVE-2018-5156 CVE-2018-5187 CVE-2018-12361 CVE-2018-12367 CVE-2018-12371 CVE-2018-12376 CVE-2018-12377 CVE-2018-12378 CVE-2018-12379 CVE-2018-12383 CVE-2018-12385 CVE-2018-12389 CVE-2018-12390 CVE-2018-12392 CVE-2018-12393</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1575.wml b/english/lts/security/2018/dla-1575.wml
deleted file mode 100644
index 747bcfef34a..00000000000
--- a/english/lts/security/2018/dla-1575.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird: Multiple memory
-safety errors and use-after-frees may lead to the execution of arbitrary
-code or denial of service.</p>
-
-<p>Debian follows the Thunderbird upstream releases. Support for the 52.x
-series has ended, so starting with this update we're now following the
-60.x releases.</p>
-
-<p>Between 52.x and 60.x, Thunderbird has undergone significant internal
-updates, which makes it incompatible with a number of extensions. For
-more information please refer to
-<a href="https://support.mozilla.org/en-US/kb/new-thunderbird-60">https://support.mozilla.org/en-US/kb/new-thunderbird-60</a></p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.3.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1575.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1576.data b/english/lts/security/2018/dla-1576.data
deleted file mode 100644
index 0ea3d3362fc..00000000000
--- a/english/lts/security/2018/dla-1576.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1576-1 ansible</define-tag>
-<define-tag report_date>2018-11-12</define-tag>
-<define-tag secrefs>CVE-2018-16837 Bug##912297</define-tag>
-<define-tag packages>ansible</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1576.wml b/english/lts/security/2018/dla-1576.wml
deleted file mode 100644
index e6534453889..00000000000
--- a/english/lts/security/2018/dla-1576.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a potential SSH passphrase disclosure
-vulnerability in the ansible configuration management system,</p>
-
-<p>The <q>User</q> module leaked data that was passed as a parameter to the
-ssh-keygen(1) utility, thus revealing any credentials in cleartext form
-in the global process list.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in ansible version
-1.7.2+dfsg-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ansible packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1576.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1577.data b/english/lts/security/2018/dla-1577.data
deleted file mode 100644
index bcf476d27a2..00000000000
--- a/english/lts/security/2018/dla-1577.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1577-1 xen</define-tag>
-<define-tag report_date>2018-11-12</define-tag>
-<define-tag secrefs>CVE-2018-7540 CVE-2018-7541 CVE-2018-8897 CVE-2018-12891 CVE-2018-12893 CVE-2018-15469 CVE-2018-15470</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1577.wml b/english/lts/security/2018/dla-1577.wml
deleted file mode 100644
index 1be5be86d91..00000000000
--- a/english/lts/security/2018/dla-1577.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, informations leaks or privilege
-escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.4.4lts4-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1577.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1578.data b/english/lts/security/2018/dla-1578.data
deleted file mode 100644
index eb73ae03505..00000000000
--- a/english/lts/security/2018/dla-1578.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1578-1 spamassassin</define-tag>
-<define-tag report_date>2018-11-13</define-tag>
-<define-tag secrefs>CVE-2016-1238 CVE-2017-15705 CVE-2018-11780 CVE-2018-11781 Bug#784023 Bug#865924 Bug#883775 Bug#889501 Bug#891041 Bug#908969 Bug#908970 Bug#908971 Bug#91</define-tag>
-<define-tag packages>spamassassin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1578.wml b/english/lts/security/2018/dla-1578.wml
deleted file mode 100644
index a55ddf25e47..00000000000
--- a/english/lts/security/2018/dla-1578.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in Spamassassin, which could lead
-to Remote Code Execution and Denial of Service attacks under certain
-circumstances.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1238">CVE-2016-1238</a>
-
- <p>Many Perl programs do not properly remove . (period) characters
- from the end of the includes directory array, which might allow
- local users to gain privileges via a Trojan horse module under the
- current working directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15705">CVE-2017-15705</a>
-
- <p>A denial of service vulnerability was identified that exists in
- Apache SpamAssassin before 3.4.2. The vulnerability arises with
- certain unclosed tags in emails that cause markup to be handled
- incorrectly leading to scan timeouts. This can cause carefully
- crafted emails that might take more scan time than expected
- leading to a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11780">CVE-2018-11780</a>
-
- <p>A potential Remote Code Execution bug exists with the PDFInfo
- plugin in Apache SpamAssassin before 3.4.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11781">CVE-2018-11781</a>
-
- <p>Apache SpamAssassin 3.4.2 fixes a local user code injection in the
- meta rule syntax.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.2-0+deb8u1. Upstream strongly advocates upgrading to the latest
-upstream version so we are following that recommendation and
-backported the version published as part of the 9.6 stretch release,
-which also fixes many critical bugs.</p>
-
-<p>We recommend that you upgrade your spamassassin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1578.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1579.data b/english/lts/security/2018/dla-1579.data
deleted file mode 100644
index 47423c238ee..00000000000
--- a/english/lts/security/2018/dla-1579.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1579-1 openjpeg2</define-tag>
-<define-tag report_date>2018-11-20</define-tag>
-<define-tag secrefs>CVE-2017-17480 CVE-2018-18088</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1579.wml b/english/lts/security/2018/dla-1579.wml
deleted file mode 100644
index 41fa9cffeff..00000000000
--- a/english/lts/security/2018/dla-1579.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in openjpeg2, the
-open-source JPEG 2000 codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17480">CVE-2017-17480</a>
-
- <p>Write stack buffer overflow due to missing buffer length formatter in
- fscanf call (jp3d and jpwl codecs). This vulnerability might be
- leveraged by remote attackers using crafted jp3d and jpwl files to
- cause denial of service or possibly remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18088">CVE-2018-18088</a>
-
- <p>Null pointer dereference caused by null image components in imagetopnm.
- This vulnerability might be leveraged by remote attackers using crafted
- BMP files to cause denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.0-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1579.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1580.data b/english/lts/security/2018/dla-1580.data
deleted file mode 100644
index 95c66fd1add..00000000000
--- a/english/lts/security/2018/dla-1580.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1580-1 systemd</define-tag>
-<define-tag report_date>2018-11-19</define-tag>
-<define-tag secrefs>CVE-2018-1049 CVE-2018-15686 CVE-2018-15688 Bug#912005 Bug#912008</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1580.wml b/english/lts/security/2018/dla-1580.wml
deleted file mode 100644
index b9b91c14ccd..00000000000
--- a/english/lts/security/2018/dla-1580.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>systemd was found to suffer from multiple security vulnerabilities
-ranging from denial of service attacks to possible root privilege
-escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1049">CVE-2018-1049</a>
-
- <p>A race condition exists between .mount and .automount units such
- that automount requests from kernel may not be serviced by systemd
- resulting in kernel holding the mountpoint and any processes that
- try to use said mount will hang. A race condition like this may
- lead to denial of service, until mount points are unmounted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15686">CVE-2018-15686</a>
-
- <p>A vulnerability in unit_deserialize of systemd allows an attacker
- to supply arbitrary state across systemd re-execution via
- NotifyAccess. This can be used to improperly influence systemd
- execution and possibly lead to root privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15688">CVE-2018-15688</a>
-
- <p>A buffer overflow vulnerability in the dhcp6 client of systemd
- allows a malicious dhcp6 server to overwrite heap memory in
- systemd-networkd, which is not enabled by default in Debian.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-215-17+deb8u8.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1580.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1581.data b/english/lts/security/2018/dla-1581.data
deleted file mode 100644
index 2b1edad90c4..00000000000
--- a/english/lts/security/2018/dla-1581.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1581-1 uriparser</define-tag>
-<define-tag report_date>2018-11-20</define-tag>
-<define-tag secrefs>CVE-2018-19198 CVE-2018-19199 CVE-2018-19200</define-tag>
-<define-tag packages>uriparser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1581.wml b/english/lts/security/2018/dla-1581.wml
deleted file mode 100644
index c3c52f3566c..00000000000
--- a/english/lts/security/2018/dla-1581.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in uriparser, an Uniform Resource
-Identifiers (URIs) parsing library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19198">CVE-2018-19198</a>
-
- <p>UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or
- uriComposeQueryEx* function because the '&amp;' character is mishandled in
- certain contexts.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19199">CVE-2018-19199</a>
-
- <p>UriQuery.c allows an integer overflow via a uriComposeQuery* or
- uriComposeQueryEx* function because of an unchecked multiplication.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19200">CVE-2018-19200</a>
-
- <p>UriCommon.c allows attempted operations on NULL input via a uriResetUri*
- function.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.8.0.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your uriparser packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1581.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1582.data b/english/lts/security/2018/dla-1582.data
deleted file mode 100644
index 96080a514fe..00000000000
--- a/english/lts/security/2018/dla-1582.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1582-1 liblivemedia</define-tag>
-<define-tag report_date>2018-11-20</define-tag>
-<define-tag secrefs>CVE-2018-4013</define-tag>
-<define-tag packages>liblivemedia</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1582.wml b/english/lts/security/2018/dla-1582.wml
deleted file mode 100644
index 600ce7d496c..00000000000
--- a/english/lts/security/2018/dla-1582.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A stack based buffer overflow vulnerability was found in liblivemedia, the
-LIVE555 RTSP server library. This issue might be leveraged by remote
-attackers to cause code execution, by sending a crafted packet.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2014.01.13-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your liblivemedia packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1582.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1583.data b/english/lts/security/2018/dla-1583.data
deleted file mode 100644
index 6c266b3d411..00000000000
--- a/english/lts/security/2018/dla-1583.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1583-1 jasper</define-tag>
-<define-tag report_date>2018-11-21</define-tag>
-<define-tag secrefs>CVE-2015-5203 CVE-2015-5221 CVE-2016-8690 CVE-2017-13748 CVE-2017-14132</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1583.wml b/english/lts/security/2018/dla-1583.wml
deleted file mode 100644
index d68b61be300..00000000000
--- a/english/lts/security/2018/dla-1583.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in the JasPer
-JPEG-2000 library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5203">CVE-2015-5203</a>
-
- <p>Gustavo Grieco discovered an integer overflow vulnerability that
- allows remote attackers to cause a denial of service or may have
- other unspecified impact via a crafted JPEG 2000 image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5221">CVE-2015-5221</a>
-
- <p>Josselin Feist found a double-free vulnerability that allows remote
- attackers to cause a denial-of-service (application crash) by
- processing a malformed image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8690">CVE-2016-8690</a>
-
- <p>Gustavo Grieco discovered a NULL pointer dereference vulnerability
- that can cause a denial-of-service via a crafted BMP image file. The
- update also includes the fixes for the related issues <a href="https://security-tracker.debian.org/tracker/CVE-2016-8884">CVE-2016-8884</a>
- and <a href="https://security-tracker.debian.org/tracker/CVE-2016-8885">CVE-2016-8885</a> which complete the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2016-8690">CVE-2016-8690</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13748">CVE-2017-13748</a>
-
- <p>It was discovered that jasper does not properly release memory used
- to store image tile data when image decoding fails which may lead to
- a denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14132">CVE-2017-14132</a>
-
- <p>A heap-based buffer over-read was found related to the
- jas_image_ishomosamp function that could be triggered via a crafted
- image file and may cause a denial-of-service (application crash) or
- have other unspecified impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.900.1-debian1-2.4+deb8u4.</p>
-
-<p>We recommend that you upgrade your jasper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1583.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1584.data b/english/lts/security/2018/dla-1584.data
deleted file mode 100644
index aec11cc91f6..00000000000
--- a/english/lts/security/2018/dla-1584.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1584-1 ruby-i18n</define-tag>
-<define-tag report_date>2018-11-21</define-tag>
-<define-tag secrefs>CVE-2014-10077 Bug##913093</define-tag>
-<define-tag packages>ruby-i18n</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1584.wml b/english/lts/security/2018/dla-1584.wml
deleted file mode 100644
index fe59797ea8b..00000000000
--- a/english/lts/security/2018/dla-1584.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a remote denial-of-service vulnerability
-in ruby-i18n, a I18n and localization solution for Ruby.</p>
-
-<p>An application crash could be engineering a situation where `:some_key` is
-present in the `keep_keys` structure but not present in the hash.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in ruby-i18n version
-0.6.9-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-i18n packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1584.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1585.data b/english/lts/security/2018/dla-1585.data
deleted file mode 100644
index 89644a0dfa3..00000000000
--- a/english/lts/security/2018/dla-1585.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1585-1 ruby-rack</define-tag>
-<define-tag report_date>2018-11-21</define-tag>
-<define-tag secrefs>CVE-2018-16471 Bug##913005</define-tag>
-<define-tag packages>ruby-rack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1585.wml b/english/lts/security/2018/dla-1585.wml
deleted file mode 100644
index 12eb84e3ebc..00000000000
--- a/english/lts/security/2018/dla-1585.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an XSS vulnerability in the ruby-rack
-web-server library.</p>
-
-<p>A malicious request could impact the HTTP/HTTPS scheme being returned
-to the underlying application.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in ruby-rack version
-1.5.2-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your ruby-rack packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1585.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1586.data b/english/lts/security/2018/dla-1586.data
deleted file mode 100644
index f817f1e2cdf..00000000000
--- a/english/lts/security/2018/dla-1586.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1586-1 openssl</define-tag>
-<define-tag report_date>2018-11-21</define-tag>
-<define-tag secrefs>CVE-2018-0735 CVE-2018-5407</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1586.wml b/english/lts/security/2018/dla-1586.wml
deleted file mode 100644
index f024bb09628..00000000000
--- a/english/lts/security/2018/dla-1586.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-0735">CVE-2018-0735</a>
-
- <p>Samuel Weiser reported a timing vulnerability in the OpenSSL ECDSA
- signature generation, which might leak information to recover the
- private key.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5407">CVE-2018-5407</a>
-
- <p>Alejandro Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar
- Pereida Garcia and Nicola Tuveri reported a vulnerability to a
- timing side channel attack, which might be used to recover the
- private key.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.1t-1+deb8u10.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1586.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1587.data b/english/lts/security/2018/dla-1587.data
deleted file mode 100644
index 2ebcbdf6d6f..00000000000
--- a/english/lts/security/2018/dla-1587.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1587-1 pixman</define-tag>
-<define-tag report_date>2018-11-22</define-tag>
-<define-tag secrefs>CVE-2015-5297</define-tag>
-<define-tag packages>pixman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1587.wml b/english/lts/security/2018/dla-1587.wml
deleted file mode 100644
index 62c745d26a2..00000000000
--- a/english/lts/security/2018/dla-1587.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5297">CVE-2015-5297</a>
- <p>Numerical overflow in pointer arithmetic.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.32.6-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your pixman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1587.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1588.data b/english/lts/security/2018/dla-1588.data
deleted file mode 100644
index 1d847b13d45..00000000000
--- a/english/lts/security/2018/dla-1588.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1588-1 icecast2</define-tag>
-<define-tag report_date>2018-11-26</define-tag>
-<define-tag secrefs>CVE-2018-18820 Bug#912611</define-tag>
-<define-tag packages>icecast2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1588.wml b/english/lts/security/2018/dla-1588.wml
deleted file mode 100644
index 452ffabc8a9..00000000000
--- a/english/lts/security/2018/dla-1588.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A buffer overflow was discovered in the URL-authentication backend of
-the icecast2, the popular open source streaming media server. If the
-backend is enabled, then any malicious HTTP client can send a request
-for specific resource including a crafted header which can overwrite
-the server's stack contents, leading to denial of service and
-potentially remote code execution.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.4.0-1.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your icecast2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1588.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1589.data b/english/lts/security/2018/dla-1589.data
deleted file mode 100644
index 9013ff74fcc..00000000000
--- a/english/lts/security/2018/dla-1589.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1589-1 icecast2</define-tag>
-<define-tag report_date>2018-11-26</define-tag>
-<define-tag secrefs>CVE-2018-19115 Bug#914393</define-tag>
-<define-tag packages>icecast2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1589.wml b/english/lts/security/2018/dla-1589.wml
deleted file mode 100644
index 3993e7bedf6..00000000000
--- a/english/lts/security/2018/dla-1589.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>keepalived has a heap-based buffer overflow when parsing HTTP status
-codes resulting in DoS or possibly unspecified other impact, because
-extract_status_code in lib/html.c has no validation of the status code
-and instead writes an unlimited amount of data to the heap.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.2.13-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your keepalived packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1589.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1590.data b/english/lts/security/2018/dla-1590.data
deleted file mode 100644
index 681a2d862ef..00000000000
--- a/english/lts/security/2018/dla-1590.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1590-1 openjdk-7</define-tag>
-<define-tag report_date>2018-11-22</define-tag>
-<define-tag secrefs>CVE-2018-2952 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3214</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1590.wml b/english/lts/security/2018/dla-1590.wml
deleted file mode 100644
index 2761d402dc7..00000000000
--- a/english/lts/security/2018/dla-1590.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in denial of
-service, sandbox bypass, incomplete TLS identity verification,
-information disclosure or the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7u181-2.6.14-2~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1590.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1591-2.data b/english/lts/security/2018/dla-1591-2.data
deleted file mode 100644
index b0839b9cea3..00000000000
--- a/english/lts/security/2018/dla-1591-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1591-2 libphp-phpmailer</define-tag>
-<define-tag report_date>2018-12-28</define-tag>
-<define-tag secrefs>CVE-2018-19296</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1591-2.wml b/english/lts/security/2018/dla-1591-2.wml
deleted file mode 100644
index ade1687e219..00000000000
--- a/english/lts/security/2018/dla-1591-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A possible regression was found in the recent security update for
-libphp-phpmailer, announced as DLA 1591-1. During backporting a new
-variable have accidentally introduced to a conditional statement from
-a much later version. Thanks to Salvatore Bonaccorso (carnil) for
-reporting this.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.2.9+dfsg-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1591-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1591.data b/english/lts/security/2018/dla-1591.data
deleted file mode 100644
index 0c8e8d5cbc7..00000000000
--- a/english/lts/security/2018/dla-1591.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1591-1 libphp-phpmailer</define-tag>
-<define-tag report_date>2018-11-23</define-tag>
-<define-tag secrefs>CVE-2017-5223 CVE-2018-19296</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1591.wml b/english/lts/security/2018/dla-1591.wml
deleted file mode 100644
index aa90fc6a833..00000000000
--- a/english/lts/security/2018/dla-1591.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two vulnerabilities libphp-phpmailer, an
-email library for the PHP programming language:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5223">CVE-2017-5223</a>
- <p>Local file disclosure vulnerability via relative path HTML
- transformations.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19296">CVE-2018-19296</a>
- <p>Object injection attack.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in libphp-phpmailer version
-5.2.9+dfsg-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1591.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1592.data b/english/lts/security/2018/dla-1592.data
deleted file mode 100644
index c8892009767..00000000000
--- a/english/lts/security/2018/dla-1592.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1592-1 otrs2</define-tag>
-<define-tag report_date>2018-11-23</define-tag>
-<define-tag secrefs>CVE-2018-19141 CVE-2018-19143</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1592.wml b/english/lts/security/2018/dla-1592.wml
deleted file mode 100644
index 45bcc933051..00000000000
--- a/english/lts/security/2018/dla-1592.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in OTRS, a Ticket Request
-System, that may lead to privilege escalation or arbitrary file write.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19141">CVE-2018-19141</a>
-
- <p>An attacker who is logged into OTRS as an admin user may manipulate
- the URL to cause execution of JavaScript in the context of OTRS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19143">CVE-2018-19143</a>
-
- <p>An attacker who is logged into OTRS as a user may manipulate the
- submission form to cause deletion of arbitrary files that the OTRS
- web server user has write access to.</p></li>
-
-</ul>
-
-<p>Please also read the upstream advisory for <a href="https://security-tracker.debian.org/tracker/CVE-2018-19141">CVE-2018-19141</a>.
-If you think you might be affected then you should consider to run the
-mentioned clean-up SQL statements to remove possible affected records.</p>
-
-<p><url "https://community.otrs.com/security-advisory-2018-09-security-update-for-otrs-framework/"></p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.18-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1592.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1593.data b/english/lts/security/2018/dla-1593.data
deleted file mode 100644
index 1c6ad4a608f..00000000000
--- a/english/lts/security/2018/dla-1593.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1593-1 phpbb3</define-tag>
-<define-tag report_date>2018-11-24</define-tag>
-<define-tag secrefs>CVE-2018-19274</define-tag>
-<define-tag packages>phpbb3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1593.wml b/english/lts/security/2018/dla-1593.wml
deleted file mode 100644
index 49d27a1a8df..00000000000
--- a/english/lts/security/2018/dla-1593.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Simon Scannell and Robin Peraglie of RIPS Technologies discovered that
-passing an absolute path to a file_exists check in phpBB, a full
-featured web forum, allows remote code execution through Object
-Injection by employing Phar deserialization when an attacker has access
-to the Admin Control Panel with founder permissions.</p>
-
-<p>The fix for this issue resulted in the removal of setting the
-ImageMagick path. The GD image library can be used as a replacement
-and a new event to generate thumbnails was added, so it is possible to
-write an extension that uses a different image library to generate
-thumbnails.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.0.12-5+deb8u2.</p>
-
-<p>We recommend that you upgrade your phpbb3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1593.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1594.data b/english/lts/security/2018/dla-1594.data
deleted file mode 100644
index 88fcc31b46e..00000000000
--- a/english/lts/security/2018/dla-1594.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1594-1 xml-security-c</define-tag>
-<define-tag report_date>2018-11-24</define-tag>
-<define-tag packages>xml-security-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1594.wml b/english/lts/security/2018/dla-1594.wml
deleted file mode 100644
index 23a84259116..00000000000
--- a/english/lts/security/2018/dla-1594.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability in xml-security-c, a library for the XML Digital Security
-specification, has been found. Different KeyInfo combinations, like
-signatures without public key, result in incomplete DSA structures that
-crash openssl during verification.</p>
-
-<p>This vulnerability does not have a CVE identifier yet.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.7.2-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your xml-security-c packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1594.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1595.data b/english/lts/security/2018/dla-1595.data
deleted file mode 100644
index d6373d92292..00000000000
--- a/english/lts/security/2018/dla-1595.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1595-1 gnuplot5</define-tag>
-<define-tag report_date>2018-11-25</define-tag>
-<define-tag secrefs>CVE-2018-19490 CVE-2018-19491 CVE-2018-19492</define-tag>
-<define-tag packages>gnuplot5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1595.wml b/english/lts/security/2018/dla-1595.wml
deleted file mode 100644
index 066e6015f05..00000000000
--- a/english/lts/security/2018/dla-1595.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>gnuplot5, a command-line driven interactive plotting program, has been
-examined with fuzzing by Tim Blazytko, Cornelius Aschermann, Sergej
-Schumilo and Nils Bars.
-They found various overflow cases which might lead to the execution of
-arbitrary code.</p>
-
-<p>Due to special toolchain hardening in Debian, <a href="https://security-tracker.debian.org/tracker/CVE-2018-19492">CVE-2018-19492</a> is not
-security relevant, but it is a bug and the patch was applied for the sake
-of completeness. Probably some downstream project does not have the same
-toolchain settings.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.0.0~rc+dfsg2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your gnuplot5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1595.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1596.data b/english/lts/security/2018/dla-1596.data
deleted file mode 100644
index 80c1589c077..00000000000
--- a/english/lts/security/2018/dla-1596.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1596-1 squid3</define-tag>
-<define-tag report_date>2018-11-26</define-tag>
-<define-tag secrefs>CVE-2018-19132 Bug#912294</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1596.wml b/english/lts/security/2018/dla-1596.wml
deleted file mode 100644
index 8016e4bdb5c..00000000000
--- a/english/lts/security/2018/dla-1596.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there can be a denial of service (DoS)
-vulnerability in squid3 due to a memory leak in SNMP query rejection
-code when SNMP is enabled. In environments where per-process memory
-restrictions are not enforced strictly, a remote attacker to consume
-all memory available to the Squid process, causing it to crash.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.4.8-6+deb8u6.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1596.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1597.data b/english/lts/security/2018/dla-1597.data
deleted file mode 100644
index 7a00395c62d..00000000000
--- a/english/lts/security/2018/dla-1597.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1597-1 gnuplot</define-tag>
-<define-tag report_date>2018-11-26</define-tag>
-<define-tag secrefs>CVE-2018-19490 CVE-2018-19491 CVE-2018-19492</define-tag>
-<define-tag packages>gnuplot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1597.wml b/english/lts/security/2018/dla-1597.wml
deleted file mode 100644
index 261ebe304ad..00000000000
--- a/english/lts/security/2018/dla-1597.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>gnuplot, a command-line driven interactive plotting program, has been
-examined with fuzzing by Tim Blazytko, Cornelius Aschermann, Sergej
-Schumilo and Nils Bars.
-They found various overflow cases which might lead to the execution of
-arbitrary code.</p>
-
-<p>Due to special toolchain hardening in Debian, <a href="https://security-tracker.debian.org/tracker/CVE-2018-19492">CVE-2018-19492</a> is not
-security relevant, but it is a bug and the patch was applied for the sake
-of completeness. Probably some downstream project does not have the same
-toolchain settings.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.6.6-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your gnuplot packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1597.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1598.data b/english/lts/security/2018/dla-1598.data
deleted file mode 100644
index e3baadb6b42..00000000000
--- a/english/lts/security/2018/dla-1598.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1598-1 ghostscript</define-tag>
-<define-tag report_date>2018-11-28</define-tag>
-<define-tag secrefs>CVE-2018-19409 CVE-2018-19475 CVE-2018-19476 CVE-2018-19477</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1598.wml b/english/lts/security/2018/dla-1598.wml
deleted file mode 100644
index 9cfe402602a..00000000000
--- a/english/lts/security/2018/dla-1598.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in Ghostscript, an
-interpreter for the PostScript language, which could result in denial of
-service, the creation of files or the execution of arbitrary code if a
-malformed Postscript file is processed (despite the dSAFER sandbox being
-enabled).</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.06~dfsg-2+deb8u12.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1598.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1599.data b/english/lts/security/2018/dla-1599.data
deleted file mode 100644
index c6035e227a9..00000000000
--- a/english/lts/security/2018/dla-1599.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1599-1 qemu</define-tag>
-<define-tag report_date>2018-11-30</define-tag>
-<define-tag secrefs>CVE-2016-2391 CVE-2016-2392 CVE-2016-2538 CVE-2016-2841 CVE-2016-2857 CVE-2016-2858 CVE-2016-4001 CVE-2016-4002 CVE-2016-4020 CVE-2016-4037 CVE-2016-4439 CVE-2016-4441 CVE-2016-4453 CVE-2016-4454 CVE-2016-4952 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-6351 CVE-2016-6834 CVE-2016-6836 CVE-2016-6888 CVE-2016-7116 CVE-2016-7155 CVE-2016-7156 CVE-2016-7161 CVE-2016-7170 CVE-2016-7421 CVE-2016-7908 CVE-2016-7909 CVE-2016-8577 CVE-2016-8578 CVE-2016-8909 CVE-2016-8910 CVE-2016-9101 CVE-2016-9102 CVE-2016-9103 CVE-2016-9104 CVE-2016-9105 CVE-2016-9106 CVE-2017-10664 CVE-2018-10839 CVE-2018-17962 CVE-2018-17963 Bug#815008 Bug#815009 Bug#815680 Bug#817181 Bug#817182 Bug#817183 Bug#821038 Bug#821061</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1599.wml b/english/lts/security/2018/dla-1599.wml
deleted file mode 100644
index 8de7e668159..00000000000
--- a/english/lts/security/2018/dla-1599.wml
+++ /dev/null
@@ -1,192 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were found in QEMU, a fast processor emulator:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2391">CVE-2016-2391</a>
-
- <p>Zuozhi Fzz discovered that eof_times in USB OHCI emulation support
- could be used to cause a denial of service, via a null pointer
- dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2392">CVE-2016-2392</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-2538">CVE-2016-2538</a>
-
- <p>Qinghao Tang found a NULL pointer dereference and multiple integer
- overflows in the USB Net device support that could allow local guest
- OS administrators to cause a denial of service. These issues related
- to remote NDIS control message handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2841">CVE-2016-2841</a>
-
- <p>Yang Hongke reported an infinite loop vulnerability in the NE2000 NIC
- emulation support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2857">CVE-2016-2857</a>
-
- <p>Liu Ling found a flaw in QEMU IP checksum routines. Attackers could
- take advantage of this issue to cause QEMU to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2858">CVE-2016-2858</a>
-
- <p>Arbitrary stack based allocation in the Pseudo Random Number Generator
- (PRNG) back-end support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4001">CVE-2016-4001</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4002">CVE-2016-4002</a>
-
- <p>Oleksandr Bazhaniuk reported buffer overflows in the Stellaris and the
- MIPSnet ethernet controllers emulation. Remote malicious users could
- use these issues to cause QEMU to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4020">CVE-2016-4020</a>
-
- <p>Donghai Zdh reported that QEMU incorrectly handled the access to the
- Task Priority Register (TPR), allowing local guest OS administrators
- to obtain sensitive information from host stack memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4037">CVE-2016-4037</a>
-
- <p>Du Shaobo found an infinite loop vulnerability in the USB EHCI
- emulation support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4439">CVE-2016-4439</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4441">CVE-2016-4441</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5238">CVE-2016-5238</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5338">CVE-2016-5338</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-6351">CVE-2016-6351</a>
-
- <p>Li Qiang found different issues in the QEMU 53C9X Fast SCSI Controller
- (FSC) emulation support, that made it possible for local guest OS
- privileged users to cause denials of service or potentially execute
- arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4453">CVE-2016-4453</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-4454">CVE-2016-4454</a>
-
- <p>Li Qiang reported issues in the QEMU VMWare VGA module handling, that
- may be used to cause QEMU to crash, or to obtain host sensitive
- information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4952">CVE-2016-4952</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-7421">CVE-2016-7421</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-7156">CVE-2016-7156</a>
-
- <p>Li Qiang reported flaws in the VMware paravirtual SCSI bus emulation
- support. These issues concern an out-of-bounds access and infinite
- loops, that allowed local guest OS privileged users to cause a denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5105">CVE-2016-5105</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5106">CVE-2016-5106</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5107">CVE-2016-5107</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-5337">CVE-2016-5337</a>
-
- <p>Li Qiang discovered several issues in the MegaRAID SAS 8708EM2 Host
- Bus Adapter emulation support. These issues include stack information
- leakage while reading configuration and out-of-bounds write and read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6834">CVE-2016-6834</a>
-
- <p>Li Qiang reported an infinite loop vulnerability during packet
- fragmentation in the network transport abstraction layer support.
- Local guest OS privileged users could made use of this flaw to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6836">CVE-2016-6836</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-6888">CVE-2016-6888</a>
-
- <p>Li Qiang found issues in the VMWare VMXNET3 network card emulation
- support, relating to information leak and integer overflow in packet
- initialisation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7116">CVE-2016-7116</a>
-
- <p>Felix Wilhel discovered a directory traversal flaw in the Plan 9 File
- System (9pfs), exploitable by local guest OS privileged users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7155">CVE-2016-7155</a>
-
- <p>Tom Victor and Li Qiang reported an out-of-bounds read and an infinite
- loop in the VMware paravirtual SCSI bus emulation support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7161">CVE-2016-7161</a>
-
- <p>Hu Chaojian reported a heap overflow in the xlnx.xps-ethernetlite
- emulation support. Privileged users in local guest OS could made use
- of this to cause QEMU to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7170">CVE-2016-7170</a>
-
- <p>Qinghao Tang and Li Qiang reported a flaw in the QEMU VMWare VGA
- module, that could be used by privileged user in local guest OS to
- cause QEMU to crash via an out-of-bounds stack memory access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7908">CVE-2016-7908</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-7909">CVE-2016-7909</a>
-
- <p>Li Qiang reported infinite loop vulnerabilities in the ColdFire Fast
- Ethernet Controller and the AMD PC-Net II (Am79C970A) emulations.
- These flaws allowed local guest OS administrators to cause a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8909">CVE-2016-8909</a>
-
- <p>Huawei PSIRT found an infinite loop vulnerability in the Intel HDA
- emulation support, relating to DMA buffer stream processing.
- Privileged users in local guest OS could made use of this to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8910">CVE-2016-8910</a>
-
- <p>Andrew Henderson reported an infinite loop in the RTL8139 ethernet
- controller emulation support. Privileged users inside a local guest OS
- could made use of this to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9101">CVE-2016-9101</a>
-
- <p>Li Qiang reported a memory leakage in the i8255x (PRO100) ethernet
- controller emulation support.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9102">CVE-2016-9102</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9103">CVE-2016-9103</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9104">CVE-2016-9104</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9105">CVE-2016-9105</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-9106">CVE-2016-9106</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8577">CVE-2016-8577</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2016-8578">CVE-2016-8578</a>
-
- <p>Li Qiang reported various Plan 9 File System (9pfs) security issues,
- including host memory leakage and denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10664">CVE-2017-10664</a>
-
- <p>Denial of service in the qemu-nbd (QEMU Disk Network Block Device)
- Server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10839">CVE-2018-10839</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-17962">CVE-2018-17962</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-17963">CVE-2018-17963</a>
-
- <p>Daniel Shapira reported several integer overflows in the packet
- handling in ethernet controllers emulated by QEMU. These issues could
- lead to denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u8.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1599.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1600.data b/english/lts/security/2018/dla-1600.data
deleted file mode 100644
index 05ccfc108eb..00000000000
--- a/english/lts/security/2018/dla-1600.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1600-1 libarchive</define-tag>
-<define-tag report_date>2018-11-29</define-tag>
-<define-tag secrefs>CVE-2015-8915 CVE-2016-8687 CVE-2016-8688 CVE-2016-8689 CVE-2016-10209 CVE-2016-10349 CVE-2016-10350 CVE-2017-5601 CVE-2017-14166 CVE-2017-14501 CVE-2017-14502 CVE-2017-14503 Bug#853278 Bug#875960 Bug#875974 Bug#875966 Bug#874539 Bug#840934</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1600.wml b/english/lts/security/2018/dla-1600.wml
deleted file mode 100644
index 20398d3a512..00000000000
--- a/english/lts/security/2018/dla-1600.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were found in libarchive, a
-multi-format archive and compression library. Heap-based buffer
-over-reads, NULL pointer dereferences and out-of-bounds reads allow
-remote attackers to cause a denial-of-service (application crash) via
-specially crafted archive files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.1.2-11+deb8u4.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1600.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1601.data b/english/lts/security/2018/dla-1601.data
deleted file mode 100644
index 80233ade6ba..00000000000
--- a/english/lts/security/2018/dla-1601.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1601-1 perl</define-tag>
-<define-tag report_date>2018-11-30</define-tag>
-<define-tag secrefs>CVE-2018-18311</define-tag>
-<define-tag packages>perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1601.wml b/english/lts/security/2018/dla-1601.wml
deleted file mode 100644
index ae368d42203..00000000000
--- a/english/lts/security/2018/dla-1601.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jayakrishna Menon and Christophe Hauser discovered an integer
-overflow vulnerability in Perl_my_setenv leading to a heap-based
-buffer overflow with attacker-controlled input.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.20.2-3+deb8u12.</p>
-
-<p>We recommend that you upgrade your perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1601.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1602.data b/english/lts/security/2018/dla-1602.data
deleted file mode 100644
index 10fd71f1930..00000000000
--- a/english/lts/security/2018/dla-1602.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1602-1 nsis</define-tag>
-<define-tag report_date>2018-11-30</define-tag>
-<define-tag secrefs>CVE-2015-9267 CVE-2015-9268</define-tag>
-<define-tag packages>nsis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1602.wml b/english/lts/security/2018/dla-1602.wml
deleted file mode 100644
index 0a4990a5037..00000000000
--- a/english/lts/security/2018/dla-1602.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Among others, Andre Heinicke from gpg4win.org found several issues of
-nsis, a tool for creating quick and user friendly installers for
-Microsoft Windows operating systems.</p>
-
-<p>The issues are fixed by:</p>
-
-<ul>
- <li>using SetDefaultDllDirectories() to restrict implicitly loaded and
- dynamically loaded modules to trusted directories</li>
- <li>creating temporary directories in a way that only elevated users can
- write into it</li>
- <li>not implicitly linking against Version.dll but using wrapper
- functions</li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.46-10+deb8u1.</p>
-
-<p>We recommend that you upgrade your nsis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1602.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1603.data b/english/lts/security/2018/dla-1603.data
deleted file mode 100644
index 8d45c8c8b12..00000000000
--- a/english/lts/security/2018/dla-1603.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1603-1 suricata</define-tag>
-<define-tag report_date>2018-12-4</define-tag>
-<define-tag secrefs>CVE-2017-7177 CVE-2017-15377 CVE-2018-6794 Bug#856648 Bug#889842 Bug#856649</define-tag>
-<define-tag packages>suricata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1603.wml b/english/lts/security/2018/dla-1603.wml
deleted file mode 100644
index a3c29efe76f..00000000000
--- a/english/lts/security/2018/dla-1603.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in suricata, an intrusion detection and
-prevention tool.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7177">CVE-2017-7177</a>
-
- <p>Suricata has an IPv4 defragmentation evasion issue caused by lack
- of a check for the IP protocol during fragment matching.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15377">CVE-2017-15377</a>
-
- <p>It was possible to trigger lots of redundant checks on the content
- of crafted network traffic with a certain signature, because of
- DetectEngineContentInspection in detect-engine-content-inspection.c.
- The search engine doesn't stop when it should after no match is
- found; instead, it stops only upon reaching inspection-recursion limit (3000 by default).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6794">CVE-2018-6794</a>
-
- <p>Suricata is prone to an HTTP detection bypass vulnerability in
- detect.c and stream-tcp.c. If a malicious server breaks a normal
- TCP flow and sends data before the 3-way handshake is complete,
- then the data sent by the malicious server will be accepted by web
- clients such as a web browser or Linux CLI utilities, but ignored
- by Suricata IDS signatures. This mostly affects IDS signatures for
- the HTTP protocol and TCP stream content; signatures for TCP packets
- will inspect such network traffic as usual.</p>
-
-<p>TEMP-0856648-2BC2C9 (no CVE assigned yet)</p>
-
- <p>Out of bounds read in app-layer-dns-common.c.
- On a zero size A or AAAA record, 4 or 16 bytes would still be read.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.0.7-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your suricata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1603.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1604.data b/english/lts/security/2018/dla-1604.data
deleted file mode 100644
index bf9ba25d3ee..00000000000
--- a/english/lts/security/2018/dla-1604.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1604-1 lxml</define-tag>
-<define-tag report_date>2018-12-10</define-tag>
-<define-tag secrefs>CVE-2018-19787</define-tag>
-<define-tag packages>lxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1604.wml b/english/lts/security/2018/dla-1604.wml
deleted file mode 100644
index a02c57cf3cb..00000000000
--- a/english/lts/security/2018/dla-1604.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a XSS injection vulnerability in
-the LXML HTML/XSS manipulation library for Python.</p>
-
-<p>LXML did not remove "javascript:" URLs that used escaping such as
-<q>j a v a s c r i p t</q>. This is a similar issue to <a href="https://security-tracker.debian.org/tracker/CVE-2014-3146">CVE-2014-3146</a>.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in lxml version
-3.4.0-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your lxml packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1604.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1605.data b/english/lts/security/2018/dla-1605.data
deleted file mode 100644
index f198e047df8..00000000000
--- a/english/lts/security/2018/dla-1605.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1605-1 firefox-esr</define-tag>
-<define-tag report_date>2018-12-13</define-tag>
-<define-tag secrefs>CVE-2018-12405 CVE-2018-17466 CVE-2018-18492 CVE-2018-18493 CVE-2018-18494 CVE-2018-18498</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1605.wml b/english/lts/security/2018/dla-1605.wml
deleted file mode 100644
index 7e062fb3d4d..00000000000
--- a/english/lts/security/2018/dla-1605.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or bypass of the same-origin policy.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.4.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1605.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1606.data b/english/lts/security/2018/dla-1606.data
deleted file mode 100644
index c81d88f4b91..00000000000
--- a/english/lts/security/2018/dla-1606.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1606-1 gcc-4.9</define-tag>
-<define-tag report_date>2018-12-14</define-tag>
-<define-tag secrefs>Bug#727621</define-tag>
-<define-tag packages>gcc-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1606.wml b/english/lts/security/2018/dla-1606.wml
deleted file mode 100644
index dd0aec9ae99..00000000000
--- a/english/lts/security/2018/dla-1606.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes libstdc++ std::future support on armel, which is
-necessary to get firefox-esr and thunderbird updates built on that
-architecture.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.9.2-10+deb8u2.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1606.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1607.data b/english/lts/security/2018/dla-1607.data
deleted file mode 100644
index 8a9cb073efb..00000000000
--- a/english/lts/security/2018/dla-1607.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1607-1 samba</define-tag>
-<define-tag report_date>2018-12-15</define-tag>
-<define-tag secrefs>CVE-2018-14629 CVE-2018-16851</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1607.wml b/english/lts/security/2018/dla-1607.wml
deleted file mode 100644
index 2069082ac59..00000000000
--- a/english/lts/security/2018/dla-1607.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
-print, and login server for Unix. The Common Vulnerabilities and
-Exposures project identifies the following issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14629">CVE-2018-14629</a>
-
- <p>Florian Stuelpner discovered that Samba is vulnerable to
- infinite query recursion caused by CNAME loops, resulting in
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16851">CVE-2018-16851</a>
-
- <p>Garming Sam of the Samba Team and Catalyst discovered a NULL pointer
- dereference vulnerability in the Samba AD DC LDAP server allowing a
- user able to read more than 256MB of LDAP entries to crash the Samba
- AD DC's LDAP server.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:4.2.14+dfsg-0+deb8u11.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1607.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1608.data b/english/lts/security/2018/dla-1608.data
deleted file mode 100644
index ef69626ab8a..00000000000
--- a/english/lts/security/2018/dla-1608.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1608-1 php5</define-tag>
-<define-tag report_date>2018-12-17</define-tag>
-<define-tag secrefs>CVE-2018-19518 CVE-2018-19935</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1608.wml b/english/lts/security/2018/dla-1608.wml
deleted file mode 100644
index 8d67929be4e..00000000000
--- a/english/lts/security/2018/dla-1608.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Vulnerabilities have been discovered in php5, a server-side,
-HTML-embedded scripting language. Note that this update includes a
-change to the default behavior for IMAP connections. See below for
-details.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19518">CVE-2018-19518</a>
-
- <p>An argument injection vulnerability in imap_open() may allow a
- remote attacker to execute arbitrary OS commands on the IMAP server.</p>
-
- <p>The fix for the <a href="https://security-tracker.debian.org/tracker/CVE-2018-19518">CVE-2018-19518</a> vulnerability included this
- additional note from the upstream developers:</p>
-
- <p>Starting with 5.6.38, rsh/ssh logins are disabled by default. Use
- imap.enable_insecure_rsh if you want to enable them. Note that the
- IMAP library does not filter mailbox names before passing them to
- rsh/ssh command, thus passing untrusted data to this function with
- rsh/ssh enabled is insecure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19935">CVE-2018-19935</a>
-
- <p>A NULL pointer dereference leads to an application crash and a
- denial of service via an empty string in the message argument to the
- imap_mail function of ext/imap/php_imap.c.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.39+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1608.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1609.data b/english/lts/security/2018/dla-1609.data
deleted file mode 100644
index 0c308edc770..00000000000
--- a/english/lts/security/2018/dla-1609.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1609-1 libapache-mod-jk</define-tag>
-<define-tag report_date>2018-12-17</define-tag>
-<define-tag secrefs>CVE-2018-11759</define-tag>
-<define-tag packages>libapache-mod-jk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1609.wml b/english/lts/security/2018/dla-1609.wml
deleted file mode 100644
index bd4b21bae19..00000000000
--- a/english/lts/security/2018/dla-1609.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in libapache-mod-jk, the Apache 2
-connector for the Tomcat Java servlet engine.</p>
-
-<p>The libapache-mod-jk connector is susceptible to information disclosure
-and privilege escalation because of a mishandling of URL normalization.</p>
-
-<p>The nature of the fix required that libapache-mod-jk in Debian 8
-<q>Jessie</q> be updated to the latest upstream release. For reference, the
-upstream changes associated with each release version are documented
-here:</p>
-
-<p><url "http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html"></p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.46-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your libapache-mod-jk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1609.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1610.data b/english/lts/security/2018/dla-1610.data
deleted file mode 100644
index 9a58e267fad..00000000000
--- a/english/lts/security/2018/dla-1610.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1610-1 sleuthkit</define-tag>
-<define-tag report_date>2018-12-17</define-tag>
-<define-tag secrefs>CVE-2018-19497 Bug#914796</define-tag>
-<define-tag packages>sleuthkit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1610.wml b/english/lts/security/2018/dla-1610.wml
deleted file mode 100644
index 325ed1b3dfe..00000000000
--- a/english/lts/security/2018/dla-1610.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Sleuth Kit (TSK) through version 4.6.4 is
-affected by a buffer over-read vulnerability. The tsk_getu16 call in
-hfs_dir_open_meta_cb (tsk/fs/hfs_dent.c) does not properly check
-boundaries. This vulnerability might be leveraged by remote attackers
-using crafted filesystem images to cause denial of service or any other
-unspecified behavior.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.1.3-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your sleuthkit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1610.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1611-2.data b/english/lts/security/2018/dla-1611-2.data
deleted file mode 100644
index 22a577502f0..00000000000
--- a/english/lts/security/2018/dla-1611-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1611-2 libav</define-tag>
-<define-tag report_date>2018-12-21</define-tag>
-<define-tag secrefs>CVE-2015-6822 CVE-2015-6823 CVE-2015-6824</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1611-2.wml b/english/lts/security/2018/dla-1611-2.wml
deleted file mode 100644
index f142ffe7b26..00000000000
--- a/english/lts/security/2018/dla-1611-2.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two more security issues have been corrected in the libav multimedia library. This is a follow-up announcement for DLA-1611-1.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6823">CVE-2015-6823</a>
-
- <p>The allocate_buffers function in libavcodec/alac.c did not initialize
- certain context data, which allowed remote attackers to cause a
- denial of service (segmentation violation) or possibly have
- unspecified other impact via crafted Apple Lossless Audio Codec
- (ALAC) data. This issues has now been addressed by clearing pointers
- in avcodec/alac.c's allocate_buffers().</p>
-
- <p>Other than stated in debian/changelog of upload 6:11.12-1~deb8u2,
- this issue only now got fixed with upload of 6:11.12-1~deb8u3.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6824">CVE-2015-6824</a>
-
- <p>The sws_init_context function in libswscale/utils.c did not
- initialize certain pixbuf data structures, which allowed remote
- attackers to cause a denial of service (segmentation violation) or
- possibly have unspecified other impact via crafted video data. In
- swscale/utils.c now these pix buffers get cleared which fixes use of
- uninitialized memory.</p>
-
- <p>Other than stated in debian/changelog of upload 6:11.12-1~deb8u2,
- this issue only now got fixed with upload of 6:11.12-1~deb8u3.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u3.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1611-2.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1611.data b/english/lts/security/2018/dla-1611.data
deleted file mode 100644
index 7c9169454f1..00000000000
--- a/english/lts/security/2018/dla-1611.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1611-1 libav</define-tag>
-<define-tag report_date>2018-12-20</define-tag>
-<define-tag secrefs>CVE-2014-9317 CVE-2015-6761 CVE-2015-6818 CVE-2015-6820 CVE-2015-6821 CVE-2015-6822 CVE-2015-6825 CVE-2015-6826 CVE-2015-8216 CVE-2015-8217 CVE-2015-8363 CVE-2015-8364 CVE-2015-8661 CVE-2015-8662 CVE-2015-8663 CVE-2016-10190 CVE-2016-10191</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1611.wml b/english/lts/security/2018/dla-1611.wml
deleted file mode 100644
index 3c98f1bd4f6..00000000000
--- a/english/lts/security/2018/dla-1611.wml
+++ /dev/null
@@ -1,191 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues have been corrected in multiple demuxers and
-decoders of the libav multimedia library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9317">CVE-2014-9317</a>
-
- <p>The decode_ihdr_chunk function in libavcodec/pngdec.c allowed remote
- attackers to cause a denial of service (out-of-bounds heap access)
- and possibly had other unspecified impact via an IDAT before an IHDR
- in a PNG file. The issue got addressed by checking IHDR/IDAT order.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6761">CVE-2015-6761</a>
-
- <p>The update_dimensions function in libavcodec/vp8.c in libav relies on
- a coefficient-partition count during multi-threaded operation, which
- allowed remote attackers to cause a denial of service (race condition
- and memory corruption) or possibly have unspecified other impact via
- a crafted WebM file. This issue has been resolved by using
- num_coeff_partitions in thread/buffer setup. The variable is not a
- constant and can lead to race conditions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6818">CVE-2015-6818</a>
-
- <p>The decode_ihdr_chunk function in libavcodec/pngdec.c did not enforce
- uniqueness of the IHDR (aka image header) chunk in a PNG image, which
- allowed remote attackers to cause a denial of service (out-of-bounds
- array access) or possibly have unspecified other impact via a crafted
- image with two or more of these chunks. This has now been fixed by
- only allowing one IHDR chunk. Multiple IHDR chunks are forbidden in
- PNG.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6820">CVE-2015-6820</a>
-
- <p>The ff_sbr_apply function in libavcodec/aacsbr.c did not check for a
- matching AAC frame syntax element before proceeding with Spectral
- Band Replication calculations, which allowed remote attackers to
- cause a denial of service (out-of-bounds array access) or possibly
- have unspecified other impact via crafted AAC data. This has now been
- fixed by checking that the element type matches before applying SBR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6821">CVE-2015-6821</a>
-
- <p>The ff_mpv_common_init function in libavcodec/mpegvideo.c did not
- properly maintain the encoding context, which allowed remote
- attackers to cause a denial of service (invalid pointer access) or
- possibly have unspecified other impact via crafted MPEG data. The
- issue has been resolved by clearing pointers in ff_mpv_common_init().
- This ensures that no stale pointers leak through on any path.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6822">CVE-2015-6822</a>
-
- <p>The destroy_buffers function in libavcodec/sanm.c did not properly
- maintain height and width values in the video context, which allowed
- remote attackers to cause a denial of service (segmentation violation
- and application crash) or possibly have unspecified other impact via
- crafted LucasArts Smush video data. The solution to this was to reset
- sizes in destroy_buffers() in avcodec/sanm.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6823">CVE-2015-6823</a>
-
- <p>Other than stated in the debian/changelog file, this issue
- has not yet been fixed for libav in Debian jessie LTS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6824">CVE-2015-6824</a>
-
- <p>Other than stated in the debian/changelog file, this issue
- has not yet been fixed for libav in Debian jessie LTS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6825">CVE-2015-6825</a>
-
- <p>The ff_frame_thread_init function in libavcodec/pthread_frame.c
- mishandled certain memory-allocation failures, which allowed remote
- attackers to cause a denial of service (invalid pointer access) or
- possibly have unspecified other impact via a crafted file, as
- demonstrated by an AVI file. Clearing priv_data in
- avcodec/pthread_frame.c has resolved this and now avoids stale
- pointer in error case.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6826">CVE-2015-6826</a>
-
- <p>The ff_rv34_decode_init_thread_copy function in libavcodec/rv34.c did
- not initialize certain structure members, which allowed remote
- attackers to cause a denial of service (invalid pointer access) or
- possibly have unspecified other impact via crafted (1) RV30 or (2)
- RV40 RealVideo data. This issue got addressed by clearing pointers in
- ff_rv34_decode_init_thread_copy() in avcodec/rv34.c, which avoids
- leaving stale pointers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8216">CVE-2015-8216</a>
-
- <p>The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg
- omitted certain width and height checks, which allowed remote
- attackers to cause a denial of service (out-of-bounds array access)
- or possibly have unspecified other impact via crafted MJPEG data. The
- issues have been fixed by adding a check for index to
- avcodec/mjpegdec.c in ljpeg_decode_yuv_scan() before using it, which
- fixes an out of array access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8217">CVE-2015-8217</a>
-
- <p>The ff_hevc_parse_sps function in libavcodec/hevc_ps.c did not
- validate the Chroma Format Indicator, which allowed remote attackers
- to cause a denial of service (out-of-bounds array access) or possibly
- have unspecified other impact via crafted High Efficiency Video
- Coding (HEVC) data. A check of chroma_format_idc in avcodec/hevc_ps.c
- has now been added to fix this out of array access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8363">CVE-2015-8363</a>
-
- <p>The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c
- did not enforce uniqueness of the SIZ marker in a JPEG 2000 image,
- which allowed remote attackers to cause a denial of service
- (out-of-bounds heap-memory access) or possibly have unspecified other
- impact via a crafted image with two or more of these markers. In
- avcodec/jpeg2000dec.c a check for duplicate SIZ marker has been added
- to fix this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8364">CVE-2015-8364</a>
-
- <p>Integer overflow in the ff_ivi_init_planes function in
- libavcodec/ivi.c allowed remote attackers to cause a denial of
- service (out-of-bounds heap-memory access) or possibly have
- unspecified other impact via crafted image dimensions in Indeo Video
- Interactive data. A check of image dimensions has been added to the
- code (in avcodec/ivi.c) that fixes this integer overflow now.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8661">CVE-2015-8661</a>
-
- <p>The h264_slice_header_init function in libavcodec/h264_slice.c did
- not validate the relationship between the number of threads and the
- number of slices, which allowed remote attackers to cause a denial of
- service (out-of-bounds array access) or possibly have unspecified
- other impact via crafted H.264 data. In avcodec/h264_slice.c now
- max_contexts gets limited when slice_context_count is initialized.
- This avoids an out of array access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8662">CVE-2015-8662</a>
-
- <p>The ff_dwt_decode function in libavcodec/jpeg2000dwt.c did not
- validate the number of decomposition levels before proceeding with
- Discrete Wavelet Transform decoding, which allowed remote attackers
- to cause a denial of service (out-of-bounds array access) or possibly
- have unspecified other impact via crafted JPEG 2000 data. In
- avcodec/jpeg2000dwt.c a check of ndeclevels has been added before
- calling dwt_decode*(). This fixes an out of array access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8663">CVE-2015-8663</a>
-
- <p>The ff_get_buffer function in libavcodec/utils.c preserved width and
- height values after a failure, which allowed remote attackers to
- cause a denial of service (out-of-bounds array access) or possibly
- have unspecified other impact via a crafted .mov file. Now,
- dimensions get cleared in ff_get_buffer() on failure, which fixes
- the cause for an out of array access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10190">CVE-2016-10190</a>
-
- <p>A heap-based buffer overflow in libavformat/http.c allowed remote web
- servers to execute arbitrary code via a negative chunk size in an
- HTTP response. In libavformat/http.c the length/offset-related
- variables have been made unsigned. This fix required inclusion of
- two other changes ported from ffmpeg upstream Git (commits 3668701f
- and 362c17e6).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10191">CVE-2016-10191</a>
-
- <p>Another heap-based buffer overflow in libavformat/rtmppkt.c allowed
- remote attackers to execute arbitrary code by leveraging failure to
- check for RTMP packet size mismatches. By checking for packet size
- mismatched, this out of array access has been resolved.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u2.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1611.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1612.data b/english/lts/security/2018/dla-1612.data
deleted file mode 100644
index 676706124ca..00000000000
--- a/english/lts/security/2018/dla-1612.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1612-1 libarchive</define-tag>
-<define-tag report_date>2018-12-21</define-tag>
-<define-tag secrefs>CVE-2018-1000877 CVE-2018-1000878 Bug#916964 Bug#916963</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1612.wml b/english/lts/security/2018/dla-1612.wml
deleted file mode 100644
index ac89a8aee5b..00000000000
--- a/english/lts/security/2018/dla-1612.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Daniel Axtens discovered a double-free and use-after-free vulnerability
-in libarchive's RAR decoder that can result in a denial-of-service
-(application crash) or may have other unspecified impact when a
-malformed RAR archive is processed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.1.2-11+deb8u6.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1612.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1613.data b/english/lts/security/2018/dla-1613.data
deleted file mode 100644
index a64ad7d6c0b..00000000000
--- a/english/lts/security/2018/dla-1613.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1613-1 sqlite3</define-tag>
-<define-tag report_date>2018-12-22</define-tag>
-<define-tag secrefs>CVE-2018-20346</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1613.wml b/english/lts/security/2018/dla-1613.wml
deleted file mode 100644
index 75357bd00c9..00000000000
--- a/english/lts/security/2018/dla-1613.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Security experts at Tencent’s Blade security team have discovered a
-critical vulnerability in SQLite database software (nicknamed <q>Magellan</q>).</p>
-
-<p>The <q>Magellan</q> remote code execution vulnerability has now been fixed by
-adding extra defenses against strategically corrupt databases to fts3/4.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.8.7.1-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1613.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1614.data b/english/lts/security/2018/dla-1614.data
deleted file mode 100644
index 0885b88d100..00000000000
--- a/english/lts/security/2018/dla-1614.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1614-1 openjpeg2</define-tag>
-<define-tag report_date>2018-12-22</define-tag>
-<define-tag secrefs>CVE-2018-6616 CVE-2018-14423 Bug#904873 Bug#889683</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1614.wml b/english/lts/security/2018/dla-1614.wml
deleted file mode 100644
index 7461e5e1c32..00000000000
--- a/english/lts/security/2018/dla-1614.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in openjpeg2, the
-open-source JPEG 2000 codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6616">CVE-2018-6616</a>
-
- <p>Excessive iteration in the opj_t1_encode_cblks function (openjp2/t1.c).
- Remote attackers could leverage this vulnerability to cause a denial
- of service via a crafted bmp file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14423">CVE-2018-14423</a>
-
- <p>Division-by-zero vulnerabilities in the functions pi_next_pcrl,
- pi_next_cprl, and pi_next_rpcl in (lib/openjp3d/pi.c). Remote attackers
- could leverage this vulnerability to cause a denial of service
- (application crash).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.0-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1614.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1615.data b/english/lts/security/2018/dla-1615.data
deleted file mode 100644
index 623fa0dfe44..00000000000
--- a/english/lts/security/2018/dla-1615.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1615-1 nagios3</define-tag>
-<define-tag report_date>2018-12-24</define-tag>
-<define-tag secrefs>CVE-2013-7108 CVE-2013-7205 CVE-2014-1878 CVE-2016-9566 CVE-2018-18245 Bug#771466 Bug#823721 Bug#917138</define-tag>
-<define-tag packages>nagios3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1615.wml b/english/lts/security/2018/dla-1615.wml
deleted file mode 100644
index 1111b609cf9..00000000000
--- a/english/lts/security/2018/dla-1615.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were corrected in nagios3, a monitoring and management
-system for hosts, services and networks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18245">CVE-2018-18245</a>
-
- <p>Maximilian Boehner of usd AG found a cross-site scripting (XSS)
- vulnerability in Nagios Core. This vulnerability allows attackers
- to place malicious JavaScript code into the web frontend through
- manipulation of plugin output. In order to do this the attacker
- needs to be able to manipulate the output returned by nagios
- checks, e.g. by replacing a plugin on one of the monitored
- endpoints. Execution of the payload then requires that an
- authenticated user creates an alert summary report which contains
- the corresponding output.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9566">CVE-2016-9566</a>
-
- <p>It was discovered that local users with access to an account in
- the nagios group are able to gain root privileges via a symlink
- attack on the debug log file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-1878">CVE-2014-1878</a>
-
- <p>An issue was corrected that allowed remote attackers to cause a
- stack-based buffer overflow and subsequently a denial of service
- (segmentation fault) via a long message to cmd.cgi.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7205">CVE-2013-7205</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2013-7108">CVE-2013-7108</a>
-
- <p>A flaw was corrected in Nagios that could be exploited to cause a
- denial-of-service. This vulnerability is induced due to an
- off-by-one error within the process_cgivars() function, which can
- be exploited to cause an out-of-bounds read by sending a
- specially-crafted key value to the Nagios web UI.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.5.1.dfsg-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your nagios3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1615.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1616.data b/english/lts/security/2018/dla-1616.data
deleted file mode 100644
index 2a76c840812..00000000000
--- a/english/lts/security/2018/dla-1616.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1616-1 libextractor</define-tag>
-<define-tag report_date>2018-12-24</define-tag>
-<define-tag secrefs>CVE-2018-20430 CVE-2018-20431 Bug#917214 Bug#917213</define-tag>
-<define-tag packages>libextractor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1616.wml b/english/lts/security/2018/dla-1616.wml
deleted file mode 100644
index 4fe29d6fa2b..00000000000
--- a/english/lts/security/2018/dla-1616.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were discovered in libextractor, a library for
-extracting meta data from files of arbitrary type. An out-of-bounds
-read in common/convert.c and a NULL Pointer Dereference in the OLE2
-extractor may lead to a denial-of-service (application crash).</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.3-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your libextractor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1616.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1617.data b/english/lts/security/2018/dla-1617.data
deleted file mode 100644
index 5b6b3c1dd93..00000000000
--- a/english/lts/security/2018/dla-1617.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1617-1 libvncserver</define-tag>
-<define-tag report_date>2018-12-27</define-tag>
-<define-tag secrefs>CVE-2018-6307 CVE-2018-15127 CVE-2018-20019 CVE-2018-20020 CVE-2018-20021 CVE-2018-20022 CVE-2018-20023 CVE-2018-20024 Bug#916941</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1617.wml b/english/lts/security/2018/dla-1617.wml
deleted file mode 100644
index 39a33be65d6..00000000000
--- a/english/lts/security/2018/dla-1617.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Kaspersky Lab discovered several vulnerabilities in libvncserver, a C
-library to implement VNC server/client functionalities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6307">CVE-2018-6307</a>
-
- <p>a heap use-after-free vulnerability in the server code of the file
- transfer extension, which can result in remote code execution. This
- attack appears to be exploitable via network connectivity.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15127">CVE-2018-15127</a>
-
- <p>contains a heap out-of-bound write vulnerability in the server code
- of the file transfer extension, which can result in remote code
- execution. This attack appears to be exploitable via network
- connectivity.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20019">CVE-2018-20019</a>
-
- <p>multiple heap out-of-bound write vulnerabilities in VNC client code,
- which can result in remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20020">CVE-2018-20020</a>
-
- <p>heap out-of-bound write vulnerability in a structure in VNC client
- code, which can result in remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20021">CVE-2018-20021</a>
-
- <p>CWE-835: Infinite Loop vulnerability in VNC client code. The
- vulnerability could allow an attacker to consume an excessive amount
- of resources, such as CPU and RAM.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20022">CVE-2018-20022</a>
-
- <p>CWE-665: Improper Initialization weaknesses in VNC client code,
- which could allow an attacker to read stack memory and can be abused
- for information disclosure. Combined with another vulnerability, it
- can be used to leak stack memory layout and bypass ASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20023">CVE-2018-20023</a>
-
- <p>Improper Initialization vulnerability in VNC Repeater client code,
- which could allow an attacker to read stack memory and can be abused
- for information disclosure. Combined with another vulnerability, it
- can be used to leak stack memory layout and bypass ASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20024">CVE-2018-20024</a>
-
- <p>a null pointer dereference in VNC client code, which can result in
- DoS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.9.9+dfsg2-6.1+deb8u4.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1617.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1618.data b/english/lts/security/2018/dla-1618.data
deleted file mode 100644
index 8ebaac12742..00000000000
--- a/english/lts/security/2018/dla-1618.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1618-1 libsndfile</define-tag>
-<define-tag report_date>2018-12-26</define-tag>
-<define-tag secrefs>CVE-2017-8361 CVE-2017-8362 CVE-2017-8363 CVE-2017-8365 CVE-2017-14245 CVE-2017-14246 CVE-2017-14634 CVE-2017-17456 CVE-2017-17457 CVE-2018-13139 CVE-2018-19432 CVE-2018-19661 CVE-2018-19662</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1618.wml b/english/lts/security/2018/dla-1618.wml
deleted file mode 100644
index 3948d274635..00000000000
--- a/english/lts/security/2018/dla-1618.wml
+++ /dev/null
@@ -1,87 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in libsndfile, the library for
-reading and writing files containing sampled sound.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8361">CVE-2017-8361</a>
-
- <p>The flac_buffer_copy function (flac.c) is affected by a buffer
- overflow. This vulnerability might be leveraged by remote attackers to
- cause a denial of service, or possibly have unspecified other impact
- via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8362">CVE-2017-8362</a>
-
- <p>The flac_buffer_copy function (flac.c) is affected by an out-of-bounds
- read vulnerability. This flaw might be leveraged by remote attackers to
- cause a denial of service via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8363">CVE-2017-8363</a>
-
- <p>The flac_buffer_copy function (flac.c) is affected by a heap based OOB
- read vulnerability. This flaw might be leveraged by remote attackers to
- cause a denial of service via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8365">CVE-2017-8365</a>
-
- <p>The i2les_array function (pcm.c) is affected by a global buffer
- overflow. This vulnerability might be leveraged by remote attackers to
- cause a denial of service, or possibly have unspecified other impact
- via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14245">CVE-2017-14245</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-14246">CVE-2017-14246</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-17456">CVE-2017-17456</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2017-17457">CVE-2017-17457</a>
-
- <p>The d2alaw_array() and d2ulaw_array() functions (src/ulaw.c and
- src/alaw.c) are affected by an out-of-bounds read vulnerability. This
- flaw might be leveraged by remote attackers to cause denial of service
- or information disclosure via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14634">CVE-2017-14634</a>
-
- <p>The double64_init() function (double64.c) is affected by a
- divide-by-zero error. This vulnerability might be leveraged by remote
- attackers to cause denial of service via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13139">CVE-2018-13139</a>
-
- <p>The psf_memset function (common.c) is affected by a stack-based buffer
- overflow. This vulnerability might be leveraged by remote attackers to
- cause a denial of service, or possibly have unspecified other impact
- via a crafted audio file. The vulnerability can be triggered by the
- executable sndfile-deinterleave.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19432">CVE-2018-19432</a>
-
- <p>The sf_write_int function (src/sndfile.c) is affected by an
- out-of-bounds read vulnerability. This flaw might be leveraged by
- remote attackers to cause a denial of service via a crafted audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19661">CVE-2018-19661</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-19662">CVE-2018-19662</a>
-
- <p>The i2alaw_array() and i2ulaw_array() functions (src/ulaw.c and
- src/alaw.c) are affected by an out-of-bounds read vulnerability. This
- flaw might be leveraged by remote attackers to cause denial of service
- or information disclosure via a crafted audio file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.25-9.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1618.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1619.data b/english/lts/security/2018/dla-1619.data
deleted file mode 100644
index b55824bbbed..00000000000
--- a/english/lts/security/2018/dla-1619.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1619-1 graphicsmagick</define-tag>
-<define-tag report_date>2018-12-27</define-tag>
-<define-tag secrefs>CVE-2018-20184 CVE-2018-20185 CVE-2018-20189 Bug#916752 Bug#916719 Bug#916721</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1619.wml b/english/lts/security/2018/dla-1619.wml
deleted file mode 100644
index 6e49a4e7384..00000000000
--- a/english/lts/security/2018/dla-1619.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in GraphicsMagick, the image
-processing system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20184">CVE-2018-20184</a>
-
- <p>The WriteTGAImage function (tga.c) is affected by a heap-based buffer
- overflow. Remote attackers might leverage this vulnerability to cause
- a denial of service via a crafted image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20185">CVE-2018-20185</a>
-
- <p>The ReadBMPImage function (bmp.c) is affected by a heap-based buffer
- over-read. Remote attackers might leverage this vulnerability to cause
- a denial of service via a crafted image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20189">CVE-2018-20189</a>
-
- <p>The ReadDIBImage function (coders/dib.c) is affected by an assertion
- error. Remote attackers might leverage this vulnerability to cause
- a denial of service via a crafted image file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.20-3+deb8u5.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1619.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1620.data b/english/lts/security/2018/dla-1620.data
deleted file mode 100644
index 5099fddd655..00000000000
--- a/english/lts/security/2018/dla-1620.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1620-1 ghostscript</define-tag>
-<define-tag report_date>2018-12-27</define-tag>
-<define-tag secrefs>CVE-2018-19134 CVE-2018-19478</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1620.wml b/english/lts/security/2018/dla-1620.wml
deleted file mode 100644
index 6a13485f5b8..00000000000
--- a/english/lts/security/2018/dla-1620.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Some vulnerabilities were discovered in ghostscript, an interpreter for the
-PostScript language and for PDF.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19134">CVE-2018-19134</a>
-
- <p>The setpattern operator did not properly validate certain types. A specially
- crafted PostScript document could exploit this to crash Ghostscript or,
- possibly, execute arbitrary code in the context of the Ghostscript process.
- This is a type confusion issue because of failure to check whether the
- Implementation of a pattern dictionary was a structure type.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19478">CVE-2018-19478</a>
-
- <p>Attempting to open a carefully crafted PDF file results in long-running
- computation. A sufficiently bad page tree can lead to us taking significant
- amounts of time when checking the tree for recursion.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.06~dfsg-2+deb8u13.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1620.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1621.data b/english/lts/security/2018/dla-1621.data
deleted file mode 100644
index 0c439dd377c..00000000000
--- a/english/lts/security/2018/dla-1621.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1621-1 c3p0</define-tag>
-<define-tag report_date>2018-12-28</define-tag>
-<define-tag secrefs>CVE-2018-20433 Bug#917257</define-tag>
-<define-tag packages>c3p0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1621.wml b/english/lts/security/2018/dla-1621.wml
deleted file mode 100644
index 3d4cb218b10..00000000000
--- a/english/lts/security/2018/dla-1621.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A XML External Entity (XXE) vulnerability was discovered in c3p0, a
-library for JDBC connection pooling, that may be used to resolve
-information outside of the intended sphere of control.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.1.2-9+deb8u1.</p>
-
-<p>We recommend that you upgrade your c3p0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1621.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1622.data b/english/lts/security/2018/dla-1622.data
deleted file mode 100644
index 14cd683c1b0..00000000000
--- a/english/lts/security/2018/dla-1622.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1622-1 debian-security-support</define-tag>
-<define-tag report_date>2018-12-30</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1622.wml b/english/lts/security/2018/dla-1622.wml
deleted file mode 100644
index 8ae43a4b3aa..00000000000
--- a/english/lts/security/2018/dla-1622.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker,
-has been updated in jessie. The jessie relevant changes are:</p>
-
-<ul>
- <li>Mark jasperreports as end-of-life in Jessie.</li>
- <li>Mark webkit2gtk as unsupported in all releases. (Closes: #914567)</li>
- <li>Mark jruby in jessie as end-of-life as per DSA-4219-1 (Closes: #901032)</li>
- <li>Mark vlc in jessie as end-of-life as per DSA 4203-1</li>
- <li>mark frontaccounting as unsupported</li>
- <li>Mark redmine as end-of-life for Debian 8 (jessie) (Closes: #897609)</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, the package version is 2018.11.25~deb8u2.</p>
-
-<p>We recommend that you upgrade your debian-security-support packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1622.data"
-# $Id: $
diff --git a/english/lts/security/2018/dla-1623.data b/english/lts/security/2018/dla-1623.data
deleted file mode 100644
index 57bbc1ed012..00000000000
--- a/english/lts/security/2018/dla-1623.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1623-1 tar</define-tag>
-<define-tag report_date>2018-12-31</define-tag>
-<define-tag secrefs>CVE-2018-20482 Bug##917377</define-tag>
-<define-tag packages>tar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2018/dla-1623.wml b/english/lts/security/2018/dla-1623.wml
deleted file mode 100644
index e4bd224f866..00000000000
--- a/english/lts/security/2018/dla-1623.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a potential denial of service
-vulnerability in tar, the GNU version of the tar UNIX archiving
-utility.</p>
-
-<p>The --sparse argument looped endlessly if the file shrank whilst
-it was being read. Tar would only break out of this endless loop
-if the file grew again to (or beyond) its original end of file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in tar version
-1.27.1-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your tar packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2018/dla-1623.data"
-# $Id: $
diff --git a/english/lts/security/2018/index.wml b/english/lts/security/2018/index.wml
deleted file mode 100644
index 6e590307232..00000000000
--- a/english/lts/security/2018/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2018</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2018' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2019/Makefile b/english/lts/security/2019/Makefile
deleted file mode 100644
index 7e767552a4e..00000000000
--- a/english/lts/security/2019/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2019
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
diff --git a/english/lts/security/2019/dla-1624.data b/english/lts/security/2019/dla-1624.data
deleted file mode 100644
index 4b46d234e42..00000000000
--- a/english/lts/security/2019/dla-1624.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1624-1 thunderbird</define-tag>
-<define-tag report_date>2019-1-2</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1624.wml b/english/lts/security/2019/dla-1624.wml
deleted file mode 100644
index 84b3c5d3e9b..00000000000
--- a/english/lts/security/2019/dla-1624.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:60.4.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1624.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1625.data b/english/lts/security/2019/dla-1625.data
deleted file mode 100644
index 42cdfadd4f8..00000000000
--- a/english/lts/security/2019/dla-1625.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1625-1 tzdata</define-tag>
-<define-tag report_date>2019-1-2</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1625.wml b/english/lts/security/2019/dla-1625.wml
deleted file mode 100644
index a66e0725d05..00000000000
--- a/english/lts/security/2019/dla-1625.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018i. Notable
-changes are:</p>
-
-<ul>
- <li>Qyzylorda, Kazakhstan moved from +06 to +05 on 2018-12-21. A new
- zone Asia/Qostanay has been added, because Qostanay, Kazakhstan
- didn't move.</li>
- <li>Metlakatla, Alaska observes PST this winter only.</li>
- <li>São Tomé and Príncipe switched from +01 to +00 on 2019-01-01.</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2018i-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1625.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1626.data b/english/lts/security/2019/dla-1626.data
deleted file mode 100644
index 9282f8284f4..00000000000
--- a/english/lts/security/2019/dla-1626.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1626-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2019-1-2</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1626.wml b/english/lts/security/2019/dla-1626.wml
deleted file mode 100644
index 4761c9005f6..00000000000
--- a/english/lts/security/2019/dla-1626.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018i for the
-Perl bindings. For the list of changes, see DLA-1625-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.75-2+2018i.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1626.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1627.data b/english/lts/security/2019/dla-1627.data
deleted file mode 100644
index 2ac165c26f6..00000000000
--- a/english/lts/security/2019/dla-1627.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1627-1 qtbase-opensource-src</define-tag>
-<define-tag report_date>2019-1-3</define-tag>
-<define-tag secrefs>CVE-2018-15518 CVE-2018-19870 CVE-2018-19873</define-tag>
-<define-tag packages>qtbase-opensource-src</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1627.wml b/english/lts/security/2019/dla-1627.wml
deleted file mode 100644
index 2b0e2557a37..00000000000
--- a/english/lts/security/2019/dla-1627.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were fixed in Qt.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15518">CVE-2018-15518</a>
-
-<p>A double-free or corruption during parsing of a specially crafted
-illegal XML document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19870">CVE-2018-19870</a>
-
-<p>A malformed GIF image might have caused a NULL pointer dereference in
-QGifHandler resulting in a segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19873">CVE-2018-19873</a>
-
-<p>QBmpHandler had a buffer overflow via BMP data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.3.2+dfsg-4+deb8u3.</p>
-
-<p>We recommend that you upgrade your qtbase-opensource-src packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1627.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1628-2.data b/english/lts/security/2019/dla-1628-2.data
deleted file mode 100644
index 494e6d72609..00000000000
--- a/english/lts/security/2019/dla-1628-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1628-2 jasper</define-tag>
-<define-tag report_date>2019-4-13</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1628-2.wml b/english/lts/security/2019/dla-1628-2.wml
deleted file mode 100644
index 3420736a862..00000000000
--- a/english/lts/security/2019/dla-1628-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of jasper issued as DLA-1628-1 caused a regression due to
-the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-19542">CVE-2018-19542</a>, a NULL pointer dereference in the function
-jp2_decode, which could lead to a denial-of-service. In some cases not
-only invalid jp2 files but also valid jp2 files were rejected.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.900.1-debian1-2.4+deb8u6.</p>
-
-<p>We recommend that you upgrade your jasper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1628-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1628.data b/english/lts/security/2019/dla-1628.data
deleted file mode 100644
index d2ed68168bf..00000000000
--- a/english/lts/security/2019/dla-1628.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1628-1 jasper</define-tag>
-<define-tag report_date>2019-1-2</define-tag>
-<define-tag secrefs>CVE-2018-18873 CVE-2018-19139 CVE-2018-19539 CVE-2018-19540 CVE-2018-19541 CVE-2018-19542 CVE-2018-20570 CVE-2018-20584 CVE-2018-20622</define-tag>
-<define-tag packages>jasper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1628.wml b/english/lts/security/2019/dla-1628.wml
deleted file mode 100644
index cd476f8268c..00000000000
--- a/english/lts/security/2019/dla-1628.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in the JasPer JPEG-2000 library that could
-lead to a denial-of-service (application crash), memory leaks and
-potentially the execution of arbitrary code if a malformed image file
-is processed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.900.1-debian1-2.4+deb8u5.</p>
-
-<p>We recommend that you upgrade your jasper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1628.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1629.data b/english/lts/security/2019/dla-1629.data
deleted file mode 100644
index 783c103438d..00000000000
--- a/english/lts/security/2019/dla-1629.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1629-1 python-django</define-tag>
-<define-tag report_date>2019-1-6</define-tag>
-<define-tag secrefs>CVE-2019-3498 Bug##918230</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1629.wml b/english/lts/security/2019/dla-1629.wml
deleted file mode 100644
index b03f730529a..00000000000
--- a/english/lts/security/2019/dla-1629.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a content-spoofing vulnerability in the
-default 404 pages in the Django web development framework.</p>
-
-<p>For more information, please see:</p>
-
-<p><url "https://www.djangoproject.com/weblog/2019/jan/04/security-releases/"></p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in python-django
-version 1.7.11-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1629.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1630.data b/english/lts/security/2019/dla-1630.data
deleted file mode 100644
index dc0c08bce6f..00000000000
--- a/english/lts/security/2019/dla-1630.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1630-1 libav</define-tag>
-<define-tag report_date>2019-1-7</define-tag>
-<define-tag secrefs>CVE-2017-9993 CVE-2017-9994 CVE-2017-14055 CVE-2017-14056 CVE-2017-14057 CVE-2017-14170 CVE-2017-14171 CVE-2017-14767 CVE-2017-15672 CVE-2017-17130 CVE-2018-6621 CVE-2018-7557 CVE-2018-14394 CVE-2018-1999010</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1630.wml b/english/lts/security/2019/dla-1630.wml
deleted file mode 100644
index a183fbaaec1..00000000000
--- a/english/lts/security/2019/dla-1630.wml
+++ /dev/null
@@ -1,111 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were corrected in the libav
-multimedia library which may lead to a denial-of-service, information
-disclosure or the execution of arbitrary code if a malformed file is
-processed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9993">CVE-2017-9993</a>
-
- <p>Libav does not properly restrict HTTP Live Streaming filename
- extensions and demuxer names, which allows attackers to read
- arbitrary files via crafted playlist data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9994">CVE-2017-9994</a>
-
- <p>libavcodec/webp.c in Libav does not ensure that pix_fmt is set,
- which allows remote attackers to cause a denial of service
- (heap-based buffer overflow and application crash) or possibly have
- unspecified other impact via a crafted file, related to the
- vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14055">CVE-2017-14055</a>
-
- <p>Denial-of-service in mv_read_header() due to lack of an EOF (End of
- File) check might cause huge CPU and memory consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14056">CVE-2017-14056</a>
-
- <p>Denial-of-service in rl2_read_header() due to lack of an EOF
- (End of File) check might cause huge CPU and memory consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14057">CVE-2017-14057</a>
-
- <p>Denial-of-service in asf_read_marker() due to lack of an EOF
- (End of File) check might cause huge CPU and memory consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14170">CVE-2017-14170</a>
-
- <p>Denial-of-service in mxf_read_index_entry_array() due to lack of an
- EOF (End of File) check might cause huge CPU consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14171">CVE-2017-14171</a>
-
- <p>Denial-of-service in nsv_parse_NSVf_header() due to lack of an EOF
- (End of File) check might cause huge CPU consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14767">CVE-2017-14767</a>
-
- <p>The sdp_parse_fmtp_config_h264 function in
- libavformat/rtpdec_h264.c mishandles empty sprop-parameter-sets
- values, which allows remote attackers to cause a denial of service
- (heap buffer overflow) or possibly have unspecified other impact via
- a crafted sdp file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15672">CVE-2017-15672</a>
-
- <p>The read_header function in libavcodec/ffv1dec.c allows remote
- attackers to have unspecified impact via a crafted MP4 file, which
- triggers an out-of-bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17130">CVE-2017-17130</a>
-
- <p>The ff_free_picture_tables function in libavcodec/mpegpicture.c
- allows remote attackers to cause a denial of service
- (heap-based buffer overflow and application crash) or possibly have
- unspecified other impact via a crafted file, related to
- vc1_decode_i_blocks_adv.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6621">CVE-2018-6621</a>
-
- <p>The decode_frame function in libavcodec/utvideodec.c in Libav allows
- remote attackers to cause a denial of service (out of array read)
- via a crafted AVI file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7557">CVE-2018-7557</a>
-
- <p>The decode_init function in libavcodec/utvideodec.c in
- Libav allows remote attackers to cause a denial of service
- (Out of array read) via an AVI file with crafted dimensions within
- chroma subsampling data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14394">CVE-2018-14394</a>
-
- <p>libavformat/movenc.c in Libav allows attackers to cause a
- denial of service (application crash caused by a divide-by-zero
- error) with a user crafted Waveform audio file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1999010">CVE-2018-1999010</a>
-
- <p>Libav contains multiple out of array access vulnerabilities in the
- mms protocol that can result in attackers accessing out of bound
- data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u4.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1630.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1631.data b/english/lts/security/2019/dla-1631.data
deleted file mode 100644
index d3684e72705..00000000000
--- a/english/lts/security/2019/dla-1631.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1631-1 libcaca</define-tag>
-<define-tag report_date>2019-1-9</define-tag>
-<define-tag secrefs>CVE-2018-20544 CVE-2018-20546 CVE-2018-20547 CVE-2018-20549 Bug#917807</define-tag>
-<define-tag packages>libcaca</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1631.wml b/english/lts/security/2019/dla-1631.wml
deleted file mode 100644
index 2ffc240056a..00000000000
--- a/english/lts/security/2019/dla-1631.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libcaca, a graphics library
-that outputs text: integer overflows, floating point exceptions or
-invalid memory reads may lead to a denial-of-service (application
-crash) if a malformed image file is processed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.99.beta19-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libcaca packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1631.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1632.data b/english/lts/security/2019/dla-1632.data
deleted file mode 100644
index ac9a55d5c04..00000000000
--- a/english/lts/security/2019/dla-1632.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1632-1 libsndfile</define-tag>
-<define-tag report_date>2019-1-10</define-tag>
-<define-tag secrefs>CVE-2018-19758 Bug#917416</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1632.wml b/english/lts/security/2019/dla-1632.wml
deleted file mode 100644
index d6682ffa3a2..00000000000
--- a/english/lts/security/2019/dla-1632.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-buffer-overflow vulnerability was discovered in libsndfile, the
-library for reading and writing files containing sampled sound. This flaw
-might be triggered by remote attackers to cause denial of service (out of
-bounds read and application crash).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.25-9.1+deb8u3.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1632.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1633.data b/english/lts/security/2019/dla-1633.data
deleted file mode 100644
index 7b1dcaba48b..00000000000
--- a/english/lts/security/2019/dla-1633.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1633-1 sqlite3</define-tag>
-<define-tag report_date>2019-1-11</define-tag>
-<define-tag secrefs>CVE-2017-2518 CVE-2017-2519 CVE-2017-2520 CVE-2017-10989 CVE-2018-8740 Bug#867618 Bug#893195</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1633.wml b/english/lts/security/2019/dla-1633.wml
deleted file mode 100644
index 35af5754636..00000000000
--- a/english/lts/security/2019/dla-1633.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several flaws were corrected in SQLite, an SQL database engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2518">CVE-2017-2518</a>
-
- <p>A use-after-free bug in the query optimizer may cause a
- buffer overflow and application crash via a crafted SQL statement.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2519">CVE-2017-2519</a>
-
- <p>Insufficient size of the reference count on Table objects
- could lead to a denial-of-service or arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2520">CVE-2017-2520</a>
-
- <p>The sqlite3_value_text() interface returned a buffer that was not
- large enough to hold the complete string plus zero terminator when
- the input was a zeroblob. This could lead to arbitrary code
- execution or a denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10989">CVE-2017-10989</a>
-
- <p>SQLite mishandles undersized RTree blobs in a crafted database
- leading to a heap-based buffer over-read or possibly unspecified
- other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8740">CVE-2018-8740</a>
-
- <p>Databases whose schema is corrupted using a CREATE TABLE AS
- statement could cause a NULL pointer dereference.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.8.7.1-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1633.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1634.data b/english/lts/security/2019/dla-1634.data
deleted file mode 100644
index e40c7707a18..00000000000
--- a/english/lts/security/2019/dla-1634.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1634-1 wireshark</define-tag>
-<define-tag report_date>2019-1-15</define-tag>
-<define-tag secrefs>CVE-2017-7700 CVE-2017-7703 CVE-2017-7746 CVE-2017-7747 CVE-2017-9766 CVE-2017-11406 CVE-2017-11407 CVE-2017-11409 CVE-2017-13765 CVE-2017-15191 CVE-2017-17935 CVE-2017-17997 CVE-2018-7322 CVE-2018-7323 CVE-2018-7324 CVE-2018-7325 CVE-2018-7331 CVE-2018-7336 CVE-2018-7417 CVE-2018-7418 CVE-2018-7420 CVE-2018-9256 CVE-2018-9259 CVE-2018-9260 CVE-2018-9262 CVE-2018-9263 CVE-2018-9265 CVE-2018-9267 CVE-2018-9268 CVE-2018-9269 CVE-2018-9270 CVE-2018-11356 CVE-2018-11357 CVE-2018-11359 CVE-2018-16057 CVE-2018-16058 CVE-2018-19622 CVE-2018-19623 CVE-2018-19624 CVE-2018-19625 CVE-2018-19626</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1634.wml b/english/lts/security/2019/dla-1634.wml
deleted file mode 100644
index 55fea5ca4bc..00000000000
--- a/english/lts/security/2019/dla-1634.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues in wireshark, a tool that captures and analyzes packets
-off the wire, have been found by different people.
-These are basically issues with length checks or invalid memory access in
-different dissectors. This could result in infinite loops or crashes by
-malicious packets.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u16.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1634.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1635.data b/english/lts/security/2019/dla-1635.data
deleted file mode 100644
index 16087a1bf19..00000000000
--- a/english/lts/security/2019/dla-1635.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1635-1 sssd</define-tag>
-<define-tag report_date>2019-1-17</define-tag>
-<define-tag secrefs>CVE-2019-3811 Bug#919051</define-tag>
-<define-tag packages>sssd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1635.wml b/english/lts/security/2019/dla-1635.wml
deleted file mode 100644
index 3728a36931c..00000000000
--- a/english/lts/security/2019/dla-1635.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was found in sssd. If a user was configured with no home
-directory set, sssd would return '/' (the root directory) instead of ''
-(the empty string / no home directory). This could impact services that
-restrict the user's filesystem access to within their home directory
-through chroot() etc.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.11.7-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your sssd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1635.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1636.data b/english/lts/security/2019/dla-1636.data
deleted file mode 100644
index 2dd14e7d87e..00000000000
--- a/english/lts/security/2019/dla-1636.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1636-1 aria2</define-tag>
-<define-tag report_date>2019-1-22</define-tag>
-<define-tag secrefs>CVE-2019-3500 Bug#918058</define-tag>
-<define-tag packages>aria2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1636.wml b/english/lts/security/2019/dla-1636.wml
deleted file mode 100644
index b9a783efc9e..00000000000
--- a/english/lts/security/2019/dla-1636.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that aria2 (the lightweight command-line download
-utility) can store passed user credentials in a log file when using
-the --log option. This might allow local users to obtain sensitive
-information by reading this file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.18.8-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your aria2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1636.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1637.data b/english/lts/security/2019/dla-1637.data
deleted file mode 100644
index 33f71d6178f..00000000000
--- a/english/lts/security/2019/dla-1637.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1637-1 apt</define-tag>
-<define-tag report_date>2019-1-22</define-tag>
-<define-tag secrefs>CVE-2019-3462</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1637.wml b/english/lts/security/2019/dla-1637.wml
deleted file mode 100644
index 35732c072b0..00000000000
--- a/english/lts/security/2019/dla-1637.wml
+++ /dev/null
@@ -1,124 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Max Justicz discovered a vulnerability in APT, the high level package manager.
-The code handling HTTP redirects in the HTTP transport method doesn't properly
-sanitize fields transmitted over the wire. This vulnerability could be used by
-an attacker located as a man-in-the-middle between APT and a mirror to inject
-malicous content in the HTTP connection. This content could then be recognized
-as a valid package by APT and used later for code execution with root
-privileges on the target machine.</p>
-
-<p>Since the vulnerability is present in the package manager itself, it is
-recommended to disable redirects in order to prevent exploitation during this
-upgrade only, using:</p>
-
-<pre>
- apt -o Acquire::http::AllowRedirect=false update
- apt -o Acquire::http::AllowRedirect=false upgrade
-</pre>
-
-<p>This is known to break some proxies when used against security.debian.org. If
-that happens, people can switch their security APT source to use:</p>
-
-<pre>
- deb http://cdn-fastly.deb.debian.org/debian-security jessie/updates main
-</pre>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.9.8.5.</p>
-
-<p>We recommend that you upgrade your apt packages.</p>
-
-<p>Specific upgrade instructions:</p>
-
-<p>If upgrading using APT without redirect is not possible in your situation, you
-can manually download the files (using wget/curl) for your architecture using
-the URL provided below, verifying that the hashes match. Then you can install
-them using dpkg -i.</p>
-
-<p>Architecture independent files:</p>
-
-<pre>
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-doc_1.0.9.8.5_all.deb
- Size/SHA256 checksum: 301106 47df9567e45fadcd2a56c0fd3d514d8136f2f206aa7baa47405c6fcb94824ab6
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg-doc_1.0.9.8.5_all.deb
- Size/SHA256 checksum: 750506 ce79b2ef272716b8da11f3fd0497ce0b7ee69c9c66d01669e8abbbfdde5e6256
-</pre>
-
-<p>amd64 architecture:</p>
-
-<pre>
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg4.12_1.0.9.8.5_amd64.deb
- Size/SHA256 checksum: 792126 295d9c69854a4cfbcb46001b09b853f5a098a04c986fc5ae01a0124c1c27e6bd
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-inst1.5_1.0.9.8.5_amd64.deb
- Size/SHA256 checksum: 168896 f9615532b1577b3d1455fa51839ce91765f2860eb3a6810fb5e0de0c87253030
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt_1.0.9.8.5_amd64.deb
- Size/SHA256 checksum: 1109308 4078748632abc19836d045f80f9d6933326065ca1d47367909a0cf7f29e7dfe8
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg-dev_1.0.9.8.5_amd64.deb
- Size/SHA256 checksum: 192950 09ef86d178977163b8cf0081d638d74e0a90c805dd77750c1d91354b6840b032
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-utils_1.0.9.8.5_amd64.deb
- Size/SHA256 checksum: 368396 87c55d9ccadcabd59674873c221357c774020c116afd978fb9df6d2d0303abf2
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-transport-https_1.0.9.8.5_amd64.deb
- Size/SHA256 checksum: 137230 f5a17422fd319ff5f6e3ea9a9e87d2508861830120125484130da8c1fd479df2
-</pre>
-
-<p>armel architecture:</p>
-
-<pre>
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg4.12_1.0.9.8.5_armel.deb
- Size/SHA256 checksum: 717002 80fe021d87f2444abdd7c5491e7a4bf9ab9cb2b8e6fa72d308905f4e0aad60d4
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-inst1.5_1.0.9.8.5_armel.deb
- Size/SHA256 checksum: 166784 046fb962fa214c5d6acfb7344e7719f8c4898d87bf29ed3cd2115e3f6cdd14e9
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt_1.0.9.8.5_armel.deb
- Size/SHA256 checksum: 1067404 f9a257d6aace1f222633e0432abf1d6946bad9dbd0ca18dccb288d50f17b895f
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg-dev_1.0.9.8.5_armel.deb
- Size/SHA256 checksum: 193768 4cb226f55132a68a2f5db925ada6147aaf052adb02301fb45fb0c2d1cfce36f0
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-utils_1.0.9.8.5_armel.deb
- Size/SHA256 checksum: 353178 38042838d8bc79642e5389be7d2d2d967cbf316805d4c8c2d6afbe1bc164aacc
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-transport-https_1.0.9.8.5_armel.deb
- Size/SHA256 checksum: 134932 755b6d22f5914f3153a1c15427e5221507b174c0a4c6b860ebd16234c9e9a146
-</pre>
-
-<p>armhf architecture:</p>
-
-<pre>
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg4.12_1.0.9.8.5_armhf.deb
- Size/SHA256 checksum: 734302 0f48f6d0406afdf0bd4d39e90e56460fab3d9b5fa4c91e2dca78ec22caf2fe2a
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-inst1.5_1.0.9.8.5_armhf.deb
- Size/SHA256 checksum: 166556 284a1ffd529e1daab3c300be17a20f11450555be9c0af166d9796c18147a03ba
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt_1.0.9.8.5_armhf.deb
- Size/SHA256 checksum: 1078212 08d85c30c8e4a6df0dced8e232a6c7639caa231acef4af8fdee2c1e07f0178ba
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg-dev_1.0.9.8.5_armhf.deb
- Size/SHA256 checksum: 193796 3a26bd79677b46ce0a992e2ac808c4bbd2d5b3fc37b57fc93c8efa114de1adaa
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-utils_1.0.9.8.5_armhf.deb
- Size/SHA256 checksum: 357074 19dec9ffc0fe4a86d6e61b5213e75c55ae6aaade6f3804f90e2e4034bbdc44d8
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-transport-https_1.0.9.8.5_armhf.deb
- Size/SHA256 checksum: 135072 06ba556c5218e58fd14119e3b08a08f685209a0cbe09f2328bd572cabc580bca
-</pre>
-
-<p>i386 architecture:</p>
-
-<pre>
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg4.12_1.0.9.8.5_i386.deb
- Size/SHA256 checksum: 800840 201b6cf4625ed175e6a024ac1f7ca6c526ca79d859753c125b02cd69e26c349d
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-inst1.5_1.0.9.8.5_i386.deb
- Size/SHA256 checksum: 170484 5791661dd4ade72b61086fefdc209bd1f76ac7b7c812d6d4ba951b1a6232f0b9
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt_1.0.9.8.5_i386.deb
- Size/SHA256 checksum: 1110418 13c230e9c544b1e67a8da413046bf1728526372170533b1a23e70cc99c40a228
-http://security.debian.org/debian-security/pool/updates/main/a/apt/libapt-pkg-dev_1.0.9.8.5_i386.deb
- Size/SHA256 checksum: 193780 c5b1bfa913ea2e2e332c228f5c5fe4dbc11ab334d0551a68ba6e87e94a51ffee
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-utils_1.0.9.8.5_i386.deb
- Size/SHA256 checksum: 371218 1a74b12c8bb6b3968a721f3aa96739073e4fe2ced9302792c533e21535bc9cf4
-http://security.debian.org/debian-security/pool/updates/main/a/apt/apt-transport-https_1.0.9.8.5_i386.deb
- Size/SHA256 checksum: 139036 32148d92914a97df8bbb9f223e788dcbc7c39e570cf48e6759cb483a65b68666
-</pre>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1637.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1638.data b/english/lts/security/2019/dla-1638.data
deleted file mode 100644
index 45b6006f0bf..00000000000
--- a/english/lts/security/2019/dla-1638.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1638-1 libjpeg-turbo</define-tag>
-<define-tag report_date>2019-1-22</define-tag>
-<define-tag secrefs>CVE-2016-3616 CVE-2018-1152 CVE-2018-11212 CVE-2018-11213 CVE-2018-11214 Bug##819969 Bug##902950 Bug##902176</define-tag>
-<define-tag packages>libjpeg-turbo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1638.wml b/english/lts/security/2019/dla-1638.wml
deleted file mode 100644
index 42fee574570..00000000000
--- a/english/lts/security/2019/dla-1638.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been resolved in libjpeg-turbo, Debian's
-default JPEG implemenation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3616">CVE-2016-3616</a>
-
- <p>The cjpeg utility in libjpeg allowed remote attackers to cause a
- denial of service (NULL pointer dereference and application crash) or
- execute arbitrary code via a crafted file.</p>
-
- <p>This issue got fixed by the same patch that fixed <a href="https://security-tracker.debian.org/tracker/CVE-2018-11213">CVE-2018-11213</a> and
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-11214">CVE-2018-11214</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1152">CVE-2018-1152</a>
-
- <p>libjpeg-turbo has been found vulnerable to a denial of service
- vulnerability caused by a divide by zero when processing a crafted
- BMP image. The issue has been resolved by a boundary check.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11212">CVE-2018-11212</a>
-
- <p>The alloc_sarray function in jmemmgr.c allowed remote attackers to
- cause a denial of service (divide-by-zero error) via a crafted file.</p>
-
- <p>The issue has been addressed by checking the image size when reading
- a targa file and throwing an error when image width or height is 0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11213">CVE-2018-11213</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-11214">CVE-2018-11214</a>
-
- <p>The get_text_gray_row and get_text_rgb_row functions in rdppm.c both
- allowed remote attackers to cause a denial of service (Segmentation
- fault) via a crafted file.</p>
-
- <p>By checking the range of integer values in PPM text files and adding
- checks to ensure values are within the specified range, both issues</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.3.1-12+deb8u1.</p>
-
-<p>We recommend that you upgrade your libjpeg-turbo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1638.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1639.data b/english/lts/security/2019/dla-1639.data
deleted file mode 100644
index f0d43c9b99e..00000000000
--- a/english/lts/security/2019/dla-1639.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1639-1 systemd</define-tag>
-<define-tag report_date>2019-1-23</define-tag>
-<define-tag secrefs>CVE-2018-16864 CVE-2018-16865 Bug#918841 Bug#918848</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1639.wml b/english/lts/security/2019/dla-1639.wml
deleted file mode 100644
index 08b53244c79..00000000000
--- a/english/lts/security/2019/dla-1639.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in the journald component of
-systemd which can lead to a crash or code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16864">CVE-2018-16864</a>
-
- <p>An allocation of memory without limits, that could result in the
- stack clashing with another memory region, was discovered in
- systemd-journald when many entries are sent to the journal
- socket. A local attacker, or a remote one if
- systemd-journal-remote is used, may use this flaw to crash
- systemd-journald or execute code with journald privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16865">CVE-2018-16865</a>
-
- <p>An allocation of memory without limits, that could result in the
- stack clashing with another memory region, was discovered in
- systemd-journald when a program with long command line arguments
- calls syslog. A local attacker may use this flaw to crash
- systemd-journald or escalate his privileges. Versions through v240
- are vulnerable.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-215-17+deb8u9.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1639.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1640.data b/english/lts/security/2019/dla-1640.data
deleted file mode 100644
index ca6ddaa53d6..00000000000
--- a/english/lts/security/2019/dla-1640.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1640-1 tmpreaper</define-tag>
-<define-tag report_date>2019-1-24</define-tag>
-<define-tag secrefs>CVE-2019-3461 Bug#918956</define-tag>
-<define-tag packages>tmpreaper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1640.wml b/english/lts/security/2019/dla-1640.wml
deleted file mode 100644
index 611d21c2dee..00000000000
--- a/english/lts/security/2019/dla-1640.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that tmpreaper, a program that cleans up files in
-directories based on their age, is vulnerable to a race condition. This
-vulnerability might be exploited by local attackers to perform privilege
-escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.13+nmu1+deb8u1.</p>
-
-<p>We recommend that you upgrade your tmpreaper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1640.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1641.data b/english/lts/security/2019/dla-1641.data
deleted file mode 100644
index eb4aa6cdbe9..00000000000
--- a/english/lts/security/2019/dla-1641.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1641-1 mxml</define-tag>
-<define-tag report_date>2019-1-25</define-tag>
-<define-tag secrefs>CVE-2016-4570 CVE-2016-4571 CVE-2018-20004 Bug#825855 Bug#918007</define-tag>
-<define-tag packages>mxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1641.wml b/english/lts/security/2019/dla-1641.wml
deleted file mode 100644
index 82605df8de5..00000000000
--- a/english/lts/security/2019/dla-1641.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several stack exhaustion conditions were found in mxml that can easily
-crash when parsing xml files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4570">CVE-2016-4570</a>
-
- <p>The mxmlDelete function in mxml-node.c allows remote attackers to
- cause a denial of service (stack consumption) via crafted xml file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4571">CVE-2016-4571</a>
-
- <p>The mxml_write_node function in mxml-file.c allows remote attackers
- to cause a denial of service (stack consumption) via crafted xml
- file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20004">CVE-2018-20004</a>
-
- <p>A stack-based buffer overflow in mxml_write_node via vectors
- involving a double-precision floating point number.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.6-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your mxml packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1641.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1642.data b/english/lts/security/2019/dla-1642.data
deleted file mode 100644
index fc461638074..00000000000
--- a/english/lts/security/2019/dla-1642.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1642-1 postgresql-9.4</define-tag>
-<define-tag report_date>2019-1-25</define-tag>
-<define-tag packages>postgresql-9.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1642.wml b/english/lts/security/2019/dla-1642.wml
deleted file mode 100644
index ef628eb2e8e..00000000000
--- a/english/lts/security/2019/dla-1642.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The PostgreSQL project has release a new minor release of the 9.4
-branch.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this has been uploaded as version
-9.4.20-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1642.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1643.data b/english/lts/security/2019/dla-1643.data
deleted file mode 100644
index 0153e4f310c..00000000000
--- a/english/lts/security/2019/dla-1643.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1643-1 krb5</define-tag>
-<define-tag report_date>2019-1-25</define-tag>
-<define-tag secrefs>CVE-2018-5729 CVE-2018-5730 CVE-2018-20217</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1643.wml b/english/lts/security/2019/dla-1643.wml
deleted file mode 100644
index 4eff829e7c1..00000000000
--- a/english/lts/security/2019/dla-1643.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>krb5, a MIT Kerberos implementation, had several flaws in LDAP DN
-checking, which could be used to circumvent a DN containership check by
-supplying special parameters to some calls.
-Further an attacker could crash the KDC by making S4U2Self requests.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>,
-these problems have been fixed in version 1.12.1+dfsg-19+deb8u5.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1643.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1644.data b/english/lts/security/2019/dla-1644.data
deleted file mode 100644
index 2d9b0350025..00000000000
--- a/english/lts/security/2019/dla-1644.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1644-1 policykit-1</define-tag>
-<define-tag report_date>2019-1-28</define-tag>
-<define-tag secrefs>CVE-2018-19788 CVE-2019-6133</define-tag>
-<define-tag packages>policykit-1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1644.wml b/english/lts/security/2019/dla-1644.wml
deleted file mode 100644
index 37193819e7f..00000000000
--- a/english/lts/security/2019/dla-1644.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in Policykit, a framework for managing
-administrative policies and privileges:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19788">CVE-2018-19788</a>
-
- <p>It was discovered that incorrect processing of very high UIDs in
- Policykit could result in authentication bypass.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6133">CVE-2019-6133</a>
-
- <p>Jann Horn of Google found that Policykit doesn't properly check
- if a process is already authenticated, which can lead to an
- authentication reuse by a different user.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.105-15~deb8u4.</p>
-
-<p>We recommend that you upgrade your policykit-1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1644.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1645.data b/english/lts/security/2019/dla-1645.data
deleted file mode 100644
index c244ff1544d..00000000000
--- a/english/lts/security/2019/dla-1645.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1645-1 wireshark</define-tag>
-<define-tag report_date>2019-1-28</define-tag>
-<define-tag secrefs>CVE-2019-5716 CVE-2019-5717 CVE-2019-5719</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1645.wml b/english/lts/security/2019/dla-1645.wml
deleted file mode 100644
index 7f5203a01a2..00000000000
--- a/english/lts/security/2019/dla-1645.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues in wireshark, a network traffic analyzer, have been found.
-Dissectors of:</p>
-<ul>
-<li>ISAKMP, a Internet Security Association and Key Management Protocol</li>
-<li>P_MUL, a reliable multicast transfer protocol</li>
-<li>6LoWPAN, IPv6 over Low power Wireless Personal Area Network</li>
-</ul>
-<p>are affected.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5719">CVE-2019-5719</a>
-
- <p>Mateusz Jurczyk found that a missing encryption block in a packet could
- crash the ISAKMP dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5717">CVE-2019-5717</a>
-
- <p>It was found that the P_MUL dissector could crash when a malformed
- packet contains an illegal Data PDU sequence number of 0. Such a packet
- may not be analysed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5716">CVE-2019-5716</a>
-
- <p>It was found that the 6LoWPAN dissector could crash when a malformed
- packet does not contain IPHC information though the header says it
- should.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u17.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1645.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1646.data b/english/lts/security/2019/dla-1646.data
deleted file mode 100644
index 26070bf1fc5..00000000000
--- a/english/lts/security/2019/dla-1646.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1646-1 qemu</define-tag>
-<define-tag report_date>2019-1-29</define-tag>
-<define-tag secrefs>CVE-2018-17958 CVE-2018-19364 CVE-2018-19489</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1646.wml b/english/lts/security/2019/dla-1646.wml
deleted file mode 100644
index cfa022a7c6a..00000000000
--- a/english/lts/security/2019/dla-1646.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in QEMU, a fast processor emulator:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17958">CVE-2018-17958</a>
-
- <p>The rtl8139 emulator is affected by an integer overflow and subsequent
- buffer overflow. This vulnerability might be triggered by remote
- attackers with crafted packets to perform denial of service (via OOB
- stack buffer access).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19364">CVE-2018-19364</a>
-
- <p>The 9pfs subsystem is affected by a race condition allowing threads to
- modify an fid path while it is being accessed by another thread,
- leading to (for example) a use-after-free outcome. This vulnerability
- might be triggered by local attackers to perform denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19489">CVE-2018-19489</a>
-
- <p>The 9pfs subsystem is affected by a race condition during file
- renaming. This vulnerability might be triggered by local attackers to
- perform denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u9.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1646.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1647.data b/english/lts/security/2019/dla-1647.data
deleted file mode 100644
index 1cd039d838c..00000000000
--- a/english/lts/security/2019/dla-1647.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1647-1 apache2</define-tag>
-<define-tag report_date>2019-1-29</define-tag>
-<define-tag secrefs>CVE-2018-17199</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1647.wml b/english/lts/security/2019/dla-1647.wml
deleted file mode 100644
index 7552a0ad585..00000000000
--- a/english/lts/security/2019/dla-1647.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Diego Angulo from ImExHS discovered an issue in the webserver apache2.
-The module mod_session ignored the expiry time of sessions handled by
-mod_session_cookie, because the expiry time is available only after
-decoding the session and the check was already done before.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.4.10-10+deb8u13.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1647.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1648.data b/english/lts/security/2019/dla-1648.data
deleted file mode 100644
index a924527983d..00000000000
--- a/english/lts/security/2019/dla-1648.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1648-1 firefox-esr</define-tag>
-<define-tag report_date>2019-1-30</define-tag>
-<define-tag secrefs>CVE-2018-18500 CVE-2018-18501 CVE-2018-18505</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1648.wml b/english/lts/security/2019/dla-1648.wml
deleted file mode 100644
index 2049a3b2b6a..00000000000
--- a/english/lts/security/2019/dla-1648.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or privilege escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.5.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1648.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1649.data b/english/lts/security/2019/dla-1649.data
deleted file mode 100644
index b4f858d2d47..00000000000
--- a/english/lts/security/2019/dla-1649.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1649-1 spice</define-tag>
-<define-tag report_date>2019-1-30</define-tag>
-<define-tag secrefs>CVE-2019-3813 Bug#920762</define-tag>
-<define-tag packages>spice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1649.wml b/english/lts/security/2019/dla-1649.wml
deleted file mode 100644
index 5ebb12764a6..00000000000
--- a/english/lts/security/2019/dla-1649.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Christophe Fergeau discovered an out-of-bounds read vulnerability in
-spice, a SPICE protocol client and server library, which might result in
-denial of service (spice server crash), or possibly, execution of
-arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.12.5-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your spice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1649.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1650.data b/english/lts/security/2019/dla-1650.data
deleted file mode 100644
index cc059ebb213..00000000000
--- a/english/lts/security/2019/dla-1650.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1650-1 rssh</define-tag>
-<define-tag report_date>2019-1-30</define-tag>
-<define-tag secrefs>CVE-2019-1000018 Bug#919623</define-tag>
-<define-tag packages>rssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1650.wml b/english/lts/security/2019/dla-1650.wml
deleted file mode 100644
index 1d9164e235d..00000000000
--- a/english/lts/security/2019/dla-1650.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ESnet security team discovered a vulnerability in rssh, a restricted
-shell that allows users to perform only scp, sftp, cvs, svnserve
-(Subversion), rdist and/or rsync operations. Missing validation in the
-scp support could result in the bypass of this restriction, allowing the
-execution of arbitrary shell commands.</p>
-
-<p>Please note that with the update applied, the "-3" option of scp can no
-longer be used.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3.4-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your rssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1650.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1651.data b/english/lts/security/2019/dla-1651.data
deleted file mode 100644
index 51b7bf93d25..00000000000
--- a/english/lts/security/2019/dla-1651.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1651-1 libgd2</define-tag>
-<define-tag report_date>2019-1-30</define-tag>
-<define-tag secrefs>CVE-2018-5711 CVE-2018-1000222 CVE-2019-6977 CVE-2019-6978</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1651.wml b/english/lts/security/2019/dla-1651.wml
deleted file mode 100644
index 8132b177795..00000000000
--- a/english/lts/security/2019/dla-1651.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues in libgd2, a graphics library that allows to quickly draw
-images, have been found.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6977">CVE-2019-6977</a>
-
- <p>A potential double free in gdImage*Ptr() has been reported by Solmaz
- Salimi (aka. Rooney).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6978">CVE-2019-6978</a>
-
- <p>Simon Scannell found a heap-based buffer overflow, exploitable with
- crafted image data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000222">CVE-2018-1000222</a>
-
- <p>A new double free vulnerabilities in gdImageBmpPtr() has been
- reported by Solmaz Salimi (aka. Rooney).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5711">CVE-2018-5711</a>
-
- <p>Due to an integer signedness error the GIF core parsing function can
- enter an infinite loop. This will lead to a Denial of Service and
- exhausted server resources.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.0-5+deb8u12.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1651.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1652.data b/english/lts/security/2019/dla-1652.data
deleted file mode 100644
index 7d777aa3e9a..00000000000
--- a/english/lts/security/2019/dla-1652.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1652-1 libvncserver</define-tag>
-<define-tag report_date>2019-1-31</define-tag>
-<define-tag secrefs>CVE-2018-15126 CVE-2018-20748 CVE-2018-20749 CVE-2018-20750</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1652.wml b/english/lts/security/2019/dla-1652.wml
deleted file mode 100644
index e62f15b9372..00000000000
--- a/english/lts/security/2019/dla-1652.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found by Kaspersky Lab in libvncserver, a C library
-to implement VNC server/client functionalities. In addition, some of the
-vulnerabilities addressed in DLA 1617-1 were found to have incomplete
-fixes, and have been addressed in this update.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15126">CVE-2018-15126</a>
-
- <p>An attacker can cause denial of service or remote code execution via
- a heap use-after-free issue in the tightvnc-filetransfer extension.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20748">CVE-2018-20748</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-20749">CVE-2018-20749</a> /
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-20750">CVE-2018-20750</a>
-
- <p>Some of the out of bound heap write fixes for <a href="https://security-tracker.debian.org/tracker/CVE-2018-20019">CVE-2018-20019</a> and
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-15127">CVE-2018-15127</a> were incomplete. These CVEs address those issues.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.9.9+dfsg2-6.1+deb8u5.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1652.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1653.data b/english/lts/security/2019/dla-1653.data
deleted file mode 100644
index 35ad5726c37..00000000000
--- a/english/lts/security/2019/dla-1653.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1653-1 postgis</define-tag>
-<define-tag report_date>2019-1-31</define-tag>
-<define-tag secrefs>CVE-2017-18359</define-tag>
-<define-tag packages>postgis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1653.wml b/english/lts/security/2019/dla-1653.wml
deleted file mode 100644
index 7082e224943..00000000000
--- a/english/lts/security/2019/dla-1653.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the function ST_AsX3D in PostGIS, a module that
-adds spatial objects to the PostgreSQL object-relational database, did
-not handle empty values properly, allowing malicious users to cause
-denial of service or possibly other unspecified behaviour.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.4+dfsg-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your postgis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1653.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1654.data b/english/lts/security/2019/dla-1654.data
deleted file mode 100644
index fead5720091..00000000000
--- a/english/lts/security/2019/dla-1654.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1654-1 libav</define-tag>
-<define-tag report_date>2019-2-6</define-tag>
-<define-tag secrefs>CVE-2014-8542 CVE-2015-1207 CVE-2017-7863 CVE-2017-7865 CVE-2017-14169 CVE-2017-14223</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1654.wml b/english/lts/security/2019/dla-1654.wml
deleted file mode 100644
index 5343e5e2daa..00000000000
--- a/english/lts/security/2019/dla-1654.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues have been corrected in multiple demuxers and
-decoders of the libav multimedia library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8542">CVE-2014-8542</a>
-
- <p>libavcodec/utils.c omitted a certain codec ID during enforcement of
- alignment, which allowed remote attackers to cause a denial of ervice
- (out-of-bounds access) or possibly have unspecified other impact via
- crafted JV data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1207">CVE-2015-1207</a>
-
- <p>Double-free vulnerability in libavformat/mov.c allowed remote
- attackers to cause a denial of service (memory corruption and crash)
- via a crafted .m4a file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7863">CVE-2017-7863</a>
-
- <p>libav had an out-of-bounds write caused by a heap-based buffer
- overflow related to the decode_frame_common function in
- libavcodec/pngdec.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7865">CVE-2017-7865</a>
-
- <p>libav had an out-of-bounds write caused by a heap-based buffer
- overflow related to the ipvideo_decode_block_opcode_0xA function in
- libavcodec/interplayvideo.c and the avcodec_align_dimensions2
- function in libavcodec/utils.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14169">CVE-2017-14169</a>
-
- <p>In the mxf_read_primer_pack function in libavformat/mxfdec.c in, an
- integer signedness error might have occured when a crafted file,
- claiming a large <q>item_num</q> field such as 0xffffffff, was provided.
- As a result, the variable <q>item_num</q> turned negative, bypassing the
- check for a large value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14223">CVE-2017-14223</a>
-
- <p>In libavformat/asfdec_f.c a DoS in asf_build_simple_index() due to
- lack of an EOF (End of File) check might have caused huge CPU
- consumption. When a crafted ASF file, claiming a large <q>ict</q> field in
- the header but not containing sufficient backing data, was provided,
- the for loop would have consumed huge CPU and memory resources, since
- there was no EOF check inside the loop.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u5.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1654.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1655.data b/english/lts/security/2019/dla-1655.data
deleted file mode 100644
index ee2f4ccdf7e..00000000000
--- a/english/lts/security/2019/dla-1655.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1655-1 mariadb-10.0</define-tag>
-<define-tag report_date>2019-2-1</define-tag>
-<define-tag secrefs>CVE-2019-2529 CVE-2019-2537</define-tag>
-<define-tag packages>mariadb-10.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1655.wml b/english/lts/security/2019/dla-1655.wml
deleted file mode 100644
index 738a05a7d64..00000000000
--- a/english/lts/security/2019/dla-1655.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MariaDB database server. The
-vulnerabilities are addressed by upgrading MariaDB to the new upstream
-version 10.0.38. Please see the MariaDB 10.0 Release Notes for further
-details:</p>
-
-<p><url "https://mariadb.com/kb/en/mariadb/mariadb-10038-release-notes/"></p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-10.0.38-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1655.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1656.data b/english/lts/security/2019/dla-1656.data
deleted file mode 100644
index 923d8413b1b..00000000000
--- a/english/lts/security/2019/dla-1656.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1656-1 agg</define-tag>
-<define-tag report_date>2019-2-1</define-tag>
-<define-tag secrefs>CVE-2019-6245 Bug#919322</define-tag>
-<define-tag packages>agg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1656.wml b/english/lts/security/2019/dla-1656.wml
deleted file mode 100644
index 33fab8d80f6..00000000000
--- a/english/lts/security/2019/dla-1656.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A stack overflow vulnerability was discovered in AGG,
-the AntiGrain Geometry graphical toolkit, that may lead to code
-execution if a malformed file is processed. Since AGG only provides a
-static library, the desmume and exactimage packages were rebuilt
-against the latest security update.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.5+dfsg1-9+deb8u1.</p>
-
-<p>We recommend that you upgrade your agg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1656.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1657.data b/english/lts/security/2019/dla-1657.data
deleted file mode 100644
index 48fe04fa280..00000000000
--- a/english/lts/security/2019/dla-1657.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1657-1 debian-security-support</define-tag>
-<define-tag report_date>2019-2-1</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1657.wml b/english/lts/security/2019/dla-1657.wml
deleted file mode 100644
index d37ff81405f..00000000000
--- a/english/lts/security/2019/dla-1657.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker,
-has been updated in jessie.</p>
-
-<p>This marks the end of life of the Enigmail package in jessie. After many
-months of work to try backporting the various changes and fixes required
-to ensure a secure Enigmail package compatible with the newest version
-of Thunderbird now shipped in jessie, it is the LTS team's opinion that
-the changes are too intrusive to ensure the stability of the
-distribution as a whole.</p>
-
-<p>While Enigmail is still available on addons.mozilla.org, we do not
-recommend that package is used, as downloads and executes arbitrary
-binaries from the internet without the user's knowledge. It also doesn't
-respect's Debian commitment to free software, in that it is not
-buildable from source.</p>
-
-<p>We instead recommend you upgrade workstations needing Enigmail to Debian
-stretch where proper updates are available.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For Debian 8 <q>Lenny</q>, these issues have been fixed in debian-security-support version 2019.02.01~deb8u1</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1657.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1658.data b/english/lts/security/2019/dla-1658.data
deleted file mode 100644
index 32c524360be..00000000000
--- a/english/lts/security/2019/dla-1658.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1658-1 phpmyadmin</define-tag>
-<define-tag report_date>2019-2-1</define-tag>
-<define-tag secrefs>CVE-2018-19968 CVE-2018-19970</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1658.wml b/english/lts/security/2019/dla-1658.wml
deleted file mode 100644
index cddb97b6d59..00000000000
--- a/english/lts/security/2019/dla-1658.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A couple of vulnerabilities have been discovered in phpmyadmin, MySQL web
-administration tool.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19968">CVE-2018-19968</a>
-
- <p>An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a
- local file because of an error in the transformation feature. The attacker
- must have access to the phpMyAdmin Configuration Storage tables, although
- these can easily be created in any database to which the attacker has
- access. An attacker must have valid credentials to log in to phpMyAdmin;
- this vulnerability does not allow an attacker to circumvent the login
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19970">CVE-2018-19970</a>
-
- <p>A XSS vulnerability was found in the navigation tree, where an attacker can
- deliver a payload to a user through a crafted database/table name.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4:4.2.12-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1658.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1659.data b/english/lts/security/2019/dla-1659.data
deleted file mode 100644
index ee3fe5cc2b4..00000000000
--- a/english/lts/security/2019/dla-1659.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1659-1 drupal7</define-tag>
-<define-tag report_date>2019-2-2</define-tag>
-<define-tag secrefs>CVE-2019-6339</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1659.wml b/english/lts/security/2019/dla-1659.wml
deleted file mode 100644
index 4a2f0a62339..00000000000
--- a/english/lts/security/2019/dla-1659.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A remote code execution vulnerability exists in PHP's built-in phar
-stream wrapper when performing file operations on an untrusted phar://
-URI. Some Drupal code (core, contrib, and custom) may be performing
-file operations on insufficiently validated user input, thereby being
-exposed to this vulnerability.</p>
-
-<p>With this update a new replacement stream wrapper from typo3 project
-is used instead of the built-in one.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.32-1+deb8u14.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1659.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1660-2.data b/english/lts/security/2019/dla-1660-2.data
deleted file mode 100644
index 3189bcf47c5..00000000000
--- a/english/lts/security/2019/dla-1660-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1660-2 rssh</define-tag>
-<define-tag report_date>2019-02-19</define-tag>
-<define-tag packages>rssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1660-2.wml b/english/lts/security/2019/dla-1660-2.wml
deleted file mode 100644
index d85169a752e..00000000000
--- a/english/lts/security/2019/dla-1660-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the fix for the security vulnerability released for
-rssh in 2.3.4-4+deb8u2 via DLA-1660-1 introduced a regression that blocked
-scp(1) of multiple files from a server using rssh.</p>
-
-<p>Please see <a href="https://bugs.debian.org/921655">#921655</a> for more
-information.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been addressed in rssh version
-2.3.4-4+deb8u3.</p>
-
-<p>We recommend that you upgrade your rssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1660-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1660.data b/english/lts/security/2019/dla-1660.data
deleted file mode 100644
index 02a4fec5ea5..00000000000
--- a/english/lts/security/2019/dla-1660.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1660-1 rssh</define-tag>
-<define-tag report_date>2019-2-6</define-tag>
-<define-tag secrefs>CVE-2019-3463 CVE-2019-3464</define-tag>
-<define-tag packages>rssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1660.wml b/english/lts/security/2019/dla-1660.wml
deleted file mode 100644
index 6a2ce9894e5..00000000000
--- a/english/lts/security/2019/dla-1660.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>More vulnerabilities were found by Nick Cleaton in the rssh code that
-could lead to arbitrary code execution under certain circumstances.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3463">CVE-2019-3463</a>
-
- <p>reject rsync --daemon and --config command-line options; arbitrary
- command execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3464">CVE-2019-3464</a>
-
- <p>prevent popt to load a ~/.popt configuration file, leading to
- arbitrary command execution</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.3.4-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your rssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1660.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1661.data b/english/lts/security/2019/dla-1661.data
deleted file mode 100644
index fc82fb6c94c..00000000000
--- a/english/lts/security/2019/dla-1661.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1661-1 mumble</define-tag>
-<define-tag report_date>2019-2-6</define-tag>
-<define-tag secrefs>CVE-2018-20743 Bug#919249</define-tag>
-<define-tag packages>mumble</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1661.wml b/english/lts/security/2019/dla-1661.wml
deleted file mode 100644
index f0208ed08c4..00000000000
--- a/english/lts/security/2019/dla-1661.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been found that the mumble-server mishandles multiple
-concurrent requests that are persisted in the database, which allows
-remote attackers to cause a denial of service (daemon hang or crash)
-via a message flood. With the new security update a rate limiter is
-added with Leaky-Bucket algorithm.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.8-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your mumble packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1661.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1662.data b/english/lts/security/2019/dla-1662.data
deleted file mode 100644
index 7b0171092cd..00000000000
--- a/english/lts/security/2019/dla-1662.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1662-1 libthrift-java</define-tag>
-<define-tag report_date>2019-2-6</define-tag>
-<define-tag secrefs>CVE-2018-1320 Bug#918736</define-tag>
-<define-tag packages>libthrift-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1662.wml b/english/lts/security/2019/dla-1662.wml
deleted file mode 100644
index 62b56c0896a..00000000000
--- a/english/lts/security/2019/dla-1662.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that it was possible to bypass SASL negotiation
-isComplete validation in libthrift-java, Java language support for the
-Apache Thrift software framework. An assert used to determine if the
-SASL handshake had successfully completed could be disabled in
-production settings making the validation incomplete.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libthrift-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1662.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1663.data b/english/lts/security/2019/dla-1663.data
deleted file mode 100644
index 279743fe577..00000000000
--- a/english/lts/security/2019/dla-1663.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1663-1 python3.4</define-tag>
-<define-tag report_date>2019-2-7</define-tag>
-<define-tag secrefs>CVE-2016-0772 CVE-2016-5636 CVE-2016-5699 CVE-2018-20406 CVE-2019-5010</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1663.wml b/english/lts/security/2019/dla-1663.wml
deleted file mode 100644
index 36247c11233..00000000000
--- a/english/lts/security/2019/dla-1663.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This DLA fixes a a problem parsing x509 certificates, an pickle integer
-overflow, and some other minor issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0772">CVE-2016-0772</a>
-
- <p>The smtplib library in CPython does not return an error when StartTLS fails,
- which might allow man-in-the-middle attackers to bypass the TLS protections by
- leveraging a network position between the client and the registry to block the
- StartTLS command, aka a "StartTLS stripping attack."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5636">CVE-2016-5636</a>
-
- <p>Integer overflow in the get_data function in zipimport.c in CPython
- allows remote attackers to have unspecified impact via a negative data size
- value, which triggers a heap-based buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5699">CVE-2016-5699</a>
-
- <p>CRLF injection vulnerability in the HTTPConnection.putheader function in
- urllib2 and urllib in CPython allows remote attackers to inject arbitrary HTTP
- headers via CRLF sequences in a URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20406">CVE-2018-20406</a>
-
- <p>Modules/_pickle.c has an integer overflow via a large LONG_BINPUT value
- that is mishandled during a <q>resize to twice the size</q> attempt. This issue
- might cause memory exhaustion, but is only relevant if the pickle format is
- used for serializing tens or hundreds of gigabytes of data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5010">CVE-2019-5010</a>
-
- <p>NULL pointer dereference using a specially crafted X509 certificate.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.2-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1663.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1664.data b/english/lts/security/2019/dla-1664.data
deleted file mode 100644
index 8ca55b73165..00000000000
--- a/english/lts/security/2019/dla-1664.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1664-1 golang</define-tag>
-<define-tag report_date>2019-2-6</define-tag>
-<define-tag secrefs>CVE-2019-6486 Bug##920548</define-tag>
-<define-tag packages>golang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1664.wml b/english/lts/security/2019/dla-1664.wml
deleted file mode 100644
index f5874f1bb7a..00000000000
--- a/english/lts/security/2019/dla-1664.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service vulnerability
-or possibly even the ability to conduct private key recovery
-attacks within in the elliptic curve cryptography handling in the
-Go programming language libraries.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in golang version
-2:1.3.3-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your golang packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1664.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1665.data b/english/lts/security/2019/dla-1665.data
deleted file mode 100644
index dbbb04d9a6a..00000000000
--- a/english/lts/security/2019/dla-1665.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1665-1 netmask</define-tag>
-<define-tag report_date>2019-2-6</define-tag>
-<define-tag secrefs>Bug#921565</define-tag>
-<define-tag packages>netmask</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1665.wml b/english/lts/security/2019/dla-1665.wml
deleted file mode 100644
index 11ae5d44793..00000000000
--- a/english/lts/security/2019/dla-1665.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow was found in netmask which would crash when called
-with arbitrarily long inputs.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3.12+deb8u1.</p>
-
-<p>We recommend that you upgrade your netmask packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1665.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1666.data b/english/lts/security/2019/dla-1666.data
deleted file mode 100644
index 947ef62d961..00000000000
--- a/english/lts/security/2019/dla-1666.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1666-1 freerdp</define-tag>
-<define-tag report_date>2019-2-9</define-tag>
-<define-tag secrefs>CVE-2018-8786 CVE-2018-8787 CVE-2018-8788 CVE-2018-8789</define-tag>
-<define-tag packages>freerdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1666.wml b/english/lts/security/2019/dla-1666.wml
deleted file mode 100644
index 87c6e4839a0..00000000000
--- a/english/lts/security/2019/dla-1666.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>For the FreeRDP version in Debian jessie LTS a security and functionality
-update has recently been provided. FreeRDP is a free re-implementation
-of the Microsoft RDP protocol (server and client side) with freerdp-x11
-being the most common RDP client these days.</p>
-
-<p>Functional improvements:</p>
-
- <p>With help from FreeRDP upstream (cudos to Bernhard Miklautz and
- Martin Fleisz) we are happy to announce that RDP proto v6 and CredSSP
- v3 support have been backported to the old FreeRDP 1.1 branch.</p>
-
- <p>Since Q2/2018, Microsoft Windows servers and clients received an
- update that defaulted their RDP server to proto version 6. Since this
- change, people have not been able anymore to connect to recently
- updated MS Windows machines using old the FreeRDP 1.1 branch as found
- in Debian jessie LTS and Debian stretch.</p>
-
- <p>With the recent FreeRDP upload to Debian jessie LTS, connecting to
- up-to-date MS Windows machines is now again possible.</p>
-
-<p>Security issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8786">CVE-2018-8786</a>
-
- <p>FreeRDP contained an integer truncation that lead to a heap-based
- buffer overflow in function update_read_bitmap_update() and resulted
- in a memory corruption and probably even a remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8787">CVE-2018-8787</a>
-
- <p>FreeRDP contained an integer overflow that leads to a heap-based
- buffer overflow in function gdi_Bitmap_Decompress() and resulted in a
- memory corruption and probably even a remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8788">CVE-2018-8788</a>
-
- <p>FreeRDP contained an out-of-bounds write of up to 4 bytes in function
- nsc_rle_decode() that resulted in a memory corruption and possibly
- even a remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8789">CVE-2018-8789</a>
-
- <p>FreeRDP contained several out-of-bounds reads in the NTLM
- authentication module that resulted in a denial of service
- (segfault).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these security problems have been fixed in version
-1.1.0~git20140921.1.440916e+dfsg1-13~deb8u3.</p>
-
-<p>We recommend that you upgrade your freerdp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1666.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1667.data b/english/lts/security/2019/dla-1667.data
deleted file mode 100644
index 8f0ab4620c3..00000000000
--- a/english/lts/security/2019/dla-1667.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1667-1 dovecot</define-tag>
-<define-tag report_date>2019-2-7</define-tag>
-<define-tag secrefs>CVE-2019-3814</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1667.wml b/english/lts/security/2019/dla-1667.wml
deleted file mode 100644
index 8b64099c225..00000000000
--- a/english/lts/security/2019/dla-1667.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a vulnerability in the dovecot
-IMAP/POP3 server.</p>
-
-<p>A flaw in the TLS username handling could lead to an attacker
-logging in as anyone else in the system if both
-auth_ssl_{require_client,username_from}_cert were enabled.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in dovecot version
-1:2.2.13-12~deb8u5.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1667.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1668.data b/english/lts/security/2019/dla-1668.data
deleted file mode 100644
index 9f46c9fb66b..00000000000
--- a/english/lts/security/2019/dla-1668.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1668-1 libarchive</define-tag>
-<define-tag report_date>2019-2-7</define-tag>
-<define-tag secrefs>CVE-2019-1000019 CVE-2019-1000020</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1668.wml b/english/lts/security/2019/dla-1668.wml
deleted file mode 100644
index 65bd07b7b8e..00000000000
--- a/english/lts/security/2019/dla-1668.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fuzzing found two further file-format specific issues in libarchive, a
-read-only segfault in 7z, and an infinite loop in ISO9660.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1000019">CVE-2019-1000019</a>
-
- <p>Out-of-bounds Read vulnerability in 7zip decompression, that can
- result in a crash (denial of service, CWE-125)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1000020">CVE-2019-1000020</a>
-
- <p>Vulnerability in ISO9660 parser that can result in DoS by infinite
- loop (CWE-835)</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.1.2-11+deb8u7.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1668.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1669.data b/english/lts/security/2019/dla-1669.data
deleted file mode 100644
index f7ca1256a10..00000000000
--- a/english/lts/security/2019/dla-1669.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1669-1 libreoffice</define-tag>
-<define-tag report_date>2019-2-8</define-tag>
-<define-tag secrefs>CVE-2018-16858</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1669.wml b/english/lts/security/2019/dla-1669.wml
deleted file mode 100644
index d3597bde31c..00000000000
--- a/english/lts/security/2019/dla-1669.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alex Infuehr discovered a directory traversal vulnerability which could
-result in the execution of Python script code when opening a malformed
-document.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:4.3.3-2+deb8u12.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1669.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1670.data b/english/lts/security/2019/dla-1670.data
deleted file mode 100644
index 72575a3454e..00000000000
--- a/english/lts/security/2019/dla-1670.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1670-1 ghostscript</define-tag>
-<define-tag report_date>2019-2-11</define-tag>
-<define-tag secrefs>CVE-2019-6116</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1670.wml b/english/lts/security/2019/dla-1670.wml
deleted file mode 100644
index edbd0c4adb9..00000000000
--- a/english/lts/security/2019/dla-1670.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered a vulnerability in Ghostscript, the GPL
-PostScript/PDF interpreter, which may result in denial of service or the
-execution of arbitrary code if a malformed Postscript file is processed
-(despite the -dSAFER sandbox being enabled).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.26a~dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1670.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1671.data b/english/lts/security/2019/dla-1671.data
deleted file mode 100644
index 4eff48caae0..00000000000
--- a/english/lts/security/2019/dla-1671.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1671-1 coturn</define-tag>
-<define-tag report_date>2019-2-11</define-tag>
-<define-tag secrefs>CVE-2018-4056 CVE-2018-4058 CVE-2018-4059</define-tag>
-<define-tag packages>coturn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1671.wml b/english/lts/security/2019/dla-1671.wml
deleted file mode 100644
index 5f5bf8ce4e1..00000000000
--- a/english/lts/security/2019/dla-1671.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in coTURN, a TURN and STUN server for
-VoIP.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4056">CVE-2018-4056</a>
-
- <p>An SQL injection vulnerability was discovered in the coTURN administrator
- web portal. As the administration web interface is shared with the
- production, it is unfortunately not possible to easily filter outside
- access and this security update completely disables the web interface. Users
- should use the local, command line interface instead.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4058">CVE-2018-4058</a>
-
- <p>Default configuration enables unsafe loopback forwarding. A remote attacker
- with access to the TURN interface can use this vulnerability to gain access
- to services that should be local only.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-4059">CVE-2018-4059</a>
-
- <p>Default configuration uses an empty password for the local command line
- administration interface. An attacker with access to the local console
- (either a local attacker or a remote attacker taking advantage of
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-4058">CVE-2018-4058</a>) could escalade privileges to administrator of the coTURN
- server.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.2.1.2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your coturn packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1671.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1672.data b/english/lts/security/2019/dla-1672.data
deleted file mode 100644
index 825d3432840..00000000000
--- a/english/lts/security/2019/dla-1672.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1672-1 curl</define-tag>
-<define-tag report_date>2019-2-11</define-tag>
-<define-tag secrefs>CVE-2018-16890 CVE-2019-3822 CVE-2019-3823</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1672.wml b/english/lts/security/2019/dla-1672.wml
deleted file mode 100644
index 8fd744636dc..00000000000
--- a/english/lts/security/2019/dla-1672.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were three vulnerabilities in the curl
-command-line HTTP (etc.) client:</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16890">CVE-2018-16890</a>
- <p>A heap buffer out-of-bounds read vulnerability in
- the handling of NTLM type-2 messages.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3822">CVE-2019-3822</a>
- <p>Stack-based buffer overflow in the handling of
- outgoing NTLM type-3 headers.</p></li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3823">CVE-2019-3823</a>
- <p>Heap out-of-bounds read in code handling
- the end of a response in the SMTP protocol.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in curl version
-7.38.0-4+deb8u14.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1672.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1673.data b/english/lts/security/2019/dla-1673.data
deleted file mode 100644
index 02f4864ef03..00000000000
--- a/english/lts/security/2019/dla-1673.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1673-1 wordpress</define-tag>
-<define-tag report_date>2019-2-11</define-tag>
-<define-tag secrefs>CVE-2018-20147 CVE-2018-20148 CVE-2018-20149 CVE-2018-20150 CVE-2018-20151 CVE-2018-20152 CVE-2018-20153 Bug#916403</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1673.wml b/english/lts/security/2019/dla-1673.wml
deleted file mode 100644
index 479b296fd0a..00000000000
--- a/english/lts/security/2019/dla-1673.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20147">CVE-2018-20147</a>
-
- <p>Authors could modify metadata to bypass intended restrictions on
- deleting files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20148">CVE-2018-20148</a>
-
- <p>Contributors could conduct PHP object injection attacks via crafted
- metadata in a wp.getMediaItem XMLRPC call. This is caused by
- mishandling of serialized data at phar:// URLs in the
- wp_get_attachment_thumb_file function in wp-includes/post.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20149">CVE-2018-20149</a>
-
- <p>When the Apache HTTP Server is used, authors could upload crafted
- files that bypass intended MIME type restrictions, leading to XSS,
- as demonstrated by a .jpg file without JPEG data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20150">CVE-2018-20150</a>
-
- <p>Crafted URLs could trigger XSS for certain use cases involving
- plugins.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20151">CVE-2018-20151</a>
-
- <p>The user-activation page could be read by a search engine's web
- crawler if an unusual configuration were chosen. The search engine
- could then index and display a user's e-mail address and (rarely)
- the password that was generated by default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20152">CVE-2018-20152</a>
-
- <p>Authors could bypass intended restrictions on post types via crafted
- input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20153">CVE-2018-20153</a>
-
- <p>Contributors could modify new comments made by users with greater
- privileges, possibly causing XSS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1.25+dfsg-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1673.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1674.data b/english/lts/security/2019/dla-1674.data
deleted file mode 100644
index 8af1d78de08..00000000000
--- a/english/lts/security/2019/dla-1674.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1674-1 php5</define-tag>
-<define-tag report_date>2019-2-12</define-tag>
-<define-tag secrefs>CVE-2018-1000888</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1674.wml b/english/lts/security/2019/dla-1674.wml
deleted file mode 100644
index 79c9f5c3d71..00000000000
--- a/english/lts/security/2019/dla-1674.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>php-pear in php5 contains CWE-502 (Deserialization of Untrusted Data)
-and CWE-915 (Improperly Controlled Modification of
-Dynamically-Determined Object Attributes) vulnerabilities in its
-Archive_Tar class. When extract is called without a specific prefix
-path, can trigger unserialization by crafting a tar file with
-`phar://[path_to_malicious_phar_file]` as path. Object injection can
-be used to trigger destruct in the loaded PHP classes, all with
-possible remote code execution that can result in files being deleted
-or possibly modified.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.6.39+dfsg-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1674.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1675.data b/english/lts/security/2019/dla-1675.data
deleted file mode 100644
index 622984b6d22..00000000000
--- a/english/lts/security/2019/dla-1675.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1675-1 python-gnupg</define-tag>
-<define-tag report_date>2019-2-14</define-tag>
-<define-tag secrefs>CVE-2019-6690</define-tag>
-<define-tag packages>python-gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1675.wml b/english/lts/security/2019/dla-1675.wml
deleted file mode 100644
index 15ef3752740..00000000000
--- a/english/lts/security/2019/dla-1675.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alexander Kjäll and Stig Palmquist discovered a vulnerability in
-python-gnupg, a wrapper around GNU Privacy Guard. It was possible to
-inject data through the passphrase property of the gnupg.GPG.encrypt()
-and gnupg.GPG.decrypt() functions when symmetric encryption is used.
-The supplied passphrase is not validated for newlines, and the library
-passes --passphrase-fd=0 to the gpg executable, which expects the
-passphrase on the first line of stdin, and the ciphertext to be
-decrypted or plaintext to be encrypted on subsequent lines.</p>
-
-<p>By supplying a passphrase containing a newline an attacker can
-control/modify the ciphertext/plaintext being decrypted/encrypted.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.3.6-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your python-gnupg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1675.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1676.data b/english/lts/security/2019/dla-1676.data
deleted file mode 100644
index cafd7261b20..00000000000
--- a/english/lts/security/2019/dla-1676.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1676-1 unbound</define-tag>
-<define-tag report_date>2019-2-14</define-tag>
-<define-tag secrefs>CVE-2017-15105 Bug#887733</define-tag>
-<define-tag packages>unbound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1676.wml b/english/lts/security/2019/dla-1676.wml
deleted file mode 100644
index 1e799f0d312..00000000000
--- a/english/lts/security/2019/dla-1676.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ralph Dolmans and Karst Koymans found a flaw in the way unbound, a
-validating, recursive, caching DNS resolver, validated
-wildcard-synthesized NSEC records.</p>
-
-<p>An improperly validated wildcard NSEC record could be used to prove the
-non-existence (NXDOMAIN answer) of an existing wildcard record, or trick
-unbound into accepting a NODATA proof.</p>
-
-<p>For more information please refer to the upstream advisory at
-<url "https://unbound.net/downloads/CVE-2017-15105.txt">.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.22-3+deb8u4.</p>
-
-<p>We recommend that you upgrade your unbound packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1676.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1677.data b/english/lts/security/2019/dla-1677.data
deleted file mode 100644
index 42ce828be4a..00000000000
--- a/english/lts/security/2019/dla-1677.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1677-1 firefox-esr</define-tag>
-<define-tag report_date>2019-2-15</define-tag>
-<define-tag secrefs>CVE-2018-18356 CVE-2019-5785</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1677.wml b/english/lts/security/2019/dla-1677.wml
deleted file mode 100644
index 733aab8eae8..00000000000
--- a/english/lts/security/2019/dla-1677.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.5.1esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1677.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1678.data b/english/lts/security/2019/dla-1678.data
deleted file mode 100644
index 84a3322be63..00000000000
--- a/english/lts/security/2019/dla-1678.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1678-1 thunderbird</define-tag>
-<define-tag report_date>2019-2-16</define-tag>
-<define-tag secrefs>CVE-2018-18356 CVE-2018-18500 CVE-2018-18501 CVE-2018-18505. CVE-2018-18509 CVE-2019-5785</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1678.wml b/english/lts/security/2019/dla-1678.wml
deleted file mode 100644
index 03e98d92793..00000000000
--- a/english/lts/security/2019/dla-1678.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Thunderbird mail client,
-which could lead to the execution of arbitrary code, denial of service
-or spoofing of S/MIME signatures.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.5.1-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1678.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1679.data b/english/lts/security/2019/dla-1679.data
deleted file mode 100644
index a355d1c7b95..00000000000
--- a/english/lts/security/2019/dla-1679.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1679-1 php5</define-tag>
-<define-tag report_date>2019-2-17</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1679.wml b/english/lts/security/2019/dla-1679.wml
deleted file mode 100644
index 75f69098ea5..00000000000
--- a/english/lts/security/2019/dla-1679.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security bugs have been identified and fixed in php5, a
-server-side, HTML-embedded scripting language. The affected components
-include GD graphics, multi-byte string handling, phar file format
-handling, and xmlrpc.</p>
-
-<p>CVEs have not yet been assigned. Once the CVE assignments are
-announced, the Debian Security Tracker will be updated with the relevant
-information.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problems have been fixed in version
-5.6.40+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1679.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1680.data b/english/lts/security/2019/dla-1680.data
deleted file mode 100644
index c6ae65e6474..00000000000
--- a/english/lts/security/2019/dla-1680.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1680-1 tiff</define-tag>
-<define-tag report_date>2019-2-18</define-tag>
-<define-tag secrefs>CVE-2018-17000 CVE-2018-19210 CVE-2019-7663</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1680.wml b/english/lts/security/2019/dla-1680.wml
deleted file mode 100644
index 092b3fcbe13..00000000000
--- a/english/lts/security/2019/dla-1680.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17000">CVE-2018-17000</a>
-
- <p>A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c
- (called from TIFFWriteDirectoryTagTransferfunction) allows an
- attacker to cause a denial-of-service through a crafted tiff file. This
- vulnerability can be triggered by the executable tiffcp.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19210">CVE-2018-19210</a>
-
- <p>There is a NULL pointer dereference in the TIFFWriteDirectorySec function
- in tif_dirwrite.c that will lead to a denial of service attack, as
- demonstrated by tiffset.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7663">CVE-2019-7663</a>
-
- <p>An Invalid Address dereference was discovered in
- TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c,
- affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote
- attackers could leverage this vulnerability to cause a denial-of-service
- via a crafted tiff file.</p>
-
- <p>We believe this is the same as <a href="https://security-tracker.debian.org/tracker/CVE-2018-17000">CVE-2018-17000</a> (above).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.0.3-12.3+deb8u8.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1680.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1681.data b/english/lts/security/2019/dla-1681.data
deleted file mode 100644
index b4653198203..00000000000
--- a/english/lts/security/2019/dla-1681.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1681-1 gsoap</define-tag>
-<define-tag report_date>2019-2-18</define-tag>
-<define-tag secrefs>CVE-2019-7659</define-tag>
-<define-tag packages>gsoap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1681.wml b/english/lts/security/2019/dla-1681.wml
deleted file mode 100644
index f3fdb4a62f7..00000000000
--- a/english/lts/security/2019/dla-1681.wml
+++ /dev/null
@@ -1,16 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a denial of service vulnerability in
-gsoap a C/C++ language binding used for SOAP-based web services.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this issue has been fixed in gsoap version
-2.8.17-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your gsoap packages. Thanks to Mattias
-Ellert &lt;mattias.ellert@physics.uu.se&gt; for their assistance in
-preparing this update.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1681.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1682.data b/english/lts/security/2019/dla-1682.data
deleted file mode 100644
index ca622c402b6..00000000000
--- a/english/lts/security/2019/dla-1682.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1682-1 uriparser</define-tag>
-<define-tag report_date>2019-2-18</define-tag>
-<define-tag secrefs>CVE-2018-20721</define-tag>
-<define-tag packages>uriparser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1682.wml b/english/lts/security/2019/dla-1682.wml
deleted file mode 100644
index 678d41a4908..00000000000
--- a/english/lts/security/2019/dla-1682.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Joergen Ibsen reported an issue with uriparser, a URI parsing library
-compliant with RFC 3986.</p>
-
-<p>An Out-of-bounds read for incomplete URIs with IPv6 addresses with
-embedded IPv4 address, e.g. &quot;//[::44.1&quot;, were possible.</p>
-
-<p>For Debian 8 &quot;Jessie&quot;, this problem has been fixed in version
-0.8.0.1-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your uriparser packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1682.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1683.data b/english/lts/security/2019/dla-1683.data
deleted file mode 100644
index a84c2bb4d30..00000000000
--- a/english/lts/security/2019/dla-1683.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1683-1 rdesktop</define-tag>
-<define-tag report_date>2019-2-19</define-tag>
-<define-tag secrefs>CVE-2018-8791 CVE-2018-8792 CVE-2018-8793 CVE-2018-8794 CVE-2018-8795 CVE-2018-8796 CVE-2018-8797 CVE-2018-8798 CVE-2018-8799 CVE-2018-8800 CVE-2018-20174 CVE-2018-20175 CVE-2018-20176 CVE-2018-20177 CVE-2018-20178 CVE-2018-20179 CVE-2018-20180 CVE-2018-20181 CVE-2018-20182</define-tag>
-<define-tag packages>rdesktop</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1683.wml b/english/lts/security/2019/dla-1683.wml
deleted file mode 100644
index 18ae79c3889..00000000000
--- a/english/lts/security/2019/dla-1683.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in the rdesktop RDP client, which
-could result in denial of service, information disclosure and the
-execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.8.4-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your rdesktop packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1683.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1684.data b/english/lts/security/2019/dla-1684.data
deleted file mode 100644
index 6a040215c4c..00000000000
--- a/english/lts/security/2019/dla-1684.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1684-1 systemd</define-tag>
-<define-tag report_date>2019-2-19</define-tag>
-<define-tag secrefs>CVE-2019-6454</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1684.wml b/english/lts/security/2019/dla-1684.wml
deleted file mode 100644
index 5f05e4e510b..00000000000
--- a/english/lts/security/2019/dla-1684.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chris Coulson discovered a flaw in systemd leading to denial of service.
-An unprivileged user could take advantage of this issue to crash PID1 by
-sending a specially crafted D-Bus message on the system bus.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-215-17+deb8u10.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1684.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1685.data b/english/lts/security/2019/dla-1685.data
deleted file mode 100644
index fca9942c3ff..00000000000
--- a/english/lts/security/2019/dla-1685.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1685-1 drupal7</define-tag>
-<define-tag report_date>2019-03-04</define-tag>
-<define-tag secrefs>CVE-2019-6338</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1685.wml b/english/lts/security/2019/dla-1685.wml
deleted file mode 100644
index e5c30f2839e..00000000000
--- a/english/lts/security/2019/dla-1685.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Drupal core uses the third-party PEAR Archive_Tar library. This
-library has released a security update which impacts some Drupal
-configurations. Refer to <a href="https://security-tracker.debian.org/tracker/CVE-2018-1000888">CVE-2018-1000888</a> for details. Also a possible
-regression caused by <a href="https://security-tracker.debian.org/tracker/CVE-2019-6339">CVE-2019-6339</a> is fixed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.32-1+deb8u15.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1685.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1686.data b/english/lts/security/2019/dla-1686.data
deleted file mode 100644
index 13953f39588..00000000000
--- a/english/lts/security/2019/dla-1686.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1686-1 freedink-dfarc</define-tag>
-<define-tag report_date>2019-02-24</define-tag>
-<define-tag secrefs>CVE-2018-0496</define-tag>
-<define-tag packages>freedink-dfarc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1686.wml b/english/lts/security/2019/dla-1686.wml
deleted file mode 100644
index c99e0ad1092..00000000000
--- a/english/lts/security/2019/dla-1686.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sylvain Beucler and Dan Walma discovered several directory traversal
-issues in DFArc, a frontend and extensions manager for the Dink
-Smallwood game, allowing an attacker to overwrite arbitrary files on
-the user's system.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.12-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your freedink-dfarc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1686.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1687.data b/english/lts/security/2019/dla-1687.data
deleted file mode 100644
index b20acd703c8..00000000000
--- a/english/lts/security/2019/dla-1687.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1687-1 sox</define-tag>
-<define-tag report_date>2019-02-24</define-tag>
-<define-tag secrefs>CVE-2014-8145</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1687.wml b/english/lts/security/2019/dla-1687.wml
deleted file mode 100644
index 93c1c011988..00000000000
--- a/english/lts/security/2019/dla-1687.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Mike Salvatore discovered that the fixes for these heap-based buffer
-overflows had not been properly applied in the Debian package.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-14.4.1-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1687.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1688.data b/english/lts/security/2019/dla-1688.data
deleted file mode 100644
index f0e97576f47..00000000000
--- a/english/lts/security/2019/dla-1688.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1688-1 waagent</define-tag>
-<define-tag report_date>2019-2-25</define-tag>
-<define-tag packages>waagent</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1688.wml b/english/lts/security/2019/dla-1688.wml
deleted file mode 100644
index a5814523d53..00000000000
--- a/english/lts/security/2019/dla-1688.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A newer version of waagent is needed for several features of the Azure
-platform.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.2.18-3~deb8u1.</p>
-
-<p>We recommend that you upgrade your waagent packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1688.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1689.data b/english/lts/security/2019/dla-1689.data
deleted file mode 100644
index ec0478a74c3..00000000000
--- a/english/lts/security/2019/dla-1689.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1689-1 elfutils</define-tag>
-<define-tag report_date>2019-2-25</define-tag>
-<define-tag secrefs>CVE-2017-7608 CVE-2017-7610 CVE-2017-7611 CVE-2017-7612 CVE-2017-7613 CVE-2018-16062 CVE-2018-18310 CVE-2018-18520 CVE-2018-18521 CVE-2019-7149 CVE-2019-7150 CVE-2019-7665</define-tag>
-<define-tag packages>elfutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1689.wml b/english/lts/security/2019/dla-1689.wml
deleted file mode 100644
index 959c60c4dcd..00000000000
--- a/english/lts/security/2019/dla-1689.wml
+++ /dev/null
@@ -1,83 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues in elfutils, a collection of utilities to handle ELF
-objects, have been found either by fuzzing or by using an
-AddressSanitizer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7665">CVE-2019-7665</a>
-
- <p>Due to a heap-buffer-overflow problem in function elf32_xlatetom()
- a crafted ELF input can cause segmentation faults.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7150">CVE-2019-7150</a>
-
- <p>Add sanity check for partial core file dynamic data read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7149">CVE-2019-7149</a>
-
- <p>Due to a heap-buffer-overflow problem in function read_srclines()
- a crafted ELF input can cause segmentation faults.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18521">CVE-2018-18521</a>
-
- <p>By using a crafted ELF file, containing a zero sh_entsize, a
- divide-by-zero vulnerability could allow remote attackers to
- cause a denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18520">CVE-2018-18520</a>
-
- <p>By fuzzing an Invalid Address Deference problem in function elf_end
- has been found.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18310">CVE-2018-18310</a>
-
- <p>By fuzzing an Invalid Address Read problem in eu-stack has been
- found.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16062">CVE-2018-16062</a>
-
- <p>By using an AddressSanitizer a heap-buffer-overflow has been found.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7613">CVE-2017-7613</a>
-
- <p>By using fuzzing it was found that an allocation failure was not
- handled properly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7612">CVE-2017-7612</a>
-
- <p>By using a crafted ELF file, containing an invalid sh_entsize, a
- remote attackers could cause a denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7611">CVE-2017-7611</a>
-
- <p>By using a crafted ELF file a remote attackers could cause a denial
- of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7610">CVE-2017-7610</a>
-
- <p>By using a crafted ELF file a remote attackers could cause a denial
- of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7608">CVE-2017-7608</a>
-
- <p>By fuzzing a heap based buffer overflow has been detected.</p></li>
-
-</ul>
-
-<p>For Debian 8 &quot;Jessie&quot;, these problems have been fixed in version
-0.159-4.2+deb8u1.</p>
-
-<p>We recommend that you upgrade your elfutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1689.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1690.data b/english/lts/security/2019/dla-1690.data
deleted file mode 100644
index a7bd4e12d48..00000000000
--- a/english/lts/security/2019/dla-1690.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1690-1 liblivemedia</define-tag>
-<define-tag report_date>2019-02-27</define-tag>
-<define-tag secrefs>CVE-2019-6256 CVE-2019-7314 Bug#919529</define-tag>
-<define-tag packages>liblivemedia</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1690.wml b/english/lts/security/2019/dla-1690.wml
deleted file mode 100644
index 9b276f28696..00000000000
--- a/english/lts/security/2019/dla-1690.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in liblivemedia, the
-LIVE555 RTSP server library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6256">CVE-2019-6256</a>
-
- <p>liblivemedia servers with RTSP-over-HTTP tunneling enabled are
- vulnerable to an invalid function pointer dereference. This issue
- might happen during error handling when processing two GET and
- POST requests being sent with identical x-sessioncookie within
- the same TCP session and might be leveraged by remote attackers
- to cause DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7314">CVE-2019-7314</a>
-
- <p>liblivemedia servers with RTSP-over-HTTP tunneling enabled are
- affected by a use-after-free vulnerability. This vulnerability
- might be triggered by remote attackers to cause DoS (server crash)
- or possibly unspecified other impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2014.01.13-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your liblivemedia packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1690.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1691.data b/english/lts/security/2019/dla-1691.data
deleted file mode 100644
index 87733e240fd..00000000000
--- a/english/lts/security/2019/dla-1691.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1691-1 exiv2</define-tag>
-<define-tag report_date>2019-2-26</define-tag>
-<define-tag secrefs>CVE-2018-17581 CVE-2018-19107 CVE-2018-19108 CVE-2018-19535 CVE-2018-20097</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1691.wml b/english/lts/security/2019/dla-1691.wml
deleted file mode 100644
index cc6bb48e279..00000000000
--- a/english/lts/security/2019/dla-1691.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in exiv2, a EXIF/IPTC/XMP metadata
-manipulation tool.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17581">CVE-2018-17581</a>
-
- <p>A stack overflow due to a recursive function call causing excessive
- stack consumption which leads to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19107">CVE-2018-19107</a>
-
- <p>A heap based buffer over-read caused by an integer overflow could
- result in a denial of service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19108">CVE-2018-19108</a>
-
- <p>There seems to be an infinite loop inside a function that can be
- activated by a crafted image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19535">CVE-2018-19535</a>
-
- <p>A heap based buffer over-read caused could result in a denial of
- service via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20097">CVE-2018-20097</a>
-
- <p>A crafted image could result in a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 &quot;Jessie&quot;, these problems have been fixed in version
-0.24-4.1+deb8u3.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1691.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1692.data b/english/lts/security/2019/dla-1692.data
deleted file mode 100644
index 62bf66425ac..00000000000
--- a/english/lts/security/2019/dla-1692.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1692-1 phpmyadmin</define-tag>
-<define-tag report_date>2019-02-27</define-tag>
-<define-tag secrefs>CVE-2019-6799 Bug#920823</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1692.wml b/english/lts/security/2019/dla-1692.wml
deleted file mode 100644
index c521c9556cb..00000000000
--- a/english/lts/security/2019/dla-1692.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An information leak issue was discovered in phpMyAdmin. An attacker
-can read any file on the server that the web server's user can
-access. This is related to the mysql.allow_local_infile PHP
-configuration. When the AllowArbitraryServer configuration setting is
-set to false (default), the attacker needs a local MySQL account. When
-set to true, the attacker can exploit this with the use of a rogue
-MySQL server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.2.12-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1692.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1693.data b/english/lts/security/2019/dla-1693.data
deleted file mode 100644
index dde17e8065d..00000000000
--- a/english/lts/security/2019/dla-1693.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1693-1 gpac</define-tag>
-<define-tag report_date>2019-2-27</define-tag>
-<define-tag secrefs>CVE-2018-7752 CVE-2018-20760 CVE-2018-20761 CVE-2018-20762 CVE-2018-20763</define-tag>
-<define-tag packages>gpac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1693.wml b/english/lts/security/2019/dla-1693.wml
deleted file mode 100644
index ba56dcd8c3b..00000000000
--- a/english/lts/security/2019/dla-1693.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found by different authors in gpac, an Open
-Source multimedia framework for research and academic purposes.</p>
-
-<p>The issues are basically all buffer overflows in different functions all
-over the package.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.0+svn5324~dfsg1-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your gpac packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1693.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1694.data b/english/lts/security/2019/dla-1694.data
deleted file mode 100644
index 6e36bb687f2..00000000000
--- a/english/lts/security/2019/dla-1694.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1694-1 qemu</define-tag>
-<define-tag report_date>2019-02-28</define-tag>
-<define-tag secrefs>CVE-2018-12617 CVE-2018-16872 CVE-2019-6778 Bug#916397 Bug#902725 Bug#921525</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1694.wml b/english/lts/security/2019/dla-1694.wml
deleted file mode 100644
index bf912ba0b6a..00000000000
--- a/english/lts/security/2019/dla-1694.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in QEMU, a fast processor emulator:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12617">CVE-2018-12617</a>
-
- <p>The qmp_guest_file_read function (qga/commands-posix.c) is affected
- by an integer overflow and subsequent memory allocation failure. This
- weakness might be leveraged by remote attackers to cause denial of
- service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16872">CVE-2018-16872</a>
-
- <p>The usb_mtp_get_object, usb_mtp_get_partial_object and
- usb_mtp_object_readdir functions (hw/usb/dev-mtp.c) are affected by a
- symlink attack. Remote attackers might leverage this vulnerability to
- perform information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6778">CVE-2019-6778</a>
-
- <p>The tcp_emu function (slirp/tcp_subr.c) is affected by a heap buffer
- overflow caused by insufficient validation of available space in the
- sc_rcv->sb_data buffer. Remote attackers might leverage this flaw to
- cause denial of service, or any other unspecified impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u10.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1694.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1695.data b/english/lts/security/2019/dla-1695.data
deleted file mode 100644
index 8b69b9886ce..00000000000
--- a/english/lts/security/2019/dla-1695.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1695-1 sox</define-tag>
-<define-tag report_date>2019-02-28</define-tag>
-<define-tag secrefs>CVE-2017-15370 CVE-2017-15372 CVE-2017-15642 CVE-2017-18189 Bug#878808 Bug#878810 Bug#882144 Bug#881121</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1695.wml b/english/lts/security/2019/dla-1695.wml
deleted file mode 100644
index b698758c912..00000000000
--- a/english/lts/security/2019/dla-1695.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in SoX (Sound eXchange),
-a sound processing program:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15370">CVE-2017-15370</a>
-
- <p>The ImaAdpcmReadBlock function (src/wav.c) is affected by a heap buffer
- overflow. This vulnerability might be leveraged by remote attackers
- using a crafted WAV file to cause denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15372">CVE-2017-15372</a>
-
- <p>The lsx_ms_adpcm_block_expand_i function (adpcm.c) is affected by a
- stack based buffer overflow. This vulnerability might be leveraged by
- remote attackers using a crafted audio file to cause denial of service
- (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15642">CVE-2017-15642</a>
-
- <p>The lsx_aiffstartread function (aiff.c) is affected by a use-after-free
- vulnerability. This flaw might be leveraged by remote attackers using a
- crafted AIFF file to cause denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18189">CVE-2017-18189</a>
-
- <p>The startread function (xa.c) is affected by a null pointer dereference
- vulnerability. This flaw might be leveraged by remote attackers using a
- crafted Maxis XA audio file to cause denial of service (application
- crash).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.4.1-5+deb8u2.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1695.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1696.data b/english/lts/security/2019/dla-1696.data
deleted file mode 100644
index 963def135e4..00000000000
--- a/english/lts/security/2019/dla-1696.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1696-1 ceph</define-tag>
-<define-tag report_date>2019-3-1</define-tag>
-<define-tag secrefs>CVE-2018-14662 CVE-2018-16846 Bug#921948 Bug#921947</define-tag>
-<define-tag packages>ceph</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1696.wml b/english/lts/security/2019/dla-1696.wml
deleted file mode 100644
index 75dc4db250a..00000000000
--- a/english/lts/security/2019/dla-1696.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Ceph, a distributed storage
-and file system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14662">CVE-2018-14662</a>
-
- <p>It was found that authenticated ceph users with read only
- permissions could steal dm-crypt encryption keys used in ceph disk
- encryption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16846">CVE-2018-16846</a>
-
- <p>It was found that authenticated ceph RGW users can cause a denial of
- service against OMAPs holding bucket indices.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.80.7-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your ceph packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1696.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1697.data b/english/lts/security/2019/dla-1697.data
deleted file mode 100644
index 7e9c40136ef..00000000000
--- a/english/lts/security/2019/dla-1697.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1697-1 bind9</define-tag>
-<define-tag report_date>2019-2-28</define-tag>
-<define-tag secrefs>CVE-2018-5745 CVE-2019-6465</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1697.wml b/english/lts/security/2019/dla-1697.wml
deleted file mode 100644
index c5efe2f27ac..00000000000
--- a/english/lts/security/2019/dla-1697.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in bind9, the Internet Domain Name Server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6465">CVE-2019-6465</a>
-
- <p>Zone transfer for DLZs are executed though not permitted by ACLs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5745">CVE-2018-5745</a>
-
- <p>Avoid assertion and thus causing named to deliberately exit when a
- trust anchor's key is replaced with a key which uses an unsupported
- algorithm.</p></li>
-
-</ul>
-
-<p>For Debian 8 &quot;Jessie&quot;, these problems have been fixed in version
-1:9.9.5.dfsg-9+deb8u17.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1697.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1698-2.data b/english/lts/security/2019/dla-1698-2.data
deleted file mode 100644
index 398620d55a7..00000000000
--- a/english/lts/security/2019/dla-1698-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1698-2 file</define-tag>
-<define-tag report_date>2019-11-30</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1698-2.wml b/english/lts/security/2019/dla-1698-2.wml
deleted file mode 100644
index 0e14281d184..00000000000
--- a/english/lts/security/2019/dla-1698-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This update fixes a regression in introduced in 1:5.22+15-2+deb8u5
-causing truncated output of the interpreter name, thanks to Christoph
-Biedl for reporting the problem and cause.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:5.22+15-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your file packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1698-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1698.data b/english/lts/security/2019/dla-1698.data
deleted file mode 100644
index ceb629ee5d7..00000000000
--- a/english/lts/security/2019/dla-1698.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1698-1 file</define-tag>
-<define-tag report_date>2019-02-28</define-tag>
-<define-tag secrefs>CVE-2019-8905 CVE-2019-8907</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1698.wml b/english/lts/security/2019/dla-1698.wml
deleted file mode 100644
index 7745b265aee..00000000000
--- a/english/lts/security/2019/dla-1698.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Potential buffer over-reads in readelf.c have been found in file,
-a popular file type guesser.</p>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2019-8905">CVE-2019-8905</a></p>
-
-<p>We recommend that you upgrade your file packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1698.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1699.data b/english/lts/security/2019/dla-1699.data
deleted file mode 100644
index 10018c8ca91..00000000000
--- a/english/lts/security/2019/dla-1699.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1699-1 ldb</define-tag>
-<define-tag report_date>2019-03-01</define-tag>
-<define-tag secrefs>CVE-2019-3824</define-tag>
-<define-tag packages>ldb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1699.wml b/english/lts/security/2019/dla-1699.wml
deleted file mode 100644
index 0e5188e0839..00000000000
--- a/english/lts/security/2019/dla-1699.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Garming Sam reported an out-of-bounds read in the ldb_wildcard_compare()
-function of ldb, a LDAP-like embedded database, resulting in denial of
-service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:1.1.20-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your ldb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1699.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1700.data b/english/lts/security/2019/dla-1700.data
deleted file mode 100644
index 0778d8be4cb..00000000000
--- a/english/lts/security/2019/dla-1700.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1700-1 uw-imap</define-tag>
-<define-tag report_date>2019-03-01</define-tag>
-<define-tag secrefs>CVE-2018-19518 Bug#914632</define-tag>
-<define-tag packages>uw-imap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1700.wml b/english/lts/security/2019/dla-1700.wml
deleted file mode 100644
index 8141572b5ab..00000000000
--- a/english/lts/security/2019/dla-1700.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in uw-imap, the University of Washington
-IMAP Toolkit, that might allow remote attackers to execute arbitrary OS
-commands if the IMAP server name is untrusted input (e.g., entered by a
-user of a web application) and if rsh has been replaced by a program
-with different argument semantics.</p>
-
-<p>This update disables access to IMAP mailboxes through running imapd over
-rsh, and therefore ssh for users of the client application. Code which
-uses the library can still enable it with tcp_parameters() after making
-sure that the IMAP server name is sanitized.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-8:2007f~dfsg-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your uw-imap packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1700.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1701.data b/english/lts/security/2019/dla-1701.data
deleted file mode 100644
index 0302f6e8825..00000000000
--- a/english/lts/security/2019/dla-1701.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1701-1 openssl</define-tag>
-<define-tag report_date>2019-3-1</define-tag>
-<define-tag secrefs>CVE-2019-1559</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1701.wml b/english/lts/security/2019/dla-1701.wml
deleted file mode 100644
index c68a55e0107..00000000000
--- a/english/lts/security/2019/dla-1701.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Juraj Somorovsky, Robert Merget and Nimrod Aviram discovered a padding
-oracle attack in OpenSSL.</p>
-
-<p>If an application encounters a fatal protocol error and then calls
-SSL_shutdown() twice (once to send a close_notify, and once to receive
-one) then OpenSSL can respond differently to the calling application
-if a 0 byte record is received with invalid padding compared to if a 0
-byte record is received with an invalid MAC. If the application then
-behaves differently based on that in a way that is detectable to the
-remote peer, then this amounts to a padding oracle that could be used
-to decrypt data.</p>
-
-<p>In order for this to be exploitable "non-stitched" ciphersuites must
-be in use. Stitched ciphersuites are optimised implementations of
-certain commonly used ciphersuites. Also the application must call
-SSL_shutdown() twice even if a protocol error has occurred
-(applications should not do this but some do anyway).
-AEAD ciphersuites are not impacted.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.1t-1+deb8u11.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1701.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1702.data b/english/lts/security/2019/dla-1702.data
deleted file mode 100644
index 41e85cbbb3a..00000000000
--- a/english/lts/security/2019/dla-1702.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1702-1 advancecomp</define-tag>
-<define-tag report_date>2019-3-2</define-tag>
-<define-tag secrefs>CVE-2018-1056 CVE-2019-9210 Bug#889270 Bug#923416</define-tag>
-<define-tag packages>advancecomp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1702.wml b/english/lts/security/2019/dla-1702.wml
deleted file mode 100644
index 0b3fa262d84..00000000000
--- a/english/lts/security/2019/dla-1702.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in advancecomp, a collection
-of recompression utilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1056">CVE-2018-1056</a>
-
- <p>Joonun Jang discovered that the advzip tool was prone to a
- heap-based buffer overflow. This might allow an attacker to cause a
- denial-of-service (application crash) or other unspecified impact
- via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9210">CVE-2019-9210</a>
-
- <p>The png_compress function in pngex.cc in advpng has an integer
- overflow upon encountering an invalid PNG size, which results in
- another heap based buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.19-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your advancecomp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1702.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1703.data b/english/lts/security/2019/dla-1703.data
deleted file mode 100644
index d2add2a5e3b..00000000000
--- a/english/lts/security/2019/dla-1703.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1703-1 jackson-databind</define-tag>
-<define-tag report_date>2019-3-4</define-tag>
-<define-tag secrefs>CVE-2018-11307 CVE-2018-12022 CVE-2018-12023 CVE-2018-14718 CVE-2018-14719 CVE-2018-14720 CVE-2018-14721 CVE-2018-19360 CVE-2018-19361 CVE-2018-19362</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1703.wml b/english/lts/security/2019/dla-1703.wml
deleted file mode 100644
index e91b8b441e4..00000000000
--- a/english/lts/security/2019/dla-1703.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several deserialization flaws were discovered in jackson-databind, a fast
-and powerful JSON library for Java, which could allow an unauthenticated
-user to perform code execution. The issue was resolved by extending
-the blacklist and blocking more classes from polymorphic deserialization.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1703.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1704.data b/english/lts/security/2019/dla-1704.data
deleted file mode 100644
index 7d0d78f5d9a..00000000000
--- a/english/lts/security/2019/dla-1704.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1704-1 nss</define-tag>
-<define-tag report_date>2019-03-04</define-tag>
-<define-tag secrefs>CVE-2018-12404 CVE-2018-18508 Bug#921614</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1704.wml b/english/lts/security/2019/dla-1704.wml
deleted file mode 100644
index de1d8848ffd..00000000000
--- a/english/lts/security/2019/dla-1704.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Vulnerabilities have been discovered in nss, the Mozilla Network
-Security Service library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12404">CVE-2018-12404</a>
-
- <p>Cache side-channel variant of the Bleichenbacher attack</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18508">CVE-2018-18508</a>
-
- <p>NULL pointer dereference in several CMS functions resulting in a
- denial of service</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:3.26-1+debu8u4.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1704.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1705.data b/english/lts/security/2019/dla-1705.data
deleted file mode 100644
index 62a1b5e9538..00000000000
--- a/english/lts/security/2019/dla-1705.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1705-1 sox</define-tag>
-<define-tag report_date>2019-03-05</define-tag>
-<define-tag secrefs>CVE-2017-11332 CVE-2017-11358 CVE-2017-11359 CVE-2017-15371 Bug#878809 Bug#870328</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1705.wml b/english/lts/security/2019/dla-1705.wml
deleted file mode 100644
index ec72f513a3e..00000000000
--- a/english/lts/security/2019/dla-1705.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in SoX (Sound eXchange),
-a sound processing program:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11332">CVE-2017-11332</a>
-
- <p>The startread function (wav.c) is affected by a divide-by-zero
- vulnerability when processing WAV file with zero channel count. This
- flaw might be leveraged by remote attackers using a crafted WAV file
- to perform denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11358">CVE-2017-11358</a>
-
- <p>The read_samples function (hcom.c) is affected by an invalid memory read
- vulnerability when processing HCOM files with invalid dictionnaries. This
- flaw might be leveraged by remote attackers using a crafted HCOM file to
- perform denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11359">CVE-2017-11359</a>
-
- <p>The wavwritehdr function (wav.c) is affected by a divide-by-zero
- vulnerability when processing WAV files with invalid channel count over
- 16 bits. This flaw might be leveraged by remote attackers using a crafted
- WAV file to perform denial of service (application crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15371">CVE-2017-15371</a>
-
- <p>The sox_append_comment() function (formats.c) is vulnerable to a reachable
- assertion when processing FLAC files with metadata declaring more comments
- than provided. This flaw might be leveraged by remote attackers using
- crafted FLAC data to perform denial of service (application crash).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.4.1-5+deb8u3.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1705.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1706.data b/english/lts/security/2019/dla-1706.data
deleted file mode 100644
index 1949f36fdc2..00000000000
--- a/english/lts/security/2019/dla-1706.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1706-1 poppler</define-tag>
-<define-tag report_date>2019-3-8</define-tag>
-<define-tag secrefs>CVE-2018-19058 CVE-2018-20481 CVE-2018-20662 CVE-2019-7310 CVE-2019-9200 Bug#913177 Bug#917325 Bug#918158 Bug#921215 Bug#923414</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1706.wml b/english/lts/security/2019/dla-1706.wml
deleted file mode 100644
index a96f06d88d4..00000000000
--- a/english/lts/security/2019/dla-1706.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in the poppler PDF
-rendering shared library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19058">CVE-2018-19058</a>
-
- <p>A reachable abort in Object.h will lead to denial-of-service because
- EmbFile::save2 in FileSpec.cc lacks a stream check before saving an
- embedded file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20481">CVE-2018-20481</a>
-
- <p>Poppler mishandles unallocated XRef entries, which allows remote
- attackers to cause a denial-of-service (NULL pointer dereference)
- via a crafted PDF document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20662">CVE-2018-20662</a>
-
- <p>Poppler allows attackers to cause a denial-of-service (application
- crash and segmentation fault by crafting a PDF file in which an xref
- data structure is corrupted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7310">CVE-2019-7310</a>
-
- <p>A heap-based buffer over-read (due to an integer signedness error in
- the XRef::getEntry function in XRef.cc) allows remote attackers to
- cause a denial of service (application crash) or possibly have
- unspecified other impact via a crafted PDF document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9200">CVE-2019-9200</a>
-
- <p>A heap-based buffer underwrite exists in ImageStream::getLine()
- located at Stream.cc that can (for example) be triggered by sending
- a crafted PDF file to the pdfimages binary. It allows an attacker to
- cause denial-of-service (segmentation fault) or possibly have
- unspecified other impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.26.5-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1706.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1707.data b/english/lts/security/2019/dla-1707.data
deleted file mode 100644
index ca21a9cec32..00000000000
--- a/english/lts/security/2019/dla-1707.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1707-1 symfony</define-tag>
-<define-tag report_date>2019-03-09</define-tag>
-<define-tag secrefs>CVE-2017-16652 CVE-2017-16654 CVE-2018-11385 CVE-2018-11408 CVE-2018-14773 CVE-2018-19789 CVE-2018-19790</define-tag>
-<define-tag packages>symfony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1707.wml b/english/lts/security/2019/dla-1707.wml
deleted file mode 100644
index eb2a4fcdbea..00000000000
--- a/english/lts/security/2019/dla-1707.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities have been discovered in symfony, a PHP
-web application framework. Numerous symfony components are affected:
-Security, bundle readers, session handling, SecurityBundle,
-HttpFoundation, Form, and Security\Http.</p>
-
-<p>The corresponding upstream advisories contain further details:</p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2017-16652">CVE-2017-16652</a>]
-<a href="https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers">https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers</a></p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2017-16654">CVE-2017-16654</a>]
-<a href="https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths">https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths</a></p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2018-11385">CVE-2018-11385</a>]
-<a href="https://symfony.com/blog/cve-2018-11385-session-fixation-issue-for-guard-authentication">https://symfony.com/blog/cve-2018-11385-session-fixation-issue-for-guard-authentication</a></p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2018-11408">CVE-2018-11408</a>]
-<a href="https://symfony.com/blog/cve-2018-11408-open-redirect-vulnerability-on-security-handlers">https://symfony.com/blog/cve-2018-11408-open-redirect-vulnerability-on-security-handlers</a></p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2018-14773">CVE-2018-14773</a>]
-<a href="https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers">https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers</a></p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2018-19789">CVE-2018-19789</a>]
-<a href="https://symfony.com/blog/cve-2018-19789-disclosure-of-uploaded-files-full-path">https://symfony.com/blog/cve-2018-19789-disclosure-of-uploaded-files-full-path</a></p>
-
-<p>[<a href="https://security-tracker.debian.org/tracker/CVE-2018-19790">CVE-2018-19790</a>]
-<a href="https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-when-using-security-http">https://symfony.com/blog/cve-2018-19790-open-redirect-vulnerability-when-using-security-http</a></p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.3.21+dfsg-4+deb8u4.</p>
-
-<p>We recommend that you upgrade your symfony packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1707.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1708.data b/english/lts/security/2019/dla-1708.data
deleted file mode 100644
index 2488aa9251f..00000000000
--- a/english/lts/security/2019/dla-1708.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1708-1 zabbix</define-tag>
-<define-tag report_date>2019-3-11</define-tag>
-<define-tag secrefs>CVE-2016-10742 CVE-2017-2826</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1708.wml b/english/lts/security/2019/dla-1708.wml
deleted file mode 100644
index 30445fc539d..00000000000
--- a/english/lts/security/2019/dla-1708.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in Zabbix, a
-server/client network monitoring solution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10742">CVE-2016-10742</a>
-
- <p>Zabbix allowed remote attackers to redirect to external links by
- misusing the request parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2826">CVE-2017-2826</a>
-
- <p>An information disclosure vulnerability exists in the iConfig proxy
- request of Zabbix server. A specially crafted iConfig proxy request
- can cause the Zabbix server to send the configuration information of
- any Zabbix proxy, resulting in information disclosure. An attacker
- can make requests from an active Zabbix proxy to trigger this
- vulnerability.</p></li>
-
-</ul>
-
-<p>This update also includes several other bug fixes and improvements. For
-more information please refer to the upstream changelog file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.2.23+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1708.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1709.data b/english/lts/security/2019/dla-1709.data
deleted file mode 100644
index a741e792580..00000000000
--- a/english/lts/security/2019/dla-1709.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1709-1 waagent</define-tag>
-<define-tag report_date>2019-3-13</define-tag>
-<define-tag secrefs>CVE-2019-0804</define-tag>
-<define-tag packages>waagent</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1709.wml b/english/lts/security/2019/dla-1709.wml
deleted file mode 100644
index 9d9f43e6cdb..00000000000
--- a/english/lts/security/2019/dla-1709.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Francis McBratney discovered that the Windows Azure Linux Agent created
-swap files with world-readable permissions, resulting in information
-disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.2.18-3~deb8u2.</p>
-
-<p>We recommend that you upgrade your waagent packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1709.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1710.data b/english/lts/security/2019/dla-1710.data
deleted file mode 100644
index b7017b87f97..00000000000
--- a/english/lts/security/2019/dla-1710.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1710-1 xmltooling</define-tag>
-<define-tag report_date>2019-03-13</define-tag>
-<define-tag secrefs>CVE-2019-9628 Bug#924346</define-tag>
-<define-tag packages>xmltooling</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1710.wml b/english/lts/security/2019/dla-1710.wml
deleted file mode 100644
index 8835b510f25..00000000000
--- a/english/lts/security/2019/dla-1710.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ross Geerlings discovered that the XMLTooling library didn't correctly
-handle exceptions on malformed XML declarations, which could result in
-denial of service against the application using XMLTooling.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.5.3-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your xmltooling packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1710.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1711.data b/english/lts/security/2019/dla-1711.data
deleted file mode 100644
index 87028749198..00000000000
--- a/english/lts/security/2019/dla-1711.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1711-1 systemd</define-tag>
-<define-tag report_date>2019-3-13</define-tag>
-<define-tag secrefs>CVE-2019-3815 Bug#924060</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1711.wml b/english/lts/security/2019/dla-1711.wml
deleted file mode 100644
index 13654dc31d9..00000000000
--- a/english/lts/security/2019/dla-1711.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A memory leak was discovered in the backport of fixes for
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-16864">CVE-2018-16864</a> in systemd-journald.</p>
-
-<p>Function dispatch_message_real() in journald-server.c does not free
-allocated memory to store the `_CMDLINE=` entry. A local attacker may
-use this flaw to make systemd-journald crash.</p>
-
-<p>Note that as the systemd-journald service is not restarted automatically
-a restart of the service or more safely a reboot is advised.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-215-17+deb8u11.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1711.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1712.data b/english/lts/security/2019/dla-1712.data
deleted file mode 100644
index cb6aa464e1f..00000000000
--- a/english/lts/security/2019/dla-1712.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1712-1 libsndfile</define-tag>
-<define-tag report_date>2019-3-13</define-tag>
-<define-tag secrefs>CVE-2019-3832</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1712.wml b/english/lts/security/2019/dla-1712.wml
deleted file mode 100644
index 78a3d05d754..00000000000
--- a/english/lts/security/2019/dla-1712.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-19758">CVE-2018-19758</a> was incomplete. That
-has been addressed in this update. The description
-for <a href="https://security-tracker.debian.org/tracker/CVE-2018-19758">CVE-2018-19758</a> follows:</p>
-
- <p>A heap-buffer-overflow vulnerability was discovered in libsndfile, the
- library for reading and writing files containing sampled sound. This flaw
- might be triggered by remote attackers to cause denial of service (out of
- bounds read and application crash).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.25-9.1+deb8u4.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1712.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1713-2.data b/english/lts/security/2019/dla-1713-2.data
deleted file mode 100644
index 0866fca90ee..00000000000
--- a/english/lts/security/2019/dla-1713-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1713-2 libsdl1.2</define-tag>
-<define-tag report_date>2019-10-17</define-tag>
-<define-tag secrefs>CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638</define-tag>
-<define-tag packages>libsdl1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1713-2.wml b/english/lts/security/2019/dla-1713-2.wml
deleted file mode 100644
index 3b6efe909ba..00000000000
--- a/english/lts/security/2019/dla-1713-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of libsdl1.2 released as DLA 1713-1 led to a regression, caused
-by an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-7637">CVE-2019-7637</a>. This issue was known upstream and
-resulted, among others, in windows versions from libsdl1.2 failing to set
-video mode.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.15-10+deb8u2.</p>
-
-<p>We recommend that you upgrade your libsdl1.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1713-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1713.data b/english/lts/security/2019/dla-1713.data
deleted file mode 100644
index 34d135d83a4..00000000000
--- a/english/lts/security/2019/dla-1713.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1713-1 libsdl1.2</define-tag>
-<define-tag report_date>2019-3-13</define-tag>
-<define-tag secrefs>CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638</define-tag>
-<define-tag packages>libsdl1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1713.wml b/english/lts/security/2019/dla-1713.wml
deleted file mode 100644
index ba46c71a846..00000000000
--- a/english/lts/security/2019/dla-1713.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple buffer overflow security issues have been found in libsdl1.2,
-a library that allows low level access to a video frame buffer, audio
-output, mouse, and keyboard.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.15-10+deb8u1.</p>
-
-<p>We recommend that you upgrade your libsdl1.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1713.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1714-2.data b/english/lts/security/2019/dla-1714-2.data
deleted file mode 100644
index e46d177345c..00000000000
--- a/english/lts/security/2019/dla-1714-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1714-2 libsdl2</define-tag>
-<define-tag report_date>2019-10-17</define-tag>
-<define-tag secrefs>CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638</define-tag>
-<define-tag packages>libsdl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1714-2.wml b/english/lts/security/2019/dla-1714-2.wml
deleted file mode 100644
index 4bcf108fc9c..00000000000
--- a/english/lts/security/2019/dla-1714-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of libsdl2 released as DLA 1714-1 led to several regressions, as
-reported by Avital Ostromich. These regressions are caused by libsdl1.2
-patches for <a href="https://security-tracker.debian.org/tracker/CVE-2019-7637">CVE-2019-7637</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-7635">CVE-2019-7635</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-7638">CVE-2019-7638</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2019-7636">CVE-2019-7636</a> being
-applied to libsdl2 without adaptations.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.2+dfsg1-6+deb8u2.</p>
-
-<p>We recommend that you upgrade your libsdl2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1714-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1714.data b/english/lts/security/2019/dla-1714.data
deleted file mode 100644
index 8729f6398cd..00000000000
--- a/english/lts/security/2019/dla-1714.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1714-1 libsdl2</define-tag>
-<define-tag report_date>2019-3-13</define-tag>
-<define-tag secrefs>CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638</define-tag>
-<define-tag packages>libsdl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1714.wml b/english/lts/security/2019/dla-1714.wml
deleted file mode 100644
index 321acde95b9..00000000000
--- a/english/lts/security/2019/dla-1714.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple buffer overflow security issues have been found in libsdl2,
-a library that allows low level access to a video frame buffer, audio
-output, mouse, and keyboard.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.0.2+dfsg1-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your libsdl2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1714.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1715.data b/english/lts/security/2019/dla-1715.data
deleted file mode 100644
index 3a201ea8dee..00000000000
--- a/english/lts/security/2019/dla-1715.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1715-1 linux-4.9</define-tag>
-<define-tag report_date>2019-03-15</define-tag>
-<define-tag secrefs>CVE-2017-18249 CVE-2018-1128 CVE-2018-1129 CVE-2018-3639 CVE-2018-5391 CVE-2018-5848 CVE-2018-6554 CVE-2018-12896 CVE-2018-13053 CVE-2018-13096 CVE-2018-13097 CVE-2018-13100 CVE-2018-13406 CVE-2018-14610 CVE-2018-14611 CVE-2018-14612 CVE-2018-14613 CVE-2018-14614 CVE-2018-14616 CVE-2018-15471 CVE-2018-16862 CVE-2018-17972 CVE-2018-18281 CVE-2018-18690 CVE-2018-18710 CVE-2018-19407 Bug#890034 Bug#896911 Bug#907581 Bug#915229 Bug#915231</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1715.wml b/english/lts/security/2019/dla-1715.wml
deleted file mode 100644
index 9721c6e67fb..00000000000
--- a/english/lts/security/2019/dla-1715.wml
+++ /dev/null
@@ -1,153 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18249">CVE-2017-18249</a>
-
- <p>A race condition was discovered in the disk space allocator of
- F2FS. A user with access to an F2FS volume could use this to cause
- a denial of service or other security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1128">CVE-2018-1128</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-1129">CVE-2018-1129</a>
-
- <p>The cephx authentication protocol used by Ceph was susceptible to
- replay attacks, and calculated signatures incorrectly. These
- vulnerabilities in the server required changes to authentication
- that are incompatible with existing clients. The kernel's client
- code has now been updated to be compatible with the fixed server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a> (SSB)
-
- <p>Multiple researchers have discovered that Speculative Store Bypass
- (SSB), a feature implemented in many processors, could be used to
- read sensitive information from another context. In particular,
- code in a software sandbox may be able to read sensitive
- information from outside the sandbox. This issue is also known as
- Spectre variant 4.</p>
-
- <p>This update adds a further mitigation for this issue in the eBPF
- (Extended Berkeley Packet Filter) implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5391">CVE-2018-5391</a> (FragmentSmack)
-
- <p>Juha-Matti Tilli discovered a flaw in the way the Linux kernel
- handled reassembly of fragmented IPv4 and IPv6 packets. A remote
- attacker can take advantage of this flaw to trigger time and
- calculation expensive fragment reassembly algorithms by sending
- specially crafted packets, leading to remote denial of service.</p>
-
- <p>This was previously mitigated by reducing the default limits on
- memory usage for incomplete fragmented packets. This update
- replaces that mitigation with a more complete fix.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5848">CVE-2018-5848</a>
-
- <p>The wil6210 wifi driver did not properly validate lengths in scan
- and connection requests, leading to a possible buffer overflow.
- On systems using this driver, a local user with the CAP_NET_ADMIN
- capability could use this for denial of service (memory corruption
- or crash) or potentially for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12896">CVE-2018-12896</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-13053">CVE-2018-13053</a>
-
- <p>Team OWL337 reported possible integer overflows in the POSIX
- timer implementation. These might have some security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13096">CVE-2018-13096</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-13097">CVE-2018-13097</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-13100">CVE-2018-13100</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14614">CVE-2018-14614</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14616">CVE-2018-14616</a>
-
- <p>Wen Xu from SSLab at Gatech reported that crafted F2FS volumes
- could trigger a crash (BUG, Oops, or division by zero) and/or
- out-of-bounds memory access. An attacker able to mount such a
- volume could use this to cause a denial of service or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13406">CVE-2018-13406</a>
-
- <p>Dr Silvio Cesare of InfoSect reported a potential integer overflow
- in the uvesafb driver. A user with permission to access such a
- device might be able to use this for denial of service or
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14610">CVE-2018-14610</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14611">CVE-2018-14611</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14612">CVE-2018-14612</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14613">CVE-2018-14613</a>
-
- <p>Wen Xu from SSLab at Gatech reported that crafted Btrfs volumes
- could trigger a crash (Oops) and/or out-of-bounds memory access.
- An attacker able to mount such a volume could use this to cause a
- denial of service or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15471">CVE-2018-15471</a> (XSA-270)
-
- <p>Felix Wilhelm of Google Project Zero discovered a flaw in the hash
- handling of the xen-netback Linux kernel module. A malicious or
- buggy frontend may cause the (usually privileged) backend to make
- out of bounds memory accesses, potentially resulting in privilege
- escalation, denial of service, or information leaks.</p>
-
- <p>https://xenbits.xen.org/xsa/advisory-270.html</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16862">CVE-2018-16862</a>
-
- <p>Vasily Averin and Pavel Tikhomirov from Virtuozzo Kernel Team
- discovered that the cleancache memory management feature did not
- invalidate cached data for deleted files. On Xen guests using the
- tmem driver, local users could potentially read data from other
- users' deleted files if they were able to create new files on the
- same volume.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17972">CVE-2018-17972</a>
-
- <p>Jann Horn reported that the /proc/*/stack files in procfs leaked
- sensitive data from the kernel. These files are now only readable
- by users with the CAP_SYS_ADMIN capability (usually only root)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18281">CVE-2018-18281</a>
-
- <p>Jann Horn reported a race condition in the virtual memory manager
- that can result in a process briefly having access to memory after
- it is freed and reallocated. A local user could possibly exploit
- this for denial of service (memory corruption) or for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18690">CVE-2018-18690</a>
-
- <p>Kanda Motohiro reported that XFS did not correctly handle some
- xattr (extended attribute) writes that require changing the disk
- format of the xattr. A user with access to an XFS volume could use
- this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18710">CVE-2018-18710</a>
-
- <p>It was discovered that the cdrom driver does not correctly
- validate the parameter to the CDROM_SELECT_DISC ioctl. A user with
- access to a cdrom device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19407">CVE-2018-19407</a>
-
- <p>Wei Wu reported a potential crash (Oops) in the KVM implementation
- for x86 processors. A user with access to /dev/kvm could use this
- for denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.144-3.1~deb8u1. This version also includes fixes for Debian bugs
-#890034, #896911, #907581, #915229, and #915231; and other fixes
-included in upstream stable updates.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1715.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1716.data b/english/lts/security/2019/dla-1716.data
deleted file mode 100644
index b73622daadb..00000000000
--- a/english/lts/security/2019/dla-1716.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1716-1 ikiwiki</define-tag>
-<define-tag report_date>2019-03-18</define-tag>
-<define-tag secrefs>CVE-2019-9187</define-tag>
-<define-tag packages>ikiwiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1716.wml b/english/lts/security/2019/dla-1716.wml
deleted file mode 100644
index 13606bf1782..00000000000
--- a/english/lts/security/2019/dla-1716.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ikiwiki maintainers discovered that the aggregate plugin did not use
-LWPx::ParanoidAgent. On sites where the aggregate plugin is enabled, authorized
-wiki editors could tell ikiwiki to fetch potentially undesired URIs even if
-LWPx::ParanoidAgent was installed:</p>
-
- <p>local files via file: URIs
- other URI schemes that might be misused by attackers, such as gopher:
- hosts that resolve to loopback IP addresses (127.x.x.x)
- hosts that resolve to RFC 1918 IP addresses (192.168.x.x etc.)</p>
-
-<p>This could be used by an attacker to publish information that should not have
-been accessible, cause denial of service by requesting <q>tarpit</q> URIs that are
-slow to respond, or cause undesired side-effects if local web servers implement
-<q>unsafe</q> GET requests. (<a href="https://security-tracker.debian.org/tracker/CVE-2019-9187">CVE-2019-9187</a>)</p>
-
-<p>Additionally, if liblwpx-paranoidagent-perl is not installed, the
-blogspam, openid and pinger plugins would fall back to LWP, which is
-susceptible to similar attacks. This is unlikely to be a practical problem for
-the blogspam plugin because the URL it requests is under the control of the
-wiki administrator, but the openid plugin can request URLs controlled by
-unauthenticated remote users, and the pinger plugin can request URLs controlled
-by authorized wiki editors.</p>
-
-<p>This is addressed in ikiwiki 3.20190228 as follows, with the same fixes
-backported to Debian 9 in version 3.20170111.1:</p>
-
-<ul>
-
-<li>URI schemes other than http: and https: are not accepted, preventing access
- to file:, gopher:, etc.</li>
-
-<li>If a proxy is configured in the ikiwiki setup file, it is used for all
- outgoing http: and https: requests. In this case the proxy is responsible for
- blocking any requests that are undesired, including loopback or RFC 1918
- addresses.</li>
-
-<li>If a proxy is not configured, and liblwpx-paranoidagent-perl is installed, it
- will be used. This prevents loopback and RFC 1918 IP addresses, and sets a
- timeout to avoid denial of service via <q>tarpit</q> URIs.</li>
-
-<li>Otherwise, the ordinary LWP user-agent will be used. This allows requests to
- loopback and RFC 1918 IP addresses, and has less robust timeout behaviour.
- We are not treating this as a vulnerability: if this behaviour is not
- acceptable for your site, please make sure to install LWPx::ParanoidAgent or
- disable the affected plugins.</li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.20141016.4+deb8u1.</p>
-
-<p>We recommend that you upgrade your ikiwiki packages. In addition it is also
-recommended that you have liblwpx-paranoidagent-perl installed, which listed in
-the recommends field of ikiwiki.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1716.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1717.data b/english/lts/security/2019/dla-1717.data
deleted file mode 100644
index f9d2b9414e5..00000000000
--- a/english/lts/security/2019/dla-1717.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1717-1 rdflib</define-tag>
-<define-tag report_date>2019-03-20</define-tag>
-<define-tag secrefs>CVE-2019-7653 Bug##921751</define-tag>
-<define-tag packages>rdflib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1717.wml b/english/lts/security/2019/dla-1717.wml
deleted file mode 100644
index f94d3de4078..00000000000
--- a/english/lts/security/2019/dla-1717.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The CLI tools in python-rdflib-tools can load python modules
-found in the current directory. This happens because "python -m"
-appends the current directory in the python path.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.1.2-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your rdflib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1717.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1718.data b/english/lts/security/2019/dla-1718.data
deleted file mode 100644
index fad725513f8..00000000000
--- a/english/lts/security/2019/dla-1718.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1718-1 sqlalchemy</define-tag>
-<define-tag report_date>2019-03-18</define-tag>
-<define-tag secrefs>CVE-2019-7164 CVE-2019-7548 Bug#922669</define-tag>
-<define-tag packages>sqlalchemy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1718.wml b/english/lts/security/2019/dla-1718.wml
deleted file mode 100644
index 6bd290600ae..00000000000
--- a/english/lts/security/2019/dla-1718.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities were discovered in SQLALchemy, a Python SQL
-Toolkit and Object Relational Mapper.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7164">CVE-2019-7164</a>
-
- <p>SQLAlchemy allows SQL Injection via the order_by parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7548">CVE-2019-7548</a>
-
- <p>SQLAlchemy has SQL Injection when the group_by parameter can be controlled.</p></li>
-
-</ul>
-
-<p>The SQLAlchemy project warns that these security fixes break the
-seldom-used text coercion feature.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.9.8+dfsg-0.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your sqlalchemy packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1718.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1719.data b/english/lts/security/2019/dla-1719.data
deleted file mode 100644
index 9c6deb646ef..00000000000
--- a/english/lts/security/2019/dla-1719.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1719-1 libjpeg-turbo</define-tag>
-<define-tag report_date>2019-03-18</define-tag>
-<define-tag secrefs>CVE-2018-14498 Bug#924678</define-tag>
-<define-tag packages>libjpeg-turbo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1719.wml b/english/lts/security/2019/dla-1719.wml
deleted file mode 100644
index 951da8e5fd0..00000000000
--- a/english/lts/security/2019/dla-1719.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial of service vulnerability in
-the libjpeg-turbo CPU-optimised JPEG image library. A heap-based
-buffer over-read could be triggered by a specially-crafted bitmap
-(BMP) file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14498">CVE-2018-14498</a>
-
- <p>get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.3.1-12+deb8u2.</p>
-
-<p>We recommend that you upgrade your libjpeg-turbo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1719.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1720.data b/english/lts/security/2019/dla-1720.data
deleted file mode 100644
index 4511c2cc18c..00000000000
--- a/english/lts/security/2019/dla-1720.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1720-1 liblivemedia</define-tag>
-<define-tag report_date>2019-03-18</define-tag>
-<define-tag secrefs>CVE-2019-9215 Bug#924655</define-tag>
-<define-tag packages>liblivemedia</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1720.wml b/english/lts/security/2019/dla-1720.wml
deleted file mode 100644
index 0f8d1316a74..00000000000
--- a/english/lts/security/2019/dla-1720.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that liblivemedia, the LIVE555 RTSP server library,
-is vulnerable to an invalid memory access when processing the
-Authorization header field. Remote attackers could leverage this
-vulnerability to possibly trigger code execution or denial of service
-(OOB access and application crash) via a crafted HTTP header.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2014.01.13-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your liblivemedia packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1720.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1721.data b/english/lts/security/2019/dla-1721.data
deleted file mode 100644
index f417dbd2a58..00000000000
--- a/english/lts/security/2019/dla-1721.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1721-1 otrs2</define-tag>
-<define-tag report_date>2019-03-19</define-tag>
-<define-tag secrefs>CVE-2019-9752</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1721.wml b/english/lts/security/2019/dla-1721.wml
deleted file mode 100644
index 0c5ee1a02d4..00000000000
--- a/english/lts/security/2019/dla-1721.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been discovered that OTRS (Open source Ticket Request System)
-is susceptible to code injection vulnerability. An attacker who is
-logged into OTRS as an agent or a customer user may upload a carefully
-crafted resource in order to cause execution of JavaScript in the
-context of OTRS. This is related to Content-type mishandling.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.3.18-1+deb8u8.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1721.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1722.data b/english/lts/security/2019/dla-1722.data
deleted file mode 100644
index 01eb397089b..00000000000
--- a/english/lts/security/2019/dla-1722.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1722-1 firefox-esr</define-tag>
-<define-tag report_date>2019-3-21</define-tag>
-<define-tag secrefs>CVE-2018-18506 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9795 CVE-2019-9796</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1722.wml b/english/lts/security/2019/dla-1722.wml
deleted file mode 100644
index 8ddf14a52df..00000000000
--- a/english/lts/security/2019/dla-1722.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.6.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1722.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1723.data b/english/lts/security/2019/dla-1723.data
deleted file mode 100644
index f089781d4dc..00000000000
--- a/english/lts/security/2019/dla-1723.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1723-1 cron</define-tag>
-<define-tag report_date>2019-3-21</define-tag>
-<define-tag secrefs>CVE-2017-9525 CVE-2019-9704 CVE-2019-9705 CVE-2019-9706 Bug#809167</define-tag>
-<define-tag packages>cron</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1723.wml b/english/lts/security/2019/dla-1723.wml
deleted file mode 100644
index 602730f0e30..00000000000
--- a/english/lts/security/2019/dla-1723.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various security problems have been discovered in Debian's CRON scheduler.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9525">CVE-2017-9525</a>
-
- <p>Fix group crontab to root escalation via the Debian package's
- postinst script as described by Alexander Peslyak (Solar Designer) in
- <a href="http://www.openwall.com/lists/oss-security/2017/06/08/3">http://www.openwall.com/lists/oss-security/2017/06/08/3</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9704">CVE-2019-9704</a>
-
- <p>DoS: Fix unchecked return of calloc(). Florian Weimer discovered that
- a missing check for the return value of calloc() could crash the
- daemon, which could be triggered by a very large crontab created by a
- user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9705">CVE-2019-9705</a>
-
- <p>Enforce maximum crontab line count of 1000 to prevent a malicious
- user from creating an excessivly large crontab. The daemon will log a
- warning for existing files, and crontab(1) will refuse to create new
- ones.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9706">CVE-2019-9706</a>
-
- <p>A user reported a use-after-free condition in the cron daemon,
- leading to a possible Denial-of-Service scenario by crashing the
- daemon.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.0pl1-127+deb8u2.</p>
-
-<p>We recommend that you upgrade your cron packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1723.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1724.data b/english/lts/security/2019/dla-1724.data
deleted file mode 100644
index 653d1597cb2..00000000000
--- a/english/lts/security/2019/dla-1724.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1724-1 ntfs-3g</define-tag>
-<define-tag report_date>2019-3-22</define-tag>
-<define-tag secrefs>CVE-2019-9755</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1724.wml b/english/lts/security/2019/dla-1724.wml
deleted file mode 100644
index 32351b49af6..00000000000
--- a/english/lts/security/2019/dla-1724.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer overflow was discovered in NTFS-3G, a read-write
-NTFS driver for FUSE. A local user can take advantage of this flaw for
-local root privilege escalation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2014.2.15AR.2-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your ntfs-3g packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1724.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1725.data b/english/lts/security/2019/dla-1725.data
deleted file mode 100644
index f061267a183..00000000000
--- a/english/lts/security/2019/dla-1725.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1725-1 rsync</define-tag>
-<define-tag report_date>2019-3-24</define-tag>
-<define-tag secrefs>CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843 CVE-2018-5764</define-tag>
-<define-tag packages>rsync</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1725.wml b/english/lts/security/2019/dla-1725.wml
deleted file mode 100644
index 1e2ebab5da0..00000000000
--- a/english/lts/security/2019/dla-1725.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Trail of Bits used the automated vulnerability discovery tools developed
-for the DARPA Cyber Grand Challenge to audit zlib. As rsync, a fast,
-versatile, remote (and local) file-copying tool, uses an embedded copy of
-zlib, those issues are also present in rsync.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9840">CVE-2016-9840</a>
-
- <p>In order to avoid undefined behavior, remove offset pointer
- optimization, as this is not compliant with the C standard.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9841">CVE-2016-9841</a>
-
- <p>Only use post-increment to be compliant with the C standard.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9842">CVE-2016-9842</a>
-
- <p>In order to avoid undefined behavior, do not shift negative values,
- as this is not compliant with the C standard.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9843">CVE-2016-9843</a>
-
- <p>In order to avoid undefined behavior, do not pre-decrement a pointer
- in big-endian CRC calculation, as this is not compliant with the
- C standard.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5764">CVE-2018-5764</a>
-
- <p>Prevent remote attackers from being able to bypass the
- argument-sanitization protection mechanism by ignoring --protect-args
- when already sent by client.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.1.1-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your rsync packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1725.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1726.data b/english/lts/security/2019/dla-1726.data
deleted file mode 100644
index 5626e729749..00000000000
--- a/english/lts/security/2019/dla-1726.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1726-1 bash</define-tag>
-<define-tag report_date>2019-3-25</define-tag>
-<define-tag secrefs>CVE-2016-9401 CVE-2019-9924</define-tag>
-<define-tag packages>bash</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1726.wml b/english/lts/security/2019/dla-1726.wml
deleted file mode 100644
index 81374a468bd..00000000000
--- a/english/lts/security/2019/dla-1726.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues have been fixed in bash, the GNU Bourne-Again Shell:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9401">CVE-2016-9401</a>
-
- <p>The popd builtin segfaulted when called with negative out of range
- offsets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9924">CVE-2019-9924</a>
-
- <p>Sylvain Beucler discovered that it was possible to call commands
- that contained a slash when in restricted mode (rbash) by adding
- them to the BASH_CMDS array.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.3-11+deb8u2.</p>
-
-<p>We recommend that you upgrade your bash packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1726.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1727.data b/english/lts/security/2019/dla-1727.data
deleted file mode 100644
index 69b2a1541b6..00000000000
--- a/english/lts/security/2019/dla-1727.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1727-1 firefox-esr</define-tag>
-<define-tag report_date>2019-3-25</define-tag>
-<define-tag secrefs>CVE-2019-9810 CVE-2019-9813</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1727.wml b/english/lts/security/2019/dla-1727.wml
deleted file mode 100644
index 04210a9a869..00000000000
--- a/english/lts/security/2019/dla-1727.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.6.1esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1727.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1728.data b/english/lts/security/2019/dla-1728.data
deleted file mode 100644
index e4d36be0ec6..00000000000
--- a/english/lts/security/2019/dla-1728.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1728-1 openssh</define-tag>
-<define-tag report_date>2019-3-25</define-tag>
-<define-tag secrefs>CVE-2018-20685 CVE-2019-6109 CVE-2019-6111 Bug#793412 Bug#919101 Bug#923486</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1728.wml b/english/lts/security/2019/dla-1728.wml
deleted file mode 100644
index d3345ed2483..00000000000
--- a/english/lts/security/2019/dla-1728.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple scp client vulnerabilities have been discovered in OpenSSH, the
-premier connectivity tool for secure remote shell login and secure file
-transfer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20685">CVE-2018-20685</a>
-
- <p>In scp.c, the scp client allowed remote SSH servers to bypass
- intended access restrictions via the filename of . or an empty
- filename. The impact was modifying the permissions of the target
- directory on the client side.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6109">CVE-2019-6109</a>
-
- <p>Due to missing character encoding in the progress display, a
- malicious server (or Man-in-The-Middle attacker) was able to employ
- crafted object names to manipulate the client output, e.g., by using
- ANSI control codes to hide additional files being transferred. This
- affected refresh_progress_meter() in progressmeter.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6111">CVE-2019-6111</a>
-
- <p>Due to the scp implementation being derived from 1983 rcp, the server
- chooses which files/directories are sent to the client. However, the
- scp client only performed cursory validation of the object name
- returned (only directory traversal attacks are prevented). A
- malicious scp server (or Man-in-The-Middle attacker) was able to
- overwrite arbitrary files in the scp client target directory. If
- recursive operation (-r) was performed, the server was able to
- manipulate subdirectories, as well (for example, to overwrite the
- .ssh/authorized_keys file).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:6.7p1-5+deb8u8.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1728.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1729.data b/english/lts/security/2019/dla-1729.data
deleted file mode 100644
index 2aaa769aa0c..00000000000
--- a/english/lts/security/2019/dla-1729.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1729-1 wireshark</define-tag>
-<define-tag report_date>2019-3-25</define-tag>
-<define-tag secrefs>CVE-2017-9344 CVE-2017-9349 CVE-2019-9209</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1729.wml b/english/lts/security/2019/dla-1729.wml
deleted file mode 100644
index b001676bb10..00000000000
--- a/english/lts/security/2019/dla-1729.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been found in wireshark, a network traffic
-analyzer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9209">CVE-2019-9209</a>:
-
- <p>Preventing the crash of the ASN.1 BER and related dissectors by
- avoiding a buffer overflow associated with excessive digits in
- time values.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9349">CVE-2017-9349</a>:
-
- <p>Fixing an infinite loop in the DICOM dissector by validating
- a length value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9344">CVE-2017-9344</a>:
-
- <p>Avoid a divide by zero, by validating an interval value in the
- Bluetooth L2CAP dissector.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u18.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1729.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1730-2.data b/english/lts/security/2019/dla-1730-2.data
deleted file mode 100644
index 146431a3b74..00000000000
--- a/english/lts/security/2019/dla-1730-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1730-2 libssh2</define-tag>
-<define-tag report_date>2019-04-08</define-tag>
-<define-tag secrefs>CVE-2019-3859</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1730-2.wml b/english/lts/security/2019/dla-1730-2.wml
deleted file mode 100644
index 1a62d67628a..00000000000
--- a/english/lts/security/2019/dla-1730-2.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>This regression update follows up on an upstream regression update [1]
-regarding <a href="https://security-tracker.debian.org/tracker/CVE-2019-3859">CVE-2019-3859</a>.</p>
-
-<p>With the previous libssh2 package revision, it was observed that user
-authentication with private/public key pairs would fail under certain
-circumstances.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.3-4.1+deb8u3.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>[1] <a href="https://github.com/libssh2/libssh2/pull/327">https://github.com/libssh2/libssh2/pull/327</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1730-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1730-3.data b/english/lts/security/2019/dla-1730-3.data
deleted file mode 100644
index 6f9864a2e69..00000000000
--- a/english/lts/security/2019/dla-1730-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1730-3 libssh2</define-tag>
-<define-tag report_date>2019-07-25</define-tag>
-<define-tag secrefs>CVE-2019-3859 CVE-2019-13115</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1730-3.wml b/english/lts/security/2019/dla-1730-3.wml
deleted file mode 100644
index 269543ebdac..00000000000
--- a/english/lts/security/2019/dla-1730-3.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various security problems have been additionally fixed in libssh2, an SSH
-client implementation written in C.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3859">CVE-2019-3859</a>
-
- <p>While investigating the impact of <a href="https://security-tracker.debian.org/tracker/CVE-2019-13115">CVE-2019-13115</a> in Debian jessie's
- version of libssh2, it was discovered that issues around
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-3859">CVE-2019-3859</a> had not been fully resolved in Debian jessie's version
- of libssh2. A thorough manual (read, analyze, and copy code changes
- if needed) comparison of upstream code and code in Debian jessie's
- version of libssh2 was done and various more boundary checks and
- integer overflow protections got added to the package.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13115">CVE-2019-13115</a>
-
- <p>Kevin Backhouse from semmle.com discovered that initial fixes for the
- CVE series <a href="https://security-tracker.debian.org/tracker/CVE-2019-3855">CVE-2019-3855</a> - 2019-3863 introduced several regressions
- about signedness of length return values into the upstream code.
- While working on the <a href="https://security-tracker.debian.org/tracker/CVE-2019-3859">CVE-2019-3859</a> update mentioned above, it was
- paid attention to not introduce these upstream regression registered
- as <a href="https://security-tracker.debian.org/tracker/CVE-2019-13115">CVE-2019-13115</a>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.4.3-4.1+deb8u4.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1730-3.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1730-4.data b/english/lts/security/2019/dla-1730-4.data
deleted file mode 100644
index 580352c7870..00000000000
--- a/english/lts/security/2019/dla-1730-4.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1730-4 libssh2</define-tag>
-<define-tag report_date>2019-07-30</define-tag>
-<define-tag secrefs>CVE-2019-3860</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1730-4.wml b/english/lts/security/2019/dla-1730-4.wml
deleted file mode 100644
index b59f6867c0c..00000000000
--- a/english/lts/security/2019/dla-1730-4.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several more boundary checks have been backported to libssh2's
-src/sftp.c. Furthermore, all boundary checks in src/sftp.c now result in
-an LIBSSH2_ERROR_BUFFER_TOO_SMALL error code, rather than a
-LIBSSH2_ERROR_ OUT_OF_BOUNDARY error code.</p>
-
-<p>As a side note, it was discovered that libssh2's SFTP implementation from
-Debian jessie only works well against OpenSSH SFTP servers from Debian
-wheezy, tests against newer OpenSSH versions (such as available in Debian
-jessie and beyond) interim-fail with SFTP protocol error <q>Error opening
-remote file</q>. Operation might continue after this error, this depends on
-application implementations.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.3-4.1+deb8u5.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1730-4.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1730.data b/english/lts/security/2019/dla-1730.data
deleted file mode 100644
index fb110eb3da7..00000000000
--- a/english/lts/security/2019/dla-1730.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1730-1 libssh2</define-tag>
-<define-tag report_date>2019-3-26</define-tag>
-<define-tag secrefs>CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 Bug#924965</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1730.wml b/english/lts/security/2019/dla-1730.wml
deleted file mode 100644
index 17e68138dbc..00000000000
--- a/english/lts/security/2019/dla-1730.wml
+++ /dev/null
@@ -1,91 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have recently been discovered in libssh2, a
-client-side C library implementing the SSH2 protocol </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3855">CVE-2019-3855</a>
-
- <p>An integer overflow flaw which could have lead to an out of bounds
- write was discovered in libssh2 in the way packets were read from the
- server. A remote attacker who compromised an SSH server could have
- been able to execute code on the client system when a user connected
- to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3856">CVE-2019-3856</a>
-
- <p>An integer overflow flaw, which could have lead to an out of bounds
- write, was discovered in libssh2 in the way keyboard prompt requests
- were parsed. A remote attacker who compromised an SSH server could have
- been able to execute code on the client system when a user connected
- to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3857">CVE-2019-3857</a>
-
- <p>An integer overflow flaw which could have lead to an out of bounds
- write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST
- packets with an exit signal were parsed. A remote attacker who
- compromises an SSH server could have been able to execute code on the
- client system when a user connected to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3858">CVE-2019-3858</a>
-
- <p>An out of bounds read flaw was discovered in libssh2 when a specially
- crafted SFTP packet was received from the server. A remote attacker
- who compromised an SSH server could have been able to cause a Denial
- of Service or read data in the client memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3859">CVE-2019-3859</a>
-
- <p>An out of bounds read flaw was discovered in libssh2's
- _libssh2_packet_require and _libssh2_packet_requirev functions. A
- remote attacker who compromised an SSH server could have be able to
- cause a Denial of Service or read data in the client memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3860">CVE-2019-3860</a>
-
- <p>An out of bounds read flaw was discovered in libssh2 in the way SFTP
- packets with empty payloads were parsed. A remote attacker who
- compromised an SSH server could have be able to cause a Denial of
- Service or read data in the client memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3861">CVE-2019-3861</a>
-
- <p>An out of bounds read flaw was discovered in libssh2 in the way SSH
- packets with a padding length value greater than the packet length
- were parsed. A remote attacker who compromised a SSH server could
- have been able to cause a Denial of Service or read data in the
- client memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3862">CVE-2019-3862</a>
-
- <p>An out of bounds read flaw was discovered in libssh2 in the way
- SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no
- payload were parsed. A remote attacker who compromised an SSH server
- could have been able to cause a Denial of Service or read data in the
- client memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3863">CVE-2019-3863</a>
-
- <p>A server could have sent multiple keyboard interactive response
- messages whose total length were greater than unsigned char max
- characters. This value was used as an index to copy memory causing
- an out of bounds memory write error.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.4.3-4.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1730.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1731-2.data b/english/lts/security/2019/dla-1731-2.data
deleted file mode 100644
index 140a25288d5..00000000000
--- a/english/lts/security/2019/dla-1731-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1731-2 linux</define-tag>
-<define-tag report_date>2019-04-01</define-tag>
-<define-tag secrefs>CVE-2016-10741 CVE-2017-5753 CVE-2017-13305 CVE-2018-3639 CVE-2018-5848 CVE-2018-5953 CVE-2018-12896 CVE-2018-13053 CVE-2018-16862 CVE-2018-16884 CVE-2018-17972 CVE-2018-18281 CVE-2018-18690 CVE-2018-18710 CVE-2018-19824 CVE-2018-19985 CVE-2018-20169 CVE-2018-20511 CVE-2019-3701 CVE-2019-3819 CVE-2019-6974 CVE-2019-7221 CVE-2019-7222 CVE-2019-9213 Bug#925919</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1731-2.wml b/english/lts/security/2019/dla-1731-2.wml
deleted file mode 100644
index 68241de534b..00000000000
--- a/english/lts/security/2019/dla-1731-2.wml
+++ /dev/null
@@ -1,206 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The linux update issued as <a href="dla-1731">DLA-1731-1</a> caused a regression in the
-vmxnet3 (VMware virtual network adapter) driver. This update corrects
-that regression, and an earlier regression in the CIFS network
-filesystem implementation introduced in <a href="../2018/dla-1422">DLA-1422-1</a>. For reference the
-original advisory text follows.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10741">CVE-2016-10741</a>
-
- <p>A race condition was discovered in XFS that would result in a
- crash (BUG). A local user permitted to write to an XFS volume
- could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-
- <p>Further instances of code that was vulnerable to Spectre variant 1
- (bounds-check bypass) have been mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13305">CVE-2017-13305</a>
-
- <p>A memory over-read was discovered in the keys subsystem's
- encrypted key type. A local user could use this for denial of
- service or possibly to read sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a> (SSB)
-
- <p>Multiple researchers have discovered that Speculative Store Bypass
- (SSB), a feature implemented in many processors, could be used to
- read sensitive information from another context. In particular,
- code in a software sandbox may be able to read sensitive
- information from outside the sandbox. This issue is also known as
- Spectre variant 4.</p>
-
- <p>This update fixes bugs in the mitigations for SSB for AMD
- processors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5848">CVE-2018-5848</a>
-
- <p>The wil6210 wifi driver did not properly validate lengths in scan
- and connection requests, leading to a possible buffer overflow.
- On systems using this driver, a local user with the CAP_NET_ADMIN
- capability could use this for denial of service (memory corruption
- or crash) or potentially for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5953">CVE-2018-5953</a>
-
- <p>The swiotlb subsystem printed kernel memory addresses to the
- system log, which could help a local attacker to exploit other
- vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12896">CVE-2018-12896</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-13053">CVE-2018-13053</a>
-
- <p>Team OWL337 reported possible integer overflows in the POSIX
- timer implementation. These might have some security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16862">CVE-2018-16862</a>
-
- <p>Vasily Averin and Pavel Tikhomirov from Virtuozzo Kernel Team
- discovered that the cleancache memory management feature did not
- invalidate cached data for deleted files. On Xen guests using the
- tmem driver, local users could potentially read data from other
- users' deleted files if they were able to create new files on the
- same volume.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16884">CVE-2018-16884</a>
-
- <p>A flaw was found in the NFS 4.1 client implementation. Mounting
- NFS shares in multiple network namespaces at the same time could
- lead to a user-after-free. Local users might be able to use this
- for denial of service (memory corruption or crash) or possibly
- for privilege escalation.</p>
-
- <p>This can be mitigated by disabling unprivileged users from
- creating user namespaces, which is the default in Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17972">CVE-2018-17972</a>
-
- <p>Jann Horn reported that the /proc/*/stack files in procfs leaked
- sensitive data from the kernel. These files are now only readable
- by users with the CAP_SYS_ADMIN capability (usually only root)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18281">CVE-2018-18281</a>
-
- <p>Jann Horn reported a race condition in the virtual memory manager
- that can result in a process briefly having access to memory after
- it is freed and reallocated. A local user permitted to create
- containers could possibly exploit this for denial of service
- (memory corruption) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18690">CVE-2018-18690</a>
-
- <p>Kanda Motohiro reported that XFS did not correctly handle some
- xattr (extended attribute) writes that require changing the disk
- format of the xattr. A user with access to an XFS volume could use
- this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18710">CVE-2018-18710</a>
-
- <p>It was discovered that the cdrom driver does not correctly
- validate the parameter to the CDROM_SELECT_DISC ioctl. A user with
- access to a cdrom device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19824">CVE-2018-19824</a>
-
- <p>Hui Peng and Mathias Payer discovered a use-after-free bug in the
- USB audio driver. A physically present attacker able to attach a
- specially designed USB device could use this for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19985">CVE-2018-19985</a>
-
- <p>Hui Peng and Mathias Payer discovered a missing bounds check in the
- hso USB serial driver. A physically present user able to attach a
- specially designed USB device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20169">CVE-2018-20169</a>
-
- <p>Hui Peng and Mathias Payer discovered missing bounds checks in the
- USB core. A physically present attacker able to attach a specially
- designed USB device could use this to cause a denial of service
- (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20511">CVE-2018-20511</a>
-
- <p>InfoSect reported an information leak in the AppleTalk IP/DDP
- implemntation. A local user with CAP_NET_ADMIN capability could
- use this to read sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3701">CVE-2019-3701</a>
-
- <p>Muyu Yu and Marcus Meissner reported that the CAN gateway
- implementation allowed the frame length to be modified, typically
- resulting in out-of-bounds memory-mapped I/O writes. On a system
- with CAN devices present, a local user with CAP_NET_ADMIN
- capability in the initial net namespace could use this to cause a
- crash (oops) or other hardware-dependent impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3819">CVE-2019-3819</a>
-
- <p>A potential infinite loop was discovered in the HID debugfs
- interface exposed under /sys/kernel/debug/hid. A user with access
- to these files could use this for denial of service.</p>
-
- <p>This interface is only accessible to root by default, which fully
- mitigates the issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6974">CVE-2019-6974</a>
-
- <p>Jann Horn reported a use-after-free bug in KVM. A local user
- with access to /dev/kvm could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7221">CVE-2019-7221</a>
-
- <p>Jim Mattson and Felix Wilhelm reported a user-after-free bug in
- KVM's nested VMX implementation. On systems with Intel CPUs, a
- local user with access to /dev/kvm could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation.</p>
-
- <p>Nested VMX is disabled by default, which fully mitigates the
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7222">CVE-2019-7222</a>
-
- <p>Felix Wilhelm reported an information leak in KVM for x86.
- A local user with access to /dev/kvm could use this to read
- sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9213">CVE-2019-9213</a>
-
- <p>Jann Horn reported that privileged tasks could cause stack
- segments, including those in other processes, to grow downward to
- address 0. On systems lacking SMAP (x86) or PAN (ARM), this
- exacerbated other vulnerabilities: a null pointer dereference
- could be exploited for privilege escalation rather than only for
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.64-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1731-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1731.data b/english/lts/security/2019/dla-1731.data
deleted file mode 100644
index 43dd8666af1..00000000000
--- a/english/lts/security/2019/dla-1731.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1731-1 linux</define-tag>
-<define-tag report_date>2019-03-27</define-tag>
-<define-tag secrefs>CVE-2016-10741 CVE-2017-5753 CVE-2017-13305 CVE-2018-3639 CVE-2018-5848 CVE-2018-5953 CVE-2018-12896 CVE-2018-13053 CVE-2018-16862 CVE-2018-16884 CVE-2018-17972 CVE-2018-18281 CVE-2018-18690 CVE-2018-18710 CVE-2018-19824 CVE-2018-19985 CVE-2018-20169 CVE-2018-20511 CVE-2019-3701 CVE-2019-3819 CVE-2019-6974 CVE-2019-7221 CVE-2019-7222 CVE-2019-9213</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1731.wml b/english/lts/security/2019/dla-1731.wml
deleted file mode 100644
index 303b28c22a8..00000000000
--- a/english/lts/security/2019/dla-1731.wml
+++ /dev/null
@@ -1,200 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10741">CVE-2016-10741</a>
-
- <p>A race condition was discovered in XFS that would result in a
- crash (BUG). A local user permitted to write to an XFS volume
- could use this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
-
- <p>Further instances of code that was vulnerable to Spectre variant 1
- (bounds-check bypass) have been mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13305">CVE-2017-13305</a>
-
- <p>A memory over-read was discovered in the keys subsystem's
- encrypted key type. A local user could use this for denial of
- service or possibly to read sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a> (SSB)
-
- <p>Multiple researchers have discovered that Speculative Store Bypass
- (SSB), a feature implemented in many processors, could be used to
- read sensitive information from another context. In particular,
- code in a software sandbox may be able to read sensitive
- information from outside the sandbox. This issue is also known as
- Spectre variant 4.</p>
-
- <p>This update fixes bugs in the mitigations for SSB for AMD
- processors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5848">CVE-2018-5848</a>
-
- <p>The wil6210 wifi driver did not properly validate lengths in scan
- and connection requests, leading to a possible buffer overflow.
- On systems using this driver, a local user with the CAP_NET_ADMIN
- capability could use this for denial of service (memory corruption
- or crash) or potentially for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5953">CVE-2018-5953</a>
-
- <p>The swiotlb subsystem printed kernel memory addresses to the
- system log, which could help a local attacker to exploit other
- vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12896">CVE-2018-12896</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-13053">CVE-2018-13053</a>
-
- <p>Team OWL337 reported possible integer overflows in the POSIX
- timer implementation. These might have some security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16862">CVE-2018-16862</a>
-
- <p>Vasily Averin and Pavel Tikhomirov from Virtuozzo Kernel Team
- discovered that the cleancache memory management feature did not
- invalidate cached data for deleted files. On Xen guests using the
- tmem driver, local users could potentially read data from other
- users' deleted files if they were able to create new files on the
- same volume.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16884">CVE-2018-16884</a>
-
- <p>A flaw was found in the NFS 4.1 client implementation. Mounting
- NFS shares in multiple network namespaces at the same time could
- lead to a user-after-free. Local users might be able to use this
- for denial of service (memory corruption or crash) or possibly
- for privilege escalation.</p>
-
- <p>This can be mitigated by disabling unprivileged users from
- creating user namespaces, which is the default in Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17972">CVE-2018-17972</a>
-
- <p>Jann Horn reported that the /proc/*/stack files in procfs leaked
- sensitive data from the kernel. These files are now only readable
- by users with the CAP_SYS_ADMIN capability (usually only root)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18281">CVE-2018-18281</a>
-
- <p>Jann Horn reported a race condition in the virtual memory manager
- that can result in a process briefly having access to memory after
- it is freed and reallocated. A local user permitted to create
- containers could possibly exploit this for denial of service
- (memory corruption) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18690">CVE-2018-18690</a>
-
- <p>Kanda Motohiro reported that XFS did not correctly handle some
- xattr (extended attribute) writes that require changing the disk
- format of the xattr. A user with access to an XFS volume could use
- this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18710">CVE-2018-18710</a>
-
- <p>It was discovered that the cdrom driver does not correctly
- validate the parameter to the CDROM_SELECT_DISC ioctl. A user with
- access to a cdrom device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19824">CVE-2018-19824</a>
-
- <p>Hui Peng and Mathias Payer discovered a use-after-free bug in the
- USB audio driver. A physically present attacker able to attach a
- specially designed USB device could use this for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19985">CVE-2018-19985</a>
-
- <p>Hui Peng and Mathias Payer discovered a missing bounds check in the
- hso USB serial driver. A physically present user able to attach a
- specially designed USB device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20169">CVE-2018-20169</a>
-
- <p>Hui Peng and Mathias Payer discovered missing bounds checks in the
- USB core. A physically present attacker able to attach a specially
- designed USB device could use this to cause a denial of service
- (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20511">CVE-2018-20511</a>
-
- <p>InfoSect reported an information leak in the AppleTalk IP/DDP
- implemntation. A local user with CAP_NET_ADMIN capability could
- use this to read sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3701">CVE-2019-3701</a>
-
- <p>Muyu Yu and Marcus Meissner reported that the CAN gateway
- implementation allowed the frame length to be modified, typically
- resulting in out-of-bounds memory-mapped I/O writes. On a system
- with CAN devices present, a local user with CAP_NET_ADMIN
- capability in the initial net namespace could use this to cause a
- crash (oops) or other hardware-dependent impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3819">CVE-2019-3819</a>
-
- <p>A potential infinite loop was discovered in the HID debugfs
- interface exposed under /sys/kernel/debug/hid. A user with access
- to these files could use this for denial of service.</p>
-
- <p>This interface is only accessible to root by default, which fully
- mitigates the issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6974">CVE-2019-6974</a>
-
- <p>Jann Horn reported a use-after-free bug in KVM. A local user
- with access to /dev/kvm could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7221">CVE-2019-7221</a>
-
- <p>Jim Mattson and Felix Wilhelm reported a user-after-free bug in
- KVM's nested VMX implementation. On systems with Intel CPUs, a
- local user with access to /dev/kvm could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation.</p>
-
- <p>Nested VMX is disabled by default, which fully mitigates the
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7222">CVE-2019-7222</a>
-
- <p>Felix Wilhelm reported an information leak in KVM for x86.
- A local user with access to /dev/kvm could use this to read
- sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9213">CVE-2019-9213</a>
-
- <p>Jann Horn reported that privileged tasks could cause stack
- segments, including those in other processes, to grow downward to
- address 0. On systems lacking SMAP (x86) or PAN (ARM), this
- exacerbated other vulnerabilities: a null pointer dereference
- could be exploited for privilege escalation rather than only for
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.64-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1731.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1732.data b/english/lts/security/2019/dla-1732.data
deleted file mode 100644
index d22651eefbf..00000000000
--- a/english/lts/security/2019/dla-1732.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1732-1 openjdk-7</define-tag>
-<define-tag report_date>2019-3-27</define-tag>
-<define-tag secrefs>CVE-2019-2422</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1732.wml b/english/lts/security/2019/dla-1732.wml
deleted file mode 100644
index af56e319b5d..00000000000
--- a/english/lts/security/2019/dla-1732.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A memory disclosure vulnerability was discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in information
-disclosure or bypass of sandbox restrictions.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7u211-2.6.17-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1732.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1733.data b/english/lts/security/2019/dla-1733.data
deleted file mode 100644
index c120281636c..00000000000
--- a/english/lts/security/2019/dla-1733.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1733-1 wpa</define-tag>
-<define-tag report_date>2019-3-28</define-tag>
-<define-tag secrefs>CVE-2016-10743</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1733.wml b/english/lts/security/2019/dla-1733.wml
deleted file mode 100644
index 9bbd1a6ce48..00000000000
--- a/english/lts/security/2019/dla-1733.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the fallback mechanism for generating a WPS pin in
-hostapd, an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator,
-used a low quality pseudorandom number generator. This was resolved by
-using only the high quality os_get_random function.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1733.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1734.data b/english/lts/security/2019/dla-1734.data
deleted file mode 100644
index 1ff844e8363..00000000000
--- a/english/lts/security/2019/dla-1734.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1734-1 libraw</define-tag>
-<define-tag report_date>2019-3-28</define-tag>
-<define-tag secrefs>CVE-2018-5800 CVE-2018-5801 CVE-2018-5802 CVE-2018-5808 CVE-2018-5817 CVE-2018-5818 CVE-2018-5819</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1734.wml b/english/lts/security/2019/dla-1734.wml
deleted file mode 100644
index 420db07479f..00000000000
--- a/english/lts/security/2019/dla-1734.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Secunia Research has discovered multiple vulnerabilities in libraw, a
-raw image decoder library, which can be exploited to cause a Denial of
-Service.
-The issues contain divisions by zero, out-of-bounds read memory access,
-heap-based buffer overflows and NULL pointer dereferences.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.16.0-9+deb8u4.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1734.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1735.data b/english/lts/security/2019/dla-1735.data
deleted file mode 100644
index c61f81483ef..00000000000
--- a/english/lts/security/2019/dla-1735.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1735-1 ruby2.1</define-tag>
-<define-tag report_date>2019-3-29</define-tag>
-<define-tag secrefs>CVE-2019-8320 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1735.wml b/english/lts/security/2019/dla-1735.wml
deleted file mode 100644
index ad04ad2d52b..00000000000
--- a/english/lts/security/2019/dla-1735.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in rubygems embedded in
-ruby2.1, the interpreted scripting language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8320">CVE-2019-8320</a>
-
- <p>A Directory Traversal issue was discovered in RubyGems. Before
- making new directories or touching files (which now include
- path-checking code for symlinks), it would delete the target
- destination.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8322">CVE-2019-8322</a>
-
- <p>The gem owner command outputs the contents of the API response
- directly to stdout. Therefore, if the response is crafted, escape
- sequence injection may occur.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8323">CVE-2019-8323</a>
-
- <p>Gem::GemcutterUtilities#with_response may output the API response to
- stdout as it is. Therefore, if the API side modifies the response,
- escape sequence injection may occur.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8324">CVE-2019-8324</a>
-
- <p>A crafted gem with a multi-line name is not handled correctly.
- Therefore, an attacker could inject arbitrary code to the stub line
- of gemspec, which is eval-ed by code in ensure_loadable_spec during
- the preinstall check.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8325">CVE-2019-8325</a>
-
- <p>An issue was discovered in RubyGems 2.6 and later through 3.0.2.
- Since Gem::CommandManager#run calls alert_error without escaping,
- escape sequence injection is possible. (There are many ways to cause
- an error.)</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.5-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1735.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1736.data b/english/lts/security/2019/dla-1736.data
deleted file mode 100644
index e921086b070..00000000000
--- a/english/lts/security/2019/dla-1736.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1736-1 dovecot</define-tag>
-<define-tag report_date>2019-3-29</define-tag>
-<define-tag secrefs>CVE-2019-7524</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1736.wml b/english/lts/security/2019/dla-1736.wml
deleted file mode 100644
index 187c9c40bda..00000000000
--- a/english/lts/security/2019/dla-1736.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in the Dovecot email server.
-When reading FTS headers from the Dovecot index, the input buffer
-size is not bounds-checked. An attacker with the ability to modify
-dovecot indexes, can take advantage of this flaw for privilege
-escalation or the execution of arbitrary code with the permissions of
-the dovecot user. Only installations using the FTS plugins are affected.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.2.13-12~deb8u6.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1736.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1737.data b/english/lts/security/2019/dla-1737.data
deleted file mode 100644
index 472bc0b31a8..00000000000
--- a/english/lts/security/2019/dla-1737.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1737-1 pdns</define-tag>
-<define-tag report_date>2019-03-29</define-tag>
-<define-tag secrefs>CVE-2019-3871 Bug#924966</define-tag>
-<define-tag packages>pdns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1737.wml b/english/lts/security/2019/dla-1737.wml
deleted file mode 100644
index 3e6e27bd954..00000000000
--- a/english/lts/security/2019/dla-1737.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in PowerDNS Authoritative Server before
-4.0.7 and before 4.1.7. An insufficient validation of data coming from
-the user when building a HTTP request from a DNS query in the HTTP
-Connector of the Remote backend, allowing a remote user to cause a
-denial of service by making the server connect to an invalid endpoint,
-or possibly information disclosure by making the server connect to an
-internal endpoint and somehow extracting meaningful information about
-the response.</p>
-
-<p>Only installations using the pdns-backend-remote package are affected.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.4.1-4+deb8u9.</p>
-
-<p>We recommend that you upgrade your pdns packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1737.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1738.data b/english/lts/security/2019/dla-1738.data
deleted file mode 100644
index 857d94c32e2..00000000000
--- a/english/lts/security/2019/dla-1738.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1738-1 gpsd</define-tag>
-<define-tag report_date>2019-3-30</define-tag>
-<define-tag secrefs>CVE-2018-17937 Bug#925327</define-tag>
-<define-tag packages>gpsd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1738.wml b/english/lts/security/2019/dla-1738.wml
deleted file mode 100644
index bcdb5987101..00000000000
--- a/english/lts/security/2019/dla-1738.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in gpsd, the Global Positioning
-System daemon. A stack-based buffer overflow may allow remote attackers
-to execute arbitrary code via traffic on port 2947/TCP or crafted JSON
-inputs.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.11-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your gpsd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1738.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1739.data b/english/lts/security/2019/dla-1739.data
deleted file mode 100644
index 6e4a12dd8ab..00000000000
--- a/english/lts/security/2019/dla-1739.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1739-1 rails</define-tag>
-<define-tag report_date>2019-3-31</define-tag>
-<define-tag secrefs>CVE-2019-5418 CVE-2019-5419 Bug#924520</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1739.wml b/english/lts/security/2019/dla-1739.wml
deleted file mode 100644
index bed190445d0..00000000000
--- a/english/lts/security/2019/dla-1739.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>John Hawthorn of Github discovered a file content disclosure
-vulnerability in Rails, a ruby based web application framework.
-Specially crafted accept headers in combination with calls to `render
-file:` can cause arbitrary files on the target server to be rendered,
-disclosing the file contents.</p>
-
-<p>This vulnerability could also be exploited for a denial-of-service
-attack.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:4.1.8-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1739.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1740.data b/english/lts/security/2019/dla-1740.data
deleted file mode 100644
index f59782fc20e..00000000000
--- a/english/lts/security/2019/dla-1740.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1740-1 libav</define-tag>
-<define-tag report_date>2019-3-30</define-tag>
-<define-tag secrefs>CVE-2015-1872 CVE-2017-14058 CVE-2017-1000460 CVE-2018-639 CVE-2018-1999012</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1740.wml b/english/lts/security/2019/dla-1740.wml
deleted file mode 100644
index 3dba2deea04..00000000000
--- a/english/lts/security/2019/dla-1740.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues have been corrected in multiple demuxers and
-decoders of the libav multimedia library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1872">CVE-2015-1872</a>
-
- <p>The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c did not
- validate the number of components in a JPEG-LS Start Of Frame
- segment, which allowed remote attackers to cause a denial of service
- (out-of-bounds array access) or possibly have unspecified other
- impact via crafted Motion JPEG data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14058">CVE-2017-14058</a>
-
- <p>The read_data function in libavformat/hls.c did not restrict reload
- attempts for an insufficient list, which allowed remote attackers to
- cause a denial of service (infinite loop).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000460">CVE-2017-1000460</a>
-
- <p>In get_last_needed_nal() (libavformat/h264.c) the return value of
- init_get_bits was ignored and get_ue_golomb(&amp;gb) was called on an
- uninitialized get_bits context, which caused a NULL deref exception.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6392">CVE-2018-6392</a>
-
- <p>The filter_slice function in libavfilter/vf_transpose.c allowed
- remote attackers to cause a denial of service (out-of-array access)
- via a crafted MP4 file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1999012">CVE-2018-1999012</a>
-
- <p>libav contained a CWE-835: Infinite loop vulnerability in pva format
- demuxer that could result in a vulnerability that allowed attackers to
- consume excessive amount of resources like CPU and RAM. This attack
- appeared to be exploitable via specially crafted PVA file had to be
- provided as input.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u6.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1740.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1741.data b/english/lts/security/2019/dla-1741.data
deleted file mode 100644
index d0e9beb440e..00000000000
--- a/english/lts/security/2019/dla-1741.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1741-1 php5</define-tag>
-<define-tag report_date>2019-3-31</define-tag>
-<define-tag secrefs>CVE-2019-9022 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639 CVE-2019-9640 CVE-2019-9641</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1741.wml b/english/lts/security/2019/dla-1741.wml
deleted file mode 100644
index e7e33dc0e8a..00000000000
--- a/english/lts/security/2019/dla-1741.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been found in php5, a server-side,
-HTML-embedded scripting language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9637">CVE-2019-9637</a>
-
- <p>rename() across the device may allow unwanted access during
- processing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9638">CVE-2019-9638</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-9639">CVE-2019-9639</a>
- <p>Uninitialized read in exif_process_IFD_in_MAKERNOTE.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9640">CVE-2019-9640</a>
-
- <p>Invalid Read on exif_process_SOFn.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9641">CVE-2019-9641</a>
-
- <p>Uninitialized read in exif_process_IFD_in_TIFF.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9022">CVE-2019-9022</a>
-
- <p>An issue during parsing of DNS responses allows a hostile DNS server
- to misuse memcpy, which leads to a read operation past an allocated
- buffer.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1741.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1742.data b/english/lts/security/2019/dla-1742.data
deleted file mode 100644
index 26e0ef78c9b..00000000000
--- a/english/lts/security/2019/dla-1742.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1742-1 wordpress</define-tag>
-<define-tag report_date>2019-4-1</define-tag>
-<define-tag secrefs>CVE-2019-8942 CVE-2019-9787 Bug#924546</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1742.wml b/english/lts/security/2019/dla-1742.wml
deleted file mode 100644
index e787a0a10e3..00000000000
--- a/english/lts/security/2019/dla-1742.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Simon Scannell of Ripstech Technologies discovered multiple
-vulnerabilities in wordpress, a web blogging manager.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8942">CVE-2019-8942</a>
-
- <p>remote code execution in wordpress because an _wp_attached_file Post
- Meta entry can be changed to an arbitrary string, such as one ending
- with a .jpg?file.php substring. An attacker with author privileges
- can execute arbitrary code by uploading a crafted image containing
- PHP code in the Exif metadata.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9787">CVE-2019-9787</a>
-
- <p>wordpress does not properly filter comment content, leading to
- Remote Code Execution by unauthenticated users in a default
- configuration. This occurs because CSRF protection is mishandled,
- and because Search Engine Optimization of A elements is performed
- incorrectly, leading to XSS. The XSS results in administrative
- access.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1.26+dfsg-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1742.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1743.data b/english/lts/security/2019/dla-1743.data
deleted file mode 100644
index 1f036da5da0..00000000000
--- a/english/lts/security/2019/dla-1743.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1743-1 thunderbird</define-tag>
-<define-tag report_date>2019-4-1</define-tag>
-<define-tag secrefs>CVE-2018-18506 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9795 CVE-2019-9796</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1743.wml b/english/lts/security/2019/dla-1743.wml
deleted file mode 100644
index 18114298420..00000000000
--- a/english/lts/security/2019/dla-1743.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Thunderbird mail client,
-which could lead to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.6.1-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1743.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1744.data b/english/lts/security/2019/dla-1744.data
deleted file mode 100644
index 5202ef5faf6..00000000000
--- a/english/lts/security/2019/dla-1744.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1744-1 tzdata</define-tag>
-<define-tag report_date>2019-4-1</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1744.wml b/english/lts/security/2019/dla-1744.wml
deleted file mode 100644
index d0f19ee8dd2..00000000000
--- a/english/lts/security/2019/dla-1744.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2019a. Notable
-changes are:</p>
-
-<ul>
- <li>Palestine started DST on 2019-03-30, instead of 2019-03-23
- as previously predicted.</li>
- <li>Metlakatla ended its observance of Pacific standard time, rejoining
- Alaska Time, on 2019-01-20 at 02:00.</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2019a-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1744.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1745.data b/english/lts/security/2019/dla-1745.data
deleted file mode 100644
index 4c14e0f11b1..00000000000
--- a/english/lts/security/2019/dla-1745.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1745-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2019-4-1</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1745.wml b/english/lts/security/2019/dla-1745.wml
deleted file mode 100644
index 8cf8a50c4ba..00000000000
--- a/english/lts/security/2019/dla-1745.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2019a for the
-Perl bindings. For the list of changes, see DLA-1744-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.75-2+2019a.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1745.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1746.data b/english/lts/security/2019/dla-1746.data
deleted file mode 100644
index 4cafad7b75b..00000000000
--- a/english/lts/security/2019/dla-1746.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1746-1 drupal7</define-tag>
-<define-tag report_date>2019-4-1</define-tag>
-<define-tag secrefs>CVE-2019-6341</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1746.wml b/english/lts/security/2019/dla-1746.wml
deleted file mode 100644
index 40acd19161f..00000000000
--- a/english/lts/security/2019/dla-1746.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that missing input sanitising in the file module of
-Drupal, a fully-featured content management framework, could result in
-cross-site scripting.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.32-1+deb8u16.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1746.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1747.data b/english/lts/security/2019/dla-1747.data
deleted file mode 100644
index 4419cb5879e..00000000000
--- a/english/lts/security/2019/dla-1747.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1747-1 firmware-nonfree</define-tag>
-<define-tag report_date>2019-04-02</define-tag>
-<define-tag secrefs>CVE-2018-5383</define-tag>
-<define-tag packages>firmware-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1747.wml b/english/lts/security/2019/dla-1747.wml
deleted file mode 100644
index 01eb7308fb5..00000000000
--- a/english/lts/security/2019/dla-1747.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Eli Biham and Lior Neumann discovered a cryptographic weakness in the
-Bluetooth LE SC pairing protocol, called the Fixed Coordinate Invalid
-Curve Attack (<a href="https://security-tracker.debian.org/tracker/CVE-2018-5383">CVE-2018-5383</a>). Depending on the devices used, this
-could be exploited by a nearby attacker to obtain sensitive
-information, for denial of service, or for other security impact.</p>
-
-<p>This flaw has been fixed in firmware for Intel Wireless 7260 (B3),
-7260 (B5), 7265 (D1), and 8264 adapters, and for Qualcomm Atheros
-QCA61x4 <q>ROME</q> version 3.2 adapters. Other Bluetooth adapters are
-also affected and remain vulnerable.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-20161130-5~deb8u1.</p>
-
-<p>We recommend that you upgrade your firmware-nonfree packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1747.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1748.data b/english/lts/security/2019/dla-1748.data
deleted file mode 100644
index 55cd12f42d6..00000000000
--- a/english/lts/security/2019/dla-1748.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1748-1 apache2</define-tag>
-<define-tag report_date>2019-04-03</define-tag>
-<define-tag secrefs>CVE-2019-0217 CVE-2019-0220</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1748.wml b/english/lts/security/2019/dla-1748.wml
deleted file mode 100644
index ed7f302cb92..00000000000
--- a/english/lts/security/2019/dla-1748.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the Apache HTTP server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0217">CVE-2019-0217</a>
-
- <p>A race condition in mod_auth_digest when running in a threaded
- server could allow a user with valid credentials to authenticate
- using another username, bypassing configured access control
- restrictions. The issue was discovered by Simon Kappel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0220">CVE-2019-0220</a>
-
- <p>Bernhard Lorenz of Alpha Strike Labs GmbH reported that URL
- normalizations were inconsistently handled. When the path component
- of a request URL contains multiple consecutive slashes ('/'),
- directives such as LocationMatch and RewriteRule must account for
- duplicates in regular expressions while other aspects of the servers
- processing will implicitly collapse them.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.10-10+deb8u14.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1748.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1749.data b/english/lts/security/2019/dla-1749.data
deleted file mode 100644
index 284efc0608e..00000000000
--- a/english/lts/security/2019/dla-1749.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1749-1 golang</define-tag>
-<define-tag report_date>2019-04-03</define-tag>
-<define-tag secrefs>CVE-2019-9741 Bug#924630</define-tag>
-<define-tag packages>golang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1749.wml b/english/lts/security/2019/dla-1749.wml
deleted file mode 100644
index 6afbc80544b..00000000000
--- a/english/lts/security/2019/dla-1749.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a CRLF injection attack in the Go
-programming language runtime library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9741">CVE-2019-9741</a>
-
- <p>Passing \r\n to http.NewRequest could allow execution of arbitrary HTTP headers or Redis commands.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:1.3.3-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your golang packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1749.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1750.data b/english/lts/security/2019/dla-1750.data
deleted file mode 100644
index e68bdec0370..00000000000
--- a/english/lts/security/2019/dla-1750.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1750-1 roundup</define-tag>
-<define-tag report_date>2019-04-07</define-tag>
-<define-tag secrefs>CVE-2019-10904</define-tag>
-<define-tag packages>roundup</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1750.wml b/english/lts/security/2019/dla-1750.wml
deleted file mode 100644
index 1a6a380a3fa..00000000000
--- a/english/lts/security/2019/dla-1750.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability
-in the web front-end of the roundup tracking system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10904">CVE-2019-10904</a>
-
- <p>Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.4.20-1.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your roundup packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1750.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1751.data b/english/lts/security/2019/dla-1751.data
deleted file mode 100644
index 4af396ff167..00000000000
--- a/english/lts/security/2019/dla-1751.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1751-1 suricata</define-tag>
-<define-tag report_date>2019-04-08</define-tag>
-<define-tag secrefs>CVE-2018-10242 CVE-2018-10243</define-tag>
-<define-tag packages>suricata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1751.wml b/english/lts/security/2019/dla-1751.wml
deleted file mode 100644
index 242c60825aa..00000000000
--- a/english/lts/security/2019/dla-1751.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in suricata, the network threat
-detection engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10242">CVE-2018-10242</a>
-
- <p>Missing length check causing out-of-bounds read in SSHParseBanner
- (app-layer-ssh.c). Remote attackers might leverage this vulnerability
- to cause DoS or potentially unauthorized disclosure of information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10243">CVE-2018-10243</a>
-
- <p>Unexpected end of Authorization field causing heap-based buffer
- over-read in htp_parse_authorization_digest (htp_parsers.c, from the
- embedded copy of LibHTP). Remote attackers might leverage this
- vulnerability to cause DoS or potentially unauthorized disclosure of
- information.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.0.7-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your suricata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1751.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1752.data b/english/lts/security/2019/dla-1752.data
deleted file mode 100644
index feb22840036..00000000000
--- a/english/lts/security/2019/dla-1752.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1752-1 poppler</define-tag>
-<define-tag report_date>2019-04-08</define-tag>
-<define-tag secrefs>CVE-2019-9631</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1752.wml b/english/lts/security/2019/dla-1752.wml
deleted file mode 100644
index f59abd7290c..00000000000
--- a/english/lts/security/2019/dla-1752.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A security issue was discovered in the poppler PDF rendering shared
-library.</p>
-
-<p>The Poppler shared library had a heap-based buffer over-read in the
-CairoRescaleBox.cc downsample_row_box_filter function.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.26.5-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1752.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1753-2.data b/english/lts/security/2019/dla-1753-2.data
deleted file mode 100644
index 38bc01e7d4f..00000000000
--- a/english/lts/security/2019/dla-1753-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1753-2 proftpd-dfsg</define-tag>
-<define-tag report_date>2019-5-1</define-tag>
-<define-tag secrefs>not available Bug#923926 Bug#926719</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1753-2.wml b/english/lts/security/2019/dla-1753-2.wml
deleted file mode 100644
index a905cc81358..00000000000
--- a/english/lts/security/2019/dla-1753-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of proftpd-dfsg issued as DLA-1753-1 caused a regression
-when using the sftp module. Login to the sftp server was impossible
-when the SFTPPAMEngine option was turned on (#926719).</p>
-
-<p>This update reverts to upstream version 1.3.5 again since even the
-latest upstream release 1.3.6 is still affected by different sftp
-related bugs (#927270). All fixes for the memory leaks were backported
-separately now.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.5e+r1.3.5-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1753-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1753-3.data b/english/lts/security/2019/dla-1753-3.data
deleted file mode 100644
index da6380007c6..00000000000
--- a/english/lts/security/2019/dla-1753-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1753-3 proftpd-dfsg</define-tag>
-<define-tag report_date>2019-5-21</define-tag>
-<define-tag secrefs>Bug#929020</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1753-3.wml b/english/lts/security/2019/dla-1753-3.wml
deleted file mode 100644
index 1b80b6d1392..00000000000
--- a/english/lts/security/2019/dla-1753-3.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of proftpd-dfsg issued as DLA-1753-1 caused a regression
-when the creation of a directory failed during sftp transfer. The sftp
-session would be terminated instead of failing gracefully due to a
-non-existing debug logging function.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.5e+r1.3.5-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1753-3.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1753.data b/english/lts/security/2019/dla-1753.data
deleted file mode 100644
index 10536204252..00000000000
--- a/english/lts/security/2019/dla-1753.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1753-1 proftpd-dfsg</define-tag>
-<define-tag report_date>2019-4-9</define-tag>
-<define-tag secrefs>not-available Bug#923926</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1753.wml b/english/lts/security/2019/dla-1753.wml
deleted file mode 100644
index db725a7e863..00000000000
--- a/english/lts/security/2019/dla-1753.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several memory leaks were discovered in proftpd-dfsg, a versatile,
-virtual-hosting FTP daemon, when mod_facl or mod_sftp
-is used which could lead to memory exhaustion and a denial-of-service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.5e-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1753.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1754.data b/english/lts/security/2019/dla-1754.data
deleted file mode 100644
index 5c2cbd6f29d..00000000000
--- a/english/lts/security/2019/dla-1754.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1754-1 samba</define-tag>
-<define-tag report_date>2019-04-09</define-tag>
-<define-tag secrefs>CVE-2017-9461 CVE-2018-1050 CVE-2018-1057 CVE-2019-3880</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1754.wml b/english/lts/security/2019/dla-1754.wml
deleted file mode 100644
index 3b1871cdf24..00000000000
--- a/english/lts/security/2019/dla-1754.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various vulnerabilities were discovered in Samba, SMB/CIFS file, print,
-and login server/client for Unix</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9461">CVE-2017-9461</a>
-
- <p>smbd in Samba had a denial of service vulnerability (fd_open_atomic
- infinite loop with high CPU usage and memory consumption) due to
- wrongly handling dangling symlinks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1050">CVE-2018-1050</a>
-
- <p>Samba was vulnerable to a denial of service attack when the RPC
- spoolss service was configured to be run as an external daemon.
- Missing input sanitization checks on some of the input parameters to
- spoolss RPC calls could have caused the print spooler service to
- crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1057">CVE-2018-1057</a>
-
- <p>On a Samba 4 AD DC the LDAP server of Samba incorrectly validated
- permissions to modify passwords over LDAP allowing authenticated
- users to change any other users' passwords, including administrative
- users and privileged service accounts (eg Domain Controllers).</p>
-
- <p>Thanks to the Ubuntu security team for having backported the rather
- invasive changeset to Samba in Ubuntu 14.04 (which we could use to
- patch Samba in Debian jessie LTS).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3880">CVE-2019-3880</a>
-
- <p>A flaw was found in the way Samba implemented an RPC endpoint
- emulating the Windows registry service API. An unprivileged attacker
- could have used this flaw to create a new registry hive file anywhere
- they had unix permissions which could have lead to creation of a new
- file in the Samba share.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:4.2.14+dfsg-0+deb8u12.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1754.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1755.data b/english/lts/security/2019/dla-1755.data
deleted file mode 100644
index 72810d10482..00000000000
--- a/english/lts/security/2019/dla-1755.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1755-1 graphicsmagick</define-tag>
-<define-tag report_date>2019-4-14</define-tag>
-<define-tag secrefs>CVE-2017-10799 CVE-2019-11006 CVE-2019-11007 CVE-2019-11008 CVE-2019-11009 CVE-2019-11010 Bug#927029</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1755.wml b/english/lts/security/2019/dla-1755.wml
deleted file mode 100644
index a9d14f974db..00000000000
--- a/english/lts/security/2019/dla-1755.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in Graphicsmagick, a
-collection of image processing tools. Heap-based buffer over-reads and
-a memory leak may lead to a denial-of-service or information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.20-3+deb8u6.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1755.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1756.data b/english/lts/security/2019/dla-1756.data
deleted file mode 100644
index 16b029827f6..00000000000
--- a/english/lts/security/2019/dla-1756.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1756-1 libxslt</define-tag>
-<define-tag report_date>2019-04-15</define-tag>
-<define-tag secrefs>CVE-2019-11068</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1756.wml b/english/lts/security/2019/dla-1756.wml
deleted file mode 100644
index aeb2d886783..00000000000
--- a/english/lts/security/2019/dla-1756.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an authentication bypass
-vulnerability in libxslt, a widely-used library for transforming
-files from XML to other arbitrary format.</p>
-
-<p>The xsltCheckRead and xsltCheckWrite routines permitted access upon
-receiving an-1 error code and (as xsltCheckRead returned -1 for a
-specially-crafted URL that is not actually invalid) the attacker was
-subsequently authenticated.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11068">CVE-2019-11068</a>
-
- <p>libxslt through 1.1.33 allows bypass of a protection mechanism because
- callers of xsltCheckRead and xsltCheckWrite permit access even upon
- receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL
- that is not actually invalid and is subsequently loaded.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.1.28-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1756.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1757.data b/english/lts/security/2019/dla-1757.data
deleted file mode 100644
index 9ae5bf9fe87..00000000000
--- a/english/lts/security/2019/dla-1757.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1757-1 cacti</define-tag>
-<define-tag report_date>2019-04-16</define-tag>
-<define-tag secrefs>CVE-2019-11025</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1757.wml b/english/lts/security/2019/dla-1757.wml
deleted file mode 100644
index 6e99e1f63d7..00000000000
--- a/english/lts/security/2019/dla-1757.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of cross-site scripting
-vulnerabilities (XSS) in cacti, a web-based front-end for the RRDTool
-monitoring tool.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11025">CVE-2019-11025</a>
-
- <p>In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping
- occurs before printing out the value of the SNMP community string
- (SNMP Options) in the View poller cache, leading to XSS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.8.8b+dfsg-8+deb8u7.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1757.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1758.data b/english/lts/security/2019/dla-1758.data
deleted file mode 100644
index a28bf2d030d..00000000000
--- a/english/lts/security/2019/dla-1758.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1758-1 debian-security-support</define-tag>
-<define-tag report_date>2019-04-20</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1758.wml b/english/lts/security/2019/dla-1758.wml
deleted file mode 100644
index 5c5163db6db..00000000000
--- a/english/lts/security/2019/dla-1758.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker,
-has been updated in jessie. The jessie relevant changes are:</p>
-
-<ul>
- <li>Mark spice-xpi as end-of-life for Jessie.</li>
- <li>Add edk2 to security-support-ended.deb8</li>
- <li>Add robocode to security-support-ended.deb8</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2019.02.02~deb8u1.</p>
-
-<p>We recommend that you upgrade your debian-security-support packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1758.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1759.data b/english/lts/security/2019/dla-1759.data
deleted file mode 100644
index 720604459ab..00000000000
--- a/english/lts/security/2019/dla-1759.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1759-1 clamav</define-tag>
-<define-tag report_date>2019-04-22</define-tag>
-<define-tag secrefs>CVE-2019-1787 CVE-2019-1788 CVE-2019-1789</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1759.wml b/english/lts/security/2019/dla-1759.wml
deleted file mode 100644
index a269cde8588..00000000000
--- a/english/lts/security/2019/dla-1759.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Out-of-bounds read and write conditions have been fixed in clamav.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1787">CVE-2019-1787</a>
-
- <p>An out-of-bounds heap read condition may occur when scanning PDF
- documents. The defect is a failure to correctly keep track of the number
- of bytes remaining in a buffer when indexing file data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1788">CVE-2019-1788</a>
-
- <p>An out-of-bounds heap write condition may occur when scanning OLE2 files
- such as Microsoft Office 97-2003 documents. The invalid write happens when
- an invalid pointer is mistakenly used to initialize a 32bit integer to
- zero. This is likely to crash the application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1789">CVE-2019-1789</a>
-
- <p>An out-of-bounds heap read condition may occur when scanning PE files
- (i.e. Windows EXE and DLL files) that have been packed using Aspack as a
- result of inadequate bound-checking.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.100.3+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1759.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1760.data b/english/lts/security/2019/dla-1760.data
deleted file mode 100644
index 743620f7965..00000000000
--- a/english/lts/security/2019/dla-1760.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1760-1 wget</define-tag>
-<define-tag report_date>2019-4-22</define-tag>
-<define-tag secrefs>CVE-2019-5953</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1760.wml b/english/lts/security/2019/dla-1760.wml
deleted file mode 100644
index 5b16e64cb9f..00000000000
--- a/english/lts/security/2019/dla-1760.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Kusano Kazuhiko discovered a buffer overflow vulnerability in the handling
-of Internationalized Resource Identifiers (IRI) in wget, a network utility
-to retrieve files from the web, which could result in the execution of
-arbitrary code or denial of service when recursively downloading from an
-untrusted server.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.16-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your wget packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1760.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1761.data b/english/lts/security/2019/dla-1761.data
deleted file mode 100644
index d9371ba8ec0..00000000000
--- a/english/lts/security/2019/dla-1761.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1761-1 ghostscript</define-tag>
-<define-tag report_date>2019-04-23</define-tag>
-<define-tag secrefs>CVE-2019-3835 CVE-2019-3838 Bug#925256 Bug#925257</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1761.wml b/english/lts/security/2019/dla-1761.wml
deleted file mode 100644
index 290f4d425c2..00000000000
--- a/english/lts/security/2019/dla-1761.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cedric Buissart discovered two vulnerabilities in Ghostscript, the GPL
-PostScript/PDF interpreter, which could result in bypass of file system
-restrictions of the dSAFER sandbox.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.26a~dfsg-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1761.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1762-2.data b/english/lts/security/2019/dla-1762-2.data
deleted file mode 100644
index 06cbe76ded1..00000000000
--- a/english/lts/security/2019/dla-1762-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1762-2 systemd</define-tag>
-<define-tag report_date>2019-04-26</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1762-2.wml b/english/lts/security/2019/dla-1762-2.wml
deleted file mode 100644
index ac19857e091..00000000000
--- a/english/lts/security/2019/dla-1762-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In the recently uploaded systemd security update (215-17+deb8u12 via
-DLA-1762-1), a regression was discovered in the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-18078">CVE-2017-18078</a>.</p>
-
-<p>The observation of Debian jessie LTS users was, that after upgrading to
-+deb8u12 temporary files would not have the correct ownerships and
-permissions anymore (instead of a file being owned by a specific user
-and/or group, files were being owned by root:root; setting POSIX file
-permissions (rwx, etc.) was also affected).</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this regression problem has been fixed in version
-215-17+deb8u13.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1762-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1762.data b/english/lts/security/2019/dla-1762.data
deleted file mode 100644
index e85e907f6b1..00000000000
--- a/english/lts/security/2019/dla-1762.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1762-1 systemd</define-tag>
-<define-tag report_date>2019-04-24</define-tag>
-<define-tag secrefs>CVE-2017-18078 CVE-2019-3842</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1762.wml b/english/lts/security/2019/dla-1762.wml
deleted file mode 100644
index 6f49570a1f7..00000000000
--- a/english/lts/security/2019/dla-1762.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been addressed in the systemd components
-systemd-tmpfiles and pam_systemd.so.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18078">CVE-2017-18078</a>
-
- <p>systemd-tmpfiles in systemd attempted to support ownership/permission
- changes on hardlinked files even if the fs.protected_hardlinks sysctl
- is turned off, which allowed local users to bypass intended access
- restrictions via vectors involving a hard link to a file for which
- the user lacked write access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3842">CVE-2019-3842</a>
-
- <p>It was discovered that pam_systemd did not properly sanitize the
- environment before using the XDG_SEAT variable. It was possible for
- an attacker, in some particular configurations, to set a XDG_SEAT
- environment variable which allowed for commands to be checked against
- polkit policies using the <q>allow_active</q> element rather than
- <q>allow_any</q>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-215-17+deb8u12.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1762.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1763.data b/english/lts/security/2019/dla-1763.data
deleted file mode 100644
index c047086f39f..00000000000
--- a/english/lts/security/2019/dla-1763.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1763-1 putty</define-tag>
-<define-tag report_date>2019-4-24</define-tag>
-<define-tag secrefs>CVE-2019-9894 CVE-2019-9897 CVE-2019-9898</define-tag>
-<define-tag packages>putty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1763.wml b/english/lts/security/2019/dla-1763.wml
deleted file mode 100644
index 406a4d739f3..00000000000
--- a/english/lts/security/2019/dla-1763.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were found in the PuTTY SSH client, which could
-result in denial of service and potentially the execution of arbitrary
-code. In addition, in some situations random numbers could potentially be
-re-used.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.63-10+deb8u2.</p>
-
-<p>We recommend that you upgrade your putty packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1763.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1764.data b/english/lts/security/2019/dla-1764.data
deleted file mode 100644
index 2e96e25ad07..00000000000
--- a/english/lts/security/2019/dla-1764.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1764-1 mercurial</define-tag>
-<define-tag report_date>2019-04-25</define-tag>
-<define-tag secrefs>CVE-2019-3902</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1764.wml b/english/lts/security/2019/dla-1764.wml
deleted file mode 100644
index b09fd98c93d..00000000000
--- a/english/lts/security/2019/dla-1764.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a path traversal vulnerability in the
-mercurial distributed revision version control system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3902">CVE-2019-3902</a>
-
- <p>A flaw was found in Mercurial before 4.9. It was possible to use
- symlinks and subrepositories to defeat Mercurial's path-checking logic and
- write files outside a repository.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.1.2-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1764.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1765.data b/english/lts/security/2019/dla-1765.data
deleted file mode 100644
index 2b8d7a0402c..00000000000
--- a/english/lts/security/2019/dla-1765.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1765-1 gpac</define-tag>
-<define-tag report_date>2019-4-25</define-tag>
-<define-tag secrefs>CVE-2019-11221 CVE-2019-11222</define-tag>
-<define-tag packages>gpac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1765.wml b/english/lts/security/2019/dla-1765.wml
deleted file mode 100644
index 1369870b5b9..00000000000
--- a/english/lts/security/2019/dla-1765.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found for gpac, an Open Source multimedia
-framework. Using crafted files one can trigger buffer overflow issues
-that could be used to crash the application.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.0+svn5324~dfsg1-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your gpac packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1765.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1766.data b/english/lts/security/2019/dla-1766.data
deleted file mode 100644
index 3cf0201cbb0..00000000000
--- a/english/lts/security/2019/dla-1766.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1766-1 evolution</define-tag>
-<define-tag report_date>2019-04-26</define-tag>
-<define-tag secrefs>CVE-2018-15587 Bug#924616</define-tag>
-<define-tag packages>evolution</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1766.wml b/english/lts/security/2019/dla-1766.wml
deleted file mode 100644
index 3f48c05763d..00000000000
--- a/english/lts/security/2019/dla-1766.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Hanno Böck discovered that GNOME Evolution is prone to OpenPGP signatures
-being spoofed for arbitrary messages using a specially crafted HTML email.
-This issue was mitigated by moving the security bar with encryption and
-signature information above the message headers.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.12.9~git20141130.241663-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your evolution packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1766.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1767.data b/english/lts/security/2019/dla-1767.data
deleted file mode 100644
index 8447e793197..00000000000
--- a/english/lts/security/2019/dla-1767.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1767-1 monit</define-tag>
-<define-tag report_date>2019-4-26</define-tag>
-<define-tag secrefs>CVE-2019-11454 CVE-2019-11455</define-tag>
-<define-tag packages>monit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1767.wml b/english/lts/security/2019/dla-1767.wml
deleted file mode 100644
index 98bc908af6c..00000000000
--- a/english/lts/security/2019/dla-1767.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Zack Flack found several issues in monit, a utility for monitoring and
-managing daemons or similar programs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11454">CVE-2019-11454</a>
-
- <p>An XSS vulnerabilitty has been reported that could be prevented by
- HTML escaping the log file content when viewed via Monit GUI.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11455">CVE-2019-11455</a>
-
- <p>A buffer overrun vulnerability has been reported in URL decoding.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:5.9-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your monit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1767.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1768.data b/english/lts/security/2019/dla-1768.data
deleted file mode 100644
index a9ebfb6309b..00000000000
--- a/english/lts/security/2019/dla-1768.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1768-1 checkstyle</define-tag>
-<define-tag report_date>2019-04-28</define-tag>
-<define-tag secrefs>CVE-2019-9658</define-tag>
-<define-tag packages>checkstyle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1768.wml b/english/lts/security/2019/dla-1768.wml
deleted file mode 100644
index cdaa0f779e6..00000000000
--- a/english/lts/security/2019/dla-1768.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>checkstyle was loading external DTDs by default,
-which is now disabled by default.</p>
-
-<p>If needed it can be re-enabled by setting the system property
-checkstyle.enableExternalDtdLoad to true.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.9-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your checkstyle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1768.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1769.data b/english/lts/security/2019/dla-1769.data
deleted file mode 100644
index 9fb40af67aa..00000000000
--- a/english/lts/security/2019/dla-1769.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1769-1 gst-plugins-base0.10</define-tag>
-<define-tag report_date>2019-4-28</define-tag>
-<define-tag secrefs>CVE-2019-9928</define-tag>
-<define-tag packages>gst-plugins-base0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1769.wml b/english/lts/security/2019/dla-1769.wml
deleted file mode 100644
index 883d283f7dd..00000000000
--- a/english/lts/security/2019/dla-1769.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The RTSP connection parser in the base GStreamer packages version 0.10,
-which is a streaming media framework, was vulnerable against an
-heap-based buffer overflow by sending a longer than allowed session id in
-a response and including a semicolon to change the maximum length. This
-could result in a remote code execution.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.10.36-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1769.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1770.data b/english/lts/security/2019/dla-1770.data
deleted file mode 100644
index 82275c22250..00000000000
--- a/english/lts/security/2019/dla-1770.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1770-1 gst-plugins-base1.0</define-tag>
-<define-tag report_date>2019-4-28</define-tag>
-<define-tag secrefs>CVE-2019-9928</define-tag>
-<define-tag packages>gst-plugins-base1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1770.wml b/english/lts/security/2019/dla-1770.wml
deleted file mode 100644
index 16e1c13fd87..00000000000
--- a/english/lts/security/2019/dla-1770.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The RTSP connection parser in the base GStreamer packages version 1.0,
-which is a streaming media framework, was vulnerable against an
-heap-based buffer overflow by sending a longer than allowed session id in
-a response and including a semicolon to change the maximum length. This
-could result in a remote code execution.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.4-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base1.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1770.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1771.data b/english/lts/security/2019/dla-1771.data
deleted file mode 100644
index 66cb72633bc..00000000000
--- a/english/lts/security/2019/dla-1771.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1771-1 linux-4.9</define-tag>
-<define-tag report_date>2019-05-03</define-tag>
-<define-tag secrefs>CVE-2018-14625 CVE-2018-16884 CVE-2018-19824 CVE-2018-19985 CVE-2018-20169 CVE-2018-1000026 CVE-2019-3459 CVE-2019-3460 CVE-2019-3701 CVE-2019-3819 CVE-2019-6974 CVE-2019-7221 CVE-2019-7222 CVE-2019-8980 CVE-2019-9213 Bug#904385 Bug#918103 Bug#922306</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1771.wml b/english/lts/security/2019/dla-1771.wml
deleted file mode 100644
index 6e479ca7f1c..00000000000
--- a/english/lts/security/2019/dla-1771.wml
+++ /dev/null
@@ -1,140 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14625">CVE-2018-14625</a>
-
- <p>A use-after-free bug was found in the vhost driver for the Virtual
- Socket protocol. If this driver is used to communicate with a
- malicious virtual machine guest, the guest could read sensitive
- information from the host kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16884">CVE-2018-16884</a>
-
- <p>A flaw was found in the NFS 4.1 client implementation. Mounting
- NFS shares in multiple network namespaces at the same time could
- lead to a user-after-free. Local users might be able to use this
- for denial of service (memory corruption or crash) or possibly
- for privilege escalation.</p>
-
- <p>This can be mitigated by disabling unprivileged users from
- creating user namespaces, which is the default in Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19824">CVE-2018-19824</a>
-
- <p>Hui Peng and Mathias Payer discovered a use-after-free bug in the
- USB audio driver. A physically present attacker able to attach a
- specially designed USB device could use this for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19985">CVE-2018-19985</a>
-
- <p>Hui Peng and Mathias Payer discovered a missing bounds check in the
- hso USB serial driver. A physically present user able to attach a
- specially designed USB device could use this to read sensitive
- information from the kernel or to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20169">CVE-2018-20169</a>
-
- <p>Hui Peng and Mathias Payer discovered missing bounds checks in the
- USB core. A physically present attacker able to attach a specially
- designed USB device could use this to cause a denial of service
- (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000026">CVE-2018-1000026</a>
-
- <p>It was discovered that Linux could forward aggregated network
- packets with a segmentation size too large for the output device.
- In the specific case of Broadcom NetXtremeII 10Gb adapters, this
- would result in a denial of service (firmware crash). This update
- adds a mitigation to the bnx2x driver for this hardware.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3459">CVE-2019-3459</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-3460">CVE-2019-3460</a>
-
- <p>Shlomi Oberman, Yuli Shapiro and Karamba Security Ltd. research
- team discovered missing range checks in the Bluetooth L2CAP
- implementation. If Bluetooth is enabled, a nearby attacker
- could use these to read sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3701">CVE-2019-3701</a>
-
- <p>Muyu Yu and Marcus Meissner reported that the CAN gateway
- implementation allowed the frame length to be modified, typically
- resulting in out-of-bounds memory-mapped I/O writes. On a system
- with CAN devices present, a local user with CAP_NET_ADMIN
- capability in the initial net namespace could use this to cause a
- crash (oops) or other hardware-dependent impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3819">CVE-2019-3819</a>
-
- <p>A potential infinite loop was discovered in the HID debugfs
- interface exposed under /sys/kernel/debug/hid. A user with access
- to these files could use this for denial of service.</p>
-
- <p>This interface is only accessible to root by default, which fully
- mitigates the issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6974">CVE-2019-6974</a>
-
- <p>Jann Horn reported a use-after-free bug in KVM. A local user
- with access to /dev/kvm could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7221">CVE-2019-7221</a>
-
- <p>Jim Mattson and Felix Wilhelm reported a user-after-free bug in
- KVM's nested VMX implementation. On systems with Intel CPUs, a
- local user with access to /dev/kvm could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation.</p>
-
- <p>Nested VMX is disabled by default, which fully mitigates the
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7222">CVE-2019-7222</a>
-
- <p>Felix Wilhelm reported an information leak in KVM for x86.
- A local user with access to /dev/kvm could use this to read
- sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8980">CVE-2019-8980</a>
-
- <p>A bug was discovered in the kernel_read_file() function used to
- load firmware files. In certain error conditions it could leak
- memory, which might lead to a denial of service. This is probbaly
- not exploitable in a Debian system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9213">CVE-2019-9213</a>
-
- <p>Jann Horn reported that privileged tasks could cause stack
- segments, including those in other processes, to grow downward to
- address 0. On systems lacking SMAP (x86) or PAN (ARM), this
- exacerbated other vulnerabilities: a null pointer dereference
- could be exploited for privilege escalation rather than only for
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.168-1~deb8u1. This version also includes fixes for Debian
-bugs #904385, #918103, and #922306; and other fixes included in upstream
-stable updates.</p>
-
-<p>We recommend that you upgrade your linux-4.9 and linux-latest-4.9
-packages. You will need to use <code>apt-get upgrade --with-new-pkgs</code>
-or <code>apt upgrade</code> as the binary package names have changed.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1771.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1772.data b/english/lts/security/2019/dla-1772.data
deleted file mode 100644
index cf1c67a362f..00000000000
--- a/english/lts/security/2019/dla-1772.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1772-1 libvirt</define-tag>
-<define-tag report_date>2019-05-01</define-tag>
-<define-tag secrefs>CVE-2016-10746</define-tag>
-<define-tag packages>libvirt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1772.wml b/english/lts/security/2019/dla-1772.wml
deleted file mode 100644
index 59637aca71e..00000000000
--- a/english/lts/security/2019/dla-1772.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>libvirt-domain.c in libvirt supports virDomainGetTime API calls by guest agents
-with an RO connection, even though an RW connection was supposed to be
-required. This could lead to could lead to potentially disclosing unintended
-information or denial of service by causing libvirt to block.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.9-9+deb8u6.</p>
-
-<p>We recommend that you upgrade your libvirt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1772.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1773.data b/english/lts/security/2019/dla-1773.data
deleted file mode 100644
index f2681777714..00000000000
--- a/english/lts/security/2019/dla-1773.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1773-1 signing-party</define-tag>
-<define-tag report_date>2019-5-1</define-tag>
-<define-tag secrefs>CVE-2019-11627 Bug#928256</define-tag>
-<define-tag packages>signing-party</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1773.wml b/english/lts/security/2019/dla-1773.wml
deleted file mode 100644
index f27f37405b9..00000000000
--- a/english/lts/security/2019/dla-1773.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An unsafe shell call enabling shell injection via a user ID was
-corrected in gpg-key2ps, a tool to generate a PostScript file with
-OpenPGP key fingerprint slips.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.1.10-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your signing-party packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1773.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1774.data b/english/lts/security/2019/dla-1774.data
deleted file mode 100644
index 210d1332f25..00000000000
--- a/english/lts/security/2019/dla-1774.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1774-1 otrs2</define-tag>
-<define-tag report_date>2019-5-3</define-tag>
-<define-tag secrefs>CVE-2019-9892</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1774.wml b/english/lts/security/2019/dla-1774.wml
deleted file mode 100644
index c56b84f2c1d..00000000000
--- a/english/lts/security/2019/dla-1774.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in OTRS, the Open Ticket Request System. An
-attacker who is logged into OTRS as an agent user with appropriate
-permissions may try to import carefully crafted Report Statistics XML
-that will result in reading of arbitrary files of OTRS filesystem.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.3.18-1+deb8u9.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1774.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1775.data b/english/lts/security/2019/dla-1775.data
deleted file mode 100644
index 869ed104e75..00000000000
--- a/english/lts/security/2019/dla-1775.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1775-1 phpbb3</define-tag>
-<define-tag report_date>2019-5-4</define-tag>
-<define-tag secrefs>CVE-2019-9826</define-tag>
-<define-tag packages>phpbb3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1775.wml b/english/lts/security/2019/dla-1775.wml
deleted file mode 100644
index 88c3f677704..00000000000
--- a/english/lts/security/2019/dla-1775.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Colin Snover discovered a denial-of-service vulnerability in phpBB3, a
-full-featured web forum. Previous versions allowed users to run searches
-that might result in long execution times and load on larger boards when
-using the fulltext native search engine. To combat this, further
-restrictions were introduced on search queries.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.0.12-5+deb8u3.</p>
-
-<p>We recommend that you upgrade your phpbb3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1775.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1776.data b/english/lts/security/2019/dla-1776.data
deleted file mode 100644
index 836cb679162..00000000000
--- a/english/lts/security/2019/dla-1776.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1776-1 librecad</define-tag>
-<define-tag report_date>2019-5-5</define-tag>
-<define-tag secrefs>CVE-2018-19105 Bug#928477</define-tag>
-<define-tag packages>librecad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1776.wml b/english/lts/security/2019/dla-1776.wml
deleted file mode 100644
index 6021cd6cfe1..00000000000
--- a/english/lts/security/2019/dla-1776.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in LibreCAD, a computer-aided design system,
-which could be exploited to crash the application or cause other
-unspecified impact when opening a specially crafted file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.4-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your librecad packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1776.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1777-2.data b/english/lts/security/2019/dla-1777-2.data
deleted file mode 100644
index 5ac65fac1d8..00000000000
--- a/english/lts/security/2019/dla-1777-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1777-2 jquery</define-tag>
-<define-tag report_date>2019-05-20</define-tag>
-<define-tag secrefs>Bug##928827</define-tag>
-<define-tag packages>jquery</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1777-2.wml b/english/lts/security/2019/dla-1777-2.wml
deleted file mode 100644
index be389f1fbd7..00000000000
--- a/english/lts/security/2019/dla-1777-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The minified jquery library was broken in version 1.7.2+dfsg-3.2+deb8u6 due to
-an error during the build. This problem has now been fixed in
-version 1.7.2+dfsg-3.2+deb8u7</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.7.2+dfsg-3.2+deb8u7.</p>
-
-<p>We recommend that you upgrade your jquery packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1777-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1777.data b/english/lts/security/2019/dla-1777.data
deleted file mode 100644
index 9bb8fcacf00..00000000000
--- a/english/lts/security/2019/dla-1777.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1777-1 jquery</define-tag>
-<define-tag report_date>2019-05-07</define-tag>
-<define-tag secrefs>CVE-2019-11358</define-tag>
-<define-tag packages>jquery</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1777.wml b/english/lts/security/2019/dla-1777.wml
deleted file mode 100644
index 775a86a1e5b..00000000000
--- a/english/lts/security/2019/dla-1777.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>jQuery mishandles <code>jQuery.extend(true, {}, ...)</code> because of
-<code>Object.prototype</code>
-pollution. If an unsanitized source object contained an enumerable <code>__proto__</code>
-property, it could extend the native <code>Object.prototype</code>. For additional
-information, please refer to the upstream advisory at
-<a href="https://www.drupal.org/sa-core-2019-006">https://www.drupal.org/sa-core-2019-006</a> .</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.7.2+dfsg-3.2+deb8u6.</p>
-
-<p>We recommend that you upgrade your jquery packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1777.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1778.data b/english/lts/security/2019/dla-1778.data
deleted file mode 100644
index d921482ab7a..00000000000
--- a/english/lts/security/2019/dla-1778.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1778-1 symfony</define-tag>
-<define-tag report_date>2019-05-06</define-tag>
-<define-tag secrefs>CVE-2019-10909 CVE-2019-10910 CVE-2019-10911 CVE-2019-10913</define-tag>
-<define-tag packages>symfony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1778.wml b/english/lts/security/2019/dla-1778.wml
deleted file mode 100644
index a8c6e523169..00000000000
--- a/english/lts/security/2019/dla-1778.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities have been discovered in symfony, a PHP
-web application framework. Numerous symfony components are affected:
-Framework Bundle, Dependency Injection, Security, HttpFoundation</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10909">CVE-2019-10909</a>
-
- <p>Validation messages were not escaped when using the form theme of
- the PHP templating engine which, when validation messages may contain
- user input, could result in an XSS.</p>
-
- <p>For further information, see the upstream advisory at
- <a href="https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine">https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10910">CVE-2019-10910</a>
-
- <p>Service IDs derived from unfiltered user input could result in the
- execution of any arbitrary code, resulting in possible remote code
- execution.</p>
-
- <p>For further information, see the upstream advisory at
- <a href="https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid">https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10911">CVE-2019-10911</a>
-
- <p>This fixes situations where part of an expiry time in a cookie could
- be considered part of the username, or part of the username could be
- considered part of the expiry time. An attacker could modify the
- remember me cookie and authenticate as a different user. This attack
- is only possible if remember me functionality is enabled and the two
- users share a password hash or the password hashes (e.g.
- UserInterface::getPassword()) are null for all users (which is valid
- if passwords are checked by an external system, e.g. an SSO).</p>
-
- <p>For further information, see the upstream advisory at
- <a href="https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash">https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10913">CVE-2019-10913</a>
-
- <p>HTTP methods, from either the HTTP method itself or using the
- X-Http-Method-Override header were previously returned as the method
- in question without validation being done on the string, meaning
- that they could be used in dangerous contexts when left unescaped.</p>
-
- <p>For further information, see the upstream advisory at
- <a href="https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides">https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides</a></p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.3.21+dfsg-4+deb8u5.</p>
-
-<p>We recommend that you upgrade your symfony packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1778.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1779.data b/english/lts/security/2019/dla-1779.data
deleted file mode 100644
index fcf5406c869..00000000000
--- a/english/lts/security/2019/dla-1779.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1779-1 389-ds-base</define-tag>
-<define-tag report_date>2019-05-06</define-tag>
-<define-tag secrefs>CVE-2019-3883 Bug#927939</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1779.wml b/english/lts/security/2019/dla-1779.wml
deleted file mode 100644
index c4765bf6560..00000000000
--- a/english/lts/security/2019/dla-1779.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In 389-ds-base up to version 1.4.1.2, requests were handled by worker
-threads. Each socket had been waited for by the worker for at most
-<q>ioblocktimeout</q> seconds. However, this timeout applied only to
-un-encrypted requests. Connections using SSL/TLS were not taking this
-timeout into account during reads, and may have hung longer. An
-unauthenticated attacker could have repeatedly created hanging LDAP
-requests to hang all the workers, resulting in a Denial of Service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.3.5-4+deb8u6.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1779.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1780.data b/english/lts/security/2019/dla-1780.data
deleted file mode 100644
index 54498d5a216..00000000000
--- a/english/lts/security/2019/dla-1780.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1780-1 firefox-esr</define-tag>
-<define-tag report_date>2019-05-07</define-tag>
-<define-tag secrefs>Bug#928415 Bug#928449 Bug#928509</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1780.wml b/english/lts/security/2019/dla-1780.wml
deleted file mode 100644
index a31b523de04..00000000000
--- a/english/lts/security/2019/dla-1780.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Firefox 60.6.2 ESR repairs a certificate chain issue that caused
-extensions to be disabled in the past few days. More information, and
-details of known remaining issues, can be found at
-<a href="https://www.mozilla.org/firefox/60.6.2/releasenotes/">https://www.mozilla.org/firefox/60.6.2/releasenotes/</a> and
-<a href="https://blog.mozilla.org/addons/2019/05/04/update-regarding-add-ons-in-firefox/">https://blog.mozilla.org/addons/2019/05/04/update-regarding-add-ons-in-firefox/</a></p>
-
-<p>Installing this update will re-enable any extensions that were disabled
-due to this issue.</p>
-
-<p>Extensions installed from Debian packages were not affected.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-60.6.2esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1780.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1781.data b/english/lts/security/2019/dla-1781.data
deleted file mode 100644
index 9803473aea6..00000000000
--- a/english/lts/security/2019/dla-1781.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1781-1 qemu</define-tag>
-<define-tag report_date>2019-5-9</define-tag>
-<define-tag secrefs>CVE-2018-11806 CVE-2018-18849 CVE-2018-20815 CVE-2019-9824 Bug#901017 Bug#912535</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1781.wml b/english/lts/security/2019/dla-1781.wml
deleted file mode 100644
index 1b22c6feb47..00000000000
--- a/english/lts/security/2019/dla-1781.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in QEMU, a fast processor emulator:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11806">CVE-2018-11806</a>
-
- <p>It was found that the SLiRP networking implementation could use a wrong
- size when reallocating its buffers, which can be exploited by a
- priviledged user on a guest to cause denial of service or possibly
- arbitrary code execution on the host system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18849">CVE-2018-18849</a>
-
- <p>It was found that the LSI53C895A SCSI Host Bus Adapter emulation was
- susceptible to an out of bounds memory access, which could be leveraged
- by a malicious guest user to crash the QEMU process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20815">CVE-2018-20815</a>
-
- <p>A heap buffer overflow was found in the load_device_tree function,
- which could be used by a malicious user to potentially execute
- arbitrary code with the priviledges of the QEMU process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9824">CVE-2019-9824</a>
-
- <p>William Bowling discovered that the SLiRP networking implementation did
- not handle some messages properly, which could be triggered to leak
- memory via crafted messages.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u11.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1781.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1782.data b/english/lts/security/2019/dla-1782.data
deleted file mode 100644
index 354da3135cb..00000000000
--- a/english/lts/security/2019/dla-1782.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1782-1 openjdk-7</define-tag>
-<define-tag report_date>2019-5-10</define-tag>
-<define-tag secrefs>CVE-2019-2602 CVE-2019-2684 CVE-2019-2698</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1782.wml b/english/lts/security/2019/dla-1782.wml
deleted file mode 100644
index 8201efcd924..00000000000
--- a/english/lts/security/2019/dla-1782.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in denial of
-service, sandbox bypass, information disclosure or the execution
-of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7u221-2.6.18-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1782.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1783.data b/english/lts/security/2019/dla-1783.data
deleted file mode 100644
index feb5b73a4b9..00000000000
--- a/english/lts/security/2019/dla-1783.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1783-1 atftp</define-tag>
-<define-tag report_date>2019-5-12</define-tag>
-<define-tag secrefs>CVE-2019-11365 CVE-2019-11366</define-tag>
-<define-tag packages>atftp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1783.wml b/english/lts/security/2019/dla-1783.wml
deleted file mode 100644
index 2e00e9b331c..00000000000
--- a/english/lts/security/2019/dla-1783.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Denis Andzakovic discovered two vulnerabilities in atftp, the advanced
-TFTP server which could result in denial of service by sending malformed
-packets.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.7.git20120829-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your atftp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1783.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1784.data b/english/lts/security/2019/dla-1784.data
deleted file mode 100644
index 526ac2d1bdd..00000000000
--- a/english/lts/security/2019/dla-1784.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1784-1 postgresql-9.4</define-tag>
-<define-tag report_date>2019-5-13</define-tag>
-<define-tag packages>postgresql-9.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1784.wml b/english/lts/security/2019/dla-1784.wml
deleted file mode 100644
index 03d5fe175b5..00000000000
--- a/english/lts/security/2019/dla-1784.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The PostgreSQL project has release a new minor release of the 9.4
-branch.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this has been uploaded as version
-9.4.22-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
-
-<p>Note that the end of life of the 9.4 branch is scheduled for February
-2020. Please consider upgrading to a newer major release before that
-point.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1784.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1785.data b/english/lts/security/2019/dla-1785.data
deleted file mode 100644
index 92621565879..00000000000
--- a/english/lts/security/2019/dla-1785.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1785-1 imagemagick</define-tag>
-<define-tag report_date>2019-5-14</define-tag>
-<define-tag secrefs>CVE-2017-9500 CVE-2017-11446 CVE-2017-11523 CVE-2017-11537 CVE-2017-12140 CVE-2017-12430 CVE-2017-12432 CVE-2017-12435 CVE-2017-12563 CVE-2017-12587 CVE-2017-12643 CVE-2017-12670 CVE-2017-12674 CVE-2017-12691 CVE-2017-12692 CVE-2017-12693 CVE-2017-12875 CVE-2017-13133 CVE-2017-13142 CVE-2017-13145 CVE-2017-13658 CVE-2017-13768 CVE-2017-14060 CVE-2017-14172 CVE-2017-14173 CVE-2017-14174 CVE-2017-14175 CVE-2017-14249 CVE-2017-14341 CVE-2017-14400 CVE-2017-14505 CVE-2017-14532 CVE-2017-14624 CVE-2017-14625 CVE-2017-14626 CVE-2017-14739 CVE-2017-14741 CVE-2017-15015 CVE-2017-15017 CVE-2017-15281 CVE-2017-17682 CVE-2017-17914 CVE-2017-18271 CVE-2017-18273 CVE-2017-1000445 CVE-2017-1000476 CVE-2019-9956 CVE-2019-10650 CVE-2019-11597 CVE-2019-11598 Bug#867778 Bug#868950 Bug#869210 Bug#869712 Bug#873059 Bug#869727 Bug#870491 Bug#870504</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1785.wml b/english/lts/security/2019/dla-1785.wml
deleted file mode 100644
index ee6ae7a7b01..00000000000
--- a/english/lts/security/2019/dla-1785.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Numerous security vulnerabilities were fixed in Imagemagick. Various
-memory handling problems and cases of missing or incomplete input
-sanitizing may result in denial of service, memory or CPU exhaustion,
-information disclosure or potentially the execution of arbitrary code
-when a malformed image file is processed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8:6.8.9.9-5+deb8u16.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1785.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1786.data b/english/lts/security/2019/dla-1786.data
deleted file mode 100644
index 6d98bce003d..00000000000
--- a/english/lts/security/2019/dla-1786.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1786-1 qt4-x11</define-tag>
-<define-tag report_date>2019-05-14</define-tag>
-<define-tag secrefs>CVE-2018-15518 CVE-2018-19869 CVE-2018-19870 CVE-2018-19871 CVE-2018-19873 Bug##923003</define-tag>
-<define-tag packages>qt4-x11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1786.wml b/english/lts/security/2019/dla-1786.wml
deleted file mode 100644
index 24474849720..00000000000
--- a/english/lts/security/2019/dla-1786.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple issues have been addressed in Qt4.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15518">CVE-2018-15518</a>
-
- <p>A double-free or corruption during parsing of a specially crafted
- illegal XML document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19869">CVE-2018-19869</a>
-
- <p>A malformed SVG image could cause a segmentation fault in
- qsvghandler.cpp.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19870">CVE-2018-19870</a>
-
- <p>A malformed GIF image might have caused a NULL pointer dereference in
- QGifHandler resulting in a segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19871">CVE-2018-19871</a>
-
- <p>There was an uncontrolled resource consumption in QTgaFile.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19873">CVE-2018-19873</a>
-
- <p>QBmpHandler had a buffer overflow via BMP data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your qt4-x11 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1786.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1787.data b/english/lts/security/2019/dla-1787.data
deleted file mode 100644
index a499b1b2bde..00000000000
--- a/english/lts/security/2019/dla-1787.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1787-1 linux-4.9</define-tag>
-<define-tag report_date>2019-05-15</define-tag>
-<define-tag secrefs>CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 Bug#928125</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1787.wml b/english/lts/security/2019/dla-1787.wml
deleted file mode 100644
index 10af93c6c72..00000000000
--- a/english/lts/security/2019/dla-1787.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple researchers have discovered vulnerabilities in the way the
-Intel processor designs have implemented speculative forwarding of data
-filled into temporary microarchitectural structures (buffers). This
-flaw could allow an attacker controlling an unprivileged process to
-read sensitive information, including from the kernel and all other
-processes running on the system or cross guest/host boundaries to read
-host memory.</p>
-
-<p>See <a href="https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html">https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html</a>
-for more details.</p>
-
-<p>To fully resolve these vulnerabilities it is also necessary to install
-updated CPU microcode. An updated intel-microcode package (only
-available in Debian non-free) will be provided via a separate DLA. The
-updated CPU microcode may also be available as part of a system firmware
-("BIOS") update.</p>
-
-<p>In addition, this update includes a fix for a regression causing
-deadlocks inside the loopback driver, which was introduced by the update
-to 4.9.168 in the last security update.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.168-1+deb9u2~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1787.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1788.data b/english/lts/security/2019/dla-1788.data
deleted file mode 100644
index 1d09b12442b..00000000000
--- a/english/lts/security/2019/dla-1788.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1788-1 samba</define-tag>
-<define-tag report_date>2019-5-15</define-tag>
-<define-tag secrefs>CVE-2018-16860</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1788.wml b/english/lts/security/2019/dla-1788.wml
deleted file mode 100644
index 574f3a12347..00000000000
--- a/english/lts/security/2019/dla-1788.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Isaac Boukris and Andrew Bartlett discovered that the S4U2Self Kerberos
-extension used in Samba's Active Directory support was susceptible to
-man-in-the-middle attacks caused by incomplete checksum validation.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:4.2.14+dfsg-0+deb8u13.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1788.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1789-2.data b/english/lts/security/2019/dla-1789-2.data
deleted file mode 100644
index 9bb06c95008..00000000000
--- a/english/lts/security/2019/dla-1789-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1789-2 intel-microcode</define-tag>
-<define-tag report_date>2019-06-20</define-tag>
-<define-tag secrefs>CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 Bug#929073</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1789-2.wml b/english/lts/security/2019/dla-1789-2.wml
deleted file mode 100644
index e6656e440bf..00000000000
--- a/english/lts/security/2019/dla-1789-2.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA-1789-1 shipped updated CPU microcode for most types of Intel CPUs as
-mitigations for the MSBDS, MFBDS, MLPDS and MDSUM hardware vulnerabilities.</p>
-
-<p>This update provides additional support for some Sandybridge server
-and Core-X CPUs which were not covered in the original May microcode
-release. For a list of specific CPU models now supported please refer
-to the entries listed under CPUID 206D6 and 206D7 at
-<a href="https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf">https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</a></p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.20190618.1~deb8u1 of the intel-microcode package.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be found
-at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For the detailed security status of intel-microcode please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1789-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1789.data b/english/lts/security/2019/dla-1789.data
deleted file mode 100644
index 7410340729f..00000000000
--- a/english/lts/security/2019/dla-1789.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1789-1 intel-microcode</define-tag>
-<define-tag report_date>2019-05-15</define-tag>
-<define-tag secrefs>CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 Bug#929007</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1789.wml b/english/lts/security/2019/dla-1789.wml
deleted file mode 100644
index 64abf42b1c8..00000000000
--- a/english/lts/security/2019/dla-1789.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update ships updated CPU microcode for most types of Intel CPUs. It
-provides microcode support for the kernel to implement mitigations for
-the MSBDS, MFBDS, MLPDS and MDSUM hardware vulnerabilities.</p>
-
-<p>To fully resolve these vulnerabilities it is also necessary to update
-the Linux kernel packages, which is the subject of DLA-1787-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.20190514.1~deb8u1 of the intel-microcode package, and also by the
-Linux kernel updates described in DLA-1787-1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages, and Linux
-kernel packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be found
-at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>For the detailed security status of intel-microcode please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1789.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1790.data b/english/lts/security/2019/dla-1790.data
deleted file mode 100644
index a94fffad985..00000000000
--- a/english/lts/security/2019/dla-1790.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1790-1 lemonldap-ng</define-tag>
-<define-tag report_date>2019-05-18</define-tag>
-<define-tag secrefs>CVE-2019-12046 Bug#928944</define-tag>
-<define-tag packages>lemonldap-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1790.wml b/english/lts/security/2019/dla-1790.wml
deleted file mode 100644
index a2a9c7c5bb3..00000000000
--- a/english/lts/security/2019/dla-1790.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An attack vector was discovered by lemonldap-ng developers. When the SAML
-or CAS service provider is enable and the administrator has chosen to store
-SAML/CAS tokens in the session database, an attacker can open an anonymous
-session to connect to any protected application that does not have specific
-access rules.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your lemonldap-ng packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1790.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1791.data b/english/lts/security/2019/dla-1791.data
deleted file mode 100644
index 95254f213bb..00000000000
--- a/english/lts/security/2019/dla-1791.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1791-1 faad2</define-tag>
-<define-tag report_date>2019-05-21</define-tag>
-<define-tag secrefs>CVE-2018-20194 CVE-2018-20197 CVE-2018-20198 CVE-2018-20362</define-tag>
-<define-tag packages>faad2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1791.wml b/english/lts/security/2019/dla-1791.wml
deleted file mode 100644
index 498899274ef..00000000000
--- a/english/lts/security/2019/dla-1791.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in faad2, the Freeware Advanced Audio
-Coder:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20194">CVE-2018-20194</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-20197">CVE-2018-20197</a>
-
- <p>Improper handling of implicit channel mapping reconfiguration leads to
- multiple heap based buffer overflow issues. These flaws might be leveraged
- by remote attackers to cause DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20198">CVE-2018-20198</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-20362">CVE-2018-20362</a>
-
- <p>Insufficient user input validation in the sbr_hfadj module leads to
- stack-based buffer underflow issues. These flaws might be leveraged by
- remote attackers to cause DoS or any other unspecified impact.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.7-8+deb8u2.</p>
-
-<p>We recommend that you upgrade your faad2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1791.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1792-2.data b/english/lts/security/2019/dla-1792-2.data
deleted file mode 100644
index 0d7a615cd7b..00000000000
--- a/english/lts/security/2019/dla-1792-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1792-2 cups-filters</define-tag>
-<define-tag report_date>2019-05-19</define-tag>
-<define-tag secrefs>Bug#926576 Bug#928936 Bug#928952</define-tag>
-<define-tag packages>cups-filters</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1792-2.wml b/english/lts/security/2019/dla-1792-2.wml
deleted file mode 100644
index 2e875de49af..00000000000
--- a/english/lts/security/2019/dla-1792-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update for ghostscript released as DLA-1792-1 uncovered an issue in
-cups-filters which was using the undocumented Ghostscript internal
-<q>pdfdict</q> now hidden in the ghostscript update. Updated cups-filters
-packages are now available to correct this issue.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.61-5+deb8u4.</p>
-
-<p>We recommend that you upgrade your cups-filters packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1792-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1792.data b/english/lts/security/2019/dla-1792.data
deleted file mode 100644
index 996f10a76fd..00000000000
--- a/english/lts/security/2019/dla-1792.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1792-1 ghostscript</define-tag>
-<define-tag report_date>2019-05-19</define-tag>
-<define-tag secrefs>CVE-2019-3839</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1792.wml b/english/lts/security/2019/dla-1792.wml
deleted file mode 100644
index 7fed695350d..00000000000
--- a/english/lts/security/2019/dla-1792.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in Ghostscript, the GPL PostScript/PDF
-interpreter, which may result in denial of service or the execution of
-arbitrary code if a malformed Postscript file is processed (despite the
--dSAFER sandbox being enabled).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.26a~dfsg-0+deb8u3.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1792.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1793.data b/english/lts/security/2019/dla-1793.data
deleted file mode 100644
index ff1c99e6db7..00000000000
--- a/english/lts/security/2019/dla-1793.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1793-1 dhcpcd5</define-tag>
-<define-tag report_date>2019-05-19</define-tag>
-<define-tag secrefs>CVE-2019-11579</define-tag>
-<define-tag packages>dhcpcd5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1793.wml b/english/lts/security/2019/dla-1793.wml
deleted file mode 100644
index a5819bf9069..00000000000
--- a/english/lts/security/2019/dla-1793.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a read overflow vulnerability in the dhcpcd5 network management protocol client.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11579">CVE-2019-11579</a>
-
- <p>dhcp.c in dhcpcd before 7.2.1 contains a 1-byte read overflow with DHO_OPTSOVERLOADED.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6.0.5-2+deb8u1. Thanks to Roy Marples &lt;roy@marples.name&gt;.</p>
-
-<p>We recommend that you upgrade your dhcpcd5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1793.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1794.data b/english/lts/security/2019/dla-1794.data
deleted file mode 100644
index 7121d1128d2..00000000000
--- a/english/lts/security/2019/dla-1794.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1794-1 libspring-security-2.0-java</define-tag>
-<define-tag report_date>2019-05-19</define-tag>
-<define-tag secrefs>CVE-2019-3795</define-tag>
-<define-tag packages>libspring-security-2.0-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1794.wml b/english/lts/security/2019/dla-1794.wml
deleted file mode 100644
index 8688537e1a6..00000000000
--- a/english/lts/security/2019/dla-1794.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in libspring-security-2.0-java, a modular
-Java/J2EE application security framework, when using
-SecureRandomFactoryBean#setSeed to configure a SecureRandom instance,
-resulting in insecure randomness.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.7.RELEASE-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libspring-security-2.0-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1794.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1795.data b/english/lts/security/2019/dla-1795.data
deleted file mode 100644
index a7d75d5c985..00000000000
--- a/english/lts/security/2019/dla-1795.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1795-1 graphicsmagick</define-tag>
-<define-tag report_date>2019-05-21</define-tag>
-<define-tag secrefs>CVE-2019-11473 CVE-2019-11474 CVE-2019-11505 CVE-2019-11506</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1795.wml b/english/lts/security/2019/dla-1795.wml
deleted file mode 100644
index 282ab74d467..00000000000
--- a/english/lts/security/2019/dla-1795.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in graphicsmagick, the image
-processing toolkit:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11473">CVE-2019-11473</a>
-
- <p>The WriteMATLABImage function (coders/mat.c) is affected by a heap-based
- buffer overflow. Remote attackers might leverage this vulnerability to
- cause denial of service or any other unspecified impact via crafted Matlab
- matrices.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11474">CVE-2019-11474</a>
-
- <p>The WritePDBImage function (coders/pdb.c) is affected by a heap-based
- buffer overflow. Remote attackers might leverage this vulnerability to
- cause denial of service or any other unspecified impact via a crafted Palm
- Database file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11505">CVE-2019-11505</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-11506">CVE-2019-11506</a>
-
- <p>The XWD module (coders/xwd.c) is affected by multiple heap-based
- buffer overflows and arithmetic exceptions. Remote attackers might leverage
- these various flaws to cause denial of service or any other unspecified
- impact via crafted XWD files.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.20-3+deb8u7.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1795.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1796.data b/english/lts/security/2019/dla-1796.data
deleted file mode 100644
index 8e561a6c1e4..00000000000
--- a/english/lts/security/2019/dla-1796.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1796-1 jruby</define-tag>
-<define-tag report_date>2019-05-21</define-tag>
-<define-tag secrefs>CVE-2018-1000074 CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-2018-1000078 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 Bug#895778 Bug#925987</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1796.wml b/english/lts/security/2019/dla-1796.wml
deleted file mode 100644
index 5e2426c7ff6..00000000000
--- a/english/lts/security/2019/dla-1796.wml
+++ /dev/null
@@ -1,84 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been discovered in jruby, Java
-implementation of the Ruby programming language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000074">CVE-2018-1000074</a>
-
- <p>Deserialization of Untrusted Data vulnerability in owner command
- that can result in code execution. This attack appear to be
- exploitable via victim must run the `gem owner` command on a gem
- with a specially crafted YAML file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000075">CVE-2018-1000075</a>
-
- <p>an infinite loop caused by negative size vulnerability in ruby gem
- package tar header that can result in a negative size could cause an
- infinite loop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000076">CVE-2018-1000076</a>
-
- <p>Improper Verification of Cryptographic Signature vulnerability in
- package.rb that can result in a mis-signed gem could be installed,
- as the tarball would contain multiple gem signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000077">CVE-2018-1000077</a>
-
- <p>Improper Input Validation vulnerability in ruby gems specification
- homepage attribute that can result in a malicious gem could set an
- invalid homepage URL</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000078">CVE-2018-1000078</a>
-
- <p>Cross Site Scripting (XSS) vulnerability in gem server display of
- homepage attribute that can result in XSS. This attack appear to be
- exploitable via the victim must browse to a malicious gem on a
- vulnerable gem server</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8321">CVE-2019-8321</a>
-
- <p>Gem::UserInteraction#verbose calls say without escaping, escape
- sequence injection is possible</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8322">CVE-2019-8322</a>
-
- <p>The gem owner command outputs the contents of the API response
- directly to stdout. Therefore, if the response is crafted, escape
- sequence injection may occur</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8323">CVE-2019-8323</a>
-
- <p>Gem::GemcutterUtilities#with_response may output the API response to
- stdout as it is. Therefore, if the API side modifies the response,
- escape sequence injection may occur.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8324">CVE-2019-8324</a>
-
- <p>A crafted gem with a multi-line name is not handled correctly.
- Therefore, an attacker could inject arbitrary code to the stub line
- of gemspec</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8325">CVE-2019-8325</a>
-
- <p>Gem::CommandManager#run calls alert_error without escaping, escape
- sequence injection is possible. (There are many ways to cause an
- error.)</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.6-9+deb8u1.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1796.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1797.data b/english/lts/security/2019/dla-1797.data
deleted file mode 100644
index 425adf51ac2..00000000000
--- a/english/lts/security/2019/dla-1797.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1797-1 drupal7</define-tag>
-<define-tag report_date>2019-05-20</define-tag>
-<define-tag secrefs>CVE-2019-11358 CVE-2019-11831 Bug#927330 Bug#928688</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1797.wml b/english/lts/security/2019/dla-1797.wml
deleted file mode 100644
index 37002ad0d27..00000000000
--- a/english/lts/security/2019/dla-1797.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in drupal7, a
-PHP web site platform. The vulnerabilities affect the embedded versions
-of the jQuery JavaScript library and the Typo3 Phar Stream Wrapper
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11358">CVE-2019-11358</a>
-
- <p>It was discovered that the jQuery version embedded in Drupal was
- prone to a cross site scripting vulnerability in jQuery.extend().</p>
-
- <p>For additional information, please refer to the upstream advisory
- at <a href="https://www.drupal.org/sa-core-2019-006.">https://www.drupal.org/sa-core-2019-006.</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11831">CVE-2019-11831</a>
-
- <p>It was discovered that incomplete validation in a Phar processing
- library embedded in Drupal, a fully-featured content management
- framework, could result in information disclosure.</p>
-
- <p>For additional information, please refer to the upstream advisory
- at <a href="https://www.drupal.org/sa-core-2019-007.">https://www.drupal.org/sa-core-2019-007.</a></p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.32-1+deb8u17.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1797.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1798.data b/english/lts/security/2019/dla-1798.data
deleted file mode 100644
index 86a9084d516..00000000000
--- a/english/lts/security/2019/dla-1798.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1798-1 jackson-databind</define-tag>
-<define-tag report_date>2019-5-21</define-tag>
-<define-tag secrefs>CVE-2019-12086 Bug#929177</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1798.wml b/english/lts/security/2019/dla-1798.wml
deleted file mode 100644
index f11b3dcdea4..00000000000
--- a/english/lts/security/2019/dla-1798.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A Polymorphic Typing issue was discovered in jackson-databind, a JSON
-library for Java. When Default Typing is enabled (either globally or
-for a specific property) for an externally exposed JSON endpoint, the
-service has the mysql-connector-java jar (8.0.14 or earlier) in the
-classpath, and an attacker can host a crafted MySQL server reachable
-by the victim, an attacker can send a crafted JSON message that allows
-them to read arbitrary local files on the server. This occurs because of
-missing com.mysql.cj.jdbc.admin.MiniAdmin validation.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.4.2-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1798.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1799-2.data b/english/lts/security/2019/dla-1799-2.data
deleted file mode 100644
index d163b880e75..00000000000
--- a/english/lts/security/2019/dla-1799-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1799-2 linux</define-tag>
-<define-tag report_date>2019-05-28</define-tag>
-<define-tag secrefs>CVE-2018-5995 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-2024 CVE-2019-3459 CVE-2019-3460 CVE-2019-3882 CVE-2019-3901 CVE-2019-6133 CVE-2019-9503 CVE-2019-11091 CVE-2019-11190 CVE-2019-11486 CVE-2019-11599 Bug#927781</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1799-2.wml b/english/lts/security/2019/dla-1799-2.wml
deleted file mode 100644
index 3d8f7eca2ea..00000000000
--- a/english/lts/security/2019/dla-1799-2.wml
+++ /dev/null
@@ -1,127 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<p>This updated advisory text adds a note about the need to install new
-binary packages.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5995">CVE-2018-5995</a>
-
- <p>ADLab of VenusTech discovered that the kernel logged the virtual
- addresses assigned to per-CPU data, which could make it easier to
- exploit other vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12126">CVE-2018-12126</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-12127">CVE-2018-12127</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-12130">CVE-2018-12130</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-11091">CVE-2019-11091</a>
-
- <p>Multiple researchers have discovered vulnerabilities in the way
- that Intel processor designs implement speculative forwarding of
- data filled into temporary microarchitectural structures
- (buffers). This flaw could allow an attacker controlling an
- unprivileged process to read sensitive information, including from
- the kernel and all other processes running on the system, or
- across guest/host boundaries to read host memory.</p>
-
- <p>See <a href="https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html">https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html</a>
- for more details.</p>
-
- <p>To fully resolve these vulnerabilities it is also necessary to
- install updated CPU microcode. An updated intel-microcode package
- (only available in Debian non-free) was provided via DLA-1789-1.
- The updated CPU microcode may also be available as part of a
- system firmware ("BIOS") update.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-2024">CVE-2019-2024</a>
-
- <p>A use-after-free bug was discovered in the em28xx video capture
- driver. Local users might be able to use this for denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3459">CVE-2019-3459</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-3460">CVE-2019-3460</a>
-
- <p>Shlomi Oberman, Yuli Shapiro, and Karamba Security Ltd. research
- team discovered missing range checks in the Bluetooth L2CAP
- implementation. If Bluetooth is enabled, a nearby attacker
- could use these to read sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3882">CVE-2019-3882</a>
-
- <p>It was found that the vfio implementation did not limit the number
- of DMA mappings to device memory. A local user granted ownership
- of a vfio device could use this to cause a denial of service
- (out-of-memory condition).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3901">CVE-2019-3901</a>
-
- <p>Jann Horn of Google reported a race condition that would allow a
- local user to read performance events from a task after it
- executes a setuid program. This could leak sensitive information
- processed by setuid programs. Debian's kernel configuration does
- not allow unprivileged users to access peformance events by
- default, which fully mitigates this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6133">CVE-2019-6133</a>
-
- <p>Jann Horn of Google found that Policykit's authentication check
- could be bypassed by a local user creating a process with the same
- start time and process ID as an older authenticated process.
- PolicyKit was already updated to fix this in DLA-1644-1. The
- kernel has additionally been updated to avoid a delay between
- assigning start time and process ID, which should make the attack
- impractical.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9503">CVE-2019-9503</a>
-
- <p>Hugues Anguelkov and others at Quarkslab discovered that the
- brcmfmac (Broadcom wifi FullMAC) driver did not correctly
- distinguish messages sent by the wifi firmware from other packets.
- An attacker using the same wifi network could use this for denial
- of service or to exploit other vulnerabilities in the driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11190">CVE-2019-11190</a>
-
- <p>Robert Święcki reported that when a setuid program was executed it
- was still possible to read performance events while the kernel set
- up the program's address space. A local user could use this to
- defeat ASLR in a setuid program, making it easier to exploit other
- vulnerabilities in the program. Debian's kernel configuration
- does not allow unprivileged users to access peformance events by
- default, which fully mitigates this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11486">CVE-2019-11486</a>
-
- <p>Jann Horn of Google reported numerous race conditions in the
- Siemens R3964 line discipline. A local user could use these to
- cause unspecified security impact. This module has therefore been
- disabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11599">CVE-2019-11599</a>
-
- <p>Jann Horn of Google reported a race condition in the core dump
- implementation which could lead to a use-after-free. A local
- user could use this to read sensitive information, to cause a
- denial of service (memory corruption), or for privilege
- escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.68-1. This version also includes a fix for Debian bug #927781,
-and other fixes included in upstream stable updates.</p>
-
-<p>We recommend that you upgrade your linux and linux-latest
-packages. You will need to use "apt-get upgrade --with-new-pkgs"
-or <q>apt upgrade</q> as the binary package names have changed.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1799-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1799.data b/english/lts/security/2019/dla-1799.data
deleted file mode 100644
index ce7ad57ed92..00000000000
--- a/english/lts/security/2019/dla-1799.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1799-1 linux</define-tag>
-<define-tag report_date>2019-05-28</define-tag>
-<define-tag secrefs>CVE-2018-5995 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-2024 CVE-2019-3459 CVE-2019-3460 CVE-2019-3882 CVE-2019-3901 CVE-2019-6133 CVE-2019-9503 CVE-2019-11091 CVE-2019-11190 CVE-2019-11486 CVE-2019-11599 Bug#927781</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1799.wml b/english/lts/security/2019/dla-1799.wml
deleted file mode 100644
index eba238906cc..00000000000
--- a/english/lts/security/2019/dla-1799.wml
+++ /dev/null
@@ -1,122 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5995">CVE-2018-5995</a>
-
- <p>ADLab of VenusTech discovered that the kernel logged the virtual
- addresses assigned to per-CPU data, which could make it easier to
- exploit other vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12126">CVE-2018-12126</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-12127">CVE-2018-12127</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-12130">CVE-2018-12130</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-11091">CVE-2019-11091</a>
-
- <p>Multiple researchers have discovered vulnerabilities in the way
- that Intel processor designs implement speculative forwarding of
- data filled into temporary microarchitectural structures
- (buffers). This flaw could allow an attacker controlling an
- unprivileged process to read sensitive information, including from
- the kernel and all other processes running on the system, or
- across guest/host boundaries to read host memory.</p>
-
- <p>See <a href="https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html">https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html</a>
- for more details.</p>
-
- <p>To fully resolve these vulnerabilities it is also necessary to
- install updated CPU microcode. An updated intel-microcode package
- (only available in Debian non-free) was provided via DLA-1789-1.
- The updated CPU microcode may also be available as part of a
- system firmware ("BIOS") update.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-2024">CVE-2019-2024</a>
-
- <p>A use-after-free bug was discovered in the em28xx video capture
- driver. Local users might be able to use this for denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3459">CVE-2019-3459</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-3460">CVE-2019-3460</a>
-
- <p>Shlomi Oberman, Yuli Shapiro, and Karamba Security Ltd. research
- team discovered missing range checks in the Bluetooth L2CAP
- implementation. If Bluetooth is enabled, a nearby attacker
- could use these to read sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3882">CVE-2019-3882</a>
-
- <p>It was found that the vfio implementation did not limit the number
- of DMA mappings to device memory. A local user granted ownership
- of a vfio device could use this to cause a denial of service
- (out-of-memory condition).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3901">CVE-2019-3901</a>
-
- <p>Jann Horn of Google reported a race condition that would allow a
- local user to read performance events from a task after it
- executes a setuid program. This could leak sensitive information
- processed by setuid programs. Debian's kernel configuration does
- not allow unprivileged users to access peformance events by
- default, which fully mitigates this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6133">CVE-2019-6133</a>
-
- <p>Jann Horn of Google found that Policykit's authentication check
- could be bypassed by a local user creating a process with the same
- start time and process ID as an older authenticated process.
- PolicyKit was already updated to fix this in DLA-1644-1. The
- kernel has additionally been updated to avoid a delay between
- assigning start time and process ID, which should make the attack
- impractical.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9503">CVE-2019-9503</a>
-
- <p>Hugues Anguelkov and others at Quarkslab discovered that the
- brcmfmac (Broadcom wifi FullMAC) driver did not correctly
- distinguish messages sent by the wifi firmware from other packets.
- An attacker using the same wifi network could use this for denial
- of service or to exploit other vulnerabilities in the driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11190">CVE-2019-11190</a>
-
- <p>Robert Święcki reported that when a setuid program was executed it
- was still possible to read performance events while the kernel set
- up the program's address space. A local user could use this to
- defeat ASLR in a setuid program, making it easier to exploit other
- vulnerabilities in the program. Debian's kernel configuration
- does not allow unprivileged users to access peformance events by
- default, which fully mitigates this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11486">CVE-2019-11486</a>
-
- <p>Jann Horn of Google reported numerous race conditions in the
- Siemens R3964 line discipline. A local user could use these to
- cause unspecified security impact. This module has therefore been
- disabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11599">CVE-2019-11599</a>
-
- <p>Jann Horn of Google reported a race condition in the core dump
- implementation which could lead to a use-after-free. A local
- user could use this to read sensitive information, to cause a
- denial of service (memory corruption), or for privilege
- escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.68-1. This version also includes a fix for Debian bug #927781,
-and other fixes included in upstream stable updates.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1799.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1800.data b/english/lts/security/2019/dla-1800.data
deleted file mode 100644
index 91b9c2690f1..00000000000
--- a/english/lts/security/2019/dla-1800.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1800-1 firefox-esr</define-tag>
-<define-tag report_date>2019-05-23</define-tag>
-<define-tag secrefs>CVE-2018-18511 CVE-2019-5798 CVE-2019-7317 CVE-2019-9797 CVE-2019-9800 CVE-2019-9816 CVE-2019-9817 CVE-2019-9819 CVE-2019-9820 CVE-2019-11691 CVE-2019-11692 CVE-2019-11693 CVE-2019-11698</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1800.wml b/english/lts/security/2019/dla-1800.wml
deleted file mode 100644
index 40d537b9fa4..00000000000
--- a/english/lts/security/2019/dla-1800.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.7.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1800.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1801.data b/english/lts/security/2019/dla-1801.data
deleted file mode 100644
index e79bf5b6fba..00000000000
--- a/english/lts/security/2019/dla-1801.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1801-1 zookeeper</define-tag>
-<define-tag report_date>2019-05-24</define-tag>
-<define-tag secrefs>CVE-2019-0201</define-tag>
-<define-tag packages>zookeeper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1801.wml b/english/lts/security/2019/dla-1801.wml
deleted file mode 100644
index ea63d17cbf6..00000000000
--- a/english/lts/security/2019/dla-1801.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an information disclosure
-vulnerability in zookeeper, a distributed co-ordination server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0201">CVE-2019-0201</a>
-
- <p>Users who were not authorised to read data were able to view the access control list.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.9-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your zookeeper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1801.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1802.data b/english/lts/security/2019/dla-1802.data
deleted file mode 100644
index 64b0cda36c4..00000000000
--- a/english/lts/security/2019/dla-1802.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1802-1 wireshark</define-tag>
-<define-tag report_date>2019-05-25</define-tag>
-<define-tag secrefs>CVE-2019-10894 CVE-2019-10895 CVE-2019-10899 CVE-2019-10901 CVE-2019-10903 Bug#926718</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1802.wml b/english/lts/security/2019/dla-1802.wml
deleted file mode 100644
index 851050de649..00000000000
--- a/english/lts/security/2019/dla-1802.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in wireshark, a network traffic analyzer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10894">CVE-2019-10894</a>
-
- <p>Assertion failure in dissect_gssapi_work (packet-gssapi.c) leading to
- crash of the GSS-API dissector. Remote attackers might leverage this
- vulnerability to trigger DoS via a packet containing crafted GSS-API
- payload.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10895">CVE-2019-10895</a>
-
- <p>Insufficient data validation leading to large number of heap buffer
- overflows read and write in the NetScaler trace handling module
- (netscaler.c). Remote attackers might leverage these vulnerabilities to
- trigger DoS, or any other unspecified impact via crafted packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10899">CVE-2019-10899</a>
-
- <p>Heap-based buffer under-read vulnerability in the Service Location
- Protocol dissector. Remote attackers might leverage these
- vulnerabilities to trigger DoS, or any other unspecified impact via
- crafted SRVLOC packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10901">CVE-2019-10901</a>
-
- <p>NULL pointer dereference in the Local Download Sharing Service
- protocol dissector. Remote attackers might leverage these flaws to
- trigger DoS via crafted LDSS packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10903">CVE-2019-10903</a>
-
- <p>Missing boundary checks leading to heap out-of-bounds read
- vulnerability in the Microsoft Spool Subsystem protocol dissector.
- Remote attackers might leverage these vulnerabilities to trigger DoS,
- or any other unspecified impact via crafted SPOOLSS packets.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.12.1+g01b65bf-4+deb8u19.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1802.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1803.data b/english/lts/security/2019/dla-1803.data
deleted file mode 100644
index 74e3788a8e9..00000000000
--- a/english/lts/security/2019/dla-1803.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1803-1 php5</define-tag>
-<define-tag report_date>2019-5-25</define-tag>
-<define-tag secrefs>CVE-2019-11034 CVE-2019-11035 CVE-2019-11036</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1803.wml b/english/lts/security/2019/dla-1803.wml
deleted file mode 100644
index 65778bab6c6..00000000000
--- a/english/lts/security/2019/dla-1803.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A read past allocated buffer vulnerability and two heap-buffer overflow
-vulnerabilites were discovered in the PHP5 programming language within
-the Exif image module.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u3.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1803.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1804.data b/english/lts/security/2019/dla-1804.data
deleted file mode 100644
index 3655f3a0254..00000000000
--- a/english/lts/security/2019/dla-1804.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1804-1 curl</define-tag>
-<define-tag report_date>2019-5-26</define-tag>
-<define-tag secrefs>CVE-2019-5436 Bug#929351</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1804.wml b/english/lts/security/2019/dla-1804.wml
deleted file mode 100644
index 371e46eece8..00000000000
--- a/english/lts/security/2019/dla-1804.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>cURL, an URL transfer library, contains a heap buffer overflow in the
-function tftp_receive_packet() that receives data from a TFTP server.
-It calls recvfrom() with the default size for the buffer rather than
-with the size that was used to allocate it. Thus, the content that
-might overwrite the heap memory is entirely controlled by the server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.38.0-4+deb8u15.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1804.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1805.data b/english/lts/security/2019/dla-1805.data
deleted file mode 100644
index 9922a7ae028..00000000000
--- a/english/lts/security/2019/dla-1805.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1805-1 minissdpd</define-tag>
-<define-tag report_date>2019-05-26</define-tag>
-<define-tag secrefs>CVE-2019-12106</define-tag>
-<define-tag packages>minissdpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1805.wml b/english/lts/security/2019/dla-1805.wml
deleted file mode 100644
index 64031c01883..00000000000
--- a/english/lts/security/2019/dla-1805.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a use after free vulnerability in minissdpd, a network device discovery daemon. A remote attacker could use this to crash the process.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12106"></a>
-
- <p>The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.20130907-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your minissdpd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1805.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1806.data b/english/lts/security/2019/dla-1806.data
deleted file mode 100644
index 1021ba81944..00000000000
--- a/english/lts/security/2019/dla-1806.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1806-1 thunderbird</define-tag>
-<define-tag report_date>2019-05-27</define-tag>
-<define-tag secrefs>CVE-2018-18511 CVE-2019-5798 CVE-2019-7317 CVE-2019-9797 CVE-2019-9800 CVE-2019-9816 CVE-2019-9817 CVE-2019-9819 CVE-2019-9820 CVE-2019-11691 CVE-2019-11692 CVE-2019-11693 CVE-2019-11698</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1806.wml b/english/lts/security/2019/dla-1806.wml
deleted file mode 100644
index 0fcd3abfa21..00000000000
--- a/english/lts/security/2019/dla-1806.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird: Multiple
-vulnerabilities may lead to the execution of arbitrary code or denial of
-service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.7.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1806.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1807.data b/english/lts/security/2019/dla-1807.data
deleted file mode 100644
index f5e98cb5c04..00000000000
--- a/english/lts/security/2019/dla-1807.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1807-1 vcftools</define-tag>
-<define-tag report_date>2019-5-27</define-tag>
-<define-tag secrefs>CVE-2018-11099 CVE-2018-11129 CVE-2018-11130</define-tag>
-<define-tag packages>vcftools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1807.wml b/english/lts/security/2019/dla-1807.wml
deleted file mode 100644
index 8ceb827677e..00000000000
--- a/english/lts/security/2019/dla-1807.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Webin security lab - dbapp security Ltd found three issues in vcftools, a
-collection of tools to work with VCF files. Different functions in
-header.cpp are vulnerable to denial of services due to use-after-free
-issues or information disclosure due to heap-based buffer over-read.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.1.12+dfsg-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your vcftools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1807.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1808.data b/english/lts/security/2019/dla-1808.data
deleted file mode 100644
index 58ee2f15ce9..00000000000
--- a/english/lts/security/2019/dla-1808.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1808-1 sox</define-tag>
-<define-tag report_date>2019-05-28</define-tag>
-<define-tag secrefs>CVE-2019-8354 CVE-2019-8355 CVE-2019-8356 CVE-2019-8357 Bug#927906</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1808.wml b/english/lts/security/2019/dla-1808.wml
deleted file mode 100644
index 9076ffaad9d..00000000000
--- a/english/lts/security/2019/dla-1808.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in SoX, the Swiss army knife of sound processing
-programs, that could lead to denial of service via application crash or
-potentially to arbitrary code execution by processing maliciously crafted
-input files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.4.1-5+deb8u4.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1808.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1809.data b/english/lts/security/2019/dla-1809.data
deleted file mode 100644
index a83c074f257..00000000000
--- a/english/lts/security/2019/dla-1809.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1809-1 libav</define-tag>
-<define-tag report_date>2019-05-29</define-tag>
-<define-tag secrefs>CVE-2018-15822 CVE-2019-11338</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1809.wml b/english/lts/security/2019/dla-1809.wml
deleted file mode 100644
index 4ac314440e6..00000000000
--- a/english/lts/security/2019/dla-1809.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two more security issues have been corrected in multiple demuxers and
-decoders of the libav multimedia library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15822">CVE-2018-15822</a>
-
- <p>The flv_write_packet function in libavformat/flvenc.c in libav did
- not check for an empty audio packet, leading to an assertion failure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11338">CVE-2019-11338</a>
-
- <p>libavcodec/hevcdec.c in libav mishandled detection of duplicate first
- slices, which allowed remote attackers to cause a denial of service
- (NULL pointer dereference and out-of-array access) or possibly have
- unspecified other impact via crafted HEVC data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u7.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1809.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1810.data b/english/lts/security/2019/dla-1810.data
deleted file mode 100644
index 1c03a1724f5..00000000000
--- a/english/lts/security/2019/dla-1810.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1810-1 tomcat7</define-tag>
-<define-tag report_date>2019-05-30</define-tag>
-<define-tag secrefs>CVE-2019-0221</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1810.wml b/english/lts/security/2019/dla-1810.wml
deleted file mode 100644
index 5b18c4012cb..00000000000
--- a/english/lts/security/2019/dla-1810.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Nightwatch Cybersecurity Research team identified a XSS vulnerability
-in tomcat7. The SSI printenv command echoes user provided data without
-escaping. SSI is disabled by default. The printenv command is intended
-for debugging and is unlikely to be present in a production website.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.0.56-3+really7.0.94-1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1810.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1811.data b/english/lts/security/2019/dla-1811.data
deleted file mode 100644
index 783050833b5..00000000000
--- a/english/lts/security/2019/dla-1811.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1811-1 miniupnpd</define-tag>
-<define-tag report_date>2019-5-30</define-tag>
-<define-tag secrefs>CVE-2017-1000494 CVE-2019-12107 CVE-2019-12108 CVE-2019-12109 CVE-2019-12110 CVE-2019-12111</define-tag>
-<define-tag packages>miniupnpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1811.wml b/english/lts/security/2019/dla-1811.wml
deleted file mode 100644
index 33f74ea028e..00000000000
--- a/english/lts/security/2019/dla-1811.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Ben Barnea and colleagues from VDOO discovered several vulnerabilities in
-miniupnpd, a small daemon that provides UPnP Internet Gateway Device and
-Port Mapping Protocol services.
-The issues are basically information leak, null pointer dereferences and
-uses after free.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.8.20140523-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your miniupnpd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1811.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1812.data b/english/lts/security/2019/dla-1812.data
deleted file mode 100644
index bdda6ac3903..00000000000
--- a/english/lts/security/2019/dla-1812.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1812-1 doxygen</define-tag>
-<define-tag report_date>2019-06-01</define-tag>
-<define-tag secrefs>CVE-2016-10245</define-tag>
-<define-tag packages>doxygen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1812.wml b/english/lts/security/2019/dla-1812.wml
deleted file mode 100644
index 1559551dd68..00000000000
--- a/english/lts/security/2019/dla-1812.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Insufficient sanitization of the query parameter in search_opensearch.php
-could lead to reflected cross-site scripting or iframe injection.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.8-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your doxygen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1812.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1813.data b/english/lts/security/2019/dla-1813.data
deleted file mode 100644
index f20b117282c..00000000000
--- a/english/lts/security/2019/dla-1813.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1813-1 php5</define-tag>
-<define-tag report_date>2019-06-03</define-tag>
-<define-tag secrefs>CVE-2019-11039 CVE-2019-11040</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1813.wml b/english/lts/security/2019/dla-1813.wml
deleted file mode 100644
index fb56b7c6c8e..00000000000
--- a/english/lts/security/2019/dla-1813.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in PHP, a widely-used open source general
-purpose scripting language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11039">CVE-2019-11039</a>
-
- <p>An integer underflow in the iconv module could be exploited to trigger
- an out of bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11040">CVE-2019-11040</a>
-
- <p>A heap buffer overflow was discovered in the EXIF parsing code.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u4.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1813.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1814.data b/english/lts/security/2019/dla-1814.data
deleted file mode 100644
index c203d5d8415..00000000000
--- a/english/lts/security/2019/dla-1814.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1814-1 python-django</define-tag>
-<define-tag report_date>2019-06-05</define-tag>
-<define-tag secrefs>CVE-2019-3498</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1814.wml b/english/lts/security/2019/dla-1814.wml
deleted file mode 100644
index 6e74c6b5db3..00000000000
--- a/english/lts/security/2019/dla-1814.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a cross-site scripting (XSS)
-vulnerability in the Django web development framework</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12308">CVE-2019-12308</a>
-
- <p>An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.11-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1814.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1815.data b/english/lts/security/2019/dla-1815.data
deleted file mode 100644
index d2c28ead300..00000000000
--- a/english/lts/security/2019/dla-1815.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1815-1 poppler</define-tag>
-<define-tag report_date>2019-06-06</define-tag>
-<define-tag secrefs>CVE-2019-10872 CVE-2019-12293 CVE-2019-12360</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1815.wml b/english/lts/security/2019/dla-1815.wml
deleted file mode 100644
index 2b052d83939..00000000000
--- a/english/lts/security/2019/dla-1815.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the poppler PDF rendering
-library, which could result in denial of service or possibly other
-unspecified impact when processing malformed or maliciously crafted
-files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.26.5-2+deb8u10.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1815.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1816.data b/english/lts/security/2019/dla-1816.data
deleted file mode 100644
index ede36ab3fbf..00000000000
--- a/english/lts/security/2019/dla-1816.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1816-1 otrs2</define-tag>
-<define-tag report_date>2019-6-11</define-tag>
-<define-tag secrefs>CVE-2019-12248 CVE-2019-12497</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1816.wml b/english/lts/security/2019/dla-1816.wml
deleted file mode 100644
index 3e9c8164084..00000000000
--- a/english/lts/security/2019/dla-1816.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in the Open Ticket
-Request System that could lead to information disclosure or privilege
-escalation. New configuration options were added to resolve those
-problems.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12248">CVE-2019-12248</a>
-
- <p>An attacker could send a malicious email to an OTRS system. If a
- logged in agent user quotes it, the email could cause the browser to
- load external image resources.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12497">CVE-2019-12497</a>
-
- <p>In the customer or external frontend, personal information of agents
- can be disclosed like Name and mail address in external notes.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.18-1+deb8u10.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1816.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1817.data b/english/lts/security/2019/dla-1817.data
deleted file mode 100644
index 821ed65b559..00000000000
--- a/english/lts/security/2019/dla-1817.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1817-1 libgd2</define-tag>
-<define-tag report_date>2019-06-11</define-tag>
-<define-tag secrefs>CVE-2019-11038 Bug#929821</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1817.wml b/english/lts/security/2019/dla-1817.wml
deleted file mode 100644
index 4448954e356..00000000000
--- a/english/lts/security/2019/dla-1817.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An unitialized read was discovered in the XBM support of libgd2, a
-library for programmatic graphics creation and manipulation. The
-unitialized read might lead to information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-5+deb8u13.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1817.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1818.data b/english/lts/security/2019/dla-1818.data
deleted file mode 100644
index 6587e9e675c..00000000000
--- a/english/lts/security/2019/dla-1818.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1818-1 dbus</define-tag>
-<define-tag report_date>2019-06-14</define-tag>
-<define-tag secrefs>CVE-2019-12749 Bug#930375</define-tag>
-<define-tag packages>dbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1818.wml b/english/lts/security/2019/dla-1818.wml
deleted file mode 100644
index a5174d48d90..00000000000
--- a/english/lts/security/2019/dla-1818.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Joe Vennix discovered an authentication bypass vulnerability in dbus, an
-asynchronous inter-process communication system. The implementation of
-the DBUS_COOKIE_SHA1 authentication mechanism was susceptible to a
-symbolic link attack. A local attacker could take advantage of this flaw
-to bypass authentication and connect to a DBusServer with elevated
-privileges.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.22-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your dbus packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1818.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1819.data b/english/lts/security/2019/dla-1819.data
deleted file mode 100644
index 9cf1fb4234d..00000000000
--- a/english/lts/security/2019/dla-1819.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1819-1 pyxdg</define-tag>
-<define-tag report_date>2019-06-16</define-tag>
-<define-tag secrefs>CVE-2019-12761</define-tag>
-<define-tag packages>pyxdg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1819.wml b/english/lts/security/2019/dla-1819.wml
deleted file mode 100644
index 94114fa377d..00000000000
--- a/english/lts/security/2019/dla-1819.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a code injection issue in PyXDG, a library used to locate <a href="https://www.freedesktop.org/">freedesktop.org</a> configuration/cache/etc. directories.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12761">CVE-2019-12761</a>
-
- <p>A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.25-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your pyxdg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1819.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1820.data b/english/lts/security/2019/dla-1820.data
deleted file mode 100644
index 895c5a1af37..00000000000
--- a/english/lts/security/2019/dla-1820.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1820-1 thunderbird</define-tag>
-<define-tag report_date>2019-06-17</define-tag>
-<define-tag secrefs>CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1820.wml b/english/lts/security/2019/dla-1820.wml
deleted file mode 100644
index 988355c8813..00000000000
--- a/english/lts/security/2019/dla-1820.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which may lead
-to the execution of arbitrary code if malformed email messages are read.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.7.1-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1820.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1821.data b/english/lts/security/2019/dla-1821.data
deleted file mode 100644
index 9aeae43e312..00000000000
--- a/english/lts/security/2019/dla-1821.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1821-1 phpmyadmin</define-tag>
-<define-tag report_date>2019-6-17</define-tag>
-<define-tag secrefs>CVE-2016-6606 CVE-2016-6607 CVE-2016-6611 CVE-2016-6612 CVE-2016-6613 CVE-2016-6624 CVE-2016-6626 CVE-2016-6627 CVE-2016-6628 CVE-2016-6630 CVE-2016-6631 CVE-2016-6632 CVE-2016-9849 CVE-2016-9850 CVE-2016-9861 CVE-2016-9864 CVE-2019-12616 Bug#930017</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1821.wml b/english/lts/security/2019/dla-1821.wml
deleted file mode 100644
index 719621732f3..00000000000
--- a/english/lts/security/2019/dla-1821.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were fixed in phpmyadmin, a MySQL web
-administration tool, which prevent possible SQL injection attacks, CSRF,
-the bypass of user restrictions, information disclosure or
-denial-of-service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4:4.2.12-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1821.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1822.data b/english/lts/security/2019/dla-1822.data
deleted file mode 100644
index dd47290cc13..00000000000
--- a/english/lts/security/2019/dla-1822.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1822-1 php-horde-form</define-tag>
-<define-tag report_date>2019-6-16</define-tag>
-<define-tag secrefs>CVE-2019-9858 Bug#930321</define-tag>
-<define-tag packages>php-horde-form</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1822.wml b/english/lts/security/2019/dla-1822.wml
deleted file mode 100644
index 5c77a3f3d2e..00000000000
--- a/english/lts/security/2019/dla-1822.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Horde Application Framework contained a remote code execution
-vulnerability. A remote attacker could use this flaw to use image
-uploads in forms to install and execute a file in an arbitrary
-writable location on the server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.8-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-form packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1822.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1823.data b/english/lts/security/2019/dla-1823.data
deleted file mode 100644
index 32f4a5e10e2..00000000000
--- a/english/lts/security/2019/dla-1823.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1823-1 linux</define-tag>
-<define-tag report_date>2019-06-17</define-tag>
-<define-tag secrefs>CVE-2019-3846 CVE-2019-5489 CVE-2019-10126 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 CVE-2019-11810 CVE-2019-11833 CVE-2019-11884</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1823.wml b/english/lts/security/2019/dla-1823.wml
deleted file mode 100644
index 68526c01255..00000000000
--- a/english/lts/security/2019/dla-1823.wml
+++ /dev/null
@@ -1,85 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3846">CVE-2019-3846</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-10126">CVE-2019-10126</a>
-
- <p>huangwen reported multiple buffer overflows in the Marvell wifi
- (mwifiex) driver, which a local user could use to cause denial of
- service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5489">CVE-2019-5489</a>
-
- <p>Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari
- Trachtenberg, Jason Hennessey, Alex Ionescu, and Anders Fogh
- discovered that local users could use the mincore() system call to
- obtain sensitive information from other processes that access the
- same memory-mapped file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11477">CVE-2019-11477</a>
-
- <p>Jonathan Looney reported that a specially crafted sequence of TCP
- selective acknowledgements (SACKs) allows a remotely triggerable
- kernel panic.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11478">CVE-2019-11478</a>
-
- <p>Jonathan Looney reported that a specially crafted sequence of TCP
- selective acknowledgements (SACKs) will fragment the TCP
- retransmission queue, allowing an attacker to cause excessive
- resource usage.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11479">CVE-2019-11479</a>
-
- <p>Jonathan Looney reported that an attacker could force the Linux
- kernel to segment its responses into multiple TCP segments, each of
- which contains only 8 bytes of data, drastically increasing the
- bandwidth required to deliver the same amount of data.</p>
-
- <p>This update introduces a new sysctl value to control the minimal MSS
- (net.ipv4.tcp_min_snd_mss), which by default uses the formerly hard-coded
- value of 48. We recommend raising this to 512 unless you know
- that your network requires a lower value. (This value applies to
- Linux 3.16 only.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11810">CVE-2019-11810</a>
-
- <p>It was discovered that the megaraid_sas driver did not correctly
- handle a failed memory allocation during initialisation, which
- could lead to a double-free. This might have some security
- impact, but it cannot be triggered by an unprivileged user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11833">CVE-2019-11833</a>
-
- <p>It was discovered that the ext4 filesystem implementation writes
- uninitialised data from kernel memory to new extent blocks. A
- local user able to write to an ext4 filesystem and then read the
- filesystem image, for example using a removable drive, might be
- able to use this to obtain sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11884">CVE-2019-11884</a>
-
- <p>It was discovered that the Bluetooth HIDP implementation did not
- ensure that new connection names were null-terminated. A local
- user with CAP_NET_ADMIN capability might be able to use this to
- obtain sensitive information from the kernel stack.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.68-2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1823.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1824.data b/english/lts/security/2019/dla-1824.data
deleted file mode 100644
index 8c3a66bfa2b..00000000000
--- a/english/lts/security/2019/dla-1824.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1824-1 linux-4.9</define-tag>
-<define-tag report_date>2019-06-18</define-tag>
-<define-tag secrefs>CVE-2019-3846 CVE-2019-5489 CVE-2019-9500 CVE-2019-9503 CVE-2019-10126 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 CVE-2019-11486 CVE-2019-11599 CVE-2019-11815 CVE-2019-11833 CVE-2019-11884 Bug#928989</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1824.wml b/english/lts/security/2019/dla-1824.wml
deleted file mode 100644
index 4482125adee..00000000000
--- a/english/lts/security/2019/dla-1824.wml
+++ /dev/null
@@ -1,107 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3846">CVE-2019-3846</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-10126">CVE-2019-10126</a>
-
- <p>huangwen reported multiple buffer overflows in the Marvell wifi
- (mwifiex) driver, which a local user could use to cause denial of
- service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5489">CVE-2019-5489</a>
-
- <p>Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari
- Trachtenberg, Jason Hennessey, Alex Ionescu, and Anders Fogh
- discovered that local users could use the mincore() system call to
- obtain sensitive information from other processes that access the
- same memory-mapped file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9500">CVE-2019-9500</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-9503">CVE-2019-9503</a>
-
- <p>Hugues Anguelkov discovered a buffer overflow and missing access
- validation in the Broadcom FullMAC wifi driver (brcmfmac), which a
- attacker on the same wifi network could use to cause denial of
- service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11477">CVE-2019-11477</a>
-
- <p>Jonathan Looney reported that a specially crafted sequence of TCP
- selective acknowledgements (SACKs) allows a remotely triggerable
- kernel panic.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11478">CVE-2019-11478</a>
-
- <p>Jonathan Looney reported that a specially crafted sequence of TCP
- selective acknowledgements (SACKs) will fragment the TCP
- retransmission queue, allowing an attacker to cause excessive
- resource usage.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11479">CVE-2019-11479</a>
-
- <p>Jonathan Looney reported that an attacker could force the Linux
- kernel to segment its responses into multiple TCP segments, each of
- which contains only 8 bytes of data, drastically increasing the
- bandwidth required to deliver the same amount of data.</p>
-
- <p>This update introduces a new sysctl value to control the minimal MSS
- (net.ipv4.tcp_min_snd_mss), which by default uses the formerly hard-coded
- value of 48. We recommend raising this to 536 unless you know
- that your network requires a lower value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11486">CVE-2019-11486</a>
-
- <p>Jann Horn of Google reported numerous race conditions in the
- Siemens R3964 line discipline. A local user could use these to
- cause unspecified security impact. This module has therefore been
- disabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11599">CVE-2019-11599</a>
-
- <p>Jann Horn of Google reported a race condition in the core dump
- implementation which could lead to a use-after-free. A local
- user could use this to read sensitive information, to cause a
- denial of service (memory corruption), or for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11815">CVE-2019-11815</a>
-
- <p>It was discovered that a use-after-free in the Reliable Datagram
- Sockets protocol could result in denial of service and potentially
- privilege escalation. This protocol module (rds) is not auto-loaded
- on Debian systems, so this issue only affects systems where
- it is explicitly loaded.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11833">CVE-2019-11833</a>
-
- <p>It was discovered that the ext4 filesystem implementation writes
- uninitialised data from kernel memory to new extent blocks. A
- local user able to write to an ext4 filesystem and then read the
- filesystem image, for example using a removable drive, might be
- able to use this to obtain sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11884">CVE-2019-11884</a>
-
- <p>It was discovered that the Bluetooth HIDP implementation did not
- ensure that new connection names were null-terminated. A local
- user with CAP_NET_ADMIN capability might be able to use this to
- obtain sensitive information from the kernel stack.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.168-1+deb9u3~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1824.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1825.data b/english/lts/security/2019/dla-1825.data
deleted file mode 100644
index bbd8a988f11..00000000000
--- a/english/lts/security/2019/dla-1825.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1825-1 kdepim</define-tag>
-<define-tag report_date>2019-06-18</define-tag>
-<define-tag secrefs>CVE-2019-10732 Bug#926996</define-tag>
-<define-tag packages>kdepim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1825.wml b/english/lts/security/2019/dla-1825.wml
deleted file mode 100644
index a30016fee1f..00000000000
--- a/english/lts/security/2019/dla-1825.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A reply-based decryption oracle was found in kdepim, which provides
-the KMail e-mail client.</p>
-
-<p>An attacker in possession of S/MIME or PGP encrypted emails can wrap
-them as sub-parts within a crafted multipart email. The encrypted
-part(s) can further be hidden using HTML/CSS or ASCII newline
-characters. This modified multipart email can be re-sent by the
-attacker to the intended receiver. If the receiver replies to this
-(benign looking) email, they unknowingly leak the plaintext of the
-encrypted message part(s) back to the attacker.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.14.1-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your kdepim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1825.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1826.data b/english/lts/security/2019/dla-1826.data
deleted file mode 100644
index a2ec0fc1437..00000000000
--- a/english/lts/security/2019/dla-1826.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1826-1 glib2.0</define-tag>
-<define-tag report_date>2019-06-18</define-tag>
-<define-tag secrefs>CVE-2019-12450 Bug#929753</define-tag>
-<define-tag packages>glib2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1826.wml b/english/lts/security/2019/dla-1826.wml
deleted file mode 100644
index 8244182826c..00000000000
--- a/english/lts/security/2019/dla-1826.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that GLib does not properly restrict some file
-permissions while a copy operation is in progress; instead, default
-permissions are used.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.42.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your glib2.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1826.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1827.data b/english/lts/security/2019/dla-1827.data
deleted file mode 100644
index a69ac46108c..00000000000
--- a/english/lts/security/2019/dla-1827.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1827-1 gvfs</define-tag>
-<define-tag report_date>2019-6-19</define-tag>
-<define-tag secrefs>CVE-2019-12795 Bug#930376</define-tag>
-<define-tag packages>gvfs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1827.wml b/english/lts/security/2019/dla-1827.wml
deleted file mode 100644
index 72c6b984e52..00000000000
--- a/english/lts/security/2019/dla-1827.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Simon McVittie discovered a flaw in gvfs, the Gnome Virtual File
-System. The gvfsd daemon opened a private D-Bus server socket without
-configuring an authorization rule. A local attacker could connect to
-this server socket and issue D-Bus method calls.</p>
-
-<p>(Note that the server socket only accepts a single connection, so the
-attacker would have to discover the server and connect to the socket
-before its owner does.)</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.22.2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your gvfs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1827.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1828.data b/english/lts/security/2019/dla-1828.data
deleted file mode 100644
index d6cc278e2d9..00000000000
--- a/english/lts/security/2019/dla-1828.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1828-1 python-urllib3</define-tag>
-<define-tag report_date>2019-06-20</define-tag>
-<define-tag secrefs>CVE-2019-11236 Bug#927172</define-tag>
-<define-tag packages>python-urllib3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1828.wml b/english/lts/security/2019/dla-1828.wml
deleted file mode 100644
index 5f79b3a35c4..00000000000
--- a/english/lts/security/2019/dla-1828.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in python-urllib3, an HTTP library with
-thread-safe connection pooling, whereby an attacker can inject CRLF
-characters in the request parameter.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.9.1-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your python-urllib3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1828.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1829.data b/english/lts/security/2019/dla-1829.data
deleted file mode 100644
index 4ce4fd737c9..00000000000
--- a/english/lts/security/2019/dla-1829.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1829-1 firefox-esr</define-tag>
-<define-tag report_date>2019-06-20</define-tag>
-<define-tag secrefs>CVE-2019-11707</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1829.wml b/english/lts/security/2019/dla-1829.wml
deleted file mode 100644
index bd0bc95cbd5..00000000000
--- a/english/lts/security/2019/dla-1829.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Samuel Gross discovered a type confusion bug in the JavaScript engine of
-the Mozilla Firefox web browser, which could result in the execution of
-arbitrary code when browsing a malicious website.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-60.7.1esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1829.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1830.data b/english/lts/security/2019/dla-1830.data
deleted file mode 100644
index 4bbb210b4fe..00000000000
--- a/english/lts/security/2019/dla-1830.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1830-1 znc</define-tag>
-<define-tag report_date>2019-6-20</define-tag>
-<define-tag secrefs>CVE-2019-12816</define-tag>
-<define-tag packages>znc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1830.wml b/english/lts/security/2019/dla-1830.wml
deleted file mode 100644
index 9ad4a17c2f5..00000000000
--- a/english/lts/security/2019/dla-1830.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in the ZNC IRC bouncer which could result
-in remote code execution.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your znc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1830.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1831.data b/english/lts/security/2019/dla-1831.data
deleted file mode 100644
index 5d4fada41da..00000000000
--- a/english/lts/security/2019/dla-1831.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1831-1 jackson-databind</define-tag>
-<define-tag report_date>2019-6-21</define-tag>
-<define-tag secrefs>CVE-2019-12384 CVE-2019-12814 Bug#930750</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1831.wml b/english/lts/security/2019/dla-1831.wml
deleted file mode 100644
index d01f2ec4200..00000000000
--- a/english/lts/security/2019/dla-1831.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>More Polymorphic Typing issues were discovered in jackson-databind. When
-Default Typing is enabled (either globally or for a specific property)
-for an externally exposed JSON endpoint and the service has JDOM 1.x or
-2.x or logback-core jar in the classpath, an attacker can send a
-specifically crafted JSON message that allows them to read arbitrary
-local files on the server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1831.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1832.data b/english/lts/security/2019/dla-1832.data
deleted file mode 100644
index 5aab5379384..00000000000
--- a/english/lts/security/2019/dla-1832.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1832-1 libvirt</define-tag>
-<define-tag report_date>2019-06-24</define-tag>
-<define-tag secrefs>CVE-2019-10161 CVE-2019-10167</define-tag>
-<define-tag packages>libvirt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1832.wml b/english/lts/security/2019/dla-1832.wml
deleted file mode 100644
index 44a9929d0f2..00000000000
--- a/english/lts/security/2019/dla-1832.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two vulnerabilities in libvirt, an
-abstraction API for various virtualisation mechanisms:</>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10161">CVE-2019-10161</a>
-
- <p>Readonly clients could use the API to specify an arbitrary path which
- would be accessed with the permissions of the libvirtd process. An attacker
- with access to the libvirtd socket could use this to probe the existence of
- arbitrary files, cause a denial of service or otherwise cause libvirtd to
- execute arbitrary programs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10167">CVE-2019-10167</a>
-
- <p>An arbitrary code execution vulnerability via the API where a
- user-specified binary used to probe the domain's capabilities. Read-only
- clients could specify an arbitrary path for this argument, causing libvirtd
- to execute a crafted executable with its own privileges.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.9-9+deb8u7.</p>
-
-<p>We recommend that you upgrade your libvirt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1832.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1833-2.data b/english/lts/security/2019/dla-1833-2.data
deleted file mode 100644
index d045345370b..00000000000
--- a/english/lts/security/2019/dla-1833-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1833-2 bzip2</define-tag>
-<define-tag report_date>2019-7-18</define-tag>
-<define-tag secrefs>CVE-2019-12900</define-tag>
-<define-tag packages>bzip2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1833-2.wml b/english/lts/security/2019/dla-1833-2.wml
deleted file mode 100644
index e60948e0dad..00000000000
--- a/english/lts/security/2019/dla-1833-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-12900">CVE-2019-12900</a> in bzip2, a high-quality
-block-sorting file compressor, introduces regressions when extracting
-certain lbzip2 files which were created with a buggy libzip2.
-Please see <a href="https://bugs.debian.org/931278">https://bugs.debian.org/931278</a> for more information.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.6-4+deb7u2.</p>
-
-<p>We recommend that you upgrade your bzip2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1833-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1833.data b/english/lts/security/2019/dla-1833.data
deleted file mode 100644
index 427fe7186d9..00000000000
--- a/english/lts/security/2019/dla-1833.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1833-1 bzip2</define-tag>
-<define-tag report_date>2019-6-24</define-tag>
-<define-tag secrefs>CVE-2016-3189 CVE-2019-12900</define-tag>
-<define-tag packages>bzip2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1833.wml b/english/lts/security/2019/dla-1833.wml
deleted file mode 100644
index 069ef43c189..00000000000
--- a/english/lts/security/2019/dla-1833.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues in bzip2, a high-quality block-sorting file compressor, have
-been fixed. One, <a href="https://security-tracker.debian.org/tracker/CVE-2019-12900">CVE-2019-12900</a>, is a out-of-bounds write when using a
-crafted compressed file. The other, <a href="https://security-tracker.debian.org/tracker/CVE-2016-3189">CVE-2016-3189</a>, is a potential
-user-after-free.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.6-7+deb8u1.</p>
-
-<p>We recommend that you upgrade your bzip2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1833.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1834.data b/english/lts/security/2019/dla-1834.data
deleted file mode 100644
index 3261578c118..00000000000
--- a/english/lts/security/2019/dla-1834.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1834-1 python2.7</define-tag>
-<define-tag report_date>2019-06-24</define-tag>
-<define-tag secrefs>CVE-2018-14647 CVE-2019-5010 CVE-2019-9636 CVE-2019-9740 CVE-2019-9947 CVE-2019-9948 CVE-2019-10160 Bug#921039 Bug#921040 Bug#924073</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1834.wml b/english/lts/security/2019/dla-1834.wml
deleted file mode 100644
index 2fa8de07406..00000000000
--- a/english/lts/security/2019/dla-1834.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were discovered in Python, an interactive
-high-level object-oriented language, including</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14647">CVE-2018-14647</a>
-
- <p>Python's elementtree C accelerator failed to initialise Expat's hash
- salt during initialization. This could make it easy to conduct
- denial of service attacks against Expat by constructing an XML
- document that would cause pathological hash collisions in Expat's
- internal data structures, consuming large amounts CPU and RAM.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5010">CVE-2019-5010</a>
-
- <p>NULL pointer dereference using a specially crafted X509 certificate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a>
-
- <p>Improper Handling of Unicode Encoding (with an incorrect netloc)
- during NFKC normalization resulting in information disclosure
- (credentials, cookies, etc. that are cached against a given
- hostname). A specially crafted URL could be incorrectly parsed to
- locate cookies or authentication data and send that information to
- a different host than when parsed correctly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
-
- <p>An issue was discovered in urllib2 where CRLF injection is possible
- if the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically in
- the query string after a ? character) followed by an HTTP header or
- a Redis command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9947">CVE-2019-9947</a>
-
- <p>An issue was discovered in urllib2 where CRLF injection is possible
- if the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically in
- the path component of a URL that lacks a ? character) followed by an
- HTTP header or a Redis command. This is similar to the <a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
- query string issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9948">CVE-2019-9948</a>
-
- <p>urllib supports the local_file: scheme, which makes it easier for
- remote attackers to bypass protection mechanisms that blacklist
- file: URIs, as demonstrated by triggering a
- urllib.urlopen('local_file:///etc/passwd') call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10160">CVE-2019-10160</a>
-
- <p>A security regression of <a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a> was discovered which still
- allows an attacker to exploit <a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a> by abusing the user and
- password parts of a URL. When an application parses user-supplied
- URLs to store cookies, authentication credentials, or other kind of
- information, it is possible for an attacker to provide specially
- crafted URLs to make the application locate host-related information
- (e.g. cookies, authentication data) and send them to a different
- host than where it should, unlike if the URLs had been correctly
- parsed. The result of an attack may vary based on the application.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.7.9-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1834.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1835-2.data b/english/lts/security/2019/dla-1835-2.data
deleted file mode 100644
index d7910cd03d6..00000000000
--- a/english/lts/security/2019/dla-1835-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1835-2 python3.4</define-tag>
-<define-tag report_date>2019-06-25</define-tag>
-<define-tag secrefs>CVE-2019-9740 CVE-2019-9947 Bug#931044</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1835-2.wml b/english/lts/security/2019/dla-1835-2.wml
deleted file mode 100644
index 286793ad1c6..00000000000
--- a/english/lts/security/2019/dla-1835-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update issued as DLA-1835-1 caused a regression in the http.client
-library in Python 3.4 which was broken by the patch intended to fix
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2019-9947">CVE-2019-9947</a>.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.4.2-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1835-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1835.data b/english/lts/security/2019/dla-1835.data
deleted file mode 100644
index bbfbdcdadd9..00000000000
--- a/english/lts/security/2019/dla-1835.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1835-1 python3.4</define-tag>
-<define-tag report_date>2019-06-24</define-tag>
-<define-tag secrefs>CVE-2018-14647 CVE-2019-9636 CVE-2019-9740 CVE-2019-9947 Bug#921039 Bug#924072</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1835.wml b/english/lts/security/2019/dla-1835.wml
deleted file mode 100644
index a0d3781af44..00000000000
--- a/english/lts/security/2019/dla-1835.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were discovered in Python, an interactive
-high-level object-oriented language, including</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14647">CVE-2018-14647</a>
-
- <p>Python's elementtree C accelerator failed to initialise Expat's hash
- salt during initialization. This could make it easy to conduct
- denial of service attacks against Expat by constructing an XML
- document that would cause pathological hash collisions in Expat's
- internal data structures, consuming large amounts CPU and RAM.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a>
-
- <p>Improper Handling of Unicode Encoding (with an incorrect netloc)
- during NFKC normalization resulting in information disclosure
- (credentials, cookies, etc. that are cached against a given
- hostname). A specially crafted URL could be incorrectly parsed to
- locate cookies or authentication data and send that information to
- a different host than when parsed correctly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
-
- <p>An issue was discovered in urllib where CRLF injection is possible
- if the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically in
- the query string after a ? character) followed by an HTTP header or
- a Redis command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9947">CVE-2019-9947</a>
-
- <p>An issue was discovered in urllib where CRLF injection is possible
- if the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically in
- the path component of a URL that lacks a ? character) followed by an
- HTTP header or a Redis command. This is similar to the <a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
- query string issue.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.2-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1835.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1836.data b/english/lts/security/2019/dla-1836.data
deleted file mode 100644
index 51f86319a07..00000000000
--- a/english/lts/security/2019/dla-1836.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1836-1 thunderbird</define-tag>
-<define-tag report_date>2019-06-25</define-tag>
-<define-tag secrefs>CVE-2019-11707 CVE-2019-11708</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1836.wml b/english/lts/security/2019/dla-1836.wml
deleted file mode 100644
index e1bf5bfed53..00000000000
--- a/english/lts/security/2019/dla-1836.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which may lead
-to the execution of arbitrary code if malformed email messages are read.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.7.2-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1836.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1837-2.data b/english/lts/security/2019/dla-1837-2.data
deleted file mode 100644
index 4c80f3a91d5..00000000000
--- a/english/lts/security/2019/dla-1837-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1837-2 rdesktop</define-tag>
-<define-tag report_date>2019-07-01</define-tag>
-<define-tag secrefs>Bug#930511</define-tag>
-<define-tag packages>rdesktop</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1837-2.wml b/english/lts/security/2019/dla-1837-2.wml
deleted file mode 100644
index fc6b4b70cd3..00000000000
--- a/english/lts/security/2019/dla-1837-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The update for rdesktop released as 1.8.6-0+deb8u1 introduced a regression
-which broke RDP protocol negotiation. Updated rdesktop packages are now
-available to correct this issue.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.6-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your rdesktop packages.</p>
-
-<p>For the detailed security status of rdesktop please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rdesktop">https://security-tracker.debian.org/tracker/rdesktop</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1837-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1837.data b/english/lts/security/2019/dla-1837.data
deleted file mode 100644
index d667ba8dad4..00000000000
--- a/english/lts/security/2019/dla-1837.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1837-1 rdesktop</define-tag>
-<define-tag report_date>2019-06-25</define-tag>
-<define-tag secrefs>Bug#930387</define-tag>
-<define-tag packages>rdesktop</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1837.wml b/english/lts/security/2019/dla-1837.wml
deleted file mode 100644
index bc0050833d1..00000000000
--- a/english/lts/security/2019/dla-1837.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities were discovered in the rdesktop RDP
-client, which could result in buffer overflows and execution of
-arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.6-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your rdesktop packages.</p>
-
-
-<p>For the detailed security status of rdesktop please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rdesktop">https://security-tracker.debian.org/tracker/rdesktop</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1837.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1838.data b/english/lts/security/2019/dla-1838.data
deleted file mode 100644
index 7a9c4eedbd4..00000000000
--- a/english/lts/security/2019/dla-1838.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1838-1 mupdf</define-tag>
-<define-tag report_date>2019-06-28</define-tag>
-<define-tag secrefs>CVE-2018-5686 CVE-2019-6130 CVE-2018-6192 Bug#887130 Bug#888487 Bug#918971</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1838.wml b/english/lts/security/2019/dla-1838.wml
deleted file mode 100644
index 0b971ca24e1..00000000000
--- a/english/lts/security/2019/dla-1838.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several minor issues have been fixed in mupdf, a lightweight PDF viewer
-tailored for display of high quality anti-aliased graphics.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5686">CVE-2018-5686</a>
-
- <p>In MuPDF, there was an infinite loop vulnerability and application
- hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF
- not having been considered. Remote attackers could leverage this
- vulnerability to cause a denial of service via a crafted PDF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6130">CVE-2019-6130</a>
-
- <p>MuPDF had a SEGV in the function fz_load_page of the fitz/document.c
- file, as demonstrated by mutool. This was related to page-number
- mishandling in cbz/mucbz.c, cbz/muimg.c, and svg/svg-doc.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6192">CVE-2018-6192</a>
-
- <p>In MuPDF, the pdf_read_new_xref function in pdf/pdf-xref.c allowed
- remote attackers to cause a denial of service (segmentation violation
- and application crash) via a crafted PDF file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1838.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1839.data b/english/lts/security/2019/dla-1839.data
deleted file mode 100644
index e5fb2b08160..00000000000
--- a/english/lts/security/2019/dla-1839.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1839-1 expat</define-tag>
-<define-tag report_date>2019-6-29</define-tag>
-<define-tag secrefs>CVE-2018-20843 Bug#931031</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1839.wml b/english/lts/security/2019/dla-1839.wml
deleted file mode 100644
index 29168ccc595..00000000000
--- a/english/lts/security/2019/dla-1839.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Expat, an XML parsing C library, did not properly
-handle XML input including XML names that contain a large number of
-colons, potentially resulting in denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-6+deb8u5.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1839.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1840.data b/english/lts/security/2019/dla-1840.data
deleted file mode 100644
index facd8838c71..00000000000
--- a/english/lts/security/2019/dla-1840.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1840-1 golang-go.crypto</define-tag>
-<define-tag report_date>2019-06-30</define-tag>
-<define-tag secrefs>CVE-2019-11840</define-tag>
-<define-tag packages>golang-go.crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1840.wml b/english/lts/security/2019/dla-1840.wml
deleted file mode 100644
index dcdf8456045..00000000000
--- a/english/lts/security/2019/dla-1840.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A flaw was found in the amd64 implementation of salsa20. If more
-than 256 GiB of keystream is generated, or if the counter otherwise
-grows greater than 32 bits, the amd64 implementation will first generate
-incorrect output, and then cycle back to previously generated keystream.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.0~hg190-1+deb8u1.</p>
-
-<p>obfs4proxy has been rebuilt as version 0.0.3-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your golang-golang-x-crypto-dev
-and obfs4proxy packages, and rebuild any software using
-golang-golang-x-crypto-dev.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1840.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1841.data b/english/lts/security/2019/dla-1841.data
deleted file mode 100644
index 8cf3263766f..00000000000
--- a/english/lts/security/2019/dla-1841.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1841-1 gpac</define-tag>
-<define-tag report_date>2019-6-30</define-tag>
-<define-tag secrefs>CVE-2019-12481 CVE-2019-12482 CVE-2019-12483</define-tag>
-<define-tag packages>gpac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1841.wml b/english/lts/security/2019/dla-1841.wml
deleted file mode 100644
index 0205ebc4723..00000000000
--- a/english/lts/security/2019/dla-1841.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three issues have been found for gpac, an Open Source multimedia
-framework.
-Two of them are NULL pointer dereferences and one of them is a heap-based
-buffer overflow.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.0+svn5324~dfsg1-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your gpac packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1841.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1842.data b/english/lts/security/2019/dla-1842.data
deleted file mode 100644
index a5eae08f637..00000000000
--- a/english/lts/security/2019/dla-1842.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1842-1 python-django</define-tag>
-<define-tag report_date>2019-07-01</define-tag>
-<define-tag secrefs>CVE-2019-12781</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1842.wml b/english/lts/security/2019/dla-1842.wml
deleted file mode 100644
index c0da899f6be..00000000000
--- a/english/lts/security/2019/dla-1842.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the Django Python web development framework did not correct identify HTTP connections when a reverse proxy connected via HTTPS.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12781">CVE-2019-12781: Incorrect HTTP detection with reverse-proxy connecting via HTTPS</a>
-
- <p>When deployed behind a reverse-proxy connecting to Django via HTTPS, <tt>django.http.HttpRequest.scheme</tt> would incorrectly detect client requests made via HTTP as using HTTPS. This entails incorrect results for <tt>is_secure()</tt>, and <tt>build_absolute_uri()</tt>, and that HTTP requests would not be redirected to HTTPS in accordance with <tt>SECURE_SSL_REDIRECT</tt>.</p>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.11-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1842.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1843.data b/english/lts/security/2019/dla-1843.data
deleted file mode 100644
index 59bab7e5353..00000000000
--- a/english/lts/security/2019/dla-1843.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1843-1 pdns</define-tag>
-<define-tag report_date>2019-07-03</define-tag>
-<define-tag secrefs>CVE-2019-10162 CVE-2019-10163</define-tag>
-<define-tag packages>pdns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1843.wml b/english/lts/security/2019/dla-1843.wml
deleted file mode 100644
index 8425806b22b..00000000000
--- a/english/lts/security/2019/dla-1843.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been discovered in pdns, an authoritative DNS
-server which may result in denial of service via malformed zone records
-and excessive NOTIFY packets in a master/slave setup.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10162">CVE-2019-10162</a>
-
- <p>An issue has been found in PowerDNS Authoritative Server allowing
- an authorized user to cause the server to exit by inserting a
- crafted record in a MASTER type zone under their control. The issue
- is due to the fact that the Authoritative Server will exit when it
- runs into a parsing error while looking up the NS/A/AAAA records it
- is about to use for an outgoing notify.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10163">CVE-2019-10163</a>
-
- <p>An issue has been found in PowerDNS Authoritative Server allowing
- a remote, authorized master server to cause a high CPU load or even
- prevent any further updates to any slave zone by sending a large
- number of NOTIFY messages. Note that only servers configured as
- slaves are affected by this issue.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.1-4+deb8u10.</p>
-
-<p>We recommend that you upgrade your pdns packages.</p>
-
-<p>For the detailed security status of pdns please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pdns">https://security-tracker.debian.org/tracker/pdns</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1843.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1844.data b/english/lts/security/2019/dla-1844.data
deleted file mode 100644
index ae99306e8f3..00000000000
--- a/english/lts/security/2019/dla-1844.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1844-1 lemonldap-ng</define-tag>
-<define-tag report_date>2019-07-04</define-tag>
-<define-tag secrefs>CVE-2019-13031</define-tag>
-<define-tag packages>lemonldap-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1844.wml b/english/lts/security/2019/dla-1844.wml
deleted file mode 100644
index 40c7ca82343..00000000000
--- a/english/lts/security/2019/dla-1844.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a XML external entity vulnerability
-in the <em>lemonldap-ng</em> single-sign on system. This may have led to the
-disclosure of confidential data, denial of service, server side
-request forgery, port scanning, etc.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13031">CVE-2019-13031</a>
-
- <p>LemonLDAP::NG before 1.9.20 has an XML External Entity (XXE) issue when submitting a notification to the notification server. By default, the notification server is not enabled and has a "deny all" rule.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.3-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your lemonldap-ng packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1844.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1845.data b/english/lts/security/2019/dla-1845.data
deleted file mode 100644
index 99cce8a2ba5..00000000000
--- a/english/lts/security/2019/dla-1845.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1845-1 dosbox</define-tag>
-<define-tag report_date>2019-7-7</define-tag>
-<define-tag secrefs>CVE-2019-7165 CVE-2019-12594 Bug#931222</define-tag>
-<define-tag packages>dosbox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1845.wml b/english/lts/security/2019/dla-1845.wml
deleted file mode 100644
index 7da0680f0af..00000000000
--- a/english/lts/security/2019/dla-1845.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in DOSBox, an
-emulator for running old DOS programs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7165">CVE-2019-7165</a>
-
- <p>A very long line inside a bat file would overflow the parsing buffer
- which could be used by an attacker to execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12594">CVE-2019-12594</a>
-
- <p>Insufficient access controls inside DOSBox allowed attackers to
- access resources on the host system and execute arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.74-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your dosbox packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1845.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1846-2.data b/english/lts/security/2019/dla-1846-2.data
deleted file mode 100644
index fa28af0433f..00000000000
--- a/english/lts/security/2019/dla-1846-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1846-2 unzip</define-tag>
-<define-tag report_date>2019-7-28</define-tag>
-<define-tag secrefs>CVE-2019-13232 Bug#932404</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1846-2.wml b/english/lts/security/2019/dla-1846-2.wml
deleted file mode 100644
index 1b8e55b246e..00000000000
--- a/english/lts/security/2019/dla-1846-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The unzip security update issued as DLA 1846-1 caused a regression
-when building the Firefox web browser from source.</p>
-
-<p>There is a zip-like file in the Firefox distribution, omni.ja, which is
-a zip container with the central directory placed at the start of the
-file instead of after the local entries as required by the zip standard.
-This update now permits such containers to not raise a zip bomb alert,
-where in fact there are no overlaps.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.0-16+deb8u5.</p>
-
-<p>We recommend that you upgrade your unzip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1846-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1846.data b/english/lts/security/2019/dla-1846.data
deleted file mode 100644
index 9b262cbd622..00000000000
--- a/english/lts/security/2019/dla-1846.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1846-1 unzip</define-tag>
-<define-tag report_date>2019-7-7</define-tag>
-<define-tag secrefs>CVE-2019-13232 Bug#931433</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1846.wml b/english/lts/security/2019/dla-1846.wml
deleted file mode 100644
index c7df0f74b15..00000000000
--- a/english/lts/security/2019/dla-1846.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>David Fifield discovered a way to construct non-recursive <q>zip bombs</q>
-that achieve a high compression ratio by overlapping files inside the
-zip container. However the output size increases quadratically in the
-input size, reaching a compression ratio of over 28 million
-(10 MB -&gt; 281 TB) at the limits of the zip format which can cause a
-denial-of-service. Mark Adler provided a patch to detect and reject
-such zip files for the unzip program.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.0-16+deb8u4.</p>
-
-<p>We recommend that you upgrade your unzip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1846.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1847.data b/english/lts/security/2019/dla-1847.data
deleted file mode 100644
index 3fe4609f235..00000000000
--- a/english/lts/security/2019/dla-1847.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1847-1 squid3</define-tag>
-<define-tag report_date>2019-07-07</define-tag>
-<define-tag secrefs>CVE-2019-13345</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1847.wml b/english/lts/security/2019/dla-1847.wml
deleted file mode 100644
index cc0e219f810..00000000000
--- a/english/lts/security/2019/dla-1847.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were multiple cross-site scripting (XSS) vulnerabilities in the <tt>squid3</tt> caching proxy server</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13345">CVE-2019-13345</a>
-
- <p>The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.8-6+deb8u7.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1847.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1848.data b/english/lts/security/2019/dla-1848.data
deleted file mode 100644
index 30ca42d0932..00000000000
--- a/english/lts/security/2019/dla-1848.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1848-1 libspring-security-2.0-java</define-tag>
-<define-tag report_date>2019-07-09</define-tag>
-<define-tag secrefs>CVE-2019-11272</define-tag>
-<define-tag packages>libspring-security-2.0-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1848.wml b/english/lts/security/2019/dla-1848.wml
deleted file mode 100644
index b4aa84ce720..00000000000
--- a/english/lts/security/2019/dla-1848.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>DLA text goes here</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.7.RELEASE-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your libspring-security-2.0-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1848.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1849.data b/english/lts/security/2019/dla-1849.data
deleted file mode 100644
index 2c980f5cf17..00000000000
--- a/english/lts/security/2019/dla-1849.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1849-1 zeromq3</define-tag>
-<define-tag report_date>2019-7-8</define-tag>
-<define-tag secrefs>CVE-2019-13132</define-tag>
-<define-tag packages>zeromq3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1849.wml b/english/lts/security/2019/dla-1849.wml
deleted file mode 100644
index 3d0cc0f5e4d..00000000000
--- a/english/lts/security/2019/dla-1849.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Fang-Pen Lin discovered a stack-based buffer-overflow flaw in ZeroMQ, a
-lightweight messaging kernel library. A remote, unauthenticated client
-connecting to an application using the libzmq library, running with a
-socket listening with CURVE encryption/authentication enabled, can take
-advantage of this flaw to cause a denial of service or the execution of
-arbitrary code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.0.5+dfsg-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your zeromq3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1849.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1850.data b/english/lts/security/2019/dla-1850.data
deleted file mode 100644
index aafec85dd81..00000000000
--- a/english/lts/security/2019/dla-1850.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1850-1 redis</define-tag>
-<define-tag report_date>2019-07-10</define-tag>
-<define-tag secrefs>CVE-2019-10192</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1850.wml b/english/lts/security/2019/dla-1850.wml
deleted file mode 100644
index 5ddc94d3d16..00000000000
--- a/english/lts/security/2019/dla-1850.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two heap buffer overflows in the
-Hyperloglog functionality provided by the Redis in-memory key-value
-database.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10192">CVE-2019-10192</a>
-
- <p>Heap buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:2.8.17-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1850.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1851.data b/english/lts/security/2019/dla-1851.data
deleted file mode 100644
index 68949030042..00000000000
--- a/english/lts/security/2019/dla-1851.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1851-1 openjpeg2</define-tag>
-<define-tag report_date>2019-7-10</define-tag>
-<define-tag secrefs>CVE-2016-9112 CVE-2018-20847 Bug#931294 Bug#844551</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1851.wml b/english/lts/security/2019/dla-1851.wml
deleted file mode 100644
index 7de5e3d47df..00000000000
--- a/english/lts/security/2019/dla-1851.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in openjpeg2, a JPEG 2000
-image library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9112">CVE-2016-9112</a>
-
- <p>A floating point exception or divide by zero in the function
- opj_pi_next_cprl may lead to a denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20847">CVE-2018-20847</a>
-
- <p>An improper computation of values in the function
- opj_get_encoding_parameters can lead to an integer overflow.
- This issue was partly fixed by the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1239">CVE-2015-1239</a>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.0-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1851.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1852.data b/english/lts/security/2019/dla-1852.data
deleted file mode 100644
index 530bc4e8cc7..00000000000
--- a/english/lts/security/2019/dla-1852.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1852-1 python3.4</define-tag>
-<define-tag report_date>2019-07-10</define-tag>
-<define-tag secrefs>CVE-2019-9948</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1852.wml b/english/lts/security/2019/dla-1852.wml
deleted file mode 100644
index 67de2617ab4..00000000000
--- a/english/lts/security/2019/dla-1852.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The urllib library in Python ships support for a second, not well known
-URL scheme for accessing local files ("local_file://"). This scheme can
-be used to circumvent protections that try to block local file access
-and only block the well-known "file://" schema. This update addresses
-the vulnerability by disallowing the "local_file://" URL scheme.</p>
-
-<p>This update also fixes another regresssion introduced in the update
-issued as DLA-1835-1 that broke installation of libpython3.4-testsuite.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.4.2-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>For the detailed security status of python3.4 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.4">https://security-tracker.debian.org/tracker/python3.4</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1852.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1853.data b/english/lts/security/2019/dla-1853.data
deleted file mode 100644
index b203899a32d..00000000000
--- a/english/lts/security/2019/dla-1853.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1853-1 libspring-java</define-tag>
-<define-tag report_date>2019-07-13</define-tag>
-<define-tag secrefs>CVE-2014-3578 CVE-2014-3625 CVE-2015-3192 CVE-2015-5211 CVE-2016-9878 Bug#760733 Bug#769698 Bug#796137 Bug#849167</define-tag>
-<define-tag packages>libspring-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1853.wml b/english/lts/security/2019/dla-1853.wml
deleted file mode 100644
index 3d1e9f45228..00000000000
--- a/english/lts/security/2019/dla-1853.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Vulnerabilities have been identified in libspring-java, a modular
-Java/J2EE application framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3578">CVE-2014-3578</a>
-
- <p>A directory traversal vulnerability that allows remote attackers to
- read arbitrary files via a crafted URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3625">CVE-2014-3625</a>
-
- <p>A directory traversal vulnerability that allows remote attackers to
- read arbitrary files via unspecified vectors, related to static
- resource handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3192">CVE-2015-3192</a>
-
- <p>Improper processing of inline DTD declarations when DTD is not
- entirely disabled, which allows remote attackers to cause a denial
- of service (memory consumption and out-of-memory errors) via a
- crafted XML file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5211">CVE-2015-5211</a>
-
- <p>Reflected File Download (RFD) attack vulnerability, which allows a
- malicious user to craft a URL with a batch script extension that
- results in the response being downloaded rather than rendered and
- also includes some input reflected in the response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9878">CVE-2016-9878</a>
-
- <p>Improper path sanitization in ResourceServlet, which allows
- directory traversal attacks.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.0.6.RELEASE-17+deb8u1.</p>
-
-<p>We recommend that you upgrade your libspring-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1853.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1854.data b/english/lts/security/2019/dla-1854.data
deleted file mode 100644
index 207cea5d768..00000000000
--- a/english/lts/security/2019/dla-1854.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1854-1 libonig</define-tag>
-<define-tag report_date>2019-7-17</define-tag>
-<define-tag secrefs>CVE-2019-13224 Bug#931878</define-tag>
-<define-tag packages>libonig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1854.wml b/english/lts/security/2019/dla-1854.wml
deleted file mode 100644
index f63b335a324..00000000000
--- a/english/lts/security/2019/dla-1854.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free in onig_new_deluxe() in regext.c allows attackers to
-potentially cause information disclosure, denial of service, or
-possibly code execution by providing a crafted regular expression. The
-attacker
-provides a pair of a regex pattern and a string, with a multi-byte
-encoding that gets handled by onig_new_deluxe().</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.9.5-3.2+deb8u2.</p>
-
-<p>We recommend that you upgrade your libonig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1854.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1855.data b/english/lts/security/2019/dla-1855.data
deleted file mode 100644
index 7a80574a4af..00000000000
--- a/english/lts/security/2019/dla-1855.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1855-1 exiv2</define-tag>
-<define-tag report_date>2019-07-19</define-tag>
-<define-tag secrefs>CVE-2019-13504</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1855.wml b/english/lts/security/2019/dla-1855.wml
deleted file mode 100644
index f12b6570c92..00000000000
--- a/english/lts/security/2019/dla-1855.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an integer overflow vulnerability
-in exiv2, a tool to manipulate images containing (eg.) EXIF metadata.</p>
-
-<p>This could have resulted in a denial of service via a specially-crafted
-file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13504">CVE-2019-13504</a>
-
- <p>Out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.24-4.1+deb8u4.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1855.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1856.data b/english/lts/security/2019/dla-1856.data
deleted file mode 100644
index d63b5933006..00000000000
--- a/english/lts/security/2019/dla-1856.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1856-1 patch</define-tag>
-<define-tag report_date>2019-7-19</define-tag>
-<define-tag secrefs>CVE-2019-13636</define-tag>
-<define-tag packages>patch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1856.wml b/english/lts/security/2019/dla-1856.wml
deleted file mode 100644
index e75f7930bab..00000000000
--- a/english/lts/security/2019/dla-1856.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Handling of symlinks in patch, a tool to apply a diff file to an original,
-was wrong in certain cases.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.5-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your patch packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1856.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1857.data b/english/lts/security/2019/dla-1857.data
deleted file mode 100644
index c9664f8dce6..00000000000
--- a/english/lts/security/2019/dla-1857.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1857-1 nss</define-tag>
-<define-tag report_date>2019-07-20</define-tag>
-<define-tag secrefs>CVE-2019-11719 CVE-2019-11729</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1857.wml b/english/lts/security/2019/dla-1857.wml
deleted file mode 100644
index 989f15c0333..00000000000
--- a/english/lts/security/2019/dla-1857.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Vulnerabilities have been discovered in nss, the Mozilla Network
-Security Service library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11719">CVE-2019-11719</a>:
-
-<p>Out-of-bounds read when importing curve25519 private key</p>
-
- <p>When importing a curve25519 private key in PKCS#8format with leading
- 0x00 bytes, it is possible to trigger an out-of-bounds read in the
- Network Security Services (NSS) library. This could lead to
- information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11729">CVE-2019-11729</a>:
-
-<p>Empty or malformed p256-ECDH public keys may trigger a
- segmentation fault</p>
-
- <p>Empty or malformed p256-ECDH public keys may trigger a segmentation
- fault due values being improperly sanitized before being copied into
- memory and used.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:3.26-1+debu8u5.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1857.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1858.data b/english/lts/security/2019/dla-1858.data
deleted file mode 100644
index a0013d1af3d..00000000000
--- a/english/lts/security/2019/dla-1858.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1858-1 squid3</define-tag>
-<define-tag report_date>2019-07-20</define-tag>
-<define-tag secrefs>CVE-2019-12525 CVE-2019-12529</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1858.wml b/english/lts/security/2019/dla-1858.wml
deleted file mode 100644
index decc184b6a3..00000000000
--- a/english/lts/security/2019/dla-1858.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Squid, a high-performance proxy caching server for web clients, has been
-found vulnerable to denial of service attacks associated with HTTP
-authentication header processing.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12525">CVE-2019-12525</a>
-
- <p>Due to incorrect buffer management Squid is vulnerable to a denial
- of service attack when processing HTTP Digest Authentication
- credentials.</p>
-
- <p>Due to incorrect input validation the HTTP Request header parser for
- Digest authentication may access memory outside the allocated memory
- buffer.</p>
-
- <p>On systems with memory access protections this can result in the
- Squid process being terminated unexpectedly. Resulting in a denial
- of service for all clients using the proxy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12529">CVE-2019-12529</a>
-
- <p>Due to incorrect buffer management Squid is vulnerable to a denial
- of service attack when processing HTTP Basic Authentication
- credentials.</p>
-
- <p>Due to incorrect string termination the Basic authentication
- credentials decoder may access memory outside the decode buffer.</p>
-
- <p>On systems with memory access protections this can result in the
- Squid process being terminated unexpectedly. Resulting in a denial
- of service for all clients using the proxy.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.8-6+deb8u8.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1858.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1859.data b/english/lts/security/2019/dla-1859.data
deleted file mode 100644
index 1d047c3ec12..00000000000
--- a/english/lts/security/2019/dla-1859.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1859-1 bind9</define-tag>
-<define-tag report_date>2019-7-21</define-tag>
-<define-tag secrefs>CVE-2018-5743</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1859.wml b/english/lts/security/2019/dla-1859.wml
deleted file mode 100644
index 621f5b8e1bf..00000000000
--- a/english/lts/security/2019/dla-1859.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was found in the Bind DNS Server. Limits on
-simultaneous tcp connections have not been enforced correctly and could
-lead to exhaustion of file descriptors. In the worst case this could
-affect the file descriptors of the whole system.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:9.9.5.dfsg-9+deb8u18.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1859.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1860.data b/english/lts/security/2019/dla-1860.data
deleted file mode 100644
index 4ff65a38bbc..00000000000
--- a/english/lts/security/2019/dla-1860.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1860-1 libxslt</define-tag>
-<define-tag report_date>2019-7-22</define-tag>
-<define-tag secrefs>CVE-2016-4609 CVE-2016-4610 CVE-2019-13117 CVE-2019-13118 Bug#932321 Bug#932320</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1860.wml b/english/lts/security/2019/dla-1860.wml
deleted file mode 100644
index 294eac555d0..00000000000
--- a/english/lts/security/2019/dla-1860.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in libxslt the XSLT 1.0 processing
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4610">CVE-2016-4610</a>
-
- <p>Invalid memory access leading to DoS at exsltDynMapFunction. libxslt
- allows remote attackers to cause a denial of service (memory
- corruption) or possibly have unspecified other impact via unknown
- vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4609">CVE-2016-4609</a>
-
- <p>Out-of-bounds read at xmlGetLineNoInternal()
- libxslt allows remote attackers to cause a denial of service (memory
- corruption) or possibly have unspecified other impact via unknown
- vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13117">CVE-2019-13117</a>
-
- <p>An xsl:number with certain format strings could lead to an
- uninitialized read in xsltNumberFormatInsertNumbers. This could
- allow an attacker to discern whether a byte on the stack contains
- the characters A, a, I, i, or 0, or any other character.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13118">CVE-2019-13118</a>
-
- <p>A type holding grouping characters of an xsl:number instruction was
- too narrow and an invalid character/length combination could be
- passed to xsltNumberFormatDecimal, leading to a read of
- uninitialized stack data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.1.28-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1860.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1861.data b/english/lts/security/2019/dla-1861.data
deleted file mode 100644
index 4cc76579f53..00000000000
--- a/english/lts/security/2019/dla-1861.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1861-1 libsdl2-image</define-tag>
-<define-tag report_date>2019-7-22</define-tag>
-<define-tag secrefs>CVE-2018-3977 CVE-2019-5052 CVE-2019-7635 CVE-2019-12216 CVE-2019-12217 CVE-2019-12218 CVE-2019-12219 CVE-2019-12220 CVE-2019-12221 CVE-2019-12222 Bug#932754 Bug#932755</define-tag>
-<define-tag packages>libsdl2-image</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1861.wml b/english/lts/security/2019/dla-1861.wml
deleted file mode 100644
index f98af445685..00000000000
--- a/english/lts/security/2019/dla-1861.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following issues have been found in libsdl2-image, the image file loading
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3977">CVE-2018-3977</a>
-
- <p>Heap buffer overflow in IMG_xcf.c. This vulnerability might be leveraged by
- remote attackers to cause remote code execution or denial of service via a
- crafted XCF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5052">CVE-2019-5052</a>
-
- <p>Integer overflow and subsequent buffer overflow in IMG_pcx.c. This
- vulnerability might be leveraged by remote attackers to cause remote code
- execution or denial of service via a crafted PCX file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7635">CVE-2019-7635</a>
-
- <p>Heap buffer overflow affecting Blit1to4, in IMG_bmp.c. This vulnerability
- might be leveraged by remote attackers to cause denial of service or any
- other unspecified impact via a crafted BMP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12216">CVE-2019-12216</a>
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12217">CVE-2019-12217</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12218">CVE-2019-12218</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12219">CVE-2019-12219</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12220">CVE-2019-12220</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12221">CVE-2019-12221</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12222">CVE-2019-12222</a>
-
- <p>Multiple out-of-bound read and write accesses affecting IMG_LoadPCX_RW, in
- IMG_pcx.c. These vulnerabilities might be leveraged by remote attackers to
- cause denial of service or any other unspecified impact via a crafted PCX
- file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.0.0+dfsg-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your libsdl2-image packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1861.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1862.data b/english/lts/security/2019/dla-1862.data
deleted file mode 100644
index 0472cb973f7..00000000000
--- a/english/lts/security/2019/dla-1862.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1862-1 linux</define-tag>
-<define-tag report_date>2019-07-27</define-tag>
-<define-tag secrefs>CVE-2019-2101 CVE-2019-10639 CVE-2019-13272 Bug#930904</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1862.wml b/english/lts/security/2019/dla-1862.wml
deleted file mode 100644
index 1f7db1194f4..00000000000
--- a/english/lts/security/2019/dla-1862.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-2101">CVE-2019-2101</a>
-
- <p>Andrey Konovalov discovered that the USB Video Class driver
- (uvcvideo) did not consistently handle a type field in device
- descriptors, which could result in a heap buffer overflow. This
- could be used for denial of service or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10639">CVE-2019-10639</a>
-
- <p>Amit Klein and Benny Pinkas discovered that the generation of IP
- packet IDs used a weak hash function that incorporated a kernel
- virtual address. In Linux 3.16 this hash function is not used for
- IP IDs but is used for other purposes in the network stack. In
- custom kernel configurations that enable kASLR, this might weaken
- kASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13272">CVE-2019-13272</a>
-
- <p>Jann Horn discovered that the ptrace subsystem in the Linux kernel
- mishandles the management of the credentials of a process that wants
- to create a ptrace relationship, allowing a local user to obtain root
- privileges under certain scenarios.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in
-version 3.16.70-1. This update also fixes a regression introduced by
-the original fix for <a
-href="https://security-tracker.debian.org/tracker/CVE-2019-11478">CVE-2019-11478</a>
-(<a href="https://bugs.debian.org/930904">#930904</a>), and includes
-other fixes from upstream stable updates.</p>
-
-<p>We recommend that you upgrade your linux and linux-latest
-packages. You will need to use "apt-get upgrade --with-new-pkgs"
-or <q>apt upgrade</q> as the binary package names have changed.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1862.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1863.data b/english/lts/security/2019/dla-1863.data
deleted file mode 100644
index 648f78df50e..00000000000
--- a/english/lts/security/2019/dla-1863.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1863-1 linux-4.9</define-tag>
-<define-tag report_date>2019-07-27</define-tag>
-<define-tag secrefs>CVE-2019-13272</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1863.wml b/english/lts/security/2019/dla-1863.wml
deleted file mode 100644
index 0c1d51cccb2..00000000000
--- a/english/lts/security/2019/dla-1863.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jann Horn discovered that the ptrace subsystem in the Linux kernel
-mishandles the management of the credentials of a process that wants
-to create a ptrace relationship, allowing a local user to obtain root
-privileges under certain scenarios.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.9.168-1+deb9u4~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1863.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1864.data b/english/lts/security/2019/dla-1864.data
deleted file mode 100644
index fafbfdcf2a5..00000000000
--- a/english/lts/security/2019/dla-1864.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1864-1 patch</define-tag>
-<define-tag report_date>2019-7-25</define-tag>
-<define-tag secrefs>CVE-2019-13638</define-tag>
-<define-tag packages>patch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1864.wml b/english/lts/security/2019/dla-1864.wml
deleted file mode 100644
index 60043daf71b..00000000000
--- a/english/lts/security/2019/dla-1864.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue with quoting has been found in patch, a tool to apply a diff
-file to an original, when invoking ed. In order to avoid this, ed is now
-directly started instead of calling a shell which starts ed.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.5-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your patch packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1864.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1865.data b/english/lts/security/2019/dla-1865.data
deleted file mode 100644
index cfa3c81f7c4..00000000000
--- a/english/lts/security/2019/dla-1865.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1865-1 sdl-image1.2</define-tag>
-<define-tag report_date>2019-07-27</define-tag>
-<define-tag secrefs>CVE-2018-3977 CVE-2019-5051 CVE-2019-5052 CVE-2019-7635 CVE-2019-12216 CVE-2019-12217 CVE-2019-12218 CVE-2019-12219 CVE-2019-12220 CVE-2019-12221 CVE-2019-12222</define-tag>
-<define-tag packages>sdl-image1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1865.wml b/english/lts/security/2019/dla-1865.wml
deleted file mode 100644
index f79a8264ea3..00000000000
--- a/english/lts/security/2019/dla-1865.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following issues have been found in sdl-image1.2, the 1.x version of the
-image file loading library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-3977">CVE-2018-3977</a>
-
- <p>Heap buffer overflow in IMG_xcf.c. This vulnerability might be leveraged by
- remote attackers to cause remote code execution or denial of service via a
- crafted XCF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5051">CVE-2019-5051</a>
-
- <p>Heap based buffer overflow in IMG_LoadPCX_RW, in IMG_pcx.c. This
- vulnerability might be leveraged by remote attackers to cause remote code
- execution or denial of service via a crafted PCX file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5052">CVE-2019-5052</a>
-
- <p>Integer overflow and subsequent buffer overflow in IMG_pcx.c. This
- vulnerability might be leveraged by remote attackers to cause remote code
- execution or denial of service via a crafted PCX file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7635">CVE-2019-7635</a>
-
- <p>Heap buffer overflow affecting Blit1to4, in IMG_bmp.c. This vulnerability
- might be leveraged by remote attackers to cause denial of service or any
- other unspecified impact via a crafted BMP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12216">CVE-2019-12216</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12217">CVE-2019-12217</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12218">CVE-2019-12218</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12219">CVE-2019-12219</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12220">CVE-2019-12220</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12221">CVE-2019-12221</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-12222">CVE-2019-12222</a>
-
- <p>Multiple out-of-bound read and write accesses affecting IMG_LoadPCX_RW, in
- IMG_pcx.c. These vulnerabilities might be leveraged by remote attackers to
- cause denial of service or any other unspecified impact via a crafted PCX
- file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.12-5+deb8u2.</p>
-
-<p>We recommend that you upgrade your sdl-image1.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1865.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1866-2.data b/english/lts/security/2019/dla-1866-2.data
deleted file mode 100644
index 587c8f42025..00000000000
--- a/english/lts/security/2019/dla-1866-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1866-2 glib2.0</define-tag>
-<define-tag report_date>2019-08-06</define-tag>
-<define-tag secrefs>CVE-2019-13012 Bug#933877</define-tag>
-<define-tag packages>glib2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1866-2.wml b/english/lts/security/2019/dla-1866-2.wml
deleted file mode 100644
index 20282c130db..00000000000
--- a/english/lts/security/2019/dla-1866-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Simon McVittie spotted a memory leak regression in the way <a href="https://security-tracker.debian.org/tracker/CVE-2019-13012">CVE-2019-13012</a> had been resolved
-for glib2.0 in Debian jessie.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.42.1-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your glib2.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1866-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1866.data b/english/lts/security/2019/dla-1866.data
deleted file mode 100644
index 98b798e3b2f..00000000000
--- a/english/lts/security/2019/dla-1866.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1866-1 glib2.0</define-tag>
-<define-tag report_date>2019-07-31</define-tag>
-<define-tag secrefs>CVE-2018-16428 CVE-2018-16429 CVE-2019-13012 Bug#931234</define-tag>
-<define-tag packages>glib2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1866.wml b/english/lts/security/2019/dla-1866.wml
deleted file mode 100644
index b7ddf98885c..00000000000
--- a/english/lts/security/2019/dla-1866.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various minor issues have been addressed in the GLib library. GLib is a
-useful general-purpose C library used by projects such as GTK+, GIMP,
-and GNOME.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16428">CVE-2018-16428</a>
-
- <p>In GNOME GLib, g_markup_parse_context_end_parse() in gmarkup.c
- had a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16429">CVE-2018-16429</a>
-
- <p>GNOME GLib had an out-of-bounds read vulnerability in
- g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13012">CVE-2019-13012</a>
-
- <p>The keyfile settings backend in GNOME GLib (aka glib2.0) before
- created directories using g_file_make_directory_with_parents
- (kfsb->dir, NULL, NULL) and files using g_file_replace_contents
- (kfsb->file, contents, length, NULL, FALSE,
- G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently,
- it did not properly restrict directory (and file) permissions.
- Instead, for directories, 0777 permissions were used; for files,
- default file permissions were used. This issue is similar to
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-12450">CVE-2019-12450</a>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.42.1-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your glib2.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1866.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1867.data b/english/lts/security/2019/dla-1867.data
deleted file mode 100644
index d8d25ebb721..00000000000
--- a/english/lts/security/2019/dla-1867.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1867-1 wpa</define-tag>
-<define-tag report_date>2019-08-01</define-tag>
-<define-tag secrefs>CVE-2019-9495 CVE-2019-9497 CVE-2019-9498 CVE-2019-9499 CVE-2019-11555 Bug#927463</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1867.wml b/english/lts/security/2019/dla-1867.wml
deleted file mode 100644
index e49bcc92b8a..00000000000
--- a/english/lts/security/2019/dla-1867.wml
+++ /dev/null
@@ -1,79 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in WPA supplicant / hostapd. Some
-of them could only partially be mitigated, please read below for details.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9495">CVE-2019-9495</a>
-
- <p>Cache-based side-channel attack against the EAP-pwd implementation:
- an attacker able to run unprivileged code on the target machine
- (including for example javascript code in a browser on a smartphone)
- during the handshake could deduce enough information to discover the
- password in a dictionary attack.</p>
-
- <p>This issue has only very partially been mitigated against by reducing
- measurable timing differences during private key operations. More
- work is required to fully mitigate this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9497">CVE-2019-9497</a>
-
- <p>Reflection attack against EAP-pwd server implementation: a lack of
- validation of received scalar and elements value in the
- EAP-pwd-Commit messages could have resulted in attacks that would
- have been able to complete EAP-pwd authentication exchange without
- the attacker having to know the password. This did not result in the
- attacker being able to derive the session key, complete the following
- key exchange and access the network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9498">CVE-2019-9498</a>
-
- <p>EAP-pwd server missing commit validation for scalar/element: hostapd
- didn't validate values received in the EAP-pwd-Commit message, so an
- attacker could have used a specially crafted commit message to
- manipulate the exchange in order for hostapd to derive a session key
- from a limited set of possible values. This could have resulted in an
- attacker being able to complete authentication and gain access to the
- network.</p>
-
- <p>This issue could only partially be mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9499">CVE-2019-9499</a>
-
- <p>EAP-pwd peer missing commit validation for scalar/element:
- wpa_supplicant didn't validate values received in the EAP-pwd-Commit
- message, so an attacker could have used a specially crafted commit
- message to manipulate the exchange in order for wpa_supplicant to
- derive a session key from a limited set of possible values. This
- could have resulted in an attacker being able to complete
- authentication and operate as a rogue AP.</p>
-
- <p>This issue could only partially be mitigated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11555">CVE-2019-11555</a>
-
- <p>The EAP-pwd implementation did't properly validate fragmentation
- reassembly state when receiving an unexpected fragment. This could
- have lead to a process crash due to a NULL pointer derefrence.</p>
-
- <p>An attacker in radio range of a station or access point with EAP-pwd
- support could cause a crash of the relevant process (wpa_supplicant
- or hostapd), ensuring a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.3-1+deb8u8.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1867.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1868.data b/english/lts/security/2019/dla-1868.data
deleted file mode 100644
index b5490370e24..00000000000
--- a/english/lts/security/2019/dla-1868.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1868-1 squirrelmail</define-tag>
-<define-tag report_date>2019-08-01</define-tag>
-<define-tag secrefs>CVE-2019-12970</define-tag>
-<define-tag packages>squirrelmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1868.wml b/english/lts/security/2019/dla-1868.wml
deleted file mode 100644
index 9fa15ef4cc4..00000000000
--- a/english/lts/security/2019/dla-1868.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A XSS vulnerability was discovered in SquirrelMail. Due to improper
-handling of RCDATA and RAWTEXT type elements, the built-in
-sanitization mechanism can be bypassed. Malicious script content from
-HTML e-mails can be executed within the application context via
-crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or
-TEXTAREA element.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:1.4.23~svn20120406-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your squirrelmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1868.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1869.data b/english/lts/security/2019/dla-1869.data
deleted file mode 100644
index ad28e6fb7ba..00000000000
--- a/english/lts/security/2019/dla-1869.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1869-1 firefox-esr</define-tag>
-<define-tag report_date>2019-08-02</define-tag>
-<define-tag secrefs>CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1869.wml b/english/lts/security/2019/dla-1869.wml
deleted file mode 100644
index bd692cde97d..00000000000
--- a/english/lts/security/2019/dla-1869.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, cross-site scripting, spoofing, information disclosure, denial of
-service or cross-site request forgery.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.8.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1869.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1870.data b/english/lts/security/2019/dla-1870.data
deleted file mode 100644
index 6e1057d7460..00000000000
--- a/english/lts/security/2019/dla-1870.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1870-1 thunderbird</define-tag>
-<define-tag report_date>2019-08-02</define-tag>
-<define-tag secrefs>CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1870.wml b/english/lts/security/2019/dla-1870.wml
deleted file mode 100644
index a951d5249f2..00000000000
--- a/english/lts/security/2019/dla-1870.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code, cross-site
-scripting, spoofing, information disclosure, denial of service or
-cross-site request forgery.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.8.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1870.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1871.data b/english/lts/security/2019/dla-1871.data
deleted file mode 100644
index 763b93f7ee1..00000000000
--- a/english/lts/security/2019/dla-1871.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1871-1 vim</define-tag>
-<define-tag report_date>2019-8-3</define-tag>
-<define-tag secrefs>CVE-2017-11109 CVE-2017-17087 CVE-2019-12735 Bug#867720 Bug#930020</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1871.wml b/english/lts/security/2019/dla-1871.wml
deleted file mode 100644
index ef18202b9fc..00000000000
--- a/english/lts/security/2019/dla-1871.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several minor issues have been fixed in vim, a highly configurable
-text editor.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11109">CVE-2017-11109</a>
-
- <p>Vim allows attackers to cause a denial of service (invalid free)
- or possibly have unspecified other impact via a crafted source
- (aka -S) file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17087">CVE-2017-17087</a>
-
- <p>Vim sets the group ownership of a .swp file to the editor's
- primary group (which may be different from the group ownership of
- the original file), which allows local users to obtain sensitive
- information by leveraging an applicable group membership.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12735">CVE-2019-12735</a>
-
- <p>Vim did not restrict the `:source!` command when executed in a
- sandbox.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:7.4.488-7+deb8u4.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1871.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1872.data b/english/lts/security/2019/dla-1872.data
deleted file mode 100644
index e4ef5df1155..00000000000
--- a/english/lts/security/2019/dla-1872.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1872-1 python-django</define-tag>
-<define-tag report_date>2019-08-06</define-tag>
-<define-tag secrefs>CVE-2019-14232 CVE-2019-14233</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1872.wml b/english/lts/security/2019/dla-1872.wml
deleted file mode 100644
index bf52148f1f4..00000000000
--- a/english/lts/security/2019/dla-1872.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two vulnerabilities in the Django web development framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14232">CVE-2019-14232</a>
-
- <p>Prevent a possible denial-of-service in django.utils.text.Truncator.</p>
-
- <p>If django.utils.text.Truncator's chars() and words() methods were passed
- the html=True argument, they were extremely slow to evaluate certain inputs
- due to a catastrophic backtracking vulnerability in a regular expression.
- The chars() and words() methods are used to implement the
- truncatechars_html and truncatewords_html template filters, which were thus
- vulnerable.</p>
-
- <p>The regular expressions used by Truncator have been simplified in order
- to avoid potential backtracking issues. As a consequence, trailing
- punctuation may now at times be included in the truncated output.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14233">CVE-2019-14233</a>
-
- <p>Prevent a possible denial-of-service in strip_tags().</p>
-
- <p>Due to the behavior of the underlying HTMLParser,
- django.utils.html.strip_tags() would be extremely slow to evaluate certain
- inputs containing large sequences of nested incomplete HTML entities. The
- strip_tags() method is used to implement the corresponding striptags
- template filter, which was thus also vulnerable.</p>
-
- <p>strip_tags() now avoids recursive calls to HTMLParser when progress
- removing tags, but necessarily incomplete HTML entities, stops being
- made.</p>
-
- <p>Remember that absolutely NO guarantee is provided about the results of
- strip_tags() being HTML safe. So NEVER mark safe the result of a
- strip_tags() call without escaping it first, for example with
- django.utils.html.escape().</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.11-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1872.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1873.data b/english/lts/security/2019/dla-1873.data
deleted file mode 100644
index 995b3fe264e..00000000000
--- a/english/lts/security/2019/dla-1873.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1873-1 proftpd-dfsg</define-tag>
-<define-tag report_date>2019-8-7</define-tag>
-<define-tag secrefs>CVE-2019-12815 Bug#932453</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1873.wml b/english/lts/security/2019/dla-1873.wml
deleted file mode 100644
index 967daa1f890..00000000000
--- a/english/lts/security/2019/dla-1873.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Maedel discovered that the mod_copy module of ProFTPD, a
-FTP/SFTP/FTPS server, performed incomplete permission validation for the
-CPFR/CPTO commands.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.5e+r1.3.5-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1873.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1874.data b/english/lts/security/2019/dla-1874.data
deleted file mode 100644
index 460f317e1ad..00000000000
--- a/english/lts/security/2019/dla-1874.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1874-1 postgresql-9.4</define-tag>
-<define-tag report_date>2019-8-8</define-tag>
-<define-tag secrefs>CVE-2019-10208</define-tag>
-<define-tag packages>postgresql-9.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1874.wml b/english/lts/security/2019/dla-1874.wml
deleted file mode 100644
index be79ce8cc3e..00000000000
--- a/english/lts/security/2019/dla-1874.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>* <a href="https://security-tracker.debian.org/tracker/CVE-2019-10208">CVE-2019-10208</a>: `TYPE` in `pg_temp` executes arbitrary SQL during
-`SECURITY DEFINER` execution</p>
-
-<p>Versions Affected: 9.4 - 11</p>
-
-<p>Given a suitable `SECURITY DEFINER` function, an attacker can execute
-arbitrary SQL under the identity of the function owner. An attack
-requires `EXECUTE` permission on the function, which must itself contain
-a function call having inexact argument type match. For example,
-`length('foo'::varchar)` and `length('foo')` are inexact, while
-`length('foo'::text)` is exact. As part of exploiting this
-vulnerability, the attacker uses `CREATE DOMAIN` to create a type in a
-`pg_temp` schema. The attack pattern and fix are similar to that for
-<a href="https://security-tracker.debian.org/tracker/CVE-2007-2138">CVE-2007-2138</a>.</p>
-
-<p>Writing `SECURITY DEFINER` functions continues to require following the
-considerations noted in the documentation:</p>
-
-<p>https://www.postgresql.org/docs/devel/sql-createfunction.html#SQL-CREATEFUNCTION-SECURITY</p>
-
-<p>The PostgreSQL project thanks Tom Lane for reporting this problem.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.4.24-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1874.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1875.data b/english/lts/security/2019/dla-1875.data
deleted file mode 100644
index 5df3f192b8b..00000000000
--- a/english/lts/security/2019/dla-1875.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1875-1 fusiondirectory</define-tag>
-<define-tag report_date>2019-08-11</define-tag>
-<define-tag secrefs>CVE-2019-11187</define-tag>
-<define-tag packages>fusiondirectory</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1875.wml b/english/lts/security/2019/dla-1875.wml
deleted file mode 100644
index c2769347b84..00000000000
--- a/english/lts/security/2019/dla-1875.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In FusionDirectory, an LDAP web-frontend written in PHP (originally
-derived GOsa² 2.6.x), a vulnerability was found that could theoretically
-lead to unauthorized access to the LDAP database managed with
-FusionDirectory. LDAP queries' result status ("Success") checks had not
-been strict enough. The resulting output containing the word <q>Success</q>
-anywhere in the returned data during login connection attempts would have
-returned <q>LDAP success</q> to FusionDirectory and possibly grant unwanted
-access.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.8.2-5+deb8u2.</p>
-
-<p>We recommend that you upgrade your fusiondirectory packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1875.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1876.data b/english/lts/security/2019/dla-1876.data
deleted file mode 100644
index 197db899acc..00000000000
--- a/english/lts/security/2019/dla-1876.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1876-1 gosa</define-tag>
-<define-tag report_date>2019-08-11</define-tag>
-<define-tag secrefs>CVE-2019-11187</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1876.wml b/english/lts/security/2019/dla-1876.wml
deleted file mode 100644
index 031ec607006..00000000000
--- a/english/lts/security/2019/dla-1876.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In GOsa², an LDAP web-frontend written in PHP, a vulnerability was found
-that could theoretically have lead to unauthorized access to the LDAP
-database managed with FusionDirectory. LDAP queries' result status
-("Success") checks had not been strict enough. The resulting output
-containing the word <q>Success</q> anywhere in the returned data during login
-connection attempts would have returned <q>LDAP success</q> to FusionDirectory
-and possibly grant unwanted access.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.4+reloaded2-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your gosa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1876.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1877.data b/english/lts/security/2019/dla-1877.data
deleted file mode 100644
index 3b85eb50cb6..00000000000
--- a/english/lts/security/2019/dla-1877.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1877-1 otrs2</define-tag>
-<define-tag report_date>2019-8-14</define-tag>
-<define-tag secrefs>CVE-2018-11563 CVE-2019-12746 CVE-2019-13458</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1877.wml b/english/lts/security/2019/dla-1877.wml
deleted file mode 100644
index c1c13c16a6a..00000000000
--- a/english/lts/security/2019/dla-1877.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues have been fixed in otrs2, a well known trouble
-ticket system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11563">CVE-2018-11563</a>
-
- <p>An attacker who is logged into OTRS as a customer can use the ticket
- overview screen to disclose internal article information of their
- customer tickets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12746">CVE-2019-12746</a>
-
- <p>A user logged into OTRS as an agent might unknowingly disclose their
- session ID by sharing the link of an embedded ticket article with
- third parties. This identifier can be then potentially abused in
- order to impersonate the agent user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13458">CVE-2019-13458</a>
-
- <p>An attacker who is logged into OTRS as an agent user with
- appropriate permissions can leverage OTRS tags in templates in order
- to disclose hashed user passwords.</p>
-
-
-<p>Due to an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-12248">CVE-2019-12248</a>, viewing email attachments
-was no longer possible. This update correctly implements the new
-Ticket::Fronted::BlockLoadingRemoteContent option.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.18-1+deb8u11.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1877.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1878.data b/english/lts/security/2019/dla-1878.data
deleted file mode 100644
index 47b47deb08d..00000000000
--- a/english/lts/security/2019/dla-1878.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1878-1 php5</define-tag>
-<define-tag report_date>2019-08-12</define-tag>
-<define-tag secrefs>CVE-2019-11041 CVE-2019-11042</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1878.wml b/english/lts/security/2019/dla-1878.wml
deleted file mode 100644
index 1f4abbe1c04..00000000000
--- a/english/lts/security/2019/dla-1878.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two heap buffer overflows were found in the EXIF parsing code of PHP,
-a widely-used open source general purpose scripting language.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u5.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1878.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1879.data b/english/lts/security/2019/dla-1879.data
deleted file mode 100644
index 97fc928be31..00000000000
--- a/english/lts/security/2019/dla-1879.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1879-1 jackson-databind</define-tag>
-<define-tag report_date>2019-8-12</define-tag>
-<define-tag secrefs>CVE-2019-14379 CVE-2019-14439 Bug#933393</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1879.wml b/english/lts/security/2019/dla-1879.wml
deleted file mode 100644
index fbf29a3eb80..00000000000
--- a/english/lts/security/2019/dla-1879.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Deserialization flaws were discovered in jackson-databind relating to
-EHCache and logback/jndi, which could allow an unauthenticated user to
-perform remote code execution. The issue was resolved by extending the
-blacklist and blocking more classes from polymorphic deserialization.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1879.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1880.data b/english/lts/security/2019/dla-1880.data
deleted file mode 100644
index efeb193e403..00000000000
--- a/english/lts/security/2019/dla-1880.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1880-1 ghostscript</define-tag>
-<define-tag report_date>2019-08-13</define-tag>
-<define-tag secrefs>CVE-2019-10216 Bug#934638</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1880.wml b/english/lts/security/2019/dla-1880.wml
deleted file mode 100644
index 537dc39599c..00000000000
--- a/english/lts/security/2019/dla-1880.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Netanel reported that the .buildfont1 procedure in Ghostscript, the GPL
-PostScript/PDF interpreter, does not properly restrict privileged calls,
-which could result in bypass of file system restrictions of the dSAFER
-sandbox.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.26a~dfsg-0+deb8u4.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1880.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1881.data b/english/lts/security/2019/dla-1881.data
deleted file mode 100644
index b067285eb28..00000000000
--- a/english/lts/security/2019/dla-1881.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1881-1 evince</define-tag>
-<define-tag report_date>2019-08-13</define-tag>
-<define-tag secrefs>CVE-2017-1000159 CVE-2019-11459 CVE-2019-1010006</define-tag>
-<define-tag packages>evince</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1881.wml b/english/lts/security/2019/dla-1881.wml
deleted file mode 100644
index e309f3d2112..00000000000
--- a/english/lts/security/2019/dla-1881.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A few issues were found in the Evince document viewer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000159">CVE-2017-1000159</a>
-
- <p>When printing from DVI to PDF, the dvipdfm tool was called without
- properly sanitizing the filename, which could lead to a command
- injection attack via the filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11459">CVE-2019-11459</a>
-
- <p>The tiff_document_render() and tiff_document_get_thumbnail() did
- not check the status of TIFFReadRGBAImageOriented(), leading to
- uninitialized memory access if that funcion fails.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010006">CVE-2019-1010006</a>
-
- <p>Some buffer overflow checks were not properly done, leading to
- application crash or possibly arbitrary code execution when
- opening maliciously crafted files.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.14.1-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your evince packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1881.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1882.data b/english/lts/security/2019/dla-1882.data
deleted file mode 100644
index 8d6ef12dbae..00000000000
--- a/english/lts/security/2019/dla-1882.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1882-1 atril</define-tag>
-<define-tag report_date>2019-08-13</define-tag>
-<define-tag secrefs>CVE-2017-1000159 CVE-2019-11459 CVE-2019-1010006</define-tag>
-<define-tag packages>atril</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1882.wml b/english/lts/security/2019/dla-1882.wml
deleted file mode 100644
index 37ea7d85e77..00000000000
--- a/english/lts/security/2019/dla-1882.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A few issues were found in Atril, the MATE document viewer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000159">CVE-2017-1000159</a>
-
- <p>When printing from DVI to PDF, the dvipdfm tool was called without
- properly sanitizing the filename, which could lead to a command
- injection attack via the filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11459">CVE-2019-11459</a>
-
- <p>The tiff_document_render() and tiff_document_get_thumbnail() did
- not check the status of TIFFReadRGBAImageOriented(), leading to
- uninitialized memory access if that funcion fails.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010006">CVE-2019-1010006</a>
-
- <p>Some buffer overflow checks were not properly done, leading to
- application crash or possibly arbitrary code execution when
- opening maliciously crafted files.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.8.1+dfsg1-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your atril packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1882.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1883.data b/english/lts/security/2019/dla-1883.data
deleted file mode 100644
index 69802b62405..00000000000
--- a/english/lts/security/2019/dla-1883.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1883-1 tomcat8</define-tag>
-<define-tag report_date>2019-08-13</define-tag>
-<define-tag secrefs>CVE-2016-5388 CVE-2018-8014 CVE-2019-0221 Bug#929895 Bug#898935</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1883.wml b/english/lts/security/2019/dla-1883.wml
deleted file mode 100644
index b530cc9c0b9..00000000000
--- a/english/lts/security/2019/dla-1883.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several minor issues have been fixed in tomcat8, a Java Servlet and
-JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5388">CVE-2016-5388</a>
-
- <p>Apache Tomcat, when the CGI Servlet is enabled, follows RFC 3875
- section 4.1.18 and therefore does not protect applications from
- the presence of untrusted client data in the HTTP_PROXY
- environment variable, which might allow remote attackers to
- redirect an application's outbound HTTP traffic to an arbitrary
- proxy server via a crafted Proxy header in an HTTP request, aka an
- <q>httpoxy</q> issue. The <q>cgi</q> servlet now has a <q>envHttpHeaders</q>
- parameter to filter environment variables.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8014">CVE-2018-8014</a>
-
- <p>The defaults settings for the CORS filter provided in Apache
- Tomcat are insecure and enable <q>supportsCredentials</q> for all
- origins. It is expected that users of the CORS filter will have
- configured it appropriately for their environment rather than
- using it in the default configuration. Therefore, it is expected
- that most users will not be impacted by this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0221">CVE-2019-0221</a>
-
- <p>The SSI printenv command in Apache Tomcat echoes user provided
- data without escaping and is, therefore, vulnerable to XSS. SSI is
- disabled by default. The printenv command is intended for
- debugging and is unlikely to be present in a production website.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8.0.14-1+deb8u15.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1883.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1884.data b/english/lts/security/2019/dla-1884.data
deleted file mode 100644
index ed02d92f431..00000000000
--- a/english/lts/security/2019/dla-1884.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1884-1 linux</define-tag>
-<define-tag report_date>2019-08-14</define-tag>
-<define-tag secrefs>CVE-2017-18509 CVE-2018-20836 CVE-2019-1125 CVE-2019-3900 CVE-2019-10207 CVE-2019-10638 CVE-2019-13631 CVE-2019-14283 CVE-2019-14284</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1884.wml b/english/lts/security/2019/dla-1884.wml
deleted file mode 100644
index bc3ae7b6ad4..00000000000
--- a/english/lts/security/2019/dla-1884.wml
+++ /dev/null
@@ -1,111 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18509">CVE-2017-18509</a>
-
- <p>Denis Andzakovic reported a missing type check in the IPv4 multicast
- routing implementation. A user with the CAP_NET_ADMIN capability (in
- any user namespace) could use this for denial-of-service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20836">CVE-2018-20836</a>
-
- <p>chenxiang reported a race condition in libsas, the kernel
- subsystem supporting Serial Attached SCSI (SAS) devices, which
- could lead to a use-after-free. It is not clear how this might be
- exploited.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1125">CVE-2019-1125</a>
-
- <p>It was discovered that most x86 processors could speculatively
- skip a conditional SWAPGS instruction used when entering the
- kernel from user mode, and/or could speculatively execute it when
- it should be skipped. This is a subtype of Spectre variant 1,
- which could allow local users to obtain sensitive information from
- the kernel or other processes. It has been mitigated by using
- memory barriers to limit speculative execution. Systems using an
- i386 kernel are not affected as the kernel does not use SWAPGS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3900">CVE-2019-3900</a>
-
- <p>It was discovered that vhost drivers did not properly control the
- amount of work done to service requests from guest VMs. A
- malicious guest could use this to cause a denial-of-service
- (unbounded CPU usage) on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10207">CVE-2019-10207</a>
-
- <p>The syzkaller tool found a potential null dereference in various
- drivers for UART-attached Bluetooth adapters. A local user with
- access to a pty device or other suitable tty device could use this
- for denial-of-service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10638">CVE-2019-10638</a>
-
- <p>Amit Klein and Benny Pinkas discovered that the generation of IP
- packet IDs used a weak hash function, <q>jhash</q>. This could enable
- tracking individual computers as they communicate with different
- remote servers and from different networks. The <q>siphash</q>
- function is now used instead.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13631">CVE-2019-13631</a>
-
- <p>It was discovered that the gtco driver for USB input tablets could
- overrun a stack buffer with constant data while parsing the device's
- descriptor. A physically present user with a specially
- constructed USB device could use this to cause a denial-of-service
- (BUG/oops), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14283">CVE-2019-14283</a>
-
- <p>The syzkaller tool found a missing bounds check in the floppy disk
- driver. A local user with access to a floppy disk device, with a
- disk present, could use this to read kernel memory beyond the
- I/O buffer, possibly obtaining sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14284">CVE-2019-14284</a>
-
- <p>The syzkaller tool found a potential division-by-zero in the
- floppy disk driver. A local user with access to a floppy disk
- device could use this for denial-of-service (oops).</p></li>
-
-<li><a href="https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf">(CVE ID not yet assigned)</a>
-
- <p>Denis Andzakovic reported a possible use-after-free in the
- TCP sockets implementation. A local user could use this for
- denial-of-service (memory corruption or crash) or possibly
- for privilege escalation.</p></li>
-
-<li>(CVE ID not yet assigned)
-
- <p>The netfilter conntrack subsystem used kernel addresses as
- user-visible IDs, which could make it easier to exploit other
- security vulnerabilities.</p></li>
-
-<li><a href="https://xenbits.xen.org/xsa/advisory-300.html">XSA-300</a>
-
- <p>Julien Grall reported that Linux does not limit the amount of memory
- which a domain will attempt to balloon out, nor limits the amount of
- "foreign / grant map" memory which any individual guest can consume,
- leading to denial of service conditions (for host or guests).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.72-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1884.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1885.data b/english/lts/security/2019/dla-1885.data
deleted file mode 100644
index 0407a1264c0..00000000000
--- a/english/lts/security/2019/dla-1885.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1885-1 linux-4.9</define-tag>
-<define-tag report_date>2019-08-14</define-tag>
-<define-tag secrefs>CVE-2017-18509 CVE-2018-5995 CVE-2018-20836 CVE-2018-20856 CVE-2019-1125 CVE-2019-3882 CVE-2019-3900 CVE-2019-10207 CVE-2019-10638 CVE-2019-10639 CVE-2019-13631 CVE-2019-13648 CVE-2019-14283 CVE-2019-14284</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1885.wml b/english/lts/security/2019/dla-1885.wml
deleted file mode 100644
index 0463e486e13..00000000000
--- a/english/lts/security/2019/dla-1885.wml
+++ /dev/null
@@ -1,144 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18509">CVE-2017-18509</a>
-
- <p>Denis Andzakovic reported a missing type check in the IPv4 multicast
- routing implementation. A user with the CAP_NET_ADMIN capability (in
- any user namespace) could use this for denial-of-service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5995">CVE-2018-5995</a>
-
- <p>ADLab of VenusTech discovered that the kernel logged the virtual
- addresses assigned to per-CPU data, which could make it easier to
- exploit other vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20836">CVE-2018-20836</a>
-
- <p>chenxiang reported a race condition in libsas, the kernel
- subsystem supporting Serial Attached SCSI (SAS) devices, which
- could lead to a use-after-free. It is not clear how this might be
- exploited.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20856">CVE-2018-20856</a>
-
- <p>Xiao Jin reported a potential double-free in the block subsystem,
- in case an error occurs while initialising the I/O scheduler for a
- block device. It is not clear how this might be exploited.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1125">CVE-2019-1125</a>
-
- <p>It was discovered that most x86 processors could speculatively
- skip a conditional SWAPGS instruction used when entering the
- kernel from user mode, and/or could speculatively execute it when
- it should be skipped. This is a subtype of Spectre variant 1,
- which could allow local users to obtain sensitive information from
- the kernel or other processes. It has been mitigated by using
- memory barriers to limit speculative execution. Systems using an
- i386 kernel are not affected as the kernel does not use SWAPGS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3882">CVE-2019-3882</a>
-
- <p>It was found that the vfio implementation did not limit the number
- of DMA mappings to device memory. A local user granted ownership
- of a vfio device could use this to cause a denial of service
- (out-of-memory condition).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3900">CVE-2019-3900</a>
-
- <p>It was discovered that vhost drivers did not properly control the
- amount of work done to service requests from guest VMs. A
- malicious guest could use this to cause a denial-of-service
- (unbounded CPU usage) on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10207">CVE-2019-10207</a>
-
- <p>The syzkaller tool found a potential null dereference in various
- drivers for UART-attached Bluetooth adapters. A local user with
- access to a pty device or other suitable tty device could use this
- for denial-of-service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10638">CVE-2019-10638</a>
-
- <p>Amit Klein and Benny Pinkas discovered that the generation of IP
- packet IDs used a weak hash function, <q>jhash</q>. This could enable
- tracking individual computers as they communicate with different
- remote servers and from different networks. The <q>siphash</q>
- function is now used instead.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10639">CVE-2019-10639</a>
-
- <p>Amit Klein and Benny Pinkas discovered that the generation of IP
- packet IDs used a weak hash function that incorporated a kernel
- virtual address. This hash function is no longer used for IP IDs,
- although it is still used for other purposes in the network stack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13631">CVE-2019-13631</a>
-
- <p>It was discovered that the gtco driver for USB input tablets could
- overrun a stack buffer with constant data while parsing the device's
- descriptor. A physically present user with a specially
- constructed USB device could use this to cause a denial-of-service
- (BUG/oops), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13648">CVE-2019-13648</a>
-
- <p>Praveen Pandey reported that on PowerPC (ppc64el) systems without
- Transactional Memory (TM), the kernel would still attempt to
- restore TM state passed to the sigreturn() system call. A local
- user could use this for denial-of-service (oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14283">CVE-2019-14283</a>
-
- <p>The syzkaller tool found a missing bounds check in the floppy disk
- driver. A local user with access to a floppy disk device, with a
- disk present, could use this to read kernel memory beyond the
- I/O buffer, possibly obtaining sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14284">CVE-2019-14284</a>
-
- <p>The syzkaller tool found a potential division-by-zero in the
- floppy disk driver. A local user with access to a floppy disk
- device could use this for denial-of-service (oops).</p></li>
-
-<li><a href="https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-tcpsocketsuaf">(CVE ID not yet assigned)</a>
-
- <p>Denis Andzakovic reported a possible use-after-free in the
- TCP sockets implementation. A local user could use this for
- denial-of-service (memory corruption or crash) or possibly
- for privilege escalation.</p></li>
-
-<li>(CVE ID not yet assigned)
-
- <p>The netfilter conntrack subsystem used kernel addresses as
- user-visible IDs, which could make it easier to exploit other
- security vulnerabilities.</p></li>
-
-<li><a href="https://xenbits.xen.org/xsa/advisory-300.html">XSA-300</a>
-
- <p>Julien Grall reported that Linux does not limit the amount of memory
- which a domain will attempt to baloon out, nor limits the amount of
- "foreign / grant map" memory which any individual guest can consume,
- leading to denial of service conditions (for host or guests).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.168-1+deb9u5~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1885.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1886-2.data b/english/lts/security/2019/dla-1886-2.data
deleted file mode 100644
index 589a7897252..00000000000
--- a/english/lts/security/2019/dla-1886-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1886-2 openjdk-7</define-tag>
-<define-tag report_date>2019-8-23</define-tag>
-<define-tag secrefs>Bug#935082 Bug#750400</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1886-2.wml b/english/lts/security/2019/dla-1886-2.wml
deleted file mode 100644
index 9f63bb87fa0..00000000000
--- a/english/lts/security/2019/dla-1886-2.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The latest security update of openjdk-7 caused a regression when
-applications relied on elliptic curve algorithms to establish SSL
-connections. Several duplicate classes were removed from rt.jar by the
-upstream developers of OpenJDK because they were also present in
-sunec.jar. However Debian never shipped the SunEC security provider in
-OpenJDK 7.</p>
-
-<p>The issue was resolved by building sunec.jar and its corresponding
-native library libsunec.so from source. In order to build these
-libraries from source, an update of nss to version 2:3.26-1+debu8u6 is
-required.</p>
-
-<p>Updates for the amd64 architecture are already available, new packages
-for i386, armel and armhf will be available within the next 24 hours.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7u231-2.6.19-1~deb8u2.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1886-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1886.data b/english/lts/security/2019/dla-1886.data
deleted file mode 100644
index a1557d9592b..00000000000
--- a/english/lts/security/2019/dla-1886.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1886-1 openjdk-7</define-tag>
-<define-tag report_date>2019-8-15</define-tag>
-<define-tag secrefs>CVE-2019-2745 CVE-2019-2762 CVE-2019-2769 CVE-2019-2816</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1886.wml b/english/lts/security/2019/dla-1886.wml
deleted file mode 100644
index 56c677cc382..00000000000
--- a/english/lts/security/2019/dla-1886.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in denial of
-service, sandbox bypass, information disclosure or the execution
-of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7u231-2.6.19-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1886.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1887.data b/english/lts/security/2019/dla-1887.data
deleted file mode 100644
index fd0bd270ac2..00000000000
--- a/english/lts/security/2019/dla-1887.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1887-1 freetype</define-tag>
-<define-tag report_date>2019-8-15</define-tag>
-<define-tag secrefs>CVE-2015-9290</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1887.wml b/english/lts/security/2019/dla-1887.wml
deleted file mode 100644
index 1d3fd94d78e..00000000000
--- a/english/lts/security/2019/dla-1887.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A buffer over-read in the t1-parser of freetype, a font engine, has been
-found and fixed by checking limits more sensible.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.5.2-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1887.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1888.data b/english/lts/security/2019/dla-1888.data
deleted file mode 100644
index 1d12c42afee..00000000000
--- a/english/lts/security/2019/dla-1888.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1888-1 imagemagick</define-tag>
-<define-tag report_date>2019-08-16</define-tag>
-<define-tag secrefs>CVE-2019-12974 CVE-2019-13135 CVE-2019-13295 CVE-2019-13297 CVE-2019-13304 CVE-2019-13305 CVE-2019-13306</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1888.wml b/english/lts/security/2019/dla-1888.wml
deleted file mode 100644
index 595110c4285..00000000000
--- a/english/lts/security/2019/dla-1888.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in imagemagick, an image processing
-toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12974">CVE-2019-12974</a>
-
- <p>NULL pointer dereference in ReadPANGOImage and ReadVIDImage (coders/pango.c
- and coders/vid.c). This vulnerability might be leveraged by remote attackers
- to cause denial of service via crafted image data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13135">CVE-2019-13135</a>
-
- <p>Multiple use of uninitialized values in ReadCUTImage, UnpackWPG2Raster and
- UnpackWPGRaster (coders/wpg.c and coders/cut.c). These vulnerabilities might
- be leveraged by remote attackers to cause denial of service or unauthorized
- disclosure or modification of information via crafted image data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13295">CVE-2019-13295</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-13297">CVE-2019-13297</a>
-
- <p>Multiple heap buffer over-reads in AdaptiveThresholdImage
- (magick/threshold.c). These vulnerabilities might be leveraged by remote
- attackers to cause denial of service or unauthorized disclosure or
- modification of information via crafted image data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13304">CVE-2019-13304</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-13305">CVE-2019-13305</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-13306">CVE-2019-13306</a>
-
- <p>Multiple stack buffer overflows in WritePNMImage (coders/pnm.c), leading to
- stack buffer over write up to ten bytes. Remote attackers might leverage
- these flaws to potentially perform code execution or denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8:6.8.9.9-5+deb8u17.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1888.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1889.data b/english/lts/security/2019/dla-1889.data
deleted file mode 100644
index 21e10f795c7..00000000000
--- a/english/lts/security/2019/dla-1889.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1889-1 python3.4</define-tag>
-<define-tag report_date>2019-8-17</define-tag>
-<define-tag secrefs>CVE-2018-20852</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1889.wml b/english/lts/security/2019/dla-1889.wml
deleted file mode 100644
index 29a904e9059..00000000000
--- a/english/lts/security/2019/dla-1889.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in Python, an interactive high-level
-object-oriented language, that is relevant for cookie handling.
-By using a malicious server an attacker might steal cookies that are
-meant for other domains</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.4.2-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1889.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1890.data b/english/lts/security/2019/dla-1890.data
deleted file mode 100644
index c626577b47c..00000000000
--- a/english/lts/security/2019/dla-1890.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1890-1 kde4libs</define-tag>
-<define-tag report_date>2019-8-19</define-tag>
-<define-tag secrefs>CVE-2019-14744 Bug#934268</define-tag>
-<define-tag packages>kde4libs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1890.wml b/english/lts/security/2019/dla-1890.wml
deleted file mode 100644
index 016986fe94f..00000000000
--- a/english/lts/security/2019/dla-1890.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Dominik Penner discovered a flaw in how KConfig interpreted shell
-commands in desktop files and other configuration files. An attacker may
-trick users into installing specially crafted files which could then be
-used to execute arbitrary code, e.g. a file manager trying to find out
-the icon for a file or any application using KConfig. Thus the entire
-feature of supporting shell commands in KConfig entries has been
-removed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.14.2-5+deb8u3.</p>
-
-<p>We recommend that you upgrade your kde4libs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1890.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1891.data b/english/lts/security/2019/dla-1891.data
deleted file mode 100644
index 9629a9c0250..00000000000
--- a/english/lts/security/2019/dla-1891.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1891-1 openldap</define-tag>
-<define-tag report_date>2019-8-19</define-tag>
-<define-tag secrefs>CVE-2019-13057 CVE-2019-13565 Bug#932997 Bug#932998</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1891.wml b/english/lts/security/2019/dla-1891.wml
deleted file mode 100644
index 335469859cb..00000000000
--- a/english/lts/security/2019/dla-1891.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in openldap, a server
-and tools to provide a standalone directory service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13057">CVE-2019-13057</a>
-
- <p>When the server administrator delegates rootDN (database admin)
- privileges for certain databases but wants to maintain isolation
- (e.g., for multi-tenant deployments), slapd does not properly stop a
- rootDN from requesting authorization as an identity from another
- database during a SASL bind or with a proxyAuthz (RFC 4370) control.
- (It is not a common configuration to deploy a system where the
- server administrator and a DB administrator enjoy different levels
- of trust.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13565">CVE-2019-13565</a>
-
- <p>When using SASL authentication and session encryption, and relying
- on the SASL security layers in slapd access controls, it is possible
- to obtain access that would otherwise be denied via a simple bind
- for any identity covered in those ACLs. After the first SASL bind is
- completed, the sasl_ssf value is retained for all new non-SASL
- connections. Depending on the ACL configuration, this can affect
- different types of operations (searches, modifications, etc.). In
- other words, a successful authorization step completed by one user
- affects the authorization requirement for a different user.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.40+dfsg-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1891.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1892.data b/english/lts/security/2019/dla-1892.data
deleted file mode 100644
index a27fcb1e959..00000000000
--- a/english/lts/security/2019/dla-1892.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1892-1 flask</define-tag>
-<define-tag report_date>2019-08-20</define-tag>
-<define-tag secrefs>CVE-2018-1000656</define-tag>
-<define-tag packages>flask</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1892.wml b/english/lts/security/2019/dla-1892.wml
deleted file mode 100644
index c8f01b6add2..00000000000
--- a/english/lts/security/2019/dla-1892.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>DLA text goes here</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.10.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your flask packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1892.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1893.data b/english/lts/security/2019/dla-1893.data
deleted file mode 100644
index 3de921c1688..00000000000
--- a/english/lts/security/2019/dla-1893.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1893-1 cups</define-tag>
-<define-tag report_date>2019-8-22</define-tag>
-<define-tag secrefs>CVE-2019-8675 CVE-2019-8696</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1893.wml b/english/lts/security/2019/dla-1893.wml
deleted file mode 100644
index f69e7da68e5..00000000000
--- a/english/lts/security/2019/dla-1893.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in cups, the Common UNIX Printing System(tm).</p>
-
-<p>Basically both CVEs (<a href="https://security-tracker.debian.org/tracker/CVE-2019-8675">CVE-2019-8675</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2019-8696">CVE-2019-8696</a>) are about
-stack-buffer-overflow in two functions of libcup. One happens in
-asn1_get_type() the other one in asn1_get_packed().</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.5-11+deb8u5.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1893.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1894.data b/english/lts/security/2019/dla-1894.data
deleted file mode 100644
index 27fa3c69e00..00000000000
--- a/english/lts/security/2019/dla-1894.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1894-1 libapache2-mod-auth-openidc</define-tag>
-<define-tag report_date>2019-8-23</define-tag>
-<define-tag secrefs>CVE-2019-1010247</define-tag>
-<define-tag packages>libapache2-mod-auth-openidc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1894.wml b/english/lts/security/2019/dla-1894.wml
deleted file mode 100644
index 9b78f63906f..00000000000
--- a/english/lts/security/2019/dla-1894.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Compass Security Schweiz AG discovered an issue in
-libapache2-mod-auth-openidc, an OpenID Connect authentication module for
-Apache. The OIDCRedirectURI page contains generated JavaScript code that
-uses a poll parameter as a string variable, thus might contain additional
-JavaScript code. This might result in Criss-Site Scripting (XSS).</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.0-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-openidc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1894.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1895.data b/english/lts/security/2019/dla-1895.data
deleted file mode 100644
index 0d9384cd1f8..00000000000
--- a/english/lts/security/2019/dla-1895.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1895-1 libmspack</define-tag>
-<define-tag report_date>2019-8-23</define-tag>
-<define-tag secrefs>CVE-2019-1010305</define-tag>
-<define-tag packages>libmspack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1895.wml b/english/lts/security/2019/dla-1895.wml
deleted file mode 100644
index a44234a1f8f..00000000000
--- a/english/lts/security/2019/dla-1895.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>JsHuang found an issue in libmspack, a library for Microsoft compression
-format.
-Opening a crafted chm file might result in a buffer overflow which might
-disclose confidential information.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.5-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your libmspack packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1895.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1896.data b/english/lts/security/2019/dla-1896.data
deleted file mode 100644
index 64b9e1765aa..00000000000
--- a/english/lts/security/2019/dla-1896.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1896-1 commons-beanutils</define-tag>
-<define-tag report_date>2019-08-24</define-tag>
-<define-tag secrefs>CVE-2019-10086</define-tag>
-<define-tag packages>commons-beanutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1896.wml b/english/lts/security/2019/dla-1896.wml
deleted file mode 100644
index 13df7ac0062..00000000000
--- a/english/lts/security/2019/dla-1896.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a remote arbitrary code
-vulnerability in commons-beanutils, a set of utilities for
-manipulating JavaBeans code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10086">CVE-2019-10086</a>
-
- <p>In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.9.2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your commons-beanutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1896.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1897.data b/english/lts/security/2019/dla-1897.data
deleted file mode 100644
index 9247a1d3415..00000000000
--- a/english/lts/security/2019/dla-1897.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1897-1 tiff</define-tag>
-<define-tag report_date>2019-8-25</define-tag>
-<define-tag secrefs>CVE-2019-14973</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1897.wml b/english/lts/security/2019/dla-1897.wml
deleted file mode 100644
index c638db0d8fc..00000000000
--- a/english/lts/security/2019/dla-1897.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Even Rouault found an issue in tiff, a library providing support for the
-Tag Image File Format.
-Wrong handling off integer overflow checks, that are based on undefined
-compiler behavior, might result in an application crash.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.0.3-12.3+deb8u9.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1897.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1898.data b/english/lts/security/2019/dla-1898.data
deleted file mode 100644
index 5b74848a518..00000000000
--- a/english/lts/security/2019/dla-1898.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1898-1 xymon</define-tag>
-<define-tag report_date>2019-08-26</define-tag>
-<define-tag secrefs>CVE-2019-13273 CVE-2019-13274 CVE-2019-13451 CVE-2019-13452 CVE-2019-13455 CVE-2019-13484 CVE-2019-13485 CVE-2019-13486</define-tag>
-<define-tag packages>xymon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1898.wml b/english/lts/security/2019/dla-1898.wml
deleted file mode 100644
index 1d216f252ce..00000000000
--- a/english/lts/security/2019/dla-1898.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in xymon, the network monitoring
-application. Remote attackers might leverage these vulnerabilities in the CGI
-parsing code (including buffer overflows and XSS) to cause denial of service,
-or any other unspecified impact.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.3.17-6+deb8u2.</p>
-
-<p>We recommend that you upgrade your xymon packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1898.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1899.data b/english/lts/security/2019/dla-1899.data
deleted file mode 100644
index f47f6b1c2c4..00000000000
--- a/english/lts/security/2019/dla-1899.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1899-1 faad2</define-tag>
-<define-tag report_date>2019-08-28</define-tag>
-<define-tag secrefs>CVE-2018-19502 CVE-2018-20196 CVE-2018-20199 CVE-2018-20360 CVE-2019-6956 CVE-2019-15296 Bug#914641</define-tag>
-<define-tag packages>faad2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1899.wml b/english/lts/security/2019/dla-1899.wml
deleted file mode 100644
index b3e56d32de7..00000000000
--- a/english/lts/security/2019/dla-1899.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in faad2, the Freeware Advanced
-Audio Coder:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19502">CVE-2018-19502</a>
-
- <p>Heap buffer overflow in the function excluded_channels (libfaad/syntax.c).
- This vulnerability might allow remote attackers to cause denial of service
- via crafted MPEG AAC data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20196">CVE-2018-20196</a>
-
- <p>Stack buffer overflow in the function calculate_gain (libfaad/br_hfadj.c).
- This vulnerability might allow remote attackers to cause denial of service
- or any unspecified impact via crafted MPEG AAC data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20199">CVE-2018-20199</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-20360">CVE-2018-20360</a>
-
- <p>NULL pointer dereference in the function ifilter_bank (libfaad/filtbank.c).
- This vulnerability might allow remote attackers to cause denial of service
- via crafted MPEG AAC data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6956">CVE-2019-6956</a>
-
- <p>Global buffer overflow in the function ps_mix_phase (libfaad/ps_dec.c).
- This vulnerability might allow remote attackers to cause denial of service
- or any other unspecified impact via crafted MPEG AAC data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15296">CVE-2019-15296</a>
-
- <p>Buffer overflow in the function faad_resetbits (libfaad/bits.c). This
- vulnerability might allow remote attackers to cause denial of service via
- crafted MPEG AAC data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.7-8+deb8u3.</p>
-
-<p>We recommend that you upgrade your faad2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1899.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1900-2.data b/english/lts/security/2019/dla-1900-2.data
deleted file mode 100644
index 73e55833da8..00000000000
--- a/english/lts/security/2019/dla-1900-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1900-2 apache2</define-tag>
-<define-tag report_date>2019-9-30</define-tag>
-<define-tag secrefs>CVE-2019-10092 Bug#941202</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1900-2.wml b/english/lts/security/2019/dla-1900-2.wml
deleted file mode 100644
index c6e6afb99f2..00000000000
--- a/english/lts/security/2019/dla-1900-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of apache2 released as DLA-1900-1 contained an incomplete
-fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-10092">CVE-2019-10092</a>, a limited cross-site scripting issue affecting
-the mod_proxy error page. The old patch rather introduced a new CSRF
-protection which also caused a regression, an inability to dynamically
-change the status of members in the balancer via the balancer-manager.
-This update reverts the change and provides the correct upstream patch
-to address <a href="https://security-tracker.debian.org/tracker/CVE-2019-10092">CVE-2019-10092</a>.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.4.10-10+deb8u16.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1900-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1900.data b/english/lts/security/2019/dla-1900.data
deleted file mode 100644
index e66343de4f3..00000000000
--- a/english/lts/security/2019/dla-1900.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1900-1 apache2</define-tag>
-<define-tag report_date>2019-8-29</define-tag>
-<define-tag secrefs>CVE-2019-10092 CVE-2019-10098</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1900.wml b/english/lts/security/2019/dla-1900.wml
deleted file mode 100644
index 865390a7c6e..00000000000
--- a/english/lts/security/2019/dla-1900.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were found in the Apache HTTP server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10092">CVE-2019-10092</a>
-
- <p>Matei <q>Mal</q> Badanoiu reported a limited cross-site scripting
- vulnerability in the mod_proxy error page.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10098">CVE-2019-10098</a>
-
- <p>Yukitsugu Sasaki reported a potential open redirect vulnerability in
- the mod_rewrite module.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.10-10+deb8u15.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1900.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1901.data b/english/lts/security/2019/dla-1901.data
deleted file mode 100644
index ad7e1e1c8da..00000000000
--- a/english/lts/security/2019/dla-1901.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1901-1 dovecot</define-tag>
-<define-tag report_date>2019-08-29</define-tag>
-<define-tag secrefs>CVE-2019-11500</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1901.wml b/english/lts/security/2019/dla-1901.wml
deleted file mode 100644
index 6a421185ce5..00000000000
--- a/english/lts/security/2019/dla-1901.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Nick Roessler and Rafi Rubin discovered that the IMAP and ManageSieve
-protocol parsers in the Dovecot email server do not properly validate
-input (both pre- and post-login). A remote attacker can take advantage
-of this flaw to trigger out of bounds heap memory writes, leading to
-information leaks or potentially the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.2.13-12~deb8u7.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1901.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1902.data b/english/lts/security/2019/dla-1902.data
deleted file mode 100644
index e423dcd9440..00000000000
--- a/english/lts/security/2019/dla-1902.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1902-1 djvulibre</define-tag>
-<define-tag report_date>2019-8-29</define-tag>
-<define-tag secrefs>CVE-2019-15142 CVE-2019-15143 CVE-2019-15144 CVE-2019-15145</define-tag>
-<define-tag packages>djvulibre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1902.wml b/english/lts/security/2019/dla-1902.wml
deleted file mode 100644
index 775866341e1..00000000000
--- a/english/lts/security/2019/dla-1902.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Hongxu Chen found several issues in djvulibre, a library and set of tools
-to handle images in the DjVu format.</p>
-
-<p>The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop
-and an invalid read when working with crafted files as input.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.5.25.4-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your djvulibre packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1902.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1903.data b/english/lts/security/2019/dla-1903.data
deleted file mode 100644
index 773b6926ec7..00000000000
--- a/english/lts/security/2019/dla-1903.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1903-1 subversion</define-tag>
-<define-tag report_date>2019-08-29</define-tag>
-<define-tag secrefs>CVE-2018-11782 CVE-2019-0203</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1903.wml b/english/lts/security/2019/dla-1903.wml
deleted file mode 100644
index 22d47a0c0a9..00000000000
--- a/english/lts/security/2019/dla-1903.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in Subversion, a version control
-system. The Common Vulnerabilities and Exposures project identifies the
-following problems:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11782">CVE-2018-11782</a>
-
- <p>Ace Olszowka reported that the Subversion's svnserve server process
- may exit when a well-formed read-only request produces a particular
- answer, leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0203">CVE-2019-0203</a>
-
- <p>Tomas Bortoli reported that the Subversion's svnserve server process
- may exit when a client sends certain sequences of protocol commands.
- If the server is configured with anonymous access enabled this could
- lead to a remote unauthenticated denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.8.10-6+deb8u7.</p>
-
-<p>We recommend that you upgrade your subversion packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1903.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1904.data b/english/lts/security/2019/dla-1904.data
deleted file mode 100644
index e5070a049c1..00000000000
--- a/english/lts/security/2019/dla-1904.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1904-1 libextractor</define-tag>
-<define-tag report_date>2019-8-30</define-tag>
-<define-tag secrefs>CVE-2019-15531</define-tag>
-<define-tag packages>libextractor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1904.wml b/english/lts/security/2019/dla-1904.wml
deleted file mode 100644
index 55e6c85965d..00000000000
--- a/english/lts/security/2019/dla-1904.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>jianglin found an issue in libextractor, a library that extracts meta-data
-from files of arbitrary type.</p>
-
-<p>A crafted file could result in a heap-buffer-overflow vulnerability in
-function EXTRACTOR_dvi_extract_method in dvi_extractor.c.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.3-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your libextractor packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a>
-DLA-1904-1 (END)</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1904.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1905.data b/english/lts/security/2019/dla-1905.data
deleted file mode 100644
index c1df123243e..00000000000
--- a/english/lts/security/2019/dla-1905.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1905-1 gosa</define-tag>
-<define-tag report_date>2019-08-31</define-tag>
-<define-tag secrefs>CVE-2019-14466</define-tag>
-<define-tag packages>gosa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1905.wml b/english/lts/security/2019/dla-1905.wml
deleted file mode 100644
index c993876cff5..00000000000
--- a/english/lts/security/2019/dla-1905.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>GOsa² used unserialize to restore filter settings from a cookie. Since
-this cookie was supplied by the client, authenticated users could have
-passed arbitrary content to unserialized, which opened GOsa² up to a
-potential PHP object injection.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.4+reloaded2-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your gosa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1905.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1906.data b/english/lts/security/2019/dla-1906.data
deleted file mode 100644
index fdb56f2c321..00000000000
--- a/english/lts/security/2019/dla-1906.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1906-1 python2.7</define-tag>
-<define-tag report_date>2019-8-31</define-tag>
-<define-tag secrefs>CVE-2018-20852</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1906.wml b/english/lts/security/2019/dla-1906.wml
deleted file mode 100644
index a52c11d577f..00000000000
--- a/english/lts/security/2019/dla-1906.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in Python, an interactive high-level
-object-oriented language, that is relevant for cookie handling. By using a
-malicious server an attacker might steal cookies that are meant for other
-domains</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.9-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1906.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1907.data b/english/lts/security/2019/dla-1907.data
deleted file mode 100644
index 1fd2c96c956..00000000000
--- a/english/lts/security/2019/dla-1907.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1907-1 libav</define-tag>
-<define-tag report_date>2019-09-30</define-tag>
-<define-tag secrefs>CVE-2017-9987 CVE-2018-5766 CVE-2018-11102 CVE-2019-14372 CVE-2019-14442</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1907.wml b/english/lts/security/2019/dla-1907.wml
deleted file mode 100644
index 427a6b3ccf9..00000000000
--- a/english/lts/security/2019/dla-1907.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues have been corrected in multiple demuxers and
-decoders of the libav multimedia library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9987">CVE-2017-9987</a>
-
- <p>In Libav, there was a heap-based buffer overflow in the function
- hpel_motion in mpegvideo_motion.c. A crafted input could have lead to
- a remote denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5766">CVE-2018-5766</a>
-
- <p>In Libav there was an invalid memcpy in the av_packet_ref function of
- libavcodec/avpacket.c. Remote attackers could have leveraged this
- vulnerability to cause a denial of service (segmentation fault) via a
- crafted avi file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11102">CVE-2018-11102</a>
-
- <p>A read access violation in the mov_probe function in
- libavformat/mov.c allowed remote attackers to cause a denial of
- service (application crash), as demonstrated by avconv.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14372">CVE-2019-14372</a>
-
- <p>In Libav, there was an infinite loop in the function
- wv_read_block_header() in the file wvdec.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14442">CVE-2019-14442</a>
-
- <p>In mpc8_read_header in libavformat/mpc8.c, an input file could have
- resulted in an avio_seek infinite loop and hang, with 100% CPU
- consumption. Attackers could have leveraged this vulnerability to
- cause a denial of service via a crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u8.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1907.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1908.data b/english/lts/security/2019/dla-1908.data
deleted file mode 100644
index 7da83501ab7..00000000000
--- a/english/lts/security/2019/dla-1908.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1908-1 pump</define-tag>
-<define-tag report_date>2019-09-02</define-tag>
-<define-tag secrefs></define-tag>
-<define-tag packages>pump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1908.wml b/english/lts/security/2019/dla-1908.wml
deleted file mode 100644
index 901b9c62786..00000000000
--- a/english/lts/security/2019/dla-1908.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an arbitrary code execution vulnerability
-in the pump DHCP/BOOTP client.</p>
-
-<p>When copying the body of the server response, the ethernet packet length
-could be forged leading to being able to overwrite stack memory. Thanks to
-&lt;ltspro2@secmail.pro&gt; for the report and patch.
-(<a href="https://bugs.debian.org/933674">#933674</a>)</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.8.24-7+deb8u1.</p>
-
-<p>We recommend that you upgrade your pump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1908.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1909.data b/english/lts/security/2019/dla-1909.data
deleted file mode 100644
index d4e73bdf633..00000000000
--- a/english/lts/security/2019/dla-1909.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1909-1 freetype</define-tag>
-<define-tag report_date>2019-09-04</define-tag>
-<define-tag secrefs>CVE-2015-9381 CVE-2015-9382 CVE-2015-9383</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1909.wml b/english/lts/security/2019/dla-1909.wml
deleted file mode 100644
index 0d56c78b33b..00000000000
--- a/english/lts/security/2019/dla-1909.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several newly-referenced issues have been fixed in the FreeType 2 font
-engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9381">CVE-2015-9381</a>
-
- <p>heap-based buffer over-read in T1_Get_Private_Dict in
- type1/t1parse.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9382">CVE-2015-9382</a>
-
- <p>buffer over-read in skip_comment in psaux/psobjs.c because
- ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face
- operation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9383">CVE-2015-9383</a>
-
- <p>a heap-based buffer over-read in tt_cmap14_validate in
- sfnt/ttcmap.c</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.5.2-3+deb8u4.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1909.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1910.data b/english/lts/security/2019/dla-1910.data
deleted file mode 100644
index ca506bdc6de..00000000000
--- a/english/lts/security/2019/dla-1910.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1910-1 firefox-esr</define-tag>
-<define-tag report_date>2019-09-06</define-tag>
-<define-tag secrefs>CVE-2019-9812 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11752</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1910.wml b/english/lts/security/2019/dla-1910.wml
deleted file mode 100644
index aac4114f3a1..00000000000
--- a/english/lts/security/2019/dla-1910.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, cross-site scripting, bypass of the same-origin policy, sandbox
-escape, information disclosure or denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-60.9.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1910.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1911.data b/english/lts/security/2019/dla-1911.data
deleted file mode 100644
index a56a1b86bea..00000000000
--- a/english/lts/security/2019/dla-1911.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1911-1 exim4</define-tag>
-<define-tag report_date>2019-9-6</define-tag>
-<define-tag secrefs>CVE-2019-15846</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1911.wml b/english/lts/security/2019/dla-1911.wml
deleted file mode 100644
index 4419407930b..00000000000
--- a/english/lts/security/2019/dla-1911.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><q>Zerons</q> and Qualys discovered that a buffer overflow triggerable in the
-TLS negotiation code of the Exim mail transport agent could result in the
-execution of arbitrary code with root privileges.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.84.2-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1911.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1912.data b/english/lts/security/2019/dla-1912.data
deleted file mode 100644
index 881892c52d9..00000000000
--- a/english/lts/security/2019/dla-1912.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1912-1 expat</define-tag>
-<define-tag report_date>2019-09-06</define-tag>
-<define-tag secrefs>CVE-2019-15903</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1912.wml b/english/lts/security/2019/dla-1912.wml
deleted file mode 100644
index 0791e2fe572..00000000000
--- a/english/lts/security/2019/dla-1912.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a heap-based buffer overread
-vulnerability in expat, an XML parsing library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15903">CVE-2019-15903</a>
-
- <p>In libexpat before 2.2.8, crafted XML input could fool the parser into
- changing from DTD parsing to document parsing too early; a consecutive call
- to <tt>XML_GetCurrentLineNumber</tt> (or
- <tt>XML_GetCurrentColumnNumber</tt>) then resulted in a heap-based buffer
- over-read.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.0-6+deb8u6.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1912.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1913.data b/english/lts/security/2019/dla-1913.data
deleted file mode 100644
index 7af57848839..00000000000
--- a/english/lts/security/2019/dla-1913.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1913-1 memcached</define-tag>
-<define-tag report_date>2019-09-07</define-tag>
-<define-tag secrefs>CVE-2019-15026</define-tag>
-<define-tag packages>memcached</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1913.wml b/english/lts/security/2019/dla-1913.wml
deleted file mode 100644
index 920d9493987..00000000000
--- a/english/lts/security/2019/dla-1913.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was stack-based buffer over-read in memcached,
-the in-memory caching server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15026">CVE-2019-15026</a>
-
- <p>memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer
- over-read in <tt>conn_to_str</tt> in <tt>memcached.c</tt>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.4.21-1.1+deb8u3.</p>
-
-<p>We recommend that you upgrade your memcached packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1913.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1914.data b/english/lts/security/2019/dla-1914.data
deleted file mode 100644
index 2deb1953b3a..00000000000
--- a/english/lts/security/2019/dla-1914.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1914-1 icedtea-web</define-tag>
-<define-tag report_date>2019-9-9</define-tag>
-<define-tag secrefs>CVE-2019-10181 CVE-2019-10182 CVE-2019-10185 Bug#934319</define-tag>
-<define-tag packages>icedtea-web</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1914.wml b/english/lts/security/2019/dla-1914.wml
deleted file mode 100644
index c8890ec9b22..00000000000
--- a/english/lts/security/2019/dla-1914.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in icedtea-web, an
-implementation of the Java Network Launching Protocol (JNLP).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10181">CVE-2019-10181</a>
-
- <p>It was found that in icedtea-web executable code could be injected
- in a JAR file without compromising the signature verification. An
- attacker could use this flaw to inject code in a trusted JAR. The
- code would be executed inside the sandbox.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10182">CVE-2019-10182</a>
-
- <p>It was found that icedtea-web did not properly sanitize paths from
- &lt;jar/&gt; elements in JNLP files. An attacker could trick a victim
- into running a specially crafted application and use this flaw to
- upload arbitrary files to arbitrary locations in the context of the
- user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10185">CVE-2019-10185</a>
-
- <p>It was found that icedtea-web was vulnerable to a zip-slip attack
- during auto-extraction of a JAR file. An attacker could use this
- flaw to write files to arbitrary locations. This could also be used
- to replace the main running application and, possibly, break out of
- the sandbox.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.3-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your icedtea-web packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1914.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1915.data b/english/lts/security/2019/dla-1915.data
deleted file mode 100644
index f12695764cb..00000000000
--- a/english/lts/security/2019/dla-1915.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1915-1 ghostscript</define-tag>
-<define-tag report_date>2019-09-09</define-tag>
-<define-tag secrefs>CVE-2019-14811 CVE-2019-14812 CVE-2019-14813 CVE-2019-14817</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1915.wml b/english/lts/security/2019/dla-1915.wml
deleted file mode 100644
index f99c3393aac..00000000000
--- a/english/lts/security/2019/dla-1915.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that various procedures in Ghostscript, the GPL
-PostScript/PDF interpreter, do not properly restrict privileged calls,
-which could result in bypass of file system restrictions of the dSAFER
-sandbox.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-9.26a~dfsg-0+deb8u5.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1915.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1916.data b/english/lts/security/2019/dla-1916.data
deleted file mode 100644
index 6144168ddb7..00000000000
--- a/english/lts/security/2019/dla-1916.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1916-1 opensc</define-tag>
-<define-tag report_date>2019-9-11</define-tag>
-<define-tag secrefs>CVE-2018-16391 CVE-2018-16392 CVE-2018-16393 CVE-2018-16418 CVE-2018-16419 CVE-2018-16420 CVE-2018-16421 CVE-2018-16422 CVE-2018-16423 CVE-2018-16424 CVE-2018-16425 CVE-2018-16426 CVE-2018-16427 CVE-2019-15945 CVE-2019-15946 Bug#909444 Bug#939668 Bug#939669</define-tag>
-<define-tag packages>opensc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1916.wml b/english/lts/security/2019/dla-1916.wml
deleted file mode 100644
index da054c6853c..00000000000
--- a/english/lts/security/2019/dla-1916.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were fixed in opensc, a set of
-libraries and utilities to access smart cards that support
-cryptographic operations.</p>
-
-<p>Out-of-bounds reads, buffer overflows and double frees could be used
-by attackers able to supply crafted smart cards to cause a denial of
-service (application crash) or possibly have unspecified other impact.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.16.0-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your opensc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1916.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1917.data b/english/lts/security/2019/dla-1917.data
deleted file mode 100644
index ec61a740713..00000000000
--- a/english/lts/security/2019/dla-1917.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1917-1 curl</define-tag>
-<define-tag report_date>2019-09-12</define-tag>
-<define-tag secrefs>CVE-2019-5482</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1917.wml b/english/lts/security/2019/dla-1917.wml
deleted file mode 100644
index 42b56f4416d..00000000000
--- a/english/lts/security/2019/dla-1917.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a heap buffer overflow vulnerability
-in curl, the library and command-line tool for transferring data over the
-internet.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5482">CVE-2019-5482</a>
-
- <p>TFTP small blocksize heap buffer overflow</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.38.0-4+deb8u16.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1917.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1918.data b/english/lts/security/2019/dla-1918.data
deleted file mode 100644
index f15c790cf74..00000000000
--- a/english/lts/security/2019/dla-1918.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1918-1 libonig</define-tag>
-<define-tag report_date>2019-09-12</define-tag>
-<define-tag secrefs>CVE-2019-16163 Bug#939988</define-tag>
-<define-tag packages>libonig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1918.wml b/english/lts/security/2019/dla-1918.wml
deleted file mode 100644
index b5559498836..00000000000
--- a/english/lts/security/2019/dla-1918.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The Oniguruma regular expressions library, notably used in PHP
-mbstring, is vulnerable to stack exhaustion. A crafted regular
-expression can crash the process.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.9.5-3.2+deb8u3.</p>
-
-<p>We recommend that you upgrade your libonig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1918.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1919-2.data b/english/lts/security/2019/dla-1919-2.data
deleted file mode 100644
index 2215b16fdb7..00000000000
--- a/english/lts/security/2019/dla-1919-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1919-2 linux-4.9</define-tag>
-<define-tag report_date>2019-09-15</define-tag>
-<define-tag secrefs>CVE-2019-0136 CVE-2019-9506 CVE-2019-11487 CVE-2019-15211 CVE-2019-15212 CVE-2019-15215 CVE-2019-15216 CVE-2019-15218 CVE-2019-15219 CVE-2019-15220 CVE-2019-15221 CVE-2019-15292 CVE-2019-15538 CVE-2019-15666 CVE-2019-15807 CVE-2019-15924 CVE-2019-15926 Bug#930904</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1919-2.wml b/english/lts/security/2019/dla-1919-2.wml
deleted file mode 100644
index d0573f00b2c..00000000000
--- a/english/lts/security/2019/dla-1919-2.wml
+++ /dev/null
@@ -1,160 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<p>This updated advisory text mentions the additional non-security
-changes and notes the need to install new binary packages.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0136">CVE-2019-0136</a>
-
- <p>It was discovered that the wifi soft-MAC implementation (mac80211)
- did not properly authenticate Tunneled Direct Link Setup (TDLS)
- messages. A nearby attacker could use this for denial of service
- (loss of wifi connectivity).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9506">CVE-2019-9506</a>
-
- <p>Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen
- discovered a weakness in the Bluetooth pairing protocols, dubbed
- the <q>KNOB attack</q>. An attacker that is nearby during pairing
- could use this to weaken the encryption used between the paired
- devices, and then to eavesdrop on and/or spoof communication
- between them.</p>
-
- <p>This update mitigates the attack by requiring a minimum encryption
- key length of 56 bits.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11487">CVE-2019-11487</a>
-
- <p>Jann Horn discovered that the FUSE (Filesystem-in-Userspace)
- facility could be used to cause integer overflow in page reference
- counts, leading to a use-after-free. On a system with sufficient
- physical memory, a local user permitted to create arbitrary FUSE
- mounts could use this for privilege escalation.</p>
-
- <p>By default, unprivileged users can only mount FUSE filesystems
- through fusermount, which limits the number of mounts created and
- should completely mitigate the issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15211">CVE-2019-15211</a>
-
- <p>The syzkaller tool found a bug in the radio-raremono driver that
- could lead to a use-after-free. An attacker able to add and
- remove USB devices could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15212">CVE-2019-15212</a>
-
- <p>The syzkaller tool found that the rio500 driver does not work
- correctly if more than one device is bound to it. An attacker
- able to add USB devices could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15215">CVE-2019-15215</a>
-
- <p>The syzkaller tool found a bug in the cpia2_usb driver that leads
- to a use-after-free. An attacker able to add and remove USB
- devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15216">CVE-2019-15216</a>
-
- <p>The syzkaller tool found a bug in the yurex driver that leads to
- a use-after-free. An attacker able to add and remove USB
- devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15218">CVE-2019-15218</a>
-
- <p>The syzkaller tool found that the smsusb driver did not validate
- that USB devices have the expected endpoints, potentially leading
- to a null pointer dereference. An attacker able to add USB
- devices could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15219">CVE-2019-15219</a>
-
- <p>The syzkaller tool found that a device initialisation error in the
- sisusbvga driver could lead to a null pointer dereference. An
- attacker able to add USB devices could use this to cause a denial
- of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15220">CVE-2019-15220</a>
-
- <p>The syzkaller tool found a race condition in the p54usb driver
- which could lead to a use-after-free. An attacker able to add and
- remove USB devices could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15221">CVE-2019-15221</a>
-
- <p>The syzkaller tool found that the line6 driver did not validate
- USB devices' maximum packet sizes, which could lead to a heap
- buffer overrun. An attacker able to add USB devices could use
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15292">CVE-2019-15292</a>
-
- <p>The Hulk Robot tool found missing error checks in the Appletalk
- protocol implementation, which could lead to a use-after-free.
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15538">CVE-2019-15538</a>
-
- <p>Benjamin Moody reported that operations on XFS hung after a
- chgrp command failed due to a disk quota. A local user on a
- system using XFS and disk quotas could use this for denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15666">CVE-2019-15666</a>
-
- <p>The Hulk Robot tool found an incorrect range check in the network
- transformation (xfrm) layer, leading to out-of-bounds memory
- accesses. A local user with CAP_NET_ADMIN capability (in any user
- namespace) could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15807">CVE-2019-15807</a>
-
- <p>Jian Luo reported that the Serial Attached SCSI library (libsas)
- did not correctly handle failure to discover devices beyond a SAS
- expander. This could lead to a resource leak and crash (BUG).
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15924">CVE-2019-15924</a>
-
- <p>The Hulk Robot tool found a missing error check in the fm10k
- Ethernet driver, which could lead to a null pointer dereference
- and crash (BUG/oops). The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15926">CVE-2019-15926</a>
-
- <p>It was found that the ath6kl wifi driver did not consistently
- validate traffic class numbers in received control packets,
- leading to out-of-bounds memory accesses. A nearby attacker on
- the same wifi network could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.189-3~deb8u1. This version also includes a fix for Debian bug
-#930904, and other fixes included in upstream stable updates.</p>
-
-<p>We recommend that you upgrade your linux-4.9 and linux-latest-4.9
-packages. You will need to use "apt-get upgrade --with-new-pkgs"
-or <q>apt upgrade</q> as the binary package names have changed.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1919-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1919.data b/english/lts/security/2019/dla-1919.data
deleted file mode 100644
index f0771eb02d7..00000000000
--- a/english/lts/security/2019/dla-1919.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1919-1 linux-4.9</define-tag>
-<define-tag report_date>2019-09-14</define-tag>
-<define-tag secrefs>CVE-2019-0136 CVE-2019-9506 CVE-2019-11487 CVE-2019-15211 CVE-2019-15212 CVE-2019-15215 CVE-2019-15216 CVE-2019-15218 CVE-2019-15219 CVE-2019-15220 CVE-2019-15221 CVE-2019-15292 CVE-2019-15538 CVE-2019-15666 CVE-2019-15807 CVE-2019-15924 CVE-2019-15926 Bug#930904</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1919.wml b/english/lts/security/2019/dla-1919.wml
deleted file mode 100644
index de72d7d9569..00000000000
--- a/english/lts/security/2019/dla-1919.wml
+++ /dev/null
@@ -1,154 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0136">CVE-2019-0136</a>
-
- <p>It was discovered that the wifi soft-MAC implementation (mac80211)
- did not properly authenticate Tunneled Direct Link Setup (TDLS)
- messages. A nearby attacker could use this for denial of service
- (loss of wifi connectivity).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9506">CVE-2019-9506</a>
-
- <p>Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen
- discovered a weakness in the Bluetooth pairing protocols, dubbed
- the <q>KNOB attack</q>. An attacker that is nearby during pairing
- could use this to weaken the encryption used between the paired
- devices, and then to eavesdrop on and/or spoof communication
- between them.</p>
-
- <p>This update mitigates the attack by requiring a minimum encryption
- key length of 56 bits.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11487">CVE-2019-11487</a>
-
- <p>Jann Horn discovered that the FUSE (Filesystem-in-Userspace)
- facility could be used to cause integer overflow in page reference
- counts, leading to a use-after-free. On a system with sufficient
- physical memory, a local user permitted to create arbitrary FUSE
- mounts could use this for privilege escalation.</p>
-
- <p>By default, unprivileged users can only mount FUSE filesystems
- through fusermount, which limits the number of mounts created and
- should completely mitigate the issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15211">CVE-2019-15211</a>
-
- <p>The syzkaller tool found a bug in the radio-raremono driver that
- could lead to a use-after-free. An attacker able to add and
- remove USB devices could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15212">CVE-2019-15212</a>
-
- <p>The syzkaller tool found that the rio500 driver does not work
- correctly if more than one device is bound to it. An attacker
- able to add USB devices could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15215">CVE-2019-15215</a>
-
- <p>The syzkaller tool found a bug in the cpia2_usb driver that leads
- to a use-after-free. An attacker able to add and remove USB
- devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15216">CVE-2019-15216</a>
-
- <p>The syzkaller tool found a bug in the yurex driver that leads to
- a use-after-free. An attacker able to add and remove USB
- devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15218">CVE-2019-15218</a>
-
- <p>The syzkaller tool found that the smsusb driver did not validate
- that USB devices have the expected endpoints, potentially leading
- to a null pointer dereference. An attacker able to add USB
- devices could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15219">CVE-2019-15219</a>
-
- <p>The syzkaller tool found that a device initialisation error in the
- sisusbvga driver could lead to a null pointer dereference. An
- attacker able to add USB devices could use this to cause a denial
- of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15220">CVE-2019-15220</a>
-
- <p>The syzkaller tool found a race condition in the p54usb driver
- which could lead to a use-after-free. An attacker able to add and
- remove USB devices could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15221">CVE-2019-15221</a>
-
- <p>The syzkaller tool found that the line6 driver did not validate
- USB devices' maximum packet sizes, which could lead to a heap
- buffer overrun. An attacker able to add USB devices could use
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15292">CVE-2019-15292</a>
-
- <p>The Hulk Robot tool found missing error checks in the Appletalk
- protocol implementation, which could lead to a use-after-free.
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15538">CVE-2019-15538</a>
-
- <p>Benjamin Moody reported that operations on XFS hung after a
- chgrp command failed due to a disk quota. A local user on a
- system using XFS and disk quotas could use this for denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15666">CVE-2019-15666</a>
-
- <p>The Hulk Robot tool found an incorrect range check in the network
- transformation (xfrm) layer, leading to out-of-bounds memory
- accesses. A local user with CAP_NET_ADMIN capability (in any user
- namespace) could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15807">CVE-2019-15807</a>
-
- <p>Jian Luo reported that the Serial Attached SCSI library (libsas)
- did not correctly handle failure to discover devices beyond a SAS
- expander. This could lead to a resource leak and crash (BUG).
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15924">CVE-2019-15924</a>
-
- <p>The Hulk Robot tool found a missing error check in the fm10k
- Ethernet driver, which could lead to a null pointer dereference
- and crash (BUG/oops). The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15926">CVE-2019-15926</a>
-
- <p>It was found that the ath6kl wifi driver did not consistently
- validate traffic class numbers in received control packets,
- leading to out-of-bounds memory accesses. A nearby attacker on
- the same wifi network could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.189-3~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1919.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1920.data b/english/lts/security/2019/dla-1920.data
deleted file mode 100644
index 0a2737b64f5..00000000000
--- a/english/lts/security/2019/dla-1920.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1920-1 golang-go.crypto</define-tag>
-<define-tag report_date>2019-09-13</define-tag>
-<define-tag secrefs>CVE-2019-11841</define-tag>
-<define-tag packages>golang-go.crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1920.wml b/english/lts/security/2019/dla-1920.wml
deleted file mode 100644
index 891fff59106..00000000000
--- a/english/lts/security/2019/dla-1920.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This package ignored the value of the Hash header, which allows an
-attacker to spoof it. An attacker can not only embed arbitrary Armor
-Headers, but also prepend arbitrary text to cleartext messages
-without invalidating the signatures.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.0~hg190-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your golang-go.crypto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1920.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1921.data b/english/lts/security/2019/dla-1921.data
deleted file mode 100644
index e7268ab5461..00000000000
--- a/english/lts/security/2019/dla-1921.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1921-1 dnsmasq</define-tag>
-<define-tag report_date>2019-09-13</define-tag>
-<define-tag secrefs>CVE-2019-14513</define-tag>
-<define-tag packages>dnsmasq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1921.wml b/english/lts/security/2019/dla-1921.wml
deleted file mode 100644
index af274a663a9..00000000000
--- a/english/lts/security/2019/dla-1921.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Samuel R Lovejoy discovered a security vulnerability in dnsmasq.
-Carefully crafted packets by DNS servers might result in out of
-bounds read operations, potentially leading to a crash and denial
-of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.72-3+deb8u5.</p>
-
-<p>We recommend that you upgrade your dnsmasq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1921.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1922.data b/english/lts/security/2019/dla-1922.data
deleted file mode 100644
index 27e5337ce2b..00000000000
--- a/english/lts/security/2019/dla-1922.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1922-1 wpa</define-tag>
-<define-tag report_date>2019-9-16</define-tag>
-<define-tag secrefs>CVE-2019-16275 Bug#940080</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1922.wml b/english/lts/security/2019/dla-1922.wml
deleted file mode 100644
index 591bea4da4f..00000000000
--- a/english/lts/security/2019/dla-1922.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>hostapd (and wpa_supplicant when controlling AP mode) did not perform
-sufficient source address validation for some received Management frames
-and this could result in ending up sending a frame that caused
-associated stations to incorrectly believe they were disconnected from
-the network even if management frame protection (also known as PMF) was
-negotiated for the association. This could be considered to be a denial
-of service vulnerability since PMF is supposed to protect from this
-type of issues.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3-1+deb8u9.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1922.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1923.data b/english/lts/security/2019/dla-1923.data
deleted file mode 100644
index 511013658cc..00000000000
--- a/english/lts/security/2019/dla-1923.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1923-1 ansible</define-tag>
-<define-tag report_date>2019-09-16</define-tag>
-<define-tag secrefs>CVE-2015-3908 CVE-2015-6240 CVE-2018-10875 CVE-2019-10156 Bug#930065</define-tag>
-<define-tag packages>ansible</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1923.wml b/english/lts/security/2019/dla-1923.wml
deleted file mode 100644
index 4e2c39ab702..00000000000
--- a/english/lts/security/2019/dla-1923.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in Ansible, a configuration
-management, deployment, and task execution system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3908">CVE-2015-3908</a>
-
- <p>A potential man-in-the-middle attack associated with insusfficient
- X.509 certificate verification. Ansible did not verify that the
- server hostname matches a domain name in the subject's Common Name
- (CN) or subjectAltName field of the X.509 certificate, which allows
- man-in-the-middle attackers to spoof SSL servers via an arbitrary
- valid certificate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6240">CVE-2015-6240</a>
-
- <p>A symlink attack that allows local users to escape a restricted
- environment (chroot or jail) via a symlink attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10875">CVE-2018-10875</a>
-
- <p>A fix potential arbitrary code execution resulting from reading
- ansible.cfg from a world-writable current working directory. This
- condition now causes ansible to emit a warning and ignore the
- ansible.cfg in the world-writable current working directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10156">CVE-2019-10156</a>
-
- <p>Information disclosure through unexpected variable substitution.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.2+dfsg-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your ansible packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1923.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1924.data b/english/lts/security/2019/dla-1924.data
deleted file mode 100644
index 9677346e163..00000000000
--- a/english/lts/security/2019/dla-1924.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1924-1 python3.4</define-tag>
-<define-tag report_date>2019-09-16</define-tag>
-<define-tag secrefs>CVE-2019-16056</define-tag>
-<define-tag packages>python3.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1924.wml b/english/lts/security/2019/dla-1924.wml
deleted file mode 100644
index 135a285c755..00000000000
--- a/english/lts/security/2019/dla-1924.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in Python, an interactive high-level
-object-oriented language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16056">CVE-2019-16056</a>
-
- <p>The email module wrongly parses email addresses that contain
- multiple @ characters. An application that uses the email module and
- implements some kind of checks on the From/To headers of a message
- could be tricked into accepting an email address that should be
- denied.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.4.2-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your python3.4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1924.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1925.data b/english/lts/security/2019/dla-1925.data
deleted file mode 100644
index 924fa3b1623..00000000000
--- a/english/lts/security/2019/dla-1925.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1925-1 python2.7</define-tag>
-<define-tag report_date>2019-09-16</define-tag>
-<define-tag secrefs>CVE-2019-16056</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1925.wml b/english/lts/security/2019/dla-1925.wml
deleted file mode 100644
index 4f184dee69a..00000000000
--- a/english/lts/security/2019/dla-1925.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in Python, an interactive high-level
-object-oriented language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16056">CVE-2019-16056</a>
-
- <p>The email module wrongly parses email addresses that contain
- multiple @ characters. An application that uses the email module and
- implements some kind of checks on the From/To headers of a message
- could be tricked into accepting an email address that should be
- denied.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.7.9-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1925.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1926.data b/english/lts/security/2019/dla-1926.data
deleted file mode 100644
index 99091cfccf9..00000000000
--- a/english/lts/security/2019/dla-1926.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1926-1 thunderbird</define-tag>
-<define-tag report_date>2019-09-18</define-tag>
-<define-tag secrefs>CVE-2019-11739 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11752</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1926.wml b/english/lts/security/2019/dla-1926.wml
deleted file mode 100644
index eb15defdd0a..00000000000
--- a/english/lts/security/2019/dla-1926.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code, cross-site
-scripting, information disclosure and a covert content attack on S/MIME
-encryption using a crafted multipart/alternative message.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:60.9.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1926.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1927.data b/english/lts/security/2019/dla-1927.data
deleted file mode 100644
index 240dde21327..00000000000
--- a/english/lts/security/2019/dla-1927.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1927-1 qemu</define-tag>
-<define-tag report_date>2019-09-20</define-tag>
-<define-tag secrefs>CVE-2016-5126 CVE-2016-5403 CVE-2017-9375 CVE-2019-12068 CVE-2019-12155 CVE-2019-13164 CVE-2019-14378 CVE-2019-15890 Bug#826151 Bug#832619 Bug#864219 Bug#929353 Bug#931351 Bug#933741 Bug#933742 Bug#939868 Bug#939869</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1927.wml b/english/lts/security/2019/dla-1927.wml
deleted file mode 100644
index 13ed520eadb..00000000000
--- a/english/lts/security/2019/dla-1927.wml
+++ /dev/null
@@ -1,71 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were found in QEMU, a fast processor emulator
-(notably used in KVM and Xen HVM virtualization).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5126">CVE-2016-5126</a>
-
- <p>Heap-based buffer overflow in the iscsi_aio_ioctl function in
- block/iscsi.c in QEMU allows local guest OS users to cause a
- denial of service (QEMU process crash) or possibly execute
- arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5403">CVE-2016-5403</a>
-
- <p>The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows
- local guest OS administrators to cause a denial of service (memory
- consumption and QEMU process crash) by submitting requests without
- waiting for completion.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9375">CVE-2017-9375</a>
-
- <p>QEMU, when built with USB xHCI controller emulator support, allows
- local guest OS privileged users to cause a denial of service
- (infinite recursive call) via vectors involving control transfer
- descriptors sequencing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12068">CVE-2019-12068</a>
-
- <p>QEMU scsi disk backend: lsi: exit infinite loop while executing
- script</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12155">CVE-2019-12155</a>
-
- <p>interface_release_resource in hw/display/qxl.c in QEMU has a NULL
- pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13164">CVE-2019-13164</a>
-
- <p>qemu-bridge-helper.c in QEMU does not ensure that a network
- interface name (obtained from bridge.conf or a --br=bridge option)
- is limited to the IFNAMSIZ size, which can lead to an ACL bypass.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14378">CVE-2019-14378</a>
-
- <p>ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer
- overflow via a large packet because it mishandles a case involving
- the first fragment.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15890">CVE-2019-15890</a>
-
- <p>libslirp 4.0.0, as used in QEMU, has a use-after-free in ip_reass
- in ip_input.c.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u12.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1927.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1928.data b/english/lts/security/2019/dla-1928.data
deleted file mode 100644
index badc7920f4e..00000000000
--- a/english/lts/security/2019/dla-1928.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1928-1 php5</define-tag>
-<define-tag report_date>2019-09-20</define-tag>
-<define-tag secrefs>Bug#805222</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1928.wml b/english/lts/security/2019/dla-1928.wml
deleted file mode 100644
index 516e115a6e3..00000000000
--- a/english/lts/security/2019/dla-1928.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An update has been made to php5, a server-side, HTML-embedded scripting
-language. Specficially, as reported in #805222, the ability to build
-extensions in certain older versions of PHP within Debian has been
-hindered by an upstream change which first appeared in PHP 5.6.15. This
-update applies a fix which restores the ability to build PHP extensions
-for Debian 8 <q>jessie</q> so that a forthcoming PECL extension update can be
-built and released.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.6.40+dfsg-0+deb8u6.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1928.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1929.data b/english/lts/security/2019/dla-1929.data
deleted file mode 100644
index 0701c6e98ca..00000000000
--- a/english/lts/security/2019/dla-1929.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1929-1 php-pecl-http</define-tag>
-<define-tag report_date>2019-09-20</define-tag>
-<define-tag secrefs>CVE-2016-7398</define-tag>
-<define-tag packages>php-pecl-http</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1929.wml b/english/lts/security/2019/dla-1929.wml
deleted file mode 100644
index 25d7c4f41fb..00000000000
--- a/english/lts/security/2019/dla-1929.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in php-pecl-http, the pecl_http
-module for PHP 5 Extended HTTP Support. A type confusion vulnerability
-in the merge_param() function allows attackers to crash PHP and possibly
-execute arbitrary code via crafted HTTP requests.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.4-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-pecl-http packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1929.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1930.data b/english/lts/security/2019/dla-1930.data
deleted file mode 100644
index f0d436ecaa9..00000000000
--- a/english/lts/security/2019/dla-1930.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1930-1 linux</define-tag>
-<define-tag report_date>2019-09-25</define-tag>
-<define-tag secrefs>CVE-2016-10905 CVE-2018-20976 CVE-2018-21008 CVE-2019-0136 CVE-2019-9506 CVE-2019-14814 CVE-2019-14815 CVE-2019-14816 CVE-2019-14821 CVE-2019-14835 CVE-2019-15117 CVE-2019-15118 CVE-2019-15211 CVE-2019-15212 CVE-2019-15215 CVE-2019-15218 CVE-2019-15219 CVE-2019-15220 CVE-2019-15221 CVE-2019-15292 CVE-2019-15807 CVE-2019-15917 CVE-2019-15926</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1930.wml b/english/lts/security/2019/dla-1930.wml
deleted file mode 100644
index 09aa6b19b7a..00000000000
--- a/english/lts/security/2019/dla-1930.wml
+++ /dev/null
@@ -1,179 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10905">CVE-2016-10905</a>
-
- <p>A race condition was discovered in the GFS2 file-system
- implementation, which could lead to a use-after-free. On a system
- using GFS2, a local attacker could use this for denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20976">CVE-2018-20976</a>
-
- <p>It was discovered that the XFS file-system implementation did not
- correctly handle some mount failure conditions, which could lead
- to a use-after-free. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-21008">CVE-2018-21008</a>
-
- <p>It was discovered that the rsi wifi driver did not correctly
- handle some failure conditions, which could lead to a use-after-free.
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0136">CVE-2019-0136</a>
-
- <p>It was discovered that the wifi soft-MAC implementation (mac80211)
- did not properly authenticate Tunneled Direct Link Setup (TDLS)
- messages. A nearby attacker could use this for denial of service
- (loss of wifi connectivity).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9506">CVE-2019-9506</a>
-
- <p>Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen
- discovered a weakness in the Bluetooth pairing protocols, dubbed
- the <q>KNOB attack</q>. An attacker that is nearby during pairing
- could use this to weaken the encryption used between the paired
- devices, and then to eavesdrop on and/or spoof communication
- between them.</p>
-
- <p>This update mitigates the attack by requiring a minimum encryption
- key length of 56 bits.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14814">CVE-2019-14814</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14815">CVE-2019-14815</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14816">CVE-2019-14816</a>
-
- <p>Multiple bugs were discovered in the mwifiex wifi driver, which
- could lead to heap buffer overflows. A local user permitted to
- configure a device handled by this driver could probably use this
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14821">CVE-2019-14821</a>
-
- <p>Matt Delco reported a race condition in KVM's coalesced MMIO
- facility, which could lead to out-of-bounds access in the kernel.
- A local attacker permitted to access /dev/kvm could use this to
- cause a denial of service (memory corruption or crash) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14835">CVE-2019-14835</a>
-
- <p>Peter Pi of Tencent Blade Team discovered a missing bounds check
- in vhost_net, the network back-end driver for KVM hosts, leading
- to a buffer overflow when the host begins live migration of a VM.
- An attacker in control of a VM could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15117">CVE-2019-15117</a>
-
- <p>Hui Peng and Mathias Payer reported a missing bounds check in the
- usb-audio driver's descriptor parsing code, leading to a buffer
- over-read. An attacker able to add USB devices could possibly use
- this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15118">CVE-2019-15118</a>
-
- <p>Hui Peng and Mathias Payer reported unbounded recursion in the
- usb-audio driver's descriptor parsing code, leading to a stack
- overflow. An attacker able to add USB devices could use this to
- cause a denial of service (memory corruption or crash) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15211">CVE-2019-15211</a>
-
- <p>The syzkaller tool found a bug in the radio-raremono driver that
- could lead to a use-after-free. An attacker able to add and
- remove USB devices could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15212">CVE-2019-15212</a>
-
- <p>The syzkaller tool found that the rio500 driver does not work
- correctly if more than one device is bound to it. An attacker
- able to add USB devices could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15215">CVE-2019-15215</a>
-
- <p>The syzkaller tool found a bug in the cpia2_usb driver that leads
- to a use-after-free. An attacker able to add and remove USB
- devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15218">CVE-2019-15218</a>
-
- <p>The syzkaller tool found that the smsusb driver did not validate
- that USB devices have the expected endpoints, potentially leading
- to a null pointer dereference. An attacker able to add USB
- devices could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15219">CVE-2019-15219</a>
-
- <p>The syzkaller tool found that a device initialisation error in the
- sisusbvga driver could lead to a null pointer dereference. An
- attacker able to add USB devices could use this to cause a denial
- of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15220">CVE-2019-15220</a>
-
- <p>The syzkaller tool found a race condition in the p54usb driver
- which could lead to a use-after-free. An attacker able to add and
- remove USB devices could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15221">CVE-2019-15221</a>
-
- <p>The syzkaller tool found that the line6 driver did not validate
- USB devices' maximum packet sizes, which could lead to a heap
- buffer overrun. An attacker able to add USB devices could use
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15292">CVE-2019-15292</a>
-
- <p>The Hulk Robot tool found missing error checks in the Appletalk
- protocol implementation, which could lead to a use-after-free.
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15807">CVE-2019-15807</a>
-
- <p>Jian Luo reported that the Serial Attached SCSI library (libsas)
- did not correctly handle failure to discover devices beyond a SAS
- expander. This could lead to a resource leak and crash (BUG).
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15917">CVE-2019-15917</a>
-
- <p>The syzkaller tool found a race condition in code supporting
- UART-attached Bluetooth adapters, which could lead to a use after-free. A local user with access to a pty device or other
- suitable tty device could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15926">CVE-2019-15926</a>
-
- <p>It was found that the ath6kl wifi driver did not consistently
- validate traffic class numbers in received control packets,
- leading to out-of-bounds memory accesses. A nearby attacker on
- the same wifi network could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.74-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1930.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1931.data b/english/lts/security/2019/dla-1931.data
deleted file mode 100644
index 61378377100..00000000000
--- a/english/lts/security/2019/dla-1931.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1931-1 libgcrypt20</define-tag>
-<define-tag report_date>2019-09-24</define-tag>
-<define-tag secrefs>CVE-2019-13627</define-tag>
-<define-tag packages>libgcrypt20</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1931.wml b/english/lts/security/2019/dla-1931.wml
deleted file mode 100644
index f3577429b19..00000000000
--- a/english/lts/security/2019/dla-1931.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">CVE-2019-13627</a>
-
- <p>ECDSA timing attack</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.6.3-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your libgcrypt20 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1931.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1932.data b/english/lts/security/2019/dla-1932.data
deleted file mode 100644
index c2e05230123..00000000000
--- a/english/lts/security/2019/dla-1932.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1932-1 openssl</define-tag>
-<define-tag report_date>2019-9-25</define-tag>
-<define-tag secrefs>CVE-2019-1547 CVE-2019-1563</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1932.wml b/english/lts/security/2019/dla-1932.wml
deleted file mode 100644
index b5e345ba42e..00000000000
--- a/english/lts/security/2019/dla-1932.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were found in OpenSSL, the Secure Sockets
-Layer toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1547">CVE-2019-1547</a>
-
- <p>Normally in OpenSSL EC groups always have a co-factor present and
- this is used in side channel resistant code paths. However, in some
- cases, it is possible to construct a group using explicit parameters
- (instead of using a named curve). In those cases it is possible that
- such a group does not have the cofactor present. This can occur even
- where all the parameters match a known named curve. If such a curve
- is used then OpenSSL falls back to non-side channel resistant code
- paths which may result in full key recovery during an ECDSA
- signature operation. In order to be vulnerable an attacker
- would have to have the ability to time the creation of a large
- number of signatures where explicit parameters with no co-factor
- present are in use by an application using libcrypto. For the
- avoidance of doubt libssl is not vulnerable because explicit
- parameters are never used.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1563">CVE-2019-1563</a>
-
- <p>In situations where an attacker receives automated notification of
- the success or failure of a decryption attempt an attacker, after
- sending a very large number of messages to be decrypted, can recover
- a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted
- message that was encrypted with the public RSA key, using a
- Bleichenbacher padding oracle attack. Applications are not affected
- if they use a certificate together with the private RSA key to the
- CMS_decrypt or PKCS7_decrypt functions to select the correct
- recipient info to decrypt.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.1t-1+deb8u12.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1932.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1933.data b/english/lts/security/2019/dla-1933.data
deleted file mode 100644
index 932addd2169..00000000000
--- a/english/lts/security/2019/dla-1933.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1933-1 ruby-nokogiri</define-tag>
-<define-tag report_date>2019-09-26</define-tag>
-<define-tag secrefs>CVE-2019-5477</define-tag>
-<define-tag packages>ruby-nokogiri</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1933.wml b/english/lts/security/2019/dla-1933.wml
deleted file mode 100644
index 2e234205630..00000000000
--- a/english/lts/security/2019/dla-1933.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A command injection vulnerability in Nokogiri allows commands to be executed in
-a subprocess by Ruby's `Kernel.open` method.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.3.1+ds-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-nokogiri packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1933.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1934.data b/english/lts/security/2019/dla-1934.data
deleted file mode 100644
index f7139cc814c..00000000000
--- a/english/lts/security/2019/dla-1934.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1934-1 cimg</define-tag>
-<define-tag report_date>2019-9-28</define-tag>
-<define-tag secrefs>CVE-2018-7588 CVE-2018-7589 CVE-2018-7637 CVE-2018-7638 CVE-2018-7639 CVE-2018-7640 CVE-2018-7641 CVE-2019-1010174</define-tag>
-<define-tag packages>cimg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1934.wml b/english/lts/security/2019/dla-1934.wml
deleted file mode 100644
index caa791b7fee..00000000000
--- a/english/lts/security/2019/dla-1934.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in cimg, a powerful image processing
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010174">CVE-2019-1010174</a>
-
-<p>is related to a missing string sanitization on URLs,
-which might result in a command injection when loading a special crafted
-image.</p>
-
-<p>The other CVEs are about heap-based buffer over-reads or double frees when
-loading an image.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.9+dfsg-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your cimg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1934.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1935.data b/english/lts/security/2019/dla-1935.data
deleted file mode 100644
index 9d38b98dbd6..00000000000
--- a/english/lts/security/2019/dla-1935.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1935-1 e2fsprogs</define-tag>
-<define-tag report_date>2019-9-28</define-tag>
-<define-tag secrefs>CVE-2019-5094</define-tag>
-<define-tag packages>e2fsprogs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1935.wml b/english/lts/security/2019/dla-1935.wml
deleted file mode 100644
index d1820b9a316..00000000000
--- a/english/lts/security/2019/dla-1935.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Lilith of Cisco Talos discovered a buffer overflow flaw in the quota
-code used by e2fsck from the ext2/ext3/ext4 file system utilities.
-Running e2fsck on a malformed file system can result in the execution of
-arbitrary code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.42.12-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your e2fsprogs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1935.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1936.data b/english/lts/security/2019/dla-1936.data
deleted file mode 100644
index c9540e21806..00000000000
--- a/english/lts/security/2019/dla-1936.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1936-1 cups</define-tag>
-<define-tag report_date>2019-9-28</define-tag>
-<define-tag secrefs>CVE-2018-4300</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1936.wml b/english/lts/security/2019/dla-1936.wml
deleted file mode 100644
index c28829a4afd..00000000000
--- a/english/lts/security/2019/dla-1936.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in cups, the Common UNIX Printing System(tm).</p>
-
-<p>While generating a session cookie for the CUPS web interface, a
-predictable random number seed was used. This could lead to unauthorized
-scripted access to the enabled web interface.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>,
-this problem has been fixed in version 1.7.5-11+deb8u6.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1936.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1937.data b/english/lts/security/2019/dla-1937.data
deleted file mode 100644
index 8f0b51eef65..00000000000
--- a/english/lts/security/2019/dla-1937.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1937-1 httpie</define-tag>
-<define-tag report_date>2019-09-30</define-tag>
-<define-tag secrefs>CVE-2019-10751 Bug#940058</define-tag>
-<define-tag packages>httpie</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1937.wml b/english/lts/security/2019/dla-1937.wml
deleted file mode 100644
index 90ba2d5564e..00000000000
--- a/english/lts/security/2019/dla-1937.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An open redirect, that allows an attacker to write an arbitrary file with
-supplied filename and content to the current directory, by redirecting a
-request from HTTP to a crafted URL pointing to a server in his or hers control,
-was found and reported in <a href="https://security-tracker.debian.org/tracker/CVE-2019-10751">CVE-2019-10751</a>.
-This was patched upstream and so when `--download` without `--output` results
-in a redirect, now only the initial URL is considered, not the final one.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.8.0-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your httpie packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1937.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1938.data b/english/lts/security/2019/dla-1938.data
deleted file mode 100644
index f7731741db9..00000000000
--- a/english/lts/security/2019/dla-1938.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1938-1 file-roller</define-tag>
-<define-tag report_date>2019-10-01</define-tag>
-<define-tag secrefs>CVE-2019-16680</define-tag>
-<define-tag packages>file-roller</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1938.wml b/english/lts/security/2019/dla-1938.wml
deleted file mode 100644
index e5cc15e3bc9..00000000000
--- a/english/lts/security/2019/dla-1938.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue was discovered in GNOME file-roller before 3.29.91. It allows a single
-./../ path traversal via a filename contained in a TAR archive, possibly
-overwriting a file during extraction.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.14.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your file-roller packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1938.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1939.data b/english/lts/security/2019/dla-1939.data
deleted file mode 100644
index 83c33e45d13..00000000000
--- a/english/lts/security/2019/dla-1939.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1939-1 poppler</define-tag>
-<define-tag report_date>2019-9-30</define-tag>
-<define-tag secrefs>CVE-2018-20650 CVE-2018-21009 CVE-2019-12493</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1939.wml b/english/lts/security/2019/dla-1939.wml
deleted file mode 100644
index 2445aab01f9..00000000000
--- a/english/lts/security/2019/dla-1939.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues in poppler, a PDF rendering library, have been fixed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20650">CVE-2018-20650</a>
-
- <p>A missing check for the dict data type could lead to a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-21009">CVE-2018-21009</a>
-
- <p>An integer overflow might happen in Parser::makeStream.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12493">CVE-2019-12493</a>
-
- <p>A stack-based buffer over-read by a crafted PDF file might happen in
- PostScriptFunction::transform because some functions mishandle tint
- transformation.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.26.5-2+deb8u11.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1939.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1940.data b/english/lts/security/2019/dla-1940.data
deleted file mode 100644
index 749b98bb0e5..00000000000
--- a/english/lts/security/2019/dla-1940.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1940-1 linux-4.9</define-tag>
-<define-tag report_date>2019-10-01</define-tag>
-<define-tag secrefs>CVE-2019-14821 CVE-2019-14835 CVE-2019-15117 CVE-2019-15118 CVE-2019-15902</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1940.wml b/english/lts/security/2019/dla-1940.wml
deleted file mode 100644
index af46892d709..00000000000
--- a/english/lts/security/2019/dla-1940.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14821">CVE-2019-14821</a>
-
- <p>Matt Delco reported a race condition in KVM's coalesced MMIO
- facility, which could lead to out-of-bounds access in the kernel.
- A local attacker permitted to access /dev/kvm could use this to
- cause a denial of service (memory corruption or crash) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14835">CVE-2019-14835</a>
-
- <p>Peter Pi of Tencent Blade Team discovered a missing bounds check
- in vhost_net, the network back-end driver for KVM hosts, leading
- to a buffer overflow when the host begins live migration of a VM.
- An attacker in control of a VM could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15117">CVE-2019-15117</a>
-
- <p>Hui Peng and Mathias Payer reported a missing bounds check in the
- usb-audio driver's descriptor parsing code, leading to a buffer
- over-read. An attacker able to add USB devices could possibly use
- this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15118">CVE-2019-15118</a>
-
- <p>Hui Peng and Mathias Payer reported unbounded recursion in the
- usb-audio driver's descriptor parsing code, leading to a stack
- overflow. An attacker able to add USB devices could use this to
- cause a denial of service (memory corruption or crash) or possibly
- for privilege escalation. On the amd64 architecture this is
- mitigated by a guard page on the kernel stack, so that it is only
- possible to cause a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15902">CVE-2019-15902</a>
-
- <p>Brad Spengler reported that a backporting error reintroduced a
- spectre-v1 vulnerability in the ptrace subsystem in the
- ptrace_get_debugreg() function.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.189-3+deb9u1~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1940.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1941.data b/english/lts/security/2019/dla-1941.data
deleted file mode 100644
index 2a998e41a2d..00000000000
--- a/english/lts/security/2019/dla-1941.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1941-1 netty</define-tag>
-<define-tag report_date>2019-09-30</define-tag>
-<define-tag secrefs>CVE-2019-16869</define-tag>
-<define-tag packages>netty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1941.wml b/english/lts/security/2019/dla-1941.wml
deleted file mode 100644
index febd5ad1573..00000000000
--- a/english/lts/security/2019/dla-1941.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Netty mishandled whitespace before the colon in HTTP headers (such as a
-“Transfer-Encoding : chunked†line), which lead to HTTP request
-smuggling.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:3.2.6.Final-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your netty packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1941.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1942-2.data b/english/lts/security/2019/dla-1942-2.data
deleted file mode 100644
index f1f9058a5b4..00000000000
--- a/english/lts/security/2019/dla-1942-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1942-2 phpbb3</define-tag>
-<define-tag report_date>2019-12-22</define-tag>
-<define-tag secrefs>CVE-2019-13776 CVE-2019-16993</define-tag>
-<define-tag packages>phpbb3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1942-2.wml b/english/lts/security/2019/dla-1942-2.wml
deleted file mode 100644
index 0b0b237f9da..00000000000
--- a/english/lts/security/2019/dla-1942-2.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This is a follow-up to DLA-1942-1.</p>
-
-<p>There was some confusion about the correct
-fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-13776">CVE-2019-13776</a>.</p>
-
-<p>The correct announcement for this DLA should have been:</p>
-
-<p>Package : phpbb3
-Version : 3.0.12-5+deb8u4
-CVE ID : <a href="https://security-tracker.debian.org/tracker/CVE-2019-13776">CVE-2019-13776</a> <a href="https://security-tracker.debian.org/tracker/CVE-2019-16993">CVE-2019-16993</a></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16993">CVE-2019-16993</a>
-
- <p>In phpBB, includes/acp/acp_bbcodes.php had improper verification of a
- CSRF token on the BBCode page in the Administration Control Panel. An
- actual CSRF attack was possible if an attacker also managed to retrieve
- the session id of a reauthenticated administrator prior to targeting
- them.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13776">CVE-2019-13776</a>
-
- <p>phpBB allowed the stealing of an Administration Control Panel session id
- by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking
- lead to stored XSS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.0.12-5+deb8u4.</p>
-
-<p>We recommend that you upgrade your phpbb3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1942-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1942.data b/english/lts/security/2019/dla-1942.data
deleted file mode 100644
index 20809e49ee3..00000000000
--- a/english/lts/security/2019/dla-1942.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1942-1 phpbb3</define-tag>
-<define-tag report_date>2019-10-06</define-tag>
-<define-tag secrefs>CVE-2019-13776 CVE-2019-16993</define-tag>
-<define-tag packages>phpbb3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1942.wml b/english/lts/security/2019/dla-1942.wml
deleted file mode 100644
index a25d4915377..00000000000
--- a/english/lts/security/2019/dla-1942.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16993">CVE-2019-16993</a>
-
- <p>In phpBB, includes/acp/acp_bbcodes.php had improper verification of a
- CSRF token on the BBCode page in the Administration Control Panel. An
- actual CSRF attack was possible if an attacker also managed to retrieve
- the session id of a reauthenticated administrator prior to targeting
- them.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13776">CVE-2019-13776</a>
-
- <p>phpBB allowed the stealing of an Administration Control Panel session id
- by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking
- lead to stored XSS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.0.12-5+deb8u4.</p>
-
-<p>We recommend that you upgrade your phpbb3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1942.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1943.data b/english/lts/security/2019/dla-1943.data
deleted file mode 100644
index 628b6aebeb1..00000000000
--- a/english/lts/security/2019/dla-1943.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1943-1 jackson-databind</define-tag>
-<define-tag report_date>2019-10-3</define-tag>
-<define-tag secrefs>CVE-2019-14540 CVE-2019-16335 CVE-2019-16942 CVE-2019-16943 Bug#940498 Bug#941530</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1943.wml b/english/lts/security/2019/dla-1943.wml
deleted file mode 100644
index 0092b110eb7..00000000000
--- a/english/lts/security/2019/dla-1943.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>More deserialization flaws were discovered in jackson-databind
-relating to the classes in com.zaxxer.hikari.HikariConfig,
-com.zaxxer.hikari.HikariDataSource, commons-dbcp and
-com.p6spy.engine.spy.P6DataSource, which could allow an
-unauthenticated user to perform remote code execution. The issue was
-resolved by extending the blacklist and blocking more classes from
-polymorphic deserialization.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1943.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1944.data b/english/lts/security/2019/dla-1944.data
deleted file mode 100644
index 5dd891c1330..00000000000
--- a/english/lts/security/2019/dla-1944.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1944-1 libapreq2</define-tag>
-<define-tag report_date>2019-10-03</define-tag>
-<define-tag secrefs>CVE-2019-12412</define-tag>
-<define-tag packages>libapreq2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1944.wml b/english/lts/security/2019/dla-1944.wml
deleted file mode 100644
index a15b236c3ce..00000000000
--- a/english/lts/security/2019/dla-1944.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was remotely-exploitable null pointer
-dereference in libapreq2, a library for manipulating HTTP requests</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12412">CVE-2019-12412</a>
-
- <p>Remotely exploitable null pointer dereference bug</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.13-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your libapreq2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1944.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1945.data b/english/lts/security/2019/dla-1945.data
deleted file mode 100644
index 980ca311c50..00000000000
--- a/english/lts/security/2019/dla-1945.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1945-1 openconnect</define-tag>
-<define-tag report_date>2019-10-03</define-tag>
-<define-tag secrefs>CVE-2019-16239 Bug#940871</define-tag>
-<define-tag packages>openconnect</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1945.wml b/english/lts/security/2019/dla-1945.wml
deleted file mode 100644
index 8908fd9798c..00000000000
--- a/english/lts/security/2019/dla-1945.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered by Lukas Kupczyk of the Advanced Research
-Team at CrowdStrike Intelligence in OpenConnect, an open client for
-Cisco AnyConnect, Pulse, GlobalProtect VPN. A malicious HTTP server
-(after its identity certificate has been accepted) can provide bogus
-chunk lengths for chunked HTTP encoding and cause a heap overflow.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.00-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your openconnect packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1945.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1946.data b/english/lts/security/2019/dla-1946.data
deleted file mode 100644
index 14e07179015..00000000000
--- a/english/lts/security/2019/dla-1946.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1946-1 novnc</define-tag>
-<define-tag report_date>2019-10-05</define-tag>
-<define-tag secrefs>CVE-2017-18635</define-tag>
-<define-tag packages>novnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1946.wml b/english/lts/security/2019/dla-1946.wml
deleted file mode 100644
index df2e3834a2d..00000000000
--- a/english/lts/security/2019/dla-1946.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An XSS vulnerability was discovered in noVNC in which the remote VNC
-server could inject arbitrary HTML into the noVNC web page via the
-messages propagated to the status field, such as the VNC server name.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:0.4+dfsg+1+20131010+gitf68af8af3d-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your novnc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1946.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1947.data b/english/lts/security/2019/dla-1947.data
deleted file mode 100644
index 959074c584b..00000000000
--- a/english/lts/security/2019/dla-1947.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1947-1 libreoffice</define-tag>
-<define-tag report_date>2019-10-06</define-tag>
-<define-tag secrefs>CVE-2019-9848 CVE-2019-9849 CVE-2019-9850 CVE-2019-9851 CVE-2019-9852 CVE-2019-9853 CVE-2019-9854</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1947.wml b/english/lts/security/2019/dla-1947.wml
deleted file mode 100644
index 95ab113ea30..00000000000
--- a/english/lts/security/2019/dla-1947.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in LibreOffice, the office
-productivity suite.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9848">CVE-2019-9848</a>
-
- <p>Nils Emmerich discovered that malicious documents could execute
- arbitrary Python code via LibreLogo.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9849">CVE-2019-9849</a>
-
- <p>Matei Badanoiu discovered that the stealth mode did not apply to
- bullet graphics.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9850">CVE-2019-9850</a>
-
- <p>It was discovered that the protections implemented in <a href="https://security-tracker.debian.org/tracker/CVE-2019-9848">CVE-2019-9848</a>
- could be bypassed because of insufficient URL validation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9851">CVE-2019-9851</a>
-
- <p>Gabriel Masei discovered that malicious documents could execute
- arbitrary pre-installed scripts.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9852">CVE-2019-9852</a>
-
- <p>Nils Emmerich discovered that the protection implemented to address
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-16858">CVE-2018-16858</a> could be bypassed by a URL encoding attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9853">CVE-2019-9853</a>
-
- <p>Nils Emmerich discovered that malicious documents could bypass
- document security settings to execute macros contained within the
- document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9854">CVE-2019-9854</a>
-
- <p>It was discovered that the protection implemented to address
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-9852">CVE-2019-9852</a> could be bypassed because of insufficient input
- sanitization.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:4.3.3-2+deb8u13.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1947.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1948.data b/english/lts/security/2019/dla-1948.data
deleted file mode 100644
index 3d60aa4111f..00000000000
--- a/english/lts/security/2019/dla-1948.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1948-1 ruby-mini-magick</define-tag>
-<define-tag report_date>2019-10-07</define-tag>
-<define-tag secrefs>CVE-2019-13574 Bug#931932</define-tag>
-<define-tag packages>ruby-mini-magick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1948.wml b/english/lts/security/2019/dla-1948.wml
deleted file mode 100644
index ef1275e3dfc..00000000000
--- a/english/lts/security/2019/dla-1948.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In lib/mini_magick/image.rb in ruby-mini-magick, a fetched remote
-image filename could cause remote command execution because Image.open input
-is directly passed to Kernel#open, which accepts a '|' character followed by
-a command.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.8.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-mini-magick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1948.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1949.data b/english/lts/security/2019/dla-1949.data
deleted file mode 100644
index fa15e5c051e..00000000000
--- a/english/lts/security/2019/dla-1949.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1949-1 xen</define-tag>
-<define-tag report_date>2019-10-8</define-tag>
-<define-tag secrefs>CVE-2018-19961 CVE-2018-19962 CVE-2018-19966</define-tag>
-<define-tag packages>xen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1949.wml b/english/lts/security/2019/dla-1949.wml
deleted file mode 100644
index 8659864cfa0..00000000000
--- a/english/lts/security/2019/dla-1949.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in the Xen hypervisor, which
-could result in denial of service, informations leaks or privilege
-escalation.
-
-For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.4.4lts5-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your xen packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1949.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1950.data b/english/lts/security/2019/dla-1950.data
deleted file mode 100644
index 9657b773184..00000000000
--- a/english/lts/security/2019/dla-1950.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1950-1 openjpeg2</define-tag>
-<define-tag report_date>2019-10-08</define-tag>
-<define-tag secrefs>CVE-2018-21010 Bug#939553</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1950.wml b/english/lts/security/2019/dla-1950.wml
deleted file mode 100644
index c64db9dc230..00000000000
--- a/english/lts/security/2019/dla-1950.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap buffer overflow vulnerability was discovered in openjpeg2, the
-open-source JPEG 2000 codec. This vulnerability is caused by insufficient
-validation of width and height of image components in color_apply_icc_profile
-(src/bin/common/color.c).</p>
-<p>Remote attackers might leverage this vulnerability
-via a crafted JP2 file, leading to denial of service (application crash) or any
-other undefined behavior.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1950.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1951.data b/english/lts/security/2019/dla-1951.data
deleted file mode 100644
index b4d8e1b0112..00000000000
--- a/english/lts/security/2019/dla-1951.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1951-1 libtomcrypt</define-tag>
-<define-tag report_date>2019-10-09</define-tag>
-<define-tag secrefs>CVE-2019-17362</define-tag>
-<define-tag packages>libtomcrypt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1951.wml b/english/lts/security/2019/dla-1951.wml
deleted file mode 100644
index f578e46a9ab..00000000000
--- a/english/lts/security/2019/dla-1951.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial of service vulnerability
-in the libtomcrypt cryptographic library.</p>
-
-<p>An out-of-bounds read and crash could occur via carefully-crafted
-"DER" encoded data (eg. by importing an X.509 certificate).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17362">CVE-2019-17362</a>
-
- <p>In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.17-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your libtomcrypt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1951.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1952.data b/english/lts/security/2019/dla-1952.data
deleted file mode 100644
index b6650b9dd42..00000000000
--- a/english/lts/security/2019/dla-1952.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1952-1 rsyslog</define-tag>
-<define-tag report_date>2019-10-09</define-tag>
-<define-tag secrefs>CVE-2019-17041 CVE-2019-17042</define-tag>
-<define-tag packages>rsyslog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1952.wml b/english/lts/security/2019/dla-1952.wml
deleted file mode 100644
index a2a835336e3..00000000000
--- a/english/lts/security/2019/dla-1952.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two vulnerabilities in the rsyslog
-system/kernel logging daemon in the parsers for AIX and Cisco log
-messages respectfully.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17041">CVE-2019-17041</a>
-
- <p>An issue was discovered in Rsyslog v8.1908.0.
- contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the
- parser for AIX log messages. The parser tries to locate a log message
- delimiter (in this case, a space or a colon) but fails to account for
- strings that do not satisfy this constraint. If the string does not match,
- then the variable lenMsg will reach the value zero and will skip the sanity
- check that detects invalid log messages. The message will then be
- considered valid, and the parser will eat up the nonexistent colon
- delimiter. In doing so, it will decrement lenMsg, a signed integer, whose
- value was zero and now becomes minus one. The following step in the parser
- is to shift left the contents of the message. To do this, it will call
- memmove with the right pointers to the target and destination strings, but
- the lenMsg will now be interpreted as a huge value, causing a heap
- overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17042">CVE-2019-17042</a>
-
- <p>An issue was discovered in Rsyslog v8.1908.0.
- contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for
- Cisco log messages. The parser tries to locate a log message delimiter (in
- this case, a space or a colon), but fails to account for strings that do
- not satisfy this constraint. If the string does not match, then the
- variable lenMsg will reach the value zero and will skip the sanity check
- that detects invalid log messages. The message will then be considered
- valid, and the parser will eat up the nonexistent colon delimiter. In doing
- so, it will decrement lenMsg, a signed integer, whose value was zero and
- now becomes minus one. The following step in the parser is to shift left
- the contents of the message. To do this, it will call memmove with the
- right pointers to the target and destination strings, but the lenMsg will
- now be interpreted as a huge value, causing a heap overflow.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8.4.2-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your rsyslog packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1952.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1953-2.data b/english/lts/security/2019/dla-1953-2.data
deleted file mode 100644
index 62d269bb349..00000000000
--- a/english/lts/security/2019/dla-1953-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1953-2 clamav</define-tag>
-<define-tag report_date>2019-10-14</define-tag>
-<define-tag secrefs>CVE-2019-12625 CVE-2019-12900 Bug#942172</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1953-2.wml b/english/lts/security/2019/dla-1953-2.wml
deleted file mode 100644
index 9da15e6ac60..00000000000
--- a/english/lts/security/2019/dla-1953-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of clamav released as DLA 1953-1 led to permission issues on
-/var/run/clamav. This caused several users to experience issues restarting the
-clamav daemon. This regression is caused by a mistakenly backported patch from
-the stretch package, upon which this update was based.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.101.4+dfsg-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1953-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1953.data b/english/lts/security/2019/dla-1953.data
deleted file mode 100644
index 78c5a21462a..00000000000
--- a/english/lts/security/2019/dla-1953.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1953-1 clamav</define-tag>
-<define-tag report_date>2019-10-10</define-tag>
-<define-tag secrefs>CVE-2019-12625 CVE-2019-12900 Bug#34359</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1953.wml b/english/lts/security/2019/dla-1953.wml
deleted file mode 100644
index 7e0add15e1f..00000000000
--- a/english/lts/security/2019/dla-1953.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that clamav, the open source antivirus engine, is affected by
-the following security vulnerabilities:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12625">CVE-2019-12625</a>
-
- <p>Denial of Service (DoS) vulnerability, resulting from excessively long scan
- times caused by non-recursive zip bombs. Among others, this issue was
- mitigated by introducing a scan time limit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12900">CVE-2019-12900</a>
-
- <p>Out-of-bounds write in ClamAV's NSIS bzip2 library when attempting
- decompression in cases where the number of selectors exceeded the max limit
- set by the library.</p>
-
-<p>This update triggers a transition from libclamav7 to libclamav9. As a result,
-several other packages will be recompiled against the fixed package after the
-release of this update: dansguardian, havp, python-pyclamav, c-icap-modules.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.101.4+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1953.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1954.data b/english/lts/security/2019/dla-1954.data
deleted file mode 100644
index 25543cb1eff..00000000000
--- a/english/lts/security/2019/dla-1954.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1954-1 lucene-solr</define-tag>
-<define-tag report_date>2019-10-10</define-tag>
-<define-tag secrefs>CVE-2019-0193</define-tag>
-<define-tag packages>lucene-solr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1954.wml b/english/lts/security/2019/dla-1954.wml
deleted file mode 100644
index 1949777f484..00000000000
--- a/english/lts/security/2019/dla-1954.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in lucene-solr, an enterprise
-search server.</p>
-
-<p>The DataImportHandler, an optional but popular module to pull in data
-from databases and other sources, has a feature in which the whole DIH
-configuration can come from a request's <q>dataConfig</q> parameter. The
-debug mode of the DIH admin screen uses this to allow convenient
-debugging / development of a DIH config. Since a DIH config can contain
-scripts, this parameter is a security risk. Starting from now on, use
-of this parameter requires setting the Java System property
-<q>enable.dih.dataConfigParam</q> to true. For example this can be achieved
-with solr-tomcat by adding -Denable.dih.dataConfigParam=true to
-JAVA_OPTS in /etc/default/tomcat7.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.6.2+dfsg-5+deb8u3.</p>
-
-<p>We recommend that you upgrade your lucene-solr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1954.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1955.data b/english/lts/security/2019/dla-1955.data
deleted file mode 100644
index 662840599b6..00000000000
--- a/english/lts/security/2019/dla-1955.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1955-1 tcpdump</define-tag>
-<define-tag report_date>2019-10-11</define-tag>
-<define-tag secrefs>CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 Bug#941698</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1955.wml b/english/lts/security/2019/dla-1955.wml
deleted file mode 100644
index 70b029184a2..00000000000
--- a/english/lts/security/2019/dla-1955.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in tcpdump, a
-command-line network traffic analyzer. These security vulnerabilities
-might result in denial of service or, potentially, execution of
-arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.3-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your tcpdump packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1955.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1956.data b/english/lts/security/2019/dla-1956.data
deleted file mode 100644
index 724883b07b1..00000000000
--- a/english/lts/security/2019/dla-1956.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1956-1 ruby-openid</define-tag>
-<define-tag report_date>2019-10-11</define-tag>
-<define-tag secrefs>CVE-2019-11027</define-tag>
-<define-tag packages>ruby-openid</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1956.wml b/english/lts/security/2019/dla-1956.wml
deleted file mode 100644
index c62b6c6a309..00000000000
--- a/english/lts/security/2019/dla-1956.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ruby-openid performed discovery first, and then verification. This allowed an
-attacker to change the URL used for discovery and trick the server into
-connecting to the URL. This server in turn could be a private server not
-publicly accessible.</p>
-
-<p>Furthermore, if the client that uses this library discloses connection errors,
-this in turn could disclose information from the private server to the
-attacker.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.5.0debian-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-openid packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1956.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1957.data b/english/lts/security/2019/dla-1957.data
deleted file mode 100644
index 65f278439f0..00000000000
--- a/english/lts/security/2019/dla-1957.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1957-1 tzdata</define-tag>
-<define-tag report_date>2019-10-14</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1957.wml b/english/lts/security/2019/dla-1957.wml
deleted file mode 100644
index 38798033afd..00000000000
--- a/english/lts/security/2019/dla-1957.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2018c. Notable
-changes are:</p>
-
- <p>- Brazil has canceled DST and will stay on standard time indefinitely.
- - Fiji's next DST transitions will be 2019-11-10 and 2020-01-12
- instead of 2019-11-03 and 2020-01-19.
- - Norfolk Island will observe Australian-style DST starting in
- spring 2019. The first transition is on 2019-10-06.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2019c-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1957.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1958.data b/english/lts/security/2019/dla-1958.data
deleted file mode 100644
index cb309639c76..00000000000
--- a/english/lts/security/2019/dla-1958.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1958-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2019-10-14</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1958.wml b/english/lts/security/2019/dla-1958.wml
deleted file mode 100644
index 09f6e137f4e..00000000000
--- a/english/lts/security/2019/dla-1958.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2019c for the
-Perl bindings. For the list of changes, see DLA-1957-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.75-2+2019c.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1958.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1959.data b/english/lts/security/2019/dla-1959.data
deleted file mode 100644
index 65c8aa356c9..00000000000
--- a/english/lts/security/2019/dla-1959.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1959-1 xtrlock</define-tag>
-<define-tag report_date>2019-10-14</define-tag>
-<define-tag secrefs>CVE-2016-10894</define-tag>
-<define-tag packages>xtrlock</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1959.wml b/english/lts/security/2019/dla-1959.wml
deleted file mode 100644
index aab969fd7f4..00000000000
--- a/english/lts/security/2019/dla-1959.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that multitouch devices were not being disabled
-by the xtrlock screen locking utility.</p>
-
-<p>xtrlock did not block multitouch events so an attacker could still
-input and thus control various programs such as Chromium, etc. via
-so-called "multitouch" events including pan scrolling, "pinch and
-zoom" or even being able to provide regular mouse clicks by
-depressing the touchpad once and then clicking with a secondary
-finger.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10894">CVE-2016-10894</a>
-
- <p>xtrlock through 2.10 does not block multitouch events. Consequently, an
- attacker at a locked screen can send input to (and thus control) various
- programs such as Chromium via events such as pan scrolling, "pinch and zoom"
- gestures, or even regular mouse clicks (by depressing the touchpad once and
- then clicking with a different finger).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.6+deb8u1. However, this fix does not the situation where an
-attacker plugs in a multitouch device <em>after</em> the screen has been
-locked (<a href="https://bugs.debian.org/830726#115">more info</a>).</p>
-
-<p>We recommend that you upgrade your xtrlock packages pending a
-deeper fix.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1959.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1960.data b/english/lts/security/2019/dla-1960.data
deleted file mode 100644
index 91f189559d1..00000000000
--- a/english/lts/security/2019/dla-1960.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1960-1 wordpress</define-tag>
-<define-tag report_date>2019-10-17</define-tag>
-<define-tag secrefs>CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 CVE-2019-16220 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 Bug#939543</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1960.wml b/english/lts/security/2019/dla-1960.wml
deleted file mode 100644
index ceedd2cf222..00000000000
--- a/english/lts/security/2019/dla-1960.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several cross-site scripting (XSS) vulnerabilities were discovered in
-Wordpress, a popular content management framework. An attacker can use
-these flaws to send malicious scripts to an unsuspecting user.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1.27+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1960.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1961.data b/english/lts/security/2019/dla-1961.data
deleted file mode 100644
index 6a6180c3211..00000000000
--- a/english/lts/security/2019/dla-1961.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1961-1 milkytracker</define-tag>
-<define-tag report_date>2019-10-21</define-tag>
-<define-tag secrefs>CVE-2019-14464 CVE-2019-14496 CVE-2019-14497 Bug#933964</define-tag>
-<define-tag packages>milkytracker</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1961.wml b/english/lts/security/2019/dla-1961.wml
deleted file mode 100644
index e92702a1be8..00000000000
--- a/english/lts/security/2019/dla-1961.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Fredric discovered a couple of buffer overflows in MilkyTracker, of which,
-a brief description is given below.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14464">CVE-2019-14464</a>
-
- <p>XMFile::read in XMFile.cpp in milkyplay in MilkyTracker had a heap-based
- buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14496">CVE-2019-14496</a>
-
- <p>LoaderXM::load in LoaderXM.cpp in milkyplay in MilkyTracker had a
- stack-based buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14497">CVE-2019-14497</a>
-
- <p>ModuleEditor::convertInstrument in tracker/ModuleEditor.cpp in MilkyTracker
- had a heap-based buffer overflow.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.90.85+dfsg-2.2+deb8u1.</p>
-
-<p>We recommend that you upgrade your milkytracker packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1961.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1962.data b/english/lts/security/2019/dla-1962.data
deleted file mode 100644
index a9ca4d22ac5..00000000000
--- a/english/lts/security/2019/dla-1962.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1962-1 graphite-web</define-tag>
-<define-tag report_date>2019-10-21</define-tag>
-<define-tag secrefs>CVE-2017-18638</define-tag>
-<define-tag packages>graphite-web</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1962.wml b/english/lts/security/2019/dla-1962.wml
deleted file mode 100644
index fcd1eab54b2..00000000000
--- a/english/lts/security/2019/dla-1962.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The <q>send_email</q> function in graphite-web/webapp/graphite/composer/views.py
-in Graphite is vulnerable to SSRF. The vulnerable SSRF endpoint can be used
-by an attacker to have the Graphite web server request any resource.
-The response to this SSRF request is encoded into an image file and then sent
-to an e-mail address that can be supplied by the attacker. Thus, an attacker
-can exfiltrate any information.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.12+debian-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your graphite-web packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1962.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1963-2.data b/english/lts/security/2019/dla-1963-2.data
deleted file mode 100644
index 75f416a19e5..00000000000
--- a/english/lts/security/2019/dla-1963-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1963-2 poppler</define-tag>
-<define-tag report_date>2019-10-18</define-tag>
-<define-tag secrefs>CVE-2019-10871 Bug#942503</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1963-2.wml b/english/lts/security/2019/dla-1963-2.wml
deleted file mode 100644
index 2fbe51ca784..00000000000
--- a/english/lts/security/2019/dla-1963-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-10871">CVE-2019-10871</a> broke xpdf. This change has been reverted
-until a better fix can be developed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.18_0.26.5-2+deb8u13.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1963-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1963.data b/english/lts/security/2019/dla-1963.data
deleted file mode 100644
index 20879de46fd..00000000000
--- a/english/lts/security/2019/dla-1963.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1963-1 poppler</define-tag>
-<define-tag report_date>2019-10-17</define-tag>
-<define-tag secrefs>CVE-2019-9959 CVE-2019-10871</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1963.wml b/english/lts/security/2019/dla-1963.wml
deleted file mode 100644
index 3d15810bfb7..00000000000
--- a/english/lts/security/2019/dla-1963.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two buffer allocation issues were identified in poppler.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9959">CVE-2019-9959</a>
-
- <p>An unexpected negative length value can cause an integer
- overflow, which in turn making it possible to allocate a large
- memory chunk on the heap with size controlled by an attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10871">CVE-2019-10871</a>
-
- <p>The RGB data are considered CMYK data and hence it reads 4 bytes
- instead of 3 bytes at the end of the image. The fixed version
- defines SPLASH_CMYK which is the upstream recommended solution.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.26.5-2+deb8u12.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1963.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1964.data b/english/lts/security/2019/dla-1964.data
deleted file mode 100644
index 269bb120b03..00000000000
--- a/english/lts/security/2019/dla-1964.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1964-1 sudo</define-tag>
-<define-tag report_date>2019-10-17</define-tag>
-<define-tag secrefs>CVE-2019-14287 Bug#942322</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1964.wml b/english/lts/security/2019/dla-1964.wml
deleted file mode 100644
index 67ad60b117c..00000000000
--- a/english/lts/security/2019/dla-1964.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In sudo, a program that provides limited super user privileges to
-specific users, an attacker with access to a Runas ALL sudoer account
-can bypass certain policy blacklists and session PAM modules, and can
-cause incorrect logging, by invoking sudo with a crafted user ID. For
-example, this allows bypass of (ALL,!root) configuration for a
-"sudo -u#-1" command.</p>
-
-<p>See <a href="https://www.sudo.ws/alerts/minus_1_uid.html">https://www.sudo.ws/alerts/minus_1_uid.html</a> for further
-information.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.10p3-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1964.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1965.data b/english/lts/security/2019/dla-1965.data
deleted file mode 100644
index 2389e219bd3..00000000000
--- a/english/lts/security/2019/dla-1965.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1965-1 nfs-utils</define-tag>
-<define-tag report_date>2019-10-19</define-tag>
-<define-tag secrefs>CVE-2019-3689 Bug#940848</define-tag>
-<define-tag packages>nfs-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1965.wml b/english/lts/security/2019/dla-1965.wml
deleted file mode 100644
index 72757456d64..00000000000
--- a/english/lts/security/2019/dla-1965.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In the nfs-utils package, providing support files for Network File
-System (NFS) including the rpc.statd daemon, the directory
-/var/lib/nfs is owned by statd:nogroup. This directory contains files
-owned and managed by root. If statd is compromised, it can therefore
-trick processes running with root privileges into creating/overwriting
-files anywhere on the system.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.8-9+deb8u1.</p>
-
-<p>We recommend that you upgrade your nfs-utils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1965.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1966.data b/english/lts/security/2019/dla-1966.data
deleted file mode 100644
index f65dccc8662..00000000000
--- a/english/lts/security/2019/dla-1966.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1966-1 aspell</define-tag>
-<define-tag report_date>2019-10-19</define-tag>
-<define-tag secrefs>CVE-2019-17544</define-tag>
-<define-tag packages>aspell</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1966.wml b/english/lts/security/2019/dla-1966.wml
deleted file mode 100644
index fefd2fcbecb..00000000000
--- a/english/lts/security/2019/dla-1966.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Aspell, the GNU spell checker, incorrectly
-handled certain inputs which leads to a stack-based buffer over-read.
-An attacker could potentially access sensitive information.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.60.7~20110707-1.3+deb8u1.</p>
-
-<p>We recommend that you upgrade your aspell packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1966.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1967.data b/english/lts/security/2019/dla-1967.data
deleted file mode 100644
index d7ffe8e55d2..00000000000
--- a/english/lts/security/2019/dla-1967.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1967-1 libpcap</define-tag>
-<define-tag report_date>2019-10-22</define-tag>
-<define-tag secrefs>CVE-2019-15165</define-tag>
-<define-tag packages>libpcap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1967.wml b/english/lts/security/2019/dla-1967.wml
deleted file mode 100644
index 3d81ee6b943..00000000000
--- a/english/lts/security/2019/dla-1967.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>DLA text goes here</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.2-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libpcap packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1967.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1968.data b/english/lts/security/2019/dla-1968.data
deleted file mode 100644
index 80c56c4af68..00000000000
--- a/english/lts/security/2019/dla-1968.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1968-1 imagemagick</define-tag>
-<define-tag report_date>2019-10-21</define-tag>
-<define-tag secrefs>CVE-2019-11470 CVE-2019-14981 CVE-2019-15139 CVE-2019-15140</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1968.wml b/english/lts/security/2019/dla-1968.wml
deleted file mode 100644
index 7471d1f2879..00000000000
--- a/english/lts/security/2019/dla-1968.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in imagemagick, an image processing
-toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11470">CVE-2019-11470</a>
-
- <p>Uncontrolled resource consumption caused by insufficiently sanitized image
- size in ReadCINImage (coders/cin.c). This vulnerability might be leveraged
- by remote attackers to cause denial of service via a crafted Cineon image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14981">CVE-2019-14981</a>
-
- <p>Divide-by-zero vulnerability in MeanShiftImage (magick/feature.c). This
- vulnerability might be leveraged by remote attackers to cause denial of
- service via crafted image data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15139">CVE-2019-15139</a>
-
- <p>Out-of-bounds read in ReadXWDImage (coders/xwd.c). This vulnerability might
- be leveraged by remote attackers to cause denial of service via a crafted
- XWD (X Window System window dumping file) image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15140">CVE-2019-15140</a>
-
- <p>Bound checking issue in ReadMATImage (coders/mat.c), potentially leading to
- use-after-free. This vulnerability might be leveraged by remote attackers to
- cause denial of service or any other unspecified impact via a crafted MAT
- image file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8:6.8.9.9-5+deb8u18.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1968.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1969.data b/english/lts/security/2019/dla-1969.data
deleted file mode 100644
index 25f9ee78c01..00000000000
--- a/english/lts/security/2019/dla-1969.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1969-1 file</define-tag>
-<define-tag report_date>2019-10-23</define-tag>
-<define-tag secrefs>CVE-2019-18218</define-tag>
-<define-tag packages>file</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1969.wml b/english/lts/security/2019/dla-1969.wml
deleted file mode 100644
index 5630f4a7dc8..00000000000
--- a/english/lts/security/2019/dla-1969.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in file, a tool to determine file types by using
-magic numbers.</p>
-
-<p>The number of CDF_VECTOR elements had to be restricted in order to prevent
-a heap-based buffer overflow (4-byte out-of-bounds write).</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:5.22+15-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your file packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1969.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1970.data b/english/lts/security/2019/dla-1970.data
deleted file mode 100644
index 372d3dea261..00000000000
--- a/english/lts/security/2019/dla-1970.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1970-1 php5</define-tag>
-<define-tag report_date>2019-10-26</define-tag>
-<define-tag secrefs>CVE-2019-11043</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1970.wml b/english/lts/security/2019/dla-1970.wml
deleted file mode 100644
index d713654f5cd..00000000000
--- a/english/lts/security/2019/dla-1970.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Emil Lerner, beched and d90pwn found a buffer underflow in php5-fpm, a
-Fast Process Manager for the PHP language, which can lead to remote
-code execution.</p>
-
-<p>Instances are vulnerable depending on the web server configuration, in
-particular PATH_INFO handling. For a full list of preconditions,
-check: <a href="https://github.com/neex/phuip-fpizdam">https://github.com/neex/phuip-fpizdam</a></p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.6.40+dfsg-0+deb8u7.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1970.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1971.data b/english/lts/security/2019/dla-1971.data
deleted file mode 100644
index 6bf614c2ebd..00000000000
--- a/english/lts/security/2019/dla-1971.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1971-1 libarchive</define-tag>
-<define-tag report_date>2019-10-26</define-tag>
-<define-tag secrefs>CVE-2019-18408</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1971.wml b/english/lts/security/2019/dla-1971.wml
deleted file mode 100644
index 06aa2dd23fb..00000000000
--- a/english/lts/security/2019/dla-1971.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libarchive, a multi-format archive and
-compression library.</p>
-
-<p>In case of a crafted archive containing several parts and one part being
-corrupt, there would be an use-after-free for the next part of the
-archive.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.1.2-11+deb8u8.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1971.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1972.data b/english/lts/security/2019/dla-1972.data
deleted file mode 100644
index 7b27b5c459a..00000000000
--- a/english/lts/security/2019/dla-1972.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1972-1 mosquitto</define-tag>
-<define-tag report_date>2019-10-26</define-tag>
-<define-tag secrefs>CVE-2017-7655 CVE-2018-12550 CVE-2018-12551 CVE-2019-11779</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1972.wml b/english/lts/security/2019/dla-1972.wml
deleted file mode 100644
index a54edcacd1b..00000000000
--- a/english/lts/security/2019/dla-1972.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in mosquitto, a MQTT version 3.1/3.1.1
-compatible message broker.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7655">CVE-2017-7655</a>
-
- <p>A Null dereference vulnerability in the Mosquitto library could
- lead to crashes for those applications using the library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12550">CVE-2018-12550</a>
-
- <p>An ACL file with no statements was treated as having a default
- allow policy. The new behaviour of an empty ACL file is a default
- policy of access denied.
- (this is in compliance with all newer releases)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12551">CVE-2018-12551</a>
-
- <p>Malformed authentication data in the password file could allow
- clients to circumvent authentication and get access to the broker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11779">CVE-2019-11779</a>
-
- <p>Fix for processing a crafted SUBSCRIBE packet containing a topic
- that consists of approximately 65400 or more '/' characters.
- (setting TOPIC_HIERARCHY_LIMIT to 200)</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.4-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1972.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1973.data b/english/lts/security/2019/dla-1973.data
deleted file mode 100644
index 59f8e7318d1..00000000000
--- a/english/lts/security/2019/dla-1973.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1973-1 libxslt</define-tag>
-<define-tag report_date>2019-10-27</define-tag>
-<define-tag secrefs>CVE-2019-18197 Bug#942646</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1973.wml b/english/lts/security/2019/dla-1973.wml
deleted file mode 100644
index 4027e2bc01a..00000000000
--- a/english/lts/security/2019/dla-1973.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in libxslt, a XSLT 1.0
-processing library written in C.</p>
-
-<p>In xsltCopyText in transform.c, a pointer variable is not reset under
-certain circumstances. If the relevant memory area happened to be freed
-and reused in a certain way, a bounds check could fail and memory
-outside a buffer could be written to, or uninitialized data could be
-disclosed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.1.28-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1973.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1974.data b/english/lts/security/2019/dla-1974.data
deleted file mode 100644
index c6e75634b8b..00000000000
--- a/english/lts/security/2019/dla-1974.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1974-1 proftpd-dfsg</define-tag>
-<define-tag report_date>2019-10-27</define-tag>
-<define-tag secrefs>CVE-2019-18217</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1974.wml b/english/lts/security/2019/dla-1974.wml
deleted file mode 100644
index 9a4ad5103e0..00000000000
--- a/english/lts/security/2019/dla-1974.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in proftp-dfsg, a versatile, virtual-hosting FTP
-daemon.</p>
-
-<p>Due to incorrect handling of overly long commands, a remote
-unauthenticated user could trigger a denial-of-service by reaching an
-endless loop.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.5e+r1.3.5-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1974.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1975.data b/english/lts/security/2019/dla-1975.data
deleted file mode 100644
index d77da20dc6b..00000000000
--- a/english/lts/security/2019/dla-1975.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1975-1 spip</define-tag>
-<define-tag report_date>2019-10-28</define-tag>
-<define-tag secrefs>CVE-2019-16391 CVE-2019-16392 CVE-2019-16393 CVE-2019-16394</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1975.wml b/english/lts/security/2019/dla-1975.wml
deleted file mode 100644
index 1e8703018d6..00000000000
--- a/english/lts/security/2019/dla-1975.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that SPIP, a website engine for publishing, would allow
-unauthenticated users to modify published content and write to the
-database, perform cross-site request forgeries, and enumerate registered
-users.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.0.17-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1975.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1976.data b/english/lts/security/2019/dla-1976.data
deleted file mode 100644
index 6ee6de8ee85..00000000000
--- a/english/lts/security/2019/dla-1976.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1976-1 imapfilter</define-tag>
-<define-tag report_date>2019-10-30</define-tag>
-<define-tag secrefs>CVE-2016-10937 Bug#939702</define-tag>
-<define-tag packages>imapfilter</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1976.wml b/english/lts/security/2019/dla-1976.wml
deleted file mode 100644
index 3c41b75983e..00000000000
--- a/english/lts/security/2019/dla-1976.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The imapfilter tool, a utility for scripting IMAP operations in lua,
-lacked server name / certificate peer hostname validation support.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.5.2-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your imapfilter packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1976.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1977.data b/english/lts/security/2019/dla-1977.data
deleted file mode 100644
index 441f69b37a5..00000000000
--- a/english/lts/security/2019/dla-1977.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1977-1 libvncserver</define-tag>
-<define-tag report_date>2019-10-30</define-tag>
-<define-tag secrefs>CVE-2019-15681 Bug#943793</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1977.wml b/english/lts/security/2019/dla-1977.wml
deleted file mode 100644
index dad288d0cbd..00000000000
--- a/english/lts/security/2019/dla-1977.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>LibVNC contained a memory leak (CWE-655) in VNC server code, which
-allowed an attacker to read stack memory and could be abused for
-information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.9+dfsg2-6.1+deb8u6.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1977.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1978.data b/english/lts/security/2019/dla-1978.data
deleted file mode 100644
index 0685868f193..00000000000
--- a/english/lts/security/2019/dla-1978.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1978-1 python-ecdsa</define-tag>
-<define-tag report_date>2019-10-30</define-tag>
-<define-tag secrefs>CVE-2019-14853 CVE-2019-14859</define-tag>
-<define-tag packages>python-ecdsa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1978.wml b/english/lts/security/2019/dla-1978.wml
deleted file mode 100644
index 9d426e468c0..00000000000
--- a/english/lts/security/2019/dla-1978.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that python-ecdsa, a cryptographic signature library
-for Python, did not correctly verify DER encoded signatures. Malformed
-signatures could lead to unexpected exceptions and in some cases did
-not raise any exception.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.11-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your python-ecdsa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1978.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1979.data b/english/lts/security/2019/dla-1979.data
deleted file mode 100644
index 7bc7150a05d..00000000000
--- a/english/lts/security/2019/dla-1979.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1979-1 italc</define-tag>
-<define-tag report_date>2019-10-30</define-tag>
-<define-tag secrefs>CVE-2014-6051 CVE-2014-6052 CVE-2014-6053 CVE-2014-6054 CVE-2014-6055 CVE-2016-9941 CVE-2016-9942 CVE-2018-6307 CVE-2018-7225 CVE-2018-15126 CVE-2018-15127 CVE-2018-20019 CVE-2018-20020 CVE-2018-20021 CVE-2018-20022 CVE-2018-20023 CVE-2018-20024 CVE-2018-20748 CVE-2018-20749 CVE-2018-20750 CVE-2019-15681</define-tag>
-<define-tag packages>italc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1979.wml b/english/lts/security/2019/dla-1979.wml
deleted file mode 100644
index 846955dc55e..00000000000
--- a/english/lts/security/2019/dla-1979.wml
+++ /dev/null
@@ -1,168 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been identified in the VNC code of iTALC, a
-classroom management software. All vulnerabilities referenced below are
-issues that have originally been reported against Debian source package
-libvncserver. The italc source package in Debian ships a custom-patched
-version of libvncserver, thus libvncserver's security fixes required
-porting over.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6051">CVE-2014-6051</a>
-
- <p>Integer overflow in the MallocFrameBuffer function in vncviewer.c in
- LibVNCServer allowed remote VNC servers to cause a denial of service
- (crash) and possibly executed arbitrary code via an advertisement for
- a large screen size, which triggered a heap-based buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6052">CVE-2014-6052</a>
-
- <p>The HandleRFBServerMessage function in libvncclient/rfbproto.c in
- LibVNCServer did not check certain malloc return values, which
- allowed remote VNC servers to cause a denial of service (application
- crash) or possibly execute arbitrary code by specifying a large
- screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3)
- PalmVNCReSizeFrameBuffer message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6053">CVE-2014-6053</a>
-
- <p>The rfbProcessClientNormalMessage function in
- libvncserver/rfbserver.c in LibVNCServer did not properly handle
- attempts to send a large amount of ClientCutText data, which allowed
- remote attackers to cause a denial of service (memory consumption or
- daemon crash) via a crafted message that was processed by using a
- single unchecked malloc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6054">CVE-2014-6054</a>
-
- <p>The rfbProcessClientNormalMessage function in
- libvncserver/rfbserver.c in LibVNCServer allowed remote attackers to
- cause a denial of service (divide-by-zero error and server crash) via
- a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or
- (2) SetScale message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6055">CVE-2014-6055</a>
-
- <p>Multiple stack-based buffer overflows in the File Transfer feature in
- rfbserver.c in LibVNCServer allowed remote authenticated users to
- cause a denial of service (crash) and possibly execute arbitrary code
- via a (1) long file or (2) directory name or the (3) FileTime
- attribute in a rfbFileTransferOffer message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9941">CVE-2016-9941</a>
-
- <p>Heap-based buffer overflow in rfbproto.c in LibVNCClient in
- LibVNCServer allowed remote servers to cause a denial of service
- (application crash) or possibly execute arbitrary code via a crafted
- FramebufferUpdate message containing a subrectangle outside of the
- client drawing area.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9942">CVE-2016-9942</a>
-
- <p>Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer
- allowed remote servers to cause a denial of service (application
- crash) or possibly execute arbitrary code via a crafted
- FramebufferUpdate message with the Ultra type tile, such that the LZO
- payload decompressed length exceeded what is specified by the tile
- dimensions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6307">CVE-2018-6307</a>
-
- <p>LibVNC contained heap use-after-free vulnerability in server code of
- file transfer extension that can result remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7225">CVE-2018-7225</a>
-
- <p>An issue was discovered in LibVNCServer.
- rfbProcessClientNormalMessage() in rfbserver.c did not sanitize
- msg.cct.length, leading to access to uninitialized and potentially
- sensitive data or possibly unspecified other impact (e.g., an integer
- overflow) via specially crafted VNC packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15126">CVE-2018-15126</a>
-
- <p>LibVNC contained heap use-after-free vulnerability in server code of
- file transfer extension that can result remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15127">CVE-2018-15127</a>
-
- <p>LibVNC contained heap out-of-bound write vulnerability in server code
- of file transfer extension that can result remote code execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20749">CVE-2018-20749</a>
-
- <p>LibVNC contained a heap out-of-bounds write vulnerability in
- libvncserver/rfbserver.c. The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-15127">CVE-2018-15127</a> was incomplete.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20750">CVE-2018-20750</a>
-
- <p>LibVNC contained a heap out-of-bounds write vulnerability in
- libvncserver/rfbserver.c. The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-15127">CVE-2018-15127</a> was incomplete.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20019">CVE-2018-20019</a>
-
- <p>LibVNC contained multiple heap out-of-bound write vulnerabilities in
- VNC client code that can result remote code execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20748">CVE-2018-20748</a>
-
- <p>LibVNC contained multiple heap out-of-bounds write vulnerabilities in
- libvncclient/rfbproto.c. The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-20019">CVE-2018-20019</a> was incomplete.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20020">CVE-2018-20020</a>
-
- <p>LibVNC contained heap out-of-bound write vulnerability inside
- structure in VNC client code that can result remote code execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20021">CVE-2018-20021</a>
-
- <p>LibVNC contained a CWE-835: Infinite loop vulnerability in VNC client
- code. Vulnerability allows attacker to consume excessive amount of
- resources like CPU and RAM</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20022">CVE-2018-20022</a>
-
- <p>LibVNC contained multiple weaknesses CWE-665: Improper Initialization
- vulnerability in VNC client code that allowed attackers to read stack
- memory and could be abused for information disclosure. Combined with
- another vulnerability, it could be used to leak stack memory layout
- and in bypassing ASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20023">CVE-2018-20023</a>
-
- <p>LibVNC contained CWE-665: Improper Initialization vulnerability in
- VNC Repeater client code that allowed attacker to read stack memory
- and could be abused for information disclosure. Combined with another
- vulnerability, it could be used to leak stack memory layout and in
- bypassing ASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20024">CVE-2018-20024</a>
-
- <p>LibVNC contained null pointer dereference in VNC client code that
- could result DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15681">CVE-2019-15681</a>
-
- <p>LibVNC contained a memory leak (CWE-655) in VNC server code, which
- allowed an attacker to read stack memory and could be abused for
- information disclosure. Combined with another vulnerability, it could
- be used to leak stack memory and bypass ASLR. This attack appeared to
- be exploitable via network connectivity.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.0.2+dfsg1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your italc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1979.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1980.data b/english/lts/security/2019/dla-1980.data
deleted file mode 100644
index a08511b7f3c..00000000000
--- a/english/lts/security/2019/dla-1980.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1980-1 wordpress</define-tag>
-<define-tag report_date>2019-11-05</define-tag>
-<define-tag secrefs>CVE-2019-17669 CVE-2019-17670 CVE-2019-17671 CVE-2019-17675</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1980.wml b/english/lts/security/2019/dla-1980.wml
deleted file mode 100644
index f84dde9b934..00000000000
--- a/english/lts/security/2019/dla-1980.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities in wordpress, a web blogging tool, have been fixed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17669">CVE-2019-17669</a>
-
- <p>Server Side Request Forgery (SSRF) vulnerability because URL
- validation does not consider the interpretation of a name as a
- series of hex characters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17670">CVE-2019-17670</a>
-
- <p>Server Side Request Forgery (SSRF) vulnerability was reported in
- wp_validate_redirect(). Normalize the path when validating the
- location for relative URLs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17671">CVE-2019-17671</a>
-
- <p>Unauthenticated viewing of certain content (private or draft posts)
- is possible because the static query property is mishandled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17675">CVE-2019-17675</a>
-
- <p>Wordpress does not properly consider type confusion during
- validation of the referer in the admin pages. This vulnerability
- affects the check_admin_referer() WordPress function.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1.28+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1980.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1981.data b/english/lts/security/2019/dla-1981.data
deleted file mode 100644
index 302453d4c40..00000000000
--- a/english/lts/security/2019/dla-1981.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1981-1 cpio</define-tag>
-<define-tag report_date>2019-11-05</define-tag>
-<define-tag secrefs>CVE-2019-14866 Bug##941412</define-tag>
-<define-tag packages>cpio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1981.wml b/english/lts/security/2019/dla-1981.wml
deleted file mode 100644
index ab470e8cad4..00000000000
--- a/english/lts/security/2019/dla-1981.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in the cpio package.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14866">CVE-2019-14866</a>
-
- <p>It is possible for an attacker to create a file so when
- backed up with cpio can generate arbitrary files in the
- resulting tar archive. When the backup is restored the
- file is then created with arbitrary permissions.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.11+dfsg-4.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your cpio packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1981.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1982.data b/english/lts/security/2019/dla-1982.data
deleted file mode 100644
index 73219664932..00000000000
--- a/english/lts/security/2019/dla-1982.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1982-1 openafs</define-tag>
-<define-tag report_date>2019-11-6</define-tag>
-<define-tag secrefs>CVE-2019-18601 CVE-2019-18602 CVE-2019-18603 Bug#943587</define-tag>
-<define-tag packages>openafs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1982.wml b/english/lts/security/2019/dla-1982.wml
deleted file mode 100644
index f19b8810065..00000000000
--- a/english/lts/security/2019/dla-1982.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in OpenAFS, a
-distributed file system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18601">CVE-2019-18601</a>
-
- <p>OpenAFS is prone to denial of service from unserialized data access
- because remote attackers can make a series of VOTE_Debug RPC calls
- to crash a database server within the SVOTE_Debug RPC handler.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18602">CVE-2019-18602</a>
-
- <p>OpenAFS is prone to an information disclosure vulnerability because
- uninitialized scalars are sent over the network to a peer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18603">CVE-2019-18603</a>
-
- <p>OpenAFS is prone to information leakage upon certain error
- conditions because uninitialized RPC output variables are sent over
- the network to a peer.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.6.9-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your openafs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1982.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1983.data b/english/lts/security/2019/dla-1983.data
deleted file mode 100644
index 7d71c8e1e4e..00000000000
--- a/english/lts/security/2019/dla-1983.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1983-1 simplesamlphp</define-tag>
-<define-tag report_date>2019-11-6</define-tag>
-<define-tag secrefs>CVE-2019-3465 Bug#944107</define-tag>
-<define-tag packages>simplesamlphp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1983.wml b/english/lts/security/2019/dla-1983.wml
deleted file mode 100644
index 1c9061cdbf4..00000000000
--- a/english/lts/security/2019/dla-1983.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that in SimpleSAMLphp, an implementation of the
-SAML 2.0 protocol, it was possible to circumvent XML signature
-verification on SAML messages.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.13.1-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your simplesamlphp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1983.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1984.data b/english/lts/security/2019/dla-1984.data
deleted file mode 100644
index 8eb52b3b15b..00000000000
--- a/english/lts/security/2019/dla-1984.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1984-1 gdal</define-tag>
-<define-tag report_date>2019-11-09</define-tag>
-<define-tag secrefs>CVE-2019-17545</define-tag>
-<define-tag packages>gdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1984.wml b/english/lts/security/2019/dla-1984.wml
deleted file mode 100644
index 14790121825..00000000000
--- a/english/lts/security/2019/dla-1984.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>GDAL through 3.0.1 had a poolDestroy double free in OGRExpatRealloc
-in ogr/ogr_expat.cpp when the 10MB threshold was exceeded.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.10.1+dfsg-8+deb8u1.</p>
-
-<p>We recommend that you upgrade your gdal packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1984.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1985.data b/english/lts/security/2019/dla-1985.data
deleted file mode 100644
index 6f77b68c673..00000000000
--- a/english/lts/security/2019/dla-1985.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1985-1 djvulibre</define-tag>
-<define-tag report_date>2019-11-08</define-tag>
-<define-tag secrefs>CVE-2019-18804</define-tag>
-<define-tag packages>djvulibre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1985.wml b/english/lts/security/2019/dla-1985.wml
deleted file mode 100644
index ee5fab957e9..00000000000
--- a/english/lts/security/2019/dla-1985.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a NULL pointer dereference issue
-in the IW44 encoder/decoder within DjVu, a set of compression
-technologies for high-resolution images.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18804">CVE-2019-18804</a>
-
- <p>DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.5.25.4-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your djvulibre packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1985.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1986.data b/english/lts/security/2019/dla-1986.data
deleted file mode 100644
index f17ca31e12e..00000000000
--- a/english/lts/security/2019/dla-1986.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1986-1 ruby-haml</define-tag>
-<define-tag report_date>2019-11-10</define-tag>
-<define-tag secrefs>CVE-2017-1002201</define-tag>
-<define-tag packages>ruby-haml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1986.wml b/english/lts/security/2019/dla-1986.wml
deleted file mode 100644
index b13d7c162bc..00000000000
--- a/english/lts/security/2019/dla-1986.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In haml, when using user input to perform tasks on the server, characters
-like < > " ' must be escaped properly. In this case, the ' character was
-missed. An attacker can manipulate the input to introduce additional
-attributes, potentially executing code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.0.5-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-haml packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1986.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1987.data b/english/lts/security/2019/dla-1987.data
deleted file mode 100644
index 37cda22e02d..00000000000
--- a/english/lts/security/2019/dla-1987.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1987-1 firefox-esr</define-tag>
-<define-tag report_date>2019-11-10</define-tag>
-<define-tag secrefs>CVE-2019-11757 CVE-2019-11759 CVE-2019-11760 CVE-2019-11761 CVE-2019-11762 CVE-2019-11763 CVE-2019-11764 CVE-2019-15903</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1987.wml b/english/lts/security/2019/dla-1987.wml
deleted file mode 100644
index 5f312196bba..00000000000
--- a/english/lts/security/2019/dla-1987.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure, cross-site scripting or denial of service.</p>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 60.x series has ended, so starting with this update we're now
-following the 68.x releases.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.2.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1987.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1988.data b/english/lts/security/2019/dla-1988.data
deleted file mode 100644
index 87ceace5935..00000000000
--- a/english/lts/security/2019/dla-1988.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1988-1 ampache</define-tag>
-<define-tag report_date>2019-11-11</define-tag>
-<define-tag secrefs>CVE-2019-12385 CVE-2019-12386</define-tag>
-<define-tag packages>ampache</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1988.wml b/english/lts/security/2019/dla-1988.wml
deleted file mode 100644
index 43d8c3cfa35..00000000000
--- a/english/lts/security/2019/dla-1988.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in Ampache, a web-based audio
-file management system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12385">CVE-2019-12385</a>
-
- <p>A stored XSS exists in the localplay.php LocalPlay <q>add instance</q>
- functionality. The injected code is reflected in the instances menu.
- This vulnerability can be abused to force an admin to create a new
- privileged user whose credentials are known by the attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12386">CVE-2019-12386</a>
-
- <p>The search engine is affected by a SQL Injection, so any user able
- to perform lib/class/search.class.php searches (even guest users)
- can dump any data contained in the database (sessions, hashed
- passwords, etc.). This may lead to a full compromise of admin
- accounts, when combined with the weak password generator algorithm
- used in the lostpassword functionality.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.6-rzb2752+dfsg-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your ampache packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1988.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1989.data b/english/lts/security/2019/dla-1989.data
deleted file mode 100644
index 485dcba984e..00000000000
--- a/english/lts/security/2019/dla-1989.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1989-1 linux</define-tag>
-<define-tag report_date>2019-11-12</define-tag>
-<define-tag secrefs>CVE-2019-0154 CVE-2019-11135</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1989.wml b/english/lts/security/2019/dla-1989.wml
deleted file mode 100644
index 3efd9a8c33e..00000000000
--- a/english/lts/security/2019/dla-1989.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0154">CVE-2019-0154</a>
-
- <p>Intel discovered that on their 8th and 9th generation GPUs,
- reading certain registers while the GPU is in a low-power state
- can cause a system hang. A local user permitted to use the GPU
- can use this for denial of service.</p>
-
- <p>This update mitigates the issue through changes to the i915
- driver.</p>
-
- <p>The affected chips (gen8) are listed at
- <a href="https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen8">en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11135">CVE-2019-11135</a>
-
- <p>It was discovered that on Intel CPUs supporting transactional
- memory (TSX), a transaction that is going to be aborted may
- continue to execute speculatively, reading sensitive data from
- internal buffers and leaking it through dependent operations.
- Intel calls this <q>TSX Asynchronous Abort</q> (TAA).</p>
-
- <p>For CPUs affected by the previously published Microarchitectural
- Data Sampling (MDS) issues (<a href="https://security-tracker.debian.org/tracker/CVE-2018-12126">CVE-2018-12126</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-12127">CVE-2018-12127</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-12130">CVE-2018-12130</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-11091">CVE-2019-11091</a>), the existing mitigation also
- mitigates this issue.</p>
-
- <p>For processors that are vulnerable to TAA but not MDS, this update
- disables TSX by default. This mitigation requires updated CPU
- microcode. An updated intel-microcode package (only available in
- Debian non-free) will be provided via a future DLA. The updated
- CPU microcode may also be available as part of a system firmware
- ("BIOS") update.</p>
-
- <p>Further information on the mitigation can be found at
- <a href="https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html">www.kernel.org/…/tsx_async_abort.html</a>
- or in the linux-doc-3.16 package.</p>
-
- <p>Intel's explanation of the issue can be found at
- <a href="https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort">software.intel.com/…/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort</a>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.76-1. This update also includes other fixes from upstream stable
-updates.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1989.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1990.data b/english/lts/security/2019/dla-1990.data
deleted file mode 100644
index b0b06eb93b0..00000000000
--- a/english/lts/security/2019/dla-1990.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1990-1 linux-4.9</define-tag>
-<define-tag report_date>2019-11-13</define-tag>
-<define-tag secrefs>CVE-2018-12207 CVE-2019-0154 CVE-2019-0155 CVE-2019-11135</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1990.wml b/english/lts/security/2019/dla-1990.wml
deleted file mode 100644
index ef0e58f33f7..00000000000
--- a/english/lts/security/2019/dla-1990.wml
+++ /dev/null
@@ -1,99 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12207">CVE-2018-12207</a>
-
- <p>It was discovered that on Intel CPUs supporting hardware
- virtualisation with Extended Page Tables (EPT), a guest VM may
- manipulate the memory management hardware to cause a Machine Check
- Error (MCE) and denial of service (hang or crash).</p>
-
- <p>The guest triggers this error by changing page tables without a
- TLB flush, so that both 4 KB and 2 MB entries for the same virtual
- address are loaded into the instruction TLB (iTLB). This update
- implements a mitigation in KVM that prevents guest VMs from
- loading 2 MB entries into the iTLB. This will reduce performance
- of guest VMs.</p>
-
- <p>Further information on the mitigation can be found at
- <url "https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/multihit.html">
- or in the linux-doc-4.9 package.</p>
-
- <p>Intel's explanation of the issue can be found at
- <a href="https://software.intel.com/security-software-guidance/insights/deep-dive-machine-check-error-avoidance-page-size-change-0">software.intel.com/…/deep-dive-machine-check-error-avoidance-page-size-change-0</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0154">CVE-2019-0154</a>
-
- <p>Intel discovered that on their 8th and 9th generation GPUs,
- reading certain registers while the GPU is in a low-power state
- can cause a system hang. A local user permitted to use the GPU
- can use this for denial of service.</p>
-
- <p>This update mitigates the issue through changes to the i915
- driver.</p>
-
- <p>The affected chips (gen8 and gen9) are listed at
- <a href="https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen8">en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0155">CVE-2019-0155</a>
-
- <p>Intel discovered that their 9th generation and newer GPUs are
- missing a security check in the Blitter Command Streamer (BCS). A
- local user permitted to use the GPU could use this to access any
- memory that the GPU has access to, which could result in a denial
- of service (memory corruption or crash), a leak of sensitive
- information, or privilege escalation.</p>
-
- <p>This update mitigates the issue by adding the security check to
- the i915 driver.</p>
-
- <p>The affected chips (gen9 onward) are listed at
- <a href="https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen9">en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11135">CVE-2019-11135</a>
-
- <p>It was discovered that on Intel CPUs supporting transactional
- memory (TSX), a transaction that is going to be aborted may
- continue to execute speculatively, reading sensitive data from
- internal buffers and leaking it through dependent operations.
- Intel calls this <q>TSX Asynchronous Abort</q> (TAA).</p>
-
- <p>For CPUs affected by the previously published Microarchitectural
- Data Sampling (MDS) issues (<a href="https://security-tracker.debian.org/tracker/CVE-2018-12126">CVE-2018-12126</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-12127">CVE-2018-12127</a>,
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-12130">CVE-2018-12130</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-11091">CVE-2019-11091</a>), the existing mitigation also
- mitigates this issue.</p>
-
- <p>For processors that are vulnerable to TAA but not MDS, this update
- disables TSX by default. This mitigation requires updated CPU
- microcode. An updated intel-microcode package (only available in
- Debian non-free) will be provided via a future DLA. The updated
- CPU microcode may also be available as part of a system firmware
- ("BIOS") update.</p>
-
- <p>Further information on the mitigation can be found at
- <a href="https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html">www.kernel.org/…/tsx_async_abort.html</a>
- or in the linux-doc-4.9 package.</p>
-
- <p>Intel's explanation of the issue can be found at
- <a href="https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort">software.intel.com/…/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort</a>.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.189-3+deb9u2~deb8u1.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1990.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1991.data b/english/lts/security/2019/dla-1991.data
deleted file mode 100644
index b5789721d0b..00000000000
--- a/english/lts/security/2019/dla-1991.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1991-1 libssh2</define-tag>
-<define-tag report_date>2019-11-13</define-tag>
-<define-tag secrefs>CVE-2019-17498 Bug#943562</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1991.wml b/english/lts/security/2019/dla-1991.wml
deleted file mode 100644
index 93e92867bf3..00000000000
--- a/english/lts/security/2019/dla-1991.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In libssh2, SSH_MSG_DISCONNECT logic in packet.c has an integer
-overflow in a bounds check, enabling an attacker to specify an
-arbitrary (out-of-bounds) offset for a subsequent memory read. A
-crafted SSH server may be able to disclose sensitive information or
-cause a denial of service condition on the client system when a user
-connects to the server</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.3-4.1+deb8u6.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1991.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1992.data b/english/lts/security/2019/dla-1992.data
deleted file mode 100644
index 384e396f933..00000000000
--- a/english/lts/security/2019/dla-1992.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1992-1 ghostscript</define-tag>
-<define-tag report_date>2019-11-15</define-tag>
-<define-tag secrefs>CVE-2019-14869</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1992.wml b/english/lts/security/2019/dla-1992.wml
deleted file mode 100644
index 807b6e9b548..00000000000
--- a/english/lts/security/2019/dla-1992.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Manfred Paul and Lukas Schauer reported that the .charkeys procedure in
-Ghostscript, the GPL PostScript/PDF interpreter, does not properly
-restrict privileged calls, which could result in bypass of file system
-restrictions of the dSAFER sandbox.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.26a~dfsg-0+deb8u6.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1992.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1993.data b/english/lts/security/2019/dla-1993.data
deleted file mode 100644
index 0070d958a50..00000000000
--- a/english/lts/security/2019/dla-1993.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1993-1 mesa</define-tag>
-<define-tag report_date>2019-11-15</define-tag>
-<define-tag secrefs>CVE-2019-5068 Bug#944298</define-tag>
-<define-tag packages>mesa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1993.wml b/english/lts/security/2019/dla-1993.wml
deleted file mode 100644
index 9b112a51abc..00000000000
--- a/english/lts/security/2019/dla-1993.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tim Brown discovered a shared memory permissions vulnerability in the
-Mesa 3D graphics library. Some Mesa X11 drivers use shared-memory
-XImages to implement back buffers for improved performance, but Mesa
-creates shared memory regions with permission mode 0777. An attacker
-can access the shared memory without any specific permissions.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-10.3.2-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your mesa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1993.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1994.data b/english/lts/security/2019/dla-1994.data
deleted file mode 100644
index 230073931f7..00000000000
--- a/english/lts/security/2019/dla-1994.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1994-1 postgresql-common</define-tag>
-<define-tag report_date>2019-11-14</define-tag>
-<define-tag secrefs>CVE-2019-3466</define-tag>
-<define-tag packages>postgresql-common</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1994.wml b/english/lts/security/2019/dla-1994.wml
deleted file mode 100644
index 49593468b35..00000000000
--- a/english/lts/security/2019/dla-1994.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>
-Rich Mirch discovered that the pg_ctlcluster script didn't drop
-privileges when creating socket/statistics temporary directories, which
-could result in local privilege escalation.
-</p>
-
-<p>
-For the oldoldstable distribution (jessie), this problem has been fixed
-in version 165+deb8u4.
-</p>
-
-<p>
-We recommend that you upgrade your postgresql-common packages.
-</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1994.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1995.data b/english/lts/security/2019/dla-1995.data
deleted file mode 100644
index 0c0505d6d46..00000000000
--- a/english/lts/security/2019/dla-1995.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1995-1 angular.js</define-tag>
-<define-tag report_date>2019-11-18</define-tag>
-<define-tag secrefs>CVE-2019-14863</define-tag>
-<define-tag packages>angular.js</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1995.wml b/english/lts/security/2019/dla-1995.wml
deleted file mode 100644
index 65cbf757e55..00000000000
--- a/english/lts/security/2019/dla-1995.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Earlier versions of this package package were vulnerable to Cross-site
-Scripting (XSS) due to no proper sanitization of xlink:href attributes.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.26-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your angular.js packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1995.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1996.data b/english/lts/security/2019/dla-1996.data
deleted file mode 100644
index 620925ec6ac..00000000000
--- a/english/lts/security/2019/dla-1996.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1996-1 libapache2-mod-auth-openidc</define-tag>
-<define-tag report_date>2019-11-18</define-tag>
-<define-tag secrefs>CVE-2019-14857 Bug#942165</define-tag>
-<define-tag packages>libapache2-mod-auth-openidc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1996.wml b/english/lts/security/2019/dla-1996.wml
deleted file mode 100644
index a1da26214cd..00000000000
--- a/english/lts/security/2019/dla-1996.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was found in libapache2-mod-auth-openidc, the
-OpenID Connect authentication module for the Apache HTTP server.</p>
-
-<p>Insufficient validation of URLs leads to an Open Redirect
-vulnerability. An attacker may trick a victim into providing credentials
-for an OpenID provider by forwarding the request to an illegitimate
-website.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.0-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-openidc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1996.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1997.data b/english/lts/security/2019/dla-1997.data
deleted file mode 100644
index 91a9cece3bc..00000000000
--- a/english/lts/security/2019/dla-1997.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1997-1 thunderbird</define-tag>
-<define-tag report_date>2019-11-18</define-tag>
-<define-tag secrefs>CVE-2019-11755 CVE-2019-11757 CVE-2019-11759 CVE-2019-11760 CVE-2019-11761 CVE-2019-11762 CVE-2019-11763 CVE-2019-11764 CVE-2019-15903</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1997.wml b/english/lts/security/2019/dla-1997.wml
deleted file mode 100644
index 244e3c6086e..00000000000
--- a/english/lts/security/2019/dla-1997.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code or denial of
-service.</p>
-
-<p>Debian follows the Thunderbird upstream releases. Support for the 60.x
-series has ended, so starting with this update we're now following the
-68.x releases.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.2.2-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1997.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1998.data b/english/lts/security/2019/dla-1998.data
deleted file mode 100644
index 80d9a41ceee..00000000000
--- a/english/lts/security/2019/dla-1998.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1998-1 python-psutil</define-tag>
-<define-tag report_date>2019-11-18</define-tag>
-<define-tag secrefs>CVE-2019-18874</define-tag>
-<define-tag packages>python-psutil</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-1998.wml b/english/lts/security/2019/dla-1998.wml
deleted file mode 100644
index af927577907..00000000000
--- a/english/lts/security/2019/dla-1998.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were multiple double free
-vulnerabilities in python-psutil, a Python module providing
-convenience functions for accessing system process data.</p>
-
-<p>This was caused by incorrect reference counting handling within
-for/while loops that convert system data into said Python objects.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18874">CVE-2019-18874</a>
-
- <p>psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your python-psutil packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1998.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-1999.data b/english/lts/security/2019/dla-1999.data
deleted file mode 100644
index ae8edda47d1..00000000000
--- a/english/lts/security/2019/dla-1999.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-1999-1 symfony</define-tag>
-<define-tag report_date>2019-11-18</define-tag>
-<define-tag secrefs>CVE-2019-18886 CVE-2019-18887 CVE-2019-18888</define-tag>
-<define-tag packages>symfony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-1999.wml b/english/lts/security/2019/dla-1999.wml
deleted file mode 100644
index 3554e85cf85..00000000000
--- a/english/lts/security/2019/dla-1999.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities have been found in the Symfony PHP framework
-which could lead to a timing attack/information leak, argument injection
-and code execution via unserialization.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.3.21+dfsg-4+deb8u6.</p>
-
-<p>We recommend that you upgrade your symfony packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-1999.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2000.data b/english/lts/security/2019/dla-2000.data
deleted file mode 100644
index fd127f8fcd2..00000000000
--- a/english/lts/security/2019/dla-2000.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2000-1 pam-python</define-tag>
-<define-tag report_date>2019-11-23</define-tag>
-<define-tag secrefs>CVE-2019-16729 Bug#942514</define-tag>
-<define-tag packages>pam-python</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2000.wml b/english/lts/security/2019/dla-2000.wml
deleted file mode 100644
index cf38d2d10ff..00000000000
--- a/english/lts/security/2019/dla-2000.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that pam-python, a PAM Module that runs the Python
-interpreter, has an issue in regard to the default environment variable
-handling of Python. This issue could allow for local root escalation in certain
-PAM setups.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.4-1.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your pam-python packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2000.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2001.data b/english/lts/security/2019/dla-2001.data
deleted file mode 100644
index f0b92381a4d..00000000000
--- a/english/lts/security/2019/dla-2001.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2001-1 libofx</define-tag>
-<define-tag report_date>2019-11-23</define-tag>
-<define-tag secrefs>CVE-2019-9656 Bug##924350</define-tag>
-<define-tag packages>libofx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2001.wml b/english/lts/security/2019/dla-2001.wml
deleted file mode 100644
index 5ed1067eeb4..00000000000
--- a/english/lts/security/2019/dla-2001.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>There is a NULL pointer dereference in the function
-OFXApplication::startElement in the file lib/ofx_sgml.cpp,
-as demonstrated by ofxdump.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:0.9.10-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libofx packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2001.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2002.data b/english/lts/security/2019/dla-2002.data
deleted file mode 100644
index 738485080c0..00000000000
--- a/english/lts/security/2019/dla-2002.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2002-1 libice</define-tag>
-<define-tag report_date>2019-11-23</define-tag>
-<define-tag secrefs>CVE-2017-2626</define-tag>
-<define-tag packages>libice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2002.wml b/english/lts/security/2019/dla-2002.wml
deleted file mode 100644
index 8d70f6517bb..00000000000
--- a/english/lts/security/2019/dla-2002.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been found, that libice, an X11 Inter-Client Exchange library,
-uses weak entropy to generate keys.</p>
-
-<p>Using arc4random_buf() from libbsd should avoid this flaw.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:1.0.9-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2002.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2003.data b/english/lts/security/2019/dla-2003.data
deleted file mode 100644
index 78b49c9d877..00000000000
--- a/english/lts/security/2019/dla-2003.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2003-1 isc-dhcp</define-tag>
-<define-tag report_date>2019-11-24</define-tag>
-<define-tag secrefs>CVE-2016-2774</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2003.wml b/english/lts/security/2019/dla-2003.wml
deleted file mode 100644
index c90c23fc85b..00000000000
--- a/english/lts/security/2019/dla-2003.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in isc-dhcp, a server for automatic IP address
-assignment.</p>
-
-<p>The number of simultaneous open TCP connections to OMAPI port of the
-server has to be limited to 200 in order to avoid a denial of service.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.3.1-6+deb8u4.</p>
-
-<p>We recommend that you upgrade your isc-dhcp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2003.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2004.data b/english/lts/security/2019/dla-2004.data
deleted file mode 100644
index 9a98874e63a..00000000000
--- a/english/lts/security/2019/dla-2004.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2004-1 389-ds-base</define-tag>
-<define-tag report_date>2019-11-29</define-tag>
-<define-tag secrefs>CVE-2019-14824 Bug#944150</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2004.wml b/english/lts/security/2019/dla-2004.wml
deleted file mode 100644
index fc10901da96..00000000000
--- a/english/lts/security/2019/dla-2004.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A flaw was found in the <q>deref</q> plugin of 389-ds-base where it could
-use the <q>search</q> permission to display attribute values.</p>
-
-<p>In some configurations, this could allow an authenticated attacker
-to view private attributes, such as password hashes.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.3.5-4+deb8u7.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2004.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2005.data b/english/lts/security/2019/dla-2005.data
deleted file mode 100644
index e38428fc1e5..00000000000
--- a/english/lts/security/2019/dla-2005.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2005-1 tnef</define-tag>
-<define-tag report_date>2019-11-29</define-tag>
-<define-tag secrefs>CVE-2019-18849 Bug#944851</define-tag>
-<define-tag packages>tnef</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2005.wml b/english/lts/security/2019/dla-2005.wml
deleted file mode 100644
index 49c36d1ecc1..00000000000
--- a/english/lts/security/2019/dla-2005.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In tnef, an attacker may be able to write to the victim's
-.ssh/authorized_keys file via an e-mail message with a crafted
-winmail.dat application/ms-tnef attachment, because of a heap-based
-buffer over-read involving strdup.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.9-1+deb8u4.</p>
-
-<p>We recommend that you upgrade your tnef packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2005.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2006.data b/english/lts/security/2019/dla-2006.data
deleted file mode 100644
index 4e999edbdde..00000000000
--- a/english/lts/security/2019/dla-2006.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2006-1 libxdmcp</define-tag>
-<define-tag report_date>2019-11-25</define-tag>
-<define-tag secrefs>CVE-2017-2625</define-tag>
-<define-tag packages>libxdmcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2006.wml b/english/lts/security/2019/dla-2006.wml
deleted file mode 100644
index fed8790f084..00000000000
--- a/english/lts/security/2019/dla-2006.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been found, that libxdmcp, an X11 Display Manager Control Protocol
-library, uses weak entropy to generate keys.</p>
-
-<p>Using arc4random_buf() from libbsd should avoid this flaw.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.1.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libxdmcp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2006.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2007.data b/english/lts/security/2019/dla-2007.data
deleted file mode 100644
index 5c6bc696bb8..00000000000
--- a/english/lts/security/2019/dla-2007.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2007-1 ruby2.1</define-tag>
-<define-tag report_date>2019-11-25</define-tag>
-<define-tag secrefs>CVE-2019-15845 CVE-2019-16201 CVE-2019-16254 CVE-2019-16255</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2007.wml b/english/lts/security/2019/dla-2007.wml
deleted file mode 100644
index 7b39cf93124..00000000000
--- a/english/lts/security/2019/dla-2007.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several flaws have been found in ruby2.1, an interpreter of an
-object-oriented scripting language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15845">CVE-2019-15845</a>
-
- <p>Path matching might pass in File.fnmatch and File.fnmatch? due
- to a NUL character injection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16201">CVE-2019-16201</a>
-
- <p>A loop caused by a wrong regular expression could lead to a denial
- of service of a WEBrick service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16254">CVE-2019-16254</a>
-
- <p>This is the same issue as <a href="https://security-tracker.debian.org/tracker/CVE-2017-17742">CVE-2017-17742</a>, whose fix was not complete.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16255">CVE-2019-16255</a>
-
- <p>Giving untrusted data to the first argument of Shell#[] and
- Shell#test might lead to a code injection vulnerability.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.1.5-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2007.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2008.data b/english/lts/security/2019/dla-2008.data
deleted file mode 100644
index 4e9393035f7..00000000000
--- a/english/lts/security/2019/dla-2008.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2008-1 nss</define-tag>
-<define-tag report_date>2019-11-25</define-tag>
-<define-tag secrefs>CVE-2019-11745</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2008.wml b/english/lts/security/2019/dla-2008.wml
deleted file mode 100644
index dbdf2c37b05..00000000000
--- a/english/lts/security/2019/dla-2008.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in nss, the Mozilla Network Security
-Service library. An out-of-bounds write can occur when passing an
-output buffer smaller than the block size to NSC_EncryptUpdate.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:3.26-1+debu8u7.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2008.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2009.data b/english/lts/security/2019/dla-2009.data
deleted file mode 100644
index 06d6ae3122c..00000000000
--- a/english/lts/security/2019/dla-2009.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2009-1 tiff</define-tag>
-<define-tag report_date>2019-11-26</define-tag>
-<define-tag secrefs>CVE-2017-17095 CVE-2018-12900 CVE-2018-18661 CVE-2019-6128 CVE-2019-17546 CVE-2017-17095</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2009.wml b/english/lts/security/2019/dla-2009.wml
deleted file mode 100644
index 9889ecb374f..00000000000
--- a/english/lts/security/2019/dla-2009.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in tiff, a Tag Image File Format library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17546">CVE-2019-17546</a>
-
- <p>The RGBA interface contains an integer overflow that might lead
- to heap buffer overflow write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6128">CVE-2019-6128</a>
-
- <p>A memory leak exists due to missing cleanup code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18661">CVE-2018-18661</a>
-
- <p>In case of exhausted memory there is a null pointer dereference
- in tiff2bw.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12900">CVE-2018-12900</a>
-
- <p>Fix for heap-based buffer overflow, that could be used to crash an
- application or even to execute arbitrary code (with the permission
- of the user running this application).</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2017-17095">CVE-2017-17095</a></p>
-
- <p>A crafted tiff file could lead to a heap buffer overflow in pal2rgb.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.0.3-12.3+deb8u10.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2009.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2010.data b/english/lts/security/2019/dla-2010.data
deleted file mode 100644
index b16848064b6..00000000000
--- a/english/lts/security/2019/dla-2010.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2010-1 bsdiff</define-tag>
-<define-tag report_date>2019-11-26</define-tag>
-<define-tag secrefs>CVE-2014-9862</define-tag>
-<define-tag packages>bsdiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2010.wml b/english/lts/security/2019/dla-2010.wml
deleted file mode 100644
index d48986a717a..00000000000
--- a/english/lts/security/2019/dla-2010.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue in bsdiff, a tool to generate/apply a patch between two binary
-files, has been found.</p>
-
-<p>Using a crafted patch file an integer signedness error in bspatch could be
-used for a heap based buffer overflow and possibly execution of arbitrary
-code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.3-15+deb8u1.</p>
-
-<p>We recommend that you upgrade your bsdiff packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2010.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2011.data b/english/lts/security/2019/dla-2011.data
deleted file mode 100644
index bc277a8bfb2..00000000000
--- a/english/lts/security/2019/dla-2011.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2011-1 xmlrpc-epi</define-tag>
-<define-tag report_date>2019-11-26</define-tag>
-<define-tag secrefs>CVE-2016-6296</define-tag>
-<define-tag packages>xmlrpc-epi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2011.wml b/english/lts/security/2019/dla-2011.wml
deleted file mode 100644
index 2063e266c2e..00000000000
--- a/english/lts/security/2019/dla-2011.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue in xmlrpc-epi, an XML-RPC request serialisation/deserialisation
-library, has been found.</p>
-
-<p>An integer signedness error in the simplestring_addn function in
-simplestring.c in xmlrpc-epi could be used for a heap based buffer
-overflow and possibly execution of arbitrary code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.54.2-1.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your xmlrpc-epi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2011.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2012.data b/english/lts/security/2019/dla-2012.data
deleted file mode 100644
index 20cd1b025f3..00000000000
--- a/english/lts/security/2019/dla-2012.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2012-1 libvpx</define-tag>
-<define-tag report_date>2019-11-28</define-tag>
-<define-tag secrefs>CVE-2019-9232 CVE-2019-9433</define-tag>
-<define-tag packages>libvpx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2012.wml b/english/lts/security/2019/dla-2012.wml
deleted file mode 100644
index 87b20a75c29..00000000000
--- a/english/lts/security/2019/dla-2012.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in libvpx, a VP8 and VP9 video codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9232">CVE-2019-9232</a>
-
- <p>There is a possible out of bounds read due to a missing bounds check.
- This could lead to remote information disclosure with no additional
- execution privileges needed. User interaction is not needed for
- exploitation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9433">CVE-2019-9433</a>
-
- <p>There is a possible information disclosure due to improper input
- validation. This could lead to remote information disclosure with
- no additional execution privileges needed. User interaction is
- needed for exploitation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.0-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your libvpx packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2012.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2013.data b/english/lts/security/2019/dla-2013.data
deleted file mode 100644
index 1ef001b4fd9..00000000000
--- a/english/lts/security/2019/dla-2013.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2013-1 libvorbis</define-tag>
-<define-tag report_date>2019-11-27</define-tag>
-<define-tag secrefs>CVE-2017-14160 CVE-2018-10392 CVE-2018-10393</define-tag>
-<define-tag packages>libvorbis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2013.wml b/english/lts/security/2019/dla-2013.wml
deleted file mode 100644
index 94dfd20cd5e..00000000000
--- a/english/lts/security/2019/dla-2013.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in libvorbis, a decoder library for Vorbis
-General Audio Compression Codec.</p>
-
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-14160">CVE-2017-14160</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2018-10393">CVE-2018-10393</a> improve the bound checking
-for very low sample rates.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10392">CVE-2018-10392</a>
-
-<p>was found because the number of channels was not validated
-and a remote attacker could cause a denial of service.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.4-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your libvorbis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2013.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2014.data b/english/lts/security/2019/dla-2014.data
deleted file mode 100644
index 5333861394f..00000000000
--- a/english/lts/security/2019/dla-2014.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2014-1 vino</define-tag>
-<define-tag report_date>2019-11-29</define-tag>
-<define-tag secrefs>CVE-2014-6053 CVE-2018-7225 CVE-2019-15681 Bug#945784</define-tag>
-<define-tag packages>vino</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2014.wml b/english/lts/security/2019/dla-2014.wml
deleted file mode 100644
index 2607f348e76..00000000000
--- a/english/lts/security/2019/dla-2014.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been identified in the VNC code of vino, a
-desktop sharing utility for the GNOME desktop environment.</p>
-
-<p>The vulnerabilities referenced below are issues that have originally been
-reported against Debian source package libvncserver. The vino source
-package in Debian ships a custom-patched and stripped down variant of
-libvncserver, thus some of libvncserver's security fixes required porting
-over.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6053">CVE-2014-6053</a>
-
- <p>The rfbProcessClientNormalMessage function in
- libvncserver/rfbserver.c in LibVNCServer did not properly handle
- attempts to send a large amount of ClientCutText data, which allowed
- remote attackers to cause a denial of service (memory consumption or
- daemon crash) via a crafted message that was processed by using a
- single unchecked malloc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7225">CVE-2018-7225</a>
-
- <p>An issue was discovered in LibVNCServer.
- rfbProcessClientNormalMessage() in rfbserver.c did not sanitize
- msg.cct.length, leading to access to uninitialized and potentially
- sensitive data or possibly unspecified other impact (e.g., an integer
- overflow) via specially crafted VNC packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15681">CVE-2019-15681</a>
-
- <p>LibVNC contained a memory leak (CWE-655) in VNC server code, which
- allowed an attacker to read stack memory and could be abused for
- information disclosure. Combined with another vulnerability, it could
- be used to leak stack memory and bypass ASLR. This attack appeared to
- be exploitable via network connectivity.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.14.0-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your vino packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2014.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2015.data b/english/lts/security/2019/dla-2015.data
deleted file mode 100644
index 4a6431713b7..00000000000
--- a/english/lts/security/2019/dla-2015.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2015-1 nss</define-tag>
-<define-tag report_date>2019-11-29</define-tag>
-<define-tag secrefs>CVE-2019-17007</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2015.wml b/english/lts/security/2019/dla-2015.wml
deleted file mode 100644
index 2f55258842e..00000000000
--- a/english/lts/security/2019/dla-2015.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage()
-may haved crash with a NULL deref leading to a Denial-of-Service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:3.26-1+debu8u8.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2015.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2016.data b/english/lts/security/2019/dla-2016.data
deleted file mode 100644
index b6f7fc601f5..00000000000
--- a/english/lts/security/2019/dla-2016.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2016-1 ssvnc</define-tag>
-<define-tag report_date>2019-11-29</define-tag>
-<define-tag secrefs>CVE-2018-20020 CVE-2018-20021 CVE-2018-20022 CVE-2018-20024 Bug#945827</define-tag>
-<define-tag packages>ssvnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2016.wml b/english/lts/security/2019/dla-2016.wml
deleted file mode 100644
index cd5c15f639a..00000000000
--- a/english/lts/security/2019/dla-2016.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been identified in the VNC code of ssvnc, an
-encryption-capable VNC client..</p>
-
-<p>The vulnerabilities referenced below are issues that have originally been
-reported against Debian source package libvncserver (which also ships the
-libvncclient shared library). The ssvnc source package in Debian ships a
-custom-patched, stripped down and outdated variant of libvncclient, thus
-some of libvncclient's security fixes required porting over.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20020">CVE-2018-20020</a>
-
- <p>LibVNC contained heap out-of-bound write vulnerability inside
- structure in VNC client code that can result remote code execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20021">CVE-2018-20021</a>
-
- <p>LibVNC contained a CWE-835: Infinite loop vulnerability in VNC client
- code. Vulnerability allows attacker to consume excessive amount of
- resources like CPU and RAM</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20022">CVE-2018-20022</a>
-
- <p>LibVNC contained multiple weaknesses CWE-665: Improper Initialization
- vulnerability in VNC client code that allowed attackers to read stack
- memory and could be abused for information disclosure. Combined with
- another vulnerability, it could be used to leak stack memory layout
- and in bypassing ASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20024">CVE-2018-20024</a>
-
- <p>LibVNC contained null pointer dereference in VNC client code that
- could result DoS.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.29-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ssvnc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2016.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2017-2.data b/english/lts/security/2019/dla-2017-2.data
deleted file mode 100644
index 63dc39150b1..00000000000
--- a/english/lts/security/2019/dla-2017-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2017-2 asterisk</define-tag>
-<define-tag report_date>2019-12-01</define-tag>
-<define-tag secrefs></define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2017-2.wml b/english/lts/security/2019/dla-2017-2.wml
deleted file mode 100644
index f4528f54b83..00000000000
--- a/english/lts/security/2019/dla-2017-2.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The backport of the CVE-2019-13161 fix caused a regression and
-has been reverted.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:11.13.1~dfsg-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2017-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2017.data b/english/lts/security/2019/dla-2017.data
deleted file mode 100644
index 5277561ab72..00000000000
--- a/english/lts/security/2019/dla-2017.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2017-1 asterisk</define-tag>
-<define-tag report_date>2019-11-30</define-tag>
-<define-tag secrefs>CVE-2019-13161 CVE-2019-18610 CVE-2019-18790</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2017.wml b/english/lts/security/2019/dla-2017.wml
deleted file mode 100644
index f48c01c3b04..00000000000
--- a/english/lts/security/2019/dla-2017.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilites are fixed in Asterisk, an Open Source PBX and telephony toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13161">CVE-2019-13161</a>
-
- <p>An attacker was able to crash Asterisk when handling an SDP answer to an
-outgoing T.38 re-invite.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18610">CVE-2019-18610</a>
-
- <p>Remote authenticated Asterisk Manager Interface (AMI) users without
-system authorization could execute arbitrary system commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18790">CVE-2019-18790</a>
-
- <p>A SIP call hijacking vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:11.13.1~dfsg-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2017.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2018.data b/english/lts/security/2019/dla-2018.data
deleted file mode 100644
index 2c37aa60226..00000000000
--- a/english/lts/security/2019/dla-2018.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2018-1 proftpd-dfsg</define-tag>
-<define-tag report_date>2019-11-30</define-tag>
-<define-tag secrefs>CVE-2019-19269</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2018.wml b/english/lts/security/2019/dla-2018.wml
deleted file mode 100644
index e0e15576e0f..00000000000
--- a/english/lts/security/2019/dla-2018.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In mod_tls of ProFTPD, an FTP/SFTP/FTPS server, a crash with empty CRL was fixed.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.5e+r1.3.5-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2018.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2019.data b/english/lts/security/2019/dla-2019.data
deleted file mode 100644
index 7977c50745c..00000000000
--- a/english/lts/security/2019/dla-2019.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2019-1 exiv2</define-tag>
-<define-tag report_date>2019-12-04</define-tag>
-<define-tag secrefs>CVE-2019-17402</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2019.wml b/english/lts/security/2019/dla-2019.wml
deleted file mode 100644
index 145c2e153a6..00000000000
--- a/english/lts/security/2019/dla-2019.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A corrupted or specially crafted CRW images might exceed the overall
-buffersize to cause a denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.24-4.1+deb8u5.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2019.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2020.data b/english/lts/security/2019/dla-2020.data
deleted file mode 100644
index 1cb740705a9..00000000000
--- a/english/lts/security/2019/dla-2020.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2020-1 libonig</define-tag>
-<define-tag report_date>2019-12-04</define-tag>
-<define-tag secrefs>CVE-2019-19012 CVE-2019-19204 CVE-2019-19246 Bug#944959 Bug#945313</define-tag>
-<define-tag packages>libonig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2020.wml b/english/lts/security/2019/dla-2020.wml
deleted file mode 100644
index af267fdf4bb..00000000000
--- a/english/lts/security/2019/dla-2020.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in the Oniguruma regular
-expressions library, notably used in PHP mbstring.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19012">CVE-2019-19012</a>
-
- <p>An integer overflow in the search_in_range function in regexec.c
- leads to an out-of-bounds read, in which the offset of this read
- is under the control of an attacker. (This only affects the 32-bit
- compiled version). Remote attackers can cause a denial-of-service
- or information disclosure, or possibly have unspecified other
- impact, via a crafted regular expression.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19204">CVE-2019-19204</a>
-
- <p>In the function fetch_range_quantifier in regparse.c, PFETCH is
- called without checking PEND. This leads to a heap-based buffer
- over-read and lead to denial-of-service via a crafted regular
- expression.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19246">CVE-2019-19246</a>
-
- <p>Heap-based buffer over-read in str_lower_case_match in regexec.c
- can lead to denial-of-service via a crafted regular expression.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.9.5-3.2+deb8u4.</p>
-
-<p>We recommend that you upgrade your libonig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2020.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2021.data b/english/lts/security/2019/dla-2021.data
deleted file mode 100644
index 11b4adc5a23..00000000000
--- a/english/lts/security/2019/dla-2021.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2021-1 libav</define-tag>
-<define-tag report_date>2019-12-05</define-tag>
-<define-tag secrefs>CVE-2017-17127 CVE-2017-18245 CVE-2018-19128 CVE-2018-19130 CVE-2019-14443 CVE-2019-17542</define-tag>
-<define-tag packages>libav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2021.wml b/english/lts/security/2019/dla-2021.wml
deleted file mode 100644
index 0f9d92ff69e..00000000000
--- a/english/lts/security/2019/dla-2021.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security issues were fixed in libav, a multimedia library for
-processing audio and video files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17127">CVE-2017-17127</a>
-
- <p>The vc1_decode_frame function in libavcodec/vc1dec.c allows remote
- attackers to cause a denial of service (NULL pointer dereference
- and application crash) via a crafted file.<br />
- <a href="https://security-tracker.debian.org/tracker/CVE-2018-19130">CVE-2018-19130</a> is a duplicate of this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18245">CVE-2017-18245</a>
-
- <p>The mpc8_probe function in libavformat/mpc8.c allows remote
- attackers to cause a denial of service (heap-based buffer
- over-read) via a crafted audio file on 32-bit systems.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19128">CVE-2018-19128</a>
-
- <p>Heap-based buffer over-read in decode_frame in libavcodec/lcldec.c
- allows an attacker to cause denial-of-service via a crafted avi
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14443">CVE-2019-14443</a>
-
- <p>Division by zero in range_decode_culshift in libavcodec/apedec.c
- allows remote attackers to cause a denial of service (application
- crash), as demonstrated by avconv.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17542">CVE-2019-17542</a>
-
- <p>Heap-based buffer overflow in vqa_decode_chunk because of an
- out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-6:11.12-1~deb8u9.</p>
-
-<p>We recommend that you upgrade your libav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2021.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2022.data b/english/lts/security/2019/dla-2022.data
deleted file mode 100644
index 8de2f202f5f..00000000000
--- a/english/lts/security/2019/dla-2022.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2022-1 librabbitmq</define-tag>
-<define-tag report_date>2019-12-06</define-tag>
-<define-tag secrefs>CVE-2019-18609</define-tag>
-<define-tag packages>librabbitmq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-2022.wml b/english/lts/security/2019/dla-2022.wml
deleted file mode 100644
index 10f1eb49cf0..00000000000
--- a/english/lts/security/2019/dla-2022.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an integer overflow vulnerability in librabbitmq, a library for robust messaging between applications and servers.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18609">CVE-2019-18609</a>
-
- <p>An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.2-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your librabbitmq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2022.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2023.data b/english/lts/security/2019/dla-2023.data
deleted file mode 100644
index 14f52dd708a..00000000000
--- a/english/lts/security/2019/dla-2023.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2023-1 openjdk-7</define-tag>
-<define-tag report_date>2019-12-7</define-tag>
-<define-tag secrefs>CVE-2019-2894 CVE-2019-2933 CVE-2019-2945 CVE-2019-2949 CVE-2019-2958 CVE-2019-2962 CVE-2019-2964 CVE-2019-2973 CVE-2019-2978 CVE-2019-2981 CVE-2019-2983 CVE-2019-2987 CVE-2019-2988 CVE-2019-2989 CVE-2019-2992 CVE-2019-2999</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2023.wml b/english/lts/security/2019/dla-2023.wml
deleted file mode 100644
index 7d3042cabe5..00000000000
--- a/english/lts/security/2019/dla-2023.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in OpenJDK, an
-implementation of the Oracle Java platform, resulting in denial of
-service, sandbox bypass, information disclosure or the execution
-of arbitrary code.</p>
-
-<p>Updates for the amd64 architecture are already available, new packages
-for i386, armel and armhf will be available within the next 24 hours.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7u241-2.6.20-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2023.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2024.data b/english/lts/security/2019/dla-2024.data
deleted file mode 100644
index 7c89f68c27d..00000000000
--- a/english/lts/security/2019/dla-2024.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2024-1 phpmyadmin</define-tag>
-<define-tag report_date>2019-12-08</define-tag>
-<define-tag secrefs>CVE-2019-19617</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2024.wml b/english/lts/security/2019/dla-2024.wml
deleted file mode 100644
index e6b4b040ab0..00000000000
--- a/english/lts/security/2019/dla-2024.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>phpMyAdmin before 4.9.2 does not escape certain Git information, related to
-libraries/display_git_revision.lib.php and libraries/Footer.class.php.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.2.12-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2024.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2025.data b/english/lts/security/2019/dla-2025.data
deleted file mode 100644
index 40d6c3c0cb8..00000000000
--- a/english/lts/security/2019/dla-2025.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2025-1 openslp-dfsg</define-tag>
-<define-tag report_date>2019-12-08</define-tag>
-<define-tag secrefs>CVE-2017-17833 CVE-2019-5544</define-tag>
-<define-tag packages>openslp-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2025.wml b/english/lts/security/2019/dla-2025.wml
deleted file mode 100644
index 7d7fcc7b656..00000000000
--- a/english/lts/security/2019/dla-2025.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The OpenSLP package had two open security issues, as described.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17833">CVE-2017-17833</a>
-
- <p>OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related
- memory corruption issue which may manifest itself as a denial-of-service
- or a remote code-execution vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5544">CVE-2019-5544</a>
-
- <p>OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap
- overwrite issue. VMware has evaluated the severity of this issue to be
- in the critical severity range.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.1-10+deb8u2.</p>
-
-<p>We recommend that you upgrade your openslp-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2025.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2026.data b/english/lts/security/2019/dla-2026.data
deleted file mode 100644
index 0c5bb448666..00000000000
--- a/english/lts/security/2019/dla-2026.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2026-1 htmldoc</define-tag>
-<define-tag report_date>2019-12-09</define-tag>
-<define-tag secrefs>CVE-2019-19630</define-tag>
-<define-tag packages>htmldoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2026.wml b/english/lts/security/2019/dla-2026.wml
deleted file mode 100644
index 8cac8b59fe8..00000000000
--- a/english/lts/security/2019/dla-2026.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In HTMLDOC, there was a one-byte underflow in htmldoc/ps-pdf.cxx caused
-by a floating point math difference between GCC and Clang.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.27-8+deb8u1.</p>
-
-<p>We recommend that you upgrade your htmldoc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2026.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2027.data b/english/lts/security/2019/dla-2027.data
deleted file mode 100644
index d5c234d4c5e..00000000000
--- a/english/lts/security/2019/dla-2027.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2027-1 jruby</define-tag>
-<define-tag report_date>2019-12-10</define-tag>
-<define-tag secrefs>CVE-2017-17742 CVE-2019-16201 CVE-2019-16254 CVE-2019-16255</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2027.wml b/english/lts/security/2019/dla-2027.wml
deleted file mode 100644
index 1961752f246..00000000000
--- a/english/lts/security/2019/dla-2027.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in Ruby that also affected
-Debian's JRuby package, a pure-Java implementation of Ruby. Attackers
-were able to call arbitrary Ruby methods, cause a denial-of-service or
-inject input into HTTP response headers when using the WEBrick module.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.6-9+deb8u2.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2027.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2028.data b/english/lts/security/2019/dla-2028.data
deleted file mode 100644
index e1c6a3dc7a9..00000000000
--- a/english/lts/security/2019/dla-2028.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2028-1 squid3</define-tag>
-<define-tag report_date>2019-12-10</define-tag>
-<define-tag secrefs>CVE-2019-12526 CVE-2019-18677 CVE-2019-18678 CVE-2019-18679</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2028.wml b/english/lts/security/2019/dla-2028.wml
deleted file mode 100644
index a14d4251d22..00000000000
--- a/english/lts/security/2019/dla-2028.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Squid, a high-performance proxy caching server for
-web clients, has been affected by the following security
-vulnerabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12526">CVE-2019-12526</a>
-
- <p>URN response handling in Squid suffers from a heap-based buffer
- overflow. When receiving data from a remote server in response to
- an URN request, Squid fails to ensure that the response can fit
- within the buffer. This leads to attacker controlled data
- overflowing in the heap.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18677">CVE-2019-18677</a>
-
- <p>When the append_domain setting is used (because the appended
- characters do not properly interact with hostname length
- restrictions), it can inappropriately redirect traffic to origins
- it should not be delivered to. This happens because of incorrect
- message processing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18678">CVE-2019-18678</a>
-
- <p>A programming error allows attackers to smuggle HTTP requests
- through frontend software to a Squid instance that splits the HTTP
- Request pipeline differently. The resulting Response messages
- corrupt caches (between a client and Squid) with
- attacker-controlled content at arbitrary URLs. Effects are isolated
- to software between the attacker client and Squid.
- There are no effects on Squid itself, nor on any upstream servers.
- The issue is related to a request header containing whitespace
- between a header name and a colon.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18679">CVE-2019-18679</a>
-
- <p>Due to incorrect data management, Squid is vulnerable to
- information disclosure when processing HTTP Digest Authentication.
- Nonce tokens contain the raw byte value of a pointer that sits
- within heap memory allocation. This information reduces ASLR
- protections and may aid attackers isolating memory areas to target
- for remote code execution attacks.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.8-6+deb8u9.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2028.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2029.data b/english/lts/security/2019/dla-2029.data
deleted file mode 100644
index ad877008563..00000000000
--- a/english/lts/security/2019/dla-2029.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2029-1 firefox-esr</define-tag>
-<define-tag report_date>2019-12-10</define-tag>
-<define-tag secrefs>CVE-2019-17005 CVE-2019-17008 CVE-2019-17010 CVE-2019-17011 CVE-2019-17012</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2029.wml b/english/lts/security/2019/dla-2029.wml
deleted file mode 100644
index 83bd4dff418..00000000000
--- a/english/lts/security/2019/dla-2029.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.3.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2029.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2030.data b/english/lts/security/2019/dla-2030.data
deleted file mode 100644
index 6fa7d1a2fc9..00000000000
--- a/english/lts/security/2019/dla-2030.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2030-1 jackson-databind</define-tag>
-<define-tag report_date>2019-12-10</define-tag>
-<define-tag secrefs>CVE-2019-17267 CVE-2019-17531</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2030.wml b/english/lts/security/2019/dla-2030.wml
deleted file mode 100644
index 7465279a033..00000000000
--- a/english/lts/security/2019/dla-2030.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>More deserialization flaws were discovered in jackson-databind which
-could allow an unauthenticated user to perform remote code execution.
-The issue was resolved by extending the blacklist and blocking more
-classes from polymorphic deserialization.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u10.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2030.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2031.data b/english/lts/security/2019/dla-2031.data
deleted file mode 100644
index 8da6391d772..00000000000
--- a/english/lts/security/2019/dla-2031.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2031-1 freeimage</define-tag>
-<define-tag report_date>2019-12-10</define-tag>
-<define-tag secrefs>CVE-2019-12211 CVE-2019-12213 Bug#929597</define-tag>
-<define-tag packages>freeimage</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2031.wml b/english/lts/security/2019/dla-2031.wml
deleted file mode 100644
index 502e26d021f..00000000000
--- a/english/lts/security/2019/dla-2031.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that freeimage, a graphics library, was affected by the following
-two security issues:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12211">CVE-2019-12211</a>
-
- <p>Heap buffer overflow caused by invalid memcpy in PluginTIFF. This flaw
- might be leveraged by remote attackers to trigger denial of service or any
- other unspecified impact via crafted TIFF data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12213">CVE-2019-12213</a>
-
- <p>Stack exhaustion caused by unwanted recursion in PluginTIFF. This flaw
- might be leveraged by remote attackers to trigger denial of service via
- crafted TIFF data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.15.4-4.2+deb8u2.</p>
-
-<p>We recommend that you upgrade your freeimage packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2031.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2032.data b/english/lts/security/2019/dla-2032.data
deleted file mode 100644
index 264302f042b..00000000000
--- a/english/lts/security/2019/dla-2032.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2032-1 cacti</define-tag>
-<define-tag report_date>2019-12-11</define-tag>
-<define-tag secrefs>CVE-2019-17358</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-2032.wml b/english/lts/security/2019/dla-2032.wml
deleted file mode 100644
index 23ff14d0eec..00000000000
--- a/english/lts/security/2019/dla-2032.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was unsafe deserialisation issue in cacti,
-server monitoring system system. Unsafe deserialisation of objects which can
-lead to abuse of the application logic, deny service or even execute arbitrary
-code.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17358">CVE-2019-17358</a></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.8.8b+dfsg-8+deb8u8.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2032.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2033.data b/english/lts/security/2019/dla-2033.data
deleted file mode 100644
index e5b2c53a7ab..00000000000
--- a/english/lts/security/2019/dla-2033.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2033-1 php-horde</define-tag>
-<define-tag report_date>2019-12-13</define-tag>
-<define-tag secrefs>CVE-2019-12095</define-tag>
-<define-tag packages>php-horde</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2033.wml b/english/lts/security/2019/dla-2033.wml
deleted file mode 100644
index 214dfd27f1b..00000000000
--- a/english/lts/security/2019/dla-2033.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been found in php-horde, the Horde Application
-Framework, which may result in information disclosure via cross-site
-scripting.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.2.1+debian0-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your php-horde packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2033.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2034.data b/english/lts/security/2019/dla-2034.data
deleted file mode 100644
index ff3e81e9692..00000000000
--- a/english/lts/security/2019/dla-2034.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2034-1 davical</define-tag>
-<define-tag report_date>2019-12-14</define-tag>
-<define-tag secrefs>CVE-2019-18345 CVE-2019-18346 CVE-2019-18347 Bug#946343</define-tag>
-<define-tag packages>davical</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2034.wml b/english/lts/security/2019/dla-2034.wml
deleted file mode 100644
index 75cde96f1fb..00000000000
--- a/english/lts/security/2019/dla-2034.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple cross-site scripting and cross-site request forgery issues were
-discovered in the DAViCal CalDAV Server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.1.3.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your davical packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2034.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2035.data b/english/lts/security/2019/dla-2035.data
deleted file mode 100644
index 22aafdae434..00000000000
--- a/english/lts/security/2019/dla-2035.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2035-1 libpgf</define-tag>
-<define-tag report_date>2019-12-15</define-tag>
-<define-tag secrefs>CVE-2015-6673</define-tag>
-<define-tag packages>libpgf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2035.wml b/english/lts/security/2019/dla-2035.wml
deleted file mode 100644
index b561812e3af..00000000000
--- a/english/lts/security/2019/dla-2035.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libpgf, a library to handle Progressive
-Graphics File (PGF).</p>
-
-<p>Due to lack of validation of ColorTableSize, a use-after-free issue might
-appear in Decoder.cpp</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.14.12-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libpgf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2035.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2036.data b/english/lts/security/2019/dla-2036.data
deleted file mode 100644
index 31bee2b2235..00000000000
--- a/english/lts/security/2019/dla-2036.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2036-1 thunderbird</define-tag>
-<define-tag report_date>2019-12-16</define-tag>
-<define-tag secrefs>CVE-2019-17005 CVE-2019-17008 CVE-2019-17010 CVE-2019-17011 CVE-2019-17012</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2036.wml b/english/lts/security/2019/dla-2036.wml
deleted file mode 100644
index bba5dad921b..00000000000
--- a/english/lts/security/2019/dla-2036.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.3.0-2~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2036.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2037.data b/english/lts/security/2019/dla-2037.data
deleted file mode 100644
index 7bafd31b5fc..00000000000
--- a/english/lts/security/2019/dla-2037.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2037-1 spamassassin</define-tag>
-<define-tag report_date>2019-12-16</define-tag>
-<define-tag secrefs>CVE-2018-11805 CVE-2019-12420 Bug#946652 Bug#946653</define-tag>
-<define-tag packages>spamassassin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2037.wml b/english/lts/security/2019/dla-2037.wml
deleted file mode 100644
index 452134db0bb..00000000000
--- a/english/lts/security/2019/dla-2037.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in spamassassin, a Perl-based spam
-filter using text analysis.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11805">CVE-2018-11805</a>
-
- <p>Malicious rule or configuration files, possibly downloaded from an
- updates server, could execute arbitrary commands under multiple
- scenarios.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12420">CVE-2019-12420</a>
-
- <p>Specially crafted mulitpart messages can cause spamassassin to use
- excessive resources, resulting in a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.2-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your spamassassin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2037.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2038-2.data b/english/lts/security/2019/dla-2038-2.data
deleted file mode 100644
index d1e803f8ec0..00000000000
--- a/english/lts/security/2019/dla-2038-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2038-2 x2goclient</define-tag>
-<define-tag report_date>2019-12-23</define-tag>
-<define-tag secrefs>Bug#947129</define-tag>
-<define-tag packages>x2goclient</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2038-2.wml b/english/lts/security/2019/dla-2038-2.wml
deleted file mode 100644
index 9bbd860fbb0..00000000000
--- a/english/lts/security/2019/dla-2038-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A change introduced in libssh 0.6.3-4+deb8u4 (which got released as DLA
-2038-1) has broken x2goclient's way of scp'ing session setup files from
-client to server, resulting in an error message shown in a GUI error
-dialog box during session startup (and session resuming).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in x2goclient version
-4.0.3.1-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your x2goclient packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2038-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2038.data b/english/lts/security/2019/dla-2038.data
deleted file mode 100644
index 9ef0ee08476..00000000000
--- a/english/lts/security/2019/dla-2038.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2038-1 libssh</define-tag>
-<define-tag report_date>2019-12-17</define-tag>
-<define-tag secrefs>CVE-2019-14889 Bug#946548</define-tag>
-<define-tag packages>libssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2038.wml b/english/lts/security/2019/dla-2038.wml
deleted file mode 100644
index af73cf475f4..00000000000
--- a/english/lts/security/2019/dla-2038.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that libssh, a tiny C SSH library, does not sufficiently
-sanitize path parameters provided to the server, allowing an attacker
-with only SCP file access to execute arbitrary commands on the server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.6.3-4+deb8u4.</p>
-
-<p>We recommend that you upgrade your libssh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2038.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2039.data b/english/lts/security/2019/dla-2039.data
deleted file mode 100644
index 233f0126d29..00000000000
--- a/english/lts/security/2019/dla-2039.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2039-1 libvorbis</define-tag>
-<define-tag report_date>2019-12-17</define-tag>
-<define-tag secrefs>CVE-2017-11333 CVE-2017-14633</define-tag>
-<define-tag packages>libvorbis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2039.wml b/english/lts/security/2019/dla-2039.wml
deleted file mode 100644
index de9ca4e78c0..00000000000
--- a/english/lts/security/2019/dla-2039.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in libvorbis, a decoder library for Vorbis
-General Audio Compression Codec.</p>
-
-<p>2017-14633</p>
-
- <p>In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read
- vulnerability exists in the function mapping0_forward() in
- mapping0.c, which may lead to DoS when operating on a crafted
- audio file with vorbis_analysis().</p>
-
-<p>2017-11333</p>
-
- <p>The vorbis_analysis_wrote function in lib/block.c in Xiph.Org
- libvorbis 1.3.5 allows remote attackers to cause a denial of
- service (OOM) via a crafted wav file.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.4-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your libvorbis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2039.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2040.data b/english/lts/security/2019/dla-2040.data
deleted file mode 100644
index 65a1f0e1f6d..00000000000
--- a/english/lts/security/2019/dla-2040.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2040-1 harfbuzz</define-tag>
-<define-tag report_date>2019-12-17</define-tag>
-<define-tag secrefs>CVE-2015-8947</define-tag>
-<define-tag packages>harfbuzz</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2040.wml b/english/lts/security/2019/dla-2040.wml
deleted file mode 100644
index 82255d37993..00000000000
--- a/english/lts/security/2019/dla-2040.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in harfbuzz, an OpenType text shaping engine.</p>
-
-<p>Due to a buffer over-read, remote attackers are able to cause a denial of
-service or possibly have other impact via crafted data.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.35-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your harfbuzz packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2040.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2041.data b/english/lts/security/2019/dla-2041.data
deleted file mode 100644
index 687db6ecd14..00000000000
--- a/english/lts/security/2019/dla-2041.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2041-1 debian-edu-config</define-tag>
-<define-tag report_date>2019-12-18</define-tag>
-<define-tag secrefs>CVE-2019-3467 Bug#946797</define-tag>
-<define-tag packages>debian-edu-config</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2041.wml b/english/lts/security/2019/dla-2041.wml
deleted file mode 100644
index b083302f1f2..00000000000
--- a/english/lts/security/2019/dla-2041.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that debian-edu-config, the package containing the
-configuration files and scripts for Debian Edu (Skolelinux), contained an
-insecure configuration for kadmin, the Kerberos administration server. The
-insecure configuration allowed every user to change other users' passwords,
-thus impersonating them and possibly gaining their privileges.</p>
-
-<p>The bug was not exposed in the officially documented user management
-frontends of Debian Edu, but could be abused by local network users knowing
-how to use the Kerberos backend.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.818+deb8u3.</p>
-
-<p>We recommend that you upgrade your debian-edu-config packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2041.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2042.data b/english/lts/security/2019/dla-2042.data
deleted file mode 100644
index a10853a451d..00000000000
--- a/english/lts/security/2019/dla-2042.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2042-1 python-django</define-tag>
-<define-tag report_date>2019-12-18</define-tag>
-<define-tag secrefs>CVE-2019-19844</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-2042.wml b/english/lts/security/2019/dla-2042.wml
deleted file mode 100644
index aabeebe1472..00000000000
--- a/english/lts/security/2019/dla-2042.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential account hijack
-vulnerabilility in Django, the Python-based web development
-framework.</p>
-
-<p>Django's password-reset form used a case-insensitive query to
-retrieve accounts matching the email address requesting the password
-reset. Because this typically involves explicit or implicit case
-transformations, an attacker who knew the email address associated
-with a user account could craft an email address which is distinct
-from the address associated with that account, but which -- due to
-the behavior of Unicode case transformations -- ceases to be distinct
-after case transformation, or which will otherwise compare equal
-given database case-transformation or collation behavior. In such a
-situation, the attacker can receive a valid password-reset token for
-the user account.</p>
-
-<p>To resolve this, two changes were made in Django:</p>
-
-<ul>
- <li>After retrieving a list of potentially-matching accounts from the database,
- Django's password reset functionality now also checks the email address for
- equivalence in Python, using the recommended identifier-comparison process from
- Unicode Technical Report 36, section 2.11.2(B)(2).</li>
-
- <li>When generating password-reset emails, Django now sends to the email
- address retrieved from the database, rather than the email address submitted in
- the password-reset request form.</li>
-</ul>
-
-<p>For more information, please see:
-<a href="https://www.djangoproject.com/weblog/2019/dec/18/security-releases/">https://www.djangoproject.com/weblog/2019/dec/18/security-releases/</a>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19844">CVE-2019-19844</a>
-
- <p>Potential account hijack via password reset form</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.11-1+deb8u8.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2042.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2043-2.data b/english/lts/security/2019/dla-2043-2.data
deleted file mode 100644
index 54054d5ad0a..00000000000
--- a/english/lts/security/2019/dla-2043-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2043-2 gdk-pixbuf</define-tag>
-<define-tag report_date>2019-12-20</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2043-2.wml b/english/lts/security/2019/dla-2043-2.wml
deleted file mode 100644
index f88b8cd31b5..00000000000
--- a/english/lts/security/2019/dla-2043-2.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>While preparing a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2017-6314">CVE-2017-6314</a> an unknown symbol
-g_uint_checked_mul() was introduced.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.31.1-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2043-2.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2043.data b/english/lts/security/2019/dla-2043.data
deleted file mode 100644
index 2bd68ed9b88..00000000000
--- a/english/lts/security/2019/dla-2043.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2043-1 gdk-pixbuf</define-tag>
-<define-tag report_date>2019-12-19</define-tag>
-<define-tag secrefs>CVE-2016-6352 CVE-2017-2870 CVE-2017-6312 CVE-2017-6313 CVE-2017-6314</define-tag>
-<define-tag packages>gdk-pixbuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2043.wml b/english/lts/security/2019/dla-2043.wml
deleted file mode 100644
index c96ff34e567..00000000000
--- a/english/lts/security/2019/dla-2043.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues in gdk-pixbuf, a library to handle pixbuf, have been found.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6352">CVE-2016-6352</a>
-
- <p>fix for denial of service (out-of-bounds write and crash) via
- crafted dimensions in an ICO file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2870">CVE-2017-2870</a>
-
- <p>Fix for an exploitable integer overflow vulnerability in the
- tiff_image_parse functionality. When software is compiled with
- clang, A specially crafted tiff file can cause a heap-overflow
- resulting in remote code execution. Debian package is compiled
- with gcc and is not affected, but probably some downstream is.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6312">CVE-2017-6312</a>
-
- <p>Fix for an integer overflow in io-ico.c that allows attackers
- to cause a denial of service (segmentation fault and application
- crash) via a crafted image</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6313">CVE-2017-6313</a>
-
- <p>Fix for an integer underflow in the load_resources function in
- io-icns.c that allows attackers to cause a denial of service
- (out-of-bounds read and program crash) via a crafted image entry
- size in an ICO file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6314">CVE-2017-6314</a>
-
- <p>Fix for an infinite loop in the make_available_at_least function
- in io-tiff.c that allows attackers to cause a denial of service
- via a large TIFF file.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.31.1-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2043.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2044.data b/english/lts/security/2019/dla-2044.data
deleted file mode 100644
index d7167d4184c..00000000000
--- a/english/lts/security/2019/dla-2044.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2044-1 cyrus-sasl2</define-tag>
-<define-tag report_date>2019-12-20</define-tag>
-<define-tag secrefs>CVE-2019-19906</define-tag>
-<define-tag packages>cyrus-sasl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2044.wml b/english/lts/security/2019/dla-2044.wml
deleted file mode 100644
index e516e41395a..00000000000
--- a/english/lts/security/2019/dla-2044.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>There has been an out-of-bounds write in Cyrus SASL leading to
-unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP
-packet. The OpenLDAP crash was ultimately caused by an off-by-one error
-in _sasl_add_string in common.c in cyrus-sasl.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.26.dfsg1-13+deb8u2.</p>
-
-<p>We recommend that you upgrade your cyrus-sasl2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2044.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2045.data b/english/lts/security/2019/dla-2045.data
deleted file mode 100644
index 03a155fb97c..00000000000
--- a/english/lts/security/2019/dla-2045.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2045-1 tightvnc</define-tag>
-<define-tag report_date>2019-12-21</define-tag>
-<define-tag secrefs>CVE-2014-6053 CVE-2018-7225 CVE-2019-8287 CVE-2018-20021 CVE-2018-20022 CVE-2019-15678 CVE-2019-15679 CVE-2019-15680 CVE-2019-15681 Bug#945364</define-tag>
-<define-tag packages>tightvnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2045.wml b/english/lts/security/2019/dla-2045.wml
deleted file mode 100644
index d32d94f8b41..00000000000
--- a/english/lts/security/2019/dla-2045.wml
+++ /dev/null
@@ -1,94 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have recently been discovered in TightVNC 1.x, an
-X11 based VNC server/viewer application for Windows and Unix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6053">CVE-2014-6053</a>
-
- <p>The rfbProcessClientNormalMessage function in rfbserver.c in TightVNC
- server did not properly handle attempts to send a large amount of
- ClientCutText data, which allowed remote attackers to cause a denial
- of service (memory consumption or daemon crash) via a crafted message
- that was processed by using a single unchecked malloc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7225">CVE-2018-7225</a>
-
- <p>rfbProcessClientNormalMessage() in rfbserver.c did not sanitize
- msg.cct.length, leading to access to uninitialized and potentially
- sensitive data or possibly unspecified other impact (e.g., an integer
- overflow) via specially crafted VNC packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8287">CVE-2019-8287</a>
-
- <p>TightVNC code contained global buffer overflow in HandleCoRREBBP
- macro function, which could potentially have result in code
- execution. This attack appeared to be exploitable via network
- connectivity.</p>
-
- <p>(aka <a href="https://security-tracker.debian.org/tracker/CVE-2018-20020">CVE-2018-20020</a>/libvncserver)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20021">CVE-2018-20021</a>
-
- <p>TightVNC in vncviewer/rfbproto.c contained a CWE-835: Infinite loop
- vulnerability. The vulnerability allowed an attacker to consume
- an excessive amount of resources like CPU and RAM.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20022">CVE-2018-20022</a>
-
- <p>TightVNC's vncviewer contained multiple weaknesses CWE-665: Improper
- Initialization vulnerability in VNC client code that allowed
- attackers to read stack memory and could be abused for information
- disclosure. Combined with another vulnerability, it could be used to
- leak stack memory layout and in bypassing ASLR.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15678">CVE-2019-15678</a>
-
- <p>TightVNC code version contained heap buffer overflow in
- rfbServerCutText handler, which could have potentially resulted in
- code execution. This attack appeared to be exploitable via network
- connectivity.</p>
-
- <p>(partially aka <a href="https://security-tracker.debian.org/tracker/CVE-2018-20748">CVE-2018-20748</a>/libvnvserver)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15679">CVE-2019-15679</a>
-
- <p>TightVNC's vncviewer code contained a heap buffer overflow in
- InitialiseRFBConnection function, which could have potentially
- resulted in code execution. This attack appeared to be exploitable
- via network connectivity.</p>
-
- <p>(partially aka <a href="https://security-tracker.debian.org/tracker/CVE-2018-20748">CVE-2018-20748</a>/libvnvserver)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15680">CVE-2019-15680</a>
-
- <p>TightVNC's vncviewer code contained a null pointer dereference in
- HandleZlibBPP function, which could have resulted in Denial of System
- (DoS). This attack appeared to be exploitable via network
- connectivity.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15681">CVE-2019-15681</a>
-
- <p>TightVNC contained a memory leak (CWE-655) in VNC server code, which
- allowed an attacker to read stack memory and could have been abused
- for information disclosure. Combined with another vulnerability, it
- could have been used to leak stack memory and bypass ASLR. This
- attack appeared to be exploitable via network connectivity.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.9-6.5+deb8u1.</p>
-
-<p>We recommend that you upgrade your tightvnc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2045.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2046.data b/english/lts/security/2019/dla-2046.data
deleted file mode 100644
index 4c422e8ebee..00000000000
--- a/english/lts/security/2019/dla-2046.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2046-1 opensc</define-tag>
-<define-tag report_date>2019-12-26</define-tag>
-<define-tag secrefs>CVE-2019-19479</define-tag>
-<define-tag packages>opensc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2046.wml b/english/lts/security/2019/dla-2046.wml
deleted file mode 100644
index f6d0345f49a..00000000000
--- a/english/lts/security/2019/dla-2046.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue was discovered in libopensc/card-setcos.c in OpenSC, which has an
-incorrect read operation during parsing of a SETCOS file attribute.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.16.0-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your opensc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2046.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2047.data b/english/lts/security/2019/dla-2047.data
deleted file mode 100644
index 010a6b42e8f..00000000000
--- a/english/lts/security/2019/dla-2047.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2047-1 cups</define-tag>
-<define-tag report_date>2019-12-22</define-tag>
-<define-tag secrefs>CVE-2019-2228</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2047.wml b/english/lts/security/2019/dla-2047.wml
deleted file mode 100644
index 027549fa5f8..00000000000
--- a/english/lts/security/2019/dla-2047.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in cups, the Common UNIX Printing System(tm).</p>
-
-<p>An incorrect bounds check could lead to a possible out-of-bounds read and
-local information disclosure in the printer spooler.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.7.5-11+deb8u7.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2047.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2048.data b/english/lts/security/2019/dla-2048.data
deleted file mode 100644
index 6d4dafda385..00000000000
--- a/english/lts/security/2019/dla-2048.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2048-1 libxml2</define-tag>
-<define-tag report_date>2019-12-28</define-tag>
-<define-tag secrefs>CVE-2019-19956</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2019/dla-2048.wml b/english/lts/security/2019/dla-2048.wml
deleted file mode 100644
index ba6890905a8..00000000000
--- a/english/lts/security/2019/dla-2048.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was potential denial of service
-vulnerability in libxml2, the Gnome XML parsing library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19956">CVE-2019-19956</a>
-
- <p>xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-&gt;oldNs.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.9.1+dfsg1-5+deb8u8.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2048.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2049.data b/english/lts/security/2019/dla-2049.data
deleted file mode 100644
index 561ccfe47a0..00000000000
--- a/english/lts/security/2019/dla-2049.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2049-1 imagemagick</define-tag>
-<define-tag report_date>2019-12-29</define-tag>
-<define-tag secrefs>CVE-2019-19948 CVE-2019-19949 Bug#947309 Bug#947308</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2049.wml b/english/lts/security/2019/dla-2049.wml
deleted file mode 100644
index d502af7be1b..00000000000
--- a/english/lts/security/2019/dla-2049.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in imagemagick, an image processing
-toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19948">CVE-2019-19948</a>
-
- <p>Heap-buffer-overflow in WriteSGIImage (coders/sgi.c) caused by insufficient
- validation of row and column sizes. This vulnerability might be leveraged by
- remote attackers to cause denial of service or any other unspecified impact
- via crafted image data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19949">CVE-2019-19949</a>
-
- <p>Heap-based buffer over-read (off-by-one) in WritePNGImage (coders/png.c)
- caused by missing length check prior pointer dereference. This vulnerability
- might be leveraged by remote attackers to cause denial of service via
- crafted image data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8:6.8.9.9-5+deb8u19.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2049.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2050.data b/english/lts/security/2019/dla-2050.data
deleted file mode 100644
index 39618a6ed58..00000000000
--- a/english/lts/security/2019/dla-2050.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2050-1 php5</define-tag>
-<define-tag report_date>2019-12-29</define-tag>
-<define-tag secrefs>CVE-2019-11045 CVE-2019-11046 CVE-2019-11047 CVE-2019-11050</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2050.wml b/english/lts/security/2019/dla-2050.wml
deleted file mode 100644
index 5cb5a084362..00000000000
--- a/english/lts/security/2019/dla-2050.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security bugs have been identified and fixed in php5, a
-server-side, HTML-embedded scripting language.
-The affected components include the exif module and handling of filenames
-with \0 embedded.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u8.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2050.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2051.data b/english/lts/security/2019/dla-2051.data
deleted file mode 100644
index 91f59648891..00000000000
--- a/english/lts/security/2019/dla-2051.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2051-1 intel-microcode</define-tag>
-<define-tag report_date>2019-12-30</define-tag>
-<define-tag secrefs>CVE-2019-11135 CVE-2019-11139</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2051.wml b/english/lts/security/2019/dla-2051.wml
deleted file mode 100644
index ede70661ce7..00000000000
--- a/english/lts/security/2019/dla-2051.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update ships updated CPU microcode for some types of Intel CPUs. In
-particular it provides mitigations for the TAA (TSX Asynchronous Abort)
-vulnerability. For affected CPUs, to fully mitigate the vulnerability it
-is also necessary to update the Linux kernel packages as released in
-DLA 1989-1.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.20191115.2~deb8u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2051.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2052.data b/english/lts/security/2019/dla-2052.data
deleted file mode 100644
index d2725c3d5ed..00000000000
--- a/english/lts/security/2019/dla-2052.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2052-1 libbsd</define-tag>
-<define-tag report_date>2019-12-30</define-tag>
-<define-tag secrefs>CVE-2016-2090</define-tag>
-<define-tag packages>libbsd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2052.wml b/english/lts/security/2019/dla-2052.wml
deleted file mode 100644
index d87aeab4ace..00000000000
--- a/english/lts/security/2019/dla-2052.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issues has been found in libbsd, a package containing utility functions
-from BSD systems.</p>
-
-<p>In function fgetwln() an off-by-one error could triggers a heap buffer overflow.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.7.0-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libbsd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2052.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2054.data b/english/lts/security/2019/dla-2054.data
deleted file mode 100644
index fd01045ca56..00000000000
--- a/english/lts/security/2019/dla-2054.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2054-1 jhead</define-tag>
-<define-tag report_date>2019-12-31</define-tag>
-<define-tag secrefs>CVE-2018-16554 CVE-2018-17088 CVE-2019-1010301 CVE-2019-1010302</define-tag>
-<define-tag packages>jhead</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2054.wml b/english/lts/security/2019/dla-2054.wml
deleted file mode 100644
index 3deffd4c21d..00000000000
--- a/english/lts/security/2019/dla-2054.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple buffer overflows have been fixed in jhead, a program to manipulate the non-image part of Exif compliant JPEG files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16554">CVE-2018-16554</a></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17088">CVE-2018-17088</a></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010301">CVE-2019-1010301</a>
-
- <p>Overflows in gpsinfo</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010302">CVE-2019-1010302</a>
-
- <p>Overflow in iptc</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.97-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your jhead packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2054.data"
-# $Id: $
diff --git a/english/lts/security/2019/dla-2055.data b/english/lts/security/2019/dla-2055.data
deleted file mode 100644
index 5904ced6452..00000000000
--- a/english/lts/security/2019/dla-2055.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2055-1 igraph</define-tag>
-<define-tag report_date>2019-12-31</define-tag>
-<define-tag secrefs>CVE-2018-20349</define-tag>
-<define-tag packages>igraph</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2019/dla-2055.wml b/english/lts/security/2019/dla-2055.wml
deleted file mode 100644
index 241ca4448e4..00000000000
--- a/english/lts/security/2019/dla-2055.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in igraph, a library for creating and manipulating
-graphs.
-A NULL pointer dereference vulneribility was detected in
-igraph_i_strdiff().</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.7.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your igraph packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2019/dla-2055.data"
-# $Id: $
diff --git a/english/lts/security/2019/index.wml b/english/lts/security/2019/index.wml
deleted file mode 100644
index 3373f87d92c..00000000000
--- a/english/lts/security/2019/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2019</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2019' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2020/Makefile b/english/lts/security/2020/Makefile
deleted file mode 100644
index 68dea1028a8..00000000000
--- a/english/lts/security/2020/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2020
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
diff --git a/english/lts/security/2020/dla-1931-2.data b/english/lts/security/2020/dla-1931-2.data
deleted file mode 100644
index 825f609a009..00000000000
--- a/english/lts/security/2020/dla-1931-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-1931-2 libgcrypt20</define-tag>
-<define-tag report_date>2020-01-01</define-tag>
-<define-tag secrefs>CVE-2019-13627</define-tag>
-<define-tag packages>libgcrypt20</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-1931-2.wml b/english/lts/security/2020/dla-1931-2.wml
deleted file mode 100644
index 638a5795d40..00000000000
--- a/english/lts/security/2020/dla-1931-2.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the fix to address an ECDSA timing attack in
-the <tt>libgcrypt20</tt> cryptographic library was incomplete.</p>
-
-<p>Thanks to Albert Chin-A-Young &lt;china@thewrittenword.com&gt; for
-the report.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">CVE-2019-13627</a>
-
- <p>It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.6.3-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your libgcrypt20 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-1931-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2053.data b/english/lts/security/2020/dla-2053.data
deleted file mode 100644
index b276bfd1ef2..00000000000
--- a/english/lts/security/2020/dla-2053.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2053-1 otrs2</define-tag>
-<define-tag report_date>2020-01-01</define-tag>
-<define-tag secrefs>CVE-2019-18179</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2053.wml b/english/lts/security/2020/dla-2053.wml
deleted file mode 100644
index 9f8afdd739f..00000000000
--- a/english/lts/security/2020/dla-2053.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>DLA text goes here</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.3.18-1+deb8u12.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2053.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2056.data b/english/lts/security/2020/dla-2056.data
deleted file mode 100644
index 5363fcc01bb..00000000000
--- a/english/lts/security/2020/dla-2056.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2056-1 waitress</define-tag>
-<define-tag report_date>2020-01-01</define-tag>
-<define-tag secrefs>CVE-2019-16789</define-tag>
-<define-tag packages>waitress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2056.wml b/english/lts/security/2020/dla-2056.wml
deleted file mode 100644
index 5494205855c..00000000000
--- a/english/lts/security/2020/dla-2056.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a HTTP request smuggling
-vulnerability in waitress, pure-Python WSGI server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16789">CVE-2019-16789</a>
-
- <p>In Waitress through version 1.4.0, if a proxy server is used in front of
- waitress, an invalid request may be sent by an attacker that bypasses the
- front-end and is parsed differently by waitress leading to a potential for
- HTTP request smuggling. Specially crafted requests containing special
- whitespace characters in the Transfer-Encoding header would get parsed by
- Waitress as being a chunked request, but a front-end server would use the
- Content-Length instead as the Transfer-Encoding header is considered
- invalid due to containing invalid characters. If a front-end server does
- HTTP pipelining to a backend Waitress server this could lead to HTTP
- request splitting which may lead to potential cache poisoning or unexpected
- information disclosure. This issue is fixed in Waitress 1.4.1 through more
- strict HTTP field validation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.8.9-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your waitress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2056.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2057.data b/english/lts/security/2020/dla-2057.data
deleted file mode 100644
index 0c50399329f..00000000000
--- a/english/lts/security/2020/dla-2057.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2057-1 pillow</define-tag>
-<define-tag report_date>2020-01-06</define-tag>
-<define-tag secrefs>CVE-2019-19911 CVE-2020-5312 CVE-2020-5313</define-tag>
-<define-tag packages>pillow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2057.wml b/english/lts/security/2020/dla-2057.wml
deleted file mode 100644
index 5a9f077a1cf..00000000000
--- a/english/lts/security/2020/dla-2057.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were three vulnerabilities in Pillow, an
-imaging library for the Python programming language</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19911">CVE-2019-19911</a>
-
- <p>There is a DoS vulnerability in Pillow before 6.2.2 caused by
- FpxImagePlugin.py calling the range function on an unvalidated 32-bit
- integer if the number of bands is large. On Windows running 32-bit Python,
- this results in an OverflowError or MemoryError due to the 2 GB limit.
- However, on Linux running 64-bit Python this results in the process being
- terminated by the OOM killer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-5312">CVE-2020-5312</a>
-
- <p>libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer
- overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-5312">CVE-2020-5313</a>
-
- <p>libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer
- overflow.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.6.1-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your pillow packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2057.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2058.data b/english/lts/security/2020/dla-2058.data
deleted file mode 100644
index f22efc16bf4..00000000000
--- a/english/lts/security/2020/dla-2058.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2058-1 nss</define-tag>
-<define-tag report_date>2020-1-7</define-tag>
-<define-tag secrefs>CVE-2019-17006</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2058.wml b/english/lts/security/2020/dla-2058.wml
deleted file mode 100644
index 489beba61ae..00000000000
--- a/english/lts/security/2020/dla-2058.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that certain cryptographic primitives in nss, the Network
-Security Service libraries, did not check the length of the input
-text. This could result in a potential heap-based buffer overflow.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:3.26-1+debu8u10.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2058.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2059.data b/english/lts/security/2020/dla-2059.data
deleted file mode 100644
index 9a509481f1b..00000000000
--- a/english/lts/security/2020/dla-2059.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2059-1 git</define-tag>
-<define-tag report_date>2020-01-06</define-tag>
-<define-tag secrefs>CVE-2019-1348 CVE-2019-1349 CVE-2019-1352 CVE-2019-1353 CVE-2019-1387</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2059.wml b/english/lts/security/2020/dla-2059.wml
deleted file mode 100644
index f5338cd84d3..00000000000
--- a/english/lts/security/2020/dla-2059.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in git, a fast, scalable,
-distributed revision control system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1348">CVE-2019-1348</a>
-
- <p>It was reported that the --export-marks option of git fast-import is
- exposed also via the in-stream command feature export-marks=...,
- allowing to overwrite arbitrary paths.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1387">CVE-2019-1387</a>
-
- <p>It was discovered that submodule names are not validated strictly
- enough, allowing very targeted attacks via remote code execution
- when performing recursive clones.</p>
-
-<p>In addition this update addresses a number of security issues which are
-only an issue if git is operating on an NTFS filesystem (<a href="https://security-tracker.debian.org/tracker/CVE-2019-1349">CVE-2019-1349</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-1352">CVE-2019-1352</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2019-1353">CVE-2019-1353</a>).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1.4-2.1+deb8u8.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2059.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2060.data b/english/lts/security/2020/dla-2060.data
deleted file mode 100644
index 08a6e8cfc7e..00000000000
--- a/english/lts/security/2020/dla-2060.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2060-1 phpmyadmin</define-tag>
-<define-tag report_date>2020-01-16</define-tag>
-<define-tag secrefs>CVE-2020-5504 Bug#948718</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2060.wml b/english/lts/security/2020/dla-2060.wml
deleted file mode 100644
index 2611b3bb738..00000000000
--- a/english/lts/security/2020/dla-2060.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the
-user accounts page. A malicious user could inject custom SQL in place of their
-own username when creating queries to this page. An attacker must have a valid
-MySQL account to access the server.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.2.12-2+deb8u8.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2060.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2061.data b/english/lts/security/2020/dla-2061.data
deleted file mode 100644
index 0169807170c..00000000000
--- a/english/lts/security/2020/dla-2061.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2061-1 firefox-esr</define-tag>
-<define-tag report_date>2020-01-09</define-tag>
-<define-tag secrefs>CVE-2019-17016 CVE-2019-17017 CVE-2019-17022 CVE-2019-17024 CVE-2019-17026</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2061.wml b/english/lts/security/2020/dla-2061.wml
deleted file mode 100644
index 88fde70f5a7..00000000000
--- a/english/lts/security/2020/dla-2061.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code, data exfiltration or cross-site scripting.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.4.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2061.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2062.data b/english/lts/security/2020/dla-2062.data
deleted file mode 100644
index a212dbefb9d..00000000000
--- a/english/lts/security/2020/dla-2062.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2062-1 sa-exim</define-tag>
-<define-tag report_date>2020-1-9</define-tag>
-<define-tag secrefs>CVE-2019-19920 Bug#946829</define-tag>
-<define-tag packages>sa-exim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2062.wml b/english/lts/security/2020/dla-2062.wml
deleted file mode 100644
index 97b02d71823..00000000000
--- a/english/lts/security/2020/dla-2062.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that sa-exim, the SpamAssassin filter for Exim, allows
-attackers to execute arbitrary code if users are allowed to run custom
-rules. A similar issue was fixed in spamassassin, <a href="https://security-tracker.debian.org/tracker/CVE-2018-11805">CVE-2018-11805</a>, which
-caused a functional regression in sa-exim. This update restores the
-compatibility between spamassassin and sa-exim. The security
-implications of sa-exim's greylisting function are also documented in
-/usr/share/doc/sa-exim/README.greylisting.gz.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.2.1-14+deb8u1.</p>
-
-<p>We recommend that you upgrade your sa-exim packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2062.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2063.data b/english/lts/security/2020/dla-2063.data
deleted file mode 100644
index ee0901dc6c1..00000000000
--- a/english/lts/security/2020/dla-2063.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2063-1 debian-lan-config</define-tag>
-<define-tag report_date>2020-01-10</define-tag>
-<define-tag secrefs>CVE-2019-3467 Bug#947459</define-tag>
-<define-tag packages>debian-lan-config</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2063.wml b/english/lts/security/2020/dla-2063.wml
deleted file mode 100644
index 8867e1a65f4..00000000000
--- a/english/lts/security/2020/dla-2063.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In debian-lan-config < 0.26, configured too permissive ACLs for the Kerberos
-admin server allowed password changes for other Kerberos user principals.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.19+deb8u2.</p>
-
-<p>We recommend that you upgrade your debian-lan-config packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2063.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2064.data b/english/lts/security/2020/dla-2064.data
deleted file mode 100644
index 42f9cba79e0..00000000000
--- a/english/lts/security/2020/dla-2064.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2064-1 ldm</define-tag>
-<define-tag report_date>2020-01-10</define-tag>
-<define-tag secrefs>CVE-2019-20373</define-tag>
-<define-tag packages>ldm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2064.wml b/english/lts/security/2020/dla-2064.wml
deleted file mode 100644
index 6b27a790d34..00000000000
--- a/english/lts/security/2020/dla-2064.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that a hook script of ldm, the display manager for the
-Linux Terminal Server Project incorrectly parsed responses from an SSH server
-which could result in local root privilege escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20373">CVE-2019-20373</a>
-
- <p>LTSP LDM through 2.18.06 allows fat-client root access because the
- <tt>LDM_USERNAME</tt> variable may have an empty value if the user's shell
- lacks support for Bourne shell syntax. This is related to a
- <tt>run-x-session</tt> script.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:2.2.15-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ldm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2064.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2065.data b/english/lts/security/2020/dla-2065.data
deleted file mode 100644
index 3172e04c591..00000000000
--- a/english/lts/security/2020/dla-2065.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2065-1 apache-log4j1.2</define-tag>
-<define-tag report_date>2020-1-12</define-tag>
-<define-tag secrefs>CVE-2019-17571 Bug#947124</define-tag>
-<define-tag packages>apache-log4j1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2065.wml b/english/lts/security/2020/dla-2065.wml
deleted file mode 100644
index 7f0fef75acf..00000000000
--- a/english/lts/security/2020/dla-2065.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Included in Log4j 1.2, a logging library for Java, is a SocketServer
-class that is vulnerable to deserialization of untrusted data which can
-be exploited to remotely execute arbitrary code when combined with a
-deserialization gadget when listening to untrusted network traffic for
-log data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.2.17-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your apache-log4j1.2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2065.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2066.data b/english/lts/security/2020/dla-2066.data
deleted file mode 100644
index f56218fd950..00000000000
--- a/english/lts/security/2020/dla-2066.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2066-1 gthumb</define-tag>
-<define-tag report_date>2020-01-19</define-tag>
-<define-tag secrefs>CVE-2019-20326</define-tag>
-<define-tag packages>gthumb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2066.wml b/english/lts/security/2020/dla-2066.wml
deleted file mode 100644
index 2384cc4d963..00000000000
--- a/english/lts/security/2020/dla-2066.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in
-extensions/cairo_io/cairo-image-surface-jpeg.c in gThumb and Pix allows
-attackers to cause a crash and potentially execute arbitrary code via a crafted
-JPEG file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3:3.3.1-2.1+deb8u2.</p>
-
-<p>We recommend that you upgrade your gthumb packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2066.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2067.data b/english/lts/security/2020/dla-2067.data
deleted file mode 100644
index 5ee03e3afdc..00000000000
--- a/english/lts/security/2020/dla-2067.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2067-1 wordpress</define-tag>
-<define-tag report_date>2020-01-14</define-tag>
-<define-tag secrefs>CVE-2019-20041 Bug#946905</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2067.wml b/english/lts/security/2020/dla-2067.wml
deleted file mode 100644
index 4e866a80a33..00000000000
--- a/english/lts/security/2020/dla-2067.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An input sanitization bypass was discovered in Wordpress, a popular
-content management framework. An attacker can use this flaw to send
-malicious scripts to an unsuspecting user.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.1.29+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2067.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2068.data b/english/lts/security/2020/dla-2068.data
deleted file mode 100644
index 76199ec9ec6..00000000000
--- a/english/lts/security/2020/dla-2068.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2068-1 linux</define-tag>
-<define-tag report_date>2020-01-18</define-tag>
-<define-tag secrefs>CVE-2019-2215 CVE-2019-10220 CVE-2019-14895 CVE-2019-14896 CVE-2019-14897 CVE-2019-14901 CVE-2019-15098 CVE-2019-15217 CVE-2019-15291 CVE-2019-15505 CVE-2019-16746 CVE-2019-17052 CVE-2019-17053 CVE-2019-17054 CVE-2019-17055 CVE-2019-17056 CVE-2019-17133 CVE-2019-17666 CVE-2019-19051 CVE-2019-19052 CVE-2019-19056 CVE-2019-19057 CVE-2019-19062 CVE-2019-19066 CVE-2019-19227 CVE-2019-19332 CVE-2019-19523 CVE-2019-19524 CVE-2019-19527 CVE-2019-19530 CVE-2019-19531 CVE-2019-19532 CVE-2019-19533 CVE-2019-19534 CVE-2019-19536 CVE-2019-19537 CVE-2019-19767 CVE-2019-19922 CVE-2019-19947 CVE-2019-19965 CVE-2019-19966</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2068.wml b/english/lts/security/2020/dla-2068.wml
deleted file mode 100644
index c386e09111f..00000000000
--- a/english/lts/security/2020/dla-2068.wml
+++ /dev/null
@@ -1,267 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-2215">CVE-2019-2215</a>
-
- <p>The syzkaller tool discovered a use-after-free vulnerability in
- the Android binder driver. A local user on a system with this
- driver enabled could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.
- However, this driver is not enabled on Debian packaged kernels.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10220">CVE-2019-10220</a>
-
- <p>Various developers and researchers found that if a crafted
- file-system or malicious file server presented a directory with
- filenames including a '/' character, this could confuse and
- possibly defeat security checks in applications that read the
- directory.</p>
-
- <p>The kernel will now return an error when reading such a directory,
- rather than passing the invalid filenames on to user-space.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14895">CVE-2019-14895</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14901">CVE-2019-14901</a>
-
- <p>ADLab of Venustech discovered potential heap buffer overflows in
- the mwifiex wifi driver. On systems using this driver, a
- malicious Wireless Access Point or adhoc/P2P peer could use these
- to cause a denial of service (memory corruption or crash) or
- possibly for remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14896">CVE-2019-14896</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14897">CVE-2019-14897</a>
-
- <p>ADLab of Venustech discovered potential heap and stack buffer
- overflows in the libertas wifi driver. On systems using this
- driver, a malicious Wireless Access Point or adhoc/P2P peer could
- use these to cause a denial of service (memory corruption or
- crash) or possibly for remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15098">CVE-2019-15098</a>
-
- <p>Hui Peng and Mathias Payer reported that the ath6kl wifi driver
- did not properly validate USB descriptors, which could lead to a
- null pointer derefernce. An attacker able to add USB devices
- could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15217">CVE-2019-15217</a>
-
- <p>The syzkaller tool discovered that the zr364xx mdia driver did not
- correctly handle devices without a product name string, which
- could lead to a null pointer dereference. An attacker able to add
- USB devices could use this to cause a denial of service
- (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15291">CVE-2019-15291</a>
-
- <p>The syzkaller tool discovered that the b2c2-flexcop-usb media
- driver did not properly validate USB descriptors, which could lead
- to a null pointer dereference. An attacker able to add USB
- devices could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15505">CVE-2019-15505</a>
-
- <p>The syzkaller tool discovered that the technisat-usb2 media driver
- did not properly validate incoming IR packets, which could lead to
- a heap buffer over-read. An attacker able to add USB devices
- could use this to cause a denial of service (BUG/oops) or to read
- sensitive information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16746">CVE-2019-16746</a>
-
- <p>It was discovered that the wifi stack did not validate the content
- of beacon heads provided by user-space for use on a wifi interface
- in Access Point mode, which could lead to a heap buffer overflow.
- A local user permitted to configure a wifi interface could use
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17052">CVE-2019-17052</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17053">CVE-2019-17053</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17054">CVE-2019-17054</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17055">CVE-2019-17055</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17056">CVE-2019-17056</a>
-
- <p>Ori Nimron reported that various network protocol implementations
- - AX.25, IEEE 802.15.4, Appletalk, ISDN, and NFC - allowed all
- users to create raw sockets. A local user could use this to send
- arbitrary packets on networks using those protocols.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17133">CVE-2019-17133</a>
-
- <p>Nicholas Waisman reported that the wifi stack did not valdiate
- received SSID information before copying it, which could lead to a
- buffer overflow if it is not validated by the driver or firmware.
- A malicious Wireless Access Point might be able to use this to
- cause a denial of service (memory corruption or crash) or for
- remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17666">CVE-2019-17666</a>
-
- <p>Nicholas Waisman reported that the rtlwifi wifi drivers did not
- properly validate received P2P information, leading to a buffer
- overflow. A malicious P2P peer could use this to cause a denial
- of service (memory corruption or crash) or for remote code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19051">CVE-2019-19051</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the i2400m
- wimax driver if the software rfkill operation fails. The security
- impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19052">CVE-2019-19052</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the gs_usb
- CAN driver if the open (interface-up) operation fails. The
- security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19056">CVE-2019-19056</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19057">CVE-2019-19057</a>
-
- <p>Navid Emamdoost discovered potential memory leaks in the mwifiex
- wifi driver if the probe operation fails. The security impact of
- this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19062">CVE-2019-19062</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the AF_ALG
- subsystem if the CRYPTO_MSG_GETALG operation fails. A local user
- could possibly use this to cause a denial of service (memory
- exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19066">CVE-2019-19066</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the bfa SCSI
- driver if the get_fc_host_stats operation fails. The security
- impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19227">CVE-2019-19227</a>
-
- <p>Dan Carpenter reported missing error checks in the Appletalk
- protocol implementation that could lead to a null pointer
- dereference. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19332">CVE-2019-19332</a>
-
- <p>The syzkaller tool discovered a missing bounds check in the KVM
- implementation for x86, which could lead to a heap buffer overflow.
- A local user permitted to use KVM could use this to cause a denial
- of service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19523">CVE-2019-19523</a>
-
- <p>The syzkaller tool discovered a use-after-free bug in the adutux
- USB driver. An attacker able to add and remove USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19524">CVE-2019-19524</a>
-
- <p>The syzkaller tool discovered a race condition in the ff-memless
- library used by input drivers. An attacker able to add and remove
- USB devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19527">CVE-2019-19527</a>
-
- <p>The syzkaller tool discovered that the hiddev driver did not
- correctly handle races between a task opening the device and
- disconnection of the underlying hardware. A local user permitted
- to access hiddev devices, and able to add and remove USB devices,
- could use this to cause a denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19530">CVE-2019-19530</a>
-
- <p>The syzkaller tool discovered a potential use-after-free in the
- cdc-acm network driver. An attacker able to add USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19531">CVE-2019-19531</a>
-
- <p>The syzkaller tool discovered a use-after-free bug in the yurex
- USB driver. An attacker able to add and remove USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19532">CVE-2019-19532</a>
-
- <p>The syzkaller tool discovered a potential heap buffer overflow in
- the hid-gaff input driver, which was also found to exist in many
- other input drivers. An attacker able to add USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19533">CVE-2019-19533</a>
-
- <p>The syzkaller tool discovered that the ttusb-dec media driver was
- missing initialisation of a structure, which could leak sensitive
- information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19534">CVE-2019-19534</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19536">CVE-2019-19536</a>
-
- <p>The syzkaller tool discovered that the peak_usb CAN driver was
- missing initialisation of some structures, which could leak
- sensitive information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19537">CVE-2019-19537</a>
-
- <p>The syzkaller tool discovered race conditions in the USB stack,
- involving character device registration. An attacker able to add
- USB devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19767">CVE-2019-19767</a>
-
- <p>The syzkaller tool discovered that crafted ext4 volumes could
- trigger a buffer overflow in the ext4 filesystem driver. An
- attacker able to mount such a volume could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19922">CVE-2019-19922</a>
-
- <p>It was discovered that a change in Linux 3.16.61, "sched/fair: Fix
- bandwidth timer clock drift condition", could lead to tasks being
- throttled before using their full quota of CPU time. A local
- user could use this bug to slow down other users' tasks. This
- change has been reverted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19947">CVE-2019-19947</a>
-
- <p>It was discovered that the kvaser_usb CAN driver was missing
- initialisation of some structures, which could leak sensitive
- information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19965">CVE-2019-19965</a>
-
- <p>Gao Chuan reported a race condition in the libsas library used by
- SCSI host drivers, which could lead to a null pointer dereference.
- An attacker able to add and remove SCSI devices could use this to
- cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19966">CVE-2019-19966</a>
-
- <p>The syzkaller tool discovered a missing error check in the cpia2
- media driver, which could lead to a use-after-free. An attacker
- able to add USB devices could use this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.81-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2068.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2069.data b/english/lts/security/2020/dla-2069.data
deleted file mode 100644
index 09e8b50bf4d..00000000000
--- a/english/lts/security/2020/dla-2069.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2069-1 cacti</define-tag>
-<define-tag report_date>2020-01-18</define-tag>
-<define-tag secrefs>CVE-2020-7106</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2069.wml b/english/lts/security/2020/dla-2069.wml
deleted file mode 100644
index d6a81c2b2f1..00000000000
--- a/english/lts/security/2020/dla-2069.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of cross-site scripting
-vulnerabilities in cacti, a web interface for monitoring systems.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7106">CVE-2020-7106</a>
-
- <p>Cacti 1.2.8 has stored XSS in data_sources.php,
- color_templates_item.php, graphs.php, graph_items.php,
- lib/api_automation.php, user_admin.php, and user_group_admin.php, as
- demonstrated by the description parameter in data_sources.php (a raw string
- from the database that is displayed by $header to trigger the
- XSS).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.8.8b+dfsg-8+deb8u9.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2069.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2070.data b/english/lts/security/2020/dla-2070.data
deleted file mode 100644
index 51e05bade13..00000000000
--- a/english/lts/security/2020/dla-2070.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2070-1 ruby-excon</define-tag>
-<define-tag report_date>2020-01-19</define-tag>
-<define-tag secrefs>CVE-2019-16779 Bug#946904</define-tag>
-<define-tag packages>ruby-excon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2070.wml b/english/lts/security/2020/dla-2070.wml
deleted file mode 100644
index bbb37bba752..00000000000
--- a/english/lts/security/2020/dla-2070.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In RubyGem excon before 0.71.0, there was a race condition around persistent
-connections, where a connection which is interrupted (such as by a timeout)
-would leave data on the socket. Subsequent requests would then read this data,
-returning content from the previous response.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.33.0-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-excon packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2070.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2071.data b/english/lts/security/2020/dla-2071.data
deleted file mode 100644
index 620eb79a577..00000000000
--- a/english/lts/security/2020/dla-2071.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2071-1 thunderbird</define-tag>
-<define-tag report_date>2020-01-20</define-tag>
-<define-tag secrefs>CVE-2019-17016 CVE-2019-17017 CVE-2019-17022 CVE-2019-17024 CVE-2019-17026</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2071.wml b/english/lts/security/2020/dla-2071.wml
deleted file mode 100644
index affa6ee3e1f..00000000000
--- a/english/lts/security/2020/dla-2071.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code or information
-disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.4.1-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2071.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2072.data b/english/lts/security/2020/dla-2072.data
deleted file mode 100644
index 60151c26475..00000000000
--- a/english/lts/security/2020/dla-2072.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2072-1 gpac</define-tag>
-<define-tag report_date>2020-01-20</define-tag>
-<define-tag secrefs>CVE-2018-21015 CVE-2018-21016 CVE-2019-13618 CVE-2019-20161 CVE-2019-20162 CVE-2019-20163 CVE-2019-20165 CVE-2019-20170 CVE-2019-20171 CVE-2019-20208 Bug#940882 Bug#932242</define-tag>
-<define-tag packages>gpac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2072.wml b/english/lts/security/2020/dla-2072.wml
deleted file mode 100644
index bea8d3bc5b4..00000000000
--- a/english/lts/security/2020/dla-2072.wml
+++ /dev/null
@@ -1,75 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in gpac, a multimedia framework featuring
-the MP4Box muxer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-21015">CVE-2018-21015</a>
-
- <p>AVC_DuplicateConfig() at isomedia/avc_ext.c allows remote
- attackers to cause a denial of service (NULL pointer dereference
- and application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-21016">CVE-2018-21016</a>
-
- <p>audio_sample_entry_AddBox() at isomedia/box_code_base.c allows
- remote attackers to cause a denial of service (heap-based buffer
- over-read and application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13618">CVE-2019-13618</a>
-
- <p>isomedia/isom_read.c in libgpac.a has a heap-based buffer
- over-read, as demonstrated by a crash in gf_m2ts_sync in
- media_tools/mpegts.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20161">CVE-2019-20161</a>
-
- <p>heap-based buffer overflow in the function
- ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20162">CVE-2019-20162</a>
-
- <p>heap-based buffer overflow in the function gf_isom_box_parse_ex()
- in isomedia/box_funcs.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20163">CVE-2019-20163</a>
-
- <p>NULL pointer dereference in the function gf_odf_avc_cfg_write_bs()
- in odf/descriptors.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20165">CVE-2019-20165</a>
-
- <p>NULL pointer dereference in the function ilst_item_Read() in
- isomedia/box_code_apple.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20170">CVE-2019-20170</a>
-
- <p>invalid pointer dereference in the function GF_IPMPX_AUTH_Delete()
- in odf/ipmpx_code.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20171">CVE-2019-20171</a>
-
- <p>memory leaks in metx_New in isomedia/box_code_base.c and abst_Read
- in isomedia/box_code_adobe.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20208">CVE-2019-20208</a>
-
- <p>dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a
- stack-based buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.0+svn5324~dfsg1-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your gpac packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2072.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2073.data b/english/lts/security/2020/dla-2073.data
deleted file mode 100644
index d7d224cfef8..00000000000
--- a/english/lts/security/2020/dla-2073.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2073-1 transfig</define-tag>
-<define-tag report_date>2020-01-23</define-tag>
-<define-tag secrefs>CVE-2018-16140 CVE-2019-14275 CVE-2019-19555</define-tag>
-<define-tag packages>transfig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2073.wml b/english/lts/security/2020/dla-2073.wml
deleted file mode 100644
index 0f82c5eeb37..00000000000
--- a/english/lts/security/2020/dla-2073.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in transfig, a XFig figure files converter.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16140">CVE-2018-16140</a>
-
- <p>Buffer underwrite vulnerability in get_line()
- allows an attacker to write prior to the beginning of the
- buffer via a crafted .fig file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14275">CVE-2019-14275</a>
-
- <p>Stack-based buffer overflow in the calc_arrow
- function in bound.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19555">CVE-2019-19555</a>
-
- <p>Stack-based buffer overflow because of an
- incorrect sscanf.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:3.2.5.e-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your transfig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2073.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2074.data b/english/lts/security/2020/dla-2074.data
deleted file mode 100644
index 00c1c82e94a..00000000000
--- a/english/lts/security/2020/dla-2074.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2074-1 python-apt</define-tag>
-<define-tag report_date>2020-01-23</define-tag>
-<define-tag secrefs>CVE-2019-15795 CVE-2019-15796 Bug#944696</define-tag>
-<define-tag packages>python-apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2074.wml b/english/lts/security/2020/dla-2074.wml
deleted file mode 100644
index 9d3eb035a6a..00000000000
--- a/english/lts/security/2020/dla-2074.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been found in python-apt, a python interface to libapt-pkg.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15795">CVE-2019-15795</a>
-
- <p>It was discovered that python-apt would still use MD5 hashes to validate
- certain downloaded packages. If a remote attacker were able to perform a
- man-in-the-middle attack, this flaw could potentially be used to install
- altered packages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15796">CVE-2019-15796</a>
-
- <p>It was discovered that python-apt could install packages from untrusted
- repositories, contrary to expectations.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.9.3.13.</p>
-
-<p>We recommend that you upgrade your python-apt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2074.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2075.data b/english/lts/security/2020/dla-2075.data
deleted file mode 100644
index 1ee03cd5d1c..00000000000
--- a/english/lts/security/2020/dla-2075.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2075-1 jsoup</define-tag>
-<define-tag report_date>2020-1-26</define-tag>
-<define-tag secrefs>CVE-2015-6748</define-tag>
-<define-tag packages>jsoup</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2075.wml b/english/lts/security/2020/dla-2075.wml
deleted file mode 100644
index cbc2f4c1b0a..00000000000
--- a/english/lts/security/2020/dla-2075.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in jsoup, a Java HTML parser that makes sense of
-real-world HTML soup. Due to bad handling of missing '>' at EOF a
-cross-site scripting (XSS) vulnerability could appear.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your jsoup packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2075.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2076.data b/english/lts/security/2020/dla-2076.data
deleted file mode 100644
index ae0524409d2..00000000000
--- a/english/lts/security/2020/dla-2076.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2076-1 slirp</define-tag>
-<define-tag report_date>2020-1-26</define-tag>
-<define-tag secrefs>CVE-2020-7039 Bug#949085</define-tag>
-<define-tag packages>slirp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2076.wml b/english/lts/security/2020/dla-2076.wml
deleted file mode 100644
index 9bea77e9bd5..00000000000
--- a/english/lts/security/2020/dla-2076.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in slirp, a SLIP/PPP emulator using a dial up
-shell account.
-Due to bad memory handling in slirp a heap-based buffer overflow or other
-out-of-bounds access could happen, which can lead to a DoS or potential
-execute arbitrary code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:1.0.17-7+deb8u1.</p>
-
-<p>We recommend that you upgrade your slirp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2076.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2077.data b/english/lts/security/2020/dla-2077.data
deleted file mode 100644
index 0ea9cf86fbd..00000000000
--- a/english/lts/security/2020/dla-2077.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2077-1 tomcat7</define-tag>
-<define-tag report_date>2020-1-28</define-tag>
-<define-tag secrefs>CVE-2019-12418 CVE-2019-17563</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2077.wml b/english/lts/security/2020/dla-2077.wml
deleted file mode 100644
index d76409074b9..00000000000
--- a/english/lts/security/2020/dla-2077.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities have been fixed in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12418">CVE-2019-12418</a>
-
- <p>When Apache Tomcat is configured with the JMX Remote Lifecycle
- Listener, a local attacker without access to the Tomcat process
- or configuration files is able to manipulate the RMI registry to
- perform a man-in-the-middle attack to capture user names and
- passwords used to access the JMX interface. The attacker can
- then use these credentials to access the JMX interface and gain
- complete control over the Tomcat instance.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17563">CVE-2019-17563</a>
-
- <p>When using FORM authentication with Apache Tomcat there was a
- narrow window where an attacker could perform a session fixation
- attack. The window was considered too narrow for an exploit to
- be practical but, erring on the side of caution, this issue has
- been treated as a security vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.0.56-3+really7.0.99-1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2077.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2078.data b/english/lts/security/2020/dla-2078.data
deleted file mode 100644
index ddfc4663339..00000000000
--- a/english/lts/security/2020/dla-2078.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2078-1 libxmlrpc3-java</define-tag>
-<define-tag report_date>2020-1-30</define-tag>
-<define-tag secrefs>CVE-2019-17570 Bug#949089</define-tag>
-<define-tag packages>libxmlrpc3-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2078.wml b/english/lts/security/2020/dla-2078.wml
deleted file mode 100644
index 24b85183d23..00000000000
--- a/english/lts/security/2020/dla-2078.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An untrusted deserialization was found in the
-org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache
-XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target
-a XML-RPC client causing it to execute arbitrary code.</p>
-
-<p>Clients that expect to get server-side exceptions need to set the
-enabledForExceptions property to true in order to process serialized
-exception messages again.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.1.3-7+deb8u1.</p>
-
-<p>We recommend that you upgrade your libxmlrpc3-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2078.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2079.data b/english/lts/security/2020/dla-2079.data
deleted file mode 100644
index d8b5d25b2dc..00000000000
--- a/english/lts/security/2020/dla-2079.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2079-1 otrs2</define-tag>
-<define-tag report_date>2020-1-29</define-tag>
-<define-tag secrefs>CVE-2020-1765 CVE-2020-1766 CVE-2020-1767</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2079.wml b/english/lts/security/2020/dla-2079.wml
deleted file mode 100644
index a9bedd9fefd..00000000000
--- a/english/lts/security/2020/dla-2079.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the otrs2 package that
-may lead to unauthorized access, remote code execution and spoofing.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1765">CVE-2020-1765</a>
-
- <p>An improper control of parameters allows the spoofing of the from
- fields of the following screens: AgentTicketCompose,
- AgentTicketForward, AgentTicketBounce.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1766">CVE-2020-1766</a>
-
- <p>Due to improper handling of uploaded images it is possible in very
- unlikely and rare conditions to force the agents browser to execute
- malicious javascript from a special crafted SVG file rendered as
- inline jpg file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1767">CVE-2020-1767</a>
-
- <p>Unauthorized view of drafts, change the text completely and send it
- in the name of draft owner. For the customer it will not be visible
- that the message was sent by another agent.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.18-1+deb8u13.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2079.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2080.data b/english/lts/security/2020/dla-2080.data
deleted file mode 100644
index b5e317711ce..00000000000
--- a/english/lts/security/2020/dla-2080.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2080-1 iperf3</define-tag>
-<define-tag report_date>2020-1-27</define-tag>
-<define-tag secrefs>CVE-2016-4303 Bug#827116</define-tag>
-<define-tag packages>iperf3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2080.wml b/english/lts/security/2020/dla-2080.wml
deleted file mode 100644
index fcea0c073f5..00000000000
--- a/english/lts/security/2020/dla-2080.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in iperf3, an Internet Protocol bandwidth
-measuring tool.
-Bad handling of UTF8/16 strings in an embedded library could cause a
-denial of service (crash) or execution of arbitrary code by putting
-special characters in a JSON string, which triggers a heap-based buffer
-overflow.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.0.7-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your iperf3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2080.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2081.data b/english/lts/security/2020/dla-2081.data
deleted file mode 100644
index f867a8e5655..00000000000
--- a/english/lts/security/2020/dla-2081.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2081-1 openjpeg2</define-tag>
-<define-tag report_date>2020-01-31</define-tag>
-<define-tag secrefs>CVE-2020-6851</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2081.wml b/english/lts/security/2020/dla-2081.wml
deleted file mode 100644
index 4d348eaf994..00000000000
--- a/english/lts/security/2020/dla-2081.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>OpenJPEG had a heap-based buffer overflow in opj_t1_clbl_decode_processor
-in libopenjp2.so.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2081.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2082.data b/english/lts/security/2020/dla-2082.data
deleted file mode 100644
index 115f66b098b..00000000000
--- a/english/lts/security/2020/dla-2082.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2082-1 unzip</define-tag>
-<define-tag report_date>2020-1-28</define-tag>
-<define-tag secrefs>CVE-2018-1000035</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2082.wml b/english/lts/security/2020/dla-2082.wml
deleted file mode 100644
index f5aa089e902..00000000000
--- a/english/lts/security/2020/dla-2082.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in unzip, a de-archiver for .zip files.
-While processing a password protected archive, a heap-based buffer
-overflow could happen, that allows an attacker to perform a denial of
-service or to possibly achieve code execution.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.0-16+deb8u6.</p>
-
-<p>We recommend that you upgrade your unzip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2082.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2083.data b/english/lts/security/2020/dla-2083.data
deleted file mode 100644
index 665995d4adb..00000000000
--- a/english/lts/security/2020/dla-2083.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2083-1 hiredis</define-tag>
-<define-tag report_date>2020-01-29</define-tag>
-<define-tag secrefs>CVE-2020-7105</define-tag>
-<define-tag packages>hiredis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2083.wml b/english/lts/security/2020/dla-2083.wml
deleted file mode 100644
index 7f7b5c7a394..00000000000
--- a/english/lts/security/2020/dla-2083.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a large number of NULL pointer
-dereferences due to unchecked return values from <tt>malloc</tt>
-and friends in hiredis, a minimalistic C client library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7105">CVE-2020-7105</a>
-
- <p>async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a
- NULL pointer dereference because malloc return values are
- unchecked.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.11.0-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your hiredis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2083.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2084.data b/english/lts/security/2020/dla-2084.data
deleted file mode 100644
index 03298c5fcb4..00000000000
--- a/english/lts/security/2020/dla-2084.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2084-1 graphicsmagick</define-tag>
-<define-tag report_date>2020-1-29</define-tag>
-<define-tag secrefs>CVE-2019-19950 CVE-2019-19951 CVE-2019-19953</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2084.wml b/english/lts/security/2020/dla-2084.wml
deleted file mode 100644
index 1be61133047..00000000000
--- a/english/lts/security/2020/dla-2084.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three issues have been found in graphicsmagick, a collection of image
-processing tools.
-They are basically a heap-based buffer over-read, heap-based buffer
-overflow and a use-after-free in different functions.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.20-3+deb8u8.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2084.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2085.data b/english/lts/security/2020/dla-2085.data
deleted file mode 100644
index 3b1c3c6ce0b..00000000000
--- a/english/lts/security/2020/dla-2085.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2085-1 zlib</define-tag>
-<define-tag report_date>2020-1-29</define-tag>
-<define-tag secrefs>CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843</define-tag>
-<define-tag packages>zlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2085.wml b/english/lts/security/2020/dla-2085.wml
deleted file mode 100644
index a0af8051cfd..00000000000
--- a/english/lts/security/2020/dla-2085.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in zlib, a compression library.
-They are basically about improper big-endian CRC calculation, improper
-left shift of negative integers and improper pointer arithmetic.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.2.8.dfsg-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your zlib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2085.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2086.data b/english/lts/security/2020/dla-2086.data
deleted file mode 100644
index 5a2ded7f7f4..00000000000
--- a/english/lts/security/2020/dla-2086.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2086-1 wget</define-tag>
-<define-tag report_date>2020-1-29</define-tag>
-<define-tag secrefs>CVE-2016-7098</define-tag>
-<define-tag packages>wget</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2086.wml b/english/lts/security/2020/dla-2086.wml
deleted file mode 100644
index beb6d6dc671..00000000000
--- a/english/lts/security/2020/dla-2086.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in wget, a tool to retrieve files from the web.
-A race condition might occur as files rejected by an access list are kept
-on the disk for the duration of a HTTP connection.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.16-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your wget packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2086.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2087.data b/english/lts/security/2020/dla-2087.data
deleted file mode 100644
index e5d9fe9131f..00000000000
--- a/english/lts/security/2020/dla-2087.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2087-1 suricata</define-tag>
-<define-tag report_date>2020-01-31</define-tag>
-<define-tag secrefs>CVE-2019-18625 CVE-2019-18792</define-tag>
-<define-tag packages>suricata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2087.wml b/english/lts/security/2020/dla-2087.wml
deleted file mode 100644
index 741b3199383..00000000000
--- a/english/lts/security/2020/dla-2087.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have recently been discovered in the stream-tcp code
-of the intrusion detection and prevention tool Suricata.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18625">CVE-2019-18625</a>
-
- <p>It was possible to bypass/evade any tcp based signature by faking a
- closed TCP session using an evil server. After the TCP SYN packet, it
- was possible to inject a RST ACK and a FIN ACK packet with a bad TCP
- Timestamp option. The client would have ignored the RST ACK and the
- FIN ACK packets because of the bad TCP Timestamp option.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18792">CVE-2019-18792</a>
-
- <p>It was possible to bypass/evade any tcp based signature by
- overlapping a TCP segment with a fake FIN packet. The fake FIN packet
- had to be injected just before the PUSH ACK packet we wanted to
- bypass. The PUSH ACK packet (containing the data) would have been
- ignored by Suricata because it would have overlapped the FIN packet
- (the sequence and ack number are identical in the two packets). The
- client would have ignored the fake FIN packet because the ACK flag
- would not have been set.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.0.7-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your suricata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2087.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2088.data b/english/lts/security/2020/dla-2088.data
deleted file mode 100644
index d968da637c9..00000000000
--- a/english/lts/security/2020/dla-2088.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2088-1 libsolv</define-tag>
-<define-tag report_date>2020-01-31</define-tag>
-<define-tag secrefs>CVE-2019-20387 Bug#949611</define-tag>
-<define-tag packages>libsolv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2088.wml b/english/lts/security/2020/dla-2088.wml
deleted file mode 100644
index 795bdc987e4..00000000000
--- a/english/lts/security/2020/dla-2088.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>repodata_schema2id in repodata.c in libsolv, a dependency solver library,
-had a heap-based buffer over-read via a last schema whose length could be
-less than the length of the input schema.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.6.5-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libsolv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2088.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2089.data b/english/lts/security/2020/dla-2089.data
deleted file mode 100644
index 639789cf8d0..00000000000
--- a/english/lts/security/2020/dla-2089.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2089-1 openjpeg2</define-tag>
-<define-tag report_date>2020-01-31</define-tag>
-<define-tag secrefs>CVE-2020-8112 Bug#950184</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2089.wml b/english/lts/security/2020/dla-2089.wml
deleted file mode 100644
index 9802db78e23..00000000000
--- a/english/lts/security/2020/dla-2089.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>opj_t1_clbl_decode_processor in openjp2/t1.c of OpenJPEG had a heap-based
-buffer overflow in the qmfbid==1 case, a similar but different issue than
-<a href="https://security-tracker.debian.org/tracker/CVE-2020-6851">CVE-2020-6851</a>.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-2+deb8u10.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2089.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2090.data b/english/lts/security/2020/dla-2090.data
deleted file mode 100644
index 93ade44aadf..00000000000
--- a/english/lts/security/2020/dla-2090.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2090-1 qemu</define-tag>
-<define-tag report_date>2020-02-05</define-tag>
-<define-tag secrefs>CVE-2020-7039 Bug#949085</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2090.wml b/english/lts/security/2020/dla-2090.wml
deleted file mode 100644
index 4d0ba07c5d7..00000000000
--- a/english/lts/security/2020/dla-2090.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages
-memory, as demonstrated by IRC DCC commands in EMU_IRC.
-This can cause a heap-based buffer overflow or other out-of-bounds access
-which can lead to a DoS or potential execute arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1+dfsg-12+deb8u13.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2090.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2091.data b/english/lts/security/2020/dla-2091.data
deleted file mode 100644
index fa7bcc0dd83..00000000000
--- a/english/lts/security/2020/dla-2091.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2091-1 libjackson-json-java</define-tag>
-<define-tag report_date>2020-01-31</define-tag>
-<define-tag secrefs>CVE-2017-7525 CVE-2017-15095 CVE-2019-10172</define-tag>
-<define-tag packages>libjackson-json-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2091.wml b/english/lts/security/2020/dla-2091.wml
deleted file mode 100644
index 5e020734330..00000000000
--- a/english/lts/security/2020/dla-2091.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were fixed in libjackson-json-java.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7525">CVE-2017-7525</a>
-
- <p>Jackson Deserializer security vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15095">CVE-2017-15095</a>
-
- <p>Block more JDK types from polymorphic deserialization.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10172">CVE-2019-10172</a>
-
- <p>XML external entity vulnerabilities.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.9.2-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libjackson-json-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2091.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2092.data b/english/lts/security/2020/dla-2092.data
deleted file mode 100644
index dec18acb7ba..00000000000
--- a/english/lts/security/2020/dla-2092.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2092-1 qtbase-opensource-src</define-tag>
-<define-tag report_date>2020-02-01</define-tag>
-<define-tag secrefs>CVE-2020-0569</define-tag>
-<define-tag packages>qtbase-opensource-src</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2092.wml b/english/lts/security/2020/dla-2092.wml
deleted file mode 100644
index 072359e1518..00000000000
--- a/english/lts/security/2020/dla-2092.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In Qt5's plugin loader code as found in qtbase-opensource-src, it was
-possible to (side-)load plugins from <q>the</q> local folder in addition to a
-system-widely defined library path.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.3.2+dfsg-4+deb8u4.</p>
-
-<p>We recommend that you upgrade your qtbase-opensource-src packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2092.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2093.data b/english/lts/security/2020/dla-2093.data
deleted file mode 100644
index 2d85c6b8d16..00000000000
--- a/english/lts/security/2020/dla-2093.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2093-1 firefox-esr</define-tag>
-<define-tag report_date>2020-02-01</define-tag>
-<define-tag secrefs>CVE-2019-17026</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2093.wml b/english/lts/security/2020/dla-2093.wml
deleted file mode 100644
index e80b66d00d4..00000000000
--- a/english/lts/security/2020/dla-2093.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was found in the IonMonkey JIT compiler of the Mozilla Firefox
-web browser which could lead to arbitrary code execution.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-68.4.1esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2093.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2094.data b/english/lts/security/2020/dla-2094.data
deleted file mode 100644
index 7e2be52e740..00000000000
--- a/english/lts/security/2020/dla-2094.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2094-1 sudo</define-tag>
-<define-tag report_date>2020-02-02</define-tag>
-<define-tag secrefs>CVE-2019-18634</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2094.wml b/english/lts/security/2020/dla-2094.wml
deleted file mode 100644
index 06cc385da7a..00000000000
--- a/english/lts/security/2020/dla-2094.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A stack-based buffer overflow vulnerability in sudo, a program designed
-to provide limited super user privileges to specific users, triggerable
-when configured with the pwfeedback option enabled. An unprivileged user
-can take advantage of this flaw to obtain full root privileges.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.10p3-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2094.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2095.data b/english/lts/security/2020/dla-2095.data
deleted file mode 100644
index e37a540159f..00000000000
--- a/english/lts/security/2020/dla-2095.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2095-1 storebackup</define-tag>
-<define-tag report_date>2020-02-05</define-tag>
-<define-tag secrefs>CVE-2020-7040 Bug#949393</define-tag>
-<define-tag packages>storebackup</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2095.wml b/english/lts/security/2020/dla-2095.wml
deleted file mode 100644
index 9437fdceeee..00000000000
--- a/english/lts/security/2020/dla-2095.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock
-pathname, which allows symlink attacks that possibly lead to privilege
-escalation.</p>
-
-<p>Local users can also create a plain file named /tmp/storeBackup.lock to block
-use of storeBackup until an admin manually deletes that file.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.2.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your storebackup packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2095.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2096.data b/english/lts/security/2020/dla-2096.data
deleted file mode 100644
index 7eb136fdef8..00000000000
--- a/english/lts/security/2020/dla-2096.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2096-1 ruby-rack-cors</define-tag>
-<define-tag report_date>2020-02-07</define-tag>
-<define-tag secrefs>CVE-2019-18978</define-tag>
-<define-tag packages>ruby-rack-cors</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2096.wml b/english/lts/security/2020/dla-2096.wml
deleted file mode 100644
index c6232a6d5c1..00000000000
--- a/english/lts/security/2020/dla-2096.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This package allowed ../ directory traversal to access private resources
-because resource matching did not ensure that pathnames were in a canonical
-format.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.2.9-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-rack-cors packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2096.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2097.data b/english/lts/security/2020/dla-2097.data
deleted file mode 100644
index 1b588b591fb..00000000000
--- a/english/lts/security/2020/dla-2097.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2097-1 ppp</define-tag>
-<define-tag report_date>2020-2-9</define-tag>
-<define-tag secrefs>CVE-2020-8597 Bug#950618</define-tag>
-<define-tag packages>ppp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2097.wml b/english/lts/security/2020/dla-2097.wml
deleted file mode 100644
index 9c868fe994d..00000000000
--- a/english/lts/security/2020/dla-2097.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ilja Van Sprundel discovered a buffer overflow vulnerability in ppp,
-the Point-to-Point Protocol daemon. When receiving an EAP Request
-message in client mode, an attacker was able to overflow the rhostname
-array by providing a very long name. This issue is also mitigated by
-Debian's hardening build flags.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.4.6-3.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ppp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2097.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2098.data b/english/lts/security/2020/dla-2098.data
deleted file mode 100644
index fca5c06cae7..00000000000
--- a/english/lts/security/2020/dla-2098.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2098-1 ipmitool</define-tag>
-<define-tag report_date>2020-2-9</define-tag>
-<define-tag secrefs>CVE-2020-5208 Bug#950761</define-tag>
-<define-tag packages>ipmitool</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2098.wml b/english/lts/security/2020/dla-2098.wml
deleted file mode 100644
index 5ff660c7c3b..00000000000
--- a/english/lts/security/2020/dla-2098.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Christopher Ertl found that multiple functions in ipmitool neglect
-proper checking of the data received from a remote LAN party, which may
-lead to buffer overflows and potentially to remote code execution on the
-ipmitool side.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.14-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your ipmitool packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2098.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2099.data b/english/lts/security/2020/dla-2099.data
deleted file mode 100644
index b6a7a11eef4..00000000000
--- a/english/lts/security/2020/dla-2099.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2099-1 checkstyle</define-tag>
-<define-tag report_date>2020-2-10</define-tag>
-<define-tag secrefs>CVE-2019-10782</define-tag>
-<define-tag packages>checkstyle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2099.wml b/english/lts/security/2020/dla-2099.wml
deleted file mode 100644
index cbd396ba0c2..00000000000
--- a/english/lts/security/2020/dla-2099.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security researchers from Snyk discovered that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-9658">CVE-2019-9658</a>
-was incomplete. Checkstyle, a development tool to help programmers write
-Java code that adheres to a coding standard, was still vulnerable to XML
-External Entity (XXE) injection.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.9-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your checkstyle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2099.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2100.data b/english/lts/security/2020/dla-2100.data
deleted file mode 100644
index 12b023b8657..00000000000
--- a/english/lts/security/2020/dla-2100.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2100-1 libexif</define-tag>
-<define-tag report_date>2020-02-10</define-tag>
-<define-tag secrefs>CVE-2019-9278 Bug#945948</define-tag>
-<define-tag packages>libexif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2100.wml b/english/lts/security/2020/dla-2100.wml
deleted file mode 100644
index 078d6e6756f..00000000000
--- a/english/lts/security/2020/dla-2100.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>an out-of-bounds write vulnerability due to an integer overflow was reported in
-libexif, a library to parse exif files. This flaw might be leveraged by remote
-attackers to cause denial of service, or potentially execute arbitrary code via
-crafted image files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.6.21-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libexif packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2100.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2101.data b/english/lts/security/2020/dla-2101.data
deleted file mode 100644
index c65f4cc2cb0..00000000000
--- a/english/lts/security/2020/dla-2101.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2101-1 libemail-address-list-perl</define-tag>
-<define-tag report_date>2020-2-12</define-tag>
-<define-tag secrefs>CVE-2018-18898</define-tag>
-<define-tag packages>libemail-address-list-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2101.wml b/english/lts/security/2020/dla-2101.wml
deleted file mode 100644
index bf13dc65e54..00000000000
--- a/english/lts/security/2020/dla-2101.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An denial of service via an algorithmic complexity attack on email address
-parsing have been identified in libemail-address-list-perl.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.05-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libemail-address-list-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>--u3/rZRmxL6MmkK24
-Content-Type: application/pgp-signature; name="signature.asc"</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2101.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2102.data b/english/lts/security/2020/dla-2102.data
deleted file mode 100644
index c71f42cafbc..00000000000
--- a/english/lts/security/2020/dla-2102.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2102-1 firefox-esr</define-tag>
-<define-tag report_date>2020-02-13</define-tag>
-<define-tag secrefs>CVE-2020-6796 CVE-2020-6798 CVE-2020-6800</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2102.wml b/english/lts/security/2020/dla-2102.wml
deleted file mode 100644
index da77f699aa2..00000000000
--- a/english/lts/security/2020/dla-2102.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.5.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2102.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2103.data b/english/lts/security/2020/dla-2103.data
deleted file mode 100644
index a1d3d326954..00000000000
--- a/english/lts/security/2020/dla-2103.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2103-1 debian-security-support</define-tag>
-<define-tag report_date>2020-02-13</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2103.wml b/english/lts/security/2020/dla-2103.wml
deleted file mode 100644
index b7540f3c18e..00000000000
--- a/english/lts/security/2020/dla-2103.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>debian-security-support, the Debian security support coverage checker,
-has been updated in jessie-security.</p>
-
-<p>This marks the end of life of the libqb package in jessie. A recently
-reported vulnerability against libqb which allows users to overwrite
-arbitrary files via a symlink attack cannot be adequately addressed in
-libqb in jessie. Upstream no longer supports this version and no
-packages in jessie depend upon libqb.</p>
-
-<p>We recommend that if your systems or applications depend upon the libqb
-package provided from the Debian archive that you upgrade your systems
-to a more recent Debian release or find an alternate and up to date
-source of libqb packages.</p>
-
-<p>Additionally, MySQL 5.5 is no longer supported. Upstream has ended its
-support and we are unable to backport fixes from newer versions due to
-the lack of patch details. Options are to switch to MariaDB 10.0 in
-jessie or to a newer version of MySQL in more recent Debian releases.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at:
-<a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a>https://wiki.debian.org/LTS</p>
-
-<p>For Debian 8 <q>Lenny</q>, these issues have been fixed in
-debian-security-support version 2019.12.12~deb8u2</p>
-</define-tag>
-
-
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2103.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2104.data b/english/lts/security/2020/dla-2104.data
deleted file mode 100644
index 26aca557c34..00000000000
--- a/english/lts/security/2020/dla-2104.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2104-1 thunderbird</define-tag>
-<define-tag report_date>2020-02-17</define-tag>
-<define-tag secrefs>CVE-2020-6792 CVE-2020-6793 CVE-2020-6794 CVE-2020-6795 CVE-2020-6798 CVE-2020-6800</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2104.wml b/english/lts/security/2020/dla-2104.wml
deleted file mode 100644
index 6c5423af376..00000000000
--- a/english/lts/security/2020/dla-2104.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.5.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2104.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2105.data b/english/lts/security/2020/dla-2105.data
deleted file mode 100644
index 7bb5d04526b..00000000000
--- a/english/lts/security/2020/dla-2105.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2105-1 postgresql-9.4</define-tag>
-<define-tag report_date>2020-2-17</define-tag>
-<define-tag secrefs>CVE-2020-1720</define-tag>
-<define-tag packages>postgresql-9.4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2105.wml b/english/lts/security/2020/dla-2105.wml
deleted file mode 100644
index 75ddb684eed..00000000000
--- a/english/lts/security/2020/dla-2105.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tom Lane discovered that <q>ALTER ... DEPENDS ON EXTENSION</q> sub commands
-in the PostgreSQL database did not perform authorisation checks.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-9.4.26-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.4_9.4.26-0+deb8u1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2105.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2106.data b/english/lts/security/2020/dla-2106.data
deleted file mode 100644
index 63d298452dc..00000000000
--- a/english/lts/security/2020/dla-2106.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2106-1 libgd2</define-tag>
-<define-tag report_date>2020-02-17</define-tag>
-<define-tag secrefs>CVE-2018-14553 Bug#951287</define-tag>
-<define-tag packages>libgd2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2106.wml b/english/lts/security/2020/dla-2106.wml
deleted file mode 100644
index 38b5e421b4d..00000000000
--- a/english/lts/security/2020/dla-2106.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in libgd2, the GD graphics library,
-whereby an attacker can employ a specific function call sequence to
-trigger a NULL pointer dereference, subsequently crash the application
-using libgd2, and create a denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-5+deb8u14.</p>
-
-<p>We recommend that you upgrade your libgd2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2106.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2107.data b/english/lts/security/2020/dla-2107.data
deleted file mode 100644
index 1c3aac5a8d5..00000000000
--- a/english/lts/security/2020/dla-2107.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2107-1 spamassassin</define-tag>
-<define-tag report_date>2020-02-18</define-tag>
-<define-tag secrefs>CVE-2020-1930 CVE-2020-1931 Bug#950258</define-tag>
-<define-tag packages>spamassassin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2107.wml b/english/lts/security/2020/dla-2107.wml
deleted file mode 100644
index f222200f949..00000000000
--- a/english/lts/security/2020/dla-2107.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in spamassassin, a Perl-based spam
-filter using text analysis. Malicious rule or configuration files,
-possibly downloaded from an updates server, could execute arbitrary
-commands under multiple scenarios.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.4.2-0+deb8u3.</p>
-
-<p>We recommend that you upgrade your spamassassin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2107.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2108.data b/english/lts/security/2020/dla-2108.data
deleted file mode 100644
index 8ee9395ed54..00000000000
--- a/english/lts/security/2020/dla-2108.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2108-1 clamav</define-tag>
-<define-tag report_date>2020-02-18</define-tag>
-<define-tag secrefs>CVE-2019-15961 Bug#945265</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2108.wml b/english/lts/security/2020/dla-2108.wml
deleted file mode 100644
index 440d9ef5860..00000000000
--- a/english/lts/security/2020/dla-2108.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that ClamAV, an antivirus software, was susceptible to a
-denial of service attack by unauthenticated users via inefficient MIME
-parsing of especially crafted email files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.101.5+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2108.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2109.data b/english/lts/security/2020/dla-2109.data
deleted file mode 100644
index 23fe33461a7..00000000000
--- a/english/lts/security/2020/dla-2109.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2109-1 netty</define-tag>
-<define-tag report_date>2020-02-19</define-tag>
-<define-tag secrefs>CVE-2019-20444 CVE-2019-20445 CVE-2020-7238 Bug#950966 Bug#950967</define-tag>
-<define-tag packages>netty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2109.wml b/english/lts/security/2020/dla-2109.wml
deleted file mode 100644
index 5b3a5cb5bdb..00000000000
--- a/english/lts/security/2020/dla-2109.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in the HTTP server provided by
-Netty, a Java NIO client/server socket framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20444">CVE-2019-20444</a>
-
- <p>HttpObjectDecoder.java allows an HTTP header that lacks a colon,
- which might be interpreted as a separate header with an incorrect
- syntax, or might be interpreted as an "invalid fold."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20445">CVE-2019-20445</a>
-
- <p>HttpObjectDecoder.java allows a Content-Length header to be
- accompanied by a second Content-Length header, or by a
- Transfer-Encoding header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7238">CVE-2020-7238</a>
-
- <p>Netty allows HTTP Request Smuggling because it mishandles
- Transfer-Encoding whitespace (such as a
- [space]Transfer-Encoding:chunked line) and a later Content-Length
- header.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:3.2.6.Final-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your netty packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2109.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2110.data b/english/lts/security/2020/dla-2110.data
deleted file mode 100644
index 03f69d19c54..00000000000
--- a/english/lts/security/2020/dla-2110.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2110-1 netty-3.9</define-tag>
-<define-tag report_date>2020-02-19</define-tag>
-<define-tag secrefs>CVE-2014-0193 CVE-2014-3488 CVE-2019-16869 CVE-2019-20444 CVE-2019-20445 CVE-2020-7238 Bug#746639 Bug#941266 Bug#950966 Bug#950967</define-tag>
-<define-tag packages>netty-3.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2110.wml b/english/lts/security/2020/dla-2110.wml
deleted file mode 100644
index 1ca22380730..00000000000
--- a/english/lts/security/2020/dla-2110.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in Netty, a Java NIO
-client/server socket framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0193">CVE-2014-0193</a>
-
- <p>WebSocket08FrameDecoder allows remote attackers to cause a denial
- of service (memory consumption) via a TextWebSocketFrame followed
- by a long stream of ContinuationWebSocketFrames.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3488">CVE-2014-3488</a>
-
- <p>The SslHandler allows remote attackers to cause a denial of
- service (infinite loop and CPU consumption) via a crafted
- SSLv2Hello message.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16869">CVE-2019-16869</a>
-
- <p>Netty mishandles whitespace before the colon in HTTP headers (such
- as a "Transfer-Encoding : chunked" line), which leads to HTTP
- request smuggling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20444">CVE-2019-20444</a>
-
- <p>HttpObjectDecoder.java allows an HTTP header that lacks a colon,
- which might be interpreted as a separate header with an incorrect
- syntax, or might be interpreted as an "invalid fold."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20445">CVE-2019-20445</a>
-
- <p>HttpObjectDecoder.java allows a Content-Length header to be
- accompanied by a second Content-Length header, or by a
- Transfer-Encoding header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7238">CVE-2020-7238</a>
-
- <p>Netty allows HTTP Request Smuggling because it mishandles
- Transfer-Encoding whitespace (such as a
- [space]Transfer-Encoding:chunked line) and a later Content-Length
- header.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.9.0.Final-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your netty-3.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2110.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2111.data b/english/lts/security/2020/dla-2111.data
deleted file mode 100644
index cdefdb0466d..00000000000
--- a/english/lts/security/2020/dla-2111.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2111-1 jackson-databind</define-tag>
-<define-tag report_date>2020-02-20</define-tag>
-<define-tag secrefs>CVE-2019-20330 CVE-2020-8840</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2111.wml b/english/lts/security/2020/dla-2111.wml
deleted file mode 100644
index b06ec0c91c6..00000000000
--- a/english/lts/security/2020/dla-2111.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that jackson-databind, a Java library used to parse JSON and
-other data formats, could deserialize data without proper validation,
-allowing a maliciously client to perform remote code execution on a
-service with the required characteristics.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u11.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2111.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2112.data b/english/lts/security/2020/dla-2112.data
deleted file mode 100644
index 5af702f53a7..00000000000
--- a/english/lts/security/2020/dla-2112.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2112-1 python-reportlab</define-tag>
-<define-tag report_date>2020-02-20</define-tag>
-<define-tag secrefs>CVE-2019-17626 Bug#942763</define-tag>
-<define-tag packages>python-reportlab</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2112.wml b/english/lts/security/2020/dla-2112.wml
deleted file mode 100644
index 9c236a66f7f..00000000000
--- a/english/lts/security/2020/dla-2112.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that ReportLab, a Python library to create PDF documents,
-did not properly parse color strings, allowing an attacker to execute
-arbitrary code through a crafted input document.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.1.8-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your python-reportlab packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2112.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2113.data b/english/lts/security/2020/dla-2113.data
deleted file mode 100644
index bde6cf51a9b..00000000000
--- a/english/lts/security/2020/dla-2113.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2113-1 cloud-init</define-tag>
-<define-tag report_date>2020-02-21</define-tag>
-<define-tag secrefs>CVE-2020-8631 CVE-2020-8632 Bug#951362 Bug#951363</define-tag>
-<define-tag packages>cloud-init</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2113.wml b/english/lts/security/2020/dla-2113.wml
deleted file mode 100644
index 77d4f849f7a..00000000000
--- a/english/lts/security/2020/dla-2113.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2020-8631">CVE-2020-8631</a></p>
-
- <p>In cloud-init, relies on Mersenne Twister for a random password, which
- makes it easier for attackers to predict passwords, because rand_str in
- cloudinit/util.py calls the random.choice function.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8632">CVE-2020-8632</a>
-
- <p>In cloud-init, rand_user_password in cloudinit/config/cc_set_passwords.py
- has a small default pwlen value, which makes it easier for attackers to
- guess passwords.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.7.6~bzr976-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your cloud-init packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2113.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2114.data b/english/lts/security/2020/dla-2114.data
deleted file mode 100644
index 01ccc1cbd6a..00000000000
--- a/english/lts/security/2020/dla-2114.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2114-1 linux-4.9</define-tag>
-<define-tag report_date>2020-03-02</define-tag>
-<define-tag secrefs>CVE-2018-13093 CVE-2018-13094 CVE-2018-20976 CVE-2018-21008 CVE-2019-0136 CVE-2019-2215 CVE-2019-10220 CVE-2019-14615 CVE-2019-14814 CVE-2019-14815 CVE-2019-14816 CVE-2019-14895 CVE-2019-14896 CVE-2019-14897 CVE-2019-14901 CVE-2019-15098 CVE-2019-15217 CVE-2019-15291 CVE-2019-15505 CVE-2019-15917 CVE-2019-16746 CVE-2019-17052 CVE-2019-17053 CVE-2019-17054 CVE-2019-17055 CVE-2019-17056 CVE-2019-17075 CVE-2019-17133 CVE-2019-17666 CVE-2019-18282 CVE-2019-18683 CVE-2019-18809 CVE-2019-19037 CVE-2019-19051 CVE-2019-19052 CVE-2019-19056 CVE-2019-19057 CVE-2019-19062 CVE-2019-19066 CVE-2019-19068 CVE-2019-19227 CVE-2019-19332 CVE-2019-19447 CVE-2019-19523 CVE-2019-19524 CVE-2019-19525 CVE-2019-19527 CVE-2019-19530 CVE-2019-19531 CVE-2019-19532 CVE-2019-19533 CVE-2019-19534 CVE-2019-19535 CVE-2019-19536 CVE-2019-19537 CVE-2019-19767 CVE-2019-19947 CVE-2019-19965 CVE-2019-20096 Bug#869511 Bug#945023</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2114.wml b/english/lts/security/2020/dla-2114.wml
deleted file mode 100644
index 70c73056bc1..00000000000
--- a/english/lts/security/2020/dla-2114.wml
+++ /dev/null
@@ -1,371 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13093">CVE-2018-13093</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-13094">CVE-2018-13094</a>
-
- <p>Wen Xu from SSLab at Gatech reported several NULL pointer
- dereference flaws that may be triggered when mounting and
- operating a crafted XFS volume. An attacker able to mount
- arbitrary XFS volumes could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20976">CVE-2018-20976</a>
-
- <p>It was discovered that the XFS file-system implementation did not
- correctly handle some mount failure conditions, which could lead
- to a use-after-free. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-21008">CVE-2018-21008</a>
-
- <p>It was discovered that the rsi wifi driver did not correctly
- handle some failure conditions, which could lead to a use-after free. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0136">CVE-2019-0136</a>
-
- <p>It was discovered that the wifi soft-MAC implementation (mac80211)
- did not properly authenticate Tunneled Direct Link Setup (TDLS)
- messages. A nearby attacker could use this for denial of service
- (loss of wifi connectivity).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-2215">CVE-2019-2215</a>
-
- <p>The syzkaller tool discovered a use-after-free vulnerability in
- the Android binder driver. A local user on a system with this
- driver enabled could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.
- However, this driver is not enabled on Debian packaged kernels.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10220">CVE-2019-10220</a>
-
- <p>Various developers and researchers found that if a crafted file system or malicious file server presented a directory with
- filenames including a '/' character, this could confuse and
- possibly defeat security checks in applications that read the
- directory.</p>
-
- <p>The kernel will now return an error when reading such a directory,
- rather than passing the invalid filenames on to user-space.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14615">CVE-2019-14615</a>
-
- <p>It was discovered that Intel 9th and 10th generation GPUs did not
- clear user-visible state during a context switch, which resulted
- in information leaks between GPU tasks. This has been mitigated
- in the i915 driver.</p>
-
- <p>The affected chips (gen9 and gen10) are listed at
- <url "https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen9">.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14814">CVE-2019-14814</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14815">CVE-2019-14815</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14816">CVE-2019-14816</a>
-
- <p>Multiple bugs were discovered in the mwifiex wifi driver, which
- could lead to heap buffer overflows. A local user permitted to
- configure a device handled by this driver could probably use this
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14895">CVE-2019-14895</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14901">CVE-2019-14901</a>
-
- <p>ADLab of Venustech discovered potential heap buffer overflows in
- the mwifiex wifi driver. On systems using this driver, a
- malicious Wireless Access Point or adhoc/P2P peer could use these
- to cause a denial of service (memory corruption or crash) or
- possibly for remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14896">CVE-2019-14896</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-14897">CVE-2019-14897</a>
-
- <p>ADLab of Venustech discovered potential heap and stack buffer
- overflows in the libertas wifi driver. On systems using this
- driver, a malicious Wireless Access Point or adhoc/P2P peer could
- use these to cause a denial of service (memory corruption or
- crash) or possibly for remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15098">CVE-2019-15098</a>
-
- <p>Hui Peng and Mathias Payer reported that the ath6kl wifi driver
- did not properly validate USB descriptors, which could lead to a
- null pointer derefernce. An attacker able to add USB devices
- could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15217">CVE-2019-15217</a>
-
- <p>The syzkaller tool discovered that the zr364xx mdia driver did not
- correctly handle devices without a product name string, which
- could lead to a null pointer dereference. An attacker able to add
- USB devices could use this to cause a denial of service
- (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15291">CVE-2019-15291</a>
-
- <p>The syzkaller tool discovered that the b2c2-flexcop-usb media
- driver did not properly validate USB descriptors, which could lead
- to a null pointer dereference. An attacker able to add USB
- devices could use this to cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15505">CVE-2019-15505</a>
-
- <p>The syzkaller tool discovered that the technisat-usb2 media driver
- did not properly validate incoming IR packets, which could lead to
- a heap buffer over-read. An attacker able to add USB devices
- could use this to cause a denial of service (BUG/oops) or to read
- sensitive information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15917">CVE-2019-15917</a>
-
- <p>The syzkaller tool found a race condition in code supporting
- UART-attached Bluetooth adapters, which could lead to a use after-free. A local user with access to a pty device or other
- suitable tty device could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16746">CVE-2019-16746</a>
-
- <p>It was discovered that the wifi stack did not validate the content
- of beacon heads provided by user-space for use on a wifi interface
- in Access Point mode, which could lead to a heap buffer overflow.
- A local user permitted to configure a wifi interface could use
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17052">CVE-2019-17052</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17053">CVE-2019-17053</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17054">CVE-2019-17054</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17055">CVE-2019-17055</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-17056">CVE-2019-17056</a>
-
- <p>Ori Nimron reported that various network protocol implementations
- - AX.25, IEEE 802.15.4, Appletalk, ISDN, and NFC - allowed all
- users to create raw sockets. A local user could use this to send
- arbitrary packets on networks using those protocols.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17075">CVE-2019-17075</a>
-
- <p>It was found that the cxgb4 Infiniband driver requested DMA
- (Direct Memory Access) to a stack-allocated buffer, which is not
- supported and on some systems can result in memory corruption of
- the stack. A local user might be able to use this for denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17133">CVE-2019-17133</a>
-
- <p>Nicholas Waisman reported that the wifi stack did not valdiate
- received SSID information before copying it, which could lead to a
- buffer overflow if it is not validated by the driver or firmware.
- A malicious Wireless Access Point might be able to use this to
- cause a denial of service (memory corruption or crash) or for
- remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17666">CVE-2019-17666</a>
-
- <p>Nicholas Waisman reported that the rtlwifi wifi drivers did not
- properly validate received P2P information, leading to a buffer
- overflow. A malicious P2P peer could use this to cause a denial
- of service (memory corruption or crash) or for remote code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18282">CVE-2019-18282</a>
-
- <p>Jonathan Berger, Amit Klein, and Benny Pinkas discovered that the
- generation of UDP/IPv6 flow labels used a weak hash function,
- <q>jhash</q>. This could enable tracking individual computers as they
- communicate with different remote servers and from different
- networks. The <q>siphash</q> function is now used instead.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18683">CVE-2019-18683</a>
-
- <p>Multiple race conditions were discovered in the vivid media
- driver, used for testing Video4Linux2 (V4L2) applications,
- These race conditions could result in a use-after-free. On a
- system where this driver is loaded, a user with permission
- to access media devices could use this to cause a denial
- of service (memory corruption or crash) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18809">CVE-2019-18809</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the af9005
- media driver if the device fails to respond to a command. The
- security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19037">CVE-2019-19037</a>
-
- <p>It was discovered that the ext4 filesystem driver did not
- correctly handle directories with holes (unallocated regions) in
- them. An attacker able to mount arbitrary ext4 volumes could use
- this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19051">CVE-2019-19051</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the i2400m
- wimax driver if the software rfkill operation fails. The security
- impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19052">CVE-2019-19052</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the gs_usb
- CAN driver if the open (interface-up) operation fails. The
- security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19056">CVE-2019-19056</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19057">CVE-2019-19057</a>
-
- <p>Navid Emamdoost discovered potential memory leaks in the mwifiex
- wifi driver if the probe operation fails. The security impact of
- this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19062">CVE-2019-19062</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the AF_ALG
- subsystem if the CRYPTO_MSG_GETALG operation fails. A local user
- could possibly use this to cause a denial of service (memory
- exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19066">CVE-2019-19066</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the bfa SCSI
- driver if the get_fc_host_stats operation fails. The security
- impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19068">CVE-2019-19068</a>
-
- <p>Navid Emamdoost discovered a potential memory leak in the rtl8xxxu
- wifi driver, in case it fails to submit an interrupt buffer to the
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19227">CVE-2019-19227</a>
-
- <p>Dan Carpenter reported missing error checks in the Appletalk
- protocol implementation that could lead to a null pointer
- dereference. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19332">CVE-2019-19332</a>
-
- <p>The syzkaller tool discovered a missing bounds check in the KVM
- implementation for x86, which could lead to a heap buffer overflow.
- A local user permitted to use KVM could use this to cause a denial
- of service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19447">CVE-2019-19447</a>
-
- <p>It was discovered that the ext4 filesystem driver did not safely
- handle unlinking of an inode that, due to filesystem corruption,
- already has a link count of 0. An attacker able to mount
- arbitrary ext4 volumes could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19523">CVE-2019-19523</a>
-
- <p>The syzkaller tool discovered a use-after-free bug in the adutux
- USB driver. An attacker able to add and remove USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19524">CVE-2019-19524</a>
-
- <p>The syzkaller tool discovered a race condition in the ff-memless
- library used by input drivers. An attacker able to add and remove
- USB devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19525">CVE-2019-19525</a>
-
- <p>The syzkaller tool discovered a use-after-free bug in the atusb
- driver for IEEE 802.15.4 networking. An attacker able to add and
- remove USB devices could possibly use this to cause a denial of
- service (memory corruption or crash) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19527">CVE-2019-19527</a>
-
- <p>The syzkaller tool discovered that the hiddev driver did not
- correctly handle races between a task opening the device and
- disconnection of the underlying hardware. A local user permitted
- to access hiddev devices, and able to add and remove USB devices,
- could use this to cause a denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19530">CVE-2019-19530</a>
-
- <p>The syzkaller tool discovered a potential use-after-free in the
- cdc-acm network driver. An attacker able to add USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19531">CVE-2019-19531</a>
-
- <p>The syzkaller tool discovered a use-after-free bug in the yurex
- USB driver. An attacker able to add and remove USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19532">CVE-2019-19532</a>
-
- <p>The syzkaller tool discovered a potential heap buffer overflow in
- the hid-gaff input driver, which was also found to exist in many
- other input drivers. An attacker able to add USB devices could
- use this to cause a denial of service (memory corruption or crash)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19533">CVE-2019-19533</a>
-
- <p>The syzkaller tool discovered that the ttusb-dec media driver was
- missing initialisation of a structure, which could leak sensitive
- information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19534">CVE-2019-19534</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19535">CVE-2019-19535</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19536">CVE-2019-19536</a>
-
- <p>The syzkaller tool discovered that the peak_usb CAN driver was
- missing initialisation of some structures, which could leak
- sensitive information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19537">CVE-2019-19537</a>
-
- <p>The syzkaller tool discovered race conditions in the USB stack,
- involving character device registration. An attacker able to add
- USB devices could use this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19767">CVE-2019-19767</a>
-
- <p>The syzkaller tool discovered that crafted ext4 volumes could
- trigger a buffer overflow in the ext4 filesystem driver. An
- attacker able to mount such a volume could use this to cause a
- denial of service (memory corruption or crash) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19947">CVE-2019-19947</a>
-
- <p>It was discovered that the kvaser_usb CAN driver was missing
- initialisation of some structures, which could leak sensitive
- information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19965">CVE-2019-19965</a>
-
- <p>Gao Chuan reported a race condition in the libsas library used by
- SCSI host drivers, which could lead to a null pointer dereference.
- An attacker able to add and remove SCSI devices could use this to
- cause a denial of service (BUG/oops).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20096">CVE-2019-20096</a>
-
- <p>The Hulk Robot tool discovered a potential memory leak in the DCCP
- protocol implementation. This may be exploitable by local users,
- or by remote attackers if the system uses DCCP, to cause a denial
- of service (out of memory).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in
-version 4.9.210-1~deb8u1. This update additionally fixes Debian bugs
-<a href="https://bugs.debian.org/869511">#869511</a> and <a
-href="https://bugs.debian.org/945023">#945023</a>; and includes many
-more bug fixes from stable updates 4.9.190-4.9.210 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2114.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2115-2.data b/english/lts/security/2020/dla-2115-2.data
deleted file mode 100644
index 53705a69ace..00000000000
--- a/english/lts/security/2020/dla-2115-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2115-2 proftpd-dfsg regression update</define-tag>
-<define-tag report_date>2020-03-02</define-tag>
-<define-tag secrefs>CVE-2020-9273</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2115-2.wml b/english/lts/security/2020/dla-2115-2.wml
deleted file mode 100644
index 98497f67967..00000000000
--- a/english/lts/security/2020/dla-2115-2.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a regression in a previous fix for a
-use-after-free vulnerability in the <tt>proftpd-dfsg</tt> FTP server.</p>
-
-<p>Exploitation of the original vulnerability within the memory pool handling
-could have allowed a remote attacker to execute arbitrary code on the affected
-system. However, the fix that was released in <tt>proftpd-dfsg</tt> version
-<tt>1.3.5e+r1.3.5-2+deb8u6</tt> had a regression around the handling of log
-formatting.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9273">CVE-2020-9273</a>
-
- <p>In ProFTPD 1.3.7, it is possible to corrupt the memory pool by
- interrupting the data transfer channel. This triggers a use-after-free in
- <tt>alloc_pool</tt> in <tt>pool.c</tt>, and possible remote code
- execution.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.5e+r1.3.5-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2115-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2115.data b/english/lts/security/2020/dla-2115.data
deleted file mode 100644
index 363a38ac8a0..00000000000
--- a/english/lts/security/2020/dla-2115.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2115-1 proftpd-dfsg</define-tag>
-<define-tag report_date>2020-02-21</define-tag>
-<define-tag secrefs>CVE-2020-9273</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2115.wml b/english/lts/security/2020/dla-2115.wml
deleted file mode 100644
index d5f8a60c91a..00000000000
--- a/english/lts/security/2020/dla-2115.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a use-after-free vulnerability in in the
-<tt>proftpd-dfsg</tt> FTP server.</p>
-
-<p>Exploitation of this vulnerability within the memory pool handling
-could have allowed a remote attacker to execute arbitrary code on the
-affected system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9273">CVE-2020-9273</a>
-
- <p>In ProFTPD 1.3.7, it is possible to corrupt the memory pool by
- interrupting the data transfer channel. This triggers a use-after-free in
- <tt>alloc_pool</tt> in <tt>pool.c</tt>, and possible remote code
- execution.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.5e+r1.3.5-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2115.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2116.data b/english/lts/security/2020/dla-2116.data
deleted file mode 100644
index a49de8cb103..00000000000
--- a/english/lts/security/2020/dla-2116.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2116-1 libpam-radius-auth</define-tag>
-<define-tag report_date>2020-02-22</define-tag>
-<define-tag secrefs>CVE-2015-9542 Bug#951396</define-tag>
-<define-tag packages>libpam-radius-auth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2116.wml b/english/lts/security/2020/dla-2116.wml
deleted file mode 100644
index 38afe6c1714..00000000000
--- a/english/lts/security/2020/dla-2116.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was found in pam_radius: the password length check
-was done incorrectly in the add_password() function in pam_radius_auth.c,
-resulting in a stack based buffer overflow.</p>
-
-<p>This could be used to crash (DoS) an application using the PAM stack
-for authentication.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.16-4.4+deb8u1.</p>
-
-<p>We recommend that you upgrade your libpam-radius-auth packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2116.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2117.data b/english/lts/security/2020/dla-2117.data
deleted file mode 100644
index 0dc62a28214..00000000000
--- a/english/lts/security/2020/dla-2117.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2117-1 zsh</define-tag>
-<define-tag report_date>2020-02-24</define-tag>
-<define-tag secrefs>CVE-2019-20044 Bug#951458</define-tag>
-<define-tag packages>zsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2117.wml b/english/lts/security/2020/dla-2117.wml
deleted file mode 100644
index 8657cf48785..00000000000
--- a/english/lts/security/2020/dla-2117.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A privilege escalation vulnerability was discovered in zsh, a shell with
-lots of features, whereby a user could regain a formerly elevated
-privelege level even when such an action should not be permitted.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.0.7-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your zsh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2117.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2118.data b/english/lts/security/2020/dla-2118.data
deleted file mode 100644
index 455e61beec7..00000000000
--- a/english/lts/security/2020/dla-2118.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2118-1 otrs2</define-tag>
-<define-tag report_date>2020-02-24</define-tag>
-<define-tag secrefs>CVE-2019-11358 Bug#927385</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2118.wml b/english/lts/security/2020/dla-2118.wml
deleted file mode 100644
index 3dc7ce00b0a..00000000000
--- a/english/lts/security/2020/dla-2118.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the jQuery version embedded in OTRS, a ticket
-request system, was prone to a cross site scripting vulnerability in
-jQuery.extend().</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.3.18-1+deb8u14.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2118.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2119.data b/english/lts/security/2020/dla-2119.data
deleted file mode 100644
index 0f01d0b310d..00000000000
--- a/english/lts/security/2020/dla-2119.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2119-1 python-pysaml2</define-tag>
-<define-tag report_date>2020-02-26</define-tag>
-<define-tag secrefs>CVE-2020-5390 Bug#949322</define-tag>
-<define-tag packages>python-pysaml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2119.wml b/english/lts/security/2020/dla-2119.wml
deleted file mode 100644
index 8cae544aa0e..00000000000
--- a/english/lts/security/2020/dla-2119.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that pysaml2, a Python implementation of SAML to be
-used in a WSGI environment, was susceptible to XML signature wrapping
-attacks, which could result in a bypass of signature verification.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.0-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your python-pysaml2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2119.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2120.data b/english/lts/security/2020/dla-2120.data
deleted file mode 100644
index 9aa5168a6b4..00000000000
--- a/english/lts/security/2020/dla-2120.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2120-1 rake</define-tag>
-<define-tag report_date>2020-02-26</define-tag>
-<define-tag secrefs>CVE-2020-8130</define-tag>
-<define-tag packages>rake</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2120.wml b/english/lts/security/2020/dla-2120.wml
deleted file mode 100644
index f1f38d23466..00000000000
--- a/english/lts/security/2020/dla-2120.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>There is an OS command injection vulnerability in Rake (a ruby make-like
-utility) < 12.3.3 in Rake::FileList when supplying a filename that
-begins with the pipe character `|`.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-10.3.2-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your rake packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2120.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2121.data b/english/lts/security/2020/dla-2121.data
deleted file mode 100644
index 37e9a17fda7..00000000000
--- a/english/lts/security/2020/dla-2121.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2121-1 libimobiledevice</define-tag>
-<define-tag report_date>2020-02-27</define-tag>
-<define-tag secrefs>CVE-2016-5104 Bug#825553</define-tag>
-<define-tag packages>libimobiledevice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2121.wml b/english/lts/security/2020/dla-2121.wml
deleted file mode 100644
index fac6de6c9b5..00000000000
--- a/english/lts/security/2020/dla-2121.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libimobiledevice incorrectly handled socket
-permissions. A remote attacker could use this issue to access
-services on iOS devices, contrary to expectations.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.1.6+dfsg-3.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libimobiledevice packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2121.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2122.data b/english/lts/security/2020/dla-2122.data
deleted file mode 100644
index 26b94531a53..00000000000
--- a/english/lts/security/2020/dla-2122.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2122-1 libusbmuxd</define-tag>
-<define-tag report_date>2020-02-27</define-tag>
-<define-tag secrefs>CVE-2016-5104 Bug#825554</define-tag>
-<define-tag packages>libusbmuxd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2122.wml b/english/lts/security/2020/dla-2122.wml
deleted file mode 100644
index 22104376596..00000000000
--- a/english/lts/security/2020/dla-2122.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libusbmuxd incorrectly handled socket
-permissions. A remote attacker could use this issue to access
-services on iOS devices, contrary to expectations.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.9-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libusbmuxd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2122.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2123.data b/english/lts/security/2020/dla-2123.data
deleted file mode 100644
index 061069bdd86..00000000000
--- a/english/lts/security/2020/dla-2123.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2123-1 pure-ftpd</define-tag>
-<define-tag report_date>2020-02-27</define-tag>
-<define-tag secrefs>CVE-2020-9274 Bug#952666</define-tag>
-<define-tag packages>pure-ftpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2123.wml b/english/lts/security/2020/dla-2123.wml
deleted file mode 100644
index d4320fd04cd..00000000000
--- a/english/lts/security/2020/dla-2123.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An uninitialized pointer vulnerability was discovered in pure-ftpd, a
-secure and efficient FTP server, which could result in an out-of-bounds
-memory read and potential information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.36-3.2+deb8u1.</p>
-
-<p>We recommend that you upgrade your pure-ftpd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2123.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2124.data b/english/lts/security/2020/dla-2124.data
deleted file mode 100644
index 037399b68a9..00000000000
--- a/english/lts/security/2020/dla-2124.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2124-1 php5</define-tag>
-<define-tag report_date>2020-2-28</define-tag>
-<define-tag secrefs>CVE-2020-7059 CVE-2020-7060</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2124.wml b/english/lts/security/2020/dla-2124.wml
deleted file mode 100644
index 3277d01f2c4..00000000000
--- a/english/lts/security/2020/dla-2124.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in php5, a server-side, HTML-embedded scripting
-language. Both issues are related to crafted data that could lead to
-reading after an allocated buffer and result in information disclosure or
-crash.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u9.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2124.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2125.data b/english/lts/security/2020/dla-2125.data
deleted file mode 100644
index fc1c71b6441..00000000000
--- a/english/lts/security/2020/dla-2125.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2125-1 collabtive</define-tag>
-<define-tag report_date>2020-2-28</define-tag>
-<define-tag secrefs>CVE-2015-0258</define-tag>
-<define-tag packages>collabtive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2125.wml b/english/lts/security/2020/dla-2125.wml
deleted file mode 100644
index 65e4d927b77..00000000000
--- a/english/lts/security/2020/dla-2125.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in collabtive, a web-based project management
-software. Due to missing checks an attacker could upload scripts, which
-would execute code on the server by accessing for example avatar images.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0+dfsg-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your collabtive packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2125.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2126.data b/english/lts/security/2020/dla-2126.data
deleted file mode 100644
index 4a321ea977a..00000000000
--- a/english/lts/security/2020/dla-2126.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2126-1 gst-plugins-base0.10</define-tag>
-<define-tag report_date>2020-2-28</define-tag>
-<define-tag secrefs>CVE-2016-9811 CVE-2017-5837 CVE-2017-5844</define-tag>
-<define-tag packages>gst-plugins-base0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2126.wml b/english/lts/security/2020/dla-2126.wml
deleted file mode 100644
index 7910148c305..00000000000
--- a/english/lts/security/2020/dla-2126.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Some isses have been found in gst-plugins-base0.10, a package that
-provides GStreamer plugins from the <q>base</q> set.
-All issues are related to crafted ico-files that could result in an
-out-of-bounds read or crafted video- and ASDF-files that could produce
-floating point exceptions, which could cause a denial of service.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.10.36-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2126.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2127.data b/english/lts/security/2020/dla-2127.data
deleted file mode 100644
index d8a49c6bcaa..00000000000
--- a/english/lts/security/2020/dla-2127.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2127-1 dojo</define-tag>
-<define-tag report_date>2020-02-29</define-tag>
-<define-tag secrefs>CVE-2019-10785 Bug#952771</define-tag>
-<define-tag packages>dojo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2127.wml b/english/lts/security/2020/dla-2127.wml
deleted file mode 100644
index 6a205192be6..00000000000
--- a/english/lts/security/2020/dla-2127.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>dojox was vulnerable to Cross-site Scripting. This was due
-to dojox.xmpp.util.xmlEncode only encoding the first occurrence of
-each character, not all of them.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.10.2+dfsg-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your dojo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2127.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2128.data b/english/lts/security/2020/dla-2128.data
deleted file mode 100644
index 00edc7e3237..00000000000
--- a/english/lts/security/2020/dla-2128.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2128-1 openjdk-7</define-tag>
-<define-tag report_date>2020-02-29</define-tag>
-<define-tag secrefs>CVE-2020-2583 CVE-2020-2590 CVE-2020-2593 CVE-2020-2601 CVE-2020-2604 CVE-2020-2654 CVE-2020-2659</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2128.wml b/english/lts/security/2020/dla-2128.wml
deleted file mode 100644
index e014f6ddb82..00000000000
--- a/english/lts/security/2020/dla-2128.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-resulting in denial of service, incorrect implementation of Kerberos
-GSSAPI and TGS requests or incorrect TLS handshakes.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7u251-2.6.21-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2128.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2129.data b/english/lts/security/2020/dla-2129.data
deleted file mode 100644
index 6b9df7f5daa..00000000000
--- a/english/lts/security/2020/dla-2129.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2129-1 firebird2.5</define-tag>
-<define-tag report_date>2020-2-29</define-tag>
-<define-tag secrefs>CVE-2017-11509</define-tag>
-<define-tag packages>firebird2.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2129.wml b/english/lts/security/2020/dla-2129.wml
deleted file mode 100644
index 2d0a5039f0f..00000000000
--- a/english/lts/security/2020/dla-2129.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issues has been found in firebird2.5, an RDBMS based on InterBase 6.0.
-As UDFs can be used for a remote authenticated code execution (as user
-firebird), UDFs have been disabled in the default configuration
-which will be used for new installations (there is no change for existing
-configurations, which must be done manually).</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.5.3.26778.ds4-5+deb8u2.</p>
-
-<p>We recommend that you upgrade your firebird2.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2129.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2130.data b/english/lts/security/2020/dla-2130.data
deleted file mode 100644
index 1bc3863a838..00000000000
--- a/english/lts/security/2020/dla-2130.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2130-1 libapache2-mod-auth-openidc</define-tag>
-<define-tag report_date>2020-2-29</define-tag>
-<define-tag secrefs>CVE-2019-20479</define-tag>
-<define-tag packages>libapache2-mod-auth-openidc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2130.wml b/english/lts/security/2020/dla-2130.wml
deleted file mode 100644
index 47fcaf91404..00000000000
--- a/english/lts/security/2020/dla-2130.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libapache2-mod-auth-openidc, an OpenID Connect
-authentication module for Apache.
-Due to insufficient validatation of URLs an Open Redirect vulnerability
-for URLs beginning with a slash and backslash could be abused.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.0-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-openidc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2130.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2131-2.data b/english/lts/security/2020/dla-2131-2.data
deleted file mode 100644
index adaaa1390fe..00000000000
--- a/english/lts/security/2020/dla-2131-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2131-2 rrdtool</define-tag>
-<define-tag report_date>2020-03-03</define-tag>
-<define-tag secrefs>CVE-2014-6262 Bug#952958</define-tag>
-<define-tag packages>rrdtool</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2131-2.wml b/english/lts/security/2020/dla-2131-2.wml
deleted file mode 100644
index e655992c011..00000000000
--- a/english/lts/security/2020/dla-2131-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a regression in a previous fix, which
-resulted in the following error:</p>
-
-<p>ERROR: cannot compile regular expression: Error while compiling regular
-expression ^(?:[^%]+|%%)*%[+- 0#]?[0-9]*([.][0-9]+)?l[eEfF](?:[^%]+|%%)
-*%s(?:[^%]+|%%)*$ at char 18: range out of order in character class (^(?:[
-^%]+|%%)*%[+- 0#]?[0-9]*([.][0-9]+)?l[eEfF](?:[^%]+|%%)*%s(?:[^%]+|%%)*$)</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.8-1.2+deb8u2.</p>
-
-<p>We recommend that you upgrade your rrdtool packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2131-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2131.data b/english/lts/security/2020/dla-2131.data
deleted file mode 100644
index a819eb45c2c..00000000000
--- a/english/lts/security/2020/dla-2131.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2131-1 rrdtool</define-tag>
-<define-tag report_date>2020-03-02</define-tag>
-<define-tag secrefs>CVE-2014-6262</define-tag>
-<define-tag packages>rrdtool</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2131.wml b/english/lts/security/2020/dla-2131.wml
deleted file mode 100644
index d6535569435..00000000000
--- a/english/lts/security/2020/dla-2131.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple format string vulnerabilities in RRDtool, as used in Zenoss Core
-before 4.2.5 and other products, allow remote attackers to execute arbitrary
-code or cause a denial of service (application crash) via a crafted third
-argument to the rrdtool.graph function, aka ZEN-15415, a related issue to
-<a href="https://security-tracker.debian.org/tracker/CVE-2013-2131">CVE-2013-2131</a>.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4.8-1.2+deb8u1.</p>
-
-<p>We recommend that you upgrade your rrdtool packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2131.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2132.data b/english/lts/security/2020/dla-2132.data
deleted file mode 100644
index e41e6015b40..00000000000
--- a/english/lts/security/2020/dla-2132.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2132-1 libzypp</define-tag>
-<define-tag report_date>2020-03-03</define-tag>
-<define-tag secrefs>CVE-2019-18900</define-tag>
-<define-tag packages>libzypp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2132.wml b/english/lts/security/2020/dla-2132.wml
deleted file mode 100644
index d53c008493a..00000000000
--- a/english/lts/security/2020/dla-2132.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue where incorrect default
-permissions on a HTTP cookie store could have allowed local attackers to read
-private credentials in <tt>libzypp</tt>, a package management library that
-powers applications like YaST, zypper and the openSUSE/SLE implementation of
-PackageKit</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18900">CVE-2019-18900</a>
-
- <p>Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.29.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libzypp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2132.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2133.data b/english/lts/security/2020/dla-2133.data
deleted file mode 100644
index d34543e4fe4..00000000000
--- a/english/lts/security/2020/dla-2133.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2133-1 tomcat7</define-tag>
-<define-tag report_date>2020-3-4</define-tag>
-<define-tag secrefs>CVE-2019-17569 CVE-2020-1935 CVE-2020-1938</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2133.wml b/english/lts/security/2020/dla-2133.wml
deleted file mode 100644
index 888f4c82655..00000000000
--- a/english/lts/security/2020/dla-2133.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17569">CVE-2019-17569</a>
-
- <p>The refactoring in 7.0.98 introduced a regression. The result of
- the regression was that invalid Transfer-Encoding headers were
- incorrectly processed leading to a possibility of HTTP Request
- Smuggling if Tomcat was located behind a reverse proxy that
- incorrectly handled the invalid Transfer-Encoding header in a
- particular manner. Such a reverse proxy is considered unlikely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1935">CVE-2020-1935</a>
-
- <p>The HTTP header parsing code used an approach to end-of-line (EOL)
- parsing that allowed some invalid HTTP headers to be parsed as
- valid. This led to a possibility of HTTP Request Smuggling if Tomcat
- was located behind a reverse proxy that incorrectly handled the
- invalid Transfer-Encoding header in a particular manner. Such a
- reverse proxy is considered unlikely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1938">CVE-2020-1938</a>
-
- <p>When using the Apache JServ Protocol (AJP), care must be taken when
- trusting incoming connections to Apache Tomcat. Tomcat treats AJP
- connections as having higher trust than, for example, a similar HTTP
- connection. If such connections are available to an attacker, they
- can be exploited in ways that may be surprising. Prior to Tomcat
- 7.0.100, Tomcat shipped with an AJP Connector enabled by default
- that listened on all configured IP addresses. It was expected (and
- recommended in the security guide) that this Connector would be
- disabled if not required.</p>
-
- <p>Note that Debian already disabled the AJP connector by default.
- Mitigation is only required if the AJP port was made accessible to
- untrusted users.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.0.56-3+really7.0.100-1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2133.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2134.data b/english/lts/security/2020/dla-2134.data
deleted file mode 100644
index 692af546b89..00000000000
--- a/english/lts/security/2020/dla-2134.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2134-1 pdfresurrect</define-tag>
-<define-tag report_date>2020-03-05</define-tag>
-<define-tag secrefs>CVE-2020-9549</define-tag>
-<define-tag packages>pdfresurrect</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2134.wml b/english/lts/security/2020/dla-2134.wml
deleted file mode 100644
index 835aef2ee4d..00000000000
--- a/english/lts/security/2020/dla-2134.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an out-of-bounds write vulnerability
-in pdfresurrect, a tool for extracting or scrubbing versioning data
-from PDF documents.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9549">CVE-2020-9549</a>
-
- <p>In PDFResurrect 0.12 through 0.19, get_type in pdf.c has an
- out-of-bounds write via a crafted PDF document.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.12-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your pdfresurrect packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2134.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2135.data b/english/lts/security/2020/dla-2135.data
deleted file mode 100644
index 6e6d2d1b3b2..00000000000
--- a/english/lts/security/2020/dla-2135.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2135-1 jackson-databind</define-tag>
-<define-tag report_date>2020-03-06</define-tag>
-<define-tag secrefs>CVE-2020-9546 CVE-2020-9547 CVE-2020-9548</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2135.wml b/english/lts/security/2020/dla-2135.wml
deleted file mode 100644
index 9a0b106e005..00000000000
--- a/english/lts/security/2020/dla-2135.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVEs were reported for jackson-databind source package.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9546">CVE-2020-9546</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related
- to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig
- (aka shaded hikari-config).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9547">CVE-2020-9547</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related
- to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig
- (aka ibatis-sqlmap).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9548">CVE-2020-9548</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related
- to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u12.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2135.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2136.data b/english/lts/security/2020/dla-2136.data
deleted file mode 100644
index 2a3c7a4cd42..00000000000
--- a/english/lts/security/2020/dla-2136.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2136-1 libvpx</define-tag>
-<define-tag report_date>2020-03-09</define-tag>
-<define-tag secrefs>CVE-2020-0034</define-tag>
-<define-tag packages>libvpx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2136.wml b/english/lts/security/2020/dla-2136.wml
deleted file mode 100644
index 9fc70665e75..00000000000
--- a/english/lts/security/2020/dla-2136.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an out-of-bounds buffer read vulnerability
-in <tt>libvpx</tt>, a library implementing the VP8 &amp; VP9 video codecs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0034">CVE-2020-0034</a></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.0-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your libvpx packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2136.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2137.data b/english/lts/security/2020/dla-2137.data
deleted file mode 100644
index 8852b775243..00000000000
--- a/english/lts/security/2020/dla-2137.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2137-1 sleuthkit</define-tag>
-<define-tag report_date>2020-03-11</define-tag>
-<define-tag secrefs>CVE-2020-10232</define-tag>
-<define-tag packages>sleuthkit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2137.wml b/english/lts/security/2020/dla-2137.wml
deleted file mode 100644
index 42a6a27922c..00000000000
--- a/english/lts/security/2020/dla-2137.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In version 4.8.0 and earlier of The Sleuth Kit (TSK), there is
-a stack buffer overflow vulnerability in the YAFFS file timestamp
-parsing logic in yaffsfs_istat() in fs/yaffs.c.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.1.3-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your sleuthkit packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2137.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2138.data b/english/lts/security/2020/dla-2138.data
deleted file mode 100644
index 4167c4aa126..00000000000
--- a/english/lts/security/2020/dla-2138.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2138-1 wpa</define-tag>
-<define-tag report_date>2020-3-11</define-tag>
-<define-tag secrefs>CVE-2019-10064</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2138.wml b/english/lts/security/2020/dla-2138.wml
deleted file mode 100644
index 40004fc1a9b..00000000000
--- a/english/lts/security/2020/dla-2138.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Similar to <a href="https://security-tracker.debian.org/tracker/CVE-2016-10743">CVE-2016-10743</a> the host access point daemon, hostapd, in
-EAP mode used a low quality pseudorandom number generator that leads to
-insufficient entropy. The problem was resolved by using the
-os_get_random function which provides cryptographically strong pseudo
-random data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3-1+deb8u10.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2138.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2139.data b/english/lts/security/2020/dla-2139.data
deleted file mode 100644
index 6af93cf6d99..00000000000
--- a/english/lts/security/2020/dla-2139.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2139-1 dojo</define-tag>
-<define-tag report_date>2020-03-12</define-tag>
-<define-tag secrefs>CVE-2020-5258 CVE-2020-5259 Bug#953585 Bug#953587</define-tag>
-<define-tag packages>dojo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2139.wml b/english/lts/security/2020/dla-2139.wml
deleted file mode 100644
index 052f99a0097..00000000000
--- a/english/lts/security/2020/dla-2139.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVEs were reported against dojo:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-5258">CVE-2020-5258</a>
-
- <p>In affected versions of dojo, the deepCopy method is vulnerable
- to Prototype Pollution. An attacker could manipulate these attributes
- to overwrite, or pollute, a JavaScript application object prototype
- of the base object by injecting other values.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-5259">CVE-2020-5259</a>
-
- <p>The Dojox jQuery wrapper jqMix mixin method is vulnerable to
- Prototype Pollution. An attacker could manipulate these attributes
- to overwrite, or pollute, a JavaScript application object prototype
- of the base object by injecting other values.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.10.2+dfsg-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your dojo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2139.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2140.data b/english/lts/security/2020/dla-2140.data
deleted file mode 100644
index b86782534a8..00000000000
--- a/english/lts/security/2020/dla-2140.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2140-1 firefox-esr</define-tag>
-<define-tag report_date>2020-03-11</define-tag>
-<define-tag secrefs>CVE-2019-20503 CVE-2020-6805 CVE-2020-6806 CVE-2020-6807 CVE-2020-6811 CVE-2020-6812 CVE-2020-6814</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2140.wml b/english/lts/security/2020/dla-2140.wml
deleted file mode 100644
index 647a6683063..00000000000
--- a/english/lts/security/2020/dla-2140.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.6.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2140.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2141.data b/english/lts/security/2020/dla-2141.data
deleted file mode 100644
index 56ddf613c95..00000000000
--- a/english/lts/security/2020/dla-2141.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2141-1 yubikey-val</define-tag>
-<define-tag report_date>2020-03-13</define-tag>
-<define-tag secrefs>CVE-2020-10184 CVE-2020-10185</define-tag>
-<define-tag packages>yubikey-val</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2141.wml b/english/lts/security/2020/dla-2141.wml
deleted file mode 100644
index 80942ce47f4..00000000000
--- a/english/lts/security/2020/dla-2141.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVEs were reported against yubikey-val.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10184">CVE-2020-10184</a>
-
- <p>The verify endpoint in YubiKey Validation Server before 2.40 does
- not check the length of SQL queries, which allows remote attackers
- to cause a denial of service, aka SQL injection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10185">CVE-2020-10185</a>
-
- <p>The sync endpoint in YubiKey Validation Server before 2.40 allows
- remote attackers to replay an OTP.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.27-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your yubikey-val packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2141.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2142.data b/english/lts/security/2020/dla-2142.data
deleted file mode 100644
index c5243906df9..00000000000
--- a/english/lts/security/2020/dla-2142.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2142-1 slirp</define-tag>
-<define-tag report_date>2020-03-13</define-tag>
-<define-tag secrefs>CVE-2020-8608</define-tag>
-<define-tag packages>slirp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2142.wml b/english/lts/security/2020/dla-2142.wml
deleted file mode 100644
index 9410e78bb9f..00000000000
--- a/english/lts/security/2020/dla-2142.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a buffer overflow vulnerability in
-<a href="http://slirp.sourceforge.net/">slirp</a>, a SLIP/PPP emulator for
-using a dial up shell account. This was caused by the incorrect usage of return
-values from <tt>snprintf(3)</tt>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8608">CVE-2020-8608</a>
-
- <p>In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf
- return values, leading to a buffer overflow in later code.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:1.0.17-7+deb8u2.</p>
-
-<p>We recommend that you upgrade your slirp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2142.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2143.data b/english/lts/security/2020/dla-2143.data
deleted file mode 100644
index 2f4b42224c2..00000000000
--- a/english/lts/security/2020/dla-2143.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2143-1 slurm-llnl</define-tag>
-<define-tag report_date>2020-03-16</define-tag>
-<define-tag secrefs>CVE-2019-6438 CVE-2019-12838 Bug#920997 Bug#931880</define-tag>
-<define-tag packages>slurm-llnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2143.wml b/english/lts/security/2020/dla-2143.wml
deleted file mode 100644
index 5f9252182d1..00000000000
--- a/english/lts/security/2020/dla-2143.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issue were found in Simple Linux Utility for Resource
-Management (SLURM), a cluster resource management and job scheduling
-system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6438">CVE-2019-6438</a>
-
- <p>SchedMD Slurm mishandles 32-bit systems, causing a heap overflow
- in xmalloc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12838">CVE-2019-12838</a>
-
- <p>SchedMD Slurm did not escape strings when importing an archive
- file into the accounting_storage/mysql backend, resulting in SQL
- injection.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.03.9-5+deb8u5.</p>
-
-<p>We recommend that you upgrade your slurm-llnl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2143.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2144.data b/english/lts/security/2020/dla-2144.data
deleted file mode 100644
index f7768b9db9c..00000000000
--- a/english/lts/security/2020/dla-2144.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2144-1 qemu</define-tag>
-<define-tag report_date>2020-03-16</define-tag>
-<define-tag secrefs>CVE-2020-1711 CVE-2020-8608</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2144.wml b/english/lts/security/2020/dla-2144.wml
deleted file mode 100644
index 2c9b3035ac2..00000000000
--- a/english/lts/security/2020/dla-2144.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two out-of-bounds heap buffer accesses were found in QEMU, a fast
-processor emulator, which could result in denial of service or
-abitrary code execution.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u14.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2144.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2145-2.data b/english/lts/security/2020/dla-2145-2.data
deleted file mode 100644
index 9735a85ea74..00000000000
--- a/english/lts/security/2020/dla-2145-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2145-2 twisted</define-tag>
-<define-tag report_date>2020-03-19</define-tag>
-<define-tag secrefs>CVE-2020-10108 CVE-2020-10109</define-tag>
-<define-tag packages>twisted</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2145-2.wml b/english/lts/security/2020/dla-2145-2.wml
deleted file mode 100644
index 6672a41cc28..00000000000
--- a/english/lts/security/2020/dla-2145-2.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were was a regression introduced in DLA-2145-1
-due to the incorrect application of the upstream patch for CVE-2020-10108 &amp;
-CVE-2020-10109 regarding a number of HTTP request splitting vulnerabilities in
-Twisted, an Python event-based framework for building various types of internet
-applications.</p>
-
-<p>Thanks to Etienne Allovon for the detailed report.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10108">CVE-2020-10108</a>
-
- <p>In Twisted Web through 19.10.0, there was an HTTP request splitting
- vulnerability. When presented with two content-length headers, it ignored
- the first header. When the second content-length value was set to zero, the
- request body was interpreted as a pipelined request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10109">CVE-2020-10109</a>
-
- <p>In Twisted Web through 19.10.0, there was an HTTP request splitting
- vulnerability. When presented with a content-length and a chunked encoding
- header, the content-length took precedence and the remainder of the request
- body was interpreted as a pipelined request.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.0.2-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your twisted packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2145-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2145.data b/english/lts/security/2020/dla-2145.data
deleted file mode 100644
index 57907e1c6ee..00000000000
--- a/english/lts/security/2020/dla-2145.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2145-1 twisted</define-tag>
-<define-tag report_date>2020-03-17</define-tag>
-<define-tag secrefs>CVE-2020-10108 CVE-2020-10109</define-tag>
-<define-tag packages>twisted</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2145.wml b/english/lts/security/2020/dla-2145.wml
deleted file mode 100644
index dfb73fff3b4..00000000000
--- a/english/lts/security/2020/dla-2145.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of HTTP request splitting
-vulnerabilities in Twisted, an Python event-based framework for building
-various types of internet applications.</p>
-
-<p>For more information, please see the
-<a href="https://know.bishopfox.com/advisories/twisted-version-19.10.0#INOR"
-rel="nofollow">upstream advisory.</a></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10108">CVE-2020-10108</a>
-
- <p>In Twisted Web through 19.10.0, there was an HTTP request splitting
- vulnerability. When presented with two content-length headers, it ignored
- the first header. When the second content-length value was set to zero, the
- request body was interpreted as a pipelined request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10109">CVE-2020-10109</a>
-
- <p>In Twisted Web through 19.10.0, there was an HTTP request splitting
- vulnerability. When presented with a content-length and a chunked encoding
- header, the content-length took precedence and the remainder of the request
- body was interpreted as a pipelined request.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-14.0.2-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your twisted packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2145.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2146.data b/english/lts/security/2020/dla-2146.data
deleted file mode 100644
index cc629a7c4c2..00000000000
--- a/english/lts/security/2020/dla-2146.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2146-1 libvncserver</define-tag>
-<define-tag report_date>2020-03-18</define-tag>
-<define-tag secrefs>CVE-2019-15690 Bug#954163</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2146.wml b/english/lts/security/2020/dla-2146.wml
deleted file mode 100644
index 18b850d5c13..00000000000
--- a/english/lts/security/2020/dla-2146.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In libvncserver, through libvncclient/cursor.c, there is a possibility
-of a heap overflow, as reported by Pavel Cheremushkin.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9.9+dfsg2-6.1+deb8u7.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2146.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2147.data b/english/lts/security/2020/dla-2147.data
deleted file mode 100644
index db50653bd5b..00000000000
--- a/english/lts/security/2020/dla-2147.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2147-1 gdal</define-tag>
-<define-tag report_date>2020-03-19</define-tag>
-<define-tag secrefs>CVE-2019-17546</define-tag>
-<define-tag packages>gdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2147.wml b/english/lts/security/2020/dla-2147.wml
deleted file mode 100644
index 7618c0a20c9..00000000000
--- a/english/lts/security/2020/dla-2147.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>tif_getimage.c in LibTIFF, as used in GDAL has an integer overflow
-that potentially causes a heap-based buffer overflow via a crafted
-RGBA image, related to a "Negative-size-param" condition.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.10.1+dfsg-8+deb8u2.</p>
-
-<p>We recommend that you upgrade your gdal packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2147.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2148.data b/english/lts/security/2020/dla-2148.data
deleted file mode 100644
index bf4281117b2..00000000000
--- a/english/lts/security/2020/dla-2148.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2148-1 amd64-microcode</define-tag>
-<define-tag report_date>2020-03-20</define-tag>
-<define-tag secrefs>CVE-2017-5715 Bug#886382</define-tag>
-<define-tag packages>amd64-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2148.wml b/english/lts/security/2020/dla-2148.wml
deleted file mode 100644
index a3978915367..00000000000
--- a/english/lts/security/2020/dla-2148.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that systems with microprocessors utilizing
-speculative execution and indirect branch prediction may allow
-unauthorized disclosure of information to an attacker with local
-user access via a side-channel analysis (Spectre v2).
-Multiple fixes were done already in linux kernel, intel-microcode etc.
-This fix adds amd-microcode-based IBPB support.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.20181128.1~deb8u1.</p>
-
-<p>We recommend that you upgrade your amd64-microcode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2148.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2149.data b/english/lts/security/2020/dla-2149.data
deleted file mode 100644
index f49441cbda6..00000000000
--- a/english/lts/security/2020/dla-2149.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2149-1 rails</define-tag>
-<define-tag report_date>2020-03-20</define-tag>
-<define-tag secrefs>CVE-2020-5267 Bug#954304</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2149.wml b/english/lts/security/2020/dla-2149.wml
deleted file mode 100644
index a26ddfccdb1..00000000000
--- a/english/lts/security/2020/dla-2149.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a
-possible XSS vulnerability in ActionView's JavaScript literal
-escape helpers.
-Views that use the `j` or `escape_javascript` methods may be
-susceptible to XSS attacks.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:4.1.8-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2149.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2150.data b/english/lts/security/2020/dla-2150.data
deleted file mode 100644
index 8d56ccbf17a..00000000000
--- a/english/lts/security/2020/dla-2150.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2150-1 thunderbird</define-tag>
-<define-tag report_date>2020-03-20</define-tag>
-<define-tag secrefs>CVE-2019-20503 CVE-2020-6805 CVE-2020-6806 CVE-2020-6807 CVE-2020-6811 CVE-2020-6812 CVE-2020-6814</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2150.wml b/english/lts/security/2020/dla-2150.wml
deleted file mode 100644
index 13a4dd761d4..00000000000
--- a/english/lts/security/2020/dla-2150.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-potentially result in the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.6.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2150.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2151.data b/english/lts/security/2020/dla-2151.data
deleted file mode 100644
index 4e883608988..00000000000
--- a/english/lts/security/2020/dla-2151.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2151-1 icu</define-tag>
-<define-tag report_date>2020-03-20</define-tag>
-<define-tag secrefs>CVE-2020-10531 Bug#953747</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2151.wml b/english/lts/security/2020/dla-2151.wml
deleted file mode 100644
index 18c60686dba..00000000000
--- a/english/lts/security/2020/dla-2151.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that an integer overflow in the International
-Components for Unicode (ICU) library could result in denial of
-service and potentially the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-52.1-8+deb8u8.</p>
-
-<p>We recommend that you upgrade your icu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2151.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2152.data b/english/lts/security/2020/dla-2152.data
deleted file mode 100644
index dc07921c132..00000000000
--- a/english/lts/security/2020/dla-2152.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2152-1 graphicsmagick</define-tag>
-<define-tag report_date>2020-03-21</define-tag>
-<define-tag secrefs>CVE-2019-12921</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2152.wml b/english/lts/security/2020/dla-2152.wml
deleted file mode 100644
index 2ea44343a24..00000000000
--- a/english/lts/security/2020/dla-2152.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in graphicsmagick, a collection of image
-processing tools, that allows an attacker to read arbitrary files
-via a crafted image because of TranslateTextEx for SVG.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.20-3+deb8u9.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2152.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2153.data b/english/lts/security/2020/dla-2153.data
deleted file mode 100644
index bd540b3030c..00000000000
--- a/english/lts/security/2020/dla-2153.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2153-1 jackson-databind</define-tag>
-<define-tag report_date>2020-03-22</define-tag>
-<define-tag secrefs>CVE-2020-10672 CVE-2020-10673</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2153.wml b/english/lts/security/2020/dla-2153.wml
deleted file mode 100644
index 44e164aac0e..00000000000
--- a/english/lts/security/2020/dla-2153.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVE(s) were reported against jackson-databind.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10672">CVE-2020-10672</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory
- (aka aries.transaction.jms).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10673">CVE-2020-10673</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- com.caucho.config.types.ResourceRef (aka caucho-quercus).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u13.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2153.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2154.data b/english/lts/security/2020/dla-2154.data
deleted file mode 100644
index a70dfc02e74..00000000000
--- a/english/lts/security/2020/dla-2154.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2154-1 phpmyadmin</define-tag>
-<define-tag report_date>2020-03-22</define-tag>
-<define-tag secrefs>CVE-2020-10802 CVE-2020-10803 Bug#954665 Bug#954666</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2154.wml b/english/lts/security/2020/dla-2154.wml
deleted file mode 100644
index 1d2731b57ab..00000000000
--- a/english/lts/security/2020/dla-2154.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following packages CVE(s) were reported against phpmyadmin.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10802">CVE-2020-10802</a>
-
- <p>In phpMyAdmin 4.x before 4.9.5, a SQL injection vulnerability
- has been discovered where certain parameters are not properly
- escaped when generating certain queries for search actions in
- libraries/classes/Controllers/Table/TableSearchController.php.
- An attacker can generate a crafted database or table name. The
- attack can be performed if a user attempts certain search
- operations on the malicious database or table.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10803">CVE-2020-10803</a>
-
- <p>In phpMyAdmin 4.x before 4.9.5, a SQL injection vulnerability
- was discovered where malicious code could be used to trigger
- an XSS attack through retrieving and displaying results (in
- tbl_get_field.php and libraries/classes/Display/Results.php).
- The attacker must be able to insert crafted data into certain
- database tables, which when retrieved (for instance, through the
- Browse tab) can trigger the XSS attack.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4:4.2.12-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2154.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2155.data b/english/lts/security/2020/dla-2155.data
deleted file mode 100644
index 7643c3938d0..00000000000
--- a/english/lts/security/2020/dla-2155.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2155-1 tomcat8</define-tag>
-<define-tag report_date>2020-03-24</define-tag>
-<define-tag secrefs>CVE-2019-12418</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2155.wml b/english/lts/security/2020/dla-2155.wml
deleted file mode 100644
index 3df8a82cb50..00000000000
--- a/english/lts/security/2020/dla-2155.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tomcat8 is configured with the JMX Remote Lifecycle Listener, a local
-attacker without access to the Tomcat process or configuration files
-is able to manipulate the RMI registry to perform a man-in-the-middle
-attack to capture user names and passwords used to access the JMX
-interface. The attacker can then use these credentials to access the
-JMX interface and gain complete control over the Tomcat instance.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-8.0.14-1+deb8u16.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2155.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2156.data b/english/lts/security/2020/dla-2156.data
deleted file mode 100644
index 856fef2c58b..00000000000
--- a/english/lts/security/2020/dla-2156.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2156-1 e2fsprogs</define-tag>
-<define-tag report_date>2020-3-24</define-tag>
-<define-tag secrefs>CVE-2019-5188</define-tag>
-<define-tag packages>e2fsprogs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2156.wml b/english/lts/security/2020/dla-2156.wml
deleted file mode 100644
index 1cec768181e..00000000000
--- a/english/lts/security/2020/dla-2156.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in e2fsprogs, a package that contains
-ext2/ext3/ext4 file system utilities.
-A specially crafted ext4 directory can cause an out-of-bounds write on the
-stack, resulting in code execution. An attacker can corrupt a partition to
-trigger this vulnerability.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been
-fixed in version 1.42.12-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your e2fsprogs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2156.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2157.data b/english/lts/security/2020/dla-2157.data
deleted file mode 100644
index 103bfe5b81a..00000000000
--- a/english/lts/security/2020/dla-2157.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2157-1 weechat</define-tag>
-<define-tag report_date>2020-3-24</define-tag>
-<define-tag secrefs>CVE-2020-8955 CVE-2020-9759 CVE-2020-9760</define-tag>
-<define-tag packages>weechat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2157.wml b/english/lts/security/2020/dla-2157.wml
deleted file mode 100644
index 6e4e1821e38..00000000000
--- a/english/lts/security/2020/dla-2157.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in weechat, a fast, light and extensible
-chat client.
-All issues are about crafted messages, that could result in
-a buffer overflow and application crash. This could cause a denial of
-service or possibly have other impact.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.0.1-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your weechat packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2157.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2158.data b/english/lts/security/2020/dla-2158.data
deleted file mode 100644
index 00f9d6bf577..00000000000
--- a/english/lts/security/2020/dla-2158.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2158-1 ruby2.1</define-tag>
-<define-tag report_date>2020-03-25</define-tag>
-<define-tag secrefs>CVE-2016-2338</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2158.wml b/english/lts/security/2020/dla-2158.wml
deleted file mode 100644
index 4b6846ea9f9..00000000000
--- a/english/lts/security/2020/dla-2158.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An exploitable heap overflow vulnerability exists in the
-Psych::Emitter startdocument function of Ruby. In Psych::Emitter startdocument
-function heap buffer <q>head</q> allocation is made based on tags array length.
-Specially constructed object passed as element of tags array can increase this
-array size after mentioned allocation and cause heap overflow</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.5-2+deb8u9.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2158.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2159.data b/english/lts/security/2020/dla-2159.data
deleted file mode 100644
index 0c3bff4e263..00000000000
--- a/english/lts/security/2020/dla-2159.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2159-1 okular</define-tag>
-<define-tag report_date>2020-03-25</define-tag>
-<define-tag secrefs>CVE-2020-9359 Bug#954891</define-tag>
-<define-tag packages>okular</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2159.wml b/english/lts/security/2020/dla-2159.wml
deleted file mode 100644
index 8f33ed431dc..00000000000
--- a/english/lts/security/2020/dla-2159.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Mickael Karatekin from Sysdream Labs discovered that the Okular
-document viewer allows code execution via an action link in a PDF
-document.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4:4.14.2-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your okular packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2159.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2160.data b/english/lts/security/2020/dla-2160.data
deleted file mode 100644
index 22e238f39e5..00000000000
--- a/english/lts/security/2020/dla-2160.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2160-1 php5</define-tag>
-<define-tag report_date>2020-3-26</define-tag>
-<define-tag secrefs>CVE-2020-7062 CVE-2020-7063</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2160.wml b/english/lts/security/2020/dla-2160.wml
deleted file mode 100644
index d529524bb80..00000000000
--- a/english/lts/security/2020/dla-2160.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two security issues have been identified and fixed in php5, a
-server-side, HTML-embedded scripting language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7062">CVE-2020-7062</a>
-
-<p>is about a possible null pointer derefernce, which would
-likely lead to a crash, during a failed upload with progress tracking.
-<a href="https://security-tracker.debian.org/tracker/CVE-2020-7063">CVE-2020-7063</a> is about wrong file permissions of files added to tar with
-Phar::buildFromIterator when extracting them again.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u10.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2160.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2161.data b/english/lts/security/2020/dla-2161.data
deleted file mode 100644
index d86be986008..00000000000
--- a/english/lts/security/2020/dla-2161.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2161-1 tika</define-tag>
-<define-tag report_date>2020-03-28</define-tag>
-<define-tag secrefs>CVE-2020-1950 CVE-2020-1951 Bug#954302 Bug#954303</define-tag>
-<define-tag packages>tika</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2161.wml b/english/lts/security/2020/dla-2161.wml
deleted file mode 100644
index 4da8ad67515..00000000000
--- a/english/lts/security/2020/dla-2161.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two security issues have been detected in tika.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1950">CVE-2020-1950</a>
-
- <p>carefully crafted or corrupt PSD file can cause excessive memory
- usage in Apache.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1951">CVE-2020-1951</a>
-
- <p>Infinite Loop (DoS) vulnerability in Apache Tika's PSDParser.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your tika packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2161.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2162.data b/english/lts/security/2020/dla-2162.data
deleted file mode 100644
index 4a54eca803f..00000000000
--- a/english/lts/security/2020/dla-2162.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2162-1 php-horde-form</define-tag>
-<define-tag report_date>2020-03-29</define-tag>
-<define-tag secrefs>CVE-2020-8866 Bug#955020</define-tag>
-<define-tag packages>php-horde-form</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2162.wml b/english/lts/security/2020/dla-2162.wml
deleted file mode 100644
index 013647a1064..00000000000
--- a/english/lts/security/2020/dla-2162.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A remote code execution vulnerability was discovered in the Form API
-component of the Horde Application Framework. An authenticated remote
-attacker could use this flaw to upload arbitrary content to an arbitrary
-writable location on the server and potentially execute code in the
-context of the web server user.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.0.8-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your php-horde-form packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2162.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2163.data b/english/lts/security/2020/dla-2163.data
deleted file mode 100644
index 289114f69a7..00000000000
--- a/english/lts/security/2020/dla-2163.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2163-1 tinyproxy</define-tag>
-<define-tag report_date>2020-03-31</define-tag>
-<define-tag secrefs>CVE-2017-11747 Bug#870307 Bug#948283</define-tag>
-<define-tag packages>tinyproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2163.wml b/english/lts/security/2020/dla-2163.wml
deleted file mode 100644
index 0df6370fd6e..00000000000
--- a/english/lts/security/2020/dla-2163.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A minor security issue and a severe packaging bug have been fixed in
-tinyproxy, a lightweight http proxy daemon.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11747">CVE-2017-11747</a>
-
- <p>main.c in Tinyproxy created a /var/run/tinyproxy/tinyproxy.pid file
- after dropping privileges to a non-root account, which might have allowed
- local users to kill arbitrary processes by leveraging access to this
- non-root account for tinyproxy.pid modification before a root script
- executed a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.</p>
-
-<p>OTHER</p>
-
- <p>Furthermore, a severe flaw had been discovered by Tim Duesterhus in
- Debian's init script for tinyproxy. With the tiny.conf configuration
- file having the PidFile option removed, the next run of logrotate (if
- installed) would have changed the owner of the system's base directory
- ("/") to tinyproxy:tinyproxy.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.3-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your tinyproxy packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2163.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2164.data b/english/lts/security/2020/dla-2164.data
deleted file mode 100644
index ed3df1cf704..00000000000
--- a/english/lts/security/2020/dla-2164.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2164-1 gst-plugins-bad0.10</define-tag>
-<define-tag report_date>2020-3-31</define-tag>
-<define-tag secrefs>CVE-2015-0797 CVE-2016-9809 CVE-2017-5843 CVE-2017-5848</define-tag>
-<define-tag packages>gst-plugins-bad0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2164.wml b/english/lts/security/2020/dla-2164.wml
deleted file mode 100644
index bf6b74327eb..00000000000
--- a/english/lts/security/2020/dla-2164.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in gst-plugins-bad0.10, a package
-containing GStreamer plugins from the <q>bad</q> set.</p>
-
-<p>All issues are about use-after-free, out of bounds reads or buffer
-overflow in different modules.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.10.23-7.4+deb8u3.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2164.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2165.data b/english/lts/security/2020/dla-2165.data
deleted file mode 100644
index f21ebffc903..00000000000
--- a/english/lts/security/2020/dla-2165.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2165-1 apng2gif</define-tag>
-<define-tag report_date>2020-3-31</define-tag>
-<define-tag secrefs>CVE-2017-6960</define-tag>
-<define-tag packages>apng2gif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2165.wml b/english/lts/security/2020/dla-2165.wml
deleted file mode 100644
index 92586f4b3e1..00000000000
--- a/english/lts/security/2020/dla-2165.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in apng2gif, a tool for converting APNG images to
-animated GIF format.</p>
-
-<p>One of the function contained an integer overflow resulting in a
-heap-based buffer over-read.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.5-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your apng2gif packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2165.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2166.data b/english/lts/security/2020/dla-2166.data
deleted file mode 100644
index fd8fa548f04..00000000000
--- a/english/lts/security/2020/dla-2166.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2166-1 libpam-krb5</define-tag>
-<define-tag report_date>2020-04-01</define-tag>
-<define-tag secrefs>CVE-2020-10595</define-tag>
-<define-tag packages>libpam-krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2166.wml b/english/lts/security/2020/dla-2166.wml
deleted file mode 100644
index 8cd60e6eb1a..00000000000
--- a/english/lts/security/2020/dla-2166.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The krb5 PAM module (pam_krb5.so) had a buffer overflow that might have
-caused remote code execution in situations involving supplemental
-prompting by a Kerberos library. It might have overflown a buffer
-provided by the underlying Kerberos library by a single '\0' byte if an
-attacker responded to a prompt with an answer of a carefully chosen
-length. The effect may have ranged from heap corruption to stack
-corruption depending on the structure of the underlying Kerberos library,
-with unknown effects but possibly including code execution. This code
-path had not been used for normal authentication, but only when the
-Kerberos library did supplemental prompting, such as with PKINIT or when
-using the non-standard no_prompt PAM configuration option.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.6-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libpam-krb5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2166.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2167.data b/english/lts/security/2020/dla-2167.data
deleted file mode 100644
index f2523d48e49..00000000000
--- a/english/lts/security/2020/dla-2167.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2167-1 python-bleach</define-tag>
-<define-tag report_date>2020-04-01</define-tag>
-<define-tag secrefs>CVE-2020-6817 Bug#955388</define-tag>
-<define-tag packages>python-bleach</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2167.wml b/english/lts/security/2020/dla-2167.wml
deleted file mode 100644
index 2487be202ac..00000000000
--- a/english/lts/security/2020/dla-2167.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in python-bleach, a whitelist-based
-HTML-sanitizing library. Calls to bleach.clean with an allowed tag with
-an allowed style attribute are vulnerable to a regular expression denial
-of service (ReDoS).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your python-bleach packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2167.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2168.data b/english/lts/security/2020/dla-2168.data
deleted file mode 100644
index 7f7589d7d0e..00000000000
--- a/english/lts/security/2020/dla-2168.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2168-1 libplist</define-tag>
-<define-tag report_date>2020-04-02</define-tag>
-<define-tag secrefs>CVE-2017-5209 CVE-2017-5545 CVE-2017-5834 CVE-2017-5835 CVE-2017-6435 CVE-2017-6436 CVE-2017-6439 CVE-2017-7982 Bug#851196 Bug#852385 Bug#854000 Bug#860945</define-tag>
-<define-tag packages>libplist</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2168.wml b/english/lts/security/2020/dla-2168.wml
deleted file mode 100644
index bd0ced19f84..00000000000
--- a/english/lts/security/2020/dla-2168.wml
+++ /dev/null
@@ -1,68 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>libplist is a library for reading and writing the Apple binary and XML
-property lists format. It's part of the libimobiledevice stack, providing
-access to iDevices (iPod, iPhone, iPad ...).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5209">CVE-2017-5209</a>
-
- <p>The base64decode function in base64.c allows attackers to obtain sensitive
- information from process memory or cause a denial of service (buffer
- over-read) via split encoded Apple Property List data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5545">CVE-2017-5545</a>
-
- <p>The main function in plistutil.c allows attackers to obtain sensitive
- information from process memory or cause a denial of service (buffer
- over-read) via Apple Property List data that is too short.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5834">CVE-2017-5834</a>
-
- <p>The parse_dict_node function in bplist.c allows attackers to cause a denial
- of service (out-of-bounds heap read and crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5835">CVE-2017-5835</a>
-
- <p>libplist allows attackers to cause a denial of service (large memory
- allocation and crash) via vectors involving an offset size of zero.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6435">CVE-2017-6435</a>
-
- <p>The parse_string_node function in bplist.c allows local users to cause a
- denial of service (memory corruption) via a crafted plist file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6436">CVE-2017-6436</a>
-
- <p>The parse_string_node function in bplist.c allows local users to cause a
- denial of service (memory allocation error) via a crafted plist file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6439">CVE-2017-6439</a>
-
- <p>Heap-based buffer overflow in the parse_string_node function in bplist.c
- allows local users to cause a denial of service (out-of-bounds write) via
- a crafted plist file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7982">CVE-2017-7982</a>
-
- <p>Integer overflow in the plist_from_bin function in bplist.c allows remote
- attackers to cause a denial of service (heap-based buffer over-read and
- application crash) via a crafted plist file.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.11-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libplist packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2168.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2169.data b/english/lts/security/2020/dla-2169.data
deleted file mode 100644
index 7ec543feda1..00000000000
--- a/english/lts/security/2020/dla-2169.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2169-1 libmtp</define-tag>
-<define-tag report_date>2020-04-05</define-tag>
-<define-tag secrefs>CVE-2017-9831 CVE-2017-9832</define-tag>
-<define-tag packages>libmtp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2169.wml b/english/lts/security/2020/dla-2169.wml
deleted file mode 100644
index b7d6bd2243a..00000000000
--- a/english/lts/security/2020/dla-2169.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>libmtp is a library for communicating with MTP aware devices. The Media
-Transfer Protocol (commonly referred to as MTP) is a devised set of custom
-extensions to support the transfer of music files on USB digital audio players
-and movie files on USB portable media players.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9831">CVE-2017-9831</a>
-
- <p>An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx
- function of the ptp-pack.c file allows attackers to cause a denial of
- service (out-of-bounds memory access) or maybe remote code execution by
- inserting a mobile device into a personal computer through a USB cable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9832">CVE-2017-9832</a>
-
- <p>An integer overflow vulnerability in ptp-pack.c (ptp_unpack_OPL function)
- allows attackers to cause a denial of service (out-of-bounds memory
- access) or maybe remote code execution by inserting a mobile device into
- a personal computer through a USB cable.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.1.8-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your libmtp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2169.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2170.data b/english/lts/security/2020/dla-2170.data
deleted file mode 100644
index 44f7156efa8..00000000000
--- a/english/lts/security/2020/dla-2170.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2170-1 firefox-esr</define-tag>
-<define-tag report_date>2020-04-08</define-tag>
-<define-tag secrefs>CVE-2020-6819 CVE-2020-6820 CVE-2020-6821 CVE-2020-6822 CVE-2020-6825</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2170.wml b/english/lts/security/2020/dla-2170.wml
deleted file mode 100644
index 9b77bab9b96..00000000000
--- a/english/lts/security/2020/dla-2170.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.7.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2170.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2171.data b/english/lts/security/2020/dla-2171.data
deleted file mode 100644
index 0aa4dc393fb..00000000000
--- a/english/lts/security/2020/dla-2171.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2171-1 ceph</define-tag>
-<define-tag report_date>2020-04-09</define-tag>
-<define-tag secrefs>CVE-2020-1760</define-tag>
-<define-tag packages>ceph</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2171.wml b/english/lts/security/2020/dla-2171.wml
deleted file mode 100644
index dd7270d7247..00000000000
--- a/english/lts/security/2020/dla-2171.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a header-splitting vulnerability in ceph, a
-distributed storage and file system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1760">CVE-2020-1760</a>
-
- <p>header-splitting in RGW GetObject has a possible XSS</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.80.7-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your ceph packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2171.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2172.data b/english/lts/security/2020/dla-2172.data
deleted file mode 100644
index b60acfbedbb..00000000000
--- a/english/lts/security/2020/dla-2172.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2172-1 thunderbird</define-tag>
-<define-tag report_date>2020-04-14</define-tag>
-<define-tag secrefs>CVE-2020-6819 CVE-2020-6820 CVE-2020-6821 CVE-2020-6822 CVE-2020-6825</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2172.wml b/english/lts/security/2020/dla-2172.wml
deleted file mode 100644
index 80e02e489ac..00000000000
--- a/english/lts/security/2020/dla-2172.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could result
-in denial of service or potentially the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.7.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2172.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2173.data b/english/lts/security/2020/dla-2173.data
deleted file mode 100644
index 9fbf24c0e8f..00000000000
--- a/english/lts/security/2020/dla-2173.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2173-1 graphicsmagick</define-tag>
-<define-tag report_date>2020-04-14</define-tag>
-<define-tag secrefs>CVE-2020-10938</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2173.wml b/english/lts/security/2020/dla-2173.wml
deleted file mode 100644
index fec4e205b39..00000000000
--- a/english/lts/security/2020/dla-2173.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in graphicsmagick, a collection of image
-processing tools, that results in a heap overflow in 32-bit applications
-because of a signed overflow on range check in the HuffmanDecodeImage
-function.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.20-3+deb8u10.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2173.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2174.data b/english/lts/security/2020/dla-2174.data
deleted file mode 100644
index 002f388ed5c..00000000000
--- a/english/lts/security/2020/dla-2174.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2174-1 php-horde-data</define-tag>
-<define-tag report_date>2020-04-14</define-tag>
-<define-tag secrefs>CVE-2020-8518 Bug#951537</define-tag>
-<define-tag packages>php-horde-data</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2174.wml b/english/lts/security/2020/dla-2174.wml
deleted file mode 100644
index 2a8bcd92b3e..00000000000
--- a/english/lts/security/2020/dla-2174.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A remote code execution vulnerability was discovered in the Horde
-Application Framework. An authenticated remote attacker could use this
-flaw to cause execution of uploaded CSV data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.0-5+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-data packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2174.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2175.data b/english/lts/security/2020/dla-2175.data
deleted file mode 100644
index d506cb46a63..00000000000
--- a/english/lts/security/2020/dla-2175.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2175-1 php-horde-trean</define-tag>
-<define-tag report_date>2020-04-14</define-tag>
-<define-tag secrefs>CVE-2020-8865 Bug#955019</define-tag>
-<define-tag packages>php-horde-trean</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2175.wml b/english/lts/security/2020/dla-2175.wml
deleted file mode 100644
index 479a9aa161a..00000000000
--- a/english/lts/security/2020/dla-2175.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A directory traversal vulnerability resulting from insufficient input
-sanitization was discovered in the Horde Application Framework. An
-authenticated remote attacker could use this flaw to execute code in the
-context of the web server user.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.1.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-trean packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2175.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2176.data b/english/lts/security/2020/dla-2176.data
deleted file mode 100644
index cae6cea44c2..00000000000
--- a/english/lts/security/2020/dla-2176.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2176-1 inetutils</define-tag>
-<define-tag report_date>2020-04-14</define-tag>
-<define-tag secrefs>CVE-2020-10188 Bug#956084</define-tag>
-<define-tag packages>inetutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2176.wml b/english/lts/security/2020/dla-2176.wml
deleted file mode 100644
index 4e6b727b3d4..00000000000
--- a/english/lts/security/2020/dla-2176.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in the telnetd component of inetutils, a
-collection of network utilities. Execution of arbitrary remote code was
-possible through short writes or urgent data.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2:1.9.2.39.3a460-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your inetutils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2176.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2177.data b/english/lts/security/2020/dla-2177.data
deleted file mode 100644
index d0f5e64d424..00000000000
--- a/english/lts/security/2020/dla-2177.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2177-1 git</define-tag>
-<define-tag report_date>2020-04-15</define-tag>
-<define-tag secrefs>CVE-2020-5260</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2177.wml b/english/lts/security/2020/dla-2177.wml
deleted file mode 100644
index 474e57d85e5..00000000000
--- a/english/lts/security/2020/dla-2177.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast,
-scalable, distributed revision control system. With a crafted URL that
-contains a newline, the credential helper machinery can be fooled to
-return credential information for a wrong host.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1.4-2.1+deb8u9.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2177.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2178.data b/english/lts/security/2020/dla-2178.data
deleted file mode 100644
index 4b01cc58788..00000000000
--- a/english/lts/security/2020/dla-2178.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2178-1 awl</define-tag>
-<define-tag report_date>2020-04-18</define-tag>
-<define-tag secrefs>CVE-2020-11728 CVE-2020-11729 Bug#956650</define-tag>
-<define-tag packages>awl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2178.wml b/english/lts/security/2020/dla-2178.wml
deleted file mode 100644
index 704dfe6a670..00000000000
--- a/english/lts/security/2020/dla-2178.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Following CVEs were reported against the awl source package:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11728">CVE-2020-11728</a>
-
- <p>An issue was discovered in DAViCal Andrew's Web Libraries (AWL)
- through 0.60. Session management does not use a sufficiently
- hard-to-guess session key. Anyone who can guess the microsecond
- time (and the incrementing session_id) can impersonate a session.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11729">CVE-2020-11729</a>
-
- <p>An issue was discovered in DAViCal Andrew's Web Libraries (AWL)
- through 0.60. Long-term session cookies, uses to provide
- long-term session continuity, are not generated securely, enabling
- a brute-force attack that may be successful.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.55-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your awl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2178.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2179.data b/english/lts/security/2020/dla-2179.data
deleted file mode 100644
index f0e392c5c03..00000000000
--- a/english/lts/security/2020/dla-2179.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2179-1 jackson-databind</define-tag>
-<define-tag report_date>2020-04-18</define-tag>
-<define-tag secrefs>CVE-2020-10968 CVE-2020-10969 CVE-2020-11111 CVE-2020-11112 CVE-2020-11113 CVE-2020-11619 CVE-2020-11620</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2179.wml b/english/lts/security/2020/dla-2179.wml
deleted file mode 100644
index 612944def09..00000000000
--- a/english/lts/security/2020/dla-2179.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Following CVEs were reported against the jackson-databind source package:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10968">CVE-2020-10968</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10969">CVE-2020-10969</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- javax.swing.JEditorPane.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11111">CVE-2020-11111</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.activemq.* (aka activemq-jms, activemq-core,
- activemq-pool, and activemq-pool-jms).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11112">CVE-2020-11112</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.commons.proxy.provider.remoting.RmiProvider
- (aka apache/commons-proxy).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11113">CVE-2020-11113</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11619">CVE-2020-11619</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.springframework.aop.config.MethodLocatingFactoryBean
- (aka spring-aop).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11620">CVE-2020-11620</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.commons.jelly.impl.Embedded (aka commons-jelly).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u14.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2179.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2180.data b/english/lts/security/2020/dla-2180.data
deleted file mode 100644
index ec35599f940..00000000000
--- a/english/lts/security/2020/dla-2180.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2180-1 file-roller</define-tag>
-<define-tag report_date>2020-04-18</define-tag>
-<define-tag secrefs>CVE-2020-11736 Bug#956638</define-tag>
-<define-tag packages>file-roller</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2180.wml b/english/lts/security/2020/dla-2180.wml
deleted file mode 100644
index b33663a7b1a..00000000000
--- a/english/lts/security/2020/dla-2180.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows
-Directory Traversal during extraction because it lacks a check of
-whether a file's parent is a symlink to a directory outside of the
-intended extraction location.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.14.1-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your file-roller packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2180.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2181.data b/english/lts/security/2020/dla-2181.data
deleted file mode 100644
index cf7648aef88..00000000000
--- a/english/lts/security/2020/dla-2181.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2181-1 shiro</define-tag>
-<define-tag report_date>2020-04-19</define-tag>
-<define-tag secrefs>CVE-2020-1957</define-tag>
-<define-tag packages>shiro</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2181.wml b/english/lts/security/2020/dla-2181.wml
deleted file mode 100644
index f48b14638a8..00000000000
--- a/english/lts/security/2020/dla-2181.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a path-traversal issue in Apache Shiro, a
-security framework for the Java programming language. A specially-crafted
-request could cause an authentication bypass.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1957">CVE-2020-1957</a>
-
- <p>Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.3-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your shiro packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2181.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2182.data b/english/lts/security/2020/dla-2182.data
deleted file mode 100644
index c8a3b9f4251..00000000000
--- a/english/lts/security/2020/dla-2182.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2182-1 git</define-tag>
-<define-tag report_date>2020-04-23</define-tag>
-<define-tag secrefs>CVE-2020-11008</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2182.wml b/english/lts/security/2020/dla-2182.wml
deleted file mode 100644
index 31d4b01e733..00000000000
--- a/english/lts/security/2020/dla-2182.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Carlo Arenas discovered a flaw in git, a fast, scalable, distributed
-revision control system. With a crafted URL that contains a newline or
-empty host, or lacks a scheme, the credential helper machinery can be
-fooled into providing credential information that is not appropriate for
-the protocol in use and host being contacted.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1.4-2.1+deb8u10.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2182.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2183.data b/english/lts/security/2020/dla-2183.data
deleted file mode 100644
index 76e8af3aca1..00000000000
--- a/english/lts/security/2020/dla-2183.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2183-1 libgsf</define-tag>
-<define-tag report_date>2020-4-25</define-tag>
-<define-tag secrefs>CVE-2016-9888</define-tag>
-<define-tag packages>libgsf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2183.wml b/english/lts/security/2020/dla-2183.wml
deleted file mode 100644
index 6d8e2731449..00000000000
--- a/english/lts/security/2020/dla-2183.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a null pointer deference exploit in
-libgsf, a I/O abstraction library for GNOME.</p>
-
-<p>An error within the "tar_directory_for_file()" function could be exploited
-to trigger a null pointer dereference and subsequently cause a crash via a
-crafted TAR file.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.14.30-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libgsf packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2183.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2184.data b/english/lts/security/2020/dla-2184.data
deleted file mode 100644
index 372f0a35e76..00000000000
--- a/english/lts/security/2020/dla-2184.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2184-1 jsch</define-tag>
-<define-tag report_date>2020-4-25</define-tag>
-<define-tag secrefs>CVE-2016-5725</define-tag>
-<define-tag packages>jsch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2184.wml b/english/lts/security/2020/dla-2184.wml
deleted file mode 100644
index 63b3dd38d47..00000000000
--- a/english/lts/security/2020/dla-2184.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a path traversal vulnerability in jsch, a
-pure Java implementation of the SSH2 protocol.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.1.51-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your jsch packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2184.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2185.data b/english/lts/security/2020/dla-2185.data
deleted file mode 100644
index 115e8e2f97f..00000000000
--- a/english/lts/security/2020/dla-2185.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2185-1 eog</define-tag>
-<define-tag report_date>2020-4-25</define-tag>
-<define-tag secrefs>CVE-2016-6855</define-tag>
-<define-tag packages>eog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2185.wml b/english/lts/security/2020/dla-2185.wml
deleted file mode 100644
index 07656dce355..00000000000
--- a/english/lts/security/2020/dla-2185.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that eog (Eye of GNOME) incorrectly handled certain
-invalid UTF-8 strings. If a user were tricked into opening a
-specially-crafted image, a remote attacker could use this issue to cause
-Eye of GNOME to crash, resulting in a denial of service, or possibly
-execute arbitrary code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.14.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your eog packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2185.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2186.data b/english/lts/security/2020/dla-2186.data
deleted file mode 100644
index 946bbe5a15d..00000000000
--- a/english/lts/security/2020/dla-2186.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2186-1 ncmpc</define-tag>
-<define-tag report_date>2020-4-25</define-tag>
-<define-tag secrefs>CVE-2018-9240</define-tag>
-<define-tag packages>ncmpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2186.wml b/english/lts/security/2020/dla-2186.wml
deleted file mode 100644
index ee1ef55ba88..00000000000
--- a/english/lts/security/2020/dla-2186.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been discovered a NULL pointer dereference could happen in ncmpc,
-an ncurses-based audio player. This could result in a crash and a denial
-of service.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.24-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ncmpc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2186.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2187.data b/english/lts/security/2020/dla-2187.data
deleted file mode 100644
index af5dd2576d7..00000000000
--- a/english/lts/security/2020/dla-2187.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2187-1 radicale</define-tag>
-<define-tag report_date>2020-4-25</define-tag>
-<define-tag secrefs>CVE-2017-8342</define-tag>
-<define-tag packages>radicale</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2187.wml b/english/lts/security/2020/dla-2187.wml
deleted file mode 100644
index 8de4e939399..00000000000
--- a/english/lts/security/2020/dla-2187.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Radicale, a simple calendar and addressbook server - daemon, is prone to
-timing oracles and simple brute-force attacks when using the htpasswd
-authentication method.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your radicale packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2187.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2188.data b/english/lts/security/2020/dla-2188.data
deleted file mode 100644
index 0e23032b26c..00000000000
--- a/english/lts/security/2020/dla-2188.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2188-1 php5</define-tag>
-<define-tag report_date>2020-4-26</define-tag>
-<define-tag secrefs>CVE-2020-7064 CVE-2020-7066 CVE-2020-7067</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2188.wml b/english/lts/security/2020/dla-2188.wml
deleted file mode 100644
index 7bff19fafa7..00000000000
--- a/english/lts/security/2020/dla-2188.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three issues have been found in php5, a server-side, HTML-embedded
-scripting language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7064">CVE-2020-7064</a>
-
- <p>A one byte out-of-bounds read, which could potentially lead to
- information disclosure or crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7066">CVE-2020-7066</a>
-
- <p>An URL containing zero (\0) character will be truncated at it, which
- may cause some software to make incorrect assumptions and possibly
- send some information to a wrong server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7067">CVE-2020-7067</a>
-
- <p>Using a malformed url-encoded string an Out-of-Bounds read can occur.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.6.40+dfsg-0+deb8u11.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2188.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2189.data b/english/lts/security/2020/dla-2189.data
deleted file mode 100644
index ee2ebe8f650..00000000000
--- a/english/lts/security/2020/dla-2189.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2189-1 rzip</define-tag>
-<define-tag report_date>2020-4-26</define-tag>
-<define-tag secrefs>CVE-2017-8364</define-tag>
-<define-tag packages>rzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2189.wml b/english/lts/security/2020/dla-2189.wml
deleted file mode 100644
index 56573e00a88..00000000000
--- a/english/lts/security/2020/dla-2189.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Agostino Sarubbo of Gentoo discovered a heap buffer overflow write in the
-rzip program (a compression program for large files) when uncompressing
-maliciously crafted files.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your rzip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2189.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2190.data b/english/lts/security/2020/dla-2190.data
deleted file mode 100644
index f9ed44ea2b3..00000000000
--- a/english/lts/security/2020/dla-2190.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2190-1 ruby-json</define-tag>
-<define-tag report_date>2020-04-28</define-tag>
-<define-tag secrefs>CVE-2020-10663</define-tag>
-<define-tag packages>ruby-json</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2190.wml b/english/lts/security/2020/dla-2190.wml
deleted file mode 100644
index f94575bbf98..00000000000
--- a/english/lts/security/2020/dla-2190.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In ruby-json before 2.3.0, there is an unsafe object creation
-vulnerability. When parsing certain JSON documents, the json
-gem (including the one bundled with Ruby) can be coerced into
-creating arbitrary objects in the target system.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.8.1-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your ruby-json packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2190.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2191.data b/english/lts/security/2020/dla-2191.data
deleted file mode 100644
index e4b07323fdc..00000000000
--- a/english/lts/security/2020/dla-2191.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2191-1 dom4j</define-tag>
-<define-tag report_date>2020-05-01</define-tag>
-<define-tag secrefs>CVE-2020-10683 Bug#958055</define-tag>
-<define-tag packages>dom4j</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2191.wml b/english/lts/security/2020/dla-2191.wml
deleted file mode 100644
index 6922ce3e010..00000000000
--- a/english/lts/security/2020/dla-2191.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A flaw was found in dom4j library. By using the default
-SaxReader() provided by Dom4J, external DTDs and External
-Entities are allowed, resulting in a possible XXE.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.1+dfsg.3-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your dom4j packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2191.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2192.data b/english/lts/security/2020/dla-2192.data
deleted file mode 100644
index 14f4aad7d9a..00000000000
--- a/english/lts/security/2020/dla-2192.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2192-1 ruby2.1</define-tag>
-<define-tag report_date>2020-05-01</define-tag>
-<define-tag secrefs>CVE-2020-10663</define-tag>
-<define-tag packages>ruby2.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2192.wml b/english/lts/security/2020/dla-2192.wml
deleted file mode 100644
index 522fdb78ef2..00000000000
--- a/english/lts/security/2020/dla-2192.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.1 has an
-unsafe object creation vulnerability.
-This is quite similar to <a href="https://security-tracker.debian.org/tracker/CVE-2013-0269">CVE-2013-0269</a>, but does not rely on poor
-garbage-collection behavior within Ruby. Specifically, use of JSON
-parsing methods can lead to creation of a malicious object within
-the interpreter, with adverse effects that are application-dependent.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.1.5-2+deb8u10.</p>
-
-<p>We recommend that you upgrade your ruby2.1 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2192.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2193.data b/english/lts/security/2020/dla-2193.data
deleted file mode 100644
index c3a21682527..00000000000
--- a/english/lts/security/2020/dla-2193.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2193-1 openjdk-7</define-tag>
-<define-tag report_date>2020-04-28</define-tag>
-<define-tag secrefs>CVE-2020-2756 CVE-2020-2757 CVE-2020-2773 CVE-2020-2781 CVE-2020-2800 CVE-2020-2803 CVE-2020-2805 CVE-2020-2830</define-tag>
-<define-tag packages>openjdk-7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2193.wml b/english/lts/security/2020/dla-2193.wml
deleted file mode 100644
index 1e8b5873585..00000000000
--- a/english/lts/security/2020/dla-2193.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in the OpenJDK Java
-runtime, resulting in denial of service, insecure TLS handshakes, bypass
-of sandbox restrictions or HTTP response splitting attacks.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7u261-2.6.22-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your openjdk-7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2193.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2194.data b/english/lts/security/2020/dla-2194.data
deleted file mode 100644
index 27cc601be89..00000000000
--- a/english/lts/security/2020/dla-2194.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2194-1 yodl</define-tag>
-<define-tag report_date>2020-4-30</define-tag>
-<define-tag secrefs>CVE-2016-10375</define-tag>
-<define-tag packages>yodl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2194.wml b/english/lts/security/2020/dla-2194.wml
deleted file mode 100644
index 292d8b9ba55..00000000000
--- a/english/lts/security/2020/dla-2194.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in yodl, a pre-document language.
-Hanno Bock discovered that there was a buffer over-read vulnerability.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.04.00-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your yodl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2194.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2195.data b/english/lts/security/2020/dla-2195.data
deleted file mode 100644
index 6bc4bc08f29..00000000000
--- a/english/lts/security/2020/dla-2195.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2195-1 w3m</define-tag>
-<define-tag report_date>2020-4-30</define-tag>
-<define-tag secrefs>CVE-2018-6196 CVE-2018-6197</define-tag>
-<define-tag packages>w3m</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2195.wml b/english/lts/security/2020/dla-2195.wml
deleted file mode 100644
index 95fe04e7716..00000000000
--- a/english/lts/security/2020/dla-2195.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in w3m, WWW browsable pager with excellent
-tables/frames support.</p>
-
-<p>One issue is related to a stack overflow, the other one is a fix for a
-null pointer dereference.</p>
-
-
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6196">CVE-2018-6196</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6197">CVE-2018-6197</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.5.3-19+deb8u3.</p>
-
-<p>We recommend that you upgrade your w3m packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2195.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2196-2.data b/english/lts/security/2020/dla-2196-2.data
deleted file mode 100644
index 792e0fcf577..00000000000
--- a/english/lts/security/2020/dla-2196-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2196-2 pound</define-tag>
-<define-tag report_date>2020-5-3</define-tag>
-<define-tag secrefs>CVE-2016-10711</define-tag>
-<define-tag packages>pound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2196-2.wml b/english/lts/security/2020/dla-2196-2.wml
deleted file mode 100644
index b9c0c89a42f..00000000000
--- a/english/lts/security/2020/dla-2196-2.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A regression has been found in the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2016-10711">CVE-2016-10711</a> of pound, a
-reverse proxy, load balancer and HTTPS front-end for Web servers.
-Without the fix pound can be tricked to use 100% CPU.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.6-6+deb8u3.</p>
-
-<p>We recommend that you upgrade your pound packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2196-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2196.data b/english/lts/security/2020/dla-2196.data
deleted file mode 100644
index 29adb5b40ed..00000000000
--- a/english/lts/security/2020/dla-2196.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2196-1 pound</define-tag>
-<define-tag report_date>2020-4-30</define-tag>
-<define-tag secrefs>CVE-2016-10711</define-tag>
-<define-tag packages>pound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2196.wml b/english/lts/security/2020/dla-2196.wml
deleted file mode 100644
index 4f14f4cac99..00000000000
--- a/english/lts/security/2020/dla-2196.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in pound,
-A request smuggling vulnerability was discovered in pound, a everse proxy,
-load balancer and HTTPS front-end for Web servers, that may allow
-attackers to send a specially crafted http request to a web server or
-reverse proxy while pound may see a different set of requests.
-This facilitates several possible exploitations, such as partial cache
-poisoning, bypassing firewall protection and XSS.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.6-6+deb8u2.</p>
-
-<p>We recommend that you upgrade your pound packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2196.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2197.data b/english/lts/security/2020/dla-2197.data
deleted file mode 100644
index 9ddb8758a7c..00000000000
--- a/english/lts/security/2020/dla-2197.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2197-1 miniupnpc</define-tag>
-<define-tag report_date>2020-4-30</define-tag>
-<define-tag secrefs>CVE-2017-8798</define-tag>
-<define-tag packages>miniupnpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2197.wml b/english/lts/security/2020/dla-2197.wml
deleted file mode 100644
index e11e6b9045a..00000000000
--- a/english/lts/security/2020/dla-2197.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a integer signedness error in the
-miniupnpc UPnP client that could allow remote attackers to cause a denial
-of service attack.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in
-version 1.9.20140610-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your miniupnpc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2197.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2198.data b/english/lts/security/2020/dla-2198.data
deleted file mode 100644
index a81ac58beec..00000000000
--- a/english/lts/security/2020/dla-2198.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2198-1 otrs2</define-tag>
-<define-tag report_date>2020-05-01</define-tag>
-<define-tag secrefs>CVE-2020-1770 CVE-2020-1772 CVE-2020-1774</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2198.wml b/english/lts/security/2020/dla-2198.wml
deleted file mode 100644
index 67d9518ca25..00000000000
--- a/english/lts/security/2020/dla-2198.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in otrs2 (Open source Ticket Request System)</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1770">CVE-2020-1770</a>
-
- <p>Support bundle generated files could contain sensitive information
- that might be unwanted to be disclosed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1772">CVE-2020-1772</a>
-
- <p>It’s possible to craft Lost Password requests with wildcards in the
- Token value, which allows attacker to retrieve valid Token(s),
- generated by users which already requested new passwords.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1774">CVE-2020-1774</a>
-
- <p>When user downloads PGP or S/MIME keys/certificates, exported file
- has same name for private and public keys. Therefore it’s possible
- to mix them and to send private key to the third-party instead of
- public key.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.3.18-1+deb8u15.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2198.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2199.data b/english/lts/security/2020/dla-2199.data
deleted file mode 100644
index 60c54f5b01b..00000000000
--- a/english/lts/security/2020/dla-2199.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2199-1 openldap</define-tag>
-<define-tag report_date>2020-05-02</define-tag>
-<define-tag secrefs>CVE-2020-12243</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2199.wml b/english/lts/security/2020/dla-2199.wml
deleted file mode 100644
index 9cddd646df5..00000000000
--- a/english/lts/security/2020/dla-2199.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in OpenLDAP, a free implementation of the
-Lightweight Directory Access Protocol. LDAP search filters with nested
-boolean expressions can result in denial of service (slapd daemon
-crash).</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.4.40+dfsg-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2199.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2200.data b/english/lts/security/2020/dla-2200.data
deleted file mode 100644
index 258d825a336..00000000000
--- a/english/lts/security/2020/dla-2200.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2200-1 mailman</define-tag>
-<define-tag report_date>2020-05-03</define-tag>
-<define-tag secrefs>CVE-2020-12137</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2200.wml b/english/lts/security/2020/dla-2200.wml
deleted file mode 100644
index 793b262e245..00000000000
--- a/english/lts/security/2020/dla-2200.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in mailman. GNU Mailman 2.x before 2.1.30
-uses the .obj extension for scrubbed application/octet-stream MIME parts.
-This behavior may contribute to XSS attacks against list-archive visitors,
-because an HTTP reply from an archive web server may lack a MIME type,
-and a web browser may perform MIME sniffing, conclude that the MIME type
-should have been text/html, and execute JavaScript code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1.18-2+deb8u5.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2200.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2201.data b/english/lts/security/2020/dla-2201.data
deleted file mode 100644
index f74b2d329e6..00000000000
--- a/english/lts/security/2020/dla-2201.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2201-1 ntp</define-tag>
-<define-tag report_date>2020-05-05</define-tag>
-<define-tag secrefs>CVE-2020-11868</define-tag>
-<define-tag packages>ntp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2201.wml b/english/lts/security/2020/dla-2201.wml
deleted file mode 100644
index 9eeca58d937..00000000000
--- a/english/lts/security/2020/dla-2201.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A Denial of Service (DoS) vulnerability was discovered in the network time
-protocol server/client, ntp.</p>
-
-<p>ntp allowed an "off-path" attacker to block unauthenticated
-synchronisation via a server mode packet with a spoofed source IP
-address because transmissions were rescheduled even if a packet
-lacked a valid "origin timestamp"</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11868">CVE-2020-11868</a>
-
- <p>ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path
- attacker to block unauthenticated synchronization via a server mode packet
- with a spoofed source IP address, because transmissions are rescheduled
- even when a packet lacks a valid origin timestamp</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:4.2.6.p5+dfsg-7+deb8u3.</p>
-
-<p>We recommend that you upgrade your ntp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2201.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2202.data b/english/lts/security/2020/dla-2202.data
deleted file mode 100644
index b3c47354d5b..00000000000
--- a/english/lts/security/2020/dla-2202.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2202-1 ansible</define-tag>
-<define-tag report_date>2020-05-05</define-tag>
-<define-tag secrefs>CVE-2019-14846 CVE-2020-1733 CVE-2020-1739 CVE-2020-1740 Bug#942188</define-tag>
-<define-tag packages>ansible</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2202.wml b/english/lts/security/2020/dla-2202.wml
deleted file mode 100644
index 58b9e17a4f9..00000000000
--- a/english/lts/security/2020/dla-2202.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in Ansible, a configuration
-management, deployment, and task execution system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14846">CVE-2019-14846</a>
-
- <p>Ansible was logging at the DEBUG level which lead to a disclosure
- of credentials if a plugin used a library that logged credentials
- at the DEBUG level. This flaw does not affect Ansible modules, as
- those are executed in a separate process.</p>
-
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1733">CVE-2020-1733</a>
-
- <p>A race condition flaw was found when running a playbook with an
- unprivileged become user. When Ansible needs to run a module with
- become user, the temporary directory is created in /var/tmp. This
- directory is created with "umask 77 &amp;&amp; mkdir -p dir"; this
- operation does not fail if the directory already exists and is
- owned by another user. An attacker could take advantage to gain
- control of the become user as the target directory can be
- retrieved by iterating '/proc/pid/cmdline'.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1739">CVE-2020-1739</a>
-
- <p>A flaw was found when a password is set with the argument
- <q>password</q> of svn module, it is used on svn command line,
- disclosing to other users within the same node. An attacker could
- take advantage by reading the cmdline file from that particular
- PID on the procfs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1740">CVE-2020-1740</a>
-
- <p>A flaw was found when using Ansible Vault for editing encrypted
- files. When a user executes "ansible-vault edit", another user on
- the same computer can read the old and new secret, as it is
- created in a temporary file with mkstemp and the returned file
- descriptor is closed and the method write_data is called to write
- the existing secret in the file. This method will delete the file
- before recreating it insecurely.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.2+dfsg-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your ansible packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2202.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2203.data b/english/lts/security/2020/dla-2203.data
deleted file mode 100644
index 2de43133e47..00000000000
--- a/english/lts/security/2020/dla-2203.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2203-1 sqlite3</define-tag>
-<define-tag report_date>2020-05-05</define-tag>
-<define-tag secrefs>CVE-2020-11655</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2203.wml b/english/lts/security/2020/dla-2203.wml
deleted file mode 100644
index 6af9e9a1403..00000000000
--- a/english/lts/security/2020/dla-2203.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial of service attack in the SQLite
-database, often embedded into other programs and servers.</p>
-
-<p>In the event of a semantic error in an aggregate query, SQLite did not
-return early from the "resetAccumulator()" function which would lead to a crash
-via a segmentation fault.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11655">CVE-2020-11655</a>
-
- <p>SQLite through 3.31.1 allows attackers to cause a denial of service
- (segmentation fault) via a malformed window-function query because the
- AggInfo object's initialization is mishandled.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.8.7.1-1+deb8u5.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2203.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2204.data b/english/lts/security/2020/dla-2204.data
deleted file mode 100644
index 3475a9fd39e..00000000000
--- a/english/lts/security/2020/dla-2204.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2204-1 mailman</define-tag>
-<define-tag report_date>2020-05-07</define-tag>
-<define-tag secrefs>CVE-2020-12108</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2204.wml b/english/lts/security/2020/dla-2204.wml
deleted file mode 100644
index 91e5ba66a1c..00000000000
--- a/english/lts/security/2020/dla-2204.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an arbitrary content injection
-vulnerability in the <a href="https://www.list.org/">Mailman mailing list
-manager</a>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12108">CVE-2020-12108</a>
-
- <p>/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content
- Injection.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1.18-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2204.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2205.data b/english/lts/security/2020/dla-2205.data
deleted file mode 100644
index e8bbc341fcc..00000000000
--- a/english/lts/security/2020/dla-2205.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2205-1 firefox-esr</define-tag>
-<define-tag report_date>2020-05-08</define-tag>
-<define-tag secrefs>CVE-2020-6831 CVE-2020-12387 CVE-2020-12392 CVE-2020-12395</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2205.wml b/english/lts/security/2020/dla-2205.wml
deleted file mode 100644
index afca556f8b1..00000000000
--- a/english/lts/security/2020/dla-2205.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or information disclosure.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.8.0esr-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2205.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2206.data b/english/lts/security/2020/dla-2206.data
deleted file mode 100644
index 5d7fab21155..00000000000
--- a/english/lts/security/2020/dla-2206.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2206-1 thunderbird</define-tag>
-<define-tag report_date>2020-05-09</define-tag>
-<define-tag secrefs>CVE-2020-6831 CVE-2020-12387 CVE-2020-12392 CVE-2020-12395 CVE-2020-12397</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2206.wml b/english/lts/security/2020/dla-2206.wml
deleted file mode 100644
index 6fd40c6e101..00000000000
--- a/english/lts/security/2020/dla-2206.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security issues have been found in Thunderbird which could
-result in spoofing the displayed sender email address, denial of service
-or potentially the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.8.0-1~deb8u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2206.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2207.data b/english/lts/security/2020/dla-2207.data
deleted file mode 100644
index d47fee77db3..00000000000
--- a/english/lts/security/2020/dla-2207.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2207-1 libntlm</define-tag>
-<define-tag report_date>2020-05-10</define-tag>
-<define-tag secrefs>CVE-2019-17455</define-tag>
-<define-tag packages>libntlm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2207.wml b/english/lts/security/2020/dla-2207.wml
deleted file mode 100644
index f7b23d18299..00000000000
--- a/english/lts/security/2020/dla-2207.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that libntlm through 1.5 relies on a fixed buffer size for
-tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse
-read and write operations, as demonstrated by a stack-based buffer
-over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted
-NTLM request.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.4-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libntlm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2207.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2208.data b/english/lts/security/2020/dla-2208.data
deleted file mode 100644
index 6fddaa28d5e..00000000000
--- a/english/lts/security/2020/dla-2208.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2208-1 wordpress</define-tag>
-<define-tag report_date>2020-05-11</define-tag>
-<define-tag secrefs>CVE-2020-11026 CVE-2020-11027 CVE-2020-11028 CVE-2020-11029 Bug#959391</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2208.wml b/english/lts/security/2020/dla-2208.wml
deleted file mode 100644
index 085f9949d13..00000000000
--- a/english/lts/security/2020/dla-2208.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple CVE(s) were discovered in the src:wordpress package.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11026">CVE-2020-11026</a>
-
- <p>Files with a specially crafted name when uploaded to the
- Media section can lead to script execution upon accessing
- the file. This requires an authenticated user with privileges
- to upload files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11027">CVE-2020-11027</a>
-
- <p>A password reset link emailed to a user does not expire upon
- changing the user password. Access would be needed to the email
- account of the user by a malicious party for successful execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11028">CVE-2020-11028</a>
-
- <p>Some private posts, which were previously public, can result in
- unauthenticated disclosure under a specific set of conditions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11029">CVE-2020-11029</a>
-
- <p>A vulnerability in the stats() method of class-wp-object-cache.php
- can be exploited to execute cross-site scripting (XSS) attacks.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1.30+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2208.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2209.data b/english/lts/security/2020/dla-2209.data
deleted file mode 100644
index 24e66a09f43..00000000000
--- a/english/lts/security/2020/dla-2209.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2209-1 tomcat8</define-tag>
-<define-tag report_date>2020-5-28</define-tag>
-<define-tag secrefs>CVE-2019-17563 CVE-2020-1935 CVE-2020-1938 CVE-2020-9484 Bug#961209 Bug#952436 Bug#952437 Bug#952438</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2209.wml b/english/lts/security/2020/dla-2209.wml
deleted file mode 100644
index f66a13c6242..00000000000
--- a/english/lts/security/2020/dla-2209.wml
+++ /dev/null
@@ -1,78 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<p>WARNING: The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2020-1938">CVE-2020-1938</a> may disrupt services that rely on a
-working AJP configuration. The option secretRequired defaults to true
-now. You should define a secret in your server.xml or you can revert
-back by setting secretRequired to false.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17563">CVE-2019-17563</a>
-
- <p>When using FORM authentication with Apache Tomcat there was a narrow
- window where an attacker could perform a session fixation attack.
- The window was considered too narrow for an exploit to be practical
- but, erring on the side of caution, this issue has been treated as a
- security vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1935">CVE-2020-1935</a>
-
- <p>In Apache Tomcat the HTTP header parsing code used an approach to
- end-of-line parsing that allowed some invalid HTTP headers to be
- parsed as valid. This led to a possibility of HTTP Request Smuggling
- if Tomcat was located behind a reverse proxy that incorrectly
- handled the invalid Transfer-Encoding header in a particular manner.
- Such a reverse proxy is considered unlikely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1938">CVE-2020-1938</a>
-
- <p>When using the Apache JServ Protocol (AJP), care must be taken when
- trusting incoming connections to Apache Tomcat. Tomcat treats AJP
- connections as having higher trust than, for example, a similar HTTP
- connection. If such connections are available to an attacker, they
- can be exploited in ways that may be surprising. Previously Tomcat
- shipped with an AJP Connector enabled by default that listened on
- all configured IP addresses. It was expected (and recommended in the
- security guide) that this Connector would be disabled if not
- required.
- .
- Note that Debian already disabled the AJP connector by default.
- Mitigation is only required if the AJP port was made accessible to
- untrusted users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9484">CVE-2020-9484</a>
-
- <p>When using Apache Tomcat and an attacker is able to control the
- contents and name of a file on the server; and b) the server is
- configured to use the PersistenceManager with a FileStore; and c)
- the PersistenceManager is configured with
- sessionAttributeValueClassNameFilter="null" (the default unless a
- SecurityManager is used) or a sufficiently lax filter to allow the
- attacker provided object to be deserialized; and d) the attacker
- knows the relative file path from the storage location used by
- FileStore to the file the attacker has control over; then, using a
- specifically crafted request, the attacker will be able to trigger
- remote code execution via deserialization of the file under their
- control. Note that all of conditions a) to d) must be true for the
- attack to succeed.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-8.0.14-1+deb8u17.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2209.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2210.data b/english/lts/security/2020/dla-2210.data
deleted file mode 100644
index 58897177827..00000000000
--- a/english/lts/security/2020/dla-2210.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2210-1 apt</define-tag>
-<define-tag report_date>2020-05-15</define-tag>
-<define-tag secrefs>CVE-2020-3810</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2210.wml b/english/lts/security/2020/dla-2210.wml
deleted file mode 100644
index 9c9b2d311e5..00000000000
--- a/english/lts/security/2020/dla-2210.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>When normalizing ar member names by removing trailing whitespace
-and slashes, an out-out-bound read can be caused if the ar member
-name consists only of such characters, because the code did not
-stop at 0, but would wrap around and continue reading from the
-stack, without any limit.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.9.8.6.</p>
-
-<p>We recommend that you upgrade your apt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2210.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2211.data b/english/lts/security/2020/dla-2211.data
deleted file mode 100644
index 03c18773260..00000000000
--- a/english/lts/security/2020/dla-2211.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2211-1 log4net</define-tag>
-<define-tag report_date>2020-05-15</define-tag>
-<define-tag secrefs>CVE-2018-1285</define-tag>
-<define-tag packages>log4net</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2211.wml b/english/lts/security/2020/dla-2211.wml
deleted file mode 100644
index e069bf05c7e..00000000000
--- a/english/lts/security/2020/dla-2211.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an XML external entity vulnerability in
-<tt>log4net</tt>, a logging API for the ECMA Common Language Infrastructure
-(CLI), sometimes referred to as "Mono".</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1285">CVE-2018-1285</a>
-
- <p>Apache log4net before 2.0.8 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.2.10+dfsg-6+deb8u1.</p>
-
-<p>We recommend that you upgrade your log4net packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2211.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2212.data b/english/lts/security/2020/dla-2212.data
deleted file mode 100644
index fc96b8c7f2f..00000000000
--- a/english/lts/security/2020/dla-2212.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2212-1 openconnect</define-tag>
-<define-tag report_date>2020-05-16</define-tag>
-<define-tag secrefs>CVE-2020-12823 Bug#960620</define-tag>
-<define-tag packages>openconnect</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2212.wml b/english/lts/security/2020/dla-2212.wml
deleted file mode 100644
index d7186f4da04..00000000000
--- a/english/lts/security/2020/dla-2212.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>OpenConnect, a VPN software, had a buffer overflow, causing a denial of
-service (application crash) or possibly unspecified other impact, via
-crafted certificate data to get_cert_name in gnutls.c.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-6.00-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your openconnect packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2212.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2213.data b/english/lts/security/2020/dla-2213.data
deleted file mode 100644
index de835350c49..00000000000
--- a/english/lts/security/2020/dla-2213.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2213-1 exim4</define-tag>
-<define-tag report_date>2020-05-16</define-tag>
-<define-tag secrefs>CVE-2020-12783</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2213.wml b/english/lts/security/2020/dla-2213.wml
deleted file mode 100644
index bf031d3e2e3..00000000000
--- a/english/lts/security/2020/dla-2213.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that exim4, a mail transport agent, suffers from a
-authentication bypass vulnerability in the spa authentication driver.
-The spa authentication driver is not enabled by default.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.84.2-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2213.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2214.data b/english/lts/security/2020/dla-2214.data
deleted file mode 100644
index d9f59140e37..00000000000
--- a/english/lts/security/2020/dla-2214.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2214-1 libexif</define-tag>
-<define-tag report_date>2020-05-18</define-tag>
-<define-tag secrefs>CVE-2016-6328 CVE-2017-7544 CVE-2018-20030 CVE-2020-0093 CVE-2020-12767 Bug##960199 Bug##918730 Bug##876466 Bug##873022</define-tag>
-<define-tag packages>libexif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2214.wml b/english/lts/security/2020/dla-2214.wml
deleted file mode 100644
index 2d6047e6dcc..00000000000
--- a/english/lts/security/2020/dla-2214.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various vulnerabilities have been addressed in libexif, a library to
-parse EXIF metadata files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6328">CVE-2016-6328</a>
-
- <p>An integer overflow when parsing the MNOTE entry data of the input
- file had been found. This could have caused Denial-of-Service (DoS)
- and Information Disclosure (disclosing some critical heap chunk
- metadata, even other applications' private data).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7544">CVE-2017-7544</a>
-
- <p>libexif had been vulnerable to out-of-bounds heap read vulnerability
- in exif_data_save_data_entry function in libexif/exif-data.c caused
- by improper length computation of the allocated data of an ExifMnote
- entry which could have caused denial-of-service or possibly information
- disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20030">CVE-2018-20030</a>
-
- <p>An error when processing the EXIF_IFD_INTEROPERABILITY and
- EXIF_IFD_EXIF tags within libexif version could have been exploited
- to exhaust available CPU resources.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0093">CVE-2020-0093</a>
-
- <p>In exif_data_save_data_entry of exif-data.c, there was a possible out
- of bounds read due to a missing bounds check. This could have lead to
- local information disclosure with no additional execution privileges
- needed. User interaction was needed for exploitation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12767">CVE-2020-12767</a>
-
- <p>libexif had a divide-by-zero error in exif_entry_get_value in
- exif-entry.c</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.6.21-2+deb8u2.</p>
-
-<p>We recommend that you upgrade your libexif packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2214.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2215.data b/english/lts/security/2020/dla-2215.data
deleted file mode 100644
index 5c17b888adf..00000000000
--- a/english/lts/security/2020/dla-2215.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2215-1 clamav</define-tag>
-<define-tag report_date>2020-05-20</define-tag>
-<define-tag secrefs>CVE-2020-3327 CVE-2020-3341</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2215.wml b/english/lts/security/2020/dla-2215.wml
deleted file mode 100644
index 8c784b1a557..00000000000
--- a/english/lts/security/2020/dla-2215.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVE(s) were found in src:clamav package.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3327">CVE-2020-3327</a>
-
- <p>A vulnerability in the ARJ archive parsing module in Clam
- AntiVirus (ClamAV) could allow an unauthenticated, remote
- attacker to cause a denial of service condition on an affected
- device. The vulnerability is due to a heap buffer overflow read.
- An attacker could exploit this vulnerability by sending a crafted
- ARJ file to an affected device. An exploit could allow the
- attacker to cause the ClamAV scanning process crash, resulting
- in a denial of service condition.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3341">CVE-2020-3341</a>
-
- <p>A vulnerability in the PDF archive parsing module in Clam
- AntiVirus (ClamAV) could allow an unauthenticated, remote
- attacker to cause a denial of service condition on an affected
- device. The vulnerability is due to a stack buffer overflow read.
- An attacker could exploit this vulnerability by sending a crafted
- PDF file to an affected device. An exploit could allow the
- attacker to cause the ClamAV scanning process crash, resulting
- in a denial of service condition.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.101.5+dfsg-0+deb8u2.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2215.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2216.data b/english/lts/security/2020/dla-2216.data
deleted file mode 100644
index a4c1d428d8e..00000000000
--- a/english/lts/security/2020/dla-2216.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2216-1 ruby-rack</define-tag>
-<define-tag report_date>2020-05-23</define-tag>
-<define-tag secrefs>CVE-2020-8161</define-tag>
-<define-tag packages>ruby-rack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2216.wml b/english/lts/security/2020/dla-2216.wml
deleted file mode 100644
index 0d0c1c3ebe5..00000000000
--- a/english/lts/security/2020/dla-2216.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>There was a possible directory traversal vulnerability in the
-Rack::Directory app that is bundled with Rack.</p>
-
-<p>If certain directories exist in a director that is managed by
-`Rack::Directory`, an attacker could, using this vulnerability,
-read the contents of files on the server that were outside of
-the root specified in the Rack::Directory initializer.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.5.2-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your ruby-rack packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2216.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2217.data b/english/lts/security/2020/dla-2217.data
deleted file mode 100644
index 01c1b0cba16..00000000000
--- a/english/lts/security/2020/dla-2217.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2217-1 tomcat7</define-tag>
-<define-tag report_date>2020-05-23</define-tag>
-<define-tag secrefs>CVE-2020-9484</define-tag>
-<define-tag packages>tomcat7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2217.wml b/english/lts/security/2020/dla-2217.wml
deleted file mode 100644
index eb2dabb05a3..00000000000
--- a/english/lts/security/2020/dla-2217.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote code execution via
-deserialization in tomcat7, a server for HTTP and Java "servlets".</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9484">CVE-2020-9484</a>
-
- <p>When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to
- 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to
- control the contents and name of a file on the server; and b) the server is
- configured to use the PersistenceManager with a FileStore; and c) the
- PersistenceManager is configured with
- sessionAttributeValueClassNameFilter="null" (the default unless a
- SecurityManager is used) or a sufficiently lax filter to allow the attacker
- provided object to be deserialized; and d) the attacker knows the relative
- file path from the storage location used by FileStore to the file the
- attacker has control over; then, using a specifically crafted request, the
- attacker will be able to trigger remote code execution via deserialization
- of the file under their control. Note that all of conditions a) to d) must
- be true for the attack to succeed.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-7.0.56-3+really7.0.100-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your tomcat7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2217.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2218.data b/english/lts/security/2020/dla-2218.data
deleted file mode 100644
index de1b96c523f..00000000000
--- a/english/lts/security/2020/dla-2218.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2218-1 transmission</define-tag>
-<define-tag report_date>2020-5-24</define-tag>
-<define-tag secrefs>CVE-2018-10756</define-tag>
-<define-tag packages>transmission</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2218.wml b/english/lts/security/2020/dla-2218.wml
deleted file mode 100644
index b57cb2359e2..00000000000
--- a/english/lts/security/2020/dla-2218.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tom Richards reported that by using a crafted torrent file one could cause
-a use-after-free, which might result in a denial of service (crash) or
-possible execution of arbitrary code.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.84-0.2+deb8u2.</p>
-
-<p>We recommend that you upgrade your transmission packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2218.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2219.data b/english/lts/security/2020/dla-2219.data
deleted file mode 100644
index bcbaef343de..00000000000
--- a/english/lts/security/2020/dla-2219.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2219-1 feh</define-tag>
-<define-tag report_date>2020-5-24</define-tag>
-<define-tag secrefs>CVE-2017-7875</define-tag>
-<define-tag packages>feh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2219.wml b/english/lts/security/2020/dla-2219.wml
deleted file mode 100644
index f90f9b8fc1d..00000000000
--- a/english/lts/security/2020/dla-2219.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tobias Stoeckmann discovered that it was possible to trigger an
-out-of-boundary heap write with the image viewer feh while receiving
-an IPC message.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.12-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your feh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2219.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2220.data b/english/lts/security/2020/dla-2220.data
deleted file mode 100644
index 5480a410f02..00000000000
--- a/english/lts/security/2020/dla-2220.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2220-1 cracklib2</define-tag>
-<define-tag report_date>2020-5-24</define-tag>
-<define-tag secrefs>CVE-2016-6318</define-tag>
-<define-tag packages>cracklib2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2220.wml b/english/lts/security/2020/dla-2220.wml
deleted file mode 100644
index 30030f0609e..00000000000
--- a/english/lts/security/2020/dla-2220.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a stack-based buffer overflow when
-parsing large GECOS fields in cracklib2, a pro-active password checker
-library.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.9.2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your cracklib2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2220.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2221.data b/english/lts/security/2020/dla-2221.data
deleted file mode 100644
index 095a8011705..00000000000
--- a/english/lts/security/2020/dla-2221.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2221-1 sqlite3</define-tag>
-<define-tag report_date>2020-05-26</define-tag>
-<define-tag secrefs>CVE-2020-13434</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2221.wml b/english/lts/security/2020/dla-2221.wml
deleted file mode 100644
index e31211fbf24..00000000000
--- a/english/lts/security/2020/dla-2221.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An integer overflow vulnerability was found in the sqlite3_str_vappendf function of the src/printf.c file of sqlite3 from version 3.8.3.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.8.7.1-1+deb8u6.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2221.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2222.data b/english/lts/security/2020/dla-2222.data
deleted file mode 100644
index 9837c1fe69a..00000000000
--- a/english/lts/security/2020/dla-2222.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2222-1 libexif</define-tag>
-<define-tag report_date>2020-05-28</define-tag>
-<define-tag secrefs>CVE-2018-20030 CVE-2020-13112 CVE-2020-13113 CVE-2020-13114 Bug#918730 Bug#961407 Bug#961409 Bug#961410</define-tag>
-<define-tag packages>libexif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2222.wml b/english/lts/security/2020/dla-2222.wml
deleted file mode 100644
index c542542a694..00000000000
--- a/english/lts/security/2020/dla-2222.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Various minor vulnerabilities have been addredd in libexif, a library to
-parse EXIF metadata files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20030">CVE-2018-20030</a>
-
- <p>This issue had already been addressed via DLA-2214-1. However, upstream
- provided an updated patch, so this has been followed up on.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13112">CVE-2020-13112</a>
-
- <p>Several buffer over-reads in EXIF MakerNote handling could have lead
- to information disclosure and crashes. This issue is different from
- already resolved <a href="https://security-tracker.debian.org/tracker/CVE-2020-0093">CVE-2020-0093</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13113">CVE-2020-13113</a>
-
- <p>Use of uninitialized memory in EXIF Makernote handling could have
- lead to crashes and potential use-after-free conditions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13114">CVE-2020-13114</a>
-
- <p>An unrestricted size in handling Canon EXIF MakerNote data could have
- lead to consumption of large amounts of compute time for decoding
- EXIF data.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.6.21-2+deb8u3.</p>
-
-<p>We recommend that you upgrade your libexif packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2222.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2223.data b/english/lts/security/2020/dla-2223.data
deleted file mode 100644
index 5f987dd6f3a..00000000000
--- a/english/lts/security/2020/dla-2223.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2223-1 salt</define-tag>
-<define-tag report_date>2020-05-30</define-tag>
-<define-tag secrefs>CVE-2020-11651 CVE-2020-11652 Bug#959684</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2223.wml b/english/lts/security/2020/dla-2223.wml
deleted file mode 100644
index 25b38e7afa2..00000000000
--- a/english/lts/security/2020/dla-2223.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in package salt, a
-configuration management and infrastructure automation software.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11651">CVE-2020-11651</a>
-
- <p>The salt-master process ClearFuncs class does not properly validate
- method calls. This allows a remote user to access some methods
- without authentication. These methods can be used to retrieve user
- tokens from the salt master and/or run arbitrary commands on salt
- minions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11652">CVE-2020-11652</a>
-
- <p>The salt-master process ClearFuncs class allows access to some
- methods that improperly sanitize paths. These methods allow
- arbitrary directory access to authenticated users.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2014.1.13+ds-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2223.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2224.data b/english/lts/security/2020/dla-2224.data
deleted file mode 100644
index 071ebf7dde4..00000000000
--- a/english/lts/security/2020/dla-2224.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2224-1 dosfstools</define-tag>
-<define-tag report_date>2020-5-30</define-tag>
-<define-tag secrefs>CVE-2015-8872 CVE-2016-4804</define-tag>
-<define-tag packages>dosfstools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2224.wml b/english/lts/security/2020/dla-2224.wml
deleted file mode 100644
index b45ead3522b..00000000000
--- a/english/lts/security/2020/dla-2224.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was both an invalid memory and heap overflow
-vulnerability in dosfstools, a collection of utilities for making and
-checking MS-DOS FAT filesystems.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.0.27-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your dosfstools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2224.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2225.data b/english/lts/security/2020/dla-2225.data
deleted file mode 100644
index 931de597880..00000000000
--- a/english/lts/security/2020/dla-2225.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2225-1 gst-plugins-good0.10</define-tag>
-<define-tag report_date>2020-5-30</define-tag>
-<define-tag secrefs>CVE-2016-10198 CVE-2017-5840</define-tag>
-<define-tag packages>gst-plugins-good0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2225.wml b/english/lts/security/2020/dla-2225.wml
deleted file mode 100644
index 91ce3a6b1cf..00000000000
--- a/english/lts/security/2020/dla-2225.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two memory handling issues were found in gst-plugins-good0.10, a
-collection of GStreamer plugins from the <q>good</q> set:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10198">CVE-2016-10198</a>
-
- <p>An invalid read can be triggered in the aacparse element via a
- maliciously crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5840">CVE-2017-5840</a>
-
- <p>An out of bounds heap read can be triggered in the qtdemux element
- via a maliciously crafted file.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.10.31-3+nmu4+deb8u3.</p>
-
-<p>We recommend that you upgrade your gst-plugins-good0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2225.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2226.data b/english/lts/security/2020/dla-2226.data
deleted file mode 100644
index 0ddb6d310b5..00000000000
--- a/english/lts/security/2020/dla-2226.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2226-1 gst-plugins-ugly0.10</define-tag>
-<define-tag report_date>2020-5-30</define-tag>
-<define-tag secrefs>CVE-2017-5846 CVE-2017-5847</define-tag>
-<define-tag packages>gst-plugins-ugly0.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2226.wml b/english/lts/security/2020/dla-2226.wml
deleted file mode 100644
index be94b39a86b..00000000000
--- a/english/lts/security/2020/dla-2226.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two memory management issues were found in the asfdemux element of the
-GStreamer <q>ugly</q> plugin collection, which can be triggered via a
-maliciously crafted file.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.10.19-2.1+deb8u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-ugly0.10 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2226.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2227.data b/english/lts/security/2020/dla-2227.data
deleted file mode 100644
index 172c0b57e2d..00000000000
--- a/english/lts/security/2020/dla-2227.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2227-1 bind9</define-tag>
-<define-tag report_date>2020-5-30</define-tag>
-<define-tag secrefs>CVE-2020-8616 CVE-2020-8617</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2227.wml b/english/lts/security/2020/dla-2227.wml
deleted file mode 100644
index 4b8812675da..00000000000
--- a/english/lts/security/2020/dla-2227.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in BIND, a DNS server
-implementation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8616">CVE-2020-8616</a>
-
- <p>It was discovered that BIND does not sufficiently limit the number
- of fetches performed when processing referrals. An attacker can take
- advantage of this flaw to cause a denial of service (performance
- degradation) or use the recursing server in a reflection attack with
- a high amplification factor.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8617">CVE-2020-8617</a>
-
- <p>It was discovered that a logic error in the code which checks TSIG
- validity can be used to trigger an assertion failure, resulting in
- denial of service.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:9.9.5.dfsg-9+deb8u19.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2227.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2228-2.data b/english/lts/security/2020/dla-2228-2.data
deleted file mode 100644
index d32cda44f69..00000000000
--- a/english/lts/security/2020/dla-2228-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2228-2 json-c</define-tag>
-<define-tag report_date>2020-05-31</define-tag>
-<define-tag secrefs>CVE-2020-12762 Bug#960326</define-tag>
-<define-tag packages>json-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2228-2.wml b/english/lts/security/2020/dla-2228-2.wml
deleted file mode 100644
index e7d216efee7..00000000000
--- a/english/lts/security/2020/dla-2228-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The json-c shared library had an integer overflow and out-of-bounds write
-via a large JSON file, as demonstrated by printbuf_memappend.</p>
-
-<p>This follow-up version now uses an upstream sanctioned patch that was
-specifically published for json-c 0.11, rather than a self-backported
-patch.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.11-4+deb8u2.</p>
-
-<p>We recommend that you upgrade your json-c packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2228-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2228.data b/english/lts/security/2020/dla-2228.data
deleted file mode 100644
index f07cf93816e..00000000000
--- a/english/lts/security/2020/dla-2228.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2228-1 json-c</define-tag>
-<define-tag report_date>2020-05-31</define-tag>
-<define-tag secrefs>CVE-2020-12762 Bug#960326</define-tag>
-<define-tag packages>json-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2228.wml b/english/lts/security/2020/dla-2228.wml
deleted file mode 100644
index d4b6a223bf2..00000000000
--- a/english/lts/security/2020/dla-2228.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The json-c shared library had an integer overflow and out-of-bounds write
-via a large JSON file, as demonstrated by printbuf_memappend.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.11-4+deb8u1.</p>
-
-<p>We recommend that you upgrade your json-c packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2228.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2229.data b/english/lts/security/2020/dla-2229.data
deleted file mode 100644
index eeef663db9b..00000000000
--- a/english/lts/security/2020/dla-2229.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2229-1 php-horde-gollem</define-tag>
-<define-tag report_date>2020-05-31</define-tag>
-<define-tag secrefs>CVE-2020-8034 Bug#961649</define-tag>
-<define-tag packages>php-horde-gollem</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2229.wml b/english/lts/security/2020/dla-2229.wml
deleted file mode 100644
index da0c4150444..00000000000
--- a/english/lts/security/2020/dla-2229.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Gollem, as used in Horde Groupware Webmail Edition and other products,
-had been affected by a reflected Cross-Site Scripting (XSS) vulnerability
-via the HTTP GET dir parameter in the browser functionality, affecting
-breadcrumb output. An attacker could have obtained access to a victim's
-webmail account by making them visit a malicious URL.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.0.3-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your php-horde-gollem packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2229.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2230.data b/english/lts/security/2020/dla-2230.data
deleted file mode 100644
index 5449cbbc4f7..00000000000
--- a/english/lts/security/2020/dla-2230.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2230-1 php-horde</define-tag>
-<define-tag report_date>2020-06-29</define-tag>
-<define-tag secrefs>CVE-2020-8035</define-tag>
-<define-tag packages>php-horde</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2230.wml b/english/lts/security/2020/dla-2230.wml
deleted file mode 100644
index 3578ab13887..00000000000
--- a/english/lts/security/2020/dla-2230.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The image view functionality in Horde Groupware Webmail Edition was
-affected by a stored Cross-Site Scripting (XSS) vulnerability via an SVG
-image upload containing a JavaScript payload. An attacker could have
-obtained access to a victim's webmail account by making them visit a
-malicious URL.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.2.1+debian0-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your php-horde packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2230.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2231.data b/english/lts/security/2020/dla-2231.data
deleted file mode 100644
index f33414569f1..00000000000
--- a/english/lts/security/2020/dla-2231.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2231-1 sane-backends</define-tag>
-<define-tag report_date>2020-05-31</define-tag>
-<define-tag secrefs>CVE-2020-12867</define-tag>
-<define-tag packages>sane-backends</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2231.wml b/english/lts/security/2020/dla-2231.wml
deleted file mode 100644
index 16645f4bf37..00000000000
--- a/english/lts/security/2020/dla-2231.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Remote denial of service and several memory management issues were fixed in the epson2 driver.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.0.24-8+deb8u3.</p>
-
-<p>We recommend that you upgrade your sane-backends packages if you are using the epson2 driver.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2231.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2232.data b/english/lts/security/2020/dla-2232.data
deleted file mode 100644
index 50eafc93aec..00000000000
--- a/english/lts/security/2020/dla-2232.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2232-1 python-httplib2</define-tag>
-<define-tag report_date>2020-06-01</define-tag>
-<define-tag secrefs>CVE-2020-11078</define-tag>
-<define-tag packages>python-httplib2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2232.wml b/english/lts/security/2020/dla-2232.wml
deleted file mode 100644
index 385223c9cdd..00000000000
--- a/english/lts/security/2020/dla-2232.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In httplib2, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.9+dfsg-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your python-httplib2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2232.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2233-2.data b/english/lts/security/2020/dla-2233-2.data
deleted file mode 100644
index 5ec2b662d98..00000000000
--- a/english/lts/security/2020/dla-2233-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2233-2 python-django</define-tag>
-<define-tag report_date>2020-06-12</define-tag>
-<define-tag secrefs>CVE-2020-13254</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2233-2.wml b/english/lts/security/2020/dla-2233-2.wml
deleted file mode 100644
index 49662cd4dce..00000000000
--- a/english/lts/security/2020/dla-2233-2.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a regression in the latest update to
-Django, the Python web development framework. The upstream fix for
-CVE-2020-13254 to address data leakages via malformed memcached keys
-could, in some situations, cause a traceback.</p>
-
-<p>Please see <tt>https://code.djangoproject.com/ticket/31654</tt> for more
-information.</p>
-
-<ul>
-<li>
- <a href="https://security-tracker.debian.org/tracker/CVE-2020-13254">
- CVE-2020-13254: Potential data leakage via malformed memcached keys.
- </a>
-
- <p>In cases where a memcached backend does not perform key validation,
- passing malformed cache keys could result in a key collision, and potential
- data leakage. In order to avoid this vulnerability, key validation is added
- to the memcached cache backends.</p>
-</li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.11-1+deb8u10.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2233-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2233.data b/english/lts/security/2020/dla-2233.data
deleted file mode 100644
index 106728ab946..00000000000
--- a/english/lts/security/2020/dla-2233.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2233-1 python-django</define-tag>
-<define-tag report_date>2020-06-04</define-tag>
-<define-tag secrefs>CVE-2020-13254 CVE-2020-13596</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2233.wml b/english/lts/security/2020/dla-2233.wml
deleted file mode 100644
index 49986ad5bb6..00000000000
--- a/english/lts/security/2020/dla-2233.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two issues in
-<a href="https://www.djangoproject.com/">Django</a>, the Python web development
-framework:</p>
-
-<ul>
-<li>
- <a href="https://security-tracker.debian.org/tracker/CVE-2020-13254">
- CVE-2020-13254: Potential data leakage via malformed memcached keys.
- </a>
-
- <p>In cases where a memcached backend does not perform key validation,
- passing malformed cache keys could result in a key collision, and potential
- data leakage. In order to avoid this vulnerability, key validation is added
- to the memcached cache backends.</p>
-</li>
-<li>
- <a href="https://security-tracker.debian.org/tracker/CVE-2020-13596">
- CVE-2020-13596: Possible XSS via admin ForeignKeyRawIdWidget.
- </a>
-
- <p>Query parameters to the admin ForeignKeyRawIdWidget were not
- properly URL encoded, posing an XSS attack vector.
- ForeignKeyRawIdWidget now ensures query parameters are correctly
- URL encoded.</p>
-</li>
-</ul>
-
-<p>For more information, please see
-<a href="https://www.djangoproject.com/weblog/2020/jun/03/security-releases/">upstream's
-own announcment</a>.</p>
-
-<p>This upload also addresses test failures introduced in
-<tt>1.7.11-1+deb8u3</tt> and <tt>1.7.11-1+deb8u8</tt> via the fixes for
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-19844">CVE-2018-7537</a>
-and <a href="https://security-tracker.debian.org/tracker/CVE-2019-19844">CVE-2019-19844</a>
-respectfully.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.11-1+deb8u9.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2233.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2234.data b/english/lts/security/2020/dla-2234.data
deleted file mode 100644
index 62eaefac3c1..00000000000
--- a/english/lts/security/2020/dla-2234.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2234-1 netqmail</define-tag>
-<define-tag report_date>2020-06-05</define-tag>
-<define-tag secrefs>CVE-2005-1513 CVE-2005-1514 CVE-2005-1515 CVE-2020-3811 CVE-2020-3812 Bug#961060</define-tag>
-<define-tag packages>netqmail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2234.wml b/english/lts/security/2020/dla-2234.wml
deleted file mode 100644
index 32e896254bb..00000000000
--- a/english/lts/security/2020/dla-2234.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>There were several CVE bugs reported against src:netqmail.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-1513">CVE-2005-1513</a>
-
- <p>Integer overflow in the stralloc_readyplus function in qmail,
- when running on 64 bit platforms with a large amount of virtual
- memory, allows remote attackers to cause a denial of service
- and possibly execute arbitrary code via a large SMTP request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-1514">CVE-2005-1514</a>
-
- <p>commands.c in qmail, when running on 64 bit platforms with a
- large amount of virtual memory, allows remote attackers to
- cause a denial of service and possibly execute arbitrary code
- via a long SMTP command without a space character, which causes
- an array to be referenced with a negative index.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-1515">CVE-2005-1515</a>
-
- <p>Integer signedness error in the qmail_put and substdio_put
- functions in qmail, when running on 64 bit platforms with a
- large amount of virtual memory, allows remote attackers to
- cause a denial of service and possibly execute arbitrary code
- via a large number of SMTP RCPT TO commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3811">CVE-2020-3811</a>
-
- <p>qmail-verify as used in netqmail 1.06 is prone to a
- mail-address verification bypass vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3812">CVE-2020-3812</a>
-
- <p>qmail-verify as used in netqmail 1.06 is prone to an
- information disclosure vulnerability. A local attacker can
- test for the existence of files and directories anywhere in
- the filesystem because qmail-verify runs as root and tests
- for the existence of files in the attacker's home directory,
- without dropping its privileges first.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.06-6.2~deb8u1.</p>
-
-<p>We recommend that you upgrade your netqmail packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2234.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2235.data b/english/lts/security/2020/dla-2235.data
deleted file mode 100644
index 176b4b85092..00000000000
--- a/english/lts/security/2020/dla-2235.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2235-1 dbus</define-tag>
-<define-tag report_date>2020-06-05</define-tag>
-<define-tag secrefs>CVE-2020-12049</define-tag>
-<define-tag packages>dbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2235.wml b/english/lts/security/2020/dla-2235.wml
deleted file mode 100644
index 3357c672a8a..00000000000
--- a/english/lts/security/2020/dla-2235.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a file descriptor leak in the D-Bus message
-bus.</p>
-
-<p>An unprivileged local attacker could use this to attack the system DBus
-daemon, leading to denial of service for all users of the machine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12049">CVE-2020-12049</a>
-
- <p>File descriptor leak in _dbus_read_socket_with_unix_fds</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.8.22-0+deb8u3.</p>
-
-<p>We recommend that you upgrade your dbus packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2235.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2236.data b/english/lts/security/2020/dla-2236.data
deleted file mode 100644
index 536d54661e7..00000000000
--- a/english/lts/security/2020/dla-2236.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2236-1 graphicsmagick</define-tag>
-<define-tag report_date>2020-06-07</define-tag>
-<define-tag secrefs>CVE-2020-12672 Bug#960000</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2236.wml b/english/lts/security/2020/dla-2236.wml
deleted file mode 100644
index e7e63b19f13..00000000000
--- a/english/lts/security/2020/dla-2236.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability was discovered in graphicsmagick, a collection of image
-processing tools, that results in a heap buffer overwrite when
-magnifying MNG images.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.3.20-3+deb8u11.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2236.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2237.data b/english/lts/security/2020/dla-2237.data
deleted file mode 100644
index 5c96aaea02c..00000000000
--- a/english/lts/security/2020/dla-2237.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2237-1 cups</define-tag>
-<define-tag report_date>2020-06-07</define-tag>
-<define-tag secrefs>CVE-2019-8842 CVE-2020-3898</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2237.wml b/english/lts/security/2020/dla-2237.wml
deleted file mode 100644
index 31a4af88ece..00000000000
--- a/english/lts/security/2020/dla-2237.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVE(s) were reported against src:cups.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8842">CVE-2019-8842</a>
-
- <p>The `ippReadIO` function may under-read an extension field.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3898">CVE-2020-3898</a>
-
- <p>There was a heap based buffer overflow in libcups's
- ppdFindOption() in ppd-mark.c.
- The `ppdOpen` function did not handle invalid UI constraint.
- `ppdcSource::get_resolution` function did not handle invalid
- resolution strings.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.7.5-11+deb8u8.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2237.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2238.data b/english/lts/security/2020/dla-2238.data
deleted file mode 100644
index 03d5951751c..00000000000
--- a/english/lts/security/2020/dla-2238.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2238-1 libupnp</define-tag>
-<define-tag report_date>2020-06-08</define-tag>
-<define-tag secrefs>CVE-2020-13848 Bug#962282</define-tag>
-<define-tag packages>libupnp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2238.wml b/english/lts/security/2020/dla-2238.wml
deleted file mode 100644
index 793153c640c..00000000000
--- a/english/lts/security/2020/dla-2238.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>libupnp, the portable SDK for UPnP Devices allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c. This crash can be triggered by sending a malformed SUBSCRIBE or UNSUBSCRIBE using any of the attached files.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.6.19+git20141001-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your libupnp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2238.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2239.data b/english/lts/security/2020/dla-2239.data
deleted file mode 100644
index 85e6d9322f3..00000000000
--- a/english/lts/security/2020/dla-2239.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2239-1 libpam-tacplus</define-tag>
-<define-tag report_date>2020-06-08</define-tag>
-<define-tag secrefs>CVE-2020-13881</define-tag>
-<define-tag packages>libpam-tacplus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2239.wml b/english/lts/security/2020/dla-2239.wml
deleted file mode 100644
index fbcaa9f75ba..00000000000
--- a/english/lts/security/2020/dla-2239.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in libpam-tacplus (a security
-module for using the TACACS+ authentication service) where shared secrets such
-as private server keys were being added in the clear to various logs.</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13881">CVE-2020-13881</a>
-
- <p>It was discovered that there was an issue in libpam-tacplus (a security
- module for using the TACACS+ authentication service) where shared secrets such
- as private server keys were being added in the clear to various logs.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.3.8-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your libpam-tacplus packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2239.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2240.data b/english/lts/security/2020/dla-2240.data
deleted file mode 100644
index 59582aa3a62..00000000000
--- a/english/lts/security/2020/dla-2240.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2240-1 bluez</define-tag>
-<define-tag report_date>2020-06-09</define-tag>
-<define-tag secrefs>CVE-2020-0556 Bug#953770</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2240.wml b/english/lts/security/2020/dla-2240.wml
deleted file mode 100644
index 01e8f97a71e..00000000000
--- a/english/lts/security/2020/dla-2240.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was reported that the BlueZ's HID and HOGP profile implementations
-don't specifically require bonding between the device and the host.
-Malicious devices can take advantage of this flaw to connect to a target
-host and impersonate an existing HID device without security or to cause
-an SDP or GATT service discovery to take place which would allow HID
-reports to be injected to the input subsystem from a non-bonded source.</p>
-
-<p>For the HID profile an new configuration option (ClassicBondedOnly) is
-introduced to make sure that input connections only come from bonded
-device connections. The options defaults to <q>false</q> to maximize device
-compatibility.</p>
-
-<p>Note that as a result of the significant changes between the previous
-version in Jessie (based on upstream release 5.23) and the available
-patches to address this vulnerability, it was decided that a backport of
-the bluez package from Debian 9 <q>Stretch</q> was the only viable way to
-address the referenced vulnerability.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.43-2+deb9u2~deb8u1.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2240.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2241-2.data b/english/lts/security/2020/dla-2241-2.data
deleted file mode 100644
index 78c35fa60a5..00000000000
--- a/english/lts/security/2020/dla-2241-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2241-2 linux</define-tag>
-<define-tag report_date>2020-06-10</define-tag>
-<define-tag secrefs>CVE-2015-8839 CVE-2018-14610 CVE-2018-14611 CVE-2018-14612 CVE-2018-14613 CVE-2019-5108 CVE-2019-19319 CVE-2019-19447 CVE-2019-19768 CVE-2019-20636 CVE-2020-0009 CVE-2020-0543 CVE-2020-1749 CVE-2020-2732 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-9383 CVE-2020-10690 CVE-2020-10751 CVE-2020-10942 CVE-2020-11494 CVE-2020-11565 CVE-2020-11608 CVE-2020-11609 CVE-2020-11668 CVE-2020-12114 CVE-2020-12464 CVE-2020-12652 CVE-2020-12653 CVE-2020-12654 CVE-2020-12769 CVE-2020-12770 CVE-2020-12826 CVE-2020-13143</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2241-2.wml b/english/lts/security/2020/dla-2241-2.wml
deleted file mode 100644
index 484e8980706..00000000000
--- a/english/lts/security/2020/dla-2241-2.wml
+++ /dev/null
@@ -1,258 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update is now available for all supported architectures. For
-reference the original advisory text follows.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8839">CVE-2015-8839</a>
-
- <p>A race condition was found in the ext4 filesystem implementation.
- A local user could exploit this to cause a denial of service
- (filesystem corruption).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14610">CVE-2018-14610</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14611">CVE-2018-14611</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14612">CVE-2018-14612</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14613">CVE-2018-14613</a>
-
- <p>Wen Xu from SSLab at Gatech reported that crafted Btrfs volumes
- could trigger a crash (Oops) and/or out-of-bounds memory access.
- An attacker able to mount such a volume could use this to cause a
- denial of service or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5108">CVE-2019-5108</a>
-
- <p>Mitchell Frank of Cisco discovered that when the IEEE 802.11
- (WiFi) stack was used in AP mode with roaming, it would trigger
- roaming for a newly associated station before the station was
- authenticated. An attacker within range of the AP could use this
- to cause a denial of service, either by filling up a switching
- table or by redirecting traffic away from other stations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19319">CVE-2019-19319</a>
-
- <p>Jungyeon discovered that a crafted filesystem can cause the ext4
- implementation to deallocate or reallocate journal blocks. A user
- permitted to mount filesystems could use this to cause a denial of
- service (crash), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19447">CVE-2019-19447</a>
-
- <p>It was discovered that the ext4 filesystem driver did not safely
- handle unlinking of an inode that, due to filesystem corruption,
- already has a link count of 0. An attacker able to mount
- arbitrary ext4 volumes could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19768">CVE-2019-19768</a>
-
- <p>Tristan Madani reported a race condition in the blktrace debug
- facility that could result in a use-after-free. A local user able
- to trigger removal of block devices could possibly use this to
- cause a denial of service (crash) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20636">CVE-2019-20636</a>
-
- <p>The syzbot tool found that the input subsystem did not fully
- validate keycode changes, which could result in a heap
- out-of-bounds write. A local user permitted to access the device
- node for an input or VT device could possibly use this to cause a
- denial of service (crash or memory corruption) or for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0009">CVE-2020-0009</a>
-
- <p>Jann Horn reported that the Android ashmem driver did not prevent
- read-only files from being memory-mapped and then remapped as
- read-write. However, Android drivers are not enabled in Debian
- kernel configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0543">CVE-2020-0543</a>
-
- <p>Researchers at VU Amsterdam discovered that on some Intel CPUs
- supporting the RDRAND and RDSEED instructions, part of a random
- value generated by these instructions may be used in a later
- speculative execution on any core of the same physical CPU.
- Depending on how these instructions are used by applications, a
- local user or VM guest could use this to obtain sensitive
- information such as cryptographic keys from other users or VMs.</p>
-
- <p>This vulnerability can be mitigated by a microcode update, either
- as part of system firmware (BIOS) or through the intel-microcode
- package in Debian's non-free archive section. This kernel update
- only provides reporting of the vulnerability and the option to
- disable the mitigation if it is not needed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1749">CVE-2020-1749</a>
-
- <p>Xiumei Mu reported that some network protocols that can run on top
- of IPv6 would bypass the Transformation (XFRM) layer used by
- IPsec, IPcomp/IPcomp6, IPIP, and IPv6 Mobility. This could result
- in disclosure of information over the network, since it would not
- be encrypted or routed according to the system policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-2732">CVE-2020-2732</a>
-
- <p>Paulo Bonzini discovered that the KVM implementation for Intel
- processors did not properly handle instruction emulation for L2
- guests when nested virtualization is enabled. This could allow an
- L2 guest to cause privilege escalation, denial of service, or
- information leaks in the L1 guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8647">CVE-2020-8647</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-8649">CVE-2020-8649</a>
-
- <p>The Hulk Robot tool found a potential MMIO out-of-bounds access in
- the vgacon driver. A local user permitted to access a virtual
- terminal (/dev/tty1 etc.) on a system using the vgacon driver
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8648">CVE-2020-8648</a>
-
- <p>The syzbot tool found a race condition in the the virtual terminal
- driver, which could result in a use-after-free. A local user
- permitted to access a virtual terminal could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9383">CVE-2020-9383</a>
-
- <p>Jordy Zomer reported an incorrect range check in the floppy driver
- which could lead to a static out-of-bounds access. A local user
- permitted to access a floppy drive could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10690">CVE-2020-10690</a>
-
- <p>It was discovered that the PTP hardware clock subsystem did not
- properly manage device lifetimes. Removing a PTP hardware clock
- from the system while a user process was using it could lead to a
- use-after-free. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10751">CVE-2020-10751</a>
-
- <p>Dmitry Vyukov reported that the SELinux subsystem did not properly
- handle validating multiple messages, which could allow a privileged
- attacker to bypass SELinux netlink restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10942">CVE-2020-10942</a>
-
- <p>It was discovered that the vhost_net driver did not properly
- validate the type of sockets set as back-ends. A local user
- permitted to access /dev/vhost-net could use this to cause a stack
- corruption via crafted system calls, resulting in denial of
- service (crash) or possibly privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11494">CVE-2020-11494</a>
-
- <p>It was discovered that the slcan (serial line CAN) network driver
- did not fully initialise CAN headers for received packets,
- resulting in an information leak from the kernel to user-space or
- over the CAN network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11565">CVE-2020-11565</a>
-
- <p>Entropy Moe reported that the shared memory filesystem (tmpfs) did
- not correctly handle an <q>mpol</q> mount option specifying an empty
- node list, leading to a stack-based out-of-bounds write. If user
- namespaces are enabled, a local user could use this to cause a
- denial of service (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11608">CVE-2020-11608</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-11609">CVE-2020-11609</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-11668">CVE-2020-11668</a>
-
- <p>It was discovered that the ov519, stv06xx, and xirlink_cit media
- drivers did not properly validate USB device descriptors. A
- physically present user with a specially constructed USB device
- could use this to cause a denial-of-service (crash) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12114">CVE-2020-12114</a>
-
- <p>Piotr Krysiuk discovered a race condition between the umount and
- pivot_root operations in the filesystem core (vfs). A local user
- with the CAP_SYS_ADMIN capability in any user namespace could use
- this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12464">CVE-2020-12464</a>
-
- <p>Kyungtae Kim reported a race condition in the USB core that can
- result in a use-after-free. It is not clear how this can be
- exploited, but it could result in a denial of service (crash or
- memory corruption) or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12652">CVE-2020-12652</a>
-
- <p>Tom Hatskevich reported a bug in the mptfusion storage drivers.
- An ioctl handler fetched a parameter from user memory twice,
- creating a race condition which could result in incorrect locking
- of internal data structures. A local user permitted to access
- /dev/mptctl could use this to cause a denial of service (crash or
- memory corruption) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12653">CVE-2020-12653</a>
-
- <p>It was discovered that the mwifiex WiFi driver did not
- sufficiently validate scan requests, resulting a potential heap
- buffer overflow. A local user with CAP_NET_ADMIN capability could
- use this to cause a denial of service (crash or memory corruption)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12654">CVE-2020-12654</a>
-
- <p>It was discovered that the mwifiex WiFi driver did not
- sufficiently validate WMM parameters received from an access point
- (AP), resulting a potential heap buffer overflow. A malicious AP
- could use this to cause a denial of service (crash or memory
- corruption) or possibly to execute code on a vulnerable system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12769">CVE-2020-12769</a>
-
- <p>It was discovered that the spi-dw SPI host driver did not properly
- serialise access to its internal state. The security impact of
- this is unclear, and this driver is not included in Debian's
- binary packages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12770">CVE-2020-12770</a>
-
- <p>It was discovered that the sg (SCSI generic) driver did not
- correctly release internal resources in a particular error case.
- A local user permitted to access an sg device could possibly use
- this to cause a denial of service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12826">CVE-2020-12826</a>
-
- <p>Adam Zabrocki reported a weakness in the signal subsystem's
- permission checks. A parent process can choose an arbitary signal
- for a child process to send when it exits, but if the parent has
- executed a new program then the default SIGCHLD signal is sent. A
- local user permitted to run a program for several days could
- bypass this check, execute a setuid program, and then send an
- arbitrary signal to it. Depending on the setuid programs
- installed, this could have some security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13143">CVE-2020-13143</a>
-
- <p>Kyungtae Kim reported a potential heap out-of-bounds write in
- the USB gadget subsystem. A local user permitted to write to
- the gadget configuration filesystem could use this to cause a
- denial of service (crash or memory corruption) or potentially
- for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.84-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2241-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2241.data b/english/lts/security/2020/dla-2241.data
deleted file mode 100644
index f64be36f4fe..00000000000
--- a/english/lts/security/2020/dla-2241.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2241-1 linux</define-tag>
-<define-tag report_date>2020-06-09</define-tag>
-<define-tag secrefs>CVE-2015-8839 CVE-2018-14610 CVE-2018-14611 CVE-2018-14612 CVE-2018-14613 CVE-2019-5108 CVE-2019-19319 CVE-2019-19447 CVE-2019-19768 CVE-2019-20636 CVE-2020-0009 CVE-2020-0543 CVE-2020-1749 CVE-2020-2732 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-9383 CVE-2020-10690 CVE-2020-10751 CVE-2020-10942 CVE-2020-11494 CVE-2020-11565 CVE-2020-11608 CVE-2020-11609 CVE-2020-11668 CVE-2020-12114 CVE-2020-12464 CVE-2020-12652 CVE-2020-12653 CVE-2020-12654 CVE-2020-12769 CVE-2020-12770 CVE-2020-12826 CVE-2020-13143</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2241.wml b/english/lts/security/2020/dla-2241.wml
deleted file mode 100644
index 474c1a684d5..00000000000
--- a/english/lts/security/2020/dla-2241.wml
+++ /dev/null
@@ -1,255 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8839">CVE-2015-8839</a>
-
- <p>A race condition was found in the ext4 filesystem implementation.
- A local user could exploit this to cause a denial of service
- (filesystem corruption).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14610">CVE-2018-14610</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14611">CVE-2018-14611</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14612">CVE-2018-14612</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2018-14613">CVE-2018-14613</a>
-
- <p>Wen Xu from SSLab at Gatech reported that crafted Btrfs volumes
- could trigger a crash (Oops) and/or out-of-bounds memory access.
- An attacker able to mount such a volume could use this to cause a
- denial of service or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5108">CVE-2019-5108</a>
-
- <p>Mitchell Frank of Cisco discovered that when the IEEE 802.11
- (WiFi) stack was used in AP mode with roaming, it would trigger
- roaming for a newly associated station before the station was
- authenticated. An attacker within range of the AP could use this
- to cause a denial of service, either by filling up a switching
- table or by redirecting traffic away from other stations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19319">CVE-2019-19319</a>
-
- <p>Jungyeon discovered that a crafted filesystem can cause the ext4
- implementation to deallocate or reallocate journal blocks. A user
- permitted to mount filesystems could use this to cause a denial of
- service (crash), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19447">CVE-2019-19447</a>
-
- <p>It was discovered that the ext4 filesystem driver did not safely
- handle unlinking of an inode that, due to filesystem corruption,
- already has a link count of 0. An attacker able to mount
- arbitrary ext4 volumes could use this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19768">CVE-2019-19768</a>
-
- <p>Tristan Madani reported a race condition in the blktrace debug
- facility that could result in a use-after-free. A local user able
- to trigger removal of block devices could possibly use this to
- cause a denial of service (crash) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20636">CVE-2019-20636</a>
-
- <p>The syzbot tool found that the input subsystem did not fully
- validate keycode changes, which could result in a heap
- out-of-bounds write. A local user permitted to access the device
- node for an input or VT device could possibly use this to cause a
- denial of service (crash or memory corruption) or for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0009">CVE-2020-0009</a>
-
- <p>Jann Horn reported that the Android ashmem driver did not prevent
- read-only files from being memory-mapped and then remapped as
- read-write. However, Android drivers are not enabled in Debian
- kernel configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0543">CVE-2020-0543</a>
-
- <p>Researchers at VU Amsterdam discovered that on some Intel CPUs
- supporting the RDRAND and RDSEED instructions, part of a random
- value generated by these instructions may be used in a later
- speculative execution on any core of the same physical CPU.
- Depending on how these instructions are used by applications, a
- local user or VM guest could use this to obtain sensitive
- information such as cryptographic keys from other users or VMs.</p>
-
- <p>This vulnerability can be mitigated by a microcode update, either
- as part of system firmware (BIOS) or through the intel-microcode
- package in Debian's non-free archive section. This kernel update
- only provides reporting of the vulnerability and the option to
- disable the mitigation if it is not needed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1749">CVE-2020-1749</a>
-
- <p>Xiumei Mu reported that some network protocols that can run on top
- of IPv6 would bypass the Transformation (XFRM) layer used by
- IPsec, IPcomp/IPcomp6, IPIP, and IPv6 Mobility. This could result
- in disclosure of information over the network, since it would not
- be encrypted or routed according to the system policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-2732">CVE-2020-2732</a>
-
- <p>Paulo Bonzini discovered that the KVM implementation for Intel
- processors did not properly handle instruction emulation for L2
- guests when nested virtualization is enabled. This could allow an
- L2 guest to cause privilege escalation, denial of service, or
- information leaks in the L1 guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8647">CVE-2020-8647</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-8649">CVE-2020-8649</a>
-
- <p>The Hulk Robot tool found a potential MMIO out-of-bounds access in
- the vgacon driver. A local user permitted to access a virtual
- terminal (/dev/tty1 etc.) on a system using the vgacon driver
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8648">CVE-2020-8648</a>
-
- <p>The syzbot tool found a race condition in the the virtual terminal
- driver, which could result in a use-after-free. A local user
- permitted to access a virtual terminal could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9383">CVE-2020-9383</a>
-
- <p>Jordy Zomer reported an incorrect range check in the floppy driver
- which could lead to a static out-of-bounds access. A local user
- permitted to access a floppy drive could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10690">CVE-2020-10690</a>
-
- <p>It was discovered that the PTP hardware clock subsystem did not
- properly manage device lifetimes. Removing a PTP hardware clock
- from the system while a user process was using it could lead to a
- use-after-free. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10751">CVE-2020-10751</a>
-
- <p>Dmitry Vyukov reported that the SELinux subsystem did not properly
- handle validating multiple messages, which could allow a privileged
- attacker to bypass SELinux netlink restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10942">CVE-2020-10942</a>
-
- <p>It was discovered that the vhost_net driver did not properly
- validate the type of sockets set as back-ends. A local user
- permitted to access /dev/vhost-net could use this to cause a stack
- corruption via crafted system calls, resulting in denial of
- service (crash) or possibly privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11494">CVE-2020-11494</a>
-
- <p>It was discovered that the slcan (serial line CAN) network driver
- did not fully initialise CAN headers for received packets,
- resulting in an information leak from the kernel to user-space or
- over the CAN network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11565">CVE-2020-11565</a>
-
- <p>Entropy Moe reported that the shared memory filesystem (tmpfs) did
- not correctly handle an <q>mpol</q> mount option specifying an empty
- node list, leading to a stack-based out-of-bounds write. If user
- namespaces are enabled, a local user could use this to cause a
- denial of service (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11608">CVE-2020-11608</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-11609">CVE-2020-11609</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-11668">CVE-2020-11668</a>
-
- <p>It was discovered that the ov519, stv06xx, and xirlink_cit media
- drivers did not properly validate USB device descriptors. A
- physically present user with a specially constructed USB device
- could use this to cause a denial-of-service (crash) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12114">CVE-2020-12114</a>
-
- <p>Piotr Krysiuk discovered a race condition between the umount and
- pivot_root operations in the filesystem core (vfs). A local user
- with the CAP_SYS_ADMIN capability in any user namespace could use
- this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12464">CVE-2020-12464</a>
-
- <p>Kyungtae Kim reported a race condition in the USB core that can
- result in a use-after-free. It is not clear how this can be
- exploited, but it could result in a denial of service (crash or
- memory corruption) or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12652">CVE-2020-12652</a>
-
- <p>Tom Hatskevich reported a bug in the mptfusion storage drivers.
- An ioctl handler fetched a parameter from user memory twice,
- creating a race condition which could result in incorrect locking
- of internal data structures. A local user permitted to access
- /dev/mptctl could use this to cause a denial of service (crash or
- memory corruption) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12653">CVE-2020-12653</a>
-
- <p>It was discovered that the mwifiex WiFi driver did not
- sufficiently validate scan requests, resulting a potential heap
- buffer overflow. A local user with CAP_NET_ADMIN capability could
- use this to cause a denial of service (crash or memory corruption)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12654">CVE-2020-12654</a>
-
- <p>It was discovered that the mwifiex WiFi driver did not
- sufficiently validate WMM parameters received from an access point
- (AP), resulting a potential heap buffer overflow. A malicious AP
- could use this to cause a denial of service (crash or memory
- corruption) or possibly to execute code on a vulnerable system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12769">CVE-2020-12769</a>
-
- <p>It was discovered that the spi-dw SPI host driver did not properly
- serialise access to its internal state. The security impact of
- this is unclear, and this driver is not included in Debian's
- binary packages.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12770">CVE-2020-12770</a>
-
- <p>It was discovered that the sg (SCSI generic) driver did not
- correctly release internal resources in a particular error case.
- A local user permitted to access an sg device could possibly use
- this to cause a denial of service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12826">CVE-2020-12826</a>
-
- <p>Adam Zabrocki reported a weakness in the signal subsystem's
- permission checks. A parent process can choose an arbitary signal
- for a child process to send when it exits, but if the parent has
- executed a new program then the default SIGCHLD signal is sent. A
- local user permitted to run a program for several days could
- bypass this check, execute a setuid program, and then send an
- arbitrary signal to it. Depending on the setuid programs
- installed, this could have some security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13143">CVE-2020-13143</a>
-
- <p>Kyungtae Kim reported a potential heap out-of-bounds write in
- the USB gadget subsystem. A local user permitted to write to
- the gadget configuration filesystem could use this to cause a
- denial of service (crash or memory corruption) or potentially
- for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.16.84-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2241.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2242.data b/english/lts/security/2020/dla-2242.data
deleted file mode 100644
index 38717a47113..00000000000
--- a/english/lts/security/2020/dla-2242.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2242-1 linux-4.9</define-tag>
-<define-tag report_date>2020-06-10</define-tag>
-<define-tag secrefs>CVE-2019-2182 CVE-2019-5108 CVE-2019-19319 CVE-2019-19462 CVE-2019-19768 CVE-2019-20806 CVE-2019-20811 CVE-2020-0543 CVE-2020-2732 CVE-2020-8428 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-9383 CVE-2020-10711 CVE-2020-10732 CVE-2020-10751 CVE-2020-10757 CVE-2020-10942 CVE-2020-11494 CVE-2020-11565 CVE-2020-11608 CVE-2020-11609 CVE-2020-11668 CVE-2020-12114 CVE-2020-12464 CVE-2020-12652 CVE-2020-12653 CVE-2020-12654 CVE-2020-12770 CVE-2020-13143 Bug#952660</define-tag>
-<define-tag packages>linux-4.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2242.wml b/english/lts/security/2020/dla-2242.wml
deleted file mode 100644
index 3e683dd9af4..00000000000
--- a/english/lts/security/2020/dla-2242.wml
+++ /dev/null
@@ -1,238 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-2182">CVE-2019-2182</a>
-
- <p>Hanjun Guo and Lei Li reported a race condition in the arm64
- virtual memory management code, which could lead to an information
- disclosure, denial of service (crash), or possibly privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5108">CVE-2019-5108</a>
-
- <p>Mitchell Frank of Cisco discovered that when the IEEE 802.11
- (WiFi) stack was used in AP mode with roaming, it would trigger
- roaming for a newly associated station before the station was
- authenticated. An attacker within range of the AP could use this
- to cause a denial of service, either by filling up a switching
- table or by redirecting traffic away from other stations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19319">CVE-2019-19319</a>
-
- <p>Jungyeon discovered that a crafted filesystem can cause the ext4
- implementation to deallocate or reallocate journal blocks. A user
- permitted to mount filesystems could use this to cause a denial of
- service (crash), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19462">CVE-2019-19462</a>
-
- <p>The syzbot tool found a missing error check in the <q>relay</q>
- library used to implement various files under debugfs. A local
- user permitted to access debugfs could use this to cause a denial
- of service (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19768">CVE-2019-19768</a>
-
- <p>Tristan Madani reported a race condition in the blktrace debug
- facility that could result in a use-after-free. A local user able
- to trigger removal of block devices could possibly use this to
- cause a denial of service (crash) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20806">CVE-2019-20806</a>
-
- <p>A potential null pointer dereference was discovered in the tw5864
- media driver. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20811">CVE-2019-20811</a>
-
- <p>The Hulk Robot tool found a reference-counting bug in an error
- path in the network subsystem. The security impact of this is
- unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0543">CVE-2020-0543</a>
-
- <p>Researchers at VU Amsterdam discovered that on some Intel CPUs
- supporting the RDRAND and RDSEED instructions, part of a random
- value generated by these instructions may be used in a later
- speculative execution on any core of the same physical CPU.
- Depending on how these instructions are used by applications, a
- local user or VM guest could use this to obtain sensitive
- information such as cryptographic keys from other users or VMs.</p>
-
- <p>This vulnerability can be mitigated by a microcode update, either
- as part of system firmware (BIOS) or through the intel-microcode
- package in Debian's non-free archive section. This kernel update
- only provides reporting of the vulnerability and the option to
- disable the mitigation if it is not needed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-2732">CVE-2020-2732</a>
-
- <p>Paulo Bonzini discovered that the KVM implementation for Intel
- processors did not properly handle instruction emulation for L2
- guests when nested virtualization is enabled. This could allow an
- L2 guest to cause privilege escalation, denial of service, or
- information leaks in the L1 guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8428">CVE-2020-8428</a>
-
- <p>Al Viro discovered a potential use-after-free in the filesystem
- core (vfs). A local user could exploit this to cause a denial of
- service (crash) or possibly to obtain sensitive information from
- the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8647">CVE-2020-8647</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-8649">CVE-2020-8649</a>
-
- <p>The Hulk Robot tool found a potential MMIO out-of-bounds access in
- the vgacon driver. A local user permitted to access a virtual
- terminal (/dev/tty1 etc.) on a system using the vgacon driver
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8648">CVE-2020-8648</a>
-
- <p>The syzbot tool found a race condition in the the virtual terminal
- driver, which could result in a use-after-free. A local user
- permitted to access a virtual terminal could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9383">CVE-2020-9383</a>
-
- <p>Jordy Zomer reported an incorrect range check in the floppy driver
- which could lead to a static out-of-bounds access. A local user
- permitted to access a floppy drive could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10711">CVE-2020-10711</a>
-
- <p>Matthew Sheets reported NULL pointer dereference issues in the
- SELinux subsystem while receiving CIPSO packet with null category. A
- remote attacker can take advantage of this flaw to cause a denial of
- service (crash). Note that this issue does not affect the binary
- packages distributed in Debian as CONFIG_NETLABEL is not enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10732">CVE-2020-10732</a>
-
- <p>An information leak of kernel private memory to userspace was found
- in the kernel's implementation of core dumping userspace processes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10751">CVE-2020-10751</a>
-
- <p>Dmitry Vyukov reported that the SELinux subsystem did not properly
- handle validating multiple messages, which could allow a privileged
- attacker to bypass SELinux netlink restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10757">CVE-2020-10757</a>
-
- <p>Fan Yang reported a flaw in the way mremap handled DAX hugepages,
- allowing a local user to escalate their privileges</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10942">CVE-2020-10942</a>
-
- <p>It was discovered that the vhost_net driver did not properly
- validate the type of sockets set as back-ends. A local user
- permitted to access /dev/vhost-net could use this to cause a stack
- corruption via crafted system calls, resulting in denial of
- service (crash) or possibly privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11494">CVE-2020-11494</a>
-
- <p>It was discovered that the slcan (serial line CAN) network driver
- did not fully initialise CAN headers for received packets,
- resulting in an information leak from the kernel to user-space or
- over the CAN network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11565">CVE-2020-11565</a>
-
- <p>Entropy Moe reported that the shared memory filesystem (tmpfs) did
- not correctly handle an <q>mpol</q> mount option specifying an empty
- node list, leading to a stack-based out-of-bounds write. If user
- namespaces are enabled, a local user could use this to cause a
- denial of service (crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11608">CVE-2020-11608</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-11609">CVE-2020-11609</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-11668">CVE-2020-11668</a>
-
- <p>It was discovered that the ov519, stv06xx, and xirlink_cit media
- drivers did not properly validate USB device descriptors. A
- physically present user with a specially constructed USB device
- could use this to cause a denial-of-service (crash) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12114">CVE-2020-12114</a>
-
- <p>Piotr Krysiuk discovered a race condition between the umount and
- pivot_root operations in the filesystem core (vfs). A local user
- with the CAP_SYS_ADMIN capability in any user namespace could use
- this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12464">CVE-2020-12464</a>
-
- <p>Kyungtae Kim reported a race condition in the USB core that can
- result in a use-after-free. It is not clear how this can be
- exploited, but it could result in a denial of service (crash or
- memory corruption) or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12652">CVE-2020-12652</a>
-
- <p>Tom Hatskevich reported a bug in the mptfusion storage drivers.
- An ioctl handler fetched a parameter from user memory twice,
- creating a race condition which could result in incorrect locking
- of internal data structures. A local user permitted to access
- /dev/mptctl could use this to cause a denial of service (crash or
- memory corruption) or for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12653">CVE-2020-12653</a>
-
- <p>It was discovered that the mwifiex WiFi driver did not
- sufficiently validate scan requests, resulting a potential heap
- buffer overflow. A local user with CAP_NET_ADMIN capability could
- use this to cause a denial of service (crash or memory corruption)
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12654">CVE-2020-12654</a>
-
- <p>It was discovered that the mwifiex WiFi driver did not
- sufficiently validate WMM parameters received from an access point
- (AP), resulting a potential heap buffer overflow. A malicious AP
- could use this to cause a denial of service (crash or memory
- corruption) or possibly to execute code on a vulnerable system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12770">CVE-2020-12770</a>
-
- <p>It was discovered that the sg (SCSI generic) driver did not
- correctly release internal resources in a particular error case.
- A local user permitted to access an sg device could possibly use
- this to cause a denial of service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13143">CVE-2020-13143</a>
-
- <p>Kyungtae Kim reported a potential heap out-of-bounds write in
- the USB gadget subsystem. A local user permitted to write to
- the gadget configuration filesystem could use this to cause a
- denial of service (crash or memory corruption) or potentially
- for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.9.210-1+deb9u1~deb8u1. This version also fixes some related bugs
-that do not have their own CVE IDs, and a regression in the macvlan
-driver introduced in the previous security update
-(<a href="https://bugs.debian.org/952660">bug #952660</a>).</p>
-
-<p>We recommend that you upgrade your linux-4.9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2242.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2243.data b/english/lts/security/2020/dla-2243.data
deleted file mode 100644
index 9fb61cf50fa..00000000000
--- a/english/lts/security/2020/dla-2243.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2243-1 firefox-esr</define-tag>
-<define-tag report_date>2020-06-09</define-tag>
-<define-tag secrefs>CVE-2020-12399 CVE-2020-12405 CVE-2020-12406 CVE-2020-12410</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2243.wml b/english/lts/security/2020/dla-2243.wml
deleted file mode 100644
index 08850073729..00000000000
--- a/english/lts/security/2020/dla-2243.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or a timing attack on cryptographic keys.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-68.9.0esr-1~deb8u2.
-<p><b>Note</b>: 68.9.0esr-1~deb8u2 fixes an i386 build error in the otherwise
- identical 68.9.0esr-1~deb8u1 that was uploaded but not announced.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2243.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2244.data b/english/lts/security/2020/dla-2244.data
deleted file mode 100644
index a04c62590d9..00000000000
--- a/english/lts/security/2020/dla-2244.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2244-1 libphp-phpmailer</define-tag>
-<define-tag report_date>2020-06-11</define-tag>
-<define-tag secrefs>CVE-2020-13625</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2244.wml b/english/lts/security/2020/dla-2244.wml
deleted file mode 100644
index 4fd4e6e3bc3..00000000000
--- a/english/lts/security/2020/dla-2244.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an escaping issue in
-<tt>libphp-phpmailer</tt>, an email generation utility class for the PHP
-programming language.</p>
-
-<p>The <tt>Content-Type</tt> and <tt>Content-Disposition</tt> headers could have
-permitted file attachments that bypassed attachment filters which
-match on filename extensions. For more information, please see the
-<a href="https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj">upstream announcement</a></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13625">CVE-2020-13625</a>
-
- <p>PHPMailer before 6.1.6 contains an output escaping bug when the name of
- a file attachment contains a double quote character. This can result in the
- file type being misinterpreted by the receiver or any mail relay processing
- the message.</p></li>
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.2.9+dfsg-2+deb8u6.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2244.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2245.data b/english/lts/security/2020/dla-2245.data
deleted file mode 100644
index 60e8f3ca3ba..00000000000
--- a/english/lts/security/2020/dla-2245.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2245-1 mysql-connector-java</define-tag>
-<define-tag report_date>2020-06-11</define-tag>
-<define-tag secrefs>CVE-2020-2875 CVE-2020-2933 CVE-2020-2934</define-tag>
-<define-tag packages>mysql-connector-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2245.wml b/english/lts/security/2020/dla-2245.wml
deleted file mode 100644
index 0c39744b616..00000000000
--- a/english/lts/security/2020/dla-2245.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues were discovered in mysql-connector-java, a Java database
-(JDBC) driver for MySQL, that allow attackers to update, insert or
-delete access to some of MySQL Connectors accessible data, unauthorized
-read access to a subset of the data, and partial denial of service.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-5.1.49-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your mysql-connector-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2245.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2246.data b/english/lts/security/2020/dla-2246.data
deleted file mode 100644
index b9336d16107..00000000000
--- a/english/lts/security/2020/dla-2246.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2246-1 xawtv</define-tag>
-<define-tag report_date>2020-06-12</define-tag>
-<define-tag secrefs>CVE-2020-13696 Bug#962221</define-tag>
-<define-tag packages>xawtv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2246.wml b/english/lts/security/2020/dla-2246.wml
deleted file mode 100644
index 5c0c99ccd7d..00000000000
--- a/english/lts/security/2020/dla-2246.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue was discovered in LinuxTV xawtv before 3.107. The function
-dev_open() in v4l-conf.c does not perform sufficient checks to
-prevent an unprivileged caller of the program from opening unintended
-filesystem paths. This allows a local attacker with access to the
-v4l-conf setuid-root program to test for the existence of arbitrary
-files and to trigger an open on arbitrary files with mode O_RDWR.
-To achieve this, relative path components need to be added to the
-device path, as demonstrated by a
-v4l-conf -c /dev/../root/.bash_history command.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-3.103-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your xawtv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2246.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2247.data b/english/lts/security/2020/dla-2247.data
deleted file mode 100644
index aa75aa551b0..00000000000
--- a/english/lts/security/2020/dla-2247.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2247-1 thunderbird</define-tag>
-<define-tag report_date>2020-06-12</define-tag>
-<define-tag secrefs>CVE-2020-12398 CVE-2020-12399 CVE-2020-12405 CVE-2020-12406 CVE-2020-12410</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2247.wml b/english/lts/security/2020/dla-2247.wml
deleted file mode 100644
index 0d335eaac53..00000000000
--- a/english/lts/security/2020/dla-2247.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple security issues have been found in Thunderbird which could
-result in the setup of a non-encrypted IMAP connection, denial of service
-or potentially the execution of arbitrary code.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:68.9.0-1~deb8u2.
-<p><b>Note</b>: 1:68.9.0esr-1~deb8u2 fixes an i386 build error in the otherwise
- identical 1:68.9.0esr-1~deb8u1 that was uploaded but not announced.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2247.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2248.data b/english/lts/security/2020/dla-2248.data
deleted file mode 100644
index 7cee5141d82..00000000000
--- a/english/lts/security/2020/dla-2248.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2248-1 intel-microcode</define-tag>
-<define-tag report_date>2020-06-13</define-tag>
-<define-tag secrefs>CVE-2020-0543 CVE-2020-0548 CVE-2020-0549</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2248.wml b/english/lts/security/2020/dla-2248.wml
deleted file mode 100644
index 5b5fc59c182..00000000000
--- a/english/lts/security/2020/dla-2248.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVE(s) were reported against src:intel-microcode.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0543">CVE-2020-0543</a>
-
- <p>A new domain bypass transient execution attack known as Special
- Register Buffer Data Sampling (SRBDS) has been found. This flaw
- allows data values from special internal registers to be leaked
- by an attacker able to execute code on any core of the CPU. An
- unprivileged, local attacker can use this flaw to infer values
- returned by affected instructions known to be commonly used
- during cryptographic operations that rely on uniqueness, secrecy,
- or both.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0548">CVE-2020-0548</a>
-
- <p>A flaw was found in Intel processors where a local attacker is
- able to gain information about registers used for vector
- calculations by observing register states from other processes
- running on the system. This results in a race condition where
- store buffers, which were not cleared, could be read by another
- process or a CPU sibling. The highest threat from this
- vulnerability is data confidentiality where an attacker could
- read arbitrary data as it passes through the processor.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0549">CVE-2020-0549</a>
-
- <p>A microarchitectural timing flaw was found on some Intel
- processors. A corner case exists where data in-flight during the
- eviction process can end up in the “fill buffers†and not properly
- cleared by the MDS mitigations. The fill buffer contents (which
- were expected to be blank) can be inferred using MDS or TAA style
- attack methods to allow a local attacker to infer fill buffer
- values.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-3.20200609.2~deb8u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2248.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2249.data b/english/lts/security/2020/dla-2249.data
deleted file mode 100644
index c252d6a78f5..00000000000
--- a/english/lts/security/2020/dla-2249.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2249-1 libexif</define-tag>
-<define-tag report_date>2020-06-13</define-tag>
-<define-tag secrefs>CVE-2020-0182 CVE-2020-0198 Bug#962345</define-tag>
-<define-tag packages>libexif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2249.wml b/english/lts/security/2020/dla-2249.wml
deleted file mode 100644
index 2eb14d834f6..00000000000
--- a/english/lts/security/2020/dla-2249.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The following CVE(s) were reported against src:libexif.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0182">CVE-2020-0182</a>
-
- <p>In exif_entry_get_value of exif-entry.c, there is a possible
- out of bounds read due to a missing bounds check. This could
- lead to local information disclosure with no additional execution
- privileges needed. User interaction is not needed for
- exploitation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0198">CVE-2020-0198</a>
-
- <p>In exif_data_load_data_content of exif-data.c, there is a
- possible UBSAN abort due to an integer overflow. This could lead
- to remote denial of service with no additional execution
- privileges needed. User interaction is needed for exploitation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.6.21-2+deb8u4.</p>
-
-<p>We recommend that you upgrade your libexif packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2249.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2250.data b/english/lts/security/2020/dla-2250.data
deleted file mode 100644
index 30ddf945129..00000000000
--- a/english/lts/security/2020/dla-2250.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2250-1 drupal7</define-tag>
-<define-tag report_date>2020-06-19</define-tag>
-<define-tag secrefs>CVE-2020-13662</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2250.wml b/english/lts/security/2020/dla-2250.wml
deleted file mode 100644
index 72436501cad..00000000000
--- a/english/lts/security/2020/dla-2250.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Drupal 7 has an Open Redirect vulnerability. For example, a user
-could be tricked into visiting a specially crafted link which would
-redirect them to an arbitrary external URL.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.32-1+deb8u18.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2250.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2251.data b/english/lts/security/2020/dla-2251.data
deleted file mode 100644
index 8e44f0dd6c8..00000000000
--- a/english/lts/security/2020/dla-2251.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2251-1 rails</define-tag>
-<define-tag report_date>2020-06-19</define-tag>
-<define-tag secrefs>CVE-2020-8164 CVE-2020-8165</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2251.wml b/english/lts/security/2020/dla-2251.wml
deleted file mode 100644
index 59ade99db8f..00000000000
--- a/english/lts/security/2020/dla-2251.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities were found in Ruby on Rails, a MVC ruby-based
-framework geared for web application development, which could lead to
-remote code execution and untrusted user input usage, depending on the
-application.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8164">CVE-2020-8164</a>
-
- <p>Strong parameters bypass vector in ActionPack. In some cases user
- supplied information can be inadvertently leaked from Strong
- Parameters. Specifically the return value of `each`, or
- `each_value`, or `each_pair` will return the underlying
- <q>untrusted</q> hash of data that was read from the parameters.
- Applications that use this return value may be inadvertently use
- untrusted user input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8165">CVE-2020-8165</a>
-
- <p>Potentially unintended unmarshalling of user-provided objects in
- MemCacheStore. There is potentially unexpected behaviour in the
- MemCacheStore where, when untrusted user input is written to the
- cache store using the `raw: true` parameter, re-reading the result
- from the cache can evaluate the user input as a Marshalled object
- instead of plain text. Unmarshalling of untrusted user input can
- have impact up to and including RCE. At a minimum, this
- vulnerability allows an attacker to inject untrusted Ruby objects
- into a web application.</p>
-
- <p>In addition to upgrading to the latest versions of Rails,
- developers should ensure that whenever they are calling
- `Rails.cache.fetch` they are using consistent values of the `raw`
- parameter for both reading and writing.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:4.1.8-1+deb8u7.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2251.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2252.data b/english/lts/security/2020/dla-2252.data
deleted file mode 100644
index b5904cb0ccc..00000000000
--- a/english/lts/security/2020/dla-2252.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2252-1 ngircd</define-tag>
-<define-tag report_date>2020-06-21</define-tag>
-<define-tag secrefs>CVE-2020-14148</define-tag>
-<define-tag packages>ngircd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2252.wml b/english/lts/security/2020/dla-2252.wml
deleted file mode 100644
index d13f0eeb00c..00000000000
--- a/english/lts/security/2020/dla-2252.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an out-of-bounds access
-vulnerability in the server-server protocol in the ngircd Internet
-Relay Chat (IRC) server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14148">CVE-2020-14148</a>
-
- <p>The Server-Server protocol implementation in ngIRCd before 26~rc2 allows
- an out-of-bounds access, as demonstrated by the IRC_NJOIN()
- function.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-22-2+deb8u1.</p>
-
-<p>We recommend that you upgrade your ngircd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2252.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2253.data b/english/lts/security/2020/dla-2253.data
deleted file mode 100644
index cd4a987cdb2..00000000000
--- a/english/lts/security/2020/dla-2253.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2253-1 lynis</define-tag>
-<define-tag report_date>2020-06-21</define-tag>
-<define-tag secrefs>CVE-2019-13033</define-tag>
-<define-tag packages>lynis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2253.wml b/english/lts/security/2020/dla-2253.wml
deleted file mode 100644
index ff7b3781e7a..00000000000
--- a/english/lts/security/2020/dla-2253.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a vulnerability in the lynis security
-auditing tool. The license key could be obtained by simple observation of the
-process list when a data upload is being performed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13033">CVE-2019-13033</a>
-
- <p>In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by
- looking at the process list when a data upload is being performed. This
- license can be used to upload data to a central Lynis server. Although no
- data can be extracted by knowing the license key, it may be possible to
- upload the data of additional scans.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.6.3-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your lynis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2253.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2254.data b/english/lts/security/2020/dla-2254.data
deleted file mode 100644
index 74bce20669e..00000000000
--- a/english/lts/security/2020/dla-2254.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2254-1 alpine</define-tag>
-<define-tag report_date>2020-06-25</define-tag>
-<define-tag secrefs>CVE-2020-14929 Bug#963179</define-tag>
-<define-tag packages>alpine</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2254.wml b/english/lts/security/2020/dla-2254.wml
deleted file mode 100644
index 6ff35f5658e..00000000000
--- a/english/lts/security/2020/dla-2254.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2020-14929">CVE-2020-14929</a></p>
-
- <p>Alpine before 2.23 silently proceeds to use an insecure connection
- after a /tls is sent in certain circumstances involving PREAUTH, which
- is a less secure behavior than the alternative of closing the connection
- and letting the user decide what they would like to do.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.11+dfsg1-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your alpine packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2254.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2255.data b/english/lts/security/2020/dla-2255.data
deleted file mode 100644
index d58b11b0c4b..00000000000
--- a/english/lts/security/2020/dla-2255.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2255-1 libtasn1-6</define-tag>
-<define-tag report_date>2020-6-28</define-tag>
-<define-tag secrefs>CVE-2017-10790</define-tag>
-<define-tag packages>libtasn1-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2255.wml b/english/lts/security/2020/dla-2255.wml
deleted file mode 100644
index f856bd6a678..00000000000
--- a/english/lts/security/2020/dla-2255.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerability has been discovered in Libtasn1, a library to manage
-ASN.1 structures, allowing a remote attacker to cause a denial of service
-against an application using the Libtasn1 library.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.2-3+deb8u4.</p>
-
-<p>We recommend that you upgrade your libtasn1-6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2255.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2256.data b/english/lts/security/2020/dla-2256.data
deleted file mode 100644
index 96ee6cafe78..00000000000
--- a/english/lts/security/2020/dla-2256.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2256-1 libtirpc</define-tag>
-<define-tag report_date>2020-6-28</define-tag>
-<define-tag secrefs>CVE-2016-4429</define-tag>
-<define-tag packages>libtirpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2256.wml b/english/lts/security/2020/dla-2256.wml
deleted file mode 100644
index 397594664f0..00000000000
--- a/english/lts/security/2020/dla-2256.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that libtiprc, a transport-independent RPC library,
-could be used for a denial of service or possibly unspecified other impact
-by a stack-based buffer overflow due to a flood of crafted ICMP and UDP
-packets.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.2.5-1+deb8u3.</p>
-
-<p>We recommend that you upgrade your libtirpc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2256.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2257.data b/english/lts/security/2020/dla-2257.data
deleted file mode 100644
index 62055394d4f..00000000000
--- a/english/lts/security/2020/dla-2257.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2257-1 pngquant</define-tag>
-<define-tag report_date>2020-6-28</define-tag>
-<define-tag secrefs>CVE-2016-5735</define-tag>
-<define-tag packages>pngquant</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2257.wml b/english/lts/security/2020/dla-2257.wml
deleted file mode 100644
index 435ad900ff5..00000000000
--- a/english/lts/security/2020/dla-2257.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was found that pngquant, a PNG (Portable Network Graphics) image
-optimising utility, is susceptible to a buffer overflow write issue
-triggered by a maliciously crafted png image, which could lead into
-denial of service or other issues.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-2.3.0-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your pngquant packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2257.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2258.data b/english/lts/security/2020/dla-2258.data
deleted file mode 100644
index 086b26f6c3e..00000000000
--- a/english/lts/security/2020/dla-2258.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2258-1 zziplib</define-tag>
-<define-tag report_date>2020-6-28</define-tag>
-<define-tag secrefs>CVE-2018-6381 CVE-2018-6484 CVE-2018-6540 CVE-2018-6541 CVE-2018-6869 CVE-2018-7725 CVE-2018-7726 CVE-2018-16548</define-tag>
-<define-tag packages>zziplib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2258.wml b/english/lts/security/2020/dla-2258.wml
deleted file mode 100644
index febd6be4254..00000000000
--- a/english/lts/security/2020/dla-2258.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been fixed in zziplib, a library providing read access
-on ZIP-archives. They are basically all related to invalid memory access
-and resulting crash or memory leak.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.13.62-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your zziplib packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2258.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2259.data b/english/lts/security/2020/dla-2259.data
deleted file mode 100644
index 44f9423f12f..00000000000
--- a/english/lts/security/2020/dla-2259.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2259-1 picocom</define-tag>
-<define-tag report_date>2020-6-28</define-tag>
-<define-tag secrefs>CVE-2015-9059</define-tag>
-<define-tag packages>picocom</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2259.wml b/english/lts/security/2020/dla-2259.wml
deleted file mode 100644
index 9bd4d6e31a7..00000000000
--- a/english/lts/security/2020/dla-2259.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a command injection vulnerability in
-picocom, a minimal dumb-terminal emulation program.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.7-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your picocom packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2259.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2260.data b/english/lts/security/2020/dla-2260.data
deleted file mode 100644
index 2c0f82bacc5..00000000000
--- a/english/lts/security/2020/dla-2260.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2260-1 mcabber</define-tag>
-<define-tag report_date>2020-6-28</define-tag>
-<define-tag secrefs>CVE-2016-9928</define-tag>
-<define-tag packages>mcabber</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2260.wml b/english/lts/security/2020/dla-2260.wml
deleted file mode 100644
index 3a1d3326320..00000000000
--- a/english/lts/security/2020/dla-2260.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a <q>roster push attack</q> in mcabber, a
-console-based Jabber (XMPP) client. This is identical to <a href="https://security-tracker.debian.org/tracker/CVE-2015-8688">CVE-2015-8688</a>
-for gajim.</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-0.10.2-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your mcabber packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2260.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2261.data b/english/lts/security/2020/dla-2261.data
deleted file mode 100644
index a761bd8f4d9..00000000000
--- a/english/lts/security/2020/dla-2261.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2261-1 php5</define-tag>
-<define-tag report_date>2020-6-29</define-tag>
-<define-tag secrefs>CVE-2019-11048</define-tag>
-<define-tag packages>php5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2261.wml b/english/lts/security/2020/dla-2261.wml
deleted file mode 100644
index a1f5fee8965..00000000000
--- a/english/lts/security/2020/dla-2261.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It has been discovered, that a vulnerability in php5, a server-side,
-HTML-embedded scripting language, could lead to exhausted disk space on
-the server. When using overly long filenames or field names, a memory
-limit could be hit which results in stopping the upload but not cleaning
-up behind.</p>
-
-<p>Further the embedded version of <q>file</q> is vulnerable to <a href="https://security-tracker.debian.org/tracker/CVE-2019-18218">CVE-2019-18218</a>.
-As it can not be exploited the same in php5 as in file, this issue is not
-handled as an own CVE but just as a bug, that has been fixed here
-(restrict the number of CDF_VECTOR elements to prevent a heap-based
-buffer overflow (4-byte out-of-bounds write)).</p>
-
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-5.6.40+dfsg-0+deb8u12.</p>
-
-<p>We recommend that you upgrade your php5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2261.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2262.data b/english/lts/security/2020/dla-2262.data
deleted file mode 100644
index e190a35609c..00000000000
--- a/english/lts/security/2020/dla-2262.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2262-1 qemu</define-tag>
-<define-tag report_date>2020-06-29</define-tag>
-<define-tag secrefs>CVE-2020-1983 CVE-2020-13361 CVE-2020-13362 CVE-2020-13765</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2262.wml b/english/lts/security/2020/dla-2262.wml
deleted file mode 100644
index 5a850859051..00000000000
--- a/english/lts/security/2020/dla-2262.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were fixed in qemu, a fast processor emulator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1983">CVE-2020-1983</a>
-
- <p>slirp: Fix use-after-free in ip_reass().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13361">CVE-2020-13361</a>
-
- <p>es1370_transfer_audio in hw/audio/es1370.c
- allowed guest OS users to trigger an out-of-bounds access
- during an es1370_write() operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13362">CVE-2020-13362</a>
-
- <p>megasas_lookup_frame in hw/scsi/megasas.c had
- an out-of-bounds read via a crafted reply_queue_head field from
- a guest OS user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13765">CVE-2020-13765</a>
-
- <p>hw/core/loader: Fix possible crash in rom_copy().</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1:2.1+dfsg-12+deb8u15.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2262.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2263.data b/english/lts/security/2020/dla-2263.data
deleted file mode 100644
index f047770df1b..00000000000
--- a/english/lts/security/2020/dla-2263.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2263-1 drupal7</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2020-13663</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2263.wml b/english/lts/security/2020/dla-2263.wml
deleted file mode 100644
index 24a8aedda95..00000000000
--- a/english/lts/security/2020/dla-2263.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p><a href="https://security-tracker.debian.org/tracker/CVE-2020-13663">CVE-2020-13663</a> - Drupal SA 2020-004</p>
-
- <p>The Drupal core Form API does not properly handle certain form
- input from cross-site requests, which can lead to other vulnerabilities.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-7.32-1+deb8u19.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2263.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2264.data b/english/lts/security/2020/dla-2264.data
deleted file mode 100644
index c4190e660e7..00000000000
--- a/english/lts/security/2020/dla-2264.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2264-1 libvncserver</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2019-20839 CVE-2020-14397 CVE-2020-14399 CVE-2020-14400 CVE-2020-14401 CVE-2020-14402 CVE-2020-14403 CVE-2020-14404 CVE-2020-14405</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2264.wml b/english/lts/security/2020/dla-2264.wml
deleted file mode 100644
index 961c552d14e..00000000000
--- a/english/lts/security/2020/dla-2264.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities have been discovered in libVNC (libvncserver Debian package), an
-implemenantation of the VNC server and client protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20839">CVE-2019-20839</a>
-
- <p>libvncclient/sockets.c in LibVNCServer had a buffer overflow via a
- long socket filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14397">CVE-2020-14397</a>
-
- <p>libvncserver/rfbregion.c had a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14399">CVE-2020-14399</a>
-
- <p>Byte-aligned data was accessed through uint32_t pointers in
- libvncclient/rfbproto.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14400">CVE-2020-14400</a>
-
- <p>Byte-aligned data was accessed through uint16_t pointers in
- libvncserver/translate.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14401">CVE-2020-14401</a>
-
- <p>libvncserver/scale.c had a pixel_value integer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14402">CVE-2020-14402</a>
-
- <p>libvncserver/corre.c allowed out-of-bounds access via encodings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14403">CVE-2020-14403</a>
-
- <p>libvncserver/hextile.c allowed out-of-bounds access via encodings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14404">CVE-2020-14404</a>
-
- <p>libvncserver/rre.c allowed out-of-bounds access via encodings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14405">CVE-2020-14405</a>
-
- <p>libvncclient/rfbproto.c does not limit TextChat size.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-0.9.9+dfsg2-6.1+deb8u8.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2264.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2265.data b/english/lts/security/2020/dla-2265.data
deleted file mode 100644
index 154a90cd5ba..00000000000
--- a/english/lts/security/2020/dla-2265.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2265-1 mailman</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2020-15011</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2265.wml b/english/lts/security/2020/dla-2265.wml
deleted file mode 100644
index d6fcc0c2f77..00000000000
--- a/english/lts/security/2020/dla-2265.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>GNU Mailman allowed arbitrary content injection via the Cgi/private.py
-private archive login page.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1:2.1.18-2+deb8u7.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2265.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2266.data b/english/lts/security/2020/dla-2266.data
deleted file mode 100644
index e133c9e4cb8..00000000000
--- a/english/lts/security/2020/dla-2266.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2266-1 nss</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2020-12399 CVE-2020-12402</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2266.wml b/english/lts/security/2020/dla-2266.wml
deleted file mode 100644
index c23feb33d9c..00000000000
--- a/english/lts/security/2020/dla-2266.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were fixed in nss,
-the Network Security Service libraries.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12399">CVE-2020-12399</a>
-
- <p>Force a fixed length for DSA exponentiation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12402">CVE-2020-12402</a>
-
- <p>Side channel vulnerabilities during RSA key generation.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2:3.26-1+debu8u11.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2266.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2267.data b/english/lts/security/2020/dla-2267.data
deleted file mode 100644
index dba86613407..00000000000
--- a/english/lts/security/2020/dla-2267.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2267-1 libmatio</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2019-17533</define-tag>
-<define-tag packages>libmatio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2267.wml b/english/lts/security/2020/dla-2267.wml
deleted file mode 100644
index 0ae6dd82d65..00000000000
--- a/english/lts/security/2020/dla-2267.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In libmatio, a library to read and write Matlab MAT files,
-a vulnerability was fixed in Mat_VarReadNextInfo4 in mat4.c
-that could lead to a heap-based buffer over-read in strdup_vprintf.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-1.5.2-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your libmatio packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2267.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2268-2.data b/english/lts/security/2020/dla-2268-2.data
deleted file mode 100644
index 530e3dd82c7..00000000000
--- a/english/lts/security/2020/dla-2268-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2268-2 mutt</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2020-14093 CVE-2020-14954</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2268-2.wml b/english/lts/security/2020/dla-2268-2.wml
deleted file mode 100644
index fc142fabaa1..00000000000
--- a/english/lts/security/2020/dla-2268-2.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been discovered in mutt, a console email client.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14093">CVE-2020-14093</a>
-
- <p>Mutt allowed an IMAP fcc/postpone man-in-the-middle attack via a
- PREAUTH response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14954">CVE-2020-14954</a>
-
- <p>Mutt had a STARTTLS buffering issue that affected IMAP, SMTP, and
- POP3. When a server had sent a <q>begin TLS</q> response, the client read
- additional data (e.g., from a man-in-the-middle attacker) and
- evaluated it in a TLS context, aka <q>response injection</q>.</p>
-
-</ul>
-
-<p>In Debian jessie, the mutt source package builds two variants of mutt:
-mutt and mutt-patched.</p>
-
-<p>The previous package version (1.5.23-3+deb8u2, DLA-2268-1) provided fixes
-for the issues referenced above, but they were only applied for the
-mutt-patched package build, not for the (vanilla) mutt package build.</p>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.23-3+deb8u3.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2268-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2268.data b/english/lts/security/2020/dla-2268.data
deleted file mode 100644
index 0d95348ec4c..00000000000
--- a/english/lts/security/2020/dla-2268.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2268-1 mutt</define-tag>
-<define-tag report_date>2020-06-30</define-tag>
-<define-tag secrefs>CVE-2020-14093 CVE-2020-14954 Bug#962897</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2268.wml b/english/lts/security/2020/dla-2268.wml
deleted file mode 100644
index ddb4b3d0bed..00000000000
--- a/english/lts/security/2020/dla-2268.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been discovered in mutt, a console email client.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14093">CVE-2020-14093</a>
-
- <p>Mutt allowed an IMAP fcc/postpone man-in-the-middle attack via a
- PREAUTH response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14954">CVE-2020-14954</a>
-
- <p>Mutt had a STARTTLS buffering issue that affected IMAP, SMTP, and
- POP3. When a server had sent a <q>begin TLS</q> response, the client read
- additional data (e.g., from a man-in-the-middle attacker) and
- evaluated it in a TLS context, aka "response injection."</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-1.5.23-3+deb8u2.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2268.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2269.data b/english/lts/security/2020/dla-2269.data
deleted file mode 100644
index 29e6be0971b..00000000000
--- a/english/lts/security/2020/dla-2269.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2269-1 wordpress</define-tag>
-<define-tag report_date>2020-07-01</define-tag>
-<define-tag secrefs>CVE-2020-4046 CVE-2020-4047 CVE-2020-4048 CVE-2020-4049 CVE-2020-4050 Bug#962685</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2269.wml b/english/lts/security/2020/dla-2269.wml
deleted file mode 100644
index 681495a6a54..00000000000
--- a/english/lts/security/2020/dla-2269.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in Wordpress, a web
-blogging tool. They allowed remote attackers to perform
-various Cross-Side Scripting (XSS) attacks, create open
-redirects, escalate privileges, and bypass authorization
-access.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4046">CVE-2020-4046</a>
-
- <p>In affected versions of WordPress, users with low
- privileges (like contributors and authors) can use the
- embed block in a certain way to inject unfiltered HTML
- in the block editor. When affected posts are viewed by a
- higher privileged user, this could lead to script
- execution in the editor/wp-admin.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4047">CVE-2020-4047</a>
-
- <p>In affected versions of WordPress, authenticated users with
- upload permissions (like authors) are able to inject
- JavaScript into some media file attachment pages in a certain
- way. This can lead to script execution in the context of a
- higher privileged user when the file is viewed by them.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4048">CVE-2020-4048</a>
-
- <p>In affected versions of WordPress, due to an issue in
- wp_validate_redirect() and URL sanitization, an arbitrary
- external link can be crafted leading to unintended/open
- redirect when clicked.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4049">CVE-2020-4049</a>
-
- <p>In affected versions of WordPress, when uploading themes, the
- name of the theme folder can be crafted in a way that could
- lead to JavaScript execution in /wp-admin on the themes page.
- This does require an admin to upload the theme, and is low
- severity self-XSS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4050">CVE-2020-4050</a>
-
- <p>In affected versions of WordPress, misuse of the
- `set-screen-option` filter's return value allows arbitrary
- user meta fields to be saved. It does require an admin to
- install a plugin that would misuse the filter. Once installed,
- it can be leveraged by low privileged users.</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-4.1.31+dfsg-0+deb8u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2269.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2270.data b/english/lts/security/2020/dla-2270.data
deleted file mode 100644
index 3f8ef27390d..00000000000
--- a/english/lts/security/2020/dla-2270.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2270-1 jackson-databind</define-tag>
-<define-tag report_date>2020-07-01</define-tag>
-<define-tag secrefs>CVE-2020-14060 CVE-2020-14061 CVE-2020-14062 CVE-2020-14195</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2270.wml b/english/lts/security/2020/dla-2270.wml
deleted file mode 100644
index 0cb4715f1fb..00000000000
--- a/english/lts/security/2020/dla-2270.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>There were several CVE(s) reported against src:jackson-databind,
-which are as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14060">CVE-2020-14060</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
- interaction between serialization gadgets and typing, related
- to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
- (aka apache/drill).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14061">CVE-2020-14061</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
- interaction between serialization gadgets and typing, related
- to oracle.jms.AQjmsQueueConnectionFactory,
- oracle.jms.AQjmsXATopicConnectionFactory,
- oracle.jms.AQjmsTopicConnectionFactory,
- oracle.jms.AQjmsXAQueueConnectionFactory, and
- oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14062">CVE-2020-14062</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
- interaction between serialization gadgets and typing, related
- to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
- (aka xalan2).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14195">CVE-2020-14195</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
- interaction between serialization gadgets and typing, related
- to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).</p></li>
-
-</ul>
-
-<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
-2.4.2-2+deb8u15.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2270.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2271.data b/english/lts/security/2020/dla-2271.data
deleted file mode 100644
index 29dae9b5901..00000000000
--- a/english/lts/security/2020/dla-2271.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2271-1 coturn</define-tag>
-<define-tag report_date>2020-07-01</define-tag>
-<define-tag secrefs>CVE-2020-4067</define-tag>
-<define-tag packages>coturn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2271.wml b/english/lts/security/2020/dla-2271.wml
deleted file mode 100644
index 075988cb0a6..00000000000
--- a/english/lts/security/2020/dla-2271.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In coturn before version 4.5.1.3, there is an issue whereby
-STUN/TURN response buffer is not initialized properly. There
-is a leak of information between different client connections.
-One client (an attacker) could use their connection to
-intelligently query coturn to get interesting bytes in the
-padding bytes from the connection of another client.</p>
-
-<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
-4.2.1.2-1+deb8u2.</p>
-
-<p>We recommend that you upgrade your coturn packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2271.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2272.data b/english/lts/security/2020/dla-2272.data
deleted file mode 100644
index c9c069fbe79..00000000000
--- a/english/lts/security/2020/dla-2272.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2272-1 </define-tag>
-<define-tag report_date>2020-07-07</define-tag>
-<define-tag packages></define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2272.wml b/english/lts/security/2020/dla-2272.wml
deleted file mode 100644
index c6b151053fa..00000000000
--- a/english/lts/security/2020/dla-2272.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>Debian 8 Long Term Support reaching end-of-life</define-tag>
-<define-tag moreinfo>
-<p>
-The Debian Long Term Support (LTS) Team hereby announces that Debian 8
-jessie support has reached its end-of-life on June 30, 2020,
-five years after its initial release on April 26, 2015.
-</p>
-<p>
-Debian will not provide further security updates for Debian 8. A
-subset of jessie packages will be supported by external parties.
-Detailed information can be found at <a href="https://wiki.debian.org/LTS/Extended">Extended LTS</a>.
-</p>
-<p>
-The LTS Team will prepare the transition to Debian 9 stretch, which is the
-current oldstable release. The LTS team has taken over support from the
-Security Team on July 6, 2020 while the final point update for stretch will
-be released on July 18, 2020.
-</p>
-<p>
-Debian 9 will also receive Long Term Support for five years after its
-initial release with support ending on June 30, 2022. The supported
-architectures remain amd64, i386, armel and armhf. In addition we are
-pleased to announce, for the first time support will be extended to
-include the arm64 architecture.
-</p>
-<p>
-For further information about using stretch LTS and upgrading from jessie
-LTS, please refer to <a href="https://wiki.debian.org/LTS/Using">LTS/Using</a>.
-</p>
-<p>
-Debian and its LTS Team would like to thank all contributing users,
-developers and sponsors who are making it possible to extend the life
-of previous stable releases, and who have made this LTS a success.
-</p>
-<p>
-If you rely on Debian LTS, please consider <a href="https://wiki.debian.org/LTS/Development">joining the team</a>,
-providing patches, testing or <a href="https://wiki.debian.org/LTS/Funding">funding the efforts</a>.
-</p>
-<p>
-More information about Debian Long Term Support can be found at
-<a href="https://wiki.debian.org/LTS/">the LTS wiki page</a>.
-</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2272.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2273.data b/english/lts/security/2020/dla-2273.data
deleted file mode 100644
index b91dd145f10..00000000000
--- a/english/lts/security/2020/dla-2273.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2273-1 shiro</define-tag>
-<define-tag report_date>2020-07-08</define-tag>
-<define-tag secrefs>CVE-2020-1957 CVE-2020-11989</define-tag>
-<define-tag packages>shiro</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2273.wml b/english/lts/security/2020/dla-2273.wml
deleted file mode 100644
index 98ee8ec1934..00000000000
--- a/english/lts/security/2020/dla-2273.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was two issues in shiro, a security framework
-for Java application:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1957">CVE-2020-1957</a>
-
- <p>Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic
- controllers, a specially crafted request may cause an authentication
- bypass.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11989">CVE-2020-11989</a>
-
- <p>Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic
- controllers, a specially crafted request may cause an authentication
- bypass.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.3.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your shiro packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2273.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2274.data b/english/lts/security/2020/dla-2274.data
deleted file mode 100644
index 46059d28099..00000000000
--- a/english/lts/security/2020/dla-2274.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2274-1 fwupd</define-tag>
-<define-tag report_date>2020-07-09</define-tag>
-<define-tag secrefs>CVE-2020-10759</define-tag>
-<define-tag packages>fwupd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2274.wml b/english/lts/security/2020/dla-2274.wml
deleted file mode 100644
index 88fc13cefb3..00000000000
--- a/english/lts/security/2020/dla-2274.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a possible signature verification issue in
-firmware update daemon library fwupd as the return value <tt>of
-gpgme_op_verify_result</tt> was not being checked</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10759">CVE-2020-10759</a>
-
- <p>Possible bypass in signature verification</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.7.4-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your fwupd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2274.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2275.data b/english/lts/security/2020/dla-2275.data
deleted file mode 100644
index cd1078723ce..00000000000
--- a/english/lts/security/2020/dla-2275.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2275-1 ruby-rack</define-tag>
-<define-tag report_date>2020-07-11</define-tag>
-<define-tag secrefs>CVE-2020-8161 CVE-2020-8184 Bug#963477</define-tag>
-<define-tag packages>ruby-rack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2275.wml b/english/lts/security/2020/dla-2275.wml
deleted file mode 100644
index a348f36fec3..00000000000
--- a/english/lts/security/2020/dla-2275.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following CVEs were reported against src:ruby-rack.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8161">CVE-2020-8161</a>
-
- <p>A directory traversal vulnerability exists in rack < 2.2.0 that
- allows an attacker perform directory traversal vulnerability in
- the Rack::Directory app that is bundled with Rack which could
- result in information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8184">CVE-2020-8184</a>
-
- <p>A reliance on cookies without validation/integrity check security
- vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it
- is possible for an attacker to forge a secure or host-only cookie
- prefix.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.6.4-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your ruby-rack packages.</p>
-
-<p>For the detailed security status of ruby-rack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rack">https://security-tracker.debian.org/tracker/ruby-rack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2275.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2276.data b/english/lts/security/2020/dla-2276.data
deleted file mode 100644
index 84da405f57a..00000000000
--- a/english/lts/security/2020/dla-2276.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2276-1 mailman</define-tag>
-<define-tag report_date>2020-07-11</define-tag>
-<define-tag secrefs>CVE-2020-12108 CVE-2020-15011</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2276.wml b/english/lts/security/2020/dla-2276.wml
deleted file mode 100644
index 9d64f21c6a5..00000000000
--- a/english/lts/security/2020/dla-2276.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following CVEs were reported against src:mailman.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12108">CVE-2020-12108</a>
-
- <p>/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary
- Content Injection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15011">CVE-2020-15011</a>
-
- <p>GNU Mailman before 2.1.33 allows arbitrary content injection via
- the Cgi/private.py private archive login page.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.1.23-1+deb9u6.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>For the detailed security status of mailman please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mailman">https://security-tracker.debian.org/tracker/mailman</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2276.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2277.data b/english/lts/security/2020/dla-2277.data
deleted file mode 100644
index 2ea8c6812c2..00000000000
--- a/english/lts/security/2020/dla-2277.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2277-1 openjpeg2</define-tag>
-<define-tag report_date>2020-07-11</define-tag>
-<define-tag secrefs>CVE-2019-12973 CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 Bug#931292 Bug#950000 Bug#950184</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2277.wml b/english/lts/security/2020/dla-2277.wml
deleted file mode 100644
index 699df1f31cf..00000000000
--- a/english/lts/security/2020/dla-2277.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following CVEs were reported against src:openjpeg2.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12973">CVE-2019-12973</a>
-
- <p>In OpenJPEG 2.3.1, there is excessive iteration in the
- opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers
- could leverage this vulnerability to cause a denial of service
- via a crafted bmp file. This issue is similar to <a href="https://security-tracker.debian.org/tracker/CVE-2018-6616">CVE-2018-6616</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6851">CVE-2020-6851</a>
-
- <p>OpenJPEG through 2.3.1 has a heap-based buffer overflow in
- opj_t1_clbl_decode_processor in openjp2/t1.c because of lack
- of opj_j2k_update_image_dimensions validation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8112">CVE-2020-8112</a>
-
- <p>opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1
- through 2020-01-28 has a heap-based buffer overflow in the
- qmfbid==1 case, a different issue than <a href="https://security-tracker.debian.org/tracker/CVE-2020-6851">CVE-2020-6851</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15389">CVE-2020-15389</a>
-
- <p>jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a
- use-after-free that can be triggered if there is a mix of
- valid and invalid files in a directory operated on by the
- decompressor. Triggering a double-free may also be possible.
- This is related to calling opj_image_destroy twice.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.2-1.1+deb9u5.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>For the detailed security status of openjpeg2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjpeg2">https://security-tracker.debian.org/tracker/openjpeg2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2277.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2278-2.data b/english/lts/security/2020/dla-2278-2.data
deleted file mode 100644
index 10bd8d8b480..00000000000
--- a/english/lts/security/2020/dla-2278-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2278-2 squid3</define-tag>
-<define-tag report_date>2020-8-13</define-tag>
-<define-tag secrefs>Bug#965012</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2278-2.wml b/english/lts/security/2020/dla-2278-2.wml
deleted file mode 100644
index 15faee1f530..00000000000
--- a/english/lts/security/2020/dla-2278-2.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of squid3 released as DLA-2278-1 contained an incomplete
-fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-12523">CVE-2019-12523</a> that prevented services which rely on the icap
-or ecap protocol to function properly. Updated squid3 packages are now
-available to correct this issue.</p>
-
-<p>In addition the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2019-12529">CVE-2019-12529</a> was improved to use more code
-from Debian's cryptographic nettle library.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.5.23-5+deb9u3.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>For the detailed security status of squid3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/squid3">https://security-tracker.debian.org/tracker/squid3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2278-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2278-3.data b/english/lts/security/2020/dla-2278-3.data
deleted file mode 100644
index 928ccfb1d99..00000000000
--- a/english/lts/security/2020/dla-2278-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2278-3 squid3</define-tag>
-<define-tag report_date>2020-9-4</define-tag>
-<define-tag secrefs>Bug#969526</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2278-3.wml b/english/lts/security/2020/dla-2278-3.wml
deleted file mode 100644
index 00685c87e4f..00000000000
--- a/english/lts/security/2020/dla-2278-3.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of squid3 released as DLA-2278-2 introduced a regression
-due to the updated fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-12529">CVE-2019-12529</a>. The new Kerberos
-authentication code prevented base64 token negotiation. Updated squid3
-packages are now
-available to correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.5.23-5+deb9u4.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>For the detailed security status of squid3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/squid3">https://security-tracker.debian.org/tracker/squid3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2278-3.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2278.data b/english/lts/security/2020/dla-2278.data
deleted file mode 100644
index 73a3dd7bd2f..00000000000
--- a/english/lts/security/2020/dla-2278.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2278-1 squid3</define-tag>
-<define-tag report_date>2020-7-10</define-tag>
-<define-tag secrefs>CVE-2018-19132 CVE-2019-12519 CVE-2019-12520 CVE-2019-12521 CVE-2019-12523 CVE-2019-12524 CVE-2019-12525 CVE-2019-12526 CVE-2019-12528 CVE-2019-12529 CVE-2019-13345 CVE-2019-18676 CVE-2019-18677 CVE-2019-18678 CVE-2019-18679 CVE-2019-18860 CVE-2020-8449 CVE-2020-8450 CVE-2020-11945 Bug#950802 Bug#931478 Bug#950925 Bug#912294</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2278.wml b/english/lts/security/2020/dla-2278.wml
deleted file mode 100644
index 05e34d7b2ca..00000000000
--- a/english/lts/security/2020/dla-2278.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Squid, a high-performance proxy caching server for
-web clients, has been affected by multiple security vulnerabilities.
-Due to incorrect input validation and URL request handling it was
-possible to bypass access restrictions for restricted HTTP servers
-and to cause a denial-of-service.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.23-5+deb9u2.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>For the detailed security status of squid3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/squid3">https://security-tracker.debian.org/tracker/squid3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2278.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2279.data b/english/lts/security/2020/dla-2279.data
deleted file mode 100644
index a26caab0041..00000000000
--- a/english/lts/security/2020/dla-2279.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2279-1 tomcat8</define-tag>
-<define-tag report_date>2020-7-12</define-tag>
-<define-tag secrefs>CVE-2020-9484 CVE-2020-11996 Bug#961209</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2279.wml b/english/lts/security/2020/dla-2279.wml
deleted file mode 100644
index 78151d9708b..00000000000
--- a/english/lts/security/2020/dla-2279.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9484">CVE-2020-9484</a>
-
- <p>When using Apache Tomcat and an attacker is able to control the
- contents and name of a file on the server; and b) the server is
- configured to use the PersistenceManager with a FileStore; and c)
- the PersistenceManager is configured with
- sessionAttributeValueClassNameFilter="null" (the default unless a
- SecurityManager is used) or a sufficiently lax filter to allow the
- attacker provided object to be deserialized; and d) the attacker
- knows the relative file path from the storage location used by
- FileStore to the file the attacker has control over; then, using a
- specifically crafted request, the attacker will be able to trigger
- remote code execution via deserialization of the file under their
- control. Note that all of conditions a) to d) must be true for the
- attack to succeed.</p>
-
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11996">CVE-2020-11996</a>
-
- <p>A specially crafted sequence of HTTP/2 requests sent to Apache
- Tomcat could trigger high CPU usage for several seconds. If a
- sufficient number of such requests were made on concurrent HTTP/2
- connections, the server could become unresponsive.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8.5.54-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>For the detailed security status of tomcat8 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat8">https://security-tracker.debian.org/tracker/tomcat8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2279.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2280.data b/english/lts/security/2020/dla-2280.data
deleted file mode 100644
index b180034f998..00000000000
--- a/english/lts/security/2020/dla-2280.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2280-1 python3.5</define-tag>
-<define-tag report_date>2020-07-15</define-tag>
-<define-tag secrefs>CVE-2018-20406 CVE-2018-20852 CVE-2019-5010 CVE-2019-9636 CVE-2019-9740 CVE-2019-9947 CVE-2019-9948 CVE-2019-10160 CVE-2019-16056 CVE-2019-16935 CVE-2019-18348 CVE-2020-8492 CVE-2020-14422 Bug#924072 Bug#921064 Bug#940901</define-tag>
-<define-tag packages>python3.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2280.wml b/english/lts/security/2020/dla-2280.wml
deleted file mode 100644
index 70b66b65ecd..00000000000
--- a/english/lts/security/2020/dla-2280.wml
+++ /dev/null
@@ -1,142 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Python, an interactive
-high-level object-oriented language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20406">CVE-2018-20406</a>
-
- <p>Modules/_pickle.c has an integer overflow via a large LONG_BINPUT
- value that is mishandled during a <q>resize to twice the size</q>
- attempt. This issue might cause memory exhaustion, but is only
- relevant if the pickle format is used for serializing tens or
- hundreds of gigabytes of data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20852">CVE-2018-20852</a>
-
- <p>http.cookiejar.DefaultPolicy.domain_return_ok in
- Lib/http/cookiejar.py does not correctly validate the domain: it
- can be tricked into sending existing cookies to the wrong
- server. An attacker may abuse this flaw by using a server with a
- hostname that has another valid hostname as a suffix (e.g.,
- pythonicexample.com to steal cookies for example.com). When a
- program uses http.cookiejar.DefaultPolicy and tries to do an HTTP
- connection to an attacker-controlled server, existing cookies can
- be leaked to the attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5010">CVE-2019-5010</a>
-
- <p>An exploitable denial-of-service vulnerability exists in the X509
- certificate parser. A specially crafted X509 certificate can cause
- a NULL pointer dereference, resulting in a denial of service. An
- attacker can initiate or accept TLS connections using crafted
- certificates to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a>
-
- <p>Improper Handling of Unicode Encoding (with an incorrect netloc)
- during NFKC normalization. The impact is: Information disclosure
- (credentials, cookies, etc. that are cached against a given
- hostname). The components are: urllib.parse.urlsplit,
- urllib.parse.urlparse. The attack vector is: A specially crafted
- URL could be incorrectly parsed to locate cookies or
- authentication data and send that information to a different host
- than when parsed correctly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
-
- <p>An issue was discovered in urllib2. CRLF injection is possible if
- the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically
- in the query string after a ? character) followed by an HTTP
- header or a Redis command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9947">CVE-2019-9947</a>
-
- <p>An issue was discovered in urllib2. CRLF injection is possible if
- the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically
- in the path component of a URL that lacks a ? character) followed
- by an HTTP header or a Redis command. This is similar to the
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a> query string issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9948">CVE-2019-9948</a>
-
- <p>urllib supports the local_file: scheme, which makes it easier for
- remote attackers to bypass protection mechanisms that blacklist
- file: URIs, as demonstrated by triggering a
- urllib.urlopen('local_file:///etc/passwd') call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10160">CVE-2019-10160</a>
-
- <p>A security regression was discovered in python, which still allows
- an attacker to exploit <a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a> by abusing the user and
- password parts of a URL. When an application parses user-supplied
- URLs to store cookies, authentication credentials, or other kind
- of information, it is possible for an attacker to provide
- specially crafted URLs to make the application locate host-related
- information (e.g. cookies, authentication data) and send them to a
- different host than where it should, unlike if the URLs had been
- correctly parsed. The result of an attack may vary based on the
- application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16056">CVE-2019-16056</a>
-
- <p>The email module wrongly parses email addresses that contain
- multiple @ characters. An application that uses the email module
- and implements some kind of checks on the From/To headers of a
- message could be tricked into accepting an email address that
- should be denied. An attack may be the same as in <a href="https://security-tracker.debian.org/tracker/CVE-2019-11340">CVE-2019-11340</a>;
- however, this CVE applies to Python more generally.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16935">CVE-2019-16935</a>
-
- <p>The documentation XML-RPC server has XSS via the server_title
- field. This occurs in Lib/xmlrpc/server.py. If set_server_title is
- called with untrusted input, arbitrary JavaScript can be delivered
- to clients that visit the http URL for this server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18348">CVE-2019-18348</a>
-
- <p>An issue was discovered in urllib2. CRLF injection is possible if
- the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically
- in the host component of a URL) followed by an HTTP header. This
- is similar to the <a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a> query string issue and the
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-9947">CVE-2019-9947</a> path string issue</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8492">CVE-2020-8492</a>
-
- <p>Python allows an HTTP server to conduct Regular Expression Denial
- of Service (ReDoS) attacks against a client because of
- urllib.request.AbstractBasicAuthHandler catastrophic backtracking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14422">CVE-2020-14422</a>
-
- <p>Lib/ipaddress.py improperly computes hash values in the
- IPv4Interface and IPv6Interface classes, which might allow a
- remote attacker to cause a denial of service if an application is
- affected by the performance of a dictionary containing
- IPv4Interface or IPv6Interface objects, and this attacker can
- cause many dictionary entries to be created.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.3-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your python3.5 packages.</p>
-
-<p>For the detailed security status of python3.5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.5">https://security-tracker.debian.org/tracker/python3.5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2280.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2281.data b/english/lts/security/2020/dla-2281.data
deleted file mode 100644
index 2d1c1801c96..00000000000
--- a/english/lts/security/2020/dla-2281.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2281-1 evolution-data-server</define-tag>
-<define-tag report_date>2020-07-16</define-tag>
-<define-tag secrefs>CVE-2020-14928</define-tag>
-<define-tag packages>evolution-data-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2281.wml b/english/lts/security/2020/dla-2281.wml
deleted file mode 100644
index f3884f7ef3e..00000000000
--- a/english/lts/security/2020/dla-2281.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Damian Poddebniak and Fabian Ising discovered a response injection
-vulnerability in Evolution data server, which could enable MITM
-attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.22.7-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your evolution-data-server packages.</p>
-
-<p>For the detailed security status of evolution-data-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/evolution-data-server">https://security-tracker.debian.org/tracker/evolution-data-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2281.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2282.data b/english/lts/security/2020/dla-2282.data
deleted file mode 100644
index 90e4a951887..00000000000
--- a/english/lts/security/2020/dla-2282.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2282-1 rails</define-tag>
-<define-tag report_date>2020-07-20</define-tag>
-<define-tag secrefs>CVE-2020-8163 CVE-2020-8164 CVE-2020-8165</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2282.wml b/english/lts/security/2020/dla-2282.wml
deleted file mode 100644
index 0276ce63107..00000000000
--- a/english/lts/security/2020/dla-2282.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in Ruby on Rails, a MVC ruby-based
-framework geared for web application development, which could lead to
-remote code execution and untrusted user input usage, depending on the
-application.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8163">CVE-2020-8163</a>
-
- <p>A code injection vulnerability in Rails would allow an attacker
- who controlled the `locals` argument of a `render` call to perform
- a RCE.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8164">CVE-2020-8164</a>
-
- <p>A deserialization of untrusted data vulnerability exists in rails
- which can allow an attacker to supply information can be
- inadvertently leaked from Strong Parameters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8165">CVE-2020-8165</a>
-
- <p>A deserialization of untrusted data vulnernerability exists in
- rails that can allow an attacker to unmarshal user-provided objects
- in MemCacheStore and RedisCacheStore potentially resulting in an
- RCE.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:4.2.7.1-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>For the detailed security status of rails please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rails">https://security-tracker.debian.org/tracker/rails</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2282.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2283.data b/english/lts/security/2020/dla-2283.data
deleted file mode 100644
index e10be9c9e48..00000000000
--- a/english/lts/security/2020/dla-2283.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2283-1 nginx</define-tag>
-<define-tag report_date>2020-07-20</define-tag>
-<define-tag secrefs>CVE-2020-11724 Bug#964950</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2283.wml b/english/lts/security/2020/dla-2283.wml
deleted file mode 100644
index d8a6fb515c8..00000000000
--- a/english/lts/security/2020/dla-2283.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An HTTP request smuggling issue was discovered in the ngx_lua plugin
-for nginx, a high-performance web and reverse proxy server, as
-demonstrated by the ngx.location.capture API.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.3-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your nginx packages.</p>
-
-<p>For the detailed security status of nginx please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nginx">https://security-tracker.debian.org/tracker/nginx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2283.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2284.data b/english/lts/security/2020/dla-2284.data
deleted file mode 100644
index 713f42685fa..00000000000
--- a/english/lts/security/2020/dla-2284.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2284-1 ksh</define-tag>
-<define-tag report_date>2020-07-21</define-tag>
-<define-tag secrefs>CVE-2019-14868</define-tag>
-<define-tag packages>ksh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2284.wml b/english/lts/security/2020/dla-2284.wml
deleted file mode 100644
index 270e31e420b..00000000000
--- a/english/lts/security/2020/dla-2284.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in the way it evaluates certain
-environment variables. An attacker could use this
-flaw to override or bypass environment restrictions
-to execute shell commands. Services and
-applications that allow remote unauthenticated
-attackers to provide one of those environment
-variables could allow them to exploit this issue
-remotely.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-93u+20120801-3.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ksh packages.</p>
-
-<p>For the detailed security status of ksh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ksh">https://security-tracker.debian.org/tracker/ksh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2284.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2285.data b/english/lts/security/2020/dla-2285.data
deleted file mode 100644
index 2a6138bac56..00000000000
--- a/english/lts/security/2020/dla-2285.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2285-1 librsvg</define-tag>
-<define-tag report_date>2020-07-22</define-tag>
-<define-tag secrefs>CVE-2017-11464 CVE-2019-20446</define-tag>
-<define-tag packages>librsvg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2285.wml b/english/lts/security/2020/dla-2285.wml
deleted file mode 100644
index 74adafdfedc..00000000000
--- a/english/lts/security/2020/dla-2285.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in librsvg, an SVG rendering
-library. This update corrects some denial of service issues via
-exponential element processing, stack exhaustion or application crash
-when processing specially crafted files, as well as some memory safety
-issues.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.40.21-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your librsvg packages.</p>
-
-<p>For the detailed security status of librsvg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/librsvg">https://security-tracker.debian.org/tracker/librsvg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2285.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2286.data b/english/lts/security/2020/dla-2286.data
deleted file mode 100644
index 844c7cac314..00000000000
--- a/english/lts/security/2020/dla-2286.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2286-1 tomcat8</define-tag>
-<define-tag report_date>2020-7-22</define-tag>
-<define-tag secrefs>CVE-2020-13934 CVE-2020-13935</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2286.wml b/english/lts/security/2020/dla-2286.wml
deleted file mode 100644
index 0596a7b1362..00000000000
--- a/english/lts/security/2020/dla-2286.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13934">CVE-2020-13934</a>
-
- <p>An h2c direct connection to Apache Tomcat did not release the
- HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient
- number of such requests were made, an OutOfMemoryException could
- occur leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13935">CVE-2020-13935</a>
-
- <p>The payload length in a WebSocket frame was not correctly validated
- in Apache Tomcat. Invalid payload lengths could trigger an infinite
- loop. Multiple requests with invalid payload lengths could lead to a
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8.5.54-0+deb9u3.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>For the detailed security status of tomcat8 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat8">https://security-tracker.debian.org/tracker/tomcat8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2286.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2287.data b/english/lts/security/2020/dla-2287.data
deleted file mode 100644
index c8d370f3ad5..00000000000
--- a/english/lts/security/2020/dla-2287.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2287-1 poppler</define-tag>
-<define-tag report_date>2020-07-23</define-tag>
-<define-tag secrefs>CVE-2017-18267 CVE-2018-16646 CVE-2018-20481 CVE-2018-21009 CVE-2019-9200 CVE-2019-9631 CVE-2019-10872 CVE-2019-12293 Bug#898357 Bug#909802 Bug#917325 Bug#923414 Bug#926530 Bug#926673 Bug#929423</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2287.wml b/english/lts/security/2020/dla-2287.wml
deleted file mode 100644
index e661ace1676..00000000000
--- a/english/lts/security/2020/dla-2287.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in Poppler, a PDF rendering library, that could
-lead to denial of service or possibly other unspecified impact when
-processing maliciously crafted documents.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.48.0-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>For the detailed security status of poppler please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/poppler">https://security-tracker.debian.org/tracker/poppler</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2287.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2288.data b/english/lts/security/2020/dla-2288.data
deleted file mode 100644
index b282252937e..00000000000
--- a/english/lts/security/2020/dla-2288.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2288-1 qemu</define-tag>
-<define-tag report_date>2020-07-26</define-tag>
-<define-tag secrefs>CVE-2017-9503 CVE-2019-12068 CVE-2019-20382 CVE-2020-1983 CVE-2020-8608 CVE-2020-10756 CVE-2020-13361 CVE-2020-13362 CVE-2020-13659 CVE-2020-13754 CVE-2020-13765 CVE-2020-15863 Bug#865754 Bug#961887 Bug#961888 Bug#964793</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2288.wml b/english/lts/security/2020/dla-2288.wml
deleted file mode 100644
index 546c6f88817..00000000000
--- a/english/lts/security/2020/dla-2288.wml
+++ /dev/null
@@ -1,104 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following CVE(s) were reported against src:qemu:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9503">CVE-2017-9503</a>
-
- <p>QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2
- Host Bus Adapter emulation support, allows local guest OS
- privileged users to cause a denial of service (NULL pointer
- dereference and QEMU process crash) via vectors involving megasas
- command processing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12068">CVE-2019-12068</a>
-
- <p>In QEMU 1:4.1-1 (1:2.8+dfsg-6+deb9u8), when executing script in
- lsi_execute_script(), the LSI scsi adapter emulator advances
- 's->dsp' index to read next opcode. This can lead to an infinite
- loop if the next opcode is empty. Move the existing loop exit
- after 10k iterations so that it covers no-op opcodes as well.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20382">CVE-2019-20382</a>
-
- <p>QEMU 4.1.0 has a memory leak in zrle_compress_data in
- ui/vnc-enc-zrle.c during a VNC disconnect operation because libz
- is misused, resulting in a situation where memory allocated in
- deflateInit2 is not freed in deflateEnd.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1983">CVE-2020-1983</a>
-
- <p>A use after free vulnerability in ip_reass() in ip_input.c of
- libslirp 4.2.0 and prior releases allows crafted packets to cause
- a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8608">CVE-2020-8608</a>
-
- <p>In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses
- snprintf return values, leading to a buffer overflow in later
- code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10756">CVE-2020-10756</a>
-
- <p>An out-of-bounds read vulnerability was found in the SLiRP
- networking implementation of the QEMU emulator. This flaw occurs
- in the icmp6_send_echoreply() routine while replying to an ICMP
- echo request, also known as ping. This flaw allows a malicious
- guest to leak the contents of the host memory, resulting in
- possible information disclosure. This flaw affects versions of
- libslirp before 4.3.1.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13361">CVE-2020-13361</a>
-
- <p>In QEMU 5.0.0 and earlier, es1370_transfer_audio in
- hw/audio/es1370.c does not properly validate the frame count,
- which allows guest OS users to trigger an out-of-bounds access
- during an es1370_write() operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13362">CVE-2020-13362</a>
-
- <p>In QEMU 5.0.0 and earlier, megasas_lookup_frame in
- hw/scsi/megasas.c has an out-of-bounds read via a crafted
- reply_queue_head field from a guest OS user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13659">CVE-2020-13659</a>
-
- <p>address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL
- pointer dereference related to BounceBuffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13754">CVE-2020-13754</a>
-
- <p>hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger
- an out-of-bounds access via a crafted address in an msi-x mmio
- operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13765">CVE-2020-13765</a>
-
- <p>rom_copy() in hw/core/loader.c in QEMU 4.1.0 does not validate
- the relationship between two addresses, which allows attackers
- to trigger an invalid memory copy operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15863">CVE-2020-15863</a>
-
- <p>Stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u10.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2288.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2289.data b/english/lts/security/2020/dla-2289.data
deleted file mode 100644
index 73fb646c556..00000000000
--- a/english/lts/security/2020/dla-2289.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2289-1 mupdf</define-tag>
-<define-tag report_date>2020-7-25</define-tag>
-<define-tag secrefs>CVE-2018-16647 CVE-2018-16648 CVE-2018-18662 CVE-2019-6130 CVE-2019-13290</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2289.wml b/english/lts/security/2020/dla-2289.wml
deleted file mode 100644
index 9b52372b94f..00000000000
--- a/english/lts/security/2020/dla-2289.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in mupdf, a lightweight PDF viewer.</p>
-
-<p>The issues could be exploited by crafted PDF files that result in denial
-of service by heap-based buffer overflows, segmentation faults or out of
-bound reads.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9a+ds1-4+deb9u5.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>For the detailed security status of mupdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mupdf">https://security-tracker.debian.org/tracker/mupdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2289.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2290.data b/english/lts/security/2020/dla-2290.data
deleted file mode 100644
index 6369a12f1ac..00000000000
--- a/english/lts/security/2020/dla-2290.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2290-1 e2fsprogs</define-tag>
-<define-tag report_date>2020-7-26</define-tag>
-<define-tag secrefs>CVE-2019-5188</define-tag>
-<define-tag packages>e2fsprogs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2290.wml b/english/lts/security/2020/dla-2290.wml
deleted file mode 100644
index 9a370e7bbec..00000000000
--- a/english/lts/security/2020/dla-2290.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in e2fsprogs, a package that contains
-ext2/ext3/ext4 file system utilities. A specially crafted ext4 directory
-can cause an out-of-bounds write on the stack, resulting in code
-execution. An attacker can corrupt a partition to trigger this
-vulnerability.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.43.4-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your e2fsprogs packages.</p>
-
-<p>For the detailed security status of e2fsprogs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/e2fsprogs">https://security-tracker.debian.org/tracker/e2fsprogs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2290.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2291.data b/english/lts/security/2020/dla-2291.data
deleted file mode 100644
index 285b482b5a7..00000000000
--- a/english/lts/security/2020/dla-2291.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2291-1 ffmpeg</define-tag>
-<define-tag report_date>2020-07-27</define-tag>
-<define-tag secrefs>CVE-2019-13390 CVE-2019-17542 CVE-2020-13904</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2291.wml b/english/lts/security/2020/dla-2291.wml
deleted file mode 100644
index c3f181f53e5..00000000000
--- a/english/lts/security/2020/dla-2291.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13390">CVE-2019-13390</a>
-
- <p>rawenc: Only accept the appropriate stream type for raw muxers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17542">CVE-2019-17542</a>
-
- <p>Heap-based buffer overflow in vqa_decode_chunk.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13904">CVE-2020-13904</a>
-
- <p>Use-after-free via a crafted EXTINF duration
- in an m3u8 file.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7:3.2.15-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2291.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2292.data b/english/lts/security/2020/dla-2292.data
deleted file mode 100644
index 05dd0f21481..00000000000
--- a/english/lts/security/2020/dla-2292.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2292-1 milkytracker</define-tag>
-<define-tag report_date>2020-07-27</define-tag>
-<define-tag secrefs>CVE-2019-14464 CVE-2019-14496 CVE-2019-14497 CVE-2020-15569</define-tag>
-<define-tag packages>milkytracker</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2292.wml b/english/lts/security/2020/dla-2292.wml
deleted file mode 100644
index bfdca602227..00000000000
--- a/english/lts/security/2020/dla-2292.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14464">CVE-2019-14464</a>
-
- <p>Heap-based buffer overflow in XMFile::read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14496">CVE-2019-14496</a>
-
- <p>Stack-based buffer overflow in LoaderXM::load</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14497">CVE-2019-14497</a>
-
- <p>Heap-based buffer overflow in
- ModuleEditor::convertInstrument</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15569">CVE-2020-15569</a>
-
- <p>Use-after-free in the PlayerGeneric destructor</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.90.86+dfsg-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your milkytracker packages.</p>
-
-<p>For the detailed security status of milkytracker please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/milkytracker">https://security-tracker.debian.org/tracker/milkytracker</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2292.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2293.data b/english/lts/security/2020/dla-2293.data
deleted file mode 100644
index c21f7798839..00000000000
--- a/english/lts/security/2020/dla-2293.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2293-1 mercurial</define-tag>
-<define-tag report_date>2020-07-27</define-tag>
-<define-tag secrefs>CVE-2017-17458 CVE-2018-13346 CVE-2018-13347 CVE-2018-13348 CVE-2018-1000132 CVE-2019-3902 Bug#901050 Bug#892964 Bug#927674</define-tag>
-<define-tag packages>mercurial</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2293.wml b/english/lts/security/2020/dla-2293.wml
deleted file mode 100644
index 6c4a3a80f5f..00000000000
--- a/english/lts/security/2020/dla-2293.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in mercurial, an easy-to-use,
-scalable distributed version control system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17458">CVE-2017-17458</a>
-
- <p>In Mercurial before 4.4.1, it is possible that a specially
- malformed repository can cause Git subrepositories to run
- arbitrary code in the form of a .git/hooks/post-update script
- checked into the repository. Typical use of Mercurial prevents
- construction of such repositories, but they can be created
- programmatically.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13346">CVE-2018-13346</a>
-
- <p>The mpatch_apply function in mpatch.c in Mercurial before 4.6.1
- incorrectly proceeds in cases where the fragment start is past the
- end of the original data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13347">CVE-2018-13347</a>
-
- <p>mpatch.c in Mercurial before 4.6.1 mishandles integer addition and
- subtraction.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13348">CVE-2018-13348</a>
-
- <p>The mpatch_decode function in mpatch.c in Mercurial before 4.6.1
- mishandles certain situations where there should be at least 12
- bytes remaining after the current position in the patch data, but
- actually are not.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000132">CVE-2018-1000132</a>
-
- <p>Mercurial version 4.5 and earlier contains a Incorrect Access
- Control (CWE-285) vulnerability in Protocol server that can result
- in Unauthorized data access. This attack appear to be exploitable
- via network connectivity. This vulnerability appears to have been
- fixed in 4.5.1.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3902">CVE-2019-3902</a>
-
- <p>Symbolic links and subrepositories could be used defeat Mercurial's
- path-checking logic and write files outside the repository root.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your mercurial packages.</p>
-
-<p>For the detailed security status of mercurial please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mercurial">https://security-tracker.debian.org/tracker/mercurial</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2293.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2294.data b/english/lts/security/2020/dla-2294.data
deleted file mode 100644
index c6b586ba484..00000000000
--- a/english/lts/security/2020/dla-2294.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2294-1 salt</define-tag>
-<define-tag report_date>2020-7-28</define-tag>
-<define-tag secrefs>CVE-2018-15750 CVE-2018-15751</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2294.wml b/english/lts/security/2020/dla-2294.wml
deleted file mode 100644
index f681480e3d4..00000000000
--- a/english/lts/security/2020/dla-2294.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in salt, a remote manager to administer
-servers.</p>
-
-<p>These issues are related to remote hackers bypassing authentication to
-execute arbitrary commands and getting informations about files on the
-server</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2016.11.2+ds-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>For the detailed security status of salt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2294.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2295.data b/english/lts/security/2020/dla-2295.data
deleted file mode 100644
index 57864ee1303..00000000000
--- a/english/lts/security/2020/dla-2295.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2295-1 curl</define-tag>
-<define-tag report_date>2020-7-28</define-tag>
-<define-tag secrefs>CVE-2020-8177</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2295.wml b/english/lts/security/2020/dla-2295.wml
deleted file mode 100644
index f3144e80432..00000000000
--- a/english/lts/security/2020/dla-2295.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerbailty was found in curl, a command line tool for transferring
-data with URL syntax.</p>
-
-<p>When using when using -J (--remote-header-name) and -i (--include) in
-the same command line, a malicious server could force curl to overwrite
-the contents of local files with incoming HTTP headers.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.52.1-5+deb9u11.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2295.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2296.data b/english/lts/security/2020/dla-2296.data
deleted file mode 100644
index 4349647ea09..00000000000
--- a/english/lts/security/2020/dla-2296.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2296-1 luajit</define-tag>
-<define-tag report_date>2020-7-28</define-tag>
-<define-tag secrefs>CVE-2020-15890</define-tag>
-<define-tag packages>luajit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2296.wml b/english/lts/security/2020/dla-2296.wml
deleted file mode 100644
index 6121e796df4..00000000000
--- a/english/lts/security/2020/dla-2296.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in luajit, a just in time compiler for Lua.</p>
-
-<p>An out-of-bounds read could happen because __gc handler frame traversal is
-mishandled.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.0.4+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your luajit packages.</p>
-
-<p>For the detailed security status of luajit please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/luajit">https://security-tracker.debian.org/tracker/luajit</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2296.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2297.data b/english/lts/security/2020/dla-2297.data
deleted file mode 100644
index bdca06f11d2..00000000000
--- a/english/lts/security/2020/dla-2297.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2297-1 firefox-esr</define-tag>
-<define-tag report_date>2020-07-29</define-tag>
-<define-tag secrefs>CVE-2020-6463 CVE-2020-6514 CVE-2020-15652 CVE-2020-15659</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2297.wml b/english/lts/security/2020/dla-2297.wml
deleted file mode 100644
index b8be54ecccd..00000000000
--- a/english/lts/security/2020/dla-2297.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-68.11.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2297.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2298.data b/english/lts/security/2020/dla-2298.data
deleted file mode 100644
index 51646a3d597..00000000000
--- a/english/lts/security/2020/dla-2298.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2298-1 libapache2-mod-auth-openidc</define-tag>
-<define-tag report_date>2020-7-29</define-tag>
-<define-tag secrefs>CVE-2019-14857 CVE-2019-20479 CVE-2019-1010247</define-tag>
-<define-tag packages>libapache2-mod-auth-openidc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2298.wml b/english/lts/security/2020/dla-2298.wml
deleted file mode 100644
index a757e1f7a21..00000000000
--- a/english/lts/security/2020/dla-2298.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in libapache2-mod-auth-openidc, the OpenID
-Connect authentication module for the Apache HTTP server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14857">CVE-2019-14857</a>
-
- <p>Insufficient validation of URLs leads to an Open Redirect
- vulnerability. An attacker may trick a victim into providing
- credentials for an OpenID provider by forwarding the request to an
- illegitimate website.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20479">CVE-2019-20479</a>
-
- <p>Due to insufficient validatation of URLs an Open Redirect
- vulnerability for URLs beginning with a slash and backslash could be
- abused.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010247">CVE-2019-1010247</a>
-
- <p>The OIDCRedirectURI page contains generated JavaScript code that uses
- a poll parameter as a string variable, thus might contain additional
- JavaScript code. This might result in Criss-Site Scripting (XSS).</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.6-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-openidc packages.</p>
-
-<p>For the detailed security status of libapache2-mod-auth-openidc please
-refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc">https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2298.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2299.data b/english/lts/security/2020/dla-2299.data
deleted file mode 100644
index 116131480fb..00000000000
--- a/english/lts/security/2020/dla-2299.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2299-1 net-snmp</define-tag>
-<define-tag report_date>2020-07-30</define-tag>
-<define-tag secrefs></define-tag>
-<define-tag packages>net-snmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2299.wml b/english/lts/security/2020/dla-2299.wml
deleted file mode 100644
index 785d8eca554..00000000000
--- a/english/lts/security/2020/dla-2299.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A privilege escalation vulnerability vulnerability was discovered in
-<a href="http://net-snmp.sourceforge.net/">Net-SNMP</a>, a set of tools for
-collecting and organising information about devices on computer networks.</p>
-
-<p>Upstream notes that:</p>
-
-<ul>
-<li>It is still possible to enable this MIB via the <tt>--with-mib-modules</tt>
-configure option.</li>
-
-<li>Another MIB that provides similar functionality, namely
-<tt>ucd-snmp/extensible</tt>, is disabled by default.</li>
-
-<li>The security risk of <tt>ucd-snmp/pass</tt> and
-<tt>ucd-snmp/pass_persist</tt> is lower since these modules only introduce a
-security risk if the invoked scripts are exploitable.</li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-5.7.3+dfsg-1.7+deb9u2.</p>
-
-<p>We recommend that you upgrade your net-snmp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2299.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2300.data b/english/lts/security/2020/dla-2300.data
deleted file mode 100644
index c4a12a453fb..00000000000
--- a/english/lts/security/2020/dla-2300.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2300-1 kdepim-runtime</define-tag>
-<define-tag report_date>2020-07-30</define-tag>
-<define-tag secrefs>CVE-2020-15954</define-tag>
-<define-tag packages>kdepim-runtime</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2300.wml b/english/lts/security/2020/dla-2300.wml
deleted file mode 100644
index 8f35a7af42e..00000000000
--- a/english/lts/security/2020/dla-2300.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue where kdepim-runtime would default
-to using unencrypted POP3 communication despite the UI indicating that
-encryption was in use.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15954">CVE-2020-15954</a>
-
- <p>KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communication
- during times when the UI indicates that encryption is in use.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4:16.04.2-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your kdepim-runtime packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2300.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2301.data b/english/lts/security/2020/dla-2301.data
deleted file mode 100644
index 4001ff3b15a..00000000000
--- a/english/lts/security/2020/dla-2301.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2301-1 json-c</define-tag>
-<define-tag report_date>2020-07-30</define-tag>
-<define-tag secrefs>CVE-2020-12762 Bug#960326</define-tag>
-<define-tag packages>json-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2301.wml b/english/lts/security/2020/dla-2301.wml
deleted file mode 100644
index 11260aa9f6d..00000000000
--- a/english/lts/security/2020/dla-2301.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tobias Stoeckmann found an integer overflow issue in JSON-C, a C
-library to manipulate JSON objects, when reading maliciously crafted
-large files. The issue could be exploited to cause denial of service
-or possibly execute arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.12.1-1.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your json-c packages.</p>
-
-<p>For the detailed security status of json-c please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/json-c">https://security-tracker.debian.org/tracker/json-c</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2301.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2302.data b/english/lts/security/2020/dla-2302.data
deleted file mode 100644
index e7d1fa5d445..00000000000
--- a/english/lts/security/2020/dla-2302.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2302-1 libjpeg-turbo</define-tag>
-<define-tag report_date>2020-07-31</define-tag>
-<define-tag secrefs>CVE-2018-1152 CVE-2018-14498 CVE-2020-13790 CVE-2020-14152</define-tag>
-<define-tag packages>libjpeg-turbo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2302.wml b/english/lts/security/2020/dla-2302.wml
deleted file mode 100644
index 28cf9fbd926..00000000000
--- a/english/lts/security/2020/dla-2302.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1152">CVE-2018-1152</a>
-
- <p>Denial of service vulnerability caused by a
- divide by zero when processing a crafted BMP image in TJBench.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14498">CVE-2018-14498</a>
-
- <p>Denial of service (heap-based buffer over-read and application
- crash) via a crafted 8-bit BMP in which one or more of the color
- indices is out of range for the number of palette entries.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13790">CVE-2020-13790</a>
-
- <p>Heap-based buffer over-read via a malformed PPM input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14152">CVE-2020-14152</a>
-
- <p>jpeg_mem_available() did not honor the max_memory_to_use setting,
- possibly causing excessive memory consumption.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.5.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libjpeg-turbo packages.</p>
-
-<p>For the detailed security status of libjpeg-turbo please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libjpeg-turbo">https://security-tracker.debian.org/tracker/libjpeg-turbo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2302.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2303.data b/english/lts/security/2020/dla-2303.data
deleted file mode 100644
index 8ae7f744370..00000000000
--- a/english/lts/security/2020/dla-2303.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2303-1 libssh</define-tag>
-<define-tag report_date>2020-8-1</define-tag>
-<define-tag secrefs>CVE-2020-16135</define-tag>
-<define-tag packages>libssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2303.wml b/english/lts/security/2020/dla-2303.wml
deleted file mode 100644
index 464e442347a..00000000000
--- a/english/lts/security/2020/dla-2303.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The code in src/sftpserver.c did not verify the validity of certain
-pointers and expected them to be valid. A NULL pointer dereference could
-have been occurred that typically causes a crash and thus a
-denial-of-service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.7.3-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your libssh packages.</p>
-
-<p>For the detailed security status of libssh please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libssh">https://security-tracker.debian.org/tracker/libssh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2303.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2304.data b/english/lts/security/2020/dla-2304.data
deleted file mode 100644
index f32a3177769..00000000000
--- a/english/lts/security/2020/dla-2304.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2304-1 libpam-radius-auth</define-tag>
-<define-tag report_date>2020-08-01</define-tag>
-<define-tag secrefs>CVE-2015-9542 Bug#951396</define-tag>
-<define-tag packages>libpam-radius-auth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2304.wml b/english/lts/security/2020/dla-2304.wml
deleted file mode 100644
index 15b85313923..00000000000
--- a/english/lts/security/2020/dla-2304.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>`add_password` in pam_radius_auth.c in pam_radius 1.4.0 does not
-correctly check the length of the input password, and is vulnerable
-to a stack-based buffer overflow during memcpy(). An attacker could
-send a crafted password to an application (loading the pam_radius
-library) and crash it. Arbitrary code execution might be possible,
-depending on the application, C library, compiler, and other factors.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.16-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your libpam-radius-auth packages.</p>
-
-<p>For the detailed security status of libpam-radius-auth please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libpam-radius-auth">https://security-tracker.debian.org/tracker/libpam-radius-auth</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2304.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2305.data b/english/lts/security/2020/dla-2305.data
deleted file mode 100644
index 88ccae5d4c5..00000000000
--- a/english/lts/security/2020/dla-2305.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2305-1 transmission</define-tag>
-<define-tag report_date>2020-08-01</define-tag>
-<define-tag secrefs>CVE-2018-10756 Bug#961461</define-tag>
-<define-tag packages>transmission</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2305.wml b/english/lts/security/2020/dla-2305.wml
deleted file mode 100644
index f5659f2268f..00000000000
--- a/english/lts/security/2020/dla-2305.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Use-after-free in libtransmission/variant.c in Transmission before
-3.00 allows remote attackers to cause a denial of service (crash)
-or possibly execute arbitrary code via a crafted torrent file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.92-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your transmission packages.</p>
-
-<p>For the detailed security status of transmission please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/transmission">https://security-tracker.debian.org/tracker/transmission</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2305.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2306.data b/english/lts/security/2020/dla-2306.data
deleted file mode 100644
index 62a59cc683d..00000000000
--- a/english/lts/security/2020/dla-2306.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2306-1 libphp-phpmailer</define-tag>
-<define-tag report_date>2020-08-08</define-tag>
-<define-tag secrefs>CVE-2020-13625</define-tag>
-<define-tag packages>libphp-phpmailer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2306.wml b/english/lts/security/2020/dla-2306.wml
deleted file mode 100644
index 46a4e974c22..00000000000
--- a/english/lts/security/2020/dla-2306.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an escaping issue in
-libphp-phpmailer, an email generation utility class for the PHP
-programming language.</p>
-
-<p>The `Content-Type` and `Content-Disposition` headers could have
-permitted file attachments that bypassed attachment filters which
-match on filename extensions.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.2.14+dfsg-2.3+deb9u2.</p>
-
-<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
-
-<p>For the detailed security status of libphp-phpmailer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libphp-phpmailer">https://security-tracker.debian.org/tracker/libphp-phpmailer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2306.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2307.data b/english/lts/security/2020/dla-2307.data
deleted file mode 100644
index 4b69dd7e94d..00000000000
--- a/english/lts/security/2020/dla-2307.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2307-1 ruby-zip</define-tag>
-<define-tag report_date>2020-08-02</define-tag>
-<define-tag secrefs>CVE-2018-1000544 Bug#902720</define-tag>
-<define-tag packages>ruby-zip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2307.wml b/english/lts/security/2020/dla-2307.wml
deleted file mode 100644
index 82d6021dc3a..00000000000
--- a/english/lts/security/2020/dla-2307.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>rubyzip gem version 1.2.1 and earlier contains a Directory Traversal
-vulnerability in Zip::File component that can result in write
-arbitrary files to the filesystem.</p>
-
-<p>This attack appear to be exploitable via if a site allows
-uploading of .zip files, an attacker can upload a malicious file
-that contains symlinks or files with absolute pathnames "../"
-to write arbitrary files to the filesystem..</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.0-1.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-zip packages.</p>
-
-<p>For the detailed security status of ruby-zip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-zip">https://security-tracker.debian.org/tracker/ruby-zip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2307.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2308.data b/english/lts/security/2020/dla-2308.data
deleted file mode 100644
index 841635e3cf3..00000000000
--- a/english/lts/security/2020/dla-2308.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2308-1 libopenmpt</define-tag>
-<define-tag report_date>2020-08-02</define-tag>
-<define-tag secrefs>CVE-2019-17113</define-tag>
-<define-tag packages>libopenmpt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2308.wml b/english/lts/security/2020/dla-2308.wml
deleted file mode 100644
index f5755161ee9..00000000000
--- a/english/lts/security/2020/dla-2308.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>In libopenmpt before 0.3.19 and 0.4.x before 0.4.9,
-ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c
-do not restrict the lengths of libmodplug output-buffer strings in
-the C API, leading to a buffer overflow.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.2.7386~beta20.3-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your libopenmpt packages.</p>
-
-<p>For the detailed security status of libopenmpt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libopenmpt">https://security-tracker.debian.org/tracker/libopenmpt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2308.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2309.data b/english/lts/security/2020/dla-2309.data
deleted file mode 100644
index 32f509a33e7..00000000000
--- a/english/lts/security/2020/dla-2309.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2309-1 evolution-data-server</define-tag>
-<define-tag report_date>2020-08-02</define-tag>
-<define-tag secrefs>CVE-2020-16117</define-tag>
-<define-tag packages>evolution-data-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2309.wml b/english/lts/security/2020/dla-2309.wml
deleted file mode 100644
index cd8a8c4d4c9..00000000000
--- a/english/lts/security/2020/dla-2309.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered that allowed
-a malicious server to crash the mail client.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.22.7-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your evolution-data-server packages.</p>
-
-<p>For the detailed security status of evolution-data-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/evolution-data-server">https://security-tracker.debian.org/tracker/evolution-data-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2309.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2310.data b/english/lts/security/2020/dla-2310.data
deleted file mode 100644
index 03913726424..00000000000
--- a/english/lts/security/2020/dla-2310.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2310-1 thunderbird</define-tag>
-<define-tag report_date>2020-08-03</define-tag>
-<define-tag secrefs>CVE-2020-6463 CVE-2020-6514 CVE-2020-15652 CVE-2020-15659</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2310.wml b/english/lts/security/2020/dla-2310.wml
deleted file mode 100644
index 329e049509f..00000000000
--- a/english/lts/security/2020/dla-2310.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-result in denial of service or potentially the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:68.11.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2310.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2311.data b/english/lts/security/2020/dla-2311.data
deleted file mode 100644
index d9ff9d90c94..00000000000
--- a/english/lts/security/2020/dla-2311.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2311-1 zabbix</define-tag>
-<define-tag report_date>2020-08-03</define-tag>
-<define-tag secrefs>CVE-2020-15803</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2311.wml b/english/lts/security/2020/dla-2311.wml
deleted file mode 100644
index 314f549b9f3..00000000000
--- a/english/lts/security/2020/dla-2311.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential cross-site scripting
-vulnerability via <tt>iframe</tt> HTML elements in
-<a href="https://www.zabbix.com/">Zabbix</a>, a PHP-based monitoring
-system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15803">CVE-2020-15803</a>
-
- <p>Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:3.0.7+dfsg-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2311.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2312.data b/english/lts/security/2020/dla-2312.data
deleted file mode 100644
index 2054a52474c..00000000000
--- a/english/lts/security/2020/dla-2312.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2312-1 libx11</define-tag>
-<define-tag report_date>2020-08-04</define-tag>
-<define-tag secrefs>CVE-2020-14344</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2312.wml b/english/lts/security/2020/dla-2312.wml
deleted file mode 100644
index 6616a68eb07..00000000000
--- a/english/lts/security/2020/dla-2312.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Todd Carson discovered some integer overflows in libX11, which could
-lead to heap corruption when processing crafted messages from an input
-method.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:1.6.4-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>For the detailed security status of libx11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libx11">https://security-tracker.debian.org/tracker/libx11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2312.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2313.data b/english/lts/security/2020/dla-2313.data
deleted file mode 100644
index 6acc30b5bc3..00000000000
--- a/english/lts/security/2020/dla-2313.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2313-1 net-snmp</define-tag>
-<define-tag report_date>2020-08-04</define-tag>
-<define-tag secrefs>CVE-2020-15861 CVE-2020-15862</define-tag>
-<define-tag packages>net-snmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2313.wml b/english/lts/security/2020/dla-2313.wml
deleted file mode 100644
index 402d70f5a46..00000000000
--- a/english/lts/security/2020/dla-2313.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A privilege escalation vulnerability was discovered in <a
-href="http://www.net-snmp.org/">Net-SNMP</a>, a set of tools for collecting and
-organising information about devices on computer networks, due to incorrect
-symlink handling (<tt>CVE-2020-15861</tt>).</p>
-
-<p>This security update also applies an upstream fix to their previous handling
-of <tt>CVE-2020-15862</tt> as part of <tt>DLA-2299-1</tt>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15861">CVE-2020-15861</a>
-
- <p>Elevation of Privileges due to symlink handling</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15862">CVE-2020-15862</a>
-
- <p>privilege escalation</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-5.7.3+dfsg-1.7+deb9u3.</p>
-
-<p>We recommend that you upgrade your net-snmp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2313.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2314.data b/english/lts/security/2020/dla-2314.data
deleted file mode 100644
index c9dc91658cd..00000000000
--- a/english/lts/security/2020/dla-2314.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2314-1 clamav</define-tag>
-<define-tag report_date>2020-08-06</define-tag>
-<define-tag secrefs>CVE-2020-3327 CVE-2020-3350 CVE-2020-3481</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2314.wml b/english/lts/security/2020/dla-2314.wml
deleted file mode 100644
index 2cbfa581de4..00000000000
--- a/english/lts/security/2020/dla-2314.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the ClamAV antivirus toolkit:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3327">CVE-2020-3327</a>
-
- <p>An out of bounds read in the ARJ archive-parsing module could cause
- denial of service. The fix in 0.102.3 was incomplete.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3350">CVE-2020-3350</a>
-
- <p>A malicious user could trick clamscan, clamdscan or clamonacc into
- moving or removing a different file than intended when those are
- used with one of the --move or --remove options. This could be used
- to get rid of special system files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3481">CVE-2020-3481</a>
-
- <p>The EGG archive module was vulnerable to denial of service via NULL
- pointer dereference due to improper error handling. The official
- signature database avoided this problem because the signatures there
- avoided the use of the EGG archive parser.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.102.4+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2314.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2315.data b/english/lts/security/2020/dla-2315.data
deleted file mode 100644
index 00aa0fd7113..00000000000
--- a/english/lts/security/2020/dla-2315.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2315-1 gupnp</define-tag>
-<define-tag report_date>2020-08-06</define-tag>
-<define-tag secrefs>CVE-2020-12695</define-tag>
-<define-tag packages>gupnp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2315.wml b/english/lts/security/2020/dla-2315.wml
deleted file mode 100644
index 16e6177d0a0..00000000000
--- a/english/lts/security/2020/dla-2315.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Yunus Çadırcı found an issue in the SUBSCRIBE method of UPnP, a
-network protocol for devices to automatically discover and communicate
-with each other. Insufficient checks on this method allowed attackers
-to use vulnerable UPnP services for DoS attacks or possibly to bypass
-firewalls.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gupnp packages.</p>
-
-<p>For the detailed security status of gupnp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gupnp">https://security-tracker.debian.org/tracker/gupnp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2315.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2316.data b/english/lts/security/2020/dla-2316.data
deleted file mode 100644
index c0eff70fdfe..00000000000
--- a/english/lts/security/2020/dla-2316.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2316-1 ruby-kramdown</define-tag>
-<define-tag report_date>2020-08-09</define-tag>
-<define-tag secrefs>CVE-2020-14001</define-tag>
-<define-tag packages>ruby-kramdown</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2316.wml b/english/lts/security/2020/dla-2316.wml
deleted file mode 100644
index 96370d5c8f2..00000000000
--- a/english/lts/security/2020/dla-2316.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA text goes here</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.12.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-kramdown packages.</p>
-
-<p>For the detailed security status of ruby-kramdown please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-kramdown">https://security-tracker.debian.org/tracker/ruby-kramdown</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2316.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2317.data b/english/lts/security/2020/dla-2317.data
deleted file mode 100644
index 8ebe3d09c9e..00000000000
--- a/english/lts/security/2020/dla-2317.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2317-1 pillow</define-tag>
-<define-tag report_date>2020-08-08</define-tag>
-<define-tag secrefs>CVE-2020-10177</define-tag>
-<define-tag packages>pillow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2317.wml b/english/lts/security/2020/dla-2317.wml
deleted file mode 100644
index 74cc6b46caa..00000000000
--- a/english/lts/security/2020/dla-2317.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was noticed that in Pillow before 7.1.0, there are multiple
-out-of-bounds reads in libImaging/FliDecode.c.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.0.0-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your pillow packages.</p>
-
-<p>For the detailed security status of pillow please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pillow">https://security-tracker.debian.org/tracker/pillow</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2317.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2318.data b/english/lts/security/2020/dla-2318.data
deleted file mode 100644
index b9de76df0b3..00000000000
--- a/english/lts/security/2020/dla-2318.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2318-1 wpa</define-tag>
-<define-tag report_date>2020-08-09</define-tag>
-<define-tag secrefs>CVE-2019-10064 CVE-2020-12695</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2318.wml b/english/lts/security/2020/dla-2318.wml
deleted file mode 100644
index 40257a75770..00000000000
--- a/english/lts/security/2020/dla-2318.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following CVE(s) have been reported against src:wpa.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10064">CVE-2019-10064</a>
-
- <p>hostapd before 2.6, in EAP mode, makes calls to the rand()
- and random() standard library functions without any preceding
- srand() or srandom() call, which results in inappropriate
- use of deterministic values. This was fixed in conjunction
- with <a href="https://security-tracker.debian.org/tracker/CVE-2016-10743">CVE-2016-10743</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12695">CVE-2020-12695</a>
-
- <p>The Open Connectivity Foundation UPnP specification before
- 2020-04-17 does not forbid the acceptance of a subscription
- request with a delivery URL on a different network segment
- than the fully qualified event-subscription URL, aka the
- CallStranger issue.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:2.4-1+deb9u7.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>For the detailed security status of wpa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wpa">https://security-tracker.debian.org/tracker/wpa</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2318.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2319.data b/english/lts/security/2020/dla-2319.data
deleted file mode 100644
index 4c8a183625f..00000000000
--- a/english/lts/security/2020/dla-2319.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2319-1 xrdp</define-tag>
-<define-tag report_date>2020-08-09</define-tag>
-<define-tag secrefs>CVE-2020-4044 Bug#964573</define-tag>
-<define-tag packages>xrdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2319.wml b/english/lts/security/2020/dla-2319.wml
deleted file mode 100644
index ca70fa96b49..00000000000
--- a/english/lts/security/2020/dla-2319.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>xrdp-sesman service in xrdp can be crashed by connecting over port 3350 and
-supplying a malicious payload. Once the xrdp-sesman process is dead, an
-unprivileged attacker on the server could then proceed to start their own
-imposter sesman service listening on port 3350. This will allow them to capture
-any user credentials that are submitted to XRDP and approve or reject arbitrary
-login credentials. For xorgxrdp sessions in particular, this allows an
-unauthorized user to hijack an existing session. This is a buffer overflow
-attack, so there may be a risk of arbitrary code execution as well.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.1-9+deb9u4.</p>
-
-<p>We recommend that you upgrade your xrdp packages.</p>
-
-<p>For the detailed security status of xrdp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xrdp">https://security-tracker.debian.org/tracker/xrdp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2319.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2320.data b/english/lts/security/2020/dla-2320.data
deleted file mode 100644
index b33f937e634..00000000000
--- a/english/lts/security/2020/dla-2320.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2320-1 golang-github-seccomp-libseccomp-golang</define-tag>
-<define-tag report_date>2020-08-10</define-tag>
-<define-tag secrefs>CVE-2017-18367</define-tag>
-<define-tag packages>golang-github-seccomp-libseccomp-golang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2320.wml b/english/lts/security/2020/dla-2320.wml
deleted file mode 100644
index eaeb272e824..00000000000
--- a/english/lts/security/2020/dla-2320.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. runc has been rebuilt with the fixed package.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.0~git20150813.0.1b506fc-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your golang-github-seccomp-libseccomp-golang and runc packages, and recompile own Go code using golang-github-seccomp-libseccomp-golang.</p>
-
-<p>For the detailed security status of golang-github-seccomp-libseccomp-golang please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-github-seccomp-libseccomp-golang">https://security-tracker.debian.org/tracker/golang-github-seccomp-libseccomp-golang</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2320.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2321.data b/english/lts/security/2020/dla-2321.data
deleted file mode 100644
index 9de5ff2cd77..00000000000
--- a/english/lts/security/2020/dla-2321.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2321-1 firmware-nonfree</define-tag>
-<define-tag report_date>2020-08-11</define-tag>
-<define-tag packages>firmware-nonfree</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>no</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2321.wml b/english/lts/security/2020/dla-2321.wml
deleted file mode 100644
index ccaab75ae3b..00000000000
--- a/english/lts/security/2020/dla-2321.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS new upstream version</define-tag>
-<define-tag moreinfo>
-<p>The firmware-nonfree package has been updated to include additional
-firmware that may be requested by some drivers in Linux 4.19.</p>
-
-<p>Along with additional kernel packages that will be announced later,
-this will provide a supported upgrade path for systems that currently
-use kernel and firmware packages from the "stretch-backports" suite.</p>
-
-<p>This update is not known to fix any security issues.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2321.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2322.data b/english/lts/security/2020/dla-2322.data
deleted file mode 100644
index c7b6b7c6f83..00000000000
--- a/english/lts/security/2020/dla-2322.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2322-1 roundcube</define-tag>
-<define-tag report_date>2020-08-11</define-tag>
-<define-tag secrefs>CVE-2020-16145 Bug#968216</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2322.wml b/english/lts/security/2020/dla-2322.wml
deleted file mode 100644
index 9529757e59f..00000000000
--- a/english/lts/security/2020/dla-2322.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in roundcube, a skinnable AJAX based
-webmail solution for IMAP servers. HTML messages with malicious svg or
-math content can exploit a Cross-site scripting (XSS) vulnerability.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.3+dfsg.1-4+deb9u7.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2322.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2323.data b/english/lts/security/2020/dla-2323.data
deleted file mode 100644
index 6da3e564bd9..00000000000
--- a/english/lts/security/2020/dla-2323.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2323-1 linux-4.19</define-tag>
-<define-tag report_date>2020-08-12</define-tag>
-<define-tag secrefs>CVE-2019-18814 CVE-2019-18885 CVE-2019-20810 CVE-2020-10766 CVE-2020-10767 CVE-2020-10768 CVE-2020-12655 CVE-2020-12771 CVE-2020-13974 CVE-2020-15393 Bug#958300 Bug#960493 Bug#962254 Bug#963493 Bug#964153 Bug#964480 Bug#965365</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2323.wml b/english/lts/security/2020/dla-2323.wml
deleted file mode 100644
index 3d1ac895b92..00000000000
--- a/english/lts/security/2020/dla-2323.wml
+++ /dev/null
@@ -1,112 +0,0 @@
-<define-tag description>LTS new package</define-tag>
-<define-tag moreinfo>
-<p>Linux 4.19 has been packaged for Debian 9 as linux-4.19. This
-provides a supported upgrade path for systems that currently use
-kernel packages from the "stretch-backports" suite.</p>
-
-<p>There is no need to upgrade systems using Linux 4.9, as that kernel
-version will also continue to be supported in the LTS period.</p>
-
-<p>This backport does not include the following binary packages:</p>
-
-<blockquote><div>hyperv-daemons libbpf-dev libbpf4.19 libcpupower-dev libcpupower1
-liblockdep-dev liblockdep4.19 linux-compiler-gcc-6-arm
-linux-compiler-gcc-6-x86 linux-cpupower linux-libc-dev lockdep
-usbip</div></blockquote>
-
-<p>Older versions of most of those are built from the linux source
-package in Debian 9.</p>
-
-<p>The kernel images and modules will not be signed for use on systems
-with Secure Boot enabled, as there is no support for this in Debian 9.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a denial of service or information leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18814">CVE-2019-18814</a>
-
- <p>Navid Emamdoost reported a potential use-after-free in the
- AppArmor security module, in the case that audit rule
- initialisation fails. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18885">CVE-2019-18885</a>
-
- <p>The <q>bobfuzzer</q> team discovered that crafted Btrfs volumes could
- trigger a crash (oops). An attacker able to mount such a volume
- could use this to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20810">CVE-2019-20810</a>
-
- <p>A potential memory leak was discovered in the go7007 media driver.
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10766">CVE-2020-10766</a>
-
- <p>Anthony Steinhauser reported a flaw in the mitigation for
- Speculative Store Bypass (<a href="https://security-tracker.debian.org/tracker/CVE-2018-3639">CVE-2018-3639</a>) on x86 CPUs. A local
- user could use this to temporarily disable SSB mitigation in other
- users' tasks. If those other tasks run sandboxed code, this would
- allow that code to read sensitive information in the same process
- but outside the sandbox.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10767">CVE-2020-10767</a>
-
- <p>Anthony Steinhauser reported a flaw in the mitigation for Spectre
- variant 2 (<a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>) on x86 CPUs. Depending on which other
- mitigations the CPU supports, the kernel might not use IBPB to
- mitigate Spectre variant 2 in user-space. A local user could use
- this to read sensitive information from other users' processes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10768">CVE-2020-10768</a>
-
- <p>Anthony Steinhauser reported a flaw in the mitigation for Spectre
- variant 2 (<a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>) on x86 CPUs. After a task force disabled indirect branch speculation through prctl(), it could
- still re-enable it later, so it was not possible to override a
- program that explicitly enabled it.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12655">CVE-2020-12655</a>
-
- <p>Zheng Bin reported that crafted XFS volumes could trigger a system
- hang. An attacker able to mount such a volume could use this to
- cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12771">CVE-2020-12771</a>
-
- <p>Zhiqiang Liu reported a bug in the bcache block driver that could
- lead to a system hang. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13974">CVE-2020-13974</a>
-
- <p>Kyungtae Kim reported a potential integer overflow in the vt
- (virtual terminal) driver. The security impact of this is
- unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15393">CVE-2020-15393</a>
-
- <p>Kyungtae Kim reported a memory leak in the usbtest driver. The
- security impact of this is unclear.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4.19.132-1~deb9u1. This update additionally fixes Debian bugs
-<a href="https://bugs.debian.org/958300">#958300</a>, <a href="https://bugs.debian.org/960493">#960493</a>, <a href="https://bugs.debian.org/962254">#962254</a>, <a href="https://bugs.debian.org/963493">#963493</a>, <a href="https://bugs.debian.org/964153">#964153</a>, <a href="https://bugs.debian.org/964480">#964480</a>, and <a href="https://bugs.debian.org/965365">#965365</a>; and
-includes many more bug fixes from stable updates 4.19.119-4.19.132
-inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2323.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2324.data b/english/lts/security/2020/dla-2324.data
deleted file mode 100644
index 34f84cc3be2..00000000000
--- a/english/lts/security/2020/dla-2324.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2324-1 linux-latest-4.19</define-tag>
-<define-tag report_date>2020-08-12</define-tag>
-<define-tag packages>linux-latest-4.19</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>no</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2324.wml b/english/lts/security/2020/dla-2324.wml
deleted file mode 100644
index 466089d339e..00000000000
--- a/english/lts/security/2020/dla-2324.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS new package</define-tag>
-<define-tag moreinfo>
-<p>Linux 4.19 has been packaged for Debian 9 as linux-4.19. This
-provides a supported upgrade path for systems that currently use
-kernel packages from the "stretch-backports" suite.</p>
-
-<p>However, "apt full-upgrade" will *not* automatically install the
-updated kernel packages. You should explicitly install one of the
-following metapackages first, as appropriate for your system:</p>
-
-<ul>
- <li>linux-image-4.19-686</li>
- <li>linux-image-4.19-686-pae</li>
- <li>linux-image-4.19-amd64</li>
- <li>linux-image-4.19-arm64</li>
- <li>linux-image-4.19-armmp</li>
- <li>linux-image-4.19-armmp-lpae</li>
- <li>linux-image-4.19-cloud-amd64</li>
- <li>linux-image-4.19-marvell</li>
- <li>linux-image-4.19-rpi</li>
- <li>linux-image-4.19-rt-686-pae</li>
- <li>linux-image-4.19-rt-amd64</li>
- <li>linux-image-4.19-rt-arm64</li>
- <li>linux-image-4.19-rt-armmp</li>
-</ul>
-
-<p>For example, if the command "uname -r" currently shows
-"4.19.0-0.bpo.9-amd64", you should install linux-image-4.19-amd64.</p>
-
-<p>There is no need to upgrade systems using Linux 4.9, as that kernel
-version will also continue to be supported in the LTS period.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2324.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2325.data b/english/lts/security/2020/dla-2325.data
deleted file mode 100644
index 343afdadc86..00000000000
--- a/english/lts/security/2020/dla-2325.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2325-1 openjdk-8</define-tag>
-<define-tag report_date>2020-08-13</define-tag>
-<define-tag secrefs>CVE-2020-14556 CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581 CVE-2020-14583 CVE-2020-14593 CVE-2020-14621</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2325.wml b/english/lts/security/2020/dla-2325.wml
deleted file mode 100644
index 4a541d93e0e..00000000000
--- a/english/lts/security/2020/dla-2325.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-resulting in denial of service, bypass of access/sandbox restrictions or
-information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u265-b01-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2325.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2326.data b/english/lts/security/2020/dla-2326.data
deleted file mode 100644
index 6552c34cc30..00000000000
--- a/english/lts/security/2020/dla-2326.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2326-1 htmlunit</define-tag>
-<define-tag report_date>2020-08-15</define-tag>
-<define-tag secrefs>CVE-2020-5529</define-tag>
-<define-tag packages>htmlunit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2326.wml b/english/lts/security/2020/dla-2326.wml
deleted file mode 100644
index 539d58db7a5..00000000000
--- a/english/lts/security/2020/dla-2326.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Malicious JavaScript code was able to execute arbitrary Java code on the application.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.8-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your htmlunit packages.</p>
-
-<p>For the detailed security status of htmlunit please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/htmlunit">https://security-tracker.debian.org/tracker/htmlunit</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2326.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2327.data b/english/lts/security/2020/dla-2327.data
deleted file mode 100644
index 323b963f10e..00000000000
--- a/english/lts/security/2020/dla-2327.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2327-1 lucene-solr</define-tag>
-<define-tag report_date>2020-8-16</define-tag>
-<define-tag secrefs>CVE-2019-0193</define-tag>
-<define-tag packages>lucene-solr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2327.wml b/english/lts/security/2020/dla-2327.wml
deleted file mode 100644
index 656ca265fce..00000000000
--- a/english/lts/security/2020/dla-2327.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in lucene-solr, an enterprise
-search server.</p>
-
-<p>The DataImportHandler, an optional but popular module to pull in data
-from databases and other sources, has a feature in which the whole DIH
-configuration can come from a request's <q>dataConfig</q> parameter. The
-debug mode of the DIH admin screen uses this to allow convenient
-debugging / development of a DIH config. Since a DIH config can contain
-scripts, this parameter is a security risk. Starting from now on, use
-of this parameter requires setting the Java System property
-<q>enable.dih.dataConfigParam</q> to true. For example this can be achieved
-with solr-tomcat by adding -Denable.dih.dataConfigParam=true to
-JAVA_OPTS in /etc/default/tomcat8.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.6.2+dfsg-10+deb9u3.</p>
-
-<p>We recommend that you upgrade your lucene-solr packages.</p>
-
-<p>For the detailed security status of lucene-solr please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/lucene-solr">https://security-tracker.debian.org/tracker/lucene-solr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2327.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2328.data b/english/lts/security/2020/dla-2328.data
deleted file mode 100644
index 9a8cce1c5f7..00000000000
--- a/english/lts/security/2020/dla-2328.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2328-1 dovecot</define-tag>
-<define-tag report_date>2020-08-15</define-tag>
-<define-tag secrefs>CVE-2020-12100 CVE-2020-12673 CVE-2020-12674 Bug#968302</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2328.wml b/english/lts/security/2020/dla-2328.wml
deleted file mode 100644
index f0fefe5c88b..00000000000
--- a/english/lts/security/2020/dla-2328.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Dovecot email
-server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12100">CVE-2020-12100</a>
-
- <p>Receiving mail with deeply nested MIME parts leads to resource
- exhaustion as Dovecot attempts to parse it.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12673">CVE-2020-12673</a>
-
- <p>Dovecot's NTLM implementation does not correctly check message
- buffer size, which leads to a crash when reading past allocation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12674">CVE-2020-12674</a>
-
- <p>Dovecot's RPA mechanism implementation accepts zero-length message,
- which leads to assert-crash later on.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.2.27-3+deb9u6.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-
-<p>For the detailed security status of dovecot please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dovecot">https://security-tracker.debian.org/tracker/dovecot</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2328.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2329.data b/english/lts/security/2020/dla-2329.data
deleted file mode 100644
index 66135ad09a8..00000000000
--- a/english/lts/security/2020/dla-2329.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2329-1 libetpan</define-tag>
-<define-tag report_date>2020-08-16</define-tag>
-<define-tag secrefs>CVE-2020-15953</define-tag>
-<define-tag packages>libetpan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2329.wml b/english/lts/security/2020/dla-2329.wml
deleted file mode 100644
index fb8cb9c4bc4..00000000000
--- a/english/lts/security/2020/dla-2329.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A STARTTLS response injection was discovered that affects IMAP, SMTP, and POP3.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.6-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your libetpan packages.</p>
-
-<p>For the detailed security status of libetpan please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libetpan">https://security-tracker.debian.org/tracker/libetpan</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2329.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2330.data b/english/lts/security/2020/dla-2330.data
deleted file mode 100644
index 695b6de900a..00000000000
--- a/english/lts/security/2020/dla-2330.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2330-1 jruby</define-tag>
-<define-tag report_date>2020-08-16</define-tag>
-<define-tag secrefs>CVE-2017-17742 CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 CVE-2019-16201 CVE-2019-16254 CVE-2019-16255</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2330.wml b/english/lts/security/2020/dla-2330.wml
deleted file mode 100644
index e7f62f7268b..00000000000
--- a/english/lts/security/2020/dla-2330.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17742">CVE-2017-17742</a>
-
- <p>Response Splitting attack in the HTTP server of WEBrick.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8320">CVE-2019-8320</a>
-
- <p>Delete directory using symlink when decompressing tar.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8321">CVE-2019-8321</a>
-
- <p>Escape sequence injection vulnerability in verbose.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8322">CVE-2019-8322</a>
-
- <p>Escape sequence injection vulnerability in gem owner.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8323">CVE-2019-8323</a>
-
- <p>Escape sequence injection vulnerability in API response handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8324">CVE-2019-8324</a>
-
- <p>Installing a malicious gem may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8325">CVE-2019-8325</a>
-
- <p>Escape sequence injection vulnerability in errors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16201">CVE-2019-16201</a>
-
- <p>Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16254">CVE-2019-16254</a>
-
- <p>HTTP Response Splitting attack in the HTTP server of WEBrick.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16255">CVE-2019-16255</a>
-
- <p>Code injection vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.26-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>For the detailed security status of jruby please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jruby">https://security-tracker.debian.org/tracker/jruby</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2330.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2331.data b/english/lts/security/2020/dla-2331.data
deleted file mode 100644
index 43f8a67699c..00000000000
--- a/english/lts/security/2020/dla-2331.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2331-1 postgresql-9.6</define-tag>
-<define-tag report_date>2020-08-17</define-tag>
-<define-tag secrefs>CVE-2020-14350</define-tag>
-<define-tag packages>postgresql-9.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2331.wml b/english/lts/security/2020/dla-2331.wml
deleted file mode 100644
index 00792764c8c..00000000000
--- a/english/lts/security/2020/dla-2331.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andres Freund found an issue in the PostgreSQL database system where an
-uncontrolled search path could allow users to run arbitrary SQL functions
-with elevated priviledges when a superuser runs certain `CREATE EXTENSION'
-statements.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-9.6.19-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
-
-<p>For the detailed security status of postgresql-9.6 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2331.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2332-2.data b/english/lts/security/2020/dla-2332-2.data
deleted file mode 100644
index 13bd49d9a82..00000000000
--- a/english/lts/security/2020/dla-2332-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2332-2 sane-backends</define-tag>
-<define-tag report_date>2020-10-07</define-tag>
-<define-tag secrefs>CVE-2020-12862 CVE-2020-12863 CVE-2020-12865 CVE-2020-12867 Bug#961302</define-tag>
-<define-tag packages>sane-backends</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2332-2.wml b/english/lts/security/2020/dla-2332-2.wml
deleted file mode 100644
index 3916be647ab..00000000000
--- a/english/lts/security/2020/dla-2332-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was introduced in DLA-2332-1, where changes in the Debian
-package building process triggered a bug in the sane-backends
-packages, causing missing files.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.25-4.1+deb9u2.</p>
-
-<p>We recommend that you upgrade your sane-backends packages.</p>
-
-<p>For the detailed security status of sane-backends please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sane-backends">https://security-tracker.debian.org/tracker/sane-backends</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2332-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2332.data b/english/lts/security/2020/dla-2332.data
deleted file mode 100644
index a348bbd82f4..00000000000
--- a/english/lts/security/2020/dla-2332.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2332-1 sane-backends</define-tag>
-<define-tag report_date>2020-08-17</define-tag>
-<define-tag secrefs>CVE-2020-12862 CVE-2020-12863 CVE-2020-12865 CVE-2020-12867 Bug#961302</define-tag>
-<define-tag packages>sane-backends</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2332.wml b/english/lts/security/2020/dla-2332.wml
deleted file mode 100644
index 911787c1f62..00000000000
--- a/english/lts/security/2020/dla-2332.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Kevin Backhouse discovered multiple vulnerabilies in the epson2 and
-epsonds backends of SANE, a library for scanners. A malicious remote
-device could exploit these to trigger information disclosure, denial
-of service and possibly remote code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12862">CVE-2020-12862</a>
-
- <p>An out-of-bounds read in SANE Backends before 1.0.30 may allow a
- malicious device connected to the same local network as the victim
- to read important information, such as the ASLR offsets of the
- program, aka GHSL-2020-082.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12863">CVE-2020-12863</a>
-
- <p>An out-of-bounds read in SANE Backends before 1.0.30 may allow a
- malicious device connected to the same local network as the victim
- to read important information, such as the ASLR offsets of the
- program, aka GHSL-2020-083.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12865">CVE-2020-12865</a>
-
- <p>A heap buffer overflow in SANE Backends before 1.0.30 may allow a
- malicious device connected to the same local network as the victim
- to execute arbitrary code, aka GHSL-2020-084.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12867">CVE-2020-12867</a>
-
- <p>A NULL pointer dereference in sanei_epson_net_read in SANE
- Backends before 1.0.30 allows a malicious device connected to the
- same local network as the victim to cause a denial of service, aka
- GHSL-2020-075.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.25-4.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your sane-backends packages.</p>
-
-<p>For the detailed security status of sane-backends please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sane-backends">https://security-tracker.debian.org/tracker/sane-backends</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2332.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2333.data b/english/lts/security/2020/dla-2333.data
deleted file mode 100644
index 36d8c2d571d..00000000000
--- a/english/lts/security/2020/dla-2333.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2333-1 imagemagick</define-tag>
-<define-tag report_date>2020-8-19</define-tag>
-<define-tag secrefs>CVE-2017-12805 CVE-2017-17681 CVE-2017-18252 CVE-2018-7443 CVE-2018-8804 CVE-2018-8960 CVE-2018-9133 CVE-2018-10177 CVE-2018-14551 CVE-2018-18024 CVE-2018-20467 CVE-2019-10131 CVE-2019-11472 CVE-2019-11597 CVE-2019-12974 CVE-2019-12977 CVE-2019-12978 CVE-2019-12979 CVE-2019-13295 CVE-2019-13297 CVE-2019-11470 CVE-2019-13454 CVE-2019-14981 CVE-2019-19949 Bug#885941 Bug#891291 Bug#894848 Bug#896018 Bug#904713 Bug#917326 Bug#928207 Bug#931196</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2333.wml b/english/lts/security/2020/dla-2333.wml
deleted file mode 100644
index fcad513d720..00000000000
--- a/english/lts/security/2020/dla-2333.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were fixed in Imagemagick. Various
-memory handling problems and cases of missing or incomplete input
-sanitizing may result in denial of service, memory or CPU exhaustion,
-information disclosure or potentially the execution of arbitrary code
-when a malformed image file is processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8:6.9.7.4+dfsg-11+deb9u9.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2333.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2334.data b/english/lts/security/2020/dla-2334.data
deleted file mode 100644
index 646391e3f90..00000000000
--- a/english/lts/security/2020/dla-2334.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2334-1 ruby-websocket-extensions</define-tag>
-<define-tag report_date>2020-08-19</define-tag>
-<define-tag secrefs>CVE-2020-7663</define-tag>
-<define-tag packages>ruby-websocket-extensions</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2334.wml b/english/lts/security/2020/dla-2334.wml
deleted file mode 100644
index 3c5c51c7c34..00000000000
--- a/english/lts/security/2020/dla-2334.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial of service vulnerability in
-<tt>ruby-websocket-extensions</tt>, a library for managing long-lived HTTP
-"WebSocket" connections.</p>
-
-<p>The parser took quadratic time when parsing a header containing an unclosed
-string parameter value whose content is a repeating two-byte sequence. This
-could be abused by an attacker to conduct a Regex Denial Of Service (ReDoS) on
-a single-threaded server by providing a malicious payload in the
-<tt>Sec-WebSocket-Extensions</tt> HTTP header.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7663">CVE-2020-7663</a>
-
- <p>websocket-extensions ruby module prior to 0.1.5 allows Denial of Service
- (DoS) via Regex Backtracking. The extension parser may take quadratic time
- when parsing a header containing an unclosed string parameter value whose
- content is a repeating two-byte sequence of a backslash and some other
- character. This could be abused by an attacker to conduct Regex Denial Of
- Service (ReDoS) on a single-threaded server by providing a malicious
- payload with the Sec-WebSocket-Extensions header.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.1.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-websocket-extensions packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2334.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2335.data b/english/lts/security/2020/dla-2335.data
deleted file mode 100644
index d0f936a133e..00000000000
--- a/english/lts/security/2020/dla-2335.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2335-1 ghostscript</define-tag>
-<define-tag report_date>2020-08-20</define-tag>
-<define-tag secrefs>CVE-2020-16287 CVE-2020-16288 CVE-2020-16289 CVE-2020-16290 CVE-2020-16291 CVE-2020-16292 CVE-2020-16293 CVE-2020-16294 CVE-2020-16295 CVE-2020-16296 CVE-2020-16297 CVE-2020-16298 CVE-2020-16299 CVE-2020-16300 CVE-2020-16301 CVE-2020-16302 CVE-2020-16303 CVE-2020-16304 CVE-2020-16305 CVE-2020-16306 CVE-2020-16307 CVE-2020-16308 CVE-2020-16309 CVE-2020-16310 CVE-2020-17538</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2335.wml b/english/lts/security/2020/dla-2335.wml
deleted file mode 100644
index e4b73cc3f17..00000000000
--- a/english/lts/security/2020/dla-2335.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in ghostscript, an interpreter for
-the PostScript language and for PDF, allowing an attacker to escalate
-privileges and cause denial of service via crafted PS/EPS/PDF files.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-9.26a~dfsg-0+deb9u7.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>For the detailed security status of ghostscript please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2335.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2336.data b/english/lts/security/2020/dla-2336.data
deleted file mode 100644
index 3119cd086ee..00000000000
--- a/english/lts/security/2020/dla-2336.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2336-1 firejail</define-tag>
-<define-tag report_date>2020-8-22</define-tag>
-<define-tag secrefs>CVE-2020-17367 CVE-2020-17368</define-tag>
-<define-tag packages>firejail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2336.wml b/english/lts/security/2020/dla-2336.wml
deleted file mode 100644
index f5995512269..00000000000
--- a/english/lts/security/2020/dla-2336.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Tim Starling discovered two vulnerabilities in firejail, a sandbox
-program to restrict the running environment of untrusted applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17367">CVE-2020-17367</a>
-
- <p>It was reported that firejail does not respect the end-of-options
- separator ("--"), allowing an attacker with control over the command
- line options of the sandboxed application, to write data to a
- specified file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17368">CVE-2020-17368</a>
-
- <p>It was reported that firejail when redirecting output via --output
- or --output-stderr, concatenates all command line arguments into a
- single string that is passed to a shell. An attacker who has control
- over the command line arguments of the sandboxed application could
- take advantage of this flaw to run run arbitrary other commands.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.9.44.8-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your firejail packages.</p>
-
-<p>For the detailed security status of firejail please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firejail">https://security-tracker.debian.org/tracker/firejail</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2336.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2337.data b/english/lts/security/2020/dla-2337.data
deleted file mode 100644
index 1d6e6fa3b8f..00000000000
--- a/english/lts/security/2020/dla-2337.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2337-1 python2.7</define-tag>
-<define-tag report_date>2020-8-22</define-tag>
-<define-tag secrefs>CVE-2018-20852 CVE-2019-5010 CVE-2019-9636 CVE-2019-9740 CVE-2019-9947 CVE-2019-9948 CVE-2019-10160 CVE-2019-16056 CVE-2019-20907</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2337.wml b/english/lts/security/2020/dla-2337.wml
deleted file mode 100644
index 5bcc661d071..00000000000
--- a/english/lts/security/2020/dla-2337.wml
+++ /dev/null
@@ -1,95 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were discovered in Python2.7, an interactive
-high-level object-oriented language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20852">CVE-2018-20852</a>
-
- <p>By using a malicious server an attacker might steal cookies that are
- meant for other domains.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5010">CVE-2019-5010</a>
-
- <p>NULL pointer dereference using a specially crafted X509 certificate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a>
-
- <p>Improper Handling of Unicode Encoding (with an incorrect netloc)
- during NFKC normalization resulting in information disclosure
- (credentials, cookies, etc. that are cached against a given
- hostname). A specially crafted URL could be incorrectly parsed to
- locate cookies or authentication data and send that information to
- a different host than when parsed correctly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
-
- <p>An issue was discovered in urllib2 where CRLF injection is possible
- if the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically in
- the query string after a ? character) followed by an HTTP header or
- a Redis command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9947">CVE-2019-9947</a>
-
- <p>An issue was discovered in urllib2 where CRLF injection is possible
- if the attacker controls a url parameter, as demonstrated by the
- first argument to urllib.request.urlopen with \r\n (specifically in
- the path component of a URL that lacks a ? character) followed by an
- HTTP header or a Redis command. This is similar to the <a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>
- query string issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9948">CVE-2019-9948</a>
-
- <p>urllib supports the local_file: scheme, which makes it easier for
- remote attackers to bypass protection mechanisms that blacklist
- file: URIs, as demonstrated by triggering a
- urllib.urlopen('local_file:///etc/passwd') call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10160">CVE-2019-10160</a>
-
- <p>A security regression of <a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a> was discovered which still
- allows an attacker to exploit <a href="https://security-tracker.debian.org/tracker/CVE-2019-9636">CVE-2019-9636</a> by abusing the user and
- password parts of a URL. When an application parses user-supplied
- URLs to store cookies, authentication credentials, or other kind of
- information, it is possible for an attacker to provide specially
- crafted URLs to make the application locate host-related information
- (e.g. cookies, authentication data) and send them to a different
- host than where it should, unlike if the URLs had been correctly
- parsed. The result of an attack may vary based on the application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16056">CVE-2019-16056</a>
-
- <p>The email module wrongly parses email addresses that contain
- multiple @ characters. An application that uses the email module and
- implements some kind of checks on the From/To headers of a message
- could be tricked into accepting an email address that should be
- denied.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20907">CVE-2019-20907</a>
-
- <p>Opening a crafted tar file could result in an infinite loop due to
- missing header validation.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.7.13-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>For the detailed security status of python2.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python2.7">https://security-tracker.debian.org/tracker/python2.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2337.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2338-2.data b/english/lts/security/2020/dla-2338-2.data
deleted file mode 100644
index 11bc082a162..00000000000
--- a/english/lts/security/2020/dla-2338-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2338-2 proftpd-dfsg</define-tag>
-<define-tag report_date>2020-8-25</define-tag>
-<define-tag secrefs>Bug#968967</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2338-2.wml b/english/lts/security/2020/dla-2338-2.wml
deleted file mode 100644
index a7d71b101b6..00000000000
--- a/english/lts/security/2020/dla-2338-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of proftpd-dfsg released as DLA-2338-1 incorrectly
-destroyed the memory pool in function sftp_kex_handle in
-contrib/mod_sftp/kex.c which may cause a segmentation fault and thus
-prevent sftp connections.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.5e+r1.3.5b-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>For the detailed security status of proftpd-dfsg please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/proftpd-dfsg">https://security-tracker.debian.org/tracker/proftpd-dfsg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2338-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2338.data b/english/lts/security/2020/dla-2338.data
deleted file mode 100644
index c6a1b95605e..00000000000
--- a/english/lts/security/2020/dla-2338.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2338-1 proftpd-dfsg</define-tag>
-<define-tag report_date>2020-8-22</define-tag>
-<define-tag secrefs>not available Bug#923926</define-tag>
-<define-tag packages>proftpd-dfsg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2338.wml b/english/lts/security/2020/dla-2338.wml
deleted file mode 100644
index 9ec0b0b0bd3..00000000000
--- a/english/lts/security/2020/dla-2338.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several memory leaks were discovered in proftpd-dfsg, a versatile,
-virtual-hosting FTP daemon, when mod_facl or mod_sftp
-is used which could lead to memory exhaustion and a denial-of-service.</p>
-
-<p>The update also makes automatic upgrades of proftpd-dfsg from Debian 8
-to Debian 9 possible again.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.5e+r1.3.5b-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your proftpd-dfsg packages.</p>
-
-<p>For the detailed security status of proftpd-dfsg please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/proftpd-dfsg">https://security-tracker.debian.org/tracker/proftpd-dfsg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2338.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2339.data b/english/lts/security/2020/dla-2339.data
deleted file mode 100644
index b56934ff1ae..00000000000
--- a/english/lts/security/2020/dla-2339.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2339-1 software-properties</define-tag>
-<define-tag report_date>2020-08-22</define-tag>
-<define-tag secrefs>CVE-2020-15709 Bug#968850</define-tag>
-<define-tag packages>software-properties</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2339.wml b/english/lts/security/2020/dla-2339.wml
deleted file mode 100644
index ccb632bb1f9..00000000000
--- a/english/lts/security/2020/dla-2339.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jason A. Donenfeld found an ansi escape sequence injection into
-software-properties, a manager for apt repository sources. An attacker
-could manipulate the screen of a user prompted to install an
-additional repository (PPA).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.96.20.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your software-properties packages.</p>
-
-<p>For the detailed security status of software-properties please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/software-properties">https://security-tracker.debian.org/tracker/software-properties</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2339.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2340-2.data b/english/lts/security/2020/dla-2340-2.data
deleted file mode 100644
index 97e02c18ade..00000000000
--- a/english/lts/security/2020/dla-2340-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2340-2 sqlite3</define-tag>
-<define-tag report_date>2020-12-10</define-tag>
-<define-tag secrefs>CVE-2019-20218</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2340-2.wml b/english/lts/security/2020/dla-2340-2.wml
deleted file mode 100644
index 13c96890754..00000000000
--- a/english/lts/security/2020/dla-2340-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of sqlite3 released as DLA-2340-1 contained an incomplete fix
-for <a href="https://security-tracker.debian.org/tracker/CVE-2019-20218">CVE-2019-20218</a>. Updated sqlite3 packages are now available to
-correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.16.2-5+deb9u3.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>For the detailed security status of sqlite3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sqlite3">https://security-tracker.debian.org/tracker/sqlite3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2340-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2340.data b/english/lts/security/2020/dla-2340.data
deleted file mode 100644
index 3ea6be2053c..00000000000
--- a/english/lts/security/2020/dla-2340.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2340-1 sqlite3</define-tag>
-<define-tag report_date>2020-08-22</define-tag>
-<define-tag secrefs>CVE-2018-8740 CVE-2018-20346 CVE-2018-20506 CVE-2019-5827 CVE-2019-9936 CVE-2019-9937 CVE-2019-16168 CVE-2019-20218 CVE-2020-11655 CVE-2020-13434 CVE-2020-13630 CVE-2020-13632 CVE-2020-13871</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2340.wml b/english/lts/security/2020/dla-2340.wml
deleted file mode 100644
index b69bd5e368c..00000000000
--- a/english/lts/security/2020/dla-2340.wml
+++ /dev/null
@@ -1,99 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in sqlite3, a C library that
-implements an SQL database engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8740">CVE-2018-8740</a>
-
- <p>Databases whose schema is corrupted using a CREATE TABLE AS statement
- could cause a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20346">CVE-2018-20346</a>
-
- <p>When the FTS3 extension is enabled, sqlite3 encounters an integer
- overflow (and resultant buffer overflow) for FTS3 queries that occur
- after crafted changes to FTS3 shadow tables, allowing remote
- attackers to execute arbitrary code by leveraging the ability to run
- arbitrary SQL statements.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20506">CVE-2018-20506</a>
-
- <p>When the FTS3 extension is enabled, sqlite3 encounters an integer
- overflow (and resultant buffer overflow) for FTS3 queries in a
- <q>merge</q> operation that occurs after crafted changes to FTS3 shadow
- tables, allowing remote attackers to execute arbitrary code by
- leveraging the ability to run arbitrary SQL statements</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5827">CVE-2019-5827</a>
-
- <p>Integer overflow allowed a remote attacker to potentially exploit
- heap corruption via a crafted HTML page, primarily impacting
- chromium.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9936">CVE-2019-9936</a>
-
- <p>Running fts5 prefix queries inside a transaction could trigger a
- heap-based buffer over-read, which may lead to an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9937">CVE-2019-9937</a>
-
- <p>Interleaving reads and writes in a single transaction with an fts5
- virtual table will lead to a NULL Pointer Dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16168">CVE-2019-16168</a>
-
- <p>A browser or other application can be triggered to crash because of
- inadequate parameter validation which could lead to a divide-by-zero
- error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20218">CVE-2019-20218</a>
-
- <p>WITH stack unwinding proceeds even after a parsing error, resulting
- in a possible application crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13630">CVE-2020-13630</a>
-
- <p>The code related to the snippet feature exhibits a use-after-free
- defect.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13632">CVE-2020-13632</a>
-
- <p>A crafted matchinfo() query can lead to a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13871">CVE-2020-13871</a>
-
- <p>The parse tree rewrite for window functions is too late, leading to
- a use-after-free defect.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11655">CVE-2020-11655</a>
-
- <p>An improper initialization of AggInfo objects allows attackers to
- cause a denial of service (segmentation fault) via a malformed
- window-function query.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13434">CVE-2020-13434</a>
-
- <p>The code in sqlite3_str_vappendf in printf.c contains an integer
- overflow defect.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.16.2-5+deb9u2.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>For the detailed security status of sqlite3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sqlite3">https://security-tracker.debian.org/tracker/sqlite3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2340.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2341.data b/english/lts/security/2020/dla-2341.data
deleted file mode 100644
index e2590353463..00000000000
--- a/english/lts/security/2020/dla-2341.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2341-1 inetutils</define-tag>
-<define-tag report_date>2020-08-24</define-tag>
-<define-tag secrefs>CVE-2020-10188</define-tag>
-<define-tag packages>inetutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2341.wml b/english/lts/security/2020/dla-2341.wml
deleted file mode 100644
index 4696cfdea72..00000000000
--- a/english/lts/security/2020/dla-2341.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>iIn inetutils-telnetd, an implementation of a telnet daemon,
-arbitrary remote code execution might have been possible via
-short writes or urgent data.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:1.9.4-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your inetutils-telnetd packages.</p>
-
-<p>For the detailed security status of inetutils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/inetutils">https://security-tracker.debian.org/tracker/inetutils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2341.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2342.data b/english/lts/security/2020/dla-2342.data
deleted file mode 100644
index a1dbe74224f..00000000000
--- a/english/lts/security/2020/dla-2342.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2342-1 libjackson-json-java</define-tag>
-<define-tag report_date>2020-08-24</define-tag>
-<define-tag secrefs>CVE-2017-7525 CVE-2019-10172</define-tag>
-<define-tag packages>libjackson-json-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2342.wml b/english/lts/security/2020/dla-2342.wml
deleted file mode 100644
index fd32b2b2e82..00000000000
--- a/english/lts/security/2020/dla-2342.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in libjackson-json-java,
-a Java JSON processor.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7525">CVE-2017-7525</a>
-
- <p>Jackson Deserializer security vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15095">CVE-2017-15095</a>
-
- <p>Block more JDK types from polymorphic deserialization.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10172">CVE-2019-10172</a>
-
- <p>XML external entity vulnerabilities.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9.2-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your libjackson-json-java packages.</p>
-
-<p>For the detailed security status of libjackson-json-java please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libjackson-json-java">https://security-tracker.debian.org/tracker/libjackson-json-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2342.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2343.data b/english/lts/security/2020/dla-2343.data
deleted file mode 100644
index 74f6e8efd13..00000000000
--- a/english/lts/security/2020/dla-2343.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2343-1 icingaweb2</define-tag>
-<define-tag report_date>2020-08-24</define-tag>
-<define-tag secrefs>CVE-2020-24368 Bug#968833</define-tag>
-<define-tag packages>icingaweb2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2343.wml b/english/lts/security/2020/dla-2343.wml
deleted file mode 100644
index 87bf57bd9ae..00000000000
--- a/english/lts/security/2020/dla-2343.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A directory traversal vulnerability was discovered in Icinga Web 2, a
-web interface for Icinga, which could result in the disclosure of files
-readable by the process.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.4.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your icingaweb2 packages.</p>
-
-<p>For the detailed security status of icingaweb2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/icingaweb2">https://security-tracker.debian.org/tracker/icingaweb2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2343.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2344.data b/english/lts/security/2020/dla-2344.data
deleted file mode 100644
index 4373424b66d..00000000000
--- a/english/lts/security/2020/dla-2344.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2344-1 mongodb</define-tag>
-<define-tag report_date>2020-08-24</define-tag>
-<define-tag secrefs>CVE-2020-7923</define-tag>
-<define-tag packages>mongodb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2344.wml b/english/lts/security/2020/dla-2344.wml
deleted file mode 100644
index 0dc59140302..00000000000
--- a/english/lts/security/2020/dla-2344.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A denial of service vulnerability was discovered in mongodb, an
-object/document-oriented database, whereby a user authorized to perform
-database queries may issue specially crafted queries, which violate an
-invariant in the query subsystem's support for geoNear.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:3.2.11-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your mongodb packages.</p>
-
-<p>For the detailed security status of mongodb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mongodb">https://security-tracker.debian.org/tracker/mongodb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2344.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2345.data b/english/lts/security/2020/dla-2345.data
deleted file mode 100644
index 9e3cace042f..00000000000
--- a/english/lts/security/2020/dla-2345.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2345-1 php7.0</define-tag>
-<define-tag report_date>2020-8-26</define-tag>
-<define-tag secrefs>CVE-2020-7068</define-tag>
-<define-tag packages>php7.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2345.wml b/english/lts/security/2020/dla-2345.wml
deleted file mode 100644
index eb48862a3e8..00000000000
--- a/english/lts/security/2020/dla-2345.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was a use-after-free vulnerability when
-parsing PHAR files, a method of putting entire PHP applications into
-a single file.</p>
-
-<p>For Debian 9 &quot;Stretch&quot;, this problem has been fixed in version
-7.0.33-0+deb9u9.</p>
-
-<p>We recommend that you upgrade your php7.0 packages.</p>
-
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/php7.0">https://security-tracker.debian.org/tracker/php7.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2345.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2346.data b/english/lts/security/2020/dla-2346.data
deleted file mode 100644
index e1bb58e82ec..00000000000
--- a/english/lts/security/2020/dla-2346.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2346-1 firefox-esr</define-tag>
-<define-tag report_date>2020-08-27</define-tag>
-<define-tag secrefs>CVE-2020-15664 CVE-2020-15669</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2346.wml b/english/lts/security/2020/dla-2346.wml
deleted file mode 100644
index 06607d2868b..00000000000
--- a/english/lts/security/2020/dla-2346.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or unintended or malicious extensions being installed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-68.12.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2346.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2347.data b/english/lts/security/2020/dla-2347.data
deleted file mode 100644
index 7694f1dc678..00000000000
--- a/english/lts/security/2020/dla-2347.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2347-1 libvncserver</define-tag>
-<define-tag report_date>2020-08-29</define-tag>
-<define-tag secrefs>CVE-2019-20839 CVE-2020-14397 CVE-2020-14399 CVE-2020-14400 CVE-2020-14401 CVE-2020-14402 CVE-2020-14403 CVE-2020-14404 CVE-2020-14405</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2347.wml b/english/lts/security/2020/dla-2347.wml
deleted file mode 100644
index 425750f74e6..00000000000
--- a/english/lts/security/2020/dla-2347.wml
+++ /dev/null
@@ -1,71 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several minor vulnerabilities have been discovered in libvncserver, a
-server and client implementation of the VNC protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20839">CVE-2019-20839</a>
-
- <p>libvncclient/sockets.c in LibVNCServer had a buffer overflow via a
- long socket filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14397">CVE-2020-14397</a>
-
- <p>libvncserver/rfbregion.c has a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14399">CVE-2020-14399</a>
-
- <p>Byte-aligned data was accessed through uint32_t pointers in
- libvncclient/rfbproto.c.</p>
-
- <p>NOTE: This issue has been disputed by third parties; there is
- reportedly <q>no trust boundary crossed</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14400">CVE-2020-14400</a>
-
- <p>Byte-aligned data was accessed through uint16_t pointers in
- libvncserver/translate.c.</p>
-
- <p>NOTE: This issue has been disputed by third parties. There is no
- known path of exploitation or cross of a trust boundary.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14401">CVE-2020-14401</a>
-
- <p>libvncserver/scale.c had a pixel_value integer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14402">CVE-2020-14402</a>
-
- <p>libvncserver/corre.c allowed out-of-bounds access via encodings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14403">CVE-2020-14403</a>
-
- <p>libvncserver/hextile.c allowed out-of-bounds access via encodings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14404">CVE-2020-14404</a>
-
- <p>libvncserver/rre.c allowed out-of-bounds access via encodings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14405">CVE-2020-14405</a>
-
- <p>libvncclient/rfbproto.c did not limit TextChat size.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.9.11+dfsg-1.3~deb9u5.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>For the detailed security status of libvncserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvncserver">https://security-tracker.debian.org/tracker/libvncserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2347.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2348.data b/english/lts/security/2020/dla-2348.data
deleted file mode 100644
index ece87e5ee1a..00000000000
--- a/english/lts/security/2020/dla-2348.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2348-1 php-horde-core</define-tag>
-<define-tag report_date>2020-08-29</define-tag>
-<define-tag secrefs>CVE-2017-16907 Bug#909800</define-tag>
-<define-tag packages>php-horde-core</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2348.wml b/english/lts/security/2020/dla-2348.wml
deleted file mode 100644
index a1a3957371c..00000000000
--- a/english/lts/security/2020/dla-2348.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Horde Groupware, there has been an XSS vulnerability in two components
-via the Color field in a Create Task List action.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.27.6+debian1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your php-horde-core packages.</p>
-
-<p>For the detailed security status of php-horde-core please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-horde-core">https://security-tracker.debian.org/tracker/php-horde-core</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2348.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2349.data b/english/lts/security/2020/dla-2349.data
deleted file mode 100644
index c990c1c9b8e..00000000000
--- a/english/lts/security/2020/dla-2349.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2349-1 php-horde</define-tag>
-<define-tag report_date>2020-08-29</define-tag>
-<define-tag secrefs>CVE-2017-16907 Bug#909739</define-tag>
-<define-tag packages>php-horde</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2349.wml b/english/lts/security/2020/dla-2349.wml
deleted file mode 100644
index f56b838b8f2..00000000000
--- a/english/lts/security/2020/dla-2349.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Horde Groupware, there has been an XSS vulnerability in two components
-via the Color field in a Create Task List action.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.2.13+debian0-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your php-horde packages.</p>
-
-<p>For the detailed security status of php-horde please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-horde">https://security-tracker.debian.org/tracker/php-horde</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2349.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2350.data b/english/lts/security/2020/dla-2350.data
deleted file mode 100644
index 2027e21f35b..00000000000
--- a/english/lts/security/2020/dla-2350.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2350-1 php-horde-kronolith</define-tag>
-<define-tag report_date>2020-08-29</define-tag>
-<define-tag secrefs>CVE-2017-16908 Bug#909738</define-tag>
-<define-tag packages>php-horde-kronolith</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2350.wml b/english/lts/security/2020/dla-2350.wml
deleted file mode 100644
index e0cf3e23610..00000000000
--- a/english/lts/security/2020/dla-2350.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Horde Groupware, there has been an XSS via the Name field during
-creation of a new Resource. This could have been leveraged for remote
-code execution after compromising an administrator account, because the
-<a href="https://security-tracker.debian.org/tracker/CVE-2015-7984">CVE-2015-7984</a> CSRF protection mechanism can then be bypassed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.2.19-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your php-horde-kronolith packages.</p>
-
-<p>For the detailed security status of php-horde-kronolith please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-horde-kronolith">https://security-tracker.debian.org/tracker/php-horde-kronolith</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2350.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2351.data b/english/lts/security/2020/dla-2351.data
deleted file mode 100644
index 93204b5852b..00000000000
--- a/english/lts/security/2020/dla-2351.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2351-1 php-horde-kronolith</define-tag>
-<define-tag report_date>2020-08-29</define-tag>
-<define-tag secrefs>CVE-2017-16906 Bug#909737</define-tag>
-<define-tag packages>php-horde-kronolith</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2351.wml b/english/lts/security/2020/dla-2351.wml
deleted file mode 100644
index 0d0e7575d84..00000000000
--- a/english/lts/security/2020/dla-2351.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Horde Groupware, there has been an XSS vulnerability that could be
-exploited via the URL field in a "Calendar -> New Event" action.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.2.19-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your php-horde-kronolith packages.</p>
-
-<p>For the detailed security status of php-horde-kronolith please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-horde-kronolith">https://security-tracker.debian.org/tracker/php-horde-kronolith</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2351.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2352.data b/english/lts/security/2020/dla-2352.data
deleted file mode 100644
index 2092764900f..00000000000
--- a/english/lts/security/2020/dla-2352.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2352-1 php-horde-gollem</define-tag>
-<define-tag report_date>2020-08-29</define-tag>
-<define-tag secrefs>CVE-2017-15235</define-tag>
-<define-tag packages>php-horde-gollem</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2352.wml b/english/lts/security/2020/dla-2352.wml
deleted file mode 100644
index 96599456577..00000000000
--- a/english/lts/security/2020/dla-2352.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The File Manager (gollem) module in Horde Groupware has allowed remote
-attackers to bypass Horde authentication for file downloads via a crafted
-fn parameter that corresponded to the exact filename.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.0.10-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your php-horde-gollem packages.</p>
-
-<p>For the detailed security status of php-horde-gollem please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-horde-gollem">https://security-tracker.debian.org/tracker/php-horde-gollem</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2352.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2353.data b/english/lts/security/2020/dla-2353.data
deleted file mode 100644
index c74522ad37a..00000000000
--- a/english/lts/security/2020/dla-2353.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2353-1 bacula</define-tag>
-<define-tag report_date>2020-8-29</define-tag>
-<define-tag secrefs>CVE-2020-11061</define-tag>
-<define-tag packages>bacula</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2353.wml b/english/lts/security/2020/dla-2353.wml
deleted file mode 100644
index 31bd540f352..00000000000
--- a/english/lts/security/2020/dla-2353.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in bacula, a network backup service.
-By sending oversized digest strings a malicious client can cause a heap
-overflow in the director's memory which results in a denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.4.4+dfsg-6+deb9u2.</p>
-
-<p>We recommend that you upgrade your bacula packages.</p>
-
-<p>For the detailed security status of bacula please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bacula">https://security-tracker.debian.org/tracker/bacula</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2353.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2354.data b/english/lts/security/2020/dla-2354.data
deleted file mode 100644
index 002a1ac4d13..00000000000
--- a/english/lts/security/2020/dla-2354.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2354-1 ndpi</define-tag>
-<define-tag report_date>2020-8-29</define-tag>
-<define-tag secrefs>CVE-2020-15476</define-tag>
-<define-tag packages>ndpi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2354.wml b/english/lts/security/2020/dla-2354.wml
deleted file mode 100644
index 6e6c5f1110a..00000000000
--- a/english/lts/security/2020/dla-2354.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in ndpi, an extensible deep packet inspection
-library. The Oracle protocol dissector contains an heap-based buffer
-over-read, which could crash the application that uses this library and
-may result in denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ndpi packages.</p>
-
-<p>For the detailed security status of ndpi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ndpi">https://security-tracker.debian.org/tracker/ndpi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2354.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2355.data b/english/lts/security/2020/dla-2355.data
deleted file mode 100644
index 540f0f726dd..00000000000
--- a/english/lts/security/2020/dla-2355.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2355-1 bind9</define-tag>
-<define-tag report_date>2020-8-29</define-tag>
-<define-tag secrefs>CVE-2020-8622 CVE-2020-8623</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2355.wml b/english/lts/security/2020/dla-2355.wml
deleted file mode 100644
index 4b6eae90916..00000000000
--- a/english/lts/security/2020/dla-2355.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in bind9, an Internet Domain Name Server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8622">CVE-2020-8622</a>
-
- <p>Crafted responses to TSIG-signed requests could lead to an assertion
- failure, causing the server to exit. This could be done by malicious
- server operators or guessing attackers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8623">CVE-2020-8623</a>
-
- <p>An assertions failure, causing the server to exit, can be exploited
- by a query for an RSA signed zone.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:9.10.3.dfsg.P4-12.3+deb9u7.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2355.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2356.data b/english/lts/security/2020/dla-2356.data
deleted file mode 100644
index 4f590b848e1..00000000000
--- a/english/lts/security/2020/dla-2356.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2356-1 freerdp</define-tag>
-<define-tag report_date>2020-08-30</define-tag>
-<define-tag secrefs>CVE-2014-0791 CVE-2020-11042 CVE-2020-11045 CVE-2020-11046 CVE-2020-11048 CVE-2020-11058 CVE-2020-11521 CVE-2020-11522 CVE-2020-11523 CVE-2020-11525 CVE-2020-11526 CVE-2020-13396 CVE-2020-13397 CVE-2020-13398</define-tag>
-<define-tag packages>freerdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2356.wml b/english/lts/security/2020/dla-2356.wml
deleted file mode 100644
index bf204186274..00000000000
--- a/english/lts/security/2020/dla-2356.wml
+++ /dev/null
@@ -1,102 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilites have been reported against FreeRDP, an Open Source
-server and client implementation of the Microsoft RDP protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0791">CVE-2014-0791</a>
-
- <p>An integer overflow in the license_read_scope_list function in
- libfreerdp/core/license.c in FreeRDP allowed remote RDP
- servers to cause a denial of service (application crash) or possibly
- have unspecified other impact via a large ScopeCount value in a Scope
- List in a Server License Request packet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11042">CVE-2020-11042</a>
-
- <p>In FreeRDP there was an out-of-bounds read in update_read_icon_info.
- It allowed reading an attacker-defined amount of client memory (32bit
- unsigned -> 4GB) to an intermediate buffer. This could have been used
- to crash the client or store information for later retrieval.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11045">CVE-2020-11045</a>
-
- <p>In FreeRDP there was an out-of-bound read in in
- update_read_bitmap_data that allowed client memory to be read to an
- image buffer. The result displayed on screen as colour.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11046">CVE-2020-11046</a>
-
- <p>In FreeRDP there was a stream out-of-bounds seek in
- update_read_synchronize that could have lead to a later out-of-bounds
- read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11048">CVE-2020-11048</a>
-
- <p>In FreeRDP there was an out-of-bounds read. It only allowed to abort
- a session. No data extraction was possible.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11058">CVE-2020-11058</a>
-
- <p>In FreeRDP, a stream out-of-bounds seek in
- rdp_read_font_capability_set could have lead to a later out-of-bounds
- read. As a result, a manipulated client or server might have forced a
- disconnect due to an invalid data read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11521">CVE-2020-11521</a>
-
- <p>libfreerdp/codec/planar.c in FreeRDP had an Out-of-bounds Write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11522">CVE-2020-11522</a>
-
- <p>libfreerdp/gdi/gdi.c in FreeRDP had an Out-of-bounds Read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11523">CVE-2020-11523</a>
-
- <p>libfreerdp/gdi/region.c in FreeRDP had an Integer Overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11525">CVE-2020-11525</a>
-
- <p>libfreerdp/cache/bitmap.c in FreeRDP had an Out of bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11526">CVE-2020-11526</a>
-
- <p>libfreerdp/core/update.c in FreeRDP had an Out-of-bounds Read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13396">CVE-2020-13396</a>
-
- <p>An out-of-bounds (OOB) read vulnerability has been detected in
- ntlm_read_ChallengeMessage in
- winpr/libwinpr/sspi/NTLM/ntlm_message.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13397">CVE-2020-13397</a>
-
- <p>An out-of-bounds (OOB) read vulnerability has been detected in
- security_fips_decrypt in libfreerdp/core/security.c due to an
- uninitialized value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13398">CVE-2020-13398</a>
-
- <p>An out-of-bounds (OOB) write vulnerability has been detected in
- crypto_rsa_common in libfreerdp/crypto/crypto.c.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.1.0~git20140921.1.440916e+dfsg1-13+deb9u4.</p>
-
-<p>We recommend that you upgrade your freerdp packages.</p>
-
-<p>For the detailed security status of freerdp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freerdp">https://security-tracker.debian.org/tracker/freerdp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2356.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2357.data b/english/lts/security/2020/dla-2357.data
deleted file mode 100644
index 64ad3a337b0..00000000000
--- a/english/lts/security/2020/dla-2357.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2357-1 ros-actionlib</define-tag>
-<define-tag report_date>2020-08-30</define-tag>
-<define-tag secrefs>CVE-2020-10289</define-tag>
-<define-tag packages>ros-actionlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2357.wml b/english/lts/security/2020/dla-2357.wml
deleted file mode 100644
index 9e28ff0cd31..00000000000
--- a/english/lts/security/2020/dla-2357.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Use of unsafe yaml load was fixed in ros-actionlib.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.11.7-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ros-actionlib packages.</p>
-
-<p>For the detailed security status of ros-actionlib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ros-actionlib">https://security-tracker.debian.org/tracker/ros-actionlib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2357.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2358.data b/english/lts/security/2020/dla-2358.data
deleted file mode 100644
index fa7d7cffa15..00000000000
--- a/english/lts/security/2020/dla-2358.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2358-1 openexr</define-tag>
-<define-tag report_date>2020-08-30</define-tag>
-<define-tag secrefs>CVE-2017-9110 CVE-2017-9111 CVE-2017-9112 CVE-2017-9113 CVE-2017-9114 CVE-2017-9115 CVE-2017-9116 CVE-2017-12596 CVE-2020-11758 CVE-2020-11759 CVE-2020-11760 CVE-2020-11761 CVE-2020-11762 CVE-2020-11763 CVE-2020-11764 CVE-2020-11765 CVE-2020-15305 CVE-2020-15306</define-tag>
-<define-tag packages>openexr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2358.wml b/english/lts/security/2020/dla-2358.wml
deleted file mode 100644
index ccdcd417722..00000000000
--- a/english/lts/security/2020/dla-2358.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in the OpenEXR image library, which could result in denial of service and potentially the execution of arbitrary code when processing malformed EXR image files.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.2.0-11+deb9u1.</p>
-
-<p>We recommend that you upgrade your openexr packages.</p>
-
-<p>For the detailed security status of openexr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openexr">https://security-tracker.debian.org/tracker/openexr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2358.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2359.data b/english/lts/security/2020/dla-2359.data
deleted file mode 100644
index fc32a8a339c..00000000000
--- a/english/lts/security/2020/dla-2359.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2359-1 xorg-server</define-tag>
-<define-tag report_date>2020-8-30</define-tag>
-<define-tag secrefs>CVE-2020-14345 CVE-2020-14346 CVE-2020-14347 CVE-2020-14361 CVE-2020-14362</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2359.wml b/english/lts/security/2020/dla-2359.wml
deleted file mode 100644
index 68c6e227ca1..00000000000
--- a/english/lts/security/2020/dla-2359.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in xorg-server, the X server from xorg.
-Basically all issues are out-of-bounds access or integer underflows in
-different request handlers. One CVE is about a leak of uninitialize heap
-memory to clients.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:1.19.2-1+deb9u6.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2359.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2360.data b/english/lts/security/2020/dla-2360.data
deleted file mode 100644
index e61b933f336..00000000000
--- a/english/lts/security/2020/dla-2360.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2360-1 thunderbird</define-tag>
-<define-tag report_date>2020-08-31</define-tag>
-<define-tag secrefs>CVE-2020-15664 CVE-2020-15669</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2360.wml b/english/lts/security/2020/dla-2360.wml
deleted file mode 100644
index 8ba080fcb17..00000000000
--- a/english/lts/security/2020/dla-2360.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird which could
-result in the execution of arbitrary code or the unintended installation
-of extensions.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:68.12.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2360.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2361.data b/english/lts/security/2020/dla-2361.data
deleted file mode 100644
index 74ea9ac09ee..00000000000
--- a/english/lts/security/2020/dla-2361.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2361-1 libx11</define-tag>
-<define-tag report_date>2020-09-01</define-tag>
-<define-tag secrefs>CVE-2020-14363 Bug#969008</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2361.wml b/english/lts/security/2020/dla-2361.wml
deleted file mode 100644
index 8b74fdc2283..00000000000
--- a/english/lts/security/2020/dla-2361.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jayden Rivers found an integer overflow in the init_om function of
-libX11, the X11 client-side library, which could lead to a double
-free.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:1.6.4-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>For the detailed security status of libx11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libx11">https://security-tracker.debian.org/tracker/libx11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2361.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2362.data b/english/lts/security/2020/dla-2362.data
deleted file mode 100644
index ca0001a1baf..00000000000
--- a/english/lts/security/2020/dla-2362.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2362-1 uwsgi</define-tag>
-<define-tag report_date>2020-09-03</define-tag>
-<define-tag secrefs>CVE-2020-11984</define-tag>
-<define-tag packages>uwsgi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2362.wml b/english/lts/security/2020/dla-2362.wml
deleted file mode 100644
index bd0552dfc1d..00000000000
--- a/english/lts/security/2020/dla-2362.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apache HTTP Server versions before 2.4.32 uses src:uwsgi where a flaw
-was discovered. The uwsgi protocol does not let us serialize more
-than 16K of HTTP header leading to resource exhaustion and denial of
-service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.0.14+20161117-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your uwsgi packages.</p>
-
-<p>For the detailed security status of uwsgi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/uwsgi">https://security-tracker.debian.org/tracker/uwsgi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2362.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2363.data b/english/lts/security/2020/dla-2363.data
deleted file mode 100644
index 34011127b5f..00000000000
--- a/english/lts/security/2020/dla-2363.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2363-1 asyncpg</define-tag>
-<define-tag report_date>2020-09-03</define-tag>
-<define-tag secrefs>CVE-2020-17446</define-tag>
-<define-tag packages>asyncpg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2363.wml b/english/lts/security/2020/dla-2363.wml
deleted file mode 100644
index 9d67927b2cf..00000000000
--- a/english/lts/security/2020/dla-2363.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger
-a crash or execute arbitrary code (on a database client) via a crafted
-server response, because of access to an uninitialized pointer in the
-array data decoder.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.8.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your asyncpg packages.</p>
-
-<p>For the detailed security status of asyncpg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/asyncpg">https://security-tracker.debian.org/tracker/asyncpg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2363.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2364.data b/english/lts/security/2020/dla-2364.data
deleted file mode 100644
index 1e2e7ca75e7..00000000000
--- a/english/lts/security/2020/dla-2364.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2364-1 netty</define-tag>
-<define-tag report_date>2020-09-04</define-tag>
-<define-tag secrefs>CVE-2019-20444 CVE-2019-20445 CVE-2020-7238 CVE-2020-11612 Bug#950966 Bug#950967</define-tag>
-<define-tag packages>netty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2364.wml b/english/lts/security/2020/dla-2364.wml
deleted file mode 100644
index 2e7a5929097..00000000000
--- a/english/lts/security/2020/dla-2364.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in netty, a Java NIO
-client/server socket framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20444">CVE-2019-20444</a>
-
- <p>HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header
- that lacks a colon, which might be interpreted as a separate header
- with an incorrect syntax, or might be interpreted as an "invalid
- fold."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20445">CVE-2019-20445</a>
-
- <p>HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length
- header to be accompanied by a second Content-Length header, or by a
- Transfer-Encoding header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7238">CVE-2020-7238</a>
-
- <p>Netty 4.1.43.Final allows HTTP Request Smuggling because it
- mishandles Transfer-Encoding whitespace (such as a
- [space]Transfer-Encoding:chunked line) and a later Content-Length
- header. This issue exists because of an incomplete fix for
- <a href="https://security-tracker.debian.org/tracker/CVE-2019-16869">CVE-2019-16869</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11612">CVE-2020-11612</a>
-
- <p>The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded
- memory allocation while decoding a ZlibEncoded byte stream. An
- attacker could send a large ZlibEncoded byte stream to the Netty
- server, forcing the server to allocate all of its free memory to a
- single decoder.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:4.1.7-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your netty packages.</p>
-
-<p>For the detailed security status of netty please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/netty">https://security-tracker.debian.org/tracker/netty</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2364.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2365.data b/english/lts/security/2020/dla-2365.data
deleted file mode 100644
index e556679ac8c..00000000000
--- a/english/lts/security/2020/dla-2365.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2365-1 netty-3.9</define-tag>
-<define-tag report_date>2020-09-04</define-tag>
-<define-tag secrefs>CVE-2019-16869 CVE-2019-20444 CVE-2019-20445 Bug#941266 Bug#950966 Bug#950967</define-tag>
-<define-tag packages>netty-3.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2365.wml b/english/lts/security/2020/dla-2365.wml
deleted file mode 100644
index 2c7e3182c0a..00000000000
--- a/english/lts/security/2020/dla-2365.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in netty-3.9, a Java NIO
-client/server socket framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16869">CVE-2019-16869</a>
-
- <p>Netty before 4.1.42.Final mishandles whitespace before the colon in
- HTTP headers (such as a "Transfer-Encoding : chunked" line), which
- leads to HTTP request smuggling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20444">CVE-2019-20444</a>
-
- <p>HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header
- that lacks a colon, which might be interpreted as a separate header
- with an incorrect syntax, or might be interpreted as an "invalid
- fold."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20445">CVE-2019-20445</a>
-
- <p>HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length
- header to be accompanied by a second Content-Length header, or by a
- Transfer-Encoding header.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.9.9.Final-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your netty-3.9 packages.</p>
-
-<p>For the detailed security status of netty-3.9 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/netty-3.9">https://security-tracker.debian.org/tracker/netty-3.9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2365.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2366.data b/english/lts/security/2020/dla-2366.data
deleted file mode 100644
index b05e1d78179..00000000000
--- a/english/lts/security/2020/dla-2366.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2366-1 imagemagick</define-tag>
-<define-tag report_date>2020-9-7</define-tag>
-<define-tag secrefs>CVE-2017-12140 CVE-2017-12429 CVE-2017-12430 CVE-2017-12435 CVE-2017-12563 CVE-2017-12643 CVE-2017-12670 CVE-2017-12674 CVE-2017-12691 CVE-2017-12692 CVE-2017-12693 CVE-2017-12806 CVE-2017-12875 CVE-2017-13061 CVE-2017-13133 CVE-2017-13658 CVE-2017-13768 CVE-2017-14060 CVE-2017-14172 CVE-2017-14173 CVE-2017-14174 CVE-2017-14175 CVE-2017-14249 CVE-2017-14341 CVE-2017-14400 CVE-2017-14505 CVE-2017-14532 CVE-2017-14624 CVE-2017-14625 CVE-2017-14626 CVE-2017-14739 CVE-2017-14741 CVE-2017-15015 CVE-2017-15017 CVE-2017-15281 CVE-2017-17682 CVE-2017-17914 CVE-2017-18209 CVE-2017-18211 CVE-2017-18271 CVE-2017-18273 CVE-2017-1000445 CVE-2017-1000476 CVE-2018-16643 CVE-2018-16749 CVE-2018-18025 CVE-2019-11598 CVE-2019-13135 CVE-2019-13308 CVE-2019-13391 CVE-2019-15139 Bug#870020 Bug#870019 Bug#876105 Bug#869727 Bug#886281 Bug#873059 Bug#870504</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2366.wml b/english/lts/security/2020/dla-2366.wml
deleted file mode 100644
index f45cf796bb8..00000000000
--- a/english/lts/security/2020/dla-2366.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Debian Bug : 870020 870019 876105 869727 886281 873059 870504
- 870530 870107 872609 875338 875339 875341 873871
- 873131 875352 878506 875503 875502 876105 876099
- 878546 878545 877354 877355 878524 878547 878548
- 878555 878554 878548 878555 878554 878579 885942
- 886584 928206 941670 931447 932079</p>
-
-<p>Several security vulnerabilities were found in Imagemagick. Various
-memory handling problems and cases of missing or incomplete input
-sanitizing may result in denial of service, memory or CPU exhaustion,
-information disclosure or potentially the execution of arbitrary code
-when a malformed image file is processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8:6.9.7.4+dfsg-11+deb9u10.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2366.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2367.data b/english/lts/security/2020/dla-2367.data
deleted file mode 100644
index a8206852379..00000000000
--- a/english/lts/security/2020/dla-2367.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2367-1 lemonldap-ng</define-tag>
-<define-tag report_date>2020-9-7</define-tag>
-<define-tag secrefs>CVE-2020-24660</define-tag>
-<define-tag packages>lemonldap-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2367.wml b/english/lts/security/2020/dla-2367.wml
deleted file mode 100644
index b45f3e722de..00000000000
--- a/english/lts/security/2020/dla-2367.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>lemonldap-ng community fixed a vulnerability in the Nginx default
-configuration files (<a href="https://security-tracker.debian.org/tracker/CVE-2020-24660">CVE-2020-24660</a>).
-Debian package does not install any default site, but documentation
-provided insecure examples in Nginx configuration before this version.
-If you use lemonldap-ng handler with Nginx, you should verify your
-configuration files.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.9.7-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your lemonldap-ng packages.</p>
-
-<p>For the detailed security status of lemonldap-ng please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/lemonldap-ng">https://security-tracker.debian.org/tracker/lemonldap-ng</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2367.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2368.data b/english/lts/security/2020/dla-2368.data
deleted file mode 100644
index e41cc4824a2..00000000000
--- a/english/lts/security/2020/dla-2368.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2368-1 grunt</define-tag>
-<define-tag report_date>2020-09-09</define-tag>
-<define-tag secrefs>CVE-2020-7729</define-tag>
-<define-tag packages>grunt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2368.wml b/english/lts/security/2020/dla-2368.wml
deleted file mode 100644
index 0b401dccbdd..00000000000
--- a/english/lts/security/2020/dla-2368.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an arbitrary code execution vulnerability
-in <a href="https://gruntjs.com/">Grunt</a>, a Javascript task runner. This was
-possible due to the unsafe loading of YAML documents.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7729">CVE-2020-7729</a>
-
- <p>The package grunt before 1.3.0 are vulnerable to Arbitrary Code
- Execution due to the default usage of the function load() instead of its
- secure replacement safeLoad() of the package js-yaml inside
- grunt.file.readYAML.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.0.1-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your grunt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2368.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2369.data b/english/lts/security/2020/dla-2369.data
deleted file mode 100644
index 5fd75aa4c6c..00000000000
--- a/english/lts/security/2020/dla-2369.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2369-1 libxml2</define-tag>
-<define-tag report_date>2020-9-10</define-tag>
-<define-tag secrefs>CVE-2017-8872 CVE-2017-18258 CVE-2018-14404 CVE-2018-14567 CVE-2019-19956 CVE-2019-20388 CVE-2020-7595 CVE-2020-24977 Bug#895245 Bug#862450 Bug#949583 Bug#969529 Bug#949582</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2369.wml b/english/lts/security/2020/dla-2369.wml
deleted file mode 100644
index 228c667afc4..00000000000
--- a/english/lts/security/2020/dla-2369.wml
+++ /dev/null
@@ -1,70 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were corrected in libxml2, the GNOME
-XML library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-8872">CVE-2017-8872</a>
-
- <p>Global buffer-overflow in the htmlParseTryOrFinish function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18258">CVE-2017-18258</a>
-
- <p>The xz_head function in libxml2 allows remote attackers to cause a
- denial of service (memory consumption) via a crafted LZMA file,
- because the decoder functionality does not restrict memory usage to
- what is required for a legitimate file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14404">CVE-2018-14404</a>
-
- <p>A NULL pointer dereference vulnerability exists in the
- xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing an
- invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case.
- Applications processing untrusted XSL format inputs may be
- vulnerable to a denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14567">CVE-2018-14567</a>
-
- <p>If the option --with-lzma is used, allows remote attackers to cause
- a denial of service (infinite loop) via a crafted XML file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19956">CVE-2019-19956</a>
-
- <p>The xmlParseBalancedChunkMemoryRecover function has a memory leak
- related to newDoc-&gt;oldNs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20388">CVE-2019-20388</a>
-
- <p>A memory leak was found in the xmlSchemaValidateStream function of
- libxml2. Applications that use this library may be vulnerable to
- memory not being freed leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7595">CVE-2020-7595</a>
-
- <p>Infinite loop in xmlStringLenDecodeEntities can cause a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24977">CVE-2020-24977</a>
-
- <p>Out-of-bounds read restricted to xmllint --htmlout.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.9.4+dfsg1-2.2+deb9u3.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2369.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2370.data b/english/lts/security/2020/dla-2370.data
deleted file mode 100644
index ecb7f6ed310..00000000000
--- a/english/lts/security/2020/dla-2370.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2370-1 python-pip</define-tag>
-<define-tag report_date>2020-09-11</define-tag>
-<define-tag secrefs>CVE-2019-20916</define-tag>
-<define-tag packages>python-pip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2370.wml b/english/lts/security/2020/dla-2370.wml
deleted file mode 100644
index 20114ea1595..00000000000
--- a/english/lts/security/2020/dla-2370.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a directory traversal attack in pip, the
-Python package installer.</p>
-
-<p>When an URL was given in an install command, as a
-<tt>Content-Disposition</tt> header was permitted to have <tt>../</tt>
-components in their filename, arbitrary local files (eg.
-<tt>/root/.ssh/authorized_keys</tt>) could be overidden.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20916">CVE-2019-20916</a>
-
- <p>The pip package before 19.2 for Python allows Directory Traversal when a
- URL is given in an install command, because a Content-Disposition header
- can have ../ in a filename, as demonstrated by overwriting the
- /root/.ssh/authorized_keys file. This occurs in _download_http_url in
- _internal/download.py.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-9.0.1-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your python-pip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2370.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2371.data b/english/lts/security/2020/dla-2371.data
deleted file mode 100644
index 024769fd863..00000000000
--- a/english/lts/security/2020/dla-2371.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2371-1 wordpress</define-tag>
-<define-tag report_date>2020-09-11</define-tag>
-<define-tag secrefs>CVE-2019-17670 CVE-2020-4047 CVE-2020-4048 CVE-2020-4049 CVE-2020-4050 Bug#942459 Bug#962685</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2371.wml b/english/lts/security/2020/dla-2371.wml
deleted file mode 100644
index 723e69118c9..00000000000
--- a/english/lts/security/2020/dla-2371.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Wordpress, a popular
-content management framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17670">CVE-2019-17670</a>
-
- <p>WordPress has a Server Side Request Forgery (SSRF) vulnerability
- because Windows paths are mishandled during certain validation of
- relative URLs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4047">CVE-2020-4047</a>
-
- <p>Authenticated users with upload permissions (like authors) are
- able to inject JavaScript into some media file attachment pages in
- a certain way. This can lead to script execution in the context of
- a higher privileged user when the file is viewed by them.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4048">CVE-2020-4048</a>
-
- <p>Due to an issue in wp_validate_redirect() and URL sanitization, an
- arbitrary external link can be crafted leading to unintended/open
- redirect when clicked.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4049">CVE-2020-4049</a>
-
- <p>When uploading themes, the name of the theme folder can be crafted
- in a way that could lead to JavaScript execution in /wp-admin on
- the themes page.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4050">CVE-2020-4050</a>
-
- <p>Misuse of the `set-screen-option` filter's return value allows
- arbitrary user meta fields to be saved. It does require an admin
- to install a plugin that would misuse the filter. Once installed,
- it can be leveraged by low privileged users.</p></li>
-
-</ul>
-
-<p>Additionally, this upload ensures latest comments can only be viewed
-from public posts, and fixes back the user activation procedure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.7.18+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2371.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2372.data b/english/lts/security/2020/dla-2372.data
deleted file mode 100644
index 4bc87ec536f..00000000000
--- a/english/lts/security/2020/dla-2372.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2372-1 libproxy</define-tag>
-<define-tag report_date>2020-09-12</define-tag>
-<define-tag secrefs>CVE-2020-25219</define-tag>
-<define-tag packages>libproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2372.wml b/english/lts/security/2020/dla-2372.wml
deleted file mode 100644
index 7a0d4fb503b..00000000000
--- a/english/lts/security/2020/dla-2372.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial of service attack in libproxy, a
-library to make applications HTTP proxy aware. A remote server could cause an
-infinite stack recursion.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25219">CVE-2020-25219</a>
-
- <p>url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a
- remote HTTP server to trigger uncontrolled recursion via a response
- composed of an infinite stream that lacks a newline character. This leads
- to stack exhaustion.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.4.14-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libproxy packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2372.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2373.data b/english/lts/security/2020/dla-2373.data
deleted file mode 100644
index 5ad77a1337d..00000000000
--- a/english/lts/security/2020/dla-2373.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2373-1 qemu</define-tag>
-<define-tag report_date>2020-09-14</define-tag>
-<define-tag secrefs>CVE-2020-1711 CVE-2020-13253 CVE-2020-14364 CVE-2020-16092 Bug#968947 Bug#961297 Bug#949731</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2373.wml b/english/lts/security/2020/dla-2373.wml
deleted file mode 100644
index 478baa53d1b..00000000000
--- a/english/lts/security/2020/dla-2373.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following security issues have been found in qemu, which could
-potentially result in DoS and execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1711">CVE-2020-1711</a>
-
- <p>An out-of-bounds heap buffer access flaw was found in the way the iSCSI
- Block driver in QEMU handled a response coming from an iSCSI server
- while checking the status of a Logical Address Block (LBA) in an
- iscsi_co_block_status() routine. A remote user could use this flaw to
- crash the QEMU process, resulting in a denial of service or potential
- execution of arbitrary code with privileges of the QEMU process on the
- host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13253">CVE-2020-13253</a>
-
- <p>An out-of-bounds read access issue was found in the SD Memory Card
- emulator of the QEMU. It occurs while performing block write commands
- via sdhci_write(), if a guest user has sent <q>address</q> which is OOB of
- 's->wp_groups'. A guest user/process may use this flaw to crash the
- QEMU process resulting in DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14364">CVE-2020-14364</a>
-
- <p>An out-of-bounds read/write access issue was found in the USB emulator
- of the QEMU. It occurs while processing USB packets from a guest, when
- 'USBDevice->setup_len' exceeds the USBDevice->data_buf[4096], in
- do_token_{in,out} routines.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16092">CVE-2020-16092</a>
-
- <p>An assertion failure can occur in the network packet processing. This
- issue affects the e1000e and vmxnet3 network devices. A malicious guest
- user/process could use this flaw to abort the QEMU process on the host,
- resulting in a denial of service condition in
- net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u11.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2373.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2374.data b/english/lts/security/2020/dla-2374.data
deleted file mode 100644
index b5cdc3593e3..00000000000
--- a/english/lts/security/2020/dla-2374.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2374-1 gnome-shell</define-tag>
-<define-tag report_date>2020-09-15</define-tag>
-<define-tag secrefs>CVE-2020-17489</define-tag>
-<define-tag packages>gnome-shell</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2374.wml b/english/lts/security/2020/dla-2374.wml
deleted file mode 100644
index e0cd5a7fea3..00000000000
--- a/english/lts/security/2020/dla-2374.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue around revealing passwords in the
-<tt>gnome-shell</tt> component of the GNOME desktop.</p>
-
-<p>In certain configurations, when logging out of an account the password box
-from the login dialog could reappear with the password visible in
-cleartext.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17489">CVE-2020-17489</a>
-
- <p>An issue was discovered in certain configurations of GNOME gnome-shell
- through 3.36.4. When logging out of an account, the password box from the
- login dialog reappears with the password still visible. If the user had
- decided to have the password shown in cleartext at login time, it is then
- visible for a brief moment upon a logout. (If the password were never shown
- in cleartext, only the password length is revealed.)</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-3.22.3-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your gnome-shell packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2374.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2375.data b/english/lts/security/2020/dla-2375.data
deleted file mode 100644
index 02838f2942d..00000000000
--- a/english/lts/security/2020/dla-2375.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2375-1 inspircd</define-tag>
-<define-tag report_date>2020-09-20</define-tag>
-<define-tag secrefs>CVE-2019-20917 CVE-2020-25269</define-tag>
-<define-tag packages>inspircd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2375.wml b/english/lts/security/2020/dla-2375.wml
deleted file mode 100644
index d45ceb2c448..00000000000
--- a/english/lts/security/2020/dla-2375.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were discovered in the modules of the InspIRCd IRC daemon, which could result in denial of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20917">CVE-2019-20917</a>
-
- <p>mysql module before v3.3.0 contains a null pointer dereference when
- built against mariadb-connector-c. When combined with the sqlauth or
- sqloper modules this vulnerability can be used to remotely crash an
- InspIRCd server by any user able to connect to a server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25269">CVE-2020-25269</a>
-
- <p>The pgsql module contains a use after free vulnerability. When combined
- with the sqlauth or sqloper modules this vulnerability can be used to
- remotely crash an InspIRCd server by any user able to connect to a
- server.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.0.23-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your inspircd packages.</p>
-
-<p>For the detailed security status of inspircd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/inspircd">https://security-tracker.debian.org/tracker/inspircd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2375.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2376.data b/english/lts/security/2020/dla-2376.data
deleted file mode 100644
index 72a622478b5..00000000000
--- a/english/lts/security/2020/dla-2376.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2376-1 qtbase-opensource-src</define-tag>
-<define-tag report_date>2020-09-28</define-tag>
-<define-tag secrefs>CVE-2018-19872 CVE-2020-17507</define-tag>
-<define-tag packages>qtbase-opensource-src</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2376.wml b/english/lts/security/2020/dla-2376.wml
deleted file mode 100644
index 72d761300da..00000000000
--- a/english/lts/security/2020/dla-2376.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the Qt toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19872">CVE-2018-19872</a>
-
- <P>A malformed PPM image causes a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17507">CVE-2020-17507</a>
-
- <p>Buffer over-read in the XBM parser.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.7.1+dfsg-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your qtbase-opensource-src packages.</p>
-
-<p>For the detailed security status of qtbase-opensource-src please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qtbase-opensource-src">https://security-tracker.debian.org/tracker/qtbase-opensource-src</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2376.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2377.data b/english/lts/security/2020/dla-2377.data
deleted file mode 100644
index 4d5390bd3ab..00000000000
--- a/english/lts/security/2020/dla-2377.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2377-1 qt4-x11</define-tag>
-<define-tag report_date>2020-09-28</define-tag>
-<define-tag secrefs>CVE-2018-15518 CVE-2018-19869 CVE-2018-19870 CVE-2018-19871 CVE-2018-19872 CVE-2018-19873 CVE-2020-17507</define-tag>
-<define-tag packages>qt4-x11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2377.wml b/english/lts/security/2020/dla-2377.wml
deleted file mode 100644
index fb4347c0172..00000000000
--- a/english/lts/security/2020/dla-2377.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in qt4-x11, the legacy version
-of the Qt toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15518">CVE-2018-15518</a>
-
- <p>Double-free or corruption in QXmlStreamReader
- during parsing of a specially crafted illegal XML document.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19869">CVE-2018-19869</a>
-
- <p>A malformed SVG image causes a segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19870">CVE-2018-19870</a>
-
- <p>A malformed GIF image causes a NULL pointer
- dereference in QGifHandler resulting in a segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19871">CVE-2018-19871</a>
-
- <p>Uncontrolled Resource Consumption in QTgaFile.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19872">CVE-2018-19872</a>
-
- <p>A malformed PPM image causes a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19873">CVE-2018-19873</a>
-
- <p>QBmpHandler segfault on malformed BMP file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17507">CVE-2020-17507</a>
-
- <p>Buffer over-read in the XBM parser.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4:4.8.7+dfsg-11+deb9u1.</p>
-
-<p>We recommend that you upgrade your qt4-x11 packages.</p>
-
-<p>For the detailed security status of qt4-x11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qt4-x11">https://security-tracker.debian.org/tracker/qt4-x11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2377.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2378.data b/english/lts/security/2020/dla-2378.data
deleted file mode 100644
index 34ed6aaa07f..00000000000
--- a/english/lts/security/2020/dla-2378.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2378-1 openssl1.0</define-tag>
-<define-tag report_date>2020-09-25</define-tag>
-<define-tag secrefs>CVE-2020-1968</define-tag>
-<define-tag packages>openssl1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2378.wml b/english/lts/security/2020/dla-2378.wml
deleted file mode 100644
index 82a3d8dbb38..00000000000
--- a/english/lts/security/2020/dla-2378.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Robert Merget, Marcus Brinkmann, Nimrod Aviram, and Juraj Somorovsky
-discovered that certain Diffie-Hellman ciphersuites in the TLS
-specification and implemented by OpenSSL contained a flaw. A remote
-attacker could possibly use this issue to eavesdrop on encrypted
-communications. This was fixed in this update by disabling the insecure
-ciphersuites.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.2u-1~deb9u2.</p>
-
-<p>We recommend that you upgrade your openssl1.0 packages.</p>
-
-<p>For the detailed security status of openssl1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2378.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2379-2.data b/english/lts/security/2020/dla-2379-2.data
deleted file mode 100644
index 24cd95261a6..00000000000
--- a/english/lts/security/2020/dla-2379-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2379-2 mediawiki</define-tag>
-<define-tag report_date>2020-09-28</define-tag>
-<define-tag secrefs>Bug#971264</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2379-2.wml b/english/lts/security/2020/dla-2379-2.wml
deleted file mode 100644
index e5c0da473d5..00000000000
--- a/english/lts/security/2020/dla-2379-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of mediawiki released as DLA-2379-1 contained a defect in the
-patch for <a href="https://security-tracker.debian.org/tracker/CVE-2020-25827">CVE-2020-25827</a> which caused all pages to fail to render,
-producing instead a syntax error. Updated mediawiki packages are now
-available to correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.27.7-1~deb9u5.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2379-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2379-3.data b/english/lts/security/2020/dla-2379-3.data
deleted file mode 100644
index d0c268d7eb5..00000000000
--- a/english/lts/security/2020/dla-2379-3.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2379-3 mediawiki</define-tag>
-<define-tag report_date>2020-11-21</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2379-3.wml b/english/lts/security/2020/dla-2379-3.wml
deleted file mode 100644
index bd22637f635..00000000000
--- a/english/lts/security/2020/dla-2379-3.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of mediawiki released as DLA-2379-2 contained a defect in the
-patch for <a href="https://security-tracker.debian.org/tracker/CVE-2020-25827">CVE-2020-25827</a> which resulted from a possible use of an
-uninitialized variable. Updated mediawiki packages are now available to
-correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.27.7-1~deb9u6.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2379-3.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2379.data b/english/lts/security/2020/dla-2379.data
deleted file mode 100644
index 9e64844be32..00000000000
--- a/english/lts/security/2020/dla-2379.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2379-1 mediawiki</define-tag>
-<define-tag report_date>2020-09-25</define-tag>
-<define-tag secrefs>CVE-2020-25813 CVE-2020-25814 CVE-2020-25827 CVE-2020-25828</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2379.wml b/english/lts/security/2020/dla-2379.wml
deleted file mode 100644
index 0076e2b6eb4..00000000000
--- a/english/lts/security/2020/dla-2379.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in MediaWiki, a website engine
-for collaborative work: SpecialUserRights could leak whether a user
-existed or not, multiple code paths lacked HTML sanitisation allowing
-for cross-site scripting and TOTP validation applied insufficient rate
-limiting against brute force attempts.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.27.7-1~deb9u4.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2379.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2380.data b/english/lts/security/2020/dla-2380.data
deleted file mode 100644
index 65e45000a6c..00000000000
--- a/english/lts/security/2020/dla-2380.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2380-1 ruby-gon</define-tag>
-<define-tag report_date>2020-09-26</define-tag>
-<define-tag secrefs>CVE-2020-25739</define-tag>
-<define-tag packages>ruby-gon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2380.wml b/english/lts/security/2020/dla-2380.wml
deleted file mode 100644
index e31854cb862..00000000000
--- a/english/lts/security/2020/dla-2380.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability
-in ruby-gon, a Ruby library to send/convert data to Javascript from a Ruby
-application. </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25739">CVE-2020-25739</a>
-
- <p>An issue was discovered in the gon gem before gon-6.4.0 for Ruby.
- MultiJson does not honor the escape_mode parameter to escape fields as an
- XSS protection mechanism. To mitigate, json_dumper.rb in gon now does
- escaping for XSS by default without relying on MultiJson.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-6.1.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-gon packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2380.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2381.data b/english/lts/security/2020/dla-2381.data
deleted file mode 100644
index 992a8887edb..00000000000
--- a/english/lts/security/2020/dla-2381.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2381-1 lua5.3</define-tag>
-<define-tag report_date>2020-09-26</define-tag>
-<define-tag secrefs>CVE-2020-24370</define-tag>
-<define-tag packages>lua5.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2381.wml b/english/lts/security/2020/dla-2381.wml
deleted file mode 100644
index b76ebb663a4..00000000000
--- a/english/lts/security/2020/dla-2381.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in lua5.3, a simple, extensible,
-embeddable programming language whereby a negation overflow and
-segmentation fault could be triggered in getlocal and setlocal, as
-demonstrated by getlocal(3,2^31).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.3.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your lua5.3 packages.</p>
-
-<p>For the detailed security status of lua5.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lua5.3">https://security-tracker.debian.org/tracker/lua5.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2381.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2382.data b/english/lts/security/2020/dla-2382.data
deleted file mode 100644
index a73f53c77ee..00000000000
--- a/english/lts/security/2020/dla-2382.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2382-1 curl</define-tag>
-<define-tag report_date>2020-9-26</define-tag>
-<define-tag secrefs>CVE-2020-8231</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2382.wml b/english/lts/security/2020/dla-2382.wml
deleted file mode 100644
index 36bf39a994f..00000000000
--- a/english/lts/security/2020/dla-2382.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in curl, a command line tool for transferring data
-with URL syntax.
-In rare circumstances, when using the multi API of curl in combination
-with CURLOPT_CONNECT_ONLY, the wrong connection might be used when
-transfering data later.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.52.1-5+deb9u12.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2382.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2383.data b/english/lts/security/2020/dla-2383.data
deleted file mode 100644
index 7d0f120935d..00000000000
--- a/english/lts/security/2020/dla-2383.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2383-1 nfdump</define-tag>
-<define-tag report_date>2020-9-26</define-tag>
-<define-tag secrefs>CVE-2019-14459 CVE-2019-1010057</define-tag>
-<define-tag packages>nfdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2383.wml b/english/lts/security/2020/dla-2383.wml
deleted file mode 100644
index b8b16af10d3..00000000000
--- a/english/lts/security/2020/dla-2383.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in nfdump, a netflow capture daemon.
-Both issues are related to either a buffer overflow or an integer
-overflow, which could result in a denial of service or a local code
-execution.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.6.15-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your nfdump packages.</p>
-
-<p>For the detailed security status of nfdump please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nfdump">https://security-tracker.debian.org/tracker/nfdump</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2383.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2384.data b/english/lts/security/2020/dla-2384.data
deleted file mode 100644
index a58f0492b45..00000000000
--- a/english/lts/security/2020/dla-2384.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2384-1 yaws</define-tag>
-<define-tag report_date>2020-9-26</define-tag>
-<define-tag secrefs>CVE-2020-24379 CVE-2020-24916</define-tag>
-<define-tag packages>yaws</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2384.wml b/english/lts/security/2020/dla-2384.wml
deleted file mode 100644
index 73e4f1c4d81..00000000000
--- a/english/lts/security/2020/dla-2384.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in yaws, a high performance HTTP 1.1 webserver
-written in Erlang.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24379">CVE-2020-24379</a>
-
- <p>Reject external resource requests in DAV in order to avoid
- XML External Entity (XXE) attackes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24916">CVE-2020-24916</a>
-
- <p>Sanitize CGI executable in order to avoid command injection
- via CGI requests.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.0.4+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your yaws packages.</p>
-
-<p>For the detailed security status of yaws please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/yaws">https://security-tracker.debian.org/tracker/yaws</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2384.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2385.data b/english/lts/security/2020/dla-2385.data
deleted file mode 100644
index fc09cb6ecd2..00000000000
--- a/english/lts/security/2020/dla-2385.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2385-1 linux-4.19</define-tag>
-<define-tag report_date>2020-09-28</define-tag>
-<define-tag secrefs>CVE-2019-3874 CVE-2019-19448 CVE-2019-19813 CVE-2019-19816 CVE-2020-10781 CVE-2020-12888 CVE-2020-14314 CVE-2020-14331 CVE-2020-14356 CVE-2020-14385 CVE-2020-14386 CVE-2020-14390 CVE-2020-16166 CVE-2020-25212 CVE-2020-25284 CVE-2020-25285 CVE-2020-25641 CVE-2020-26088 Bug#966846 Bug#966917 Bug#968567</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2385.wml b/english/lts/security/2020/dla-2385.wml
deleted file mode 100644
index 7a14844ffaf..00000000000
--- a/english/lts/security/2020/dla-2385.wml
+++ /dev/null
@@ -1,155 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3874">CVE-2019-3874</a>
-
- <p>Kernel buffers allocated by the SCTP network protocol were not
- limited by the memory cgroup controller. A local user could
- potentially use this to evade container memory limits and to cause
- a denial of service (excessive memory use).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19448">CVE-2019-19448</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19813">CVE-2019-19813</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19816">CVE-2019-19816</a>
-
- <p><q>Team bobfuzzer</q> reported bugs in Btrfs that could lead to a
- use-after-free or heap buffer overflow, and could be triggered by
- crafted filesystem images. A user permitted to mount and access
- arbitrary filesystems could use these to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10781">CVE-2020-10781</a>
-
- <p>Luca Bruno of Red Hat discovered that the zram control file
- /sys/class/zram-control/hot_add was readable by all users. On a
- system with zram enabled, a local user could use this to cause a
- denial of service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12888">CVE-2020-12888</a>
-
- <p>It was discovered that the PCIe Virtual Function I/O (vfio-pci)
- driver allowed users to disable a device's memory space while it
- was still mapped into a process. On some hardware platforms,
- local users or guest virtual machines permitted to access PCIe
- Virtual Functions could use this to cause a denial of service
- (hardware error and crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14314">CVE-2020-14314</a>
-
- <p>A bug was discovered in the ext4 filesystem that could lead to an
- out-of-bound read. A local user permitted to mount and access
- arbitrary filesystem images could use this to cause a denial of
- service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14331">CVE-2020-14331</a>
-
- <p>A bug was discovered in the VGA console driver's soft-scrollback
- feature that could lead to a heap buffer overflow. On a system
- with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK
- enabled, a local user with access to a console could use this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14356">CVE-2020-14356</a>
-
- <p>A bug was discovered in the cgroup subsystem's handling of socket
- references to cgroups. In some cgroup configurations, this could
- lead to a use-after-free. A local user might be able to use this
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14385">CVE-2020-14385</a>
-
- <p>A bug was discovered in XFS, which could lead to an extended
- attribute (xattr) wrongly being detected as invalid. A local user
- with access to an XFS filesystem could use this to cause a denial
- of service (filesystem shutdown).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14386">CVE-2020-14386</a>
-
- <p>Or Cohen discovered a bug in the packet socket (AF_PACKET)
- implementation which could lead to a heap buffer overflow. A
- local user with the CAP_NET_RAW capability (in any user namespace)
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14390">CVE-2020-14390</a>
-
- <p>Minh Yuan discovered a bug in the framebuffer console driver's
- scrollback feature that could lead to a heap buffer overflow. On
- a system using framebuffer consoles, a local user with access to a
- console could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p>
-
- <p>The scrollback feature has been disabled for now, as no other fix
- was available for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16166">CVE-2020-16166</a>
-
- <p>Amit Klein reported that the random number generator used by the
- network stack might not be re-seeded for long periods of time,
- making e.g. client port number allocations more predictable. This
- made it easier for remote attackers to carry out some network-based
- attacks such as DNS cache poisoning or device tracking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25212">CVE-2020-25212</a>
-
- <p>A bug was discovered in the NFSv4 client implementation that could
- lead to a heap buffer overflow. A malicious NFS server could use
- this to cause a denial of service (crash or memory corruption) or
- possibly to execute arbitrary code on the client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25284">CVE-2020-25284</a>
-
- <p>It was discovered that the Rados block device (rbd) driver allowed
- tasks running as uid 0 to add and remove rbd devices, even if they
- dropped capabilities. On a system with the rbd driver loaded,
- this might allow privilege escalation from a container with a task
- running as root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25285">CVE-2020-25285</a>
-
- <p>A race condition was discovered in the hugetlb filesystem's sysctl
- handlers, that could lead to stack corruption. A local user
- permitted to write to hugepages sysctls could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation. By default only the root user can do this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25641">CVE-2020-25641</a>
-
- <p>The syzbot tool found a bug in the block layer that could lead to
- an infinite loop. A local user with access to a raw block device
- could use this to cause a denial of service (unbounded CPU use and
- possible system hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26088">CVE-2020-26088</a>
-
- <p>It was discovered that the NFC (Near Field Communication) socket
- implementation allowed any user to create raw sockets. On a
- system with an NFC interface, this allowed local users to evade
- local network security policy.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.146-1~deb9u1. This update additionally fixes Debian bugs
-<a href="https://bugs.debian.org/966846">#966846</a>, <a href="https://bugs.debian.org/966917">#966917</a>, and <a href="https://bugs.debian.org/968567">#968567</a>; and includes many more bug fixes from
-stable updates 4.19.133-4.19.146 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2385.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2386.data b/english/lts/security/2020/dla-2386.data
deleted file mode 100644
index 42523e2ce91..00000000000
--- a/english/lts/security/2020/dla-2386.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2386-1 libdbi-perl</define-tag>
-<define-tag report_date>2020-09-28</define-tag>
-<define-tag secrefs>CVE-2019-20919 CVE-2020-14392 CVE-2020-14393</define-tag>
-<define-tag packages>libdbi-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2386.wml b/english/lts/security/2020/dla-2386.wml
deleted file mode 100644
index ade8afe7283..00000000000
--- a/english/lts/security/2020/dla-2386.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Perl5 Database
-Interface (DBI). An attacker could trigger a denial-of-service (DoS)
-and possibly execute arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20919">CVE-2019-20919</a>
-
- <p>The hv_fetch() documentation requires checking for NULL and the
- code does that. But, shortly thereafter, it calls SvOK(profile),
- causing a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14392">CVE-2020-14392</a>
-
- <p>An untrusted pointer dereference flaw was found in Perl-DBI. A
- local attacker who is able to manipulate calls to
- dbd_db_login6_sv() could cause memory corruption, affecting the
- service's availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14393">CVE-2020-14393</a>
-
- <p>A buffer overflow on via an overlong DBD class name in
- dbih_setup_handle function may lead to data be written past the
- intended limit.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.636-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libdbi-perl packages.</p>
-
-<p>For the detailed security status of libdbi-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdbi-perl">https://security-tracker.debian.org/tracker/libdbi-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2386.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2387-2.data b/english/lts/security/2020/dla-2387-2.data
deleted file mode 100644
index 8ed126dac0f..00000000000
--- a/english/lts/security/2020/dla-2387-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2387-2 firefox-esr</define-tag>
-<define-tag report_date>2020-09-30</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2387-2.wml b/english/lts/security/2020/dla-2387-2.wml
deleted file mode 100644
index db02d7a6225..00000000000
--- a/english/lts/security/2020/dla-2387-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a problem that caused Firefox to fail to build on the
-arm64 and armhf architectures.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-78.3.0esr-1~deb9u2.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2387-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2387.data b/english/lts/security/2020/dla-2387.data
deleted file mode 100644
index 2f66ed8a64a..00000000000
--- a/english/lts/security/2020/dla-2387.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2387-1 firefox-esr</define-tag>
-<define-tag report_date>2020-09-28</define-tag>
-<define-tag secrefs>CVE-2020-15673 CVE-2020-15676 CVE-2020-15677 CVE-2020-15678</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2387.wml b/english/lts/security/2020/dla-2387.wml
deleted file mode 100644
index 6afdb8fd31a..00000000000
--- a/english/lts/security/2020/dla-2387.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, cross-site scripting or spoofing the origin of a download.</p>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 68.x series has ended, so starting with this update we're now
-following the 78.x releases.</p>
-
-<p>Between 68.x and 78.x, Firefox has seen a number of feature updates.
-For more information please refer to
-<a href="https://www.mozilla.org/en-US/firefox/78.0esr/releasenotes/">https://www.mozilla.org/en-US/firefox/78.0esr/releasenotes/</a></p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.3.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2387.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2388.data b/english/lts/security/2020/dla-2388.data
deleted file mode 100644
index d741b498737..00000000000
--- a/english/lts/security/2020/dla-2388.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2388-1 nss</define-tag>
-<define-tag report_date>2020-09-29</define-tag>
-<define-tag secrefs>CVE-2018-12404 CVE-2018-18508 CVE-2019-11719 CVE-2019-11729 CVE-2019-11745 CVE-2019-17006 CVE-2019-17007 CVE-2020-6829 CVE-2020-12399 CVE-2020-12400 CVE-2020-12401 CVE-2020-12402 CVE-2020-12403</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2388.wml b/english/lts/security/2020/dla-2388.wml
deleted file mode 100644
index 08894dc121b..00000000000
--- a/english/lts/security/2020/dla-2388.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various vulnerabilities were fixed in nss,
-the Network Security Service libraries.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12404">CVE-2018-12404</a>
-
- <p>Cache side-channel variant of the Bleichenbacher attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18508">CVE-2018-18508</a>
-
- <p>NULL pointer dereference in several CMS functions
- resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11719">CVE-2019-11719</a>
-
- <p>Out-of-bounds read when importing curve25519 private key.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11729">CVE-2019-11729</a>
-
- <p>Empty or malformed p256-ECDH public keys may
- trigger a segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11745">CVE-2019-11745</a>
-
- <p>Out-of-bounds write when encrypting with a block cipher.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17006">CVE-2019-17006</a>
-
- <p>Some cryptographic primitives did not check the
- length of the input text, potentially resulting in overflows.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17007">CVE-2019-17007</a>
-
- <p>Handling of Netscape Certificate Sequences may crash with a NULL
- dereference leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12399">CVE-2020-12399</a>
-
- <p>Force a fixed length for DSA exponentiation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6829">CVE-2020-6829</a>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12400">CVE-2020-12400</a>
-
- <p>Side channel attack on ECDSA signature generation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12401">CVE-2020-12401</a>
-
- <p>ECDSA timing attack mitigation bypass.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12402">CVE-2020-12402</a>
-
- <p>Side channel vulnerabilities during RSA key generation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12403">CVE-2020-12403</a>
-
- <p>CHACHA20-POLY1305 decryption with undersized tag leads to
- out-of-bounds read.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:3.26.2-1.1+deb9u2.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>For the detailed security status of nss please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nss">https://security-tracker.debian.org/tracker/nss</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2388.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2389.data b/english/lts/security/2020/dla-2389.data
deleted file mode 100644
index 1e0b2522c89..00000000000
--- a/english/lts/security/2020/dla-2389.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2389-1 ruby-rack-cors</define-tag>
-<define-tag report_date>2020-10-01</define-tag>
-<define-tag secrefs>CVE-2019-18978 Bug#944849</define-tag>
-<define-tag packages>ruby-rack-cors</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2389.wml b/english/lts/security/2020/dla-2389.wml
deleted file mode 100644
index 83a30037072..00000000000
--- a/english/lts/security/2020/dla-2389.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This package allowed ../ directory traversal to access private
-resources because resource matching did not ensure that
-pathnames were in a canonical format.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.4.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your ruby-rack-cors packages.</p>
-
-<p>For the detailed security status of ruby-rack-cors please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rack-cors">https://security-tracker.debian.org/tracker/ruby-rack-cors</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2389.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2390.data b/english/lts/security/2020/dla-2390.data
deleted file mode 100644
index b4c4490f482..00000000000
--- a/english/lts/security/2020/dla-2390.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2390-1 ruby-json-jwt</define-tag>
-<define-tag report_date>2020-10-01</define-tag>
-<define-tag secrefs>CVE-2019-18848 Bug#944850</define-tag>
-<define-tag packages>ruby-json-jwt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2390.wml b/english/lts/security/2020/dla-2390.wml
deleted file mode 100644
index 5dfa151d527..00000000000
--- a/english/lts/security/2020/dla-2390.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The json-jwt gem before 1.11.0 for Ruby lacks an element
-count during the splitting of a JWE string.</p>
-
-<p>Therefore, there was a need to explicitly specify the number
-of elements when splitting a JWE string.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.6.2-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your ruby-json-jwt packages.</p>
-
-<p>For the detailed security status of ruby-json-jwt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-json-jwt">https://security-tracker.debian.org/tracker/ruby-json-jwt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2390.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2391.data b/english/lts/security/2020/dla-2391.data
deleted file mode 100644
index a691b6aeb62..00000000000
--- a/english/lts/security/2020/dla-2391.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2391-1 ruby2.3</define-tag>
-<define-tag report_date>2020-10-01</define-tag>
-<define-tag secrefs>CVE-2020-25613</define-tag>
-<define-tag packages>ruby2.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2391.wml b/english/lts/security/2020/dla-2391.wml
deleted file mode 100644
index 9c764b169f1..00000000000
--- a/english/lts/security/2020/dla-2391.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A potential HTTP request smuggling vulnerability in WEBrick
-was reported.</p>
-
-<p>WEBrick (bundled along with ruby2.3) was too tolerant against
-an invalid Transfer-Encoding header. This may lead to
-inconsistent interpretation between WEBrick and some HTTP proxy
-servers, which may allow the attacker to “smuggle†a request.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.3.3-1+deb9u9.</p>
-
-<p>We recommend that you upgrade your ruby2.3 packages.</p>
-
-<p>For the detailed security status of ruby2.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby2.3">https://security-tracker.debian.org/tracker/ruby2.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2391.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2392.data b/english/lts/security/2020/dla-2392.data
deleted file mode 100644
index 4c52d7d7d3f..00000000000
--- a/english/lts/security/2020/dla-2392.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2392-1 jruby</define-tag>
-<define-tag report_date>2020-10-01</define-tag>
-<define-tag secrefs>CVE-2020-25613</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2392.wml b/english/lts/security/2020/dla-2392.wml
deleted file mode 100644
index 0a32446267b..00000000000
--- a/english/lts/security/2020/dla-2392.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A potential HTTP request smuggling vulnerability in WEBrick
-was reported.</p>
-
-<p>WEBrick (bundled along with jruby) was too tolerant against
-an invalid Transfer-Encoding header. This may lead to
-inconsistent interpretation between WEBrick and some HTTP proxy
-servers, which may allow the attacker to “smuggle†a request.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.26-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>For the detailed security status of jruby please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jruby">https://security-tracker.debian.org/tracker/jruby</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2392.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2393.data b/english/lts/security/2020/dla-2393.data
deleted file mode 100644
index a56891f97ff..00000000000
--- a/english/lts/security/2020/dla-2393.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2393-1 snmptt</define-tag>
-<define-tag report_date>2020-10-02</define-tag>
-<define-tag secrefs>CVE-2020-24361</define-tag>
-<define-tag packages>snmptt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2393.wml b/english/lts/security/2020/dla-2393.wml
deleted file mode 100644
index ac1fd85d4d3..00000000000
--- a/english/lts/security/2020/dla-2393.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that SNMP Trap Translator does not drop privileges as configured and does not properly escape shell commands in certain functions. A remote attacker, by sending a malicious crafted SNMP trap, could possibly execute arbitrary shell code with the privileges of the process or cause a Denial of Service condition.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your snmptt packages.</p>
-
-<p>For the detailed security status of snmptt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/snmptt">https://security-tracker.debian.org/tracker/snmptt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2393.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2394.data b/english/lts/security/2020/dla-2394.data
deleted file mode 100644
index 4ad691a3393..00000000000
--- a/english/lts/security/2020/dla-2394.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2394-1 squid3</define-tag>
-<define-tag report_date>2020-10-2</define-tag>
-<define-tag secrefs>CVE-2020-15049 CVE-2020-15810 CVE-2020-15811 CVE-2020-24606</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2394.wml b/english/lts/security/2020/dla-2394.wml
deleted file mode 100644
index 4e62fd2144d..00000000000
--- a/english/lts/security/2020/dla-2394.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in Squid, a highperformance proxy caching server for web clients.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15049">CVE-2020-15049</a>
-
- <p>An issue was discovered in http/ContentLengthInterpreter.cc in
- Squid. A Request Smuggling and Poisoning attack can succeed against
- the HTTP cache. The client sends an HTTP request with a Content Length header containing "+\ "-" or an uncommon shell whitespace
- character prefix to the length field-value.
- This update also includes several other improvements to the
- HttpHeader parsing code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15810">CVE-2020-15810</a>
-
-<p>and <a href="https://security-tracker.debian.org/tracker/CVE-2020-15811">CVE-2020-15811</a></p>
-
- <p>Due to incorrect data validation, HTTP Request Smuggling attacks may
- succeed against HTTP and HTTPS traffic. This leads to cache
- poisoning and allows any client, including browser scripts, to
- bypass local security and poison the proxy cache and any downstream
- caches with content from an arbitrary source. When configured for
- relaxed header parsing (the default), Squid relays headers
- containing whitespace characters to upstream servers. When this
- occurs as a prefix to a Content-Length header, the frame length
- specified will be ignored by Squid (allowing for a conflicting
- length to be used from another Content-Length header) but relayed
- upstream.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24606">CVE-2020-24606</a>
-
- <p>Squid allows a trusted peer to perform Denial of Service by
- consuming all available CPU cycles during handling of a crafted
- Cache Digest response message. This only occurs when cache_peer is
- used with the cache digests feature. The problem exists because
- peerDigestHandleReply() livelocking in peer_digest.cc mishandles
- EOF.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.23-5+deb9u5.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>For the detailed security status of squid3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/squid3">https://security-tracker.debian.org/tracker/squid3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2394.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2395.data b/english/lts/security/2020/dla-2395.data
deleted file mode 100644
index 65d9af365be..00000000000
--- a/english/lts/security/2020/dla-2395.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2395-1 libvirt</define-tag>
-<define-tag report_date>2020-10-02</define-tag>
-<define-tag secrefs>CVE-2020-25637 Bug#971555</define-tag>
-<define-tag packages>libvirt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2395.wml b/english/lts/security/2020/dla-2395.wml
deleted file mode 100644
index 9790db8b353..00000000000
--- a/english/lts/security/2020/dla-2395.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A double free vulnerability was discovered in libvirt, a toolkit to
-interact with the virtualization capabilities of recent versions of
-Linux (and other OSes).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.0.0-4+deb9u5.</p>
-
-<p>We recommend that you upgrade your libvirt packages.</p>
-
-<p>For the detailed security status of libvirt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvirt">https://security-tracker.debian.org/tracker/libvirt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2395.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2396.data b/english/lts/security/2020/dla-2396.data
deleted file mode 100644
index 9e2a1288e6b..00000000000
--- a/english/lts/security/2020/dla-2396.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2396-1 tigervnc</define-tag>
-<define-tag report_date>2020-10-06</define-tag>
-<define-tag secrefs>CVE-2020-26117 Bug#971272</define-tag>
-<define-tag packages>tigervnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2396.wml b/english/lts/security/2020/dla-2396.wml
deleted file mode 100644
index 3d2e94670d8..00000000000
--- a/english/lts/security/2020/dla-2396.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in tigernvc, a Virtual Network Computing
-client and server implementation. The viewer implementation mishandles
-TLS certificate exceptions, storing the certificates as authorities,
-meaning that the owner of a certificate could impersonate any server
-after a client had added an exception.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.0+dfsg-7+deb9u2.</p>
-
-<p>We recommend that you upgrade your tigervnc packages.</p>
-
-<p>For the detailed security status of tigervnc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tigervnc">https://security-tracker.debian.org/tracker/tigervnc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2396.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2397.data b/english/lts/security/2020/dla-2397.data
deleted file mode 100644
index 6e9adebe314..00000000000
--- a/english/lts/security/2020/dla-2397.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2397-1 php7.0</define-tag>
-<define-tag report_date>2020-10-06</define-tag>
-<define-tag secrefs>CVE-2020-7070</define-tag>
-<define-tag packages>php7.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2397.wml b/english/lts/security/2020/dla-2397.wml
deleted file mode 100644
index c62c3ba4e76..00000000000
--- a/english/lts/security/2020/dla-2397.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in PHP, a server-side, HTML-embedded
-scripting language. When PHP is processing incoming HTTP cookie values,
-the cookie names are url-decoded. This may lead to cookies with prefixes
-like __Host confused with cookies that decode to such prefix, thus
-leading to an attacker being able to forge a cookie which is supposed to
-be secure.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.0.33-0+deb9u10.</p>
-
-<p>We recommend that you upgrade your php7.0 packages.</p>
-
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.0">https://security-tracker.debian.org/tracker/php7.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2397.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2398.data b/english/lts/security/2020/dla-2398.data
deleted file mode 100644
index d4f9e050fd6..00000000000
--- a/english/lts/security/2020/dla-2398.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2398-1 puma</define-tag>
-<define-tag report_date>2020-10-08</define-tag>
-<define-tag secrefs>CVE-2020-11076 CVE-2020-11077</define-tag>
-<define-tag packages>puma</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2398.wml b/english/lts/security/2020/dla-2398.wml
deleted file mode 100644
index 1cb678fa32a..00000000000
--- a/english/lts/security/2020/dla-2398.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in puma, highly
-concurrent HTTP server for Ruby/Rack applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11076">CVE-2020-11076</a>
-
- <p>By using an invalid transfer-encoding header, an attacker could smuggle
- an HTTP response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11077">CVE-2020-11077</a>
-
- <p>client could smuggle a request through a proxy, causing the proxy to
- send a response back to another unknown client. If the proxy uses
- persistent connections and the client adds another request in via HTTP
- pipelining, the proxy may mistake it as the first request's body. Puma,
- however, would see it as two requests, and when processing the second
- request, send back a response that the proxy does not expect. If the
- proxy has reused the persistent connection to Puma to send another
- request for a different client, the second response from the first
- client will be sent to the second client.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.6.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your puma packages.</p>
-
-<p>For the detailed security status of puma please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/puma">https://security-tracker.debian.org/tracker/puma</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2398.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2399.data b/english/lts/security/2020/dla-2399.data
deleted file mode 100644
index 3fd28339bfd..00000000000
--- a/english/lts/security/2020/dla-2399.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2399-1 packagekit</define-tag>
-<define-tag report_date>2020-10-07</define-tag>
-<define-tag secrefs>CVE-2020-16121 CVE-2020-16122</define-tag>
-<define-tag packages>packagekit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2399.wml b/english/lts/security/2020/dla-2399.wml
deleted file mode 100644
index 7d48af7ae1d..00000000000
--- a/english/lts/security/2020/dla-2399.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been discovered in packagekit, a package
-management service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16121">CVE-2020-16121</a>
-
- <p>Vaisha Bernard discovered that PackageKit incorrectly handled
- certain methods. A local attacker could use this issue to learn the
- MIME type of any file on the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16122">CVE-2020-16122</a>
-
- <p>Sami Niemimäki discovered that PackageKit incorrectly handled local
- deb packages. A local user could possibly use this issue to install
- untrusted packages, contrary to expectations.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.1.5-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your packagekit packages.</p>
-
-<p>For the detailed security status of packagekit please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/packagekit">https://security-tracker.debian.org/tracker/packagekit</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2399.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2400.data b/english/lts/security/2020/dla-2400.data
deleted file mode 100644
index 59597fa46d3..00000000000
--- a/english/lts/security/2020/dla-2400.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2400-1 activemq</define-tag>
-<define-tag report_date>2020-10-8</define-tag>
-<define-tag secrefs>CVE-2020-13920</define-tag>
-<define-tag packages>activemq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2400.wml b/english/lts/security/2020/dla-2400.wml
deleted file mode 100644
index c75569d773f..00000000000
--- a/english/lts/security/2020/dla-2400.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apache ActiveMQ, a Java message broker, uses
-LocateRegistry.createRegistry() to create the JMX RMI registry and binds
-the server to the <q>jmxrmi</q> entry. It is possible to connect to the
-registry without authentication and call the rebind method to rebind
-jmxrmi to something else. If an attacker creates another server to proxy
-the original, and bound that, he effectively becomes a man in the middle
-and is able to intercept the credentials when an user connects.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.14.3-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your activemq packages.</p>
-
-<p>For the detailed security status of activemq please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/activemq">https://security-tracker.debian.org/tracker/activemq</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2400.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2401.data b/english/lts/security/2020/dla-2401.data
deleted file mode 100644
index 7936869559a..00000000000
--- a/english/lts/security/2020/dla-2401.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2401-1 sympa</define-tag>
-<define-tag report_date>2020-10-07</define-tag>
-<define-tag secrefs>CVE-2020-10936 Bug#961491</define-tag>
-<define-tag packages>sympa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2401.wml b/english/lts/security/2020/dla-2401.wml
deleted file mode 100644
index 382444a13d6..00000000000
--- a/english/lts/security/2020/dla-2401.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sympa, a modern mailing list manager, allows privilege escalation
-through setuid wrappers. A local attacker can obtain root access.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-6.2.16~dfsg-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your sympa packages.</p>
-
-<p>For the detailed security status of sympa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sympa">https://security-tracker.debian.org/tracker/sympa</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2401.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2402.data b/english/lts/security/2020/dla-2402.data
deleted file mode 100644
index 2eb54229a7a..00000000000
--- a/english/lts/security/2020/dla-2402.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2402-1 golang-go.crypto</define-tag>
-<define-tag report_date>2020-10-09</define-tag>
-<define-tag secrefs>CVE-2019-11840 CVE-2019-11841 CVE-2020-9283</define-tag>
-<define-tag packages>golang-go.crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2402.wml b/english/lts/security/2020/dla-2402.wml
deleted file mode 100644
index 2b37e4f7249..00000000000
--- a/english/lts/security/2020/dla-2402.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>
-
- <p>An issue was discovered in supplementary Go cryptography libraries, aka
- golang-googlecode-go-crypto. If more than 256 GiB of keystream is
- generated, or if the counter otherwise grows greater than 32 bits, the amd64
- implementation will first generate incorrect output, and then cycle back to
- previously generated keystream. Repeated keystream bytes can lead to loss of
- confidentiality in encryption applications, or to predictability in CSPRNG
- applications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11841">CVE-2019-11841</a>
-
- <p>A message-forgery issue was discovered in
- crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography
- libraries. The <q>Hash</q> Armor Header specifies the message digest
- algorithm(s) used for the signature. Since the library skips Armor Header
- parsing in general, an attacker can not only embed arbitrary Armor Headers,
- but also prepend arbitrary text to cleartext messages without invalidating
- the signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9283">CVE-2020-9283</a>
-
- <p>golang.org/x/crypto allows a panic during signature verification in the
- golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts
- public keys. Also, a server can attack any SSH client.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:0.0~git20170407.0.55a552f+REALLY.0.0~git20161012.0.5f31782-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your golang-go.crypto packages.</p>
-
-<p>For the detailed security status of golang-go.crypto please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-go.crypto">https://security-tracker.debian.org/tracker/golang-go.crypto</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2402.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2403.data b/english/lts/security/2020/dla-2403.data
deleted file mode 100644
index 72220e946e7..00000000000
--- a/english/lts/security/2020/dla-2403.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2403-1 rails</define-tag>
-<define-tag report_date>2020-10-9</define-tag>
-<define-tag secrefs>CVE-2020-15169 Bug#970040</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2403.wml b/english/lts/security/2020/dla-2403.wml
deleted file mode 100644
index 5f9653b4068..00000000000
--- a/english/lts/security/2020/dla-2403.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A potential Cross-Site Scripting (XSS) vulnerability was found in rails,
-a ruby based MVC framework. Views that allow the user to control the
-default (not found) value of the `t` and `translate` helpers could be
-susceptible to XSS attacks. When an HTML-unsafe string is passed as the
-default for a missing translation key named html or ending in _html, the
-default string is incorrectly marked as HTML-safe and not escaped.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:4.2.7.1-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>For the detailed security status of rails please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/rails">https://security-tracker.debian.org/tracker/rails</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2403.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2404.data b/english/lts/security/2020/dla-2404.data
deleted file mode 100644
index f452af2e80e..00000000000
--- a/english/lts/security/2020/dla-2404.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2404-1 eclipse-wtp</define-tag>
-<define-tag report_date>2020-10-10</define-tag>
-<define-tag secrefs>CVE-2019-17637</define-tag>
-<define-tag packages>eclipse-wtp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2404.wml b/english/lts/security/2020/dla-2404.wml
deleted file mode 100644
index b19b843c6f1..00000000000
--- a/english/lts/security/2020/dla-2404.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Eclipse Web Tools Platform, a component of the Eclipse IDE, XML and
-DTD files referring to external entities could be exploited to send the
-contents of local files to a remote server when edited or validated,
-even when external entity resolution is disabled in the user
-preferences.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.6.3-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your eclipse-wtp packages.</p>
-
-<p>For the detailed security status of eclipse-wtp please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/eclipse-wtp">https://security-tracker.debian.org/tracker/eclipse-wtp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2404.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2405.data b/english/lts/security/2020/dla-2405.data
deleted file mode 100644
index 5957b9a90a1..00000000000
--- a/english/lts/security/2020/dla-2405.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2405-1 httpcomponents-client</define-tag>
-<define-tag report_date>2020-10-10</define-tag>
-<define-tag secrefs>CVE-2020-13956</define-tag>
-<define-tag packages>httpcomponents-client</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2405.wml b/english/lts/security/2020/dla-2405.wml
deleted file mode 100644
index 724e044c656..00000000000
--- a/english/lts/security/2020/dla-2405.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Oleg Kalnichevski discovered that httpcomponents-client, a Java library
-for building HTTP-aware applications, can misinterpret a malformed
-authority component in request URIs passed to the library as
-java.net.URI object and pick the wrong target host for request
-execution.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.5.2-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your httpcomponents-client packages.</p>
-
-<p>For the detailed security status of httpcomponents-client please refer
-to its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/httpcomponents-client">https://security-tracker.debian.org/tracker/httpcomponents-client</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2405.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2406.data b/english/lts/security/2020/dla-2406.data
deleted file mode 100644
index 202faa996e0..00000000000
--- a/english/lts/security/2020/dla-2406.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2406-1 jackson-databind</define-tag>
-<define-tag report_date>2020-10-14</define-tag>
-<define-tag secrefs>CVE-2020-25649</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2406.wml b/english/lts/security/2020/dla-2406.wml
deleted file mode 100644
index aaeb588681a..00000000000
--- a/english/lts/security/2020/dla-2406.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an external entity expansion vulnerability
-in jackson-databind, a Java library for processing JSON.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25649">CVE-2020-25649</a></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.8.6-1+deb9u8.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2406.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2407.data b/english/lts/security/2020/dla-2407.data
deleted file mode 100644
index 07ecc67f036..00000000000
--- a/english/lts/security/2020/dla-2407.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2407-1 tomcat8</define-tag>
-<define-tag report_date>2020-10-14</define-tag>
-<define-tag secrefs>CVE-2020-13943</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2407.wml b/english/lts/security/2020/dla-2407.wml
deleted file mode 100644
index 17700bb6503..00000000000
--- a/english/lts/security/2020/dla-2407.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in Apache Tomcat 8, the Java
-application server. An excessive number of concurrent streams could have
-resulted in users seeing responses for unexpected resources.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13943">CVE-2020-13943</a>
-
- <p>If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7,
- 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of
- concurrent streams for a connection (in violation of the HTTP/2 protocol),
- it was possible that a subsequent request made on that connection could
- contain HTTP headers - including HTTP/2 pseudo headers - from a previous
- request rather than the intended headers. This could lead to users seeing
- responses for unexpected resources.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-8.5.54-0+deb9u4.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2407.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2408.data b/english/lts/security/2020/dla-2408.data
deleted file mode 100644
index 135a908ff6e..00000000000
--- a/english/lts/security/2020/dla-2408.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2408-1 thunderbird</define-tag>
-<define-tag report_date>2020-10-17</define-tag>
-<define-tag secrefs>CVE-2020-15673 CVE-2020-15676 CVE-2020-15677 CVE-2020-15678</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2408.wml b/english/lts/security/2020/dla-2408.wml
deleted file mode 100644
index 37a488665d6..00000000000
--- a/english/lts/security/2020/dla-2408.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code or denial of service.</p>
-
-<p>Debian follows the Thunderbird upstream releases. Support for the 68.x
-series has ended, so starting with this update we're now following
-the 78.x releases.</p>
-
-<p>The 78.x series discontinues support for some addons. Also, starting
-with 78, Thunderbird supports OpenPGP natively. If you are currently
-using the Enigmail addon for PGP, please refer to the included NEWS
-and README.Debian.gz files for information on how to migrate your
-keys.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.3.1-2~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2408.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2409.data b/english/lts/security/2020/dla-2409.data
deleted file mode 100644
index 4ad79197b57..00000000000
--- a/english/lts/security/2020/dla-2409.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2409-1 mariadb-10.1</define-tag>
-<define-tag report_date>2020-10-21</define-tag>
-<define-tag secrefs>CVE-2020-15180</define-tag>
-<define-tag packages>mariadb-10.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2409.wml b/english/lts/security/2020/dla-2409.wml
deleted file mode 100644
index 4c2b05d460e..00000000000
--- a/english/lts/security/2020/dla-2409.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue was discovered in the MariaDB database server.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-10.1.47-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.1 packages.</p>
-
-<p>For the detailed security status of mariadb-10.1 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.1">https://security-tracker.debian.org/tracker/mariadb-10.1</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2409.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2410.data b/english/lts/security/2020/dla-2410.data
deleted file mode 100644
index 010f7db8693..00000000000
--- a/english/lts/security/2020/dla-2410.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2410-1 bluez</define-tag>
-<define-tag report_date>2020-10-21</define-tag>
-<define-tag secrefs>CVE-2020-27153</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2410.wml b/english/lts/security/2020/dla-2410.wml
deleted file mode 100644
index 92c6dc19468..00000000000
--- a/english/lts/security/2020/dla-2410.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a double-free vulnerability in BlueZ, a
-suite of Bluetooth tools, utilities and daemons.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27153">CVE-2020-27153</a>
-
- <p>In BlueZ before 5.55, a double free was found in the gatttool
- disconnect_cb() routine from shared/att.c. A remote attacker could
- potentially cause a denial of service or code execution, during service
- discovery, due to a redundant disconnect MGMT event.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-5.43-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2410.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2411.data b/english/lts/security/2020/dla-2411.data
deleted file mode 100644
index b0b170d3a1d..00000000000
--- a/english/lts/security/2020/dla-2411.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2411-1 firefox-esr</define-tag>
-<define-tag report_date>2020-10-21</define-tag>
-<define-tag secrefs>CVE-2020-15683 CVE-2020-15969</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2411.wml b/english/lts/security/2020/dla-2411.wml
deleted file mode 100644
index c2b9153a56a..00000000000
--- a/english/lts/security/2020/dla-2411.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.4.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2411.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2412-2.data b/english/lts/security/2020/dla-2412-2.data
deleted file mode 100644
index a4f390ac6f2..00000000000
--- a/english/lts/security/2020/dla-2412-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2412-2 openjdk-8</define-tag>
-<define-tag report_date>2020-12-22</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2412-2.wml b/english/lts/security/2020/dla-2412-2.wml
deleted file mode 100644
index eb7c6fba62c..00000000000
--- a/english/lts/security/2020/dla-2412-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A few issues have been found in the OpenJDK 8u272 update, including
-LDAP connection failures and application crash.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8u275-b01-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2412-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2412.data b/english/lts/security/2020/dla-2412.data
deleted file mode 100644
index 97bcf5ee53c..00000000000
--- a/english/lts/security/2020/dla-2412.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2412-1 openjdk-8</define-tag>
-<define-tag report_date>2020-10-23</define-tag>
-<define-tag secrefs>CVE-2020-14779 CVE-2020-14781 CVE-2020-14782 CVE-2020-14792 CVE-2020-14796 CVE-2020-14797 CVE-2020-14798 CVE-2020-14803</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2412.wml b/english/lts/security/2020/dla-2412.wml
deleted file mode 100644
index 442e20791c5..00000000000
--- a/english/lts/security/2020/dla-2412.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-resulting in denial of service, bypass of sandbox restrictions or
-information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u272-b10-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2412.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2413.data b/english/lts/security/2020/dla-2413.data
deleted file mode 100644
index 24b0520b582..00000000000
--- a/english/lts/security/2020/dla-2413.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2413-1 phpmyadmin</define-tag>
-<define-tag report_date>2020-10-26</define-tag>
-<define-tag secrefs>CVE-2019-19617 CVE-2020-26934 CVE-2020-26935 Bug#971999 Bug#972000</define-tag>
-<define-tag packages>phpmyadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2413.wml b/english/lts/security/2020/dla-2413.wml
deleted file mode 100644
index ae53d6e1b86..00000000000
--- a/english/lts/security/2020/dla-2413.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in package phpmyadmin.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19617">CVE-2019-19617</a>
-
- <p>phpMyAdmin does not escape certain Git information, related to
- libraries/classes/Display/GitRevision.php and libraries/classes
- /Footer.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26934">CVE-2020-26934</a>
-
- <p>A vulnerability was discovered where an attacker can cause an XSS
- attack through the transformation feature.</p>
-
- <p>If an attacker sends a crafted link to the victim with the malicious
- JavaScript, when the victim clicks on the link, the JavaScript will run
- and complete the instructions made by the attacker.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26935">CVE-2020-26935</a>
-
- <p>An SQL injection vulnerability was discovered in how phpMyAdmin
- processes SQL statements in the search feature. An attacker could use
- this flaw to inject malicious SQL in to a query.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.6.6-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your phpmyadmin packages.</p>
-
-<p>For the detailed security status of phpmyadmin please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/phpmyadmin">https://security-tracker.debian.org/tracker/phpmyadmin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2413.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2414.data b/english/lts/security/2020/dla-2414.data
deleted file mode 100644
index bcc0ee33c15..00000000000
--- a/english/lts/security/2020/dla-2414.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2414-1 fastd</define-tag>
-<define-tag report_date>2020-10-25</define-tag>
-<define-tag secrefs>CVE-2020-27638 Bug#972521</define-tag>
-<define-tag packages>fastd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2414.wml b/english/lts/security/2020/dla-2414.wml
deleted file mode 100644
index 9222e428b84..00000000000
--- a/english/lts/security/2020/dla-2414.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In fastd, a fast and secure tunnelling daemon, a receive buffer
-handling problem was discovered which allows a denial of service
-(memory exhaustion) when receiving packets with an invalid type code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-18-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your fastd packages.</p>
-
-<p>For the detailed security status of fastd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/fastd">https://security-tracker.debian.org/tracker/fastd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2414.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2415.data b/english/lts/security/2020/dla-2415.data
deleted file mode 100644
index d0c53e2b0b8..00000000000
--- a/english/lts/security/2020/dla-2415.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2415-1 freetype</define-tag>
-<define-tag report_date>2020-10-25</define-tag>
-<define-tag secrefs>CVE-2020-15999</define-tag>
-<define-tag packages>freetype</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2415.wml b/english/lts/security/2020/dla-2415.wml
deleted file mode 100644
index 0d6f633264a..00000000000
--- a/english/lts/security/2020/dla-2415.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Sergei Glazunov discovered a heap-based buffer overflow vulnerability in
-the handling of embedded PNG bitmaps in FreeType. Opening malformed fonts
-may result in denial of service or the execution of arbitrary code.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.6.3-3.2+deb9u2.</p>
-
-<p>We recommend that you upgrade your freetype packages.</p>
-
-<p>For the detailed security status of freetype please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freetype">https://security-tracker.debian.org/tracker/freetype</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2415.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2416.data b/english/lts/security/2020/dla-2416.data
deleted file mode 100644
index 66b08e28a41..00000000000
--- a/english/lts/security/2020/dla-2416.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2416-1 thunderbird</define-tag>
-<define-tag report_date>2020-10-27</define-tag>
-<define-tag secrefs>CVE-2020-15683 CVE-2020-15969</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2416.wml b/english/lts/security/2020/dla-2416.wml
deleted file mode 100644
index 65406928763..00000000000
--- a/english/lts/security/2020/dla-2416.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.4.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2416.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2417.data b/english/lts/security/2020/dla-2417.data
deleted file mode 100644
index 21c0532f90f..00000000000
--- a/english/lts/security/2020/dla-2417.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2417-1 linux-4.19</define-tag>
-<define-tag report_date>2020-10-28</define-tag>
-<define-tag secrefs>CVE-2020-12351 CVE-2020-12352 CVE-2020-25211 CVE-2020-25643 CVE-2020-25645 Bug#908712</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2417.wml b/english/lts/security/2020/dla-2417.wml
deleted file mode 100644
index 5bcdc7aaeed..00000000000
--- a/english/lts/security/2020/dla-2417.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12351">CVE-2020-12351</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation in the
- way L2CAP packets with A2MP CID are handled. A remote attacker in
- short distance knowing the victim's Bluetooth device address can
- send a malicious l2cap packet and cause a denial of service or
- possibly arbitrary code execution with kernel privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12352">CVE-2020-12352</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation. Stack
- memory is not properly initialised when handling certain AMP
- packets. A remote attacker in short distance knowing the victim's
- Bluetooth device address address can retrieve kernel stack
- information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25211">CVE-2020-25211</a>
-
- <p>A flaw was discovered in netfilter subsystem. A local attacker
- able to inject conntrack Netlink configuration can cause a denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25643">CVE-2020-25643</a>
-
- <p>ChenNan Of Chaitin Security Research Lab discovered a flaw in the
- hdlc_ppp module. Improper input validation in the ppp_cp_parse_cr()
- function may lead to memory corruption and information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25645">CVE-2020-25645</a>
-
- <p>A flaw was discovered in the interface driver for GENEVE
- encapsulated traffic when combined with IPsec. If IPsec is
- configured to encrypt traffic for the specific UDP port used by the
- GENEVE tunnel, tunneled data isn't correctly routed over the
- encrypted link and sent unencrypted instead.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.152-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2417.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2418.data b/english/lts/security/2020/dla-2418.data
deleted file mode 100644
index ea3b368f992..00000000000
--- a/english/lts/security/2020/dla-2418.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2418-1 libsndfile</define-tag>
-<define-tag report_date>2020-10-29</define-tag>
-<define-tag secrefs>CVE-2017-6892 CVE-2017-14245 CVE-2017-14246 CVE-2017-14634 CVE-2018-19661 CVE-2018-19662 CVE-2018-19758 CVE-2019-3832</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2418.wml b/english/lts/security/2020/dla-2418.wml
deleted file mode 100644
index acd71b7cd2e..00000000000
--- a/english/lts/security/2020/dla-2418.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in libsndfile, a library for
-reading/writing audio files.
-All issues are basically divide by zero errors, heap read overflows or
-other buffer overlow errors.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.27-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>For the detailed security status of libsndfile please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsndfile">https://security-tracker.debian.org/tracker/libsndfile</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2418.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2419.data b/english/lts/security/2020/dla-2419.data
deleted file mode 100644
index a25cdd4369f..00000000000
--- a/english/lts/security/2020/dla-2419.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2419-1 dompurify.js</define-tag>
-<define-tag report_date>2020-10-29</define-tag>
-<define-tag secrefs>CVE-2019-16728 CVE-2020-26870</define-tag>
-<define-tag packages>dompurify.js</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2419.wml b/english/lts/security/2020/dla-2419.wml
deleted file mode 100644
index 05d13ba2741..00000000000
--- a/english/lts/security/2020/dla-2419.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in dompurify.js, an XSS sanitizer for HTML,
-MathML and SVG.
-Both issues are related to mXSS issues in SVG- or MATH-elements.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.8.2~dfsg1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your dompurify.js packages.</p>
-
-<p>For the detailed security status of dompurify.js please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dompurify.js">https://security-tracker.debian.org/tracker/dompurify.js</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2419.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2420-2.data b/english/lts/security/2020/dla-2420-2.data
deleted file mode 100644
index bbf0ff47f88..00000000000
--- a/english/lts/security/2020/dla-2420-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2420-2 linux</define-tag>
-<define-tag report_date>2020-10-31</define-tag>
-<define-tag secrefs>CVE-2019-9445 CVE-2019-19073 CVE-2019-19074 CVE-2019-19448 CVE-2020-12351 CVE-2020-12352 CVE-2020-12655 CVE-2020-12771 CVE-2020-12888 CVE-2020-14305 CVE-2020-14314 CVE-2020-14331 CVE-2020-14356 CVE-2020-14386 CVE-2020-14390 CVE-2020-15393 CVE-2020-16166 CVE-2020-24490 CVE-2020-25211 CVE-2020-25212 CVE-2020-25220 CVE-2020-25284 CVE-2020-25285 CVE-2020-25641 CVE-2020-25643 CVE-2020-26088</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2420-2.wml b/english/lts/security/2020/dla-2420-2.wml
deleted file mode 100644
index dad16f81962..00000000000
--- a/english/lts/security/2020/dla-2420-2.wml
+++ /dev/null
@@ -1,212 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update corrects a regression in some Xen virtual machine
-environments. For reference the original advisory text follows.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9445">CVE-2019-9445</a>
-
- <p>A potential out-of-bounds read was discovered in the F2FS
- implementation. A user permitted to mount and access arbitrary
- filesystems could potentially use this to cause a denial of
- service (crash) or to read sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19073">CVE-2019-19073</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19074">CVE-2019-19074</a>
-
- <p>Navid Emamdoost discovered potential memory leaks in the ath9k and
- ath9k_htc drivers. The security impact of these is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19448">CVE-2019-19448</a>
-
- <p><q>Team bobfuzzer</q> reported a bug in Btrfs that could lead to a
- use-after-free, and could be triggered by crafted filesystem
- images. A user permitted to mount and access arbitrary
- filesystems could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12351">CVE-2020-12351</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation in
- the way L2CAP packets with A2MP CID are handled. A remote attacker
- within a short distance, knowing the victim's Bluetooth device
- address, can send a malicious l2cap packet and cause a denial of
- service or possibly arbitrary code execution with kernel
- privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12352">CVE-2020-12352</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation.
- Stack memory is not properly initialised when handling certain AMP
- packets. A remote attacker within a short distance, knowing the
- victim's Bluetooth device address address, can retrieve kernel
- stack information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12655">CVE-2020-12655</a>
-
- <p>Zheng Bin reported that crafted XFS volumes could trigger a system
- hang. An attacker able to mount such a volume could use this to
- cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12771">CVE-2020-12771</a>
-
- <p>Zhiqiang Liu reported a bug in the bcache block driver that could
- lead to a system hang. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12888">CVE-2020-12888</a>
-
- <p>It was discovered that the PCIe Virtual Function I/O (vfio-pci)
- driver allowed users to disable a device's memory space while it
- was still mapped into a process. On some hardware platforms,
- local users or guest virtual machines permitted to access PCIe
- Virtual Functions could use this to cause a denial of service
- (hardware error and crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14305">CVE-2020-14305</a>
-
- <p>Vasily Averin of Virtuozzo discovered a potential heap buffer
- overflow in the netfilter nf_contrack_h323 module. When this
- module is used to perform connection tracking for TCP/IPv6, a
- remote attacker could use this to cause a denial of service (crash
- or memory corruption) or possibly for remote code execution with
- kernel privilege.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14314">CVE-2020-14314</a>
-
- <p>A bug was discovered in the ext4 filesystem that could lead to an
- out-of-bound read. A local user permitted to mount and access
- arbitrary filesystem images could use this to cause a denial of
- service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14331">CVE-2020-14331</a>
-
- <p>A bug was discovered in the VGA console driver's soft-scrollback
- feature that could lead to a heap buffer overflow. On a system
- with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK
- enabled, a local user with access to a console could use this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14356">CVE-2020-14356</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-25220">CVE-2020-25220</a>
-
- <p>A bug was discovered in the cgroup subsystem's handling of socket
- references to cgroups. In some cgroup configurations, this could
- lead to a use-after-free. A local user might be able to use this
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p>
-
- <p>The original fix for this bug introudced a new security issue,
- which is also addressed in this update.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14386">CVE-2020-14386</a>
-
- <p>Or Cohen discovered a bug in the packet socket (AF_PACKET)
- implementation which could lead to a heap buffer overflow. A
- local user with the CAP_NET_RAW capability (in any user namespace)
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14390">CVE-2020-14390</a>
-
- <p>Minh Yuan discovered a bug in the framebuffer console driver's
- scrollback feature that could lead to a heap buffer overflow. On
- a system using framebuffer consoles, a local user with access to a
- console could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p>
-
- <p>The scrollback feature has been disabled for now, as no other fix
- was available for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15393">CVE-2020-15393</a>
-
- <p>Kyungtae Kim reported a memory leak in the usbtest driver. The
- security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16166">CVE-2020-16166</a>
-
- <p>Amit Klein reported that the random number generator used by the
- network stack might not be re-seeded for long periods of time,
- making e.g. client port number allocations more predictable. This
- made it easier for remote attackers to carry out some network based attacks such as DNS cache poisoning or device tracking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24490">CVE-2020-24490</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation that
- can lead to a heap buffer overflow. On systems with a Bluetooth 5
- hardware interface, a remote attacker within a short distance can
- use this to cause a denial of service (crash or memory corruption)
- or possibly for remote code execution with kernel privilege.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25211">CVE-2020-25211</a>
-
- <p>A flaw was discovered in netfilter subsystem. A local attacker
- able to inject conntrack Netlink configuration can cause a denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25212">CVE-2020-25212</a>
-
- <p>A bug was discovered in the NFSv4 client implementation that could
- lead to a heap buffer overflow. A malicious NFS server could use
- this to cause a denial of service (crash or memory corruption) or
- possibly to execute arbitrary code on the client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25284">CVE-2020-25284</a>
-
- <p>It was discovered that the Rados block device (rbd) driver allowed
- tasks running as uid 0 to add and remove rbd devices, even if they
- dropped capabilities. On a system with the rbd driver loaded,
- this might allow privilege escalation from a container with a task
- running as root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25285">CVE-2020-25285</a>
-
- <p>A race condition was discovered in the hugetlb filesystem's sysctl
- handlers, that could lead to stack corruption. A local user
- permitted to write to hugepages sysctls could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation. By default only the root user can do this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25641">CVE-2020-25641</a>
-
- <p>The syzbot tool found a bug in the block layer that could lead to
- an infinite loop. A local user with access to a raw block device
- could use this to cause a denial of service (unbounded CPU use and
- possible system hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25643">CVE-2020-25643</a>
-
- <p>ChenNan Of Chaitin Security Research Lab discovered a flaw in the
- hdlc_ppp module. Improper input validation in the ppp_cp_parse_cr()
- function may lead to memory corruption and information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26088">CVE-2020-26088</a>
-
- <p>It was discovered that the NFC (Near Field Communication) socket
- implementation allowed any user to create raw sockets. On a
- system with an NFC interface, this allowed local users to evade
- local network security policy.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.240-1. This update additionally includes many more bug fixes from
-stable updates 4.9.229-4.9.240 inclusive.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2420-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2420.data b/english/lts/security/2020/dla-2420.data
deleted file mode 100644
index 4b35cf35532..00000000000
--- a/english/lts/security/2020/dla-2420.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2420-1 linux</define-tag>
-<define-tag report_date>2020-10-30</define-tag>
-<define-tag secrefs>CVE-2019-9445 CVE-2019-19073 CVE-2019-19074 CVE-2019-19448 CVE-2020-12351 CVE-2020-12352 CVE-2020-12655 CVE-2020-12771 CVE-2020-12888 CVE-2020-14305 CVE-2020-14314 CVE-2020-14331 CVE-2020-14356 CVE-2020-14386 CVE-2020-14390 CVE-2020-15393 CVE-2020-16166 CVE-2020-24490 CVE-2020-25211 CVE-2020-25212 CVE-2020-25220 CVE-2020-25284 CVE-2020-25285 CVE-2020-25641 CVE-2020-25643 CVE-2020-26088</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2420.wml b/english/lts/security/2020/dla-2420.wml
deleted file mode 100644
index 39f55947f24..00000000000
--- a/english/lts/security/2020/dla-2420.wml
+++ /dev/null
@@ -1,209 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9445">CVE-2019-9445</a>
-
- <p>A potential out-of-bounds read was discovered in the F2FS
- implementation. A user permitted to mount and access arbitrary
- filesystems could potentially use this to cause a denial of
- service (crash) or to read sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19073">CVE-2019-19073</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19074">CVE-2019-19074</a>
-
- <p>Navid Emamdoost discovered potential memory leaks in the ath9k and
- ath9k_htc drivers. The security impact of these is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19448">CVE-2019-19448</a>
-
- <p><q>Team bobfuzzer</q> reported a bug in Btrfs that could lead to a
- use-after-free, and could be triggered by crafted filesystem
- images. A user permitted to mount and access arbitrary
- filesystems could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12351">CVE-2020-12351</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation in
- the way L2CAP packets with A2MP CID are handled. A remote attacker
- within a short distance, knowing the victim's Bluetooth device
- address, can send a malicious l2cap packet and cause a denial of
- service or possibly arbitrary code execution with kernel
- privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12352">CVE-2020-12352</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation.
- Stack memory is not properly initialised when handling certain AMP
- packets. A remote attacker within a short distance, knowing the
- victim's Bluetooth device address address, can retrieve kernel
- stack information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12655">CVE-2020-12655</a>
-
- <p>Zheng Bin reported that crafted XFS volumes could trigger a system
- hang. An attacker able to mount such a volume could use this to
- cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12771">CVE-2020-12771</a>
-
- <p>Zhiqiang Liu reported a bug in the bcache block driver that could
- lead to a system hang. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12888">CVE-2020-12888</a>
-
- <p>It was discovered that the PCIe Virtual Function I/O (vfio-pci)
- driver allowed users to disable a device's memory space while it
- was still mapped into a process. On some hardware platforms,
- local users or guest virtual machines permitted to access PCIe
- Virtual Functions could use this to cause a denial of service
- (hardware error and crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14305">CVE-2020-14305</a>
-
- <p>Vasily Averin of Virtuozzo discovered a potential heap buffer
- overflow in the netfilter nf_contrack_h323 module. When this
- module is used to perform connection tracking for TCP/IPv6, a
- remote attacker could use this to cause a denial of service (crash
- or memory corruption) or possibly for remote code execution with
- kernel privilege.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14314">CVE-2020-14314</a>
-
- <p>A bug was discovered in the ext4 filesystem that could lead to an
- out-of-bound read. A local user permitted to mount and access
- arbitrary filesystem images could use this to cause a denial of
- service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14331">CVE-2020-14331</a>
-
- <p>A bug was discovered in the VGA console driver's soft-scrollback
- feature that could lead to a heap buffer overflow. On a system
- with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK
- enabled, a local user with access to a console could use this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14356">CVE-2020-14356</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-25220">CVE-2020-25220</a>
-
- <p>A bug was discovered in the cgroup subsystem's handling of socket
- references to cgroups. In some cgroup configurations, this could
- lead to a use-after-free. A local user might be able to use this
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p>
-
- <p>The original fix for this bug introudced a new security issue,
- which is also addressed in this update.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14386">CVE-2020-14386</a>
-
- <p>Or Cohen discovered a bug in the packet socket (AF_PACKET)
- implementation which could lead to a heap buffer overflow. A
- local user with the CAP_NET_RAW capability (in any user namespace)
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14390">CVE-2020-14390</a>
-
- <p>Minh Yuan discovered a bug in the framebuffer console driver's
- scrollback feature that could lead to a heap buffer overflow. On
- a system using framebuffer consoles, a local user with access to a
- console could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p>
-
- <p>The scrollback feature has been disabled for now, as no other fix
- was available for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15393">CVE-2020-15393</a>
-
- <p>Kyungtae Kim reported a memory leak in the usbtest driver. The
- security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16166">CVE-2020-16166</a>
-
- <p>Amit Klein reported that the random number generator used by the
- network stack might not be re-seeded for long periods of time,
- making e.g. client port number allocations more predictable. This
- made it easier for remote attackers to carry out some network based attacks such as DNS cache poisoning or device tracking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24490">CVE-2020-24490</a>
-
- <p>Andy Nguyen discovered a flaw in the Bluetooth implementation that
- can lead to a heap buffer overflow. On systems with a Bluetooth 5
- hardware interface, a remote attacker within a short distance can
- use this to cause a denial of service (crash or memory corruption)
- or possibly for remote code execution with kernel privilege.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25211">CVE-2020-25211</a>
-
- <p>A flaw was discovered in netfilter subsystem. A local attacker
- able to inject conntrack Netlink configuration can cause a denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25212">CVE-2020-25212</a>
-
- <p>A bug was discovered in the NFSv4 client implementation that could
- lead to a heap buffer overflow. A malicious NFS server could use
- this to cause a denial of service (crash or memory corruption) or
- possibly to execute arbitrary code on the client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25284">CVE-2020-25284</a>
-
- <p>It was discovered that the Rados block device (rbd) driver allowed
- tasks running as uid 0 to add and remove rbd devices, even if they
- dropped capabilities. On a system with the rbd driver loaded,
- this might allow privilege escalation from a container with a task
- running as root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25285">CVE-2020-25285</a>
-
- <p>A race condition was discovered in the hugetlb filesystem's sysctl
- handlers, that could lead to stack corruption. A local user
- permitted to write to hugepages sysctls could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation. By default only the root user can do this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25641">CVE-2020-25641</a>
-
- <p>The syzbot tool found a bug in the block layer that could lead to
- an infinite loop. A local user with access to a raw block device
- could use this to cause a denial of service (unbounded CPU use and
- possible system hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25643">CVE-2020-25643</a>
-
- <p>ChenNan Of Chaitin Security Research Lab discovered a flaw in the
- hdlc_ppp module. Improper input validation in the ppp_cp_parse_cr()
- function may lead to memory corruption and information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26088">CVE-2020-26088</a>
-
- <p>It was discovered that the NFC (Near Field Communication) socket
- implementation allowed any user to create raw sockets. On a
- system with an NFC interface, this allowed local users to evade
- local network security policy.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.240-1. This update additionally includes many more bug fixes from
-stable updates 4.9.229-4.9.240 inclusive.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2420.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2421.data b/english/lts/security/2020/dla-2421.data
deleted file mode 100644
index eea70794344..00000000000
--- a/english/lts/security/2020/dla-2421.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2421-1 cimg</define-tag>
-<define-tag report_date>2020-10-30</define-tag>
-<define-tag secrefs>CVE-2018-7588 CVE-2018-7589 CVE-2018-7637 CVE-2018-7638 CVE-2018-7639 CVE-2018-7640 CVE-2018-7641 CVE-2019-1010174</define-tag>
-<define-tag packages>cimg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2421.wml b/english/lts/security/2020/dla-2421.wml
deleted file mode 100644
index 230498f390f..00000000000
--- a/english/lts/security/2020/dla-2421.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in cimg, a powerful image processing
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010174">CVE-2019-1010174</a>
-
-<p>is related to a missing string sanitization on URLs,
-which might result in a command injection when loading a special crafted
-image.</p>
-
-<p>The other CVEs are about heap-based buffer over-reads or double frees when
-loading a crafted image.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.9+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your cimg packages.</p>
-
-<p>For the detailed security status of cimg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cimg">https://security-tracker.debian.org/tracker/cimg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2421.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2422.data b/english/lts/security/2020/dla-2422.data
deleted file mode 100644
index 0df7844a88d..00000000000
--- a/english/lts/security/2020/dla-2422.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2422-1 qtsvg-opensource-src</define-tag>
-<define-tag report_date>2020-10-31</define-tag>
-<define-tag secrefs>CVE-2018-19869</define-tag>
-<define-tag packages>qtsvg-opensource-src</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2422.wml b/english/lts/security/2020/dla-2422.wml
deleted file mode 100644
index 2824470bbbc..00000000000
--- a/english/lts/security/2020/dla-2422.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Malformed SVG images were able to cause a segmentation fault
-in qtsvg-opensource-src, the QtSvg module for displaying the
-contents of SVG files in Qt.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.7.1~20161021-2.1.</p>
-
-<p>We recommend that you upgrade your qtsvg-opensource-src packages.</p>
-
-<p>For the detailed security status of qtsvg-opensource-src please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qtsvg-opensource-src">https://security-tracker.debian.org/tracker/qtsvg-opensource-src</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2422.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2423.data b/english/lts/security/2020/dla-2423.data
deleted file mode 100644
index d2380a3b147..00000000000
--- a/english/lts/security/2020/dla-2423.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2423-1 wireshark</define-tag>
-<define-tag report_date>2020-10-31</define-tag>
-<define-tag secrefs>CVE-2019-10894 CVE-2019-10895 CVE-2019-10896 CVE-2019-10899 CVE-2019-10901 CVE-2019-10903 CVE-2019-12295 Bug#926718 Bug#929446</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2423.wml b/english/lts/security/2020/dla-2423.wml
deleted file mode 100644
index 37fbcfa888e..00000000000
--- a/english/lts/security/2020/dla-2423.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the Wireshark network
-protocol analyzer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10894">CVE-2019-10894</a>
-
- <p>GSS-API dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10895">CVE-2019-10895</a>
-
- <p>NetScaler file parser crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10896">CVE-2019-10896</a>
-
- <p>DOF dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10899">CVE-2019-10899</a>
-
- <p>SRVLOC dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10901">CVE-2019-10901</a>
-
- <p>LDSS dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10903">CVE-2019-10903</a>
-
- <p>DCERPC SPOOLSS dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12295">CVE-2019-12295</a>
-
- <p>Dissection engine could crash</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.6.8-1.1~deb9u1.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2423.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2424.data b/english/lts/security/2020/dla-2424.data
deleted file mode 100644
index 553180684b7..00000000000
--- a/english/lts/security/2020/dla-2424.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2424-1 tzdata</define-tag>
-<define-tag report_date>2020-10-31</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2424.wml b/english/lts/security/2020/dla-2424.wml
deleted file mode 100644
index 37c6b6cc015..00000000000
--- a/english/lts/security/2020/dla-2424.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>tzdata, the time zone and daylight-saving time data,
-has been updated to the latest version.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2020d-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2424.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2425.data b/english/lts/security/2020/dla-2425.data
deleted file mode 100644
index ef92b2e427a..00000000000
--- a/english/lts/security/2020/dla-2425.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2425-1 openldap</define-tag>
-<define-tag report_date>2020-11-01</define-tag>
-<define-tag secrefs>none assigned yet</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2425.wml b/english/lts/security/2020/dla-2425.wml
deleted file mode 100644
index e99842dbd49..00000000000
--- a/english/lts/security/2020/dla-2425.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability in the handling of normalization with modrdn was
-discovered in OpenLDAP, a free implementation of the Lightweight
-Directory Access Protocol. An unauthenticated remote attacker can
-use this flaw to cause a denial of service (slapd daemon crash)
-via a specially crafted packet.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.4.44+dfsg-5+deb9u5.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>For the detailed security status of openldap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openldap">https://security-tracker.debian.org/tracker/openldap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2425.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2426.data b/english/lts/security/2020/dla-2426.data
deleted file mode 100644
index a13bfe7234c..00000000000
--- a/english/lts/security/2020/dla-2426.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2426-1 junit4</define-tag>
-<define-tag report_date>2020-11-01</define-tag>
-<define-tag secrefs>CVE-2020-15250 Bug#972231</define-tag>
-<define-tag packages>junit4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2426.wml b/english/lts/security/2020/dla-2426.wml
deleted file mode 100644
index c9c91718e14..00000000000
--- a/english/lts/security/2020/dla-2426.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In junit4 the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.12-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your junit4 packages.</p>
-
-<p>For the detailed security status of junit4 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/junit4">https://security-tracker.debian.org/tracker/junit4</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2426.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2427.data b/english/lts/security/2020/dla-2427.data
deleted file mode 100644
index 90e3a7dfc95..00000000000
--- a/english/lts/security/2020/dla-2427.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2427-1 spice</define-tag>
-<define-tag report_date>2020-11-01</define-tag>
-<define-tag secrefs>CVE-2020-14355 Bug#971750</define-tag>
-<define-tag packages>spice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2427.wml b/english/lts/security/2020/dla-2427.wml
deleted file mode 100644
index 12e07c6076e..00000000000
--- a/english/lts/security/2020/dla-2427.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple buffer overflow vulnerabilities were found in the QUIC
-image decoding process of the SPICE remote display system,
-before spice-0.14.2-1.</p>
-
-<p>Both the SPICE client (spice-gtk) and server are affected by
-these flaws. These flaws allow a malicious client or server to
-send specially crafted messages that, when processed by the
-QUIC image compression algorithm, result in a process crash
-or potential code execution.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.12.8-2.1+deb9u4.</p>
-
-<p>We recommend that you upgrade your spice packages.</p>
-
-<p>For the detailed security status of spice please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spice">https://security-tracker.debian.org/tracker/spice</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2427.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2428.data b/english/lts/security/2020/dla-2428.data
deleted file mode 100644
index 9d23c929d5c..00000000000
--- a/english/lts/security/2020/dla-2428.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2428-1 spice-gtk</define-tag>
-<define-tag report_date>2020-11-01</define-tag>
-<define-tag secrefs>CVE-2020-14355 Bug#971751</define-tag>
-<define-tag packages>spice-gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2428.wml b/english/lts/security/2020/dla-2428.wml
deleted file mode 100644
index b8186b476da..00000000000
--- a/english/lts/security/2020/dla-2428.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple buffer overflow vulnerabilities were found in the QUIC
-image decoding process of the SPICE remote display system.</p>
-
-<p>Both the SPICE client (spice-gtk) and server are affected by
-these flaws. These flaws allow a malicious client or server to
-send specially crafted messages that, when processed by the
-QUIC image compression algorithm, result in a process crash or
-potential code execution.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.33-3.3+deb9u2.</p>
-
-<p>We recommend that you upgrade your spice-gtk packages.</p>
-
-<p>For the detailed security status of spice-gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spice-gtk">https://security-tracker.debian.org/tracker/spice-gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2428.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2429.data b/english/lts/security/2020/dla-2429.data
deleted file mode 100644
index 4f92daa47ea..00000000000
--- a/english/lts/security/2020/dla-2429.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2429-1 wordpress</define-tag>
-<define-tag report_date>2020-11-03</define-tag>
-<define-tag secrefs>CVE-2020-28032 CVE-2020-28033 CVE-2020-28034 CVE-2020-28035 CVE-2020-28036 CVE-2020-28037 CVE-2020-28038 CVE-2020-28039 CVE-2020-28040 Bug#973562</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2429.wml b/english/lts/security/2020/dla-2429.wml
deleted file mode 100644
index 0789eea72d1..00000000000
--- a/english/lts/security/2020/dla-2429.wml
+++ /dev/null
@@ -1,76 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There were several vulnerabilites reported against wordpress,
-as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28032">CVE-2020-28032</a>
-
- <p>WordPress before 4.7.19 mishandles deserialization requests in
- wp-includes/Requests/Utility/FilteredIterator.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28033">CVE-2020-28033</a>
-
- <p>WordPress before 4.7.19 mishandles embeds from disabled sites
- on a multisite network, as demonstrated by allowing a spam
- embed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28034">CVE-2020-28034</a>
-
- <p>WordPress before 4.7.19 allows XSS associated with global
- variables.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28035">CVE-2020-28035</a>
-
- <p>WordPress before 4.7.19 allows attackers to gain privileges via
- XML-RPC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28036">CVE-2020-28036</a>
-
- <p>wp-includes/class-wp-xmlrpc-server.php in WordPress before
- 4.7.19 allows attackers to gain privileges by using XML-RPC to
- comment on a post.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28037">CVE-2020-28037</a>
-
- <p>is_blog_installed in wp-includes/functions.php in WordPress
- before 4.7.19 improperly determines whether WordPress is
- already installed, which might allow an attacker to perform
- a new installation, leading to remote code execution (as well
- as a denial of service for the old installation).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28038">CVE-2020-28038</a>
-
- <p>WordPress before 4.7.19 allows stored XSS via post slugs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28039">CVE-2020-28039</a>
-
- <p>is_protected_meta in wp-includes/meta.php in WordPress before
- 4.7.19 allows arbitrary file deletion because it does not
- properly determine whether a meta key is considered protected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28040">CVE-2020-28040</a>
-
- <p>WordPress before 4.7.19 allows CSRF attacks that change a
- theme's background image.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.7.19+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2429.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2430.data b/english/lts/security/2020/dla-2430.data
deleted file mode 100644
index 9305af57765..00000000000
--- a/english/lts/security/2020/dla-2430.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2430-1 blueman</define-tag>
-<define-tag report_date>2020-11-03</define-tag>
-<define-tag secrefs>CVE-2020-15238</define-tag>
-<define-tag packages>blueman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2430.wml b/english/lts/security/2020/dla-2430.wml
deleted file mode 100644
index 5311492024e..00000000000
--- a/english/lts/security/2020/dla-2430.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Vaisha Bernard discovered that Blueman, a graphical bluetooth manager
-performed insufficient validation on a D-Bus interface, which could
-result in denial of service or privilege escalation.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.0.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your blueman packages.</p>
-
-<p>For the detailed security status of blueman please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/blueman">https://security-tracker.debian.org/tracker/blueman</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2430.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2431.data b/english/lts/security/2020/dla-2431.data
deleted file mode 100644
index 3864ebece4e..00000000000
--- a/english/lts/security/2020/dla-2431.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2431-1 libonig</define-tag>
-<define-tag report_date>2020-11-5</define-tag>
-<define-tag secrefs>CVE-2019-13224 CVE-2019-16163 CVE-2019-19012 CVE-2019-19203 CVE-2019-19204 CVE-2019-19246 CVE-2020-26159 Bug#931878 Bug#939988 Bug#944959 Bug#945312 Bug#945313 Bug#946344 Bug#972113</define-tag>
-<define-tag packages>libonig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2431.wml b/english/lts/security/2020/dla-2431.wml
deleted file mode 100644
index 3eed05ad668..00000000000
--- a/english/lts/security/2020/dla-2431.wml
+++ /dev/null
@@ -1,74 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Oniguruma regular
-expressions library, notably used in PHP mbstring.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13224">CVE-2019-13224</a>
-
- <p>A use-after-free in onig_new_deluxe() in regext.c allows
- attackers to potentially cause information disclosure, denial of
- service, or possibly code execution by providing a crafted regular
- expression. The attacker provides a pair of a regex pattern and a
- string, with a multi-byte encoding that gets handled by
- onig_new_deluxe().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16163">CVE-2019-16163</a>
-
- <p>Oniguruma allows Stack Exhaustion in regcomp.c because of recursion
- in regparse.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19012">CVE-2019-19012</a>
-
- <p>An integer overflow in the search_in_range function in regexec.c in
- Onigurama leads to an out-of-bounds read, in which the offset of
- this read is under the control of an attacker. (This only affects
- the 32-bit compiled version). Remote attackers can cause a
- denial-of-service or information disclosure, or possibly have
- unspecified other impact, via a crafted regular expression.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19203">CVE-2019-19203</a>
-
- <p>An issue was discovered in Oniguruma. In the function
- gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is
- dereferenced without checking if it passed the end of the matched
- string. This leads to a heap-based buffer over-read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19204">CVE-2019-19204</a>
-
- <p>An issue was discovered in Oniguruma. In the function
- fetch_interval_quantifier (formerly known as fetch_range_quantifier)
- in regparse.c, PFETCH is called without checking PEND. This leads to
- a heap-based buffer over-read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19246">CVE-2019-19246</a>
-
- <p>Oniguruma has a heap-based buffer over-read in str_lower_case_match
- in regexec.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26159">CVE-2020-26159</a>
-
- <p>In Oniguruma an attacker able to supply a regular expression for
- compilation may be able to overflow a buffer by one byte in
- concat_opt_exact_str in src/regcomp.c</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-6.1.3-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libonig packages.</p>
-
-<p>For the detailed security status of libonig please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libonig">https://security-tracker.debian.org/tracker/libonig</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2431.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2432.data b/english/lts/security/2020/dla-2432.data
deleted file mode 100644
index c870cdf795e..00000000000
--- a/english/lts/security/2020/dla-2432.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2432-1 jupyter-notebook</define-tag>
-<define-tag report_date>2020-11-19</define-tag>
-<define-tag secrefs>CVE-2018-8768 CVE-2018-19351 CVE-2018-21030 Bug#893436 Bug#917409</define-tag>
-<define-tag packages>jupyter-notebook</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2432.wml b/english/lts/security/2020/dla-2432.wml
deleted file mode 100644
index 3d44df5b41a..00000000000
--- a/english/lts/security/2020/dla-2432.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in jupyter-notebook.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8768">CVE-2018-8768</a>
-
- <p>A maliciously forged notebook file can bypass sanitization to execute
- Javascript in the notebook context. Specifically, invalid HTML is
- <q>fixed</q> by jQuery after sanitization, making it dangerous.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19351">CVE-2018-19351</a>
-
- <p>allows XSS via an untrusted notebook because nbconvert responses are
- considered to have the same origin as the notebook server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-21030">CVE-2018-21030</a>
-
- <p>jupyter-notebook does not use a CSP header to treat served files as
- belonging to a separate origin. Thus, for example, an XSS payload can
- be placed in an SVG document.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.2.3-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your jupyter-notebook packages.</p>
-
-<p>For the detailed security status of jupyter-notebook please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jupyter-notebook">https://security-tracker.debian.org/tracker/jupyter-notebook</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2432.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2433.data b/english/lts/security/2020/dla-2433.data
deleted file mode 100644
index e62caad2e0b..00000000000
--- a/english/lts/security/2020/dla-2433.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2433-1 bouncycastle</define-tag>
-<define-tag report_date>2020-11-05</define-tag>
-<define-tag secrefs>CVE-2020-26939</define-tag>
-<define-tag packages>bouncycastle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2433.wml b/english/lts/security/2020/dla-2433.wml
deleted file mode 100644
index 1648fb72009..00000000000
--- a/english/lts/security/2020/dla-2433.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the
-bouncycastle crypto library where attackers could
-obtain sensitive information due to observable
-differences in its response to invalid input.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26939">CVE-2020-26939</a>
-
- <p>In Legion of the Bouncy Castle BC before 1.55 and
- BC-FJA before 1.0.1.2, attackers can obtain sensitive
- information about a private exponent because of
- Observable Differences in Behavior to Error Inputs. This
- occurs in
- org.bouncycastle.crypto.encodings.OAEPEncoding. Sending
- invalid ciphertext that decrypts to a short payload in
- the OAEP Decoder could result in the throwing of an
- early exception, potentially leaking some information
- about the private exponent of the RSA private key
- performing the encryption.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.56-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your bouncycastle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2433.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2434.data b/english/lts/security/2020/dla-2434.data
deleted file mode 100644
index 8581b520ebd..00000000000
--- a/english/lts/security/2020/dla-2434.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2434-1 gdm3</define-tag>
-<define-tag report_date>2020-11-05</define-tag>
-<define-tag secrefs>CVE-2020-16125</define-tag>
-<define-tag packages>gdm3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2434.wml b/english/lts/security/2020/dla-2434.wml
deleted file mode 100644
index 5b8228fdcce..00000000000
--- a/english/lts/security/2020/dla-2434.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the GNOME Display Manager where
-not detecting any users may make GDM launch initial system setup and thereby
-permitting the creation of new users with sudo capabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16125">CVE-2020-16125</a>
-
- <p>display: Exit with failure if loading existing users fails</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-3.22.3-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your gdm3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2434.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2435.data b/english/lts/security/2020/dla-2435.data
deleted file mode 100644
index 60b0b636c45..00000000000
--- a/english/lts/security/2020/dla-2435.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2435-1 guacamole-server</define-tag>
-<define-tag report_date>2020-11-6</define-tag>
-<define-tag secrefs>CVE-2020-9497 CVE-2020-9498 Bug#964195</define-tag>
-<define-tag packages>guacamole-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2435.wml b/english/lts/security/2020/dla-2435.wml
deleted file mode 100644
index ca5e543c35d..00000000000
--- a/english/lts/security/2020/dla-2435.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The server component of Apache Guacamole, a remote desktop gateway,
-did not properly validate data received from RDP servers. This could
-result
-in information disclosure or even the execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9497">CVE-2020-9497</a>
-
- <p>Apache Guacamole does not properly validate data received from RDP
- servers via static virtual channels. If a user connects to a
- malicious or compromised RDP server, specially-crafted PDUs could
- result in disclosure of information within the memory of the guacd
- process handling the connection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9498">CVE-2020-9498</a>
-
- <p>Apache Guacamole may mishandle pointers involved in processing data
- received via RDP static virtual channels. If a user connects to a
- malicious or compromised RDP server, a series of specially-crafted
- PDUs could result in memory corruption, possibly allowing arbitrary
- code to be executed with the privileges of the running guacd
- process.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.9.9-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your guacamole-server packages.</p>
-
-<p>For the detailed security status of guacamole-server please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/guacamole-server">https://security-tracker.debian.org/tracker/guacamole-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2435.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2436.data b/english/lts/security/2020/dla-2436.data
deleted file mode 100644
index 297236c2d85..00000000000
--- a/english/lts/security/2020/dla-2436.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2436-1 sddm</define-tag>
-<define-tag report_date>2020-11-06</define-tag>
-<define-tag secrefs>CVE-2020-28049</define-tag>
-<define-tag packages>sddm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2436.wml b/english/lts/security/2020/dla-2436.wml
deleted file mode 100644
index 2dbdbdf3b7f..00000000000
--- a/english/lts/security/2020/dla-2436.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the sddm display manager
-where local unprivileged users could create a connection to the X
-server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28049">CVE-2020-28049</a>
-
- <p>An issue was discovered in SDDM before 0.19.0. It incorrectly starts the
- X server in a way that - for a short time period - allows local
- unprivileged users to create a connection to the X server without providing
- proper authentication. A local attacker can thus access X server display
- contents and, for example, intercept keystrokes or access the clipboard.
- This is caused by a race condition during Xauthority file
- creation.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.14.0-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your sddm packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2436.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2437.data b/english/lts/security/2020/dla-2437.data
deleted file mode 100644
index af3da5ecd2d..00000000000
--- a/english/lts/security/2020/dla-2437.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2437-1 krb5</define-tag>
-<define-tag report_date>2020-11-07</define-tag>
-<define-tag secrefs>CVE-2020-28196</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2437.wml b/english/lts/security/2020/dla-2437.wml
deleted file mode 100644
index eb7f1276955..00000000000
--- a/english/lts/security/2020/dla-2437.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial of service vulnerability in the
-MIT Kerberos network authentication system, <tt>krb5</tt>. The lack of a limit
-in the ASN.1 decoder could lead to infinite recursion and allow an attacker to
-overrun the stack and cause the process to crash.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28196">CVE-2020-28196</a></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.15-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2437.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2438.data b/english/lts/security/2020/dla-2438.data
deleted file mode 100644
index 759b6553d00..00000000000
--- a/english/lts/security/2020/dla-2438.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2438-1 raptor2</define-tag>
-<define-tag report_date>2020-11-07</define-tag>
-<define-tag secrefs>CVE-2017-18926</define-tag>
-<define-tag packages>raptor2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2438.wml b/english/lts/security/2020/dla-2438.wml
deleted file mode 100644
index 777fc944a50..00000000000
--- a/english/lts/security/2020/dla-2438.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two heap overflow vulnerabilities in
-raptor2, a set of parsers for RDF files that is used, amongst others, in
-LibreOffice.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18926">CVE-2017-18926</a>
-
- <p>raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor
- RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for
- the XML writer, leading to heap-based buffer overflows (sometimes seen in
- raptor_qname_format_as_xml).</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.0.14-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your raptor2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2438.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2439.data b/english/lts/security/2020/dla-2439.data
deleted file mode 100644
index 53fb7b80b90..00000000000
--- a/english/lts/security/2020/dla-2439.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2439-1 libexif</define-tag>
-<define-tag report_date>2020-11-07</define-tag>
-<define-tag secrefs>CVE-2020-0452</define-tag>
-<define-tag packages>libexif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2439.wml b/english/lts/security/2020/dla-2439.wml
deleted file mode 100644
index 01113f61442..00000000000
--- a/english/lts/security/2020/dla-2439.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In libexif/exif-entry.c, through libexif 0.6.21-2+deb9u4,
-compiler optimization could remove a buffer overflow check,
-making a buffer overflow possible with some EXIF tags.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.6.21-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your libexif packages.</p>
-
-<p>For the detailed security status of libexif please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libexif">https://security-tracker.debian.org/tracker/libexif</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2439.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2440.data b/english/lts/security/2020/dla-2440.data
deleted file mode 100644
index bdc85c4faf5..00000000000
--- a/english/lts/security/2020/dla-2440.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2440-1 poppler</define-tag>
-<define-tag report_date>2020-11-8</define-tag>
-<define-tag secrefs>CVE-2017-14926 CVE-2017-14928 CVE-2018-19058 CVE-2018-20650 CVE-2018-20662 CVE-2019-7310 CVE-2019-9959 CVE-2019-10018 CVE-2019-14494 Bug#877239 Bug#877231 Bug#913177 Bug#917974 Bug#918158 Bug#926133</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2440.wml b/english/lts/security/2020/dla-2440.wml
deleted file mode 100644
index 3791c9c86ea..00000000000
--- a/english/lts/security/2020/dla-2440.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found and corrected in Poppler, a PDF rendering library,
-that could lead to denial of service or possibly other unspecified impact when
-processing maliciously crafted documents.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.48.0-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>For the detailed security status of poppler please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/poppler">https://security-tracker.debian.org/tracker/poppler</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2440.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2441.data b/english/lts/security/2020/dla-2441.data
deleted file mode 100644
index 0f06b7d38bb..00000000000
--- a/english/lts/security/2020/dla-2441.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2441-1 sympa</define-tag>
-<define-tag report_date>2020-11-09</define-tag>
-<define-tag secrefs>CVE-2018-1000671 CVE-2020-26880 Bug#908165 Bug#972189</define-tag>
-<define-tag packages>sympa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2441.wml b/english/lts/security/2020/dla-2441.wml
deleted file mode 100644
index d53a0618bd3..00000000000
--- a/english/lts/security/2020/dla-2441.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A privilege escalation was discovered in Sympa, a modern mailing list
-manager. It is fixed when Sympa is used in conjunction with common
-MTAs (such as Exim or Postfix) by disabling a setuid executable,
-although no fix is currently available for all environments (such as
-sendmail). Additionally, an open-redirect vulnerability was
-discovered and fixed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26880">CVE-2020-26880</a>
-
- <p>Sympa allows a local privilege escalation from the sympa user
- account to full root access by modifying the sympa.conf
- configuration file (which is owned by sympa) and parsing it
- through the setuid sympa_newaliases-wrapper executable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000671">CVE-2018-1000671</a>
-
- <p>Sympa contains a CWE-601: URL Redirection to Untrusted Site ('Open
- Redirect') vulnerability in The <q>referer</q> parameter of the
- wwsympa.fcgi login action. that can result in Open redirection and
- reflected XSS via data URIs.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-6.2.16~dfsg-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your sympa packages.</p>
-
-<p>For the detailed security status of sympa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sympa">https://security-tracker.debian.org/tracker/sympa</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2441.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2442.data b/english/lts/security/2020/dla-2442.data
deleted file mode 100644
index f73d69b0ba8..00000000000
--- a/english/lts/security/2020/dla-2442.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2442-1 obfs4proxy</define-tag>
-<define-tag report_date>2020-11-10</define-tag>
-<define-tag secrefs>CVE-2019-11840</define-tag>
-<define-tag packages>obfs4proxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2442.wml b/english/lts/security/2020/dla-2442.wml
deleted file mode 100644
index a90b0e94c55..00000000000
--- a/english/lts/security/2020/dla-2442.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>golang-go.crypto was recently updated with a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>. This in
-turn requires all packages that use the affected code to be recompiled in order
-to pick up the security fix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>
-
- <p>An issue was discovered in supplementary Go cryptography libraries, aka
- golang-googlecode-go-crypto. If more than 256 GiB of keystream is
- generated, or if the counter otherwise grows greater than 32 bits, the amd64
- implementation will first generate incorrect output, and then cycle back to
- previously generated keystream. Repeated keystream bytes can lead to loss of
- confidentiality in encryption applications, or to predictability in CSPRNG
- applications.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version3
-0.0.7-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your obfs4proxy packages.</p>
-
-<p>For the detailed security status of obfs4proxy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/obfs4proxy">https://security-tracker.debian.org/tracker/obfs4proxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2442.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2443.data b/english/lts/security/2020/dla-2443.data
deleted file mode 100644
index 15a32192f87..00000000000
--- a/english/lts/security/2020/dla-2443.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2443-1 zeromq3</define-tag>
-<define-tag report_date>2020-11-10</define-tag>
-<define-tag secrefs>CVE-2020-15166</define-tag>
-<define-tag packages>zeromq3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2443.wml b/english/lts/security/2020/dla-2443.wml
deleted file mode 100644
index 9e480d84c6c..00000000000
--- a/english/lts/security/2020/dla-2443.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that ZeroMQ, a lightweight messaging kernel
-library does not properly handle connecting peers before a
-handshake is completed. A remote, unauthenticated client connecting
-to an application using the libzmq library, running with a socket
-listening with CURVE encryption/authentication enabled can take
-advantage of this flaw to cause a denial of service affecting
-authenticated and encrypted clients.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.2.1-4+deb9u3.</p>
-
-<p>We recommend that you upgrade your zeromq3 packages.</p>
-
-<p>For the detailed security status of zeromq3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zeromq3">https://security-tracker.debian.org/tracker/zeromq3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2443.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2444.data b/english/lts/security/2020/dla-2444.data
deleted file mode 100644
index 5d8cc74bfa7..00000000000
--- a/english/lts/security/2020/dla-2444.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2444-1 tcpdump</define-tag>
-<define-tag report_date>2020-11-10</define-tag>
-<define-tag secrefs>CVE-2020-8037 Bug#973877</define-tag>
-<define-tag packages>tcpdump</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2444.wml b/english/lts/security/2020/dla-2444.wml
deleted file mode 100644
index 91db281069f..00000000000
--- a/english/lts/security/2020/dla-2444.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ppp de-capsulator in tcpdump 4.9.3 can be convinced to allocate
-a large amount of memory.</p>
-
-<p>The buffer should be big enough to hold the captured data, but it
-doesn’t need to be big enough to hold the entire on-the-network
-packet, if we haven’t captured all of it.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.9.3-1~deb9u2.</p>
-
-<p>We recommend that you upgrade your tcpdump packages.</p>
-
-<p>For the detailed security status of tcpdump please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tcpdump">https://security-tracker.debian.org/tracker/tcpdump</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2444.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2445.data b/english/lts/security/2020/dla-2445.data
deleted file mode 100644
index a592f8bc3a5..00000000000
--- a/english/lts/security/2020/dla-2445.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2445-1 libmaxminddb</define-tag>
-<define-tag report_date>2020-11-10</define-tag>
-<define-tag secrefs>CVE-2020-28241 Bug#973878</define-tag>
-<define-tag packages>libmaxminddb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2445.wml b/english/lts/security/2020/dla-2445.wml
deleted file mode 100644
index 76e9036f4d5..00000000000
--- a/english/lts/security/2020/dla-2445.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer over-read has been found in libmaxminddb, an IP geolocation
-database library. This could be exploited when the mmdblookup tool is used to
-open a specially crafted database file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libmaxminddb packages.</p>
-
-<p>For the detailed security status of libmaxminddb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libmaxminddb">https://security-tracker.debian.org/tracker/libmaxminddb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2445.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2446.data b/english/lts/security/2020/dla-2446.data
deleted file mode 100644
index 84b98646afe..00000000000
--- a/english/lts/security/2020/dla-2446.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2446-1 moin</define-tag>
-<define-tag report_date>2020-11-10</define-tag>
-<define-tag secrefs>CVE-2020-15275 CVE-2020-25074</define-tag>
-<define-tag packages>moin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2446.wml b/english/lts/security/2020/dla-2446.wml
deleted file mode 100644
index dd79ad6400b..00000000000
--- a/english/lts/security/2020/dla-2446.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities were discovered in moin, a Python clone of WikiWiki.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15275">CVE-2020-15275</a>
-
- <p>Catarina Leite discovered that moin is prone to a stored XSS
- vulnerability via SVG attachments.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25074">CVE-2020-25074</a>
-
- <p>Michael Chapman discovered that moin is prone to a remote code
- execution vulnerability via the cache action.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9.9-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your moin packages.</p>
-
-<p>For the detailed security status of moin please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/moin">https://security-tracker.debian.org/tracker/moin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2446.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2447-2.data b/english/lts/security/2020/dla-2447-2.data
deleted file mode 100644
index 86415a59391..00000000000
--- a/english/lts/security/2020/dla-2447-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2447-2 pacemaker</define-tag>
-<define-tag report_date>2020-11-17</define-tag>
-<define-tag secrefs>Bug#974563</define-tag>
-<define-tag packages>pacemaker</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2447-2.wml b/english/lts/security/2020/dla-2447-2.wml
deleted file mode 100644
index 2d38133add0..00000000000
--- a/english/lts/security/2020/dla-2447-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of pacemaker released as DLA-2447-1 caused a regression when the
-communication between the Corosync cluster engine and pacemaker takes place. A
-permission problem prevents IPC requests between cluster nodes. The patch for
-<a href="https://security-tracker.debian.org/tracker/CVE-2020-25654">CVE-2020-25654</a> has been reverted until a better solution can be found.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.16-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your pacemaker packages.</p>
-
-<p>For the detailed security status of pacemaker please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pacemaker">https://security-tracker.debian.org/tracker/pacemaker</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2447-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2447.data b/english/lts/security/2020/dla-2447.data
deleted file mode 100644
index 9edd1ac6fa5..00000000000
--- a/english/lts/security/2020/dla-2447.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2447-1 pacemaker</define-tag>
-<define-tag report_date>2020-11-12</define-tag>
-<define-tag secrefs>CVE-2020-25654 Bug#973254</define-tag>
-<define-tag packages>pacemaker</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2447.wml b/english/lts/security/2020/dla-2447.wml
deleted file mode 100644
index 349a2587dde..00000000000
--- a/english/lts/security/2020/dla-2447.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An ACL bypass flaw was found in pacemaker, a cluster resource manager.
-An attacker having a local account on the cluster and in the haclient group
-could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.16-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your pacemaker packages.</p>
-
-<p>For the detailed security status of pacemaker please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pacemaker">https://security-tracker.debian.org/tracker/pacemaker</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2447.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2448.data b/english/lts/security/2020/dla-2448.data
deleted file mode 100644
index 92ef25d8c11..00000000000
--- a/english/lts/security/2020/dla-2448.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2448-1 firefox-esr</define-tag>
-<define-tag report_date>2020-11-11</define-tag>
-<define-tag secrefs>CVE-2020-26950</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2448.wml b/english/lts/security/2020/dla-2448.wml
deleted file mode 100644
index 70b2d61dd10..00000000000
--- a/english/lts/security/2020/dla-2448.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free was found in the Mozilla Firefox web browser, which
-could potentially result in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-78.4.1esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2448.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2449.data b/english/lts/security/2020/dla-2449.data
deleted file mode 100644
index 71cb9963cec..00000000000
--- a/english/lts/security/2020/dla-2449.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2449-1 thunderbird</define-tag>
-<define-tag report_date>2020-11-13</define-tag>
-<define-tag secrefs>CVE-2020-26950</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2449.wml b/english/lts/security/2020/dla-2449.wml
deleted file mode 100644
index 0f0832bf40e..00000000000
--- a/english/lts/security/2020/dla-2449.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free was found in Thunderbird, which could potentially result
-in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:78.4.2-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2449.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2450.data b/english/lts/security/2020/dla-2450.data
deleted file mode 100644
index 4ec6bf5db03..00000000000
--- a/english/lts/security/2020/dla-2450.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2450-1 libproxy</define-tag>
-<define-tag report_date>2020-11-13</define-tag>
-<define-tag secrefs>CVE-2020-26154 Bug#968366</define-tag>
-<define-tag packages>libproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2450.wml b/english/lts/security/2020/dla-2450.wml
deleted file mode 100644
index 71a70ae410d..00000000000
--- a/english/lts/security/2020/dla-2450.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Li Fei found that libproxy, a library for automatic proxy configuration
-management, was vulnerable to a buffer overflow vulnerability when
-receiving a large PAC file from a server without a Content-Length header
-in the response.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.4.14-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your libproxy packages.</p>
-
-<p>For the detailed security status of libproxy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libproxy">https://security-tracker.debian.org/tracker/libproxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2450.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2451.data b/english/lts/security/2020/dla-2451.data
deleted file mode 100644
index 16ff54b569b..00000000000
--- a/english/lts/security/2020/dla-2451.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2451-1 libvncserver</define-tag>
-<define-tag report_date>2020-11-15</define-tag>
-<define-tag secrefs>CVE-2020-25708</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2451.wml b/english/lts/security/2020/dla-2451.wml
deleted file mode 100644
index cb91db647cd..00000000000
--- a/english/lts/security/2020/dla-2451.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libvncserver, an API to write one's own VNC
-server.
-Due to some missing checks, a divide by zero could happen, which could
-result in a denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.11+dfsg-1.3~deb9u6.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>For the detailed security status of libvncserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvncserver">https://security-tracker.debian.org/tracker/libvncserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2451.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2452-2.data b/english/lts/security/2020/dla-2452-2.data
deleted file mode 100644
index 9182a40cd42..00000000000
--- a/english/lts/security/2020/dla-2452-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2452-2 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2020-11-17</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2452-2.wml b/english/lts/security/2020/dla-2452-2.wml
deleted file mode 100644
index e2993570678..00000000000
--- a/english/lts/security/2020/dla-2452-2.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-<p>libdatetime-timezone-perl 2.09-1+2020d did accidentally omit changes to some files,
-resulting in warnings.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.09-1+2020d+1.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2452-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2452.data b/english/lts/security/2020/dla-2452.data
deleted file mode 100644
index 2f652c8ad23..00000000000
--- a/english/lts/security/2020/dla-2452.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2452-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2020-11-16</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2452.wml b/english/lts/security/2020/dla-2452.wml
deleted file mode 100644
index 02605c7d951..00000000000
--- a/english/lts/security/2020/dla-2452.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-<define-tag description>LTS new upstream version</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2020d for the
-Perl bindings.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.09-1+2020d.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2452.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2453.data b/english/lts/security/2020/dla-2453.data
deleted file mode 100644
index 2e2d4e513cc..00000000000
--- a/english/lts/security/2020/dla-2453.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2453-1 restic</define-tag>
-<define-tag report_date>2020-11-17</define-tag>
-<define-tag secrefs>CVE-2020-9283</define-tag>
-<define-tag packages>restic</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2453.wml b/english/lts/security/2020/dla-2453.wml
deleted file mode 100644
index badcdcc1712..00000000000
--- a/english/lts/security/2020/dla-2453.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>golang-go.crypto was recently updated with a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2020-9283">CVE-2020-9283</a>. This in
-turn requires all packages that use the affected code to be recompiled in order
-to pick up the security fix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9283">CVE-2020-9283</a>
-
- <p>SSH signature verification could cause Panic when given
- invalid Public key.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.3.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your restic packages.</p>
-
-<p>For the detailed security status of restic please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/restic">https://security-tracker.debian.org/tracker/restic</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2453.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2454.data b/english/lts/security/2020/dla-2454.data
deleted file mode 100644
index 7c8e41f6db2..00000000000
--- a/english/lts/security/2020/dla-2454.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2454-1 rclone</define-tag>
-<define-tag report_date>2020-11-19</define-tag>
-<define-tag secrefs>CVE-2019-11840</define-tag>
-<define-tag packages>rclone</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2454.wml b/english/lts/security/2020/dla-2454.wml
deleted file mode 100644
index d8a0a5c678d..00000000000
--- a/english/lts/security/2020/dla-2454.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>golang-go.crypto was recently updated with a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>. This in
-turn requires all packages that use the affected code to be recompiled in order
-to pick up the security fix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>
-
- <p>An issue was discovered in supplementary Go cryptography libraries, aka
- golang-googlecode-go-crypto. If more than 256 GiB of keystream is
- generated, or if the counter otherwise grows greater than 32 bits, the amd64
- implementation will first generate incorrect output, and then cycle back to
- previously generated keystream. Repeated keystream bytes can lead to loss of
- confidentiality in encryption applications, or to predictability in CSPRNG
- applications.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.35-1+deb8u1.</p>
-
-<p>We recommend that you upgrade your rclone packages.</p>
-
-<p>For the detailed security status of rclone please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rclone">https://security-tracker.debian.org/tracker/rclone</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2454.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2455.data b/english/lts/security/2020/dla-2455.data
deleted file mode 100644
index 34a7512a2f2..00000000000
--- a/english/lts/security/2020/dla-2455.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2455-1 packer</define-tag>
-<define-tag report_date>2020-11-19</define-tag>
-<define-tag secrefs>CVE-2020-9283</define-tag>
-<define-tag packages>packer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2455.wml b/english/lts/security/2020/dla-2455.wml
deleted file mode 100644
index f20d66c65f3..00000000000
--- a/english/lts/security/2020/dla-2455.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>golang-go.crypto was recently updated with a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2020-9283">CVE-2020-9283</a>. This in
-turn requires all packages that use the affected code to be recompiled in order
-to pick up the security fix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9283">CVE-2020-9283</a>
-
- <p>SSH signature verification could cause Panic when given
- invalid Public key.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.10.2+dfsg-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your packer packages.</p>
-
-<p>For the detailed security status of packer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/packer">https://security-tracker.debian.org/tracker/packer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2455.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2456.data b/english/lts/security/2020/dla-2456.data
deleted file mode 100644
index 2c40afb5e89..00000000000
--- a/english/lts/security/2020/dla-2456.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2456-1 python3.5</define-tag>
-<define-tag report_date>2020-11-18</define-tag>
-<define-tag secrefs>CVE-2019-20907 CVE-2020-26116</define-tag>
-<define-tag packages>python3.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2456.wml b/english/lts/security/2020/dla-2456.wml
deleted file mode 100644
index d29b91716cb..00000000000
--- a/english/lts/security/2020/dla-2456.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Python.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20907">CVE-2019-20907</a>
-
- <p>In Lib/tarfile.py, an attacker is able to craft a TAR
- archive leading to an infinite loop when opened by tarfile.open,
- because _proc_pax lacks header validation</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26116">CVE-2020-26116</a>
-
- <p>http.client allows CRLF injection if the attacker controls
- the HTTP request method</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.3-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your python3.5 packages.</p>
-
-<p>For the detailed security status of python3.5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.5">https://security-tracker.debian.org/tracker/python3.5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2456.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2457.data b/english/lts/security/2020/dla-2457.data
deleted file mode 100644
index 4b62b3c5449..00000000000
--- a/english/lts/security/2020/dla-2457.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2457-1 firefox-esr</define-tag>
-<define-tag report_date>2020-11-19</define-tag>
-<define-tag secrefs>CVE-2020-16012 CVE-2020-26951 CVE-2020-26953 CVE-2020-26956 CVE-2020-26958 CVE-2020-26959 CVE-2020-26960 CVE-2020-26961 CVE-2020-26965 CVE-2020-26968</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2457.wml b/english/lts/security/2020/dla-2457.wml
deleted file mode 100644
index e148bf5edc2..00000000000
--- a/english/lts/security/2020/dla-2457.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure, phishing, cross-site scripting or a DNS
-rebinding attack.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.5.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2457.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2458.data b/english/lts/security/2020/dla-2458.data
deleted file mode 100644
index 848aa0d7991..00000000000
--- a/english/lts/security/2020/dla-2458.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2458-1 drupal7</define-tag>
-<define-tag report_date>2020-11-19</define-tag>
-<define-tag secrefs>CVE-2020-13666 CVE-2020-13671</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2458.wml b/english/lts/security/2020/dla-2458.wml
deleted file mode 100644
index 1ffaf758a73..00000000000
--- a/english/lts/security/2020/dla-2458.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in Drupal, a fully-featured content
-management framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13666">CVE-2020-13666</a>
-
- <p>The Drupal AJAX API did not disable JSONP by default, which could
- lead to cross-site scripting.</p>
-
- <p>For setups that relied on Drupal's AJAX API for JSONP requests,
- either JSONP will need to be reenabled, or the jQuery AJAX API will
- have to be used instead.</p>
-
- <p>See the upstream advisory for more details:
- <a href="https://www.drupal.org/sa-core-2020-007">https://www.drupal.org/sa-core-2020-007</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13671">CVE-2020-13671</a>
-
- <p>Drupal failed to sanitize filenames on uploaded files, which could
- lead to those files being served as the wrong MIME type, or being
- executed depending on the server configuration.</p>
-
- <p>It is also recommended to check previously uploaded files for
- malicious extensions. For more details see the upstream advisory:
- <a href="https://www.drupal.org/sa-core-2020-012">https://www.drupal.org/sa-core-2020-012</a></p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.52-2+deb9u12.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>For the detailed security status of drupal7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/drupal7">https://security-tracker.debian.org/tracker/drupal7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2458.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2459.data b/english/lts/security/2020/dla-2459.data
deleted file mode 100644
index b6331a4fe1b..00000000000
--- a/english/lts/security/2020/dla-2459.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2459-1 golang-1.7</define-tag>
-<define-tag report_date>2020-11-21</define-tag>
-<define-tag secrefs>CVE-2020-15586 CVE-2020-16845</define-tag>
-<define-tag packages>golang-1.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2459.wml b/english/lts/security/2020/dla-2459.wml
deleted file mode 100644
index fc37d39d417..00000000000
--- a/english/lts/security/2020/dla-2459.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in golang-1.7, a Go programming language
-compiler version 1.7</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15586">CVE-2020-15586</a>
-
- <p>Using the 100-continue in HTTP headers received by a net/http/Server
- can lead to a data race involving the connection's buffered writer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16845">CVE-2020-16845</a>
-
- <p>Certain invalid inputs to ReadUvarint or ReadVarint could cause those
- functions to read an unlimited number of bytes from the ByteReader
- argument before returning an error.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.4-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your golang-1.7 packages.</p>
-
-<p>For the detailed security status of golang-1.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.7">https://security-tracker.debian.org/tracker/golang-1.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2459.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2460.data b/english/lts/security/2020/dla-2460.data
deleted file mode 100644
index 9515552e594..00000000000
--- a/english/lts/security/2020/dla-2460.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2460-1 golang-1.8</define-tag>
-<define-tag report_date>2020-11-21</define-tag>
-<define-tag secrefs>CVE-2020-15586 CVE-2020-16845 CVE-2020-28367</define-tag>
-<define-tag packages>golang-1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2460.wml b/english/lts/security/2020/dla-2460.wml
deleted file mode 100644
index 2172d83f172..00000000000
--- a/english/lts/security/2020/dla-2460.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three issues have been found in golang-1.8, a Go programming language
-compiler version 1.8</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15586">CVE-2020-15586</a>
-
- <p>Using the 100-continue in HTTP headers received by a net/http/Server
- can lead to a data race involving the connection's buffered writer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16845">CVE-2020-16845</a>
-
- <p>Certain invalid inputs to ReadUvarint or ReadVarint could cause those
- functions to read an unlimited number of bytes from the ByteReader
- argument before returning an error.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28367">CVE-2020-28367</a>
-
- <p>When using cgo, arbitrary code might be executed at build time.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8.1-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your golang-1.8 packages.</p>
-
-<p>For the detailed security status of golang-1.8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.8">https://security-tracker.debian.org/tracker/golang-1.8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2460.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2461.data b/english/lts/security/2020/dla-2461.data
deleted file mode 100644
index b0f076afd67..00000000000
--- a/english/lts/security/2020/dla-2461.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2461-1 zabbix</define-tag>
-<define-tag report_date>2020-11-21</define-tag>
-<define-tag secrefs>CVE-2016-10742 CVE-2020-11800</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2461.wml b/english/lts/security/2020/dla-2461.wml
deleted file mode 100644
index 833e1f74d2d..00000000000
--- a/english/lts/security/2020/dla-2461.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Zabbix, a network
-monitoring solution. An attacker may remotely execute code on the
-zabbix server, and redirect to external links through the zabbix web
-frontend.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10742">CVE-2016-10742</a>
-
- <p>Zabbix allows open redirect via the request parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11800">CVE-2020-11800</a>
-
- <p>Zabbix allows remote attackers to execute arbitrary code.</p></li>
-
-</ul>
-
-<p>This update also includes several other bug fixes and
-improvements. For more information please refer to the upstream
-changelog file.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:3.0.31+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2461.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2462.data b/english/lts/security/2020/dla-2462.data
deleted file mode 100644
index e249674f431..00000000000
--- a/english/lts/security/2020/dla-2462.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2462-1 cimg</define-tag>
-<define-tag report_date>2020-11-23</define-tag>
-<define-tag secrefs>CVE-2020-25693</define-tag>
-<define-tag packages>cimg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2462.wml b/english/lts/security/2020/dla-2462.wml
deleted file mode 100644
index a80e81d650a..00000000000
--- a/english/lts/security/2020/dla-2462.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple heap buffer overflows have been fixed in CImg,
-a C++ toolkit to load, save, process and display images.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.9+dfsg-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your cimg packages.</p>
-
-<p>For the detailed security status of cimg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cimg">https://security-tracker.debian.org/tracker/cimg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2462.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2463.data b/english/lts/security/2020/dla-2463.data
deleted file mode 100644
index ca166aa7dd7..00000000000
--- a/english/lts/security/2020/dla-2463.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2463-1 samba</define-tag>
-<define-tag report_date>2020-11-22</define-tag>
-<define-tag secrefs>CVE-2020-1472 CVE-2020-10704 CVE-2020-10730 CVE-2020-10745 CVE-2020-10760 CVE-2020-14303 CVE-2020-14318 CVE-2020-14323 CVE-2020-14383</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2463.wml b/english/lts/security/2020/dla-2463.wml
deleted file mode 100644
index 6e82a7e3922..00000000000
--- a/english/lts/security/2020/dla-2463.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Samba, a SMB/CIFS file,
-print, and login server for Unix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1472">CVE-2020-1472</a>
-
- <p>Unauthenticated domain controller compromise by subverting Netlogon
- cryptography. This vulnerability includes both ZeroLogon and
- non-ZeroLogon variations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10704">CVE-2020-10704</a>
-
- <p>An unauthorized user can trigger a denial of service via a stack
- overflow in the AD DC LDAP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10730">CVE-2020-10730</a>
-
- <p>NULL pointer de-reference and use-after-free in Samba AD DC LDAP
- Server with ASQ, VLV and paged_results.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10745">CVE-2020-10745</a>
-
- <p>Denial of service resulting from abuse of compression of replies to
- NetBIOS over TCP/IP name resolution and DNS packets causing excessive
- CPU load on the Samba AD DC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10760">CVE-2020-10760</a>
-
- <p>The use of the paged_results or VLV controls against the Global
- Catalog LDAP server on the AD DC will cause a use-after-free.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14303">CVE-2020-14303</a>
-
- <p>Denial of service resulting from CPU spin and and inability to
- process further requests once the AD DC NBT server receives an empty
- (zero-length) UDP packet to port 137.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14318">CVE-2020-14318</a>
-
- <p>Missing handle permissions check in ChangeNotify</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14323">CVE-2020-14323</a>
-
- <p>Unprivileged user can crash winbind via invalid lookupsids DoS</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14383">CVE-2020-14383</a>
-
- <p>DNS server crash via invalid records resulting from uninitialized
- variables</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:4.5.16+dfsg-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>For the detailed security status of samba please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/samba">https://security-tracker.debian.org/tracker/samba</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2463.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2464.data b/english/lts/security/2020/dla-2464.data
deleted file mode 100644
index e5c8d97f8ab..00000000000
--- a/english/lts/security/2020/dla-2464.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2464-1 thunderbird</define-tag>
-<define-tag report_date>2020-11-23</define-tag>
-<define-tag secrefs>CVE-2020-16012 CVE-2020-26951 CVE-2020-26953 CVE-2020-26956 CVE-2020-26958 CVE-2020-26959 CVE-2020-26960 CVE-2020-26961 CVE-2020-26965 CVE-2020-26968</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2464.wml b/english/lts/security/2020/dla-2464.wml
deleted file mode 100644
index 73859446e1a..00000000000
--- a/english/lts/security/2020/dla-2464.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code or denial of service.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.5.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2464.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2465.data b/english/lts/security/2020/dla-2465.data
deleted file mode 100644
index 06e8f1663f1..00000000000
--- a/english/lts/security/2020/dla-2465.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2465-1 php-pear</define-tag>
-<define-tag report_date>2020-11-23</define-tag>
-<define-tag secrefs>CVE-2020-28948 CVE-2020-28949</define-tag>
-<define-tag packages>php-pear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2465.wml b/english/lts/security/2020/dla-2465.wml
deleted file mode 100644
index 9d57a32f82e..00000000000
--- a/english/lts/security/2020/dla-2465.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a filename sanitisation issue in
-<tt>php-pear</tt>, a distribution system for reusable PHP components.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28948">CVE-2020-28948</a>
-
- <p>Archive_Tar through 1.4.10 allows an unserialization attack because
- phar: is blocked but PHAR: is not blocked.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28949">CVE-2020-28949</a>
-
- <p>Archive_Tar through 1.4.10 has :// filename sanitization only to address
- phar attacks, and thus any other stream-wrapper attack (such as file:// to
- overwrite files) can still succeed.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.1+submodules+notgz-9+deb9u2.</p>
-
-<p>We recommend that you upgrade your php-pear packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2465.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2466.data b/english/lts/security/2020/dla-2466.data
deleted file mode 100644
index 76d5d48b41a..00000000000
--- a/english/lts/security/2020/dla-2466.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2466-1 drupal7</define-tag>
-<define-tag report_date>2020-11-27</define-tag>
-<define-tag secrefs>CVE-2020-28948 CVE-2020-28949</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2466.wml b/english/lts/security/2020/dla-2466.wml
deleted file mode 100644
index 4e31569a3ad..00000000000
--- a/english/lts/security/2020/dla-2466.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in the Archive_Tar PHP module, used by
-Drupal, which could result in the execution of arbitrary code if a
-malicious user is allowed to upload tar archives.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.52-2+deb9u13.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>For the detailed security status of drupal7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/drupal7">https://security-tracker.debian.org/tracker/drupal7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2466.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2467-2.data b/english/lts/security/2020/dla-2467-2.data
deleted file mode 100644
index eb899084f0c..00000000000
--- a/english/lts/security/2020/dla-2467-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2467-2 lxml</define-tag>
-<define-tag report_date>2020-12-18</define-tag>
-<define-tag secrefs>CVE-2020-27783</define-tag>
-<define-tag packages>lxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2467-2.wml b/english/lts/security/2020/dla-2467-2.wml
deleted file mode 100644
index 36dac29d13f..00000000000
--- a/english/lts/security/2020/dla-2467-2.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2020-27783">CVE-2020-27783</a>, released as DLA 2467-1, was incomplete as
-the &lt;math/svg&gt; component was still affected by the vulnerability. This
-update includes an additional patch that completes the fix. Note that a
-package with version 3.7.1-1+deb9u2 was uploaded, but before the
-publication of the advisory a regression was discovered, which was
-immediately corrected prior to publication of this advisory.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.7.1-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your lxml packages.</p>
-
-<p>For the detailed security status of lxml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lxml">https://security-tracker.debian.org/tracker/lxml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2467-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2467.data b/english/lts/security/2020/dla-2467.data
deleted file mode 100644
index af6e8faa316..00000000000
--- a/english/lts/security/2020/dla-2467.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2467-1 lxml</define-tag>
-<define-tag report_date>2020-11-27</define-tag>
-<define-tag secrefs>CVE-2018-19787 CVE-2020-27783</define-tag>
-<define-tag packages>lxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2467.wml b/english/lts/security/2020/dla-2467.wml
deleted file mode 100644
index 932a967f2b5..00000000000
--- a/english/lts/security/2020/dla-2467.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19787">CVE-2018-19787</a>
-
- <p>It was discovered that there was a XSS injection vulnerability in
- the LXML HTML/XSS manipulation library for Python.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27783">CVE-2020-27783</a>
-
- <p>javascript escaping through the &lt;noscript&gt; and &lt;style&gt; combinations.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.7.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your lxml packages.</p>
-
-<p>For the detailed security status of lxml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lxml">https://security-tracker.debian.org/tracker/lxml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2467.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2468.data b/english/lts/security/2020/dla-2468.data
deleted file mode 100644
index 432e1ca6d66..00000000000
--- a/english/lts/security/2020/dla-2468.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2468-1 tcpflow</define-tag>
-<define-tag report_date>2020-11-28</define-tag>
-<define-tag secrefs>CVE-2018-14938</define-tag>
-<define-tag packages>tcpflow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2468.wml b/english/lts/security/2020/dla-2468.wml
deleted file mode 100644
index 4374d13cfc4..00000000000
--- a/english/lts/security/2020/dla-2468.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in tcpflow, a TCP flow recorder.</p>
-
-<p>Due to an overflow vulnerability in function handle_80211, an
-out-of-bounds read with access to sensitive memory or a denial of service
-might happen.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.4+repack1-3+deb8u1.</p>
-
-<p>We recommend that you upgrade your tcpflow packages.</p>
-
-<p>For the detailed security status of tcpflow please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tcpflow">https://security-tracker.debian.org/tracker/tcpflow</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2468.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2469.data b/english/lts/security/2020/dla-2469.data
deleted file mode 100644
index 09901144ed4..00000000000
--- a/english/lts/security/2020/dla-2469.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2469-1 qemu</define-tag>
-<define-tag report_date>2020-11-29</define-tag>
-<define-tag secrefs>CVE-2020-25085 CVE-2020-25624 CVE-2020-25625 CVE-2020-25723 CVE-2020-27617</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2469.wml b/english/lts/security/2020/dla-2469.wml
deleted file mode 100644
index 325e1043144..00000000000
--- a/english/lts/security/2020/dla-2469.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Some issues have been found in qemu, a fast processor emulator.</p>
-
-<p>All issues are related to assertion failures, out-of-bounds access
-failures or bad handling of return codes.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u12.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2469.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2470.data b/english/lts/security/2020/dla-2470.data
deleted file mode 100644
index f23dda4f328..00000000000
--- a/english/lts/security/2020/dla-2470.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2470-1 zsh</define-tag>
-<define-tag report_date>2020-12-1</define-tag>
-<define-tag secrefs>CVE-2017-18206 CVE-2018-0502 CVE-2018-1071 CVE-2018-1083 CVE-2018-1100 CVE-2018-13259 CVE-2019-20044 Bug#908000 Bug#894044 Bug#894043 Bug#895225 Bug#951458</define-tag>
-<define-tag packages>zsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2470.wml b/english/lts/security/2020/dla-2470.wml
deleted file mode 100644
index 563dfcc262d..00000000000
--- a/english/lts/security/2020/dla-2470.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2018-1100">CVE-2018-1100</a> <a href="https://security-tracker.debian.org/tracker/CVE-2018-13259">CVE-2018-13259</a> <a href="https://security-tracker.debian.org/tracker/CVE-2019-20044">CVE-2019-20044</a>
-Debian Bug : 908000 894044 894043 895225 951458</p>
-
-<p>Several security vulnerabilities were found and corrected in zsh, a powerful
-shell and scripting language. Off-by-one errors, wrong parsing of shebang lines
-and buffer overflows may lead to unexpected behavior. A local, unprivileged
-user can create a specially crafted message file or directory path. If the
-receiving user is privileged or traverses the aforementioned path, this leads
-to privilege escalation.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.3.1-4+deb9u4.</p>
-
-<p>We recommend that you upgrade your zsh packages.</p>
-
-<p>For the detailed security status of zsh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zsh">https://security-tracker.debian.org/tracker/zsh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2470.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2471.data b/english/lts/security/2020/dla-2471.data
deleted file mode 100644
index a8d659db406..00000000000
--- a/english/lts/security/2020/dla-2471.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2471-1 libxstream-java</define-tag>
-<define-tag report_date>2020-12-1</define-tag>
-<define-tag secrefs>CVE-2020-26217</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2471.wml b/english/lts/security/2020/dla-2471.wml
deleted file mode 100644
index f0ade9feeba..00000000000
--- a/english/lts/security/2020/dla-2471.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that XStream is vulnerable to Remote Code Execution. The
-vulnerability may allow a remote attacker to run arbitrary shell commands only
-by manipulating the processed input stream. Users who rely on blocklists
-are affected (the default in Debian). We strongly recommend to use the
-whitelist approach of XStream's Security Framework because there are likely
-more class combinations the blacklist approach may not address.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.9-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>For the detailed security status of libxstream-java please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxstream-java">https://security-tracker.debian.org/tracker/libxstream-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2471.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2472.data b/english/lts/security/2020/dla-2472.data
deleted file mode 100644
index 44bef66d79f..00000000000
--- a/english/lts/security/2020/dla-2472.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2472-1 mutt</define-tag>
-<define-tag report_date>2020-11-30</define-tag>
-<define-tag secrefs>CVE-2020-28896</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2472.wml b/english/lts/security/2020/dla-2472.wml
deleted file mode 100644
index 043973fcf32..00000000000
--- a/english/lts/security/2020/dla-2472.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Mutt, a text-based Mail User Agent, invalid IMAP server responses
-were not properly handled, potentially resulting in authentication
-credentials being exposed or man-in-the-middle attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.2-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>For the detailed security status of mutt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mutt">https://security-tracker.debian.org/tracker/mutt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2472.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2473.data b/english/lts/security/2020/dla-2473.data
deleted file mode 100644
index 6429ea28bf5..00000000000
--- a/english/lts/security/2020/dla-2473.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2473-1 vips</define-tag>
-<define-tag report_date>2020-11-30</define-tag>
-<define-tag secrefs>CVE-2020-20739</define-tag>
-<define-tag packages>vips</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2473.wml b/english/lts/security/2020/dla-2473.wml
deleted file mode 100644
index 57e1e1cc401..00000000000
--- a/english/lts/security/2020/dla-2473.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In VIPS, an image processing system, an uninitialized variable which may
-cause the leakage of remote server path or stack address was fixed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8.4.5-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your vips packages.</p>
-
-<p>For the detailed security status of vips please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vips">https://security-tracker.debian.org/tracker/vips</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2473.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2474.data b/english/lts/security/2020/dla-2474.data
deleted file mode 100644
index e12234ebe06..00000000000
--- a/english/lts/security/2020/dla-2474.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2474-1 musl</define-tag>
-<define-tag report_date>2020-12-01</define-tag>
-<define-tag secrefs>CVE-2020-28928 Bug#975365</define-tag>
-<define-tag packages>musl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2474.wml b/english/lts/security/2020/dla-2474.wml
deleted file mode 100644
index a1ba4dac3f4..00000000000
--- a/english/lts/security/2020/dla-2474.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The wcsnrtombs function in all musl libc versions up through 1.2.1
-has been found to have multiple bugs in handling of destination
-buffer size when limiting the input character count, which can
-lead to infinite loop with no forward progress (no overflow) or
-writing past the end of the destination buffers.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.16-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your musl packages.</p>
-
-<p>For the detailed security status of musl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/musl">https://security-tracker.debian.org/tracker/musl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2474.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2475.data b/english/lts/security/2020/dla-2475.data
deleted file mode 100644
index 1c234734ae3..00000000000
--- a/english/lts/security/2020/dla-2475.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2475-1 pdfresurrect</define-tag>
-<define-tag report_date>2020-12-01</define-tag>
-<define-tag secrefs>CVE-2019-14934 CVE-2020-20740</define-tag>
-<define-tag packages>pdfresurrect</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2475.wml b/english/lts/security/2020/dla-2475.wml
deleted file mode 100644
index 17df7c63fb8..00000000000
--- a/english/lts/security/2020/dla-2475.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Vulnerabilities have been discovered in pdfresurrect, a tool for
-analyzing and manipulating revisions to PDF documents.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14934">CVE-2019-14934</a>
-
- <p>pdf_load_pages_kids in pdf.c doesn't validate a certain size value,
- which leads to a malloc failure and out-of-bounds write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-20740">CVE-2020-20740</a>
-
- <p>lack of header validation checks causes heap-buffer-overflow in
- pdf_get_version()</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.12-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your pdfresurrect packages.</p>
-
-<p>For the detailed security status of pdfresurrect please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pdfresurrect">https://security-tracker.debian.org/tracker/pdfresurrect</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2475.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2476.data b/english/lts/security/2020/dla-2476.data
deleted file mode 100644
index 58ffd012cd2..00000000000
--- a/english/lts/security/2020/dla-2476.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2476-1 brotli</define-tag>
-<define-tag report_date>2020-12-01</define-tag>
-<define-tag secrefs>CVE-2020-8927</define-tag>
-<define-tag packages>brotli</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2476.wml b/english/lts/security/2020/dla-2476.wml
deleted file mode 100644
index adc6fb0acb4..00000000000
--- a/english/lts/security/2020/dla-2476.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow was discovered in Brotli, a generic-purpose lossless
-compression suite.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.5.2+dfsg-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your brotli packages.</p>
-
-<p>For the detailed security status of brotli please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/brotli">https://security-tracker.debian.org/tracker/brotli</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2476.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2477.data b/english/lts/security/2020/dla-2477.data
deleted file mode 100644
index 4b6e7c4bb7f..00000000000
--- a/english/lts/security/2020/dla-2477.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2477-1 jupyter-notebook</define-tag>
-<define-tag report_date>2020-12-02</define-tag>
-<define-tag secrefs>CVE-2020-26215</define-tag>
-<define-tag packages>jupyter-notebook</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2477.wml b/english/lts/security/2020/dla-2477.wml
deleted file mode 100644
index 21b5009883a..00000000000
--- a/english/lts/security/2020/dla-2477.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the <a
-href="https://jupyter.org/">Jupyter</a> interactive notebook system where a
-maliciously-crafted link could redirect the browser to a malicious/spoofed
-website.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26215">CVE-2020-26215</a>
-
- <p>Jupyter Notebook before version 6.1.5 has an Open redirect
- vulnerability. A maliciously crafted link to a notebook server could
- redirect the browser to a different website. All notebook servers are
- technically affected, however, these maliciously crafted links can only be
- reasonably made for known notebook server hosts. A link to your notebook
- server may appear safe, but ultimately redirect to a spoofed server on the
- public internet. The issue is patched in version 6.1.5.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4.2.3-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your jupyter-notebook packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2477.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2478.data b/english/lts/security/2020/dla-2478.data
deleted file mode 100644
index f70b7cdbabb..00000000000
--- a/english/lts/security/2020/dla-2478.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2478-1 postgresql-9.6</define-tag>
-<define-tag report_date>2020-12-02</define-tag>
-<define-tag secrefs>CVE-2020-25694 CVE-2020-25695 CVE-2020-25696</define-tag>
-<define-tag packages>postgresql-9.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2478.wml b/english/lts/security/2020/dla-2478.wml
deleted file mode 100644
index a25814b8093..00000000000
--- a/english/lts/security/2020/dla-2478.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the PostgreSQL database system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25694">CVE-2020-25694</a>
-
- <p>Peter Eisentraut found that database reconnections may drop options
- from the original connection, such as encryption, which could lead
- to information disclosure or a man-in-the-middle attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25695">CVE-2020-25695</a>
-
- <p>Etienne Stalmans reported that a user with permissions to create
- non-temporary objects in an schema can execute arbitrary SQL
- functions as a superuser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25696">CVE-2020-25696</a>
-
- <p>Nick Cleaton found that the \gset command modified variables that
- control the psql behaviour, which could result in a compromised or
- malicious server executing arbitrary code in the user session.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-9.6.20-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
-
-<p>For the detailed security status of postgresql-9.6 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2478.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2479.data b/english/lts/security/2020/dla-2479.data
deleted file mode 100644
index ba8dbd0b01d..00000000000
--- a/english/lts/security/2020/dla-2479.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2479-1 thunderbird</define-tag>
-<define-tag report_date>2020-12-04</define-tag>
-<define-tag secrefs>CVE-2020-26970</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2479.wml b/english/lts/security/2020/dla-2479.wml
deleted file mode 100644
index 5044ff96c5e..00000000000
--- a/english/lts/security/2020/dla-2479.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chiaki Ishikawa discovered a stack overflow in SMTP server status
-handling which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:78.5.1-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2479.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2480.data b/english/lts/security/2020/dla-2480.data
deleted file mode 100644
index 4dcdee5df24..00000000000
--- a/english/lts/security/2020/dla-2480.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2480-1 salt</define-tag>
-<define-tag report_date>2020-12-04</define-tag>
-<define-tag secrefs>CVE-2020-16846 CVE-2020-17490 CVE-2020-25592</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2480.wml b/english/lts/security/2020/dla-2480.wml
deleted file mode 100644
index e49d6cd618f..00000000000
--- a/english/lts/security/2020/dla-2480.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in salt.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16846">CVE-2020-16846</a>
-
- <p>An unauthenticated user with network access to the Salt API can use
- shell injections to run code on the Salt-API using the SSH client</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17490">CVE-2020-17490</a>
-
- <p>When using the functions create_ca, create_csr, and
- create_self_signed_cert in the tls execution module, it would not
- ensure the key was created with the correct permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25592">CVE-2020-25592</a>
-
- <p>Properly validate eauth credentials and tokens along with their Access
- Control Lists – ACLs. Prior to this change, eauth was not properly
- validated when calling Salt SSH via the salt-api. Any value for “eauthâ€
- or “token†would allow a user to bypass authentication and make calls
- to Salt SSH</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2016.11.2+ds-1+deb9u6.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>For the detailed security status of salt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2480.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2481.data b/english/lts/security/2020/dla-2481.data
deleted file mode 100644
index 6d00ed3906b..00000000000
--- a/english/lts/security/2020/dla-2481.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2481-1 openldap</define-tag>
-<define-tag report_date>2020-12-04</define-tag>
-<define-tag secrefs>CVE-2020-25709 CVE-2020-25710</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2481.wml b/english/lts/security/2020/dla-2481.wml
deleted file mode 100644
index 41bf530b445..00000000000
--- a/english/lts/security/2020/dla-2481.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities in the certificate list syntax verification and
-in the handling of CSN normalization were discovered in OpenLDAP, a
-free implementation of the Lightweight Directory Access Protocol.
-An unauthenticated remote attacker can take advantage of these
-flaws to cause a denial of service (slapd daemon crash) via
-specially crafted packets.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.44+dfsg-5+deb9u6.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>For the detailed security status of openldap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openldap">https://security-tracker.debian.org/tracker/openldap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2481.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2482.data b/english/lts/security/2020/dla-2482.data
deleted file mode 100644
index e22a52a82b6..00000000000
--- a/english/lts/security/2020/dla-2482.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2482-1 debian-security-support</define-tag>
-<define-tag report_date>2020-12-04</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2482.wml b/english/lts/security/2020/dla-2482.wml
deleted file mode 100644
index ff39ec3df52..00000000000
--- a/english/lts/security/2020/dla-2482.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker, has
-been updated in stretch-security.</p>
-
-<p>This marks the end of life of the mongodb package in stretch due to
-licence incompatibility.</p>
-
-<p>See <a href="https://lists.debian.org/debian-lts/2020/11/msg00058.html">https://lists.debian.org/debian-lts/2020/11/msg00058.html</a>
-and <a href="https://bugs.debian.org/915537">https://bugs.debian.org/915537</a>
-for more information.</p>
-
-<p>For Debian 9 <q>stretch</q>, this problem has been documented in version
-1:9+2020.12.04 of the debian-security-support package.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2482.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2483.data b/english/lts/security/2020/dla-2483.data
deleted file mode 100644
index 6fe206f2c79..00000000000
--- a/english/lts/security/2020/dla-2483.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2483-1 linux-4.19</define-tag>
-<define-tag report_date>2020-12-05</define-tag>
-<define-tag secrefs>CVE-2019-19039 CVE-2019-19377 CVE-2019-19770 CVE-2019-19816 CVE-2020-0423 CVE-2020-8694 CVE-2020-14351 CVE-2020-25656 CVE-2020-25668 CVE-2020-25669 CVE-2020-25704 CVE-2020-25705 CVE-2020-27673 CVE-2020-27675 CVE-2020-28941 CVE-2020-28974 Bug#949863 Bug#968623 Bug#971058</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2483.wml b/english/lts/security/2020/dla-2483.wml
deleted file mode 100644
index 5db7d4eddac..00000000000
--- a/english/lts/security/2020/dla-2483.wml
+++ /dev/null
@@ -1,170 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19039">CVE-2019-19039</a>
-
- <p><q>Team bobfuzzer</q> reported a bug in Btrfs that could lead to an
- assertion failure (WARN). A user permitted to mount and access
- arbitrary filesystems could use this to cause a denial of service
- (crash) if the panic_on_warn kernel parameter is set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19377">CVE-2019-19377</a>
-
- <p><q>Team bobfuzzer</q> reported a bug in Btrfs that could lead to a
- use-after-free. A user permitted to mount and access arbitrary
- filesystems could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19770">CVE-2019-19770</a>
-
- <p>The syzbot tool discovered a race condition in the block I/O
- tracer (blktrace) that could lead to a system crash. Since
- blktrace can only be controlled by privileged users, the security
- impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19816">CVE-2019-19816</a>
-
- <p><q>Team bobfuzzer</q> reported a bug in Btrfs that could lead to an
- out-of-bounds write. A user permitted to mount and access
- arbitrary filesystems could use this to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0423">CVE-2020-0423</a>
-
- <p>A race condition was discovered in the Android binder driver, that
- could result in a use-after-free. On systems using this driver, a
- local user could use this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8694">CVE-2020-8694</a>
-
- <p>Multiple researchers discovered that the powercap subsystem
- allowed all users to read CPU energy meters, by default. On
- systems using Intel CPUs, this provided a side channel that could
- leak sensitive information between user processes, or from the
- kernel to user processes. The energy meters are now readable only
- by root, by default.</p>
-
- <p>This issue can be mitigated by running:</p>
-
- <p><code>chmod go-r /sys/devices/virtual/powercap/*/*/energy_uj</code></p>
-
- <p>This needs to be repeated each time the system is booted with
- an unfixed kernel version.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14351">CVE-2020-14351</a>
-
- <p>A race condition was discovered in the performance events
- subsystem, which could lead to a use-after-free. A local user
- permitted to access performance events could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p>
-
- <p>Debian's kernel configuration does not allow unprivileged users to
- access peformance events by default, which fully mitigates this
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25656">CVE-2020-25656</a>
-
- <p>Yuan Ming and Bodong Zhao discovered a race condition in the
- virtual terminal (vt) driver that could lead to a use-after-free.
- A local user with the <tt>CAP_SYS_TTY_CONFIG</tt> capability could use this
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25668">CVE-2020-25668</a>
-
- <p>Yuan Ming and Bodong Zhao discovered a race condition in the
- virtual terminal (vt) driver that could lead to a use-after-free.
- A local user with access to a virtual terminal, or with the
- <tt>CAP_SYS_TTY_CONFIG</tt> capability, could use this to cause a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25669">CVE-2020-25669</a>
-
- <p>Bodong Zhao discovered a bug in the Sun keyboard driver (sunkbd)
- that could lead to a use-after-free. On a system using this
- driver, a local user could use this to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25704">CVE-2020-25704</a>
-
- <p>kiyin(尹亮) discovered a potential memory leak in the performance
- events subsystem. A local user permitted to access performance
- events could use this to cause a denial of service (memory
- exhaustion).</p>
-
- <p>Debian's kernel configuration does not allow unprivileged users to
- access peformance events by default, which fully mitigates this
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25705">CVE-2020-25705</a>
-
- <p>Keyu Man reported that strict rate-limiting of ICMP packet
- transmission provided a side-channel that could help networked
- attackers to carry out packet spoofing. In particular, this made
- it practical for off-path networked attackers to <q>poison</q> DNS
- caches with spoofed responses ("SAD DNS" attack).</p>
-
- <p>This issue has been mitigated by randomising whether packets are
- counted against the rate limit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27673">CVE-2020-27673</a> / <a href="https://xenbits.xen.org/xsa/advisory-332.html">XSA-332</a>
-
- <p>Julien Grall from Arm discovered a bug in the Xen event handling
- code. Where Linux was used in a Xen dom0, unprivileged (domU)
- guests could cause a denial of service (excessive CPU usage or
- hang) in dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27675">CVE-2020-27675</a> / <a href="https://xenbits.xen.org/xsa/advisory-331.html">XSA-331</a>
-
- <p>Jinoh Kang of Theori discovered a race condition in the Xen event
- handling code. Where Linux was used in a Xen dom0, unprivileged
- (domU) guests could cause a denial of service (crash) in dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28941">CVE-2020-28941</a>
-
- <p>Shisong Qin and Bodong Zhao discovered a bug in the Speakup screen
- reader subsystem. Speakup assumed that it would only be bound to
- one terminal (tty) device at a time, but did not enforce this. A
- local user could exploit this bug to cause a denial of service
- (crash or memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28974">CVE-2020-28974</a>
-
- <p>Yuan Ming discovered a bug in the virtual terminal (vt) driver
- that could lead to an out-of-bounds read. A local user with
- access to a virtual terminal, or with the <tt>CAP_SYS_TTY_CONFIG</tt>
- capability, could possibly use this to obtain sensitive
- information from the kernel or to cause a denial of service
- (crash).</p>
-
- <p>The specific ioctl operation affected by this bug
- (<tt>KD_FONT_OP_COPY</tt>) has been disabled, as it is not believed that
- any programs depended on it.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.160-2~deb9u1.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2483.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2484.data b/english/lts/security/2020/dla-2484.data
deleted file mode 100644
index f3853241137..00000000000
--- a/english/lts/security/2020/dla-2484.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2484-1 python-certbot</define-tag>
-<define-tag report_date>2020-12-09</define-tag>
-<define-tag secrefs>Bug#969126</define-tag>
-<define-tag packages>python-certbot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2484.wml b/english/lts/security/2020/dla-2484.wml
deleted file mode 100644
index 0eeb21efd84..00000000000
--- a/english/lts/security/2020/dla-2484.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Let's Encrypt's ACMEv1 API is deprecated and in the process of being
-shut down. Beginning with brownouts in January 2021, and ending with
-a total shutdown in June 2021, the Let's Encrypt APIs will become
-unavailable. To prevent users having disruptions to their certificate
-renewals, this update backports the switch over to the ACMEv2 API.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.28.0-1~deb9u3.</p>
-
-<p>We recommend that you upgrade your python-certbot packages.</p>
-
-<p>For the detailed security status of python-certbot please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-certbot">https://security-tracker.debian.org/tracker/python-certbot</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2484.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2485.data b/english/lts/security/2020/dla-2485.data
deleted file mode 100644
index 852dfed8732..00000000000
--- a/english/lts/security/2020/dla-2485.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2485-1 golang-golang-x-net-dev</define-tag>
-<define-tag report_date>2020-12-09</define-tag>
-<define-tag secrefs>CVE-2019-9512 CVE-2019-9514</define-tag>
-<define-tag packages>golang-golang-x-net-dev</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2485.wml b/english/lts/security/2020/dla-2485.wml
deleted file mode 100644
index 45eefe69142..00000000000
--- a/english/lts/security/2020/dla-2485.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The http2 server support in this package was vulnerable to
-certain types of DOS attacks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9512">CVE-2019-9512</a>
-
- <p>This code was vulnerable to ping floods, potentially leading to a denial of
- service. The attacker sends continual pings to an HTTP/2 peer, causing the peer
- to build an internal queue of responses. Depending on how efficiently this data
- is queued, this can consume excess CPU, memory, or both.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9514">CVE-2019-9514</a>
-
- <p>This code was vulnerable to a reset flood, potentially leading to a denial
- of service. The attacker opens a number of streams and sends an invalid request
- over each stream that should solicit a stream of RST_STREAM frames from the
- peer. Depending on how the peer queues the RST_STREAM frames, this can consume
- excess memory, CPU, or both.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:0.0+git20161013.8b4af36+dfsg-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your golang-golang-x-net-dev packages.</p>
-
-<p>For the detailed security status of golang-golang-x-net-dev please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-golang-x-net-dev">https://security-tracker.debian.org/tracker/golang-golang-x-net-dev</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2485.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2486.data b/english/lts/security/2020/dla-2486.data
deleted file mode 100644
index 5b221f99123..00000000000
--- a/english/lts/security/2020/dla-2486.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2486-1 xorg-server</define-tag>
-<define-tag report_date>2020-12-09</define-tag>
-<define-tag secrefs>CVE-2020-14360 CVE-2020-25712</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2486.wml b/english/lts/security/2020/dla-2486.wml
deleted file mode 100644
index b52bffcac16..00000000000
--- a/english/lts/security/2020/dla-2486.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jan-Niklas Sohn discovered that the XKB extension of the Xorg X server
-performed incomplete input validation, which could result in privilege
-escalation.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:1.19.2-1+deb9u7.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2486.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2487.data b/english/lts/security/2020/dla-2487.data
deleted file mode 100644
index 1c1beb9be9e..00000000000
--- a/english/lts/security/2020/dla-2487.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2487-1 apt</define-tag>
-<define-tag report_date>2020-12-10</define-tag>
-<define-tag secrefs>CVE-2020-27350</define-tag>
-<define-tag packages>apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2487.wml b/english/lts/security/2020/dla-2487.wml
deleted file mode 100644
index ee7f39bef65..00000000000
--- a/english/lts/security/2020/dla-2487.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that missing input validation in the ar/tar
-implementations of APT, the high level package manager, could cause
-out-of-bounds reads or infinite loops, resulting in denial of service
-when processing malformed deb files.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.11.</p>
-
-<p>We recommend that you upgrade your apt packages.</p>
-
-<p>For the detailed security status of apt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apt">https://security-tracker.debian.org/tracker/apt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2487.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2488-2.data b/english/lts/security/2020/dla-2488-2.data
deleted file mode 100644
index 35237a7a962..00000000000
--- a/english/lts/security/2020/dla-2488-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2488-2 python-apt</define-tag>
-<define-tag report_date>2020-12-26</define-tag>
-<define-tag secrefs>Bug#977000</define-tag>
-<define-tag packages>python-apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2488-2.wml b/english/lts/security/2020/dla-2488-2.wml
deleted file mode 100644
index 35582b93e32..00000000000
--- a/english/lts/security/2020/dla-2488-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for python-apt released as 2488-1 introduced a regression
-by causing a segmentation fault, which is now fixed with this update.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.3.</p>
-
-<p>We recommend that you upgrade your python-apt packages.</p>
-
-<p>For the detailed security status of python-apt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-apt">https://security-tracker.debian.org/tracker/python-apt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2488-2.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2488.data b/english/lts/security/2020/dla-2488.data
deleted file mode 100644
index 0b295701c7f..00000000000
--- a/english/lts/security/2020/dla-2488.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2488-1 python-apt</define-tag>
-<define-tag report_date>2020-12-10</define-tag>
-<define-tag secrefs>CVE-2020-27351</define-tag>
-<define-tag packages>python-apt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2488.wml b/english/lts/security/2020/dla-2488.wml
deleted file mode 100644
index 51ea36af3cb..00000000000
--- a/english/lts/security/2020/dla-2488.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various memory and file descriptor leaks were discovered in the Python
-interface to the APT package management runtime library, which could
-result in denial of service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.2.</p>
-
-<p>We recommend that you upgrade your python-apt packages.</p>
-
-<p>For the detailed security status of python-apt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-apt">https://security-tracker.debian.org/tracker/python-apt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2488.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2489.data b/english/lts/security/2020/dla-2489.data
deleted file mode 100644
index b5b9232e421..00000000000
--- a/english/lts/security/2020/dla-2489.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2489-1 minidlna</define-tag>
-<define-tag report_date>2020-12-10</define-tag>
-<define-tag secrefs>CVE-2020-12695 CVE-2020-28926</define-tag>
-<define-tag packages>minidlna</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2489.wml b/english/lts/security/2020/dla-2489.wml
deleted file mode 100644
index 7aa180de179..00000000000
--- a/english/lts/security/2020/dla-2489.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that missing input validation in minidlna, a lightweight
-DLNA/UPnP-AV server could result in the execution of arbitrary code. In
-addition minidlna was susceptible to the <q>CallStranger</q> UPnP
-vulnerability.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.1.6+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your minidlna packages.</p>
-
-<p>For the detailed security status of minidlna please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/minidlna">https://security-tracker.debian.org/tracker/minidlna</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2489.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2490.data b/english/lts/security/2020/dla-2490.data
deleted file mode 100644
index 67d54bb0e7c..00000000000
--- a/english/lts/security/2020/dla-2490.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2490-1 x11vnc</define-tag>
-<define-tag report_date>2020-12-10</define-tag>
-<define-tag secrefs>CVE-2020-29074</define-tag>
-<define-tag packages>x11vnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2490.wml b/english/lts/security/2020/dla-2490.wml
deleted file mode 100644
index ca8e599753f..00000000000
--- a/english/lts/security/2020/dla-2490.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Guenal Davalan reported a flaw in x11vnc, a VNC server to allow remote
-access to an existing X session. x11vnc creates shared memory segments
-with 0777 mode. A local attacker can take advantage of this flaw for
-information disclosure, denial of service or interfering with the VNC
-session of another user on the host.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.13-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your x11vnc packages.</p>
-
-<p>For the detailed security status of x11vnc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/x11vnc">https://security-tracker.debian.org/tracker/x11vnc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2490.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2491.data b/english/lts/security/2020/dla-2491.data
deleted file mode 100644
index bba9d256721..00000000000
--- a/english/lts/security/2020/dla-2491.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2491-1 openexr</define-tag>
-<define-tag report_date>2020-12-13</define-tag>
-<define-tag secrefs>CVE-2020-16588 CVE-2020-16589</define-tag>
-<define-tag packages>openexr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2491.wml b/english/lts/security/2020/dla-2491.wml
deleted file mode 100644
index 85fe2e6e15c..00000000000
--- a/english/lts/security/2020/dla-2491.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues were discovered in <tt>openexr</tt>, a set of tools to manipulate
-OpenEXR image files, often in the computer-graphics industry for visual effects
-and animation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16588">CVE-2020-16588</a>
-
- <p>A Null Pointer Deference issue exists in Academy Software Foundation
- OpenEXR 2.3.0 in generatePreview in makePreview.cpp that can cause a denial
- of service via a crafted EXR file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16589">CVE-2020-16589</a>
-
- <p>A head-based buffer overflow exists in Academy Software Foundation
- OpenEXR 2.3.0 in writeTileData in ImfTiledOutputFile.cpp that can cause a
- denial of service via a crafted EXR file.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.2.0-11+deb9u2.</p>
-
-<p>We recommend that you upgrade your openexr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2491.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2492.data b/english/lts/security/2020/dla-2492.data
deleted file mode 100644
index a8820b1703b..00000000000
--- a/english/lts/security/2020/dla-2492.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2492-1 openssl</define-tag>
-<define-tag report_date>2020-12-14</define-tag>
-<define-tag secrefs>CVE-2020-1971</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2492.wml b/english/lts/security/2020/dla-2492.wml
deleted file mode 100644
index 4074cca3ad2..00000000000
--- a/english/lts/security/2020/dla-2492.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>David Benjamin discovered a flaw in the GENERAL_NAME_cmp() function
-which could cause a NULL dereference, resulting in denial of service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.0l-1~deb9u2.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2492.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2493.data b/english/lts/security/2020/dla-2493.data
deleted file mode 100644
index 238d119cc91..00000000000
--- a/english/lts/security/2020/dla-2493.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2493-1 openssl1.0</define-tag>
-<define-tag report_date>2020-12-14</define-tag>
-<define-tag secrefs>CVE-2020-1971</define-tag>
-<define-tag packages>openssl1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2493.wml b/english/lts/security/2020/dla-2493.wml
deleted file mode 100644
index 3338619c267..00000000000
--- a/english/lts/security/2020/dla-2493.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>David Benjamin discovered a flaw in the GENERAL_NAME_cmp() function
-which could cause a NULL dereference, resulting in denial of service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.2u-1~deb9u3.</p>
-
-<p>We recommend that you upgrade your openssl1.0 packages.</p>
-
-<p>For the detailed security status of openssl1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2493.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2494.data b/english/lts/security/2020/dla-2494.data
deleted file mode 100644
index eb4d74b6979..00000000000
--- a/english/lts/security/2020/dla-2494.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2494-1 linux</define-tag>
-<define-tag report_date>2020-12-18</define-tag>
-<define-tag secrefs>CVE-2020-0427 CVE-2020-8694 CVE-2020-14351 CVE-2020-25645 CVE-2020-25656 CVE-2020-25668 CVE-2020-25669 CVE-2020-25704 CVE-2020-25705 CVE-2020-27673 CVE-2020-27675 CVE-2020-28974</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2494.wml b/english/lts/security/2020/dla-2494.wml
deleted file mode 100644
index df3a15bf716..00000000000
--- a/english/lts/security/2020/dla-2494.wml
+++ /dev/null
@@ -1,141 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0427">CVE-2020-0427</a>
-
- <p>Elena Petrova reported a bug in the pinctrl subsystem that can
- lead to a use-after-free after a device is renamed. The security
- impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8694">CVE-2020-8694</a>
-
- <p>Multiple researchers discovered that the powercap subsystem
- allowed all users to read CPU energy meters, by default. On
- systems using Intel CPUs, this provided a side channel that could
- leak sensitive information between user processes, or from the
- kernel to user processes. The energy meters are now readable only
- by root, by default.</p>
-
- <p>This issue can be mitigated by running:</p>
-
- <p><code>chmod go-r /sys/devices/virtual/powercap/*/*/energy_uj</code></p>
-
- <p>This needs to be repeated each time the system is booted with
- an unfixed kernel version.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14351">CVE-2020-14351</a>
-
- <p>A race condition was discovered in the performance events
- subsystem, which could lead to a use-after-free. A local user
- permitted to access performance events could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p>
-
- <p>Debian's kernel configuration does not allow unprivileged users to
- access peformance events by default, which fully mitigates this
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25645">CVE-2020-25645</a>
-
- <p>A flaw was discovered in the interface driver for GENEVE
- encapsulated traffic when combined with IPsec. If IPsec is
- configured to encrypt traffic for the specific UDP port used by the
- GENEVE tunnel, tunneled data isn't correctly routed over the
- encrypted link and sent unencrypted instead.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25656">CVE-2020-25656</a>
-
- <p>Yuan Ming and Bodong Zhao discovered a race condition in the
- virtual terminal (vt) driver that could lead to a use-after-free.
- A local user with the <tt>CAP_SYS_TTY_CONFIG</tt> capability could use this
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25668">CVE-2020-25668</a>
-
- <p>Yuan Ming and Bodong Zhao discovered a race condition in the
- virtual terminal (vt) driver that could lead to a use-after-free.
- A local user with access to a virtual terminal, or with the
- <tt>CAP_SYS_TTY_CONFIG</tt> capability, could use this to cause a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25669">CVE-2020-25669</a>
-
- <p>Bodong Zhao discovered a bug in the Sun keyboard driver (sunkbd)
- that could lead to a use-after-free. On a system using this
- driver, a local user could use this to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25704">CVE-2020-25704</a>
-
- <p>kiyin(尹亮) discovered a potential memory leak in the performance
- events subsystem. A local user permitted to access performance
- events could use this to cause a denial of service (memory
- exhaustion).</p>
-
- <p>Debian's kernel configuration does not allow unprivileged users to
- access peformance events by default, which fully mitigates this
- issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25705">CVE-2020-25705</a>
-
- <p>Keyu Man reported that strict rate-limiting of ICMP packet
- transmission provided a side-channel that could help networked
- attackers to carry out packet spoofing. In particular, this made
- it practical for off-path networked attackers to <q>poison</q> DNS
- caches with spoofed responses ("SAD DNS" attack).</p>
-
- <p>This issue has been mitigated by randomising whether packets are
- counted against the rate limit.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27673">CVE-2020-27673</a> / <a href="https://xenbits.xen.org/xsa/advisory-332.html">XSA-332</a>
-
- <p>Julien Grall from Arm discovered a bug in the Xen event handling
- code. Where Linux was used in a Xen dom0, unprivileged (domU)
- guests could cause a denial of service (excessive CPU usage or
- hang) in dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27675">CVE-2020-27675</a> / <a href="https://xenbits.xen.org/xsa/advisory-331.html">XSA-331</a>
-
- <p>Jinoh Kang of Theori discovered a race condition in the Xen event
- handling code. Where Linux was used in a Xen dom0, unprivileged
- (domU) guests could cause a denial of service (crash) in dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28974">CVE-2020-28974</a>
-
- <p>Yuan Ming discovered a bug in the virtual terminal (vt) driver
- that could lead to an out-of-bounds read. A local user with
- access to a virtual terminal, or with the <tt>CAP_SYS_TTY_CONFIG</tt>
- capability, could possibly use this to obtain sensitive
- information from the kernel or to cause a denial of service
- (crash).</p>
-
- <p>The specific ioctl operation affected by this bug
- (KD_FONT_OP_COPY) has been disabled, as it is not believed that
- any programs depended on it.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.246-2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2494.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2495.data b/english/lts/security/2020/dla-2495.data
deleted file mode 100644
index 956df6941b4..00000000000
--- a/english/lts/security/2020/dla-2495.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2495-1 tomcat8</define-tag>
-<define-tag report_date>2020-12-16</define-tag>
-<define-tag secrefs>CVE-2020-17527</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2495.wml b/english/lts/security/2020/dla-2495.wml
deleted file mode 100644
index ac976049cec..00000000000
--- a/english/lts/security/2020/dla-2495.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Apache Tomcat from 8.5.0 to 8.5.59 could
-re-use an HTTP request header value from the previous stream
-received on an HTTP/2 connection for the request associated with
-the subsequent stream. While this would most likely lead to an
-error and the closure of the HTTP/2 connection, it is possible
-that information could leak between requests.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8.5.54-0+deb9u5.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>For the detailed security status of tomcat8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tomcat8">https://security-tracker.debian.org/tracker/tomcat8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2495.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2496.data b/english/lts/security/2020/dla-2496.data
deleted file mode 100644
index 780eeeeb3b9..00000000000
--- a/english/lts/security/2020/dla-2496.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2496-1 firefox-esr</define-tag>
-<define-tag report_date>2020-12-16</define-tag>
-<define-tag secrefs>CVE-2020-16042 CVE-2020-26971 CVE-2020-26973 CVE-2020-26974 CVE-2020-26978 CVE-2020-35111 CVE-2020-35113</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2496.wml b/english/lts/security/2020/dla-2496.wml
deleted file mode 100644
index 5a256f8bbab..00000000000
--- a/english/lts/security/2020/dla-2496.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or CSS sanitiser bypass.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.6.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2496.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2497.data b/english/lts/security/2020/dla-2497.data
deleted file mode 100644
index b01eb4f0877..00000000000
--- a/english/lts/security/2020/dla-2497.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2497-1 thunderbird</define-tag>
-<define-tag report_date>2020-12-17</define-tag>
-<define-tag secrefs>CVE-2020-16042 CVE-2020-26971 CVE-2020-26973 CVE-2020-26974 CVE-2020-26978 CVE-2020-35111 CVE-2020-35113</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2497.wml b/english/lts/security/2020/dla-2497.wml
deleted file mode 100644
index 38235633242..00000000000
--- a/english/lts/security/2020/dla-2497.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code, denial of service or information
-leak.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.6.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2497.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2498.data b/english/lts/security/2020/dla-2498.data
deleted file mode 100644
index dbf0bd8b533..00000000000
--- a/english/lts/security/2020/dla-2498.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2498-1 xerces-c</define-tag>
-<define-tag report_date>2020-12-17</define-tag>
-<define-tag secrefs>CVE-2018-1311 Bug#947431</define-tag>
-<define-tag packages>xerces-c</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2498.wml b/english/lts/security/2020/dla-2498.wml
deleted file mode 100644
index fe58c9b05f2..00000000000
--- a/english/lts/security/2020/dla-2498.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The UK's National Cyber Security Centre (NCSC) discovered that
-Xerces-C, a validating XML parser library for C++, contains a
-use-after-free error triggered during the scanning of external
-DTDs. An attacker could cause a Denial of Service (DoS) and possibly
-achieve remote code execution. This flaw has not been addressed in the
-maintained version of the library and has no complete mitigation. The
-first is provided by this update which fixes the use-after-free
-vulnerability at the expense of a memory leak. The other is to disable
-DTD processing, which can be accomplished via the DOM using a standard
-parser feature, or via SAX using the XERCES_DISABLE_DTD environment
-variable.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.4+debian-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your xerces-c packages.</p>
-
-<p>For the detailed security status of xerces-c please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xerces-c">https://security-tracker.debian.org/tracker/xerces-c</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2498.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2499.data b/english/lts/security/2020/dla-2499.data
deleted file mode 100644
index 53e71c0e20c..00000000000
--- a/english/lts/security/2020/dla-2499.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2499-1 sympa</define-tag>
-<define-tag report_date>2020-12-17</define-tag>
-<define-tag secrefs>CVE-2020-29668 Bug#976020</define-tag>
-<define-tag packages>sympa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2499.wml b/english/lts/security/2020/dla-2499.wml
deleted file mode 100644
index 2a276f39fe9..00000000000
--- a/english/lts/security/2020/dla-2499.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sympa, a modern mailing list manager, grants full SOAP API access by
-sending invalid string as the cookie value, if the SOAP endpoint was
-enabled. An attacker could manipulate the mailing lists, including
-subscribing e-mails or getting the list of subscribers.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-6.2.16~dfsg-3+deb9u5.</p>
-
-<p>We recommend that you upgrade your sympa packages.</p>
-
-<p>For the detailed security status of sympa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sympa">https://security-tracker.debian.org/tracker/sympa</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2499.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2500.data b/english/lts/security/2020/dla-2500.data
deleted file mode 100644
index 8db4b799528..00000000000
--- a/english/lts/security/2020/dla-2500.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2500-1 curl</define-tag>
-<define-tag report_date>2020-12-18</define-tag>
-<define-tag secrefs>CVE-2020-8284 CVE-2020-8285 CVE-2020-8286 Bug#977161 Bug#977162 Bug#977163</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2500.wml b/english/lts/security/2020/dla-2500.wml
deleted file mode 100644
index 78bb147d812..00000000000
--- a/english/lts/security/2020/dla-2500.wml
+++ /dev/null
@@ -1,93 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in curl, a command line tool for
-transferring data with URL syntax and an easy-to-use client-side URL
-transfer library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8284">CVE-2020-8284</a>
-
- <p>When curl performs a passive FTP transfer, it first tries the EPSV
- command and if that is not supported, it falls back to using PASV.
- Passive mode is what curl uses by default. A server response to a
- PASV command includes the (IPv4) address and port number for the
- client to connect back to in order to perform the actual data
- transfer. This is how the FTP protocol is designed to work. A
- malicious server can use the PASV response to trick curl into
- connecting back to a given IP address and port, and this way
- potentially make curl extract information about services that are
- otherwise private and not disclosed, for example doing port scanning
- and service banner extractions.</p>
-
- <p>The IP address part of the response is now ignored by default, by
- making CURLOPT_FTP_SKIP_PASV_IP default to 1L instead of previously
- being 0L. This has the minor drawback that a small fraction of use
- cases might break, when a server truly needs the client to connect
- back to a different IP address than what the control connection uses
- and for those CURLOPT_FTP_SKIP_PASV_IP can be set to 0L. The same
- goes for the command line tool, which then might need
- --no-ftp-skip-pasv-ip set to prevent curl from ignoring the address
- in the server response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8285">CVE-2020-8285</a>
-
- <p>libcurl offers a wildcard matching functionality, which allows a
- callback (set with CURLOPT_CHUNK_BGN_FUNCTION) to return information
- back to libcurl on how to handle a specific entry in a directory
- when libcurl iterates over a list of all available entries. When
- this callback returns CURL_CHUNK_BGN_FUNC_SKIP, to tell libcurl to
- not deal with that file, the internal function in libcurl then calls
- itself recursively to handle the next directory entry. If there's a
- sufficient amount of file entries and if the callback returns <q>skip</q>
- enough number of times, libcurl runs out of stack space. The exact
- amount will of course vary with platforms, compilers and other
- environmental factors. The content of the remote directory is not
- kept on the stack, so it seems hard for the attacker to control
- exactly what data that overwrites the stack - however it remains a
- Denial-Of-Service vector as a malicious user who controls a server
- that a libcurl-using application works with under these premises can
- trigger a crash.</p>
-
- <p>The internal function is rewritten to instead and more appropriately
- use an ordinary loop instead of the recursive approach. This way,
- the stack use will remain the same no matter how many files that are
- skipped.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8286">CVE-2020-8286</a>
-
- <p>libcurl offers <q>OCSP stapling</q> via the CURLOPT_SSL_VERIFYSTATUS
- option. When set, libcurl verifies the OCSP response that a server
- responds with as part of the TLS handshake. It then aborts the TLS
- negotiation if something is wrong with the response. The same
- feature can be enabled with --cert-status using the curl tool. As
- part of the OCSP response verification, a client should verify that
- the response is indeed set out for the correct certificate. This
- step was not performed by libcurl when built or told to use OpenSSL
- as TLS backend. This flaw would allow an attacker, who perhaps
- could have breached a TLS server, to provide a fraudulent OCSP
- response that would appear fine, instead of the real one. Like if
- the original certificate actually has been revoked.</p>
-
- <p>The OCSP response checker function now also verifies that the
- certificate id is the correct one.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.52.1-5+deb9u13.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2500.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2501.data b/english/lts/security/2020/dla-2501.data
deleted file mode 100644
index 873bdbf4dae..00000000000
--- a/english/lts/security/2020/dla-2501.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2501-1 influxdb</define-tag>
-<define-tag report_date>2020-12-20</define-tag>
-<define-tag secrefs>CVE-2019-20933</define-tag>
-<define-tag packages>influxdb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2501.wml b/english/lts/security/2020/dla-2501.wml
deleted file mode 100644
index 5dd1865d215..00000000000
--- a/english/lts/security/2020/dla-2501.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in influxdb, a scalable datastore for metrics,
-events, and real-time analytics.
-By using a JWT token with an empty shared secret, one is able to bypass
-authentication in services/httpd/handler.go.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.1+dfsg1-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your influxdb packages.</p>
-
-<p>For the detailed security status of influxdb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/influxdb">https://security-tracker.debian.org/tracker/influxdb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2501.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2502.data b/english/lts/security/2020/dla-2502.data
deleted file mode 100644
index 86821996411..00000000000
--- a/english/lts/security/2020/dla-2502.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2502-1 postsrsd</define-tag>
-<define-tag report_date>2020-12-20</define-tag>
-<define-tag secrefs>CVE-2020-35573</define-tag>
-<define-tag packages>postsrsd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2502.wml b/english/lts/security/2020/dla-2502.wml
deleted file mode 100644
index 3c733d4450c..00000000000
--- a/english/lts/security/2020/dla-2502.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A potential denial-of-service attack through malicious timestamp tags
-was fixed in PostSRSd, a Sender Rewriting Scheme (SRS) lookup table for
-Postfix.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your postsrsd packages.</p>
-
-<p>For the detailed security status of postsrsd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postsrsd">https://security-tracker.debian.org/tracker/postsrsd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2502.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2503.data b/english/lts/security/2020/dla-2503.data
deleted file mode 100644
index fa56bff8ac2..00000000000
--- a/english/lts/security/2020/dla-2503.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2503-1 node-ini</define-tag>
-<define-tag report_date>2020-12-21</define-tag>
-<define-tag secrefs>CVE-2020-7788</define-tag>
-<define-tag packages>node-ini</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2020/dla-2503.wml b/english/lts/security/2020/dla-2503.wml
deleted file mode 100644
index f0fc252740c..00000000000
--- a/english/lts/security/2020/dla-2503.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in node-ini, a .ini format parser
-and serializer for Node.js, where an application could be exploited by a
-malicious input file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7788">CVE-2020-7788</a>
-
- <p>This affects the package ini before 1.3.6. If an attacker submits a
- malicious INI file to an application that parses it with ini.parse, they
- will pollute the prototype on the application. This can be exploited
- further depending on the context.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.1.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your node-ini packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2503.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2504.data b/english/lts/security/2020/dla-2504.data
deleted file mode 100644
index 873526e8474..00000000000
--- a/english/lts/security/2020/dla-2504.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2504-1 mediawiki</define-tag>
-<define-tag report_date>2020-12-22</define-tag>
-<define-tag secrefs>CVE-2020-15005 CVE-2020-35477 CVE-2020-35479 CVE-2020-35480</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2504.wml b/english/lts/security/2020/dla-2504.wml
deleted file mode 100644
index 752fa3be713..00000000000
--- a/english/lts/security/2020/dla-2504.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in MediaWiki, a website engine
-for collaborative work.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15005">CVE-2020-15005</a>
-
- <p>Private wikis behind a caching server using the img_auth.php image
- authorization security feature may have had their files cached
- publicly, so any unauthorized user could view them.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35477">CVE-2020-35477</a>
-
- <p>Blocks legitimate attempts to hide log entries in some situations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35479">CVE-2020-35479</a>
-
- <p>Allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry
- itself does not escape in all code paths. For example, the return of
- Language::userTimeAndDate is is always unsafe for HTML in a month
- value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35480">CVE-2020-35480</a>
-
- <p>Missing users (accounts that don't exist) and hidden users (accounts
- that have been explicitly hidden due to being abusive, or similar)
- that the viewer cannot see are handled differently, exposing
- sensitive information about the hidden status to unprivileged
- viewers.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.27.7-1~deb9u7.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2504.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2505.data b/english/lts/security/2020/dla-2505.data
deleted file mode 100644
index a843768809b..00000000000
--- a/english/lts/security/2020/dla-2505.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2505-1 spip</define-tag>
-<define-tag report_date>2020-12-28</define-tag>
-<define-tag secrefs>CVE-2020-28984</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2505.wml b/english/lts/security/2020/dla-2505.wml
deleted file mode 100644
index 3401b0809f0..00000000000
--- a/english/lts/security/2020/dla-2505.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that spip, a website engine for publishing, did not correctly
-validate its input (couleur, display, display_navigation, display_outils,
-imessage, and spip_ecran) allowing authenticated users to execute arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.4-4~deb9u4.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2505.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2506.data b/english/lts/security/2020/dla-2506.data
deleted file mode 100644
index 7533a670953..00000000000
--- a/english/lts/security/2020/dla-2506.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2506-1 awstats</define-tag>
-<define-tag report_date>2020-12-23</define-tag>
-<define-tag secrefs>CVE-2020-29600 CVE-2020-35176 Bug#891469 Bug#977190</define-tag>
-<define-tag packages>awstats</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2506.wml b/english/lts/security/2020/dla-2506.wml
deleted file mode 100644
index 276ca1daf9e..00000000000
--- a/english/lts/security/2020/dla-2506.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Awstats, a web server log analyzer, was
-vulnerable to path traversal attacks. A remote unauthenticated
-attacker could leverage that to perform arbitrary code execution. The
-previous fix did not fully address the issue when the default
-/etc/awstats/awstats.conf is not present.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.6+dfsg-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your awstats packages.</p>
-
-<p>For the detailed security status of awstats please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/awstats">https://security-tracker.debian.org/tracker/awstats</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2506.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2507.data b/english/lts/security/2020/dla-2507.data
deleted file mode 100644
index 640ac561af0..00000000000
--- a/english/lts/security/2020/dla-2507.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2507-1 libxstream-java</define-tag>
-<define-tag report_date>2020-12-31</define-tag>
-<define-tag secrefs>CVE-2020-26258 CVE-2020-26259 Bug#977625 Bug#977624</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2507.wml b/english/lts/security/2020/dla-2507.wml
deleted file mode 100644
index cb845aebabb..00000000000
--- a/english/lts/security/2020/dla-2507.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in XStream, a Java library to
-serialize objects to XML and back again.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26258">CVE-2020-26258</a>
-
- <p>XStream is vulnerable to a Server-Side Forgery Request which can be
- activated when unmarshalling. The vulnerability may allow a remote attacker
- to request data from internal resources that are not publicly available
- only by manipulating the processed input stream.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26259">CVE-2020-26259</a>
-
- <p>Xstream is vulnerable to an Arbitrary File Deletion on the local host when
- unmarshalling. The vulnerability may allow a remote attacker to delete
- arbitrary known files on the host as long as the executing process has
- sufficient rights only by manipulating the processed input stream.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.4.11.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>For the detailed security status of libxstream-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxstream-java">https://security-tracker.debian.org/tracker/libxstream-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2507.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2508.data b/english/lts/security/2020/dla-2508.data
deleted file mode 100644
index 6f1990e5290..00000000000
--- a/english/lts/security/2020/dla-2508.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2508-1 roundcube</define-tag>
-<define-tag report_date>2020-12-28</define-tag>
-<define-tag secrefs>CVE-2020-35730 Bug#978491</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2508.wml b/english/lts/security/2020/dla-2508.wml
deleted file mode 100644
index 1700a1a448c..00000000000
--- a/english/lts/security/2020/dla-2508.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was discovered in roundcube where in a cross-site scripting
-(XSS) via HTML or Plain text messages with malicious content was
-possible.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.3+dfsg.1-4+deb9u8.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2508.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2509.data b/english/lts/security/2020/dla-2509.data
deleted file mode 100644
index 2bb7a7bc07b..00000000000
--- a/english/lts/security/2020/dla-2509.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2509-1 tzdata</define-tag>
-<define-tag report_date>2020-12-29</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2509.wml b/english/lts/security/2020/dla-2509.wml
deleted file mode 100644
index adae2b7ba4d..00000000000
--- a/english/lts/security/2020/dla-2509.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2020e. Notable
-changes are:</p>
-
-<p>- Volgograd switched to Moscow time on 2020-12-27 at 02:00.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2020e-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2509.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2510.data b/english/lts/security/2020/dla-2510.data
deleted file mode 100644
index cc64bc43698..00000000000
--- a/english/lts/security/2020/dla-2510.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2510-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2020-12-29</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2510.wml b/english/lts/security/2020/dla-2510.wml
deleted file mode 100644
index fd8fc767e03..00000000000
--- a/english/lts/security/2020/dla-2510.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2020e for the
-Perl bindings. For the list of changes, see DLA-2510-1.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.09-1+2020e.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2510.data"
-# $Id: $
diff --git a/english/lts/security/2020/dla-2511.data b/english/lts/security/2020/dla-2511.data
deleted file mode 100644
index 9bf02d29a91..00000000000
--- a/english/lts/security/2020/dla-2511.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2511-1 highlight.js</define-tag>
-<define-tag report_date>2020-12-30</define-tag>
-<define-tag secrefs>CVE-2020-26237</define-tag>
-<define-tag packages>highlight.js</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2020/dla-2511.wml b/english/lts/security/2020/dla-2511.wml
deleted file mode 100644
index 81f8ae52270..00000000000
--- a/english/lts/security/2020/dla-2511.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in highlight.js, a JavaScript library for syntax
-highlighting. If a website or application renders user provided data it
-might be affected by a Prototype Pollution. This might result in strange
-behavior or crashes of applications that do not correctly handle unknown
-properties.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8.2+ds-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your highlight.js packages.</p>
-
-<p>For the detailed security status of highlight.js please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/highlight.js">https://security-tracker.debian.org/tracker/highlight.js</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2020/dla-2511.data"
-# $Id: $
diff --git a/english/lts/security/2020/index.wml b/english/lts/security/2020/index.wml
deleted file mode 100644
index ca39f0d45d6..00000000000
--- a/english/lts/security/2020/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2020</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2020' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2021/Makefile b/english/lts/security/2021/Makefile
deleted file mode 100644
index ba9566aa8da..00000000000
--- a/english/lts/security/2021/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2021
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
diff --git a/english/lts/security/2021/dla-2431-2.data b/english/lts/security/2021/dla-2431-2.data
deleted file mode 100644
index 2a7d2ec279a..00000000000
--- a/english/lts/security/2021/dla-2431-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2431-2 libonig</define-tag>
-<define-tag report_date>2021-1-30</define-tag>
-<define-tag secrefs>CVE-2020-26159</define-tag>
-<define-tag packages>libonig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2431-2.wml b/english/lts/security/2021/dla-2431-2.wml
deleted file mode 100644
index 4493cda4e31..00000000000
--- a/english/lts/security/2021/dla-2431-2.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that <a href="https://security-tracker.debian.org/tracker/CVE-2020-26159">CVE-2020-26159</a> in the Oniguruma regular
-expressions library, notably used in PHP mbstring, was a false-positive. In
-consequence the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2020-26159">CVE-2020-26159</a> was reverted. For reference, the
-original advisory text follows.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26159">CVE-2020-26159</a>
-
- <p>In Oniguruma an attacker able to supply a regular expression for
- compilation may be able to overflow a buffer by one byte in
- concat_opt_exact_str in src/regcomp.c</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-6.1.3-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your libonig packages.</p>
-
-<p>For the detailed security status of libonig please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libonig">https://security-tracker.debian.org/tracker/libonig</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2431-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2512.data b/english/lts/security/2021/dla-2512.data
deleted file mode 100644
index 9c90626ca6d..00000000000
--- a/english/lts/security/2021/dla-2512.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2512-1 libhibernate3-java</define-tag>
-<define-tag report_date>2021-1-03</define-tag>
-<define-tag secrefs>CVE-2020-25638</define-tag>
-<define-tag packages>libhibernate3-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2512.wml b/english/lts/security/2021/dla-2512.wml
deleted file mode 100644
index c70817d0152..00000000000
--- a/english/lts/security/2021/dla-2512.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in hibernate-core. A SQL injection in the implementation
-of the JPA Criteria API can permit unsanitized literals when a literal is
-used in the SQL comments of the query. This flaw could allow an attacker to
-access unauthorized information or possibly conduct further attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.6.10.Final-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your libhibernate3-java packages.</p>
-
-<p>For the detailed security status of libhibernate3-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libhibernate3-java">https://security-tracker.debian.org/tracker/libhibernate3-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2512.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2513.data b/english/lts/security/2021/dla-2513.data
deleted file mode 100644
index d0437078260..00000000000
--- a/english/lts/security/2021/dla-2513.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2513-1 p11-kit</define-tag>
-<define-tag report_date>2021-01-04</define-tag>
-<define-tag secrefs>CVE-2020-29361 CVE-2020-29362</define-tag>
-<define-tag packages>p11-kit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2513.wml b/english/lts/security/2021/dla-2513.wml
deleted file mode 100644
index 9088f5399be..00000000000
--- a/english/lts/security/2021/dla-2513.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several memory safety issues affecting the RPC protocol were fixed in
-p11-kit, a library providing a way to load and enumerate PKCS#11
-modules.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29361">CVE-2020-29361</a>
-
- <p>Multiple integer overflows</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29362">CVE-2020-29362</a>
-
- <p>Heap-based buffer over-read</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.23.3-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your p11-kit packages.</p>
-
-<p>For the detailed security status of p11-kit please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/p11-kit">https://security-tracker.debian.org/tracker/p11-kit</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2513.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2514.data b/english/lts/security/2021/dla-2514.data
deleted file mode 100644
index 4e2eab8e710..00000000000
--- a/english/lts/security/2021/dla-2514.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2514-1 flac</define-tag>
-<define-tag report_date>2021-01-04</define-tag>
-<define-tag secrefs>CVE-2017-6888 CVE-2020-0499 Bug#897015</define-tag>
-<define-tag packages>flac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2514.wml b/english/lts/security/2021/dla-2514.wml
deleted file mode 100644
index 9c0743ede9f..00000000000
--- a/english/lts/security/2021/dla-2514.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were fixed in flac, the library for the
-Free Lossless Audio Codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6888">CVE-2017-6888</a>
-
- <p>Memory leak via a specially crafted FLAC file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0499">CVE-2020-0499</a>
-
- <p>Out of bounds read due to a heap buffer overflow</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.3.2-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your flac packages.</p>
-
-<p>For the detailed security status of flac please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/flac">https://security-tracker.debian.org/tracker/flac</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2514.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2515.data b/english/lts/security/2021/dla-2515.data
deleted file mode 100644
index 36af80f2f94..00000000000
--- a/english/lts/security/2021/dla-2515.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2515-1 csync2</define-tag>
-<define-tag report_date>2021-01-04</define-tag>
-<define-tag secrefs>CVE-2019-15523</define-tag>
-<define-tag packages>csync2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2515.wml b/english/lts/security/2021/dla-2515.wml
deleted file mode 100644
index aa2c5313a11..00000000000
--- a/english/lts/security/2021/dla-2515.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that csync2, a cluster synchronization tool, did not
-correctly check for the return value from GnuTLS security routines. It
-neglected to repeatedly call this function as required by the design of the
-API.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15523">CVE-2019-15523</a>
-
- <p>An issue was discovered in LINBIT csync2 through 2.0. It does not
- correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the
- gnutls_handshake() function. It neglects to call this function again, as
- required by the design of the API.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.0-8-g175a01c-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your csync2 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2515.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2516.data b/english/lts/security/2021/dla-2516.data
deleted file mode 100644
index 657ad8a56b5..00000000000
--- a/english/lts/security/2021/dla-2516.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2516-1 gssproxy</define-tag>
-<define-tag report_date>2021-01-04</define-tag>
-<define-tag secrefs>CVE-2020-12658</define-tag>
-<define-tag packages>gssproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2516.wml b/english/lts/security/2021/dla-2516.wml
deleted file mode 100644
index 9c27285aafe..00000000000
--- a/english/lts/security/2021/dla-2516.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the gssproxy privilege
-separation caused by <em>gssproxy</em> not unlocking <pre>cond_mutex</pre>
-prior to calling <pre>pthread_exit</pre>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12658">CVE-2020-12658</a>
-
- <p>gssproxy (aka gss-proxy) before 0.8.3 does not unlock cond_mutex before
- pthread exit in gp_worker_main() in gp_workers.c.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.5.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your gssproxy packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2516.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2517.data b/english/lts/security/2021/dla-2517.data
deleted file mode 100644
index 3e265669c56..00000000000
--- a/english/lts/security/2021/dla-2517.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2517-1 dovecot</define-tag>
-<define-tag report_date>2021-01-05</define-tag>
-<define-tag secrefs>CVE-2020-24386 CVE-2020-25275</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2517.wml b/english/lts/security/2021/dla-2517.wml
deleted file mode 100644
index 800bdf1edf9..00000000000
--- a/english/lts/security/2021/dla-2517.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two issues in the Dovecot IMAP server:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24386">CVE-2020-24386</a>
-
- <p>An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an
- authenticated attacker can trigger unhibernation via attacker-controlled
- parameters, leading to access to other users' email messages (and path
- disclosure).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25275">CVE-2020-25275</a>
-
- <p>Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and
- imap, leading to an application crash via a crafted email message with
- certain choices for ten thousand MIME parts.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:2.2.27-3+deb9u7.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2517.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2518.data b/english/lts/security/2021/dla-2518.data
deleted file mode 100644
index ee93ce2cd8d..00000000000
--- a/english/lts/security/2021/dla-2518.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2518-1 cairo</define-tag>
-<define-tag report_date>2021-01-06</define-tag>
-<define-tag secrefs>CVE-2020-35492 Bug#978658</define-tag>
-<define-tag packages>cairo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2518.wml b/english/lts/security/2021/dla-2518.wml
deleted file mode 100644
index c3b9c4cf82d..00000000000
--- a/english/lts/security/2021/dla-2518.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>LibreOffice slideshow aborts with stack smashing in cairo’s
-composite_boxes.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.14.8-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your cairo packages.</p>
-
-<p>For the detailed security status of cairo please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cairo">https://security-tracker.debian.org/tracker/cairo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2518.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2519.data b/english/lts/security/2021/dla-2519.data
deleted file mode 100644
index 2f47887ae34..00000000000
--- a/english/lts/security/2021/dla-2519.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2519-1 pacemaker</define-tag>
-<define-tag report_date>2021-1-06</define-tag>
-<define-tag secrefs>CVE-2018-16877 CVE-2018-16878 CVE-2020-25654</define-tag>
-<define-tag packages>pacemaker</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2519.wml b/english/lts/security/2021/dla-2519.wml
deleted file mode 100644
index 720427ba57c..00000000000
--- a/english/lts/security/2021/dla-2519.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were addressed in pacemaker, a cluster
-resource manager.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16877">CVE-2018-16877</a>
-
- <p>A flaw was found in the way pacemaker's client-server authentication was
- implemented. A local attacker could use this flaw, and combine it with
- other IPC weaknesses, to achieve local privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16878">CVE-2018-16878</a>
-
- <p>An insufficient verification inflicted preference of uncontrolled processes
- can lead to denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25654">CVE-2020-25654</a>
-
- <p>An ACL bypass flaw was found in pacemaker. An attacker having a local
- account on the cluster and in the haclient group could use IPC
- communication with various daemons directly to perform certain tasks that
- they would be prevented by ACLs from doing if they went through the
- configuration.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.1.24-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your pacemaker packages.</p>
-
-<p>For the detailed security status of pacemaker please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/pacemaker">https://security-tracker.debian.org/tracker/pacemaker</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2519.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2520.data b/english/lts/security/2021/dla-2520.data
deleted file mode 100644
index fbc3099cc60..00000000000
--- a/english/lts/security/2021/dla-2520.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2520-1 golang-websocket</define-tag>
-<define-tag report_date>2021-01-07</define-tag>
-<define-tag secrefs>CVE-2020-27813</define-tag>
-<define-tag packages>golang-websocket</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2520.wml b/english/lts/security/2021/dla-2520.wml
deleted file mode 100644
index 654e29071e7..00000000000
--- a/english/lts/security/2021/dla-2520.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There was an integer overflow vulnerability concerning the length of websocket
-frames received via a websocket connection. An attacker could use this flaw to
-cause a denial of service attack on an HTTP Server allowing websocket
-connections.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your golang-websocket packages.</p>
-
-<p>For the detailed security status of golang-websocket please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-websocket">https://security-tracker.debian.org/tracker/golang-websocket</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2520.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2521.data b/english/lts/security/2021/dla-2521.data
deleted file mode 100644
index 0ecaaebeedf..00000000000
--- a/english/lts/security/2021/dla-2521.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2521-1 firefox-esr</define-tag>
-<define-tag report_date>2021-01-08</define-tag>
-<define-tag secrefs>CVE-2020-16044</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2521.wml b/english/lts/security/2021/dla-2521.wml
deleted file mode 100644
index 2379f01cd61..00000000000
--- a/english/lts/security/2021/dla-2521.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue was found in the Mozilla Firefox web browser, which
-could potentially result in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-78.6.1esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2521.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2522.data b/english/lts/security/2021/dla-2522.data
deleted file mode 100644
index 97d22e8385d..00000000000
--- a/english/lts/security/2021/dla-2522.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2522-1 coturn</define-tag>
-<define-tag report_date>2021-01-12</define-tag>
-<define-tag secrefs>CVE-2020-26262</define-tag>
-<define-tag packages>coturn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2522.wml b/english/lts/security/2021/dla-2522.wml
deleted file mode 100644
index 68316624428..00000000000
--- a/english/lts/security/2021/dla-2522.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in coturn, a TURN and STUN server for VoIP. By
-default coturn does not allow peers on the loopback addresses
-(127.x.x.x and ::1). A remote attacker can bypass the protection via a
-specially crafted request using a peer address of <q>0.0.0.0</q> and trick
-coturn in relaying to the loopback interface. If listening on IPv6 the
-loopback interface can also be reached by using either [::1] or [::] as
-the address.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.5.0.5-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your coturn packages.</p>
-
-<p>For the detailed security status of coturn please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/coturn">https://security-tracker.debian.org/tracker/coturn</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2522.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2523.data b/english/lts/security/2021/dla-2523.data
deleted file mode 100644
index b0e608f02cb..00000000000
--- a/english/lts/security/2021/dla-2523.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2523-1 imagemagick</define-tag>
-<define-tag report_date>2021-01-12</define-tag>
-<define-tag secrefs>CVE-2017-14528 CVE-2020-19667 CVE-2020-25665 CVE-2020-25674 CVE-2020-27560 CVE-2020-27750 CVE-2020-27760 CVE-2020-27763 CVE-2020-27765 CVE-2020-27773 CVE-2020-29599 Bug#878544 Bug#972797 Bug#977205</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2523.wml b/english/lts/security/2021/dla-2523.wml
deleted file mode 100644
index eca7b44aab1..00000000000
--- a/english/lts/security/2021/dla-2523.wml
+++ /dev/null
@@ -1,115 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in ImageMagick, a suite of
-image manipulation programs. An attacker could cause denial of service
-and execution of arbitrary code when a crafted image file is
-processed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14528">CVE-2017-14528</a>
-
- <p>The TIFFSetProfiles function in coders/tiff.c has incorrect
- expectations about whether LibTIFF TIFFGetField return values
- imply that data validation has occurred, which allows remote
- attackers to cause a denial of service (use-after-free after an
- invalid call to TIFFSetField, and application crash) via a crafted
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19667">CVE-2020-19667</a>
-
- <p>Stack-based buffer overflow and unconditional jump in ReadXPMImage
- in coders/xpm.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25665">CVE-2020-25665</a>
-
- <p>The PALM image coder at coders/palm.c makes an improper call to
- AcquireQuantumMemory() in routine WritePALMImage() because it
- needs to be offset by 256. This can cause a out-of-bounds read
- later on in the routine. This could cause impact to reliability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25674">CVE-2020-25674</a>
-
- <p>WriteOnePNGImage() from coders/png.c (the PNG coder) has a for
- loop with an improper exit condition that can allow an
- out-of-bounds READ via heap-buffer-overflow. This occurs because
- it is possible for the colormap to have less than 256 valid values
- but the loop condition will loop 256 times, attempting to pass
- invalid colormap data to the event logger.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27560">CVE-2020-27560</a>
-
- <p>ImageMagick allows Division by Zero in OptimizeLayerFrames in
- MagickCore/layer.c, which may cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27750">CVE-2020-27750</a>
-
- <p>A flaw was found in MagickCore/colorspace-private.h and
- MagickCore/quantum.h. An attacker who submits a crafted file that
- is processedcould trigger undefined behavior in the form of values
- outside the range of type `unsigned char` and math division by
- zero. This would most likely lead to an impact to application
- availability, but could potentially cause other problems related
- to undefined behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27760">CVE-2020-27760</a>
-
- <p>In `GammaImage()` of /MagickCore/enhance.c, depending on the
- `gamma` value, it's possible to trigger a divide-by-zero condition
- when a crafted input file is processed by ImageMagick. This could
- lead to an impact to application availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27763">CVE-2020-27763</a>
-
- <p>A flaw was found in MagickCore/resize.c. An attacker who submits a
- crafted file that is processed by ImageMagick could trigger
- undefined behavior in the form of math division by zero. This
- would most likely lead to an impact to application availability,
- but could potentially cause other problems related to undefined
- behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27765">CVE-2020-27765</a>
-
- <p>A flaw was found in MagickCore/segment.c. An attacker who submits
- a crafted file that is processed by ImageMagick could trigger
- undefined behavior in the form of math division by zero. This
- would most likely lead to an impact to application availability,
- but could potentially cause other problems related to undefined
- behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27773">CVE-2020-27773</a>
-
- <p>A flaw was found in MagickCore/gem-private.h. An attacker who
- submits a crafted file that is processed by ImageMagick could
- trigger undefined behavior in the form of values outside the range
- of type `unsigned char` or division by zero. This would most
- likely lead to an impact to application availability, but could
- potentially cause other problems related to undefined behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29599">CVE-2020-29599</a>
-
- <p>ImageMagick mishandles the -authenticate option, which allows
- setting a password for password-protected PDF files. The
- user-controlled password was not properly escaped/sanitized and it
- was therefore possible to inject additional shell commands via
- coders/pdf.c.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8:6.9.7.4+dfsg-11+deb9u11.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2523.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2524.data b/english/lts/security/2021/dla-2524.data
deleted file mode 100644
index 6b4bb9905b2..00000000000
--- a/english/lts/security/2021/dla-2524.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2524-1 spice-vdagent</define-tag>
-<define-tag report_date>2021-01-13</define-tag>
-<define-tag secrefs>CVE-2017-15108 CVE-2020-25650 CVE-2020-25651 CVE-2020-25652 CVE-2020-25653 Bug#883238 Bug#973769</define-tag>
-<define-tag packages>spice-vdagent</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2524.wml b/english/lts/security/2021/dla-2524.wml
deleted file mode 100644
index d604e64a0ff..00000000000
--- a/english/lts/security/2021/dla-2524.wml
+++ /dev/null
@@ -1,74 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in spice-vdagent, a spice
-guest agent for enchancing SPICE integeration and experience.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15108">CVE-2017-15108</a>
-
- <p>spice-vdagent does not properly escape save directory before
- passing to shell, allowing local attacker with access to the
- session the agent runs in to inject arbitrary commands to be
- executed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25650">CVE-2020-25650</a>
-
- <p>A flaw was found in the way the spice-vdagentd daemon handled file
- transfers from the host system to the virtual machine. Any
- unprivileged local guest user with access to the UNIX domain
- socket path `/run/spice-vdagentd/spice-vdagent-sock` could use
- this flaw to perform a memory denial of service for spice-vdagentd
- or even other processes in the VM system. The highest threat from
- this vulnerability is to system availability. This flaw affects
- spice-vdagent versions 0.20 and previous versions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25651">CVE-2020-25651</a>
-
- <p>A flaw was found in the SPICE file transfer protocol. File data
- from the host system can end up in full or in parts in the client
- connection of an illegitimate local user in the VM system. Active
- file transfers from other users could also be interrupted,
- resulting in a denial of service. The highest threat from this
- vulnerability is to data confidentiality as well as system
- availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25652">CVE-2020-25652</a>
-
- <p>A flaw was found in the spice-vdagentd daemon, where it did not
- properly handle client connections that can be established via the
- UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`.
- Any unprivileged local guest user could use this flaw to prevent
- legitimate agents from connecting to the spice-vdagentd daemon,
- resulting in a denial of service. The highest threat from this
- vulnerability is to system availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25653">CVE-2020-25653</a>
-
- <p>A race condition vulnerability was found in the way the
- spice-vdagentd daemon handled new client connections. This flaw
- may allow an unprivileged local guest user to become the active
- agent for spice-vdagentd, possibly resulting in a denial of
- service or information leakage from the host. The highest threat
- from this vulnerability is to data confidentiality as well as
- system availability.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.17.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your spice-vdagent packages.</p>
-
-<p>For the detailed security status of spice-vdagent please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spice-vdagent">https://security-tracker.debian.org/tracker/spice-vdagent</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2524.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2525.data b/english/lts/security/2021/dla-2525.data
deleted file mode 100644
index ad00c020f43..00000000000
--- a/english/lts/security/2021/dla-2525.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2525-1 wavpack</define-tag>
-<define-tag report_date>2021-01-15</define-tag>
-<define-tag secrefs>CVE-2018-19840 CVE-2018-19841 CVE-2019-11498 CVE-2019-1010315 CVE-2019-1010317 CVE-2019-1010319 CVE-2020-35738 Bug#915564 Bug#915565 Bug#932060 Bug#932061 Bug#927903 Bug#978548</define-tag>
-<define-tag packages>wavpack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2525.wml b/english/lts/security/2021/dla-2525.wml
deleted file mode 100644
index 92953519ac9..00000000000
--- a/english/lts/security/2021/dla-2525.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilites in wavpack were found, like OOB read
-(which could potentially lead to a DOS attack), unexpected
-control flow, crashes, integer overflow, and segfaults.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.0.0-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your wavpack packages.</p>
-
-<p>For the detailed security status of wavpack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wavpack">https://security-tracker.debian.org/tracker/wavpack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2525.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2526.data b/english/lts/security/2021/dla-2526.data
deleted file mode 100644
index 6f26ec52edb..00000000000
--- a/english/lts/security/2021/dla-2526.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2526-1 ruby-redcarpet</define-tag>
-<define-tag report_date>2021-01-15</define-tag>
-<define-tag secrefs>CVE-2020-26298 Bug#980057</define-tag>
-<define-tag packages>ruby-redcarpet</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2526.wml b/english/lts/security/2021/dla-2526.wml
deleted file mode 100644
index 5f4e994578c..00000000000
--- a/english/lts/security/2021/dla-2526.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Redcarpet before version 3.5.1, there is an injection
-vulnerability which can enable a cross-site scripting attack.</p>
-
-<p>In affected versions, no HTML escaping was being performed when
-processing quotes. This applies even when the `:escape_html`
-option was being used.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.3.4-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-redcarpet packages.</p>
-
-<p>For the detailed security status of ruby-redcarpet please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-redcarpet">https://security-tracker.debian.org/tracker/ruby-redcarpet</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2526.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2527.data b/english/lts/security/2021/dla-2527.data
deleted file mode 100644
index 3e48f5b0807..00000000000
--- a/english/lts/security/2021/dla-2527.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2527-1 snapd</define-tag>
-<define-tag report_date>2021-01-18</define-tag>
-<define-tag secrefs>CVE-2019-11840</define-tag>
-<define-tag packages>snapd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2527.wml b/english/lts/security/2021/dla-2527.wml
deleted file mode 100644
index 09c76b6b02e..00000000000
--- a/english/lts/security/2021/dla-2527.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>golang-go.crypto was recently updated with a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>. This in
-turn requires all packages that use the affected code to be recompiled in order
-to pick up the security fix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>
-
- <p>An issue was discovered in supplementary Go cryptography libraries, aka
- golang-googlecode-go-crypto. If more than 256 GiB of keystream is
- generated, or if the counter otherwise grows greater than 32 bits, the amd64
- implementation will first generate incorrect output, and then cycle back to
- previously generated keystream. Repeated keystream bytes can lead to loss of
- confidentiality in encryption applications, or to predictability in CSPRNG
- applications.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.21-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your snapd packages.</p>
-
-<p>For the detailed security status of snapd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/snapd">https://security-tracker.debian.org/tracker/snapd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2527.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2528.data b/english/lts/security/2021/dla-2528.data
deleted file mode 100644
index f70681724f8..00000000000
--- a/english/lts/security/2021/dla-2528.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2528-1 gst-plugins-bad1.0</define-tag>
-<define-tag report_date>2021-01-19</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>gst-plugins-bad1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2528.wml b/english/lts/security/2021/dla-2528.wml
deleted file mode 100644
index 3286b18e99c..00000000000
--- a/english/lts/security/2021/dla-2528.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Andrew Wesie discovered a buffer overflow in the H264 support of the
-GStreamer multimedia framework, which could potentially result in the
-execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-bad1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-bad1.0">https://security-tracker.debian.org/tracker/gst-plugins-bad1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2528.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2529.data b/english/lts/security/2021/dla-2529.data
deleted file mode 100644
index 319111ad90f..00000000000
--- a/english/lts/security/2021/dla-2529.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2529-1 mutt</define-tag>
-<define-tag report_date>2021-01-21</define-tag>
-<define-tag secrefs>CVE-2021-3181 Bug#980326</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2529.wml b/english/lts/security/2021/dla-2529.wml
deleted file mode 100644
index 5a25a5aabae..00000000000
--- a/english/lts/security/2021/dla-2529.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>rfc822.c in Mutt through 2.0.4 allows remote attackers to
-cause a denial of service (mailbox unavailability) by sending
-email messages with sequences of semicolon characters in
-RFC822 address fields (aka terminators of empty groups).</p>
-
-<p>A small email message from the attacker can cause large
-memory consumption, and the victim may then be unable to
-see email messages from other persons.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.2-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>For the detailed security status of mutt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mutt">https://security-tracker.debian.org/tracker/mutt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2529.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2530.data b/english/lts/security/2021/dla-2530.data
deleted file mode 100644
index a10a508e0e2..00000000000
--- a/english/lts/security/2021/dla-2530.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2530-1 drupal7</define-tag>
-<define-tag report_date>2021-01-21</define-tag>
-<define-tag secrefs>CVE-2020-36193</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2530.wml b/english/lts/security/2021/dla-2530.wml
deleted file mode 100644
index 0aa6a28ec92..00000000000
--- a/english/lts/security/2021/dla-2530.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Drupal identified a vulnerability in the verson of the Archive_Tar
-library it bundles (<a href="https://security-tracker.debian.org/tracker/CVE-2020-36193">CVE-2020-36193</a>), which allows out-of-path
-extraction vulnerabilities, granting it the Drupal Security Advisory
-ID SA-CORE-2021-001:</p>
-
- <p>https://www.drupal.org/sa-core-2021-001</p>
-
-<p>For Debian 9 <q>Stretch</q>, the fix to this issue was backported in
-version 7.52-2+deb9u14.</p>
-
-<p>We recommend you upgrade your drupal7 package.</p>
-
-<p>For detailed security status of drupal7, please refer to its security
-tracker page:</p>
-
- <p>https://security-tracker.debian.org/tracker/source-package/drupal7</p>
-
-<p>Further information about Debian LTS security advisories, how to
-apply these updates to your system, and other frequently asked
-questions can be found at:</p>
-
- <p>https://wiki.debian.org/LTS</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2530.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2531.data b/english/lts/security/2021/dla-2531.data
deleted file mode 100644
index 37f49c49e83..00000000000
--- a/english/lts/security/2021/dla-2531.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2531-1 python-bottle</define-tag>
-<define-tag report_date>2021-01-25</define-tag>
-<define-tag secrefs>CVE-2020-28473</define-tag>
-<define-tag packages>python-bottle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2531.wml b/english/lts/security/2021/dla-2531.wml
deleted file mode 100644
index 1c688babb8e..00000000000
--- a/english/lts/security/2021/dla-2531.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The package src:python-bottle before 0.12.19 are vulnerable to
-Web Cache Poisoning by using a vector called parameter cloaking.</p>
-
-<p>When the attacker can separate query parameters using a
-semicolon (;), they can cause a difference in the interpretation
-of the request between the proxy (running with default configuration)
-and the server. This can result in malicious requests being cached
-as completely safe ones, as the proxy would usually not see the
-semicolon as a separator, and therefore would not include it in a
-cache key of an unkeyed parameter.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.12.13-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-bottle packages.</p>
-
-<p>For the detailed security status of python-bottle please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-bottle">https://security-tracker.debian.org/tracker/python-bottle</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2531.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2532.data b/english/lts/security/2021/dla-2532.data
deleted file mode 100644
index 5d18f2bfde4..00000000000
--- a/english/lts/security/2021/dla-2532.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2532-1 debian-security-support</define-tag>
-<define-tag report_date>2021-01-25</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2532.wml b/english/lts/security/2021/dla-2532.wml
deleted file mode 100644
index b815a1bf471..00000000000
--- a/english/lts/security/2021/dla-2532.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker, has
-been updated in stretch-security to mark the end of life of the reel package..</p>
-
-<p>See <a href="https://lists.debian.org/debian-lts/2021/01/msg00016.html">https://lists.debian.org/debian-lts/2021/01/msg00016.html</a>
-for further information.</p>
-
-<p>For Debian 9 <q>stretch</q>, this problem has been documented in version
-1:9+2021.01.23 of the debian-security-support package.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2532.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2533.data b/english/lts/security/2021/dla-2533.data
deleted file mode 100644
index 284011ae3d7..00000000000
--- a/english/lts/security/2021/dla-2533.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2533-1 crmsh</define-tag>
-<define-tag report_date>2021-01-25</define-tag>
-<define-tag secrefs>CVE-2020-35459</define-tag>
-<define-tag packages>crmsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2533.wml b/english/lts/security/2021/dla-2533.wml
deleted file mode 100644
index ef3478da038..00000000000
--- a/english/lts/security/2021/dla-2533.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an in issue in the command-line tool for
-the <a href="https://clusterlabs.org/pacemaker/">Pacemaker High Availability
-stack</a>. Local attackers were able to execute commands via shell code
-injection to the <tt>crm history</tt> command-line tool, potentially allowing
-escalation of privileges.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35459">CVE-2020-35459</a>
-
- <p>An issue was discovered in ClusterLabs crmsh through 4.2.1. Local
- attackers able to call "crm history" (when "crm" is run) were able to
- execute commands via shell code injection to the crm history commandline,
- potentially allowing escalation of privileges.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.3.2-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your crmsh packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2533.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2534.data b/english/lts/security/2021/dla-2534.data
deleted file mode 100644
index f60b7a6affb..00000000000
--- a/english/lts/security/2021/dla-2534.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2534-1 sudo</define-tag>
-<define-tag report_date>2021-01-26</define-tag>
-<define-tag secrefs>CVE-2021-3156</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2534.wml b/english/lts/security/2021/dla-2534.wml
deleted file mode 100644
index 926a2985c66..00000000000
--- a/english/lts/security/2021/dla-2534.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Labs discovered a heap-based buffer overflow
-vulnerability in sudo, a program designed to provide limited super user
-privileges to specific users. Any local user (sudoers and non-sudoers)
-can exploit this flaw for root privilege escalation.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8.19p1-2.1+deb9u3.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>For the detailed security status of sudo please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sudo">https://security-tracker.debian.org/tracker/sudo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2534.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2535.data b/english/lts/security/2021/dla-2535.data
deleted file mode 100644
index c2ad5ec0b0b..00000000000
--- a/english/lts/security/2021/dla-2535.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2535-1 ansible</define-tag>
-<define-tag report_date>2021-1-27</define-tag>
-<define-tag secrefs>CVE-2017-7481 CVE-2019-10156 CVE-2019-14846 CVE-2019-14904 Bug#862666 Bug#930065 Bug#942188</define-tag>
-<define-tag packages>ansible</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2535.wml b/english/lts/security/2021/dla-2535.wml
deleted file mode 100644
index 8bd7c18134b..00000000000
--- a/english/lts/security/2021/dla-2535.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in ansible, a configuration
-management, deployment, and task execution system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7481">CVE-2017-7481</a>
-
- <p>Ansible fails to properly mark lookup-plugin results as unsafe. If an
- attacker could control the results of lookup() calls, they could inject
- Unicode strings to be parsed by the jinja2 templating system, resulting in
- code execution. By default, the jinja2 templating language is now marked as
- <q>unsafe</q> and is not evaluated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10156">CVE-2019-10156</a>
-
- <p>A flaw was discovered in the way Ansible templating was implemented,
- causing the possibility of information disclosure through unexpected
- variable substitution. By taking advantage of unintended variable
- substitution the content of any variable may be disclosed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14846">CVE-2019-14846</a>
-
- <p>Ansible was logging at the DEBUG level which lead to a disclosure of
- credentials if a plugin used a library that logged credentials at the DEBUG
- level. This flaw does not affect Ansible modules, as those are executed in
- a separate process.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14904">CVE-2019-14904</a>
-
- <p>A flaw was found in the solaris_zone module from the Ansible Community
- modules. When setting the name for the zone on the Solaris host, the zone
- name is checked by listing the process with the <q>ps</q> bare command on the
- remote machine. An attacker could take advantage of this flaw by crafting
- the name of the zone and executing arbitrary commands in the remote host.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.2.1.0-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your ansible packages.</p>
-
-<p>For the detailed security status of ansible please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ansible">https://security-tracker.debian.org/tracker/ansible</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2535.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2536.data b/english/lts/security/2021/dla-2536.data
deleted file mode 100644
index 07b9a6e8319..00000000000
--- a/english/lts/security/2021/dla-2536.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2536-1 libsdl2</define-tag>
-<define-tag report_date>2021-1-30</define-tag>
-<define-tag secrefs>CVE-2019-7575 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7638 CVE-2019-13616 CVE-2020-14409 CVE-2020-14410</define-tag>
-<define-tag packages>libsdl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2536.wml b/english/lts/security/2021/dla-2536.wml
deleted file mode 100644
index 7b78497cad0..00000000000
--- a/english/lts/security/2021/dla-2536.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in libsdl2, a library for portable low
-level access to a video framebuffer, audio output, mouse, and keyboard.
-All issues are related to either buffer overflow, integer overflow or
-heap-based buffer over-read, resulting in a DoS or remote code execution
-by using crafted files of different formats.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.0.5+dfsg1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libsdl2 packages.</p>
-
-<p>For the detailed security status of libsdl2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsdl2">https://security-tracker.debian.org/tracker/libsdl2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2536.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2537.data b/english/lts/security/2021/dla-2537.data
deleted file mode 100644
index ba194420f99..00000000000
--- a/english/lts/security/2021/dla-2537.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2537-1 ffmpeg</define-tag>
-<define-tag report_date>2021-01-31</define-tag>
-<define-tag secrefs>CVE-2019-17539 CVE-2020-35965 Bug#979999</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2537.wml b/english/lts/security/2021/dla-2537.wml
deleted file mode 100644
index 9bd63c0c5b3..00000000000
--- a/english/lts/security/2021/dla-2537.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been discovered in ffmpeg, a widely used
-multimedia framework.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17539">CVE-2019-17539</a>
-
- <p>a NULL pointer dereference and possibly unspecified other impact
- when there is no valid close function pointer</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35965">CVE-2020-35965</a>
-
- <p>an out-of-bounds write because of errors in calculations of when to
- perform memset zero operations</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7:3.2.15-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2537.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2538.data b/english/lts/security/2021/dla-2538.data
deleted file mode 100644
index 95323cee84e..00000000000
--- a/english/lts/security/2021/dla-2538.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2538-1 mariadb-10.1</define-tag>
-<define-tag report_date>2021-01-31</define-tag>
-<define-tag secrefs>CVE-2020-14765 CVE-2020-14812</define-tag>
-<define-tag packages>mariadb-10.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2538.wml b/english/lts/security/2021/dla-2538.wml
deleted file mode 100644
index b9b604391c1..00000000000
--- a/english/lts/security/2021/dla-2538.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were fixed by upgrading the MariaDB database server
-packages to the latest version on the 10.1 branch.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-10.1.48-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.1 packages.</p>
-
-<p>For the detailed security status of mariadb-10.1 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.1">https://security-tracker.debian.org/tracker/mariadb-10.1</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2538.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2539.data b/english/lts/security/2021/dla-2539.data
deleted file mode 100644
index a5f38b0f98a..00000000000
--- a/english/lts/security/2021/dla-2539.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2539-1 firefox-esr</define-tag>
-<define-tag report_date>2021-02-02</define-tag>
-<define-tag secrefs>CVE-2020-26976 CVE-2021-23953 CVE-2021-23954 CVE-2021-23960 CVE-2021-23964</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2539.wml b/english/lts/security/2021/dla-2539.wml
deleted file mode 100644
index 32b1461df6a..00000000000
--- a/english/lts/security/2021/dla-2539.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.7.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2539.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2540.data b/english/lts/security/2021/dla-2540.data
deleted file mode 100644
index 1c34b0c6cb4..00000000000
--- a/english/lts/security/2021/dla-2540.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2540-1 python-django</define-tag>
-<define-tag report_date>2021-02-01</define-tag>
-<define-tag secrefs>CVE-2021-3281</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2540.wml b/english/lts/security/2021/dla-2540.wml
deleted file mode 100644
index 617c5b3d9f5..00000000000
--- a/english/lts/security/2021/dla-2540.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential directory-traversal in
-<a href="https://www.djangoproject.com/">Django</a>, a popular Python-based web
-development framework.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3281">CVE-2021-3281</a></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u10.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2540.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2541.data b/english/lts/security/2021/dla-2541.data
deleted file mode 100644
index ec12619c1bc..00000000000
--- a/english/lts/security/2021/dla-2541.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2541-1 thunderbird</define-tag>
-<define-tag report_date>2021-02-02</define-tag>
-<define-tag secrefs>CVE-2020-15685 CVE-2020-16044 CVE-2020-26976 CVE-2021-23953 CVE-2021-23954 CVE-2021-23960 CVE-2021-23964</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2541.wml b/english/lts/security/2021/dla-2541.wml
deleted file mode 100644
index 61ba86095a4..00000000000
--- a/english/lts/security/2021/dla-2541.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which may lead
-to the execution of arbitrary code, denial of service or an information
-leak.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.7.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2541.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2542.data b/english/lts/security/2021/dla-2542.data
deleted file mode 100644
index 75a28dfbf99..00000000000
--- a/english/lts/security/2021/dla-2542.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2542-1 tzdata</define-tag>
-<define-tag report_date>2021-02-02</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2542.wml b/english/lts/security/2021/dla-2542.wml
deleted file mode 100644
index b20d9ecc3bf..00000000000
--- a/english/lts/security/2021/dla-2542.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2021a. Notable
-changes are:</p>
-
- <p>- South Sudan changed from +03 to +02 on 2021-02-01.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2021a-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2542.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2543.data b/english/lts/security/2021/dla-2543.data
deleted file mode 100644
index 5281489d336..00000000000
--- a/english/lts/security/2021/dla-2543.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2543-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2021-02-02</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2543.wml b/english/lts/security/2021/dla-2543.wml
deleted file mode 100644
index 62c043953a9..00000000000
--- a/english/lts/security/2021/dla-2543.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2021a for the
-Perl bindings. For the list of changes, see DLA-2542-1.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.09-1+2021a.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2543.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2544.data b/english/lts/security/2021/dla-2544.data
deleted file mode 100644
index b02c301e4ac..00000000000
--- a/english/lts/security/2021/dla-2544.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2544-1 openldap</define-tag>
-<define-tag report_date>2021-02-03</define-tag>
-<define-tag secrefs>CVE-2020-36221 CVE-2020-36222 CVE-2020-36223 CVE-2020-36224 CVE-2020-36225 CVE-2020-36226 CVE-2020-36227 CVE-2020-36228 CVE-2020-36229 CVE-2020-36230</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2544.wml b/english/lts/security/2021/dla-2544.wml
deleted file mode 100644
index 5f62cd36e42..00000000000
--- a/english/lts/security/2021/dla-2544.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in OpenLDAP, a free
-implementation of the Lightweight Directory Access Protocol. An
-unauthenticated remote attacker can take advantage of these flaws to
-cause a denial of service (slapd daemon crash, infinite loops) via
-specially crafted packets.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.44+dfsg-5+deb9u7.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>For the detailed security status of openldap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openldap">https://security-tracker.debian.org/tracker/openldap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2544.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2545.data b/english/lts/security/2021/dla-2545.data
deleted file mode 100644
index c86c465f819..00000000000
--- a/english/lts/security/2021/dla-2545.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2545-1 open-build-service</define-tag>
-<define-tag report_date>2021-02-03</define-tag>
-<define-tag secrefs>CVE-2020-8020 CVE-2020-8021</define-tag>
-<define-tag packages>open-build-service</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2545.wml b/english/lts/security/2021/dla-2545.wml
deleted file mode 100644
index 38e093cc7a3..00000000000
--- a/english/lts/security/2021/dla-2545.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8020">CVE-2020-8020</a>
-
- <p>An improper neutralization of input during web page generation
- vulnerability in open-build-service allows remote attackers to
- store arbitrary JS code to cause XSS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8021">CVE-2020-8021</a>
-
- <p>An improper access control vulnerability in open-build-service
- allows remote attackers to read files of an OBS package where
- the sourceaccess/access is disabled.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.7.1-10+deb9u1.</p>
-
-<p>We recommend that you upgrade your open-build-service packages.</p>
-
-<p>For the detailed security status of open-build-service please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/open-build-service">https://security-tracker.debian.org/tracker/open-build-service</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2545.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2546.data b/english/lts/security/2021/dla-2546.data
deleted file mode 100644
index 73abc3b5e24..00000000000
--- a/english/lts/security/2021/dla-2546.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2546-1 intel-microcode</define-tag>
-<define-tag report_date>2021-02-06</define-tag>
-<define-tag secrefs>CVE-2020-8695 CVE-2020-8696 CVE-2020-8698</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2546.wml b/english/lts/security/2021/dla-2546.wml
deleted file mode 100644
index c24758c3fa8..00000000000
--- a/english/lts/security/2021/dla-2546.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8695">CVE-2020-8695</a>
-
- <p>Observable discrepancy in the RAPL interface for some
- Intel(R) Processors may allow a privileged user to
- potentially enable information disclosure via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8696">CVE-2020-8696</a>
-
- <p>Improper removal of sensitive information before storage
- or transfer in some Intel(R) Processors may allow an
- authenticated user to potentially enable information
- disclosure via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8698">CVE-2020-8698</a>
-
- <p>Improper isolation of shared resources in some
- Intel(R) Processors may allow an authenticated user to
- potentially enable information disclosure via local access.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.20201118.1~deb9u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>For the detailed security status of intel-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2546.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2547.data b/english/lts/security/2021/dla-2547.data
deleted file mode 100644
index 1ee5f652fb6..00000000000
--- a/english/lts/security/2021/dla-2547.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2547-1 wireshark</define-tag>
-<define-tag report_date>2021-02-06</define-tag>
-<define-tag secrefs>CVE-2019-13619 CVE-2019-16319 CVE-2019-19553 CVE-2020-7045 CVE-2020-9428 CVE-2020-9430 CVE-2020-9431 CVE-2020-11647 CVE-2020-13164 CVE-2020-15466 CVE-2020-25862 CVE-2020-25863 CVE-2020-26418 CVE-2020-26421 CVE-2020-26575 CVE-2020-28030 Bug#958213 Bug#974688 Bug#974689</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2547.wml b/english/lts/security/2021/dla-2547.wml
deleted file mode 100644
index c113ae880fd..00000000000
--- a/english/lts/security/2021/dla-2547.wml
+++ /dev/null
@@ -1,89 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in Wireshark, a network sniffer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13619">CVE-2019-13619</a>
-
- <p>ASN.1 BER and related dissectors crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16319">CVE-2019-16319</a>
-
- <p>The Gryphon dissector could go into an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19553">CVE-2019-19553</a>
-
- <p>The CMS dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7045">CVE-2020-7045</a>
-
- <p>The BT ATT dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9428">CVE-2020-9428</a>
-
- <p>The EAP dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9430">CVE-2020-9430</a>
-
- <p>The WiMax DLMAP dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9431">CVE-2020-9431</a>
-
- <p>The LTE RRC dissector could leak memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11647">CVE-2020-11647</a>
-
- <p>The BACapp dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13164">CVE-2020-13164</a>
-
- <p>The NFS dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15466">CVE-2020-15466</a>
-
- <p>The GVCP dissector could go into an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25862">CVE-2020-25862</a>
-
- <p>The TCP dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25863">CVE-2020-25863</a>
-
- <p>The MIME Multipart dissector could crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26418">CVE-2020-26418</a>
-
- <p>Memory leak in the Kafka protocol dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26421">CVE-2020-26421</a>
-
- <p>Crash in USB HID protocol dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26575">CVE-2020-26575</a>
-
- <p>The Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28030">CVE-2020-28030</a>
-
- <p>The GQUIC dissector could crash.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.6.20-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2547.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2548.data b/english/lts/security/2021/dla-2548.data
deleted file mode 100644
index 9f4cbc947f4..00000000000
--- a/english/lts/security/2021/dla-2548.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2548-1 privoxy</define-tag>
-<define-tag report_date>2021-02-07</define-tag>
-<define-tag secrefs>CVE-2020-35502 CVE-2021-20209 CVE-2021-20210 CVE-2021-20211 CVE-2021-20212 CVE-2021-20213 CVE-2021-20215 CVE-2021-20216 CVE-2021-20217</define-tag>
-<define-tag packages>privoxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2548.wml b/english/lts/security/2021/dla-2548.wml
deleted file mode 100644
index 3cb343200f0..00000000000
--- a/english/lts/security/2021/dla-2548.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilites were discovered in privoxy, a privacy
-enhancing HTTP proxy, like memory leaks, dereference of a
-NULL-pointer, et al.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.0.26-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your privoxy packages.</p>
-
-<p>For the detailed security status of privoxy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/privoxy">https://security-tracker.debian.org/tracker/privoxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2548.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2549.data b/english/lts/security/2021/dla-2549.data
deleted file mode 100644
index 8200563922f..00000000000
--- a/english/lts/security/2021/dla-2549.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2549-1 gdisk</define-tag>
-<define-tag report_date>2021-02-11</define-tag>
-<define-tag secrefs>CVE-2020-0256 CVE-2021-0308</define-tag>
-<define-tag packages>gdisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2549.wml b/english/lts/security/2021/dla-2549.wml
deleted file mode 100644
index 2da8158bba2..00000000000
--- a/english/lts/security/2021/dla-2549.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-0256">CVE-2020-0256</a>
-
- <p>In LoadPartitionTable of gpt.cc, there is a possible
- out of bounds write due to a missing bounds check. This
- could lead to local escalation of privilege with no
- additional execution privileges needed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-0308">CVE-2021-0308</a>
-
- <p>In ReadLogicalParts of basicmbr.cc, there is a possible
- out of bounds write due to a missing bounds check. This
- could lead to local escalation of privilege with no
- additional execution privileges needed.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gdisk packages.</p>
-
-<p>For the detailed security status of gdisk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gdisk">https://security-tracker.debian.org/tracker/gdisk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2549.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2550.data b/english/lts/security/2021/dla-2550.data
deleted file mode 100644
index c12fdd61431..00000000000
--- a/english/lts/security/2021/dla-2550.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2550-1 openjpeg2</define-tag>
-<define-tag report_date>2021-02-09</define-tag>
-<define-tag secrefs>CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27844 CVE-2020-27845</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2550.wml b/english/lts/security/2021/dla-2550.wml
deleted file mode 100644
index 6a4da7eded7..00000000000
--- a/english/lts/security/2021/dla-2550.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Various overflow errors were identified and fixed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27814">CVE-2020-27814</a>
-
- <p>A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27823">CVE-2020-27823</a>
-
- <p>Wrong computation of x1,y1 if -d option is used, resulting in heap buffer
- overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27824">CVE-2020-27824</a>
-
- <p>Global buffer overflow on irreversible conversion when too many
- decomposition levels are specified.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27841">CVE-2020-27841</a>
-
- <p>Crafted input to be processed by the openjpeg encoder could cause an
- out-of-bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27844">CVE-2020-27844</a>
-
- <p>Crafted input to be processed by the openjpeg encoder could cause an
- out-of-bounds write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27845">CVE-2020-27845</a>
-
- <p>Crafted input can cause out-of-bounds-read.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.2-1.1+deb9u6.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>For the detailed security status of openjpeg2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjpeg2">https://security-tracker.debian.org/tracker/openjpeg2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2550.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2551.data b/english/lts/security/2021/dla-2551.data
deleted file mode 100644
index 13650536df1..00000000000
--- a/english/lts/security/2021/dla-2551.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2551-1 slirp</define-tag>
-<define-tag report_date>2021-2-9</define-tag>
-<define-tag secrefs>CVE-2020-7039 CVE-2020-8608</define-tag>
-<define-tag packages>slirp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2551.wml b/english/lts/security/2021/dla-2551.wml
deleted file mode 100644
index 37ea52727fc..00000000000
--- a/english/lts/security/2021/dla-2551.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in slirp, a SLIP/PPP emulator using a dial up
-shell account.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7039">CVE-2020-7039</a>
-
- <p>Due to mismanagement of memory, a heap-based buffer overflow or
- other out-of-bounds access might happen, which can lead to a DoS
- or potential execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8608">CVE-2020-8608</a>
-
- <p>Prevent a buffer overflow vulnerability due to incorrect usage
- of return values from snprintf.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.0.17-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your slirp packages.</p>
-
-<p>For the detailed security status of slirp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/slirp">https://security-tracker.debian.org/tracker/slirp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2551.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2552.data b/english/lts/security/2021/dla-2552.data
deleted file mode 100644
index 67fe009c814..00000000000
--- a/english/lts/security/2021/dla-2552.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2552-1 connman</define-tag>
-<define-tag report_date>2021-2-9</define-tag>
-<define-tag secrefs>CVE-2021-26675 CVE-2021-26676</define-tag>
-<define-tag packages>connman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2552.wml b/english/lts/security/2021/dla-2552.wml
deleted file mode 100644
index c8fccbeae04..00000000000
--- a/english/lts/security/2021/dla-2552.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A remote information leak vulnerability and a remote buffer overflow
-vulnerability were discovered in ConnMan, a network manager for embedded
-devices, which could result in denial of service or the execution of
-arbitrary code.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.33-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your connman packages.</p>
-
-<p>For the detailed security status of connman please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/connman">https://security-tracker.debian.org/tracker/connman</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2552.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2553-2.data b/english/lts/security/2021/dla-2553-2.data
deleted file mode 100644
index d74e8ed61bf..00000000000
--- a/english/lts/security/2021/dla-2553-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2553-2 xcftools</define-tag>
-<define-tag report_date>2021-3-08</define-tag>
-<define-tag secrefs>CVE-2019-5086 CVE-2019-5087 Bug#945317</define-tag>
-<define-tag packages>xcftools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2553-2.wml b/english/lts/security/2021/dla-2553-2.wml
deleted file mode 100644
index 370a5c958dd..00000000000
--- a/english/lts/security/2021/dla-2553-2.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The patch to address <a href="https://security-tracker.debian.org/tracker/CVE-2019-5086">CVE-2019-5086</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2019-5087">CVE-2019-5087</a> was not portable and did
-not work on 32 bit processor architectures. This update fixes the problem. For
-reference, the original advisory text follows.</p>
-
-<p>Claudio Bozzato of Cisco Talos discovered an exploitable integer overflow
-vulnerability in the flattenIncrementally function in the xcf2png and xcf2pnm
-binaries of xcftools. An integer overflow can occur while walking through tiles
-that could be exploited to corrupt memory and execute arbitrary code. In order
-to trigger this vulnerability, a victim would need to open a specially crafted
-XCF file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.7-6+deb9u2.</p>
-
-<p>We recommend that you upgrade your xcftools packages.</p>
-
-<p>For the detailed security status of xcftools please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/xcftools">https://security-tracker.debian.org/tracker/xcftools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2553-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2553.data b/english/lts/security/2021/dla-2553.data
deleted file mode 100644
index 9b0d6f520d9..00000000000
--- a/english/lts/security/2021/dla-2553.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2553-1 xcftools</define-tag>
-<define-tag report_date>2021-2-10</define-tag>
-<define-tag secrefs>CVE-2019-5086 CVE-2019-5087 Bug#945317</define-tag>
-<define-tag packages>xcftools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2553.wml b/english/lts/security/2021/dla-2553.wml
deleted file mode 100644
index 70dabb5c9b8..00000000000
--- a/english/lts/security/2021/dla-2553.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Claudio Bozzato of Cisco Talos discovered an exploitable integer overflow
-vulnerability in the flattenIncrementally function in the xcf2png and xcf2pnm
-binaries of xcftools. An integer overflow can occur while walking through tiles
-that could be exploited to corrupt memory and execute arbitrary code. In order
-to trigger this vulnerability, a victim would need to open a specially crafted
-XCF file.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.7-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your xcftools packages.</p>
-
-<p>For the detailed security status of xcftools please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/xcftools">https://security-tracker.debian.org/tracker/xcftools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2553.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2554.data b/english/lts/security/2021/dla-2554.data
deleted file mode 100644
index 1fd330f9b3c..00000000000
--- a/english/lts/security/2021/dla-2554.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2554-1 firejail</define-tag>
-<define-tag report_date>2021-02-11</define-tag>
-<define-tag secrefs>CVE-2021-26910</define-tag>
-<define-tag packages>firejail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2554.wml b/english/lts/security/2021/dla-2554.wml
deleted file mode 100644
index e8dab77ceae..00000000000
--- a/english/lts/security/2021/dla-2554.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Roman Fiedler discovered a vulnerability in the OverlayFS code in
-firejail, a sandbox program to restrict the running environment of
-untrusted applications, which could result in root privilege
-escalation. This update disables OverlayFS support in firejail.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.44.8-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your firejail packages.</p>
-
-<p>For the detailed security status of firejail please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firejail">https://security-tracker.debian.org/tracker/firejail</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2554.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2555.data b/english/lts/security/2021/dla-2555.data
deleted file mode 100644
index d35b0228987..00000000000
--- a/english/lts/security/2021/dla-2555.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2555-1 netty</define-tag>
-<define-tag report_date>2021-02-11</define-tag>
-<define-tag secrefs>CVE-2021-21290</define-tag>
-<define-tag packages>netty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2555.wml b/english/lts/security/2021/dla-2555.wml
deleted file mode 100644
index 92764dd09a5..00000000000
--- a/english/lts/security/2021/dla-2555.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an insecure temporary file issue that could
-have lead to disclosure of arbitrary local files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21290">CVE-2021-21290</a>
-
- <p>Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers &amp; clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. [...]</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:4.1.7-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your netty packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2555.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2556.data b/english/lts/security/2021/dla-2556.data
deleted file mode 100644
index 6babce76e20..00000000000
--- a/english/lts/security/2021/dla-2556.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2556-1 unbound1.9</define-tag>
-<define-tag report_date>2021-2-12</define-tag>
-<define-tag secrefs>CVE-2020-12662 CVE-2020-12663 CVE-2020-28935 Bug#977165</define-tag>
-<define-tag packages>unbound1.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2556.wml b/english/lts/security/2021/dla-2556.wml
deleted file mode 100644
index 3d784f2ffac..00000000000
--- a/english/lts/security/2021/dla-2556.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been corrected in unbound, a
-validating, recursive, caching DNS resolver. Support for the unbound DNS server
-has been resumed, the sources can be found in the unbound1.9 source package.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12662">CVE-2020-12662</a>
-
- <p>Unbound has Insufficient Control of Network Message
- Volume, aka an <q>NXNSAttack</q> issue. This is triggered by random
- subdomains in the NSDNAME in NS records.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12663">CVE-2020-12663</a>
-
- <p>Unbound has an infinite loop via malformed DNS answers received from
- upstream servers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28935">CVE-2020-28935</a>
-
- <p>Unbound contains a local vulnerability that would allow for a local symlink
- attack. When writing the PID file Unbound creates the file if it is not
- there, or opens an existing file for writing. In case the file was already
- present, it would follow symlinks if the file happened to be a symlink
- instead of a regular file.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9.0-2+deb10u2~deb9u1.</p>
-
-<p>We recommend that you upgrade your unbound1.9 packages.</p>
-
-<p>For the detailed security status of unbound1.9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/unbound1.9">https://security-tracker.debian.org/tracker/unbound1.9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2556.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2557.data b/english/lts/security/2021/dla-2557.data
deleted file mode 100644
index b42af3e307a..00000000000
--- a/english/lts/security/2021/dla-2557.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2557-1 linux-4.19</define-tag>
-<define-tag report_date>2021-02-12</define-tag>
-<define-tag secrefs>CVE-2020-27815 CVE-2020-27825 CVE-2020-27830 CVE-2020-28374 CVE-2020-29568 CVE-2020-29569 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 CVE-2021-3347 CVE-2021-20177 Bug#970736 Bug#972345 Bug#977048 Bug#977615</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2557.wml b/english/lts/security/2021/dla-2557.wml
deleted file mode 100644
index 21b741362f6..00000000000
--- a/english/lts/security/2021/dla-2557.wml
+++ /dev/null
@@ -1,96 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27815">CVE-2020-27815</a>
-
- <p>A flaw was reported in the JFS filesystem code allowing a local
- attacker with the ability to set extended attributes to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27825">CVE-2020-27825</a>
-
- <p>Adam <q>pi3</q> Zabrocki reported a use-after-free flaw in the ftrace
- ring buffer resizing logic due to a race condition, which could
- result in denial of service or information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27830">CVE-2020-27830</a>
-
- <p>Shisong Qin reported a NULL pointer dereference flaw in the Speakup
- screen reader core driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28374">CVE-2020-28374</a>
-
- <p>David Disseldorp discovered that the LIO SCSI target implementation
- performed insufficient checking in certain XCOPY requests. An
- attacker with access to a LUN and knowledge of Unit Serial Number
- assignments can take advantage of this flaw to read and write to any
- LIO backstore, regardless of the SCSI transport settings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29568">CVE-2020-29568</a> (<a href="https://xenbits.xen.org/xsa/advisory-349.html">XSA-349</a>)
-
- <p>Michael Kurth and Pawel Wieczorkiewicz reported that frontends can
- trigger OOM in backends by updating a watched path.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29569">CVE-2020-29569</a> (<a href="https://xenbits.xen.org/xsa/advisory-350.html">XSA-350</a>)
-
- <p>Olivier Benjamin and Pawel Wieczorkiewicz reported a use-after-free
- flaw which can be triggered by a block frontend in Linux blkback. A
- misbehaving guest can trigger a dom0 crash by continuously
- connecting / disconnecting a block frontend.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29660">CVE-2020-29660</a>
-
- <p>Jann Horn reported a locking inconsistency issue in the tty
- subsystem which may allow a local attacker to mount a
- read-after-free attack against TIOCGSID.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29661">CVE-2020-29661</a>
-
- <p>Jann Horn reported a locking issue in the tty subsystem which can
- result in a use-after-free. A local attacker can take advantage of
- this flaw for memory corruption or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36158">CVE-2020-36158</a>
-
- <p>A buffer overflow flaw was discovered in the mwifiex WiFi driver
- which could result in denial of service or the execution of
- arbitrary code via a long SSID value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3347">CVE-2021-3347</a>
-
- <p>It was discovered that PI futexes have a kernel stack use-after-free
- during fault handling. An unprivileged user could use this flaw to
- crash the kernel (resulting in denial of service) or for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20177">CVE-2021-20177</a>
-
- <p>A flaw was discovered in the Linux implementation of string matching
- within a packet. A privileged user (with root or CAP_NET_ADMIN) can
- take advantage of this flaw to cause a kernel panic when inserting
- iptables rules.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.171-2~deb9u1.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2557.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2558-2.data b/english/lts/security/2021/dla-2558-2.data
deleted file mode 100644
index af0e4049c54..00000000000
--- a/english/lts/security/2021/dla-2558-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2558-2 xterm</define-tag>
-<define-tag report_date>2021-03-21</define-tag>
-<define-tag secrefs>Bug#984615</define-tag>
-<define-tag packages>xterm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2558-2.wml b/english/lts/security/2021/dla-2558-2.wml
deleted file mode 100644
index 24648009a07..00000000000
--- a/english/lts/security/2021/dla-2558-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA 2558-2 backported a part of the upstream patch which fails
-to deal with the realloc failures in Debian stretch. This update
-reverts that part of the patch since it's not really needed and
-just focuses on fixing <a href="https://security-tracker.debian.org/tracker/CVE-2021-27135">CVE-2021-27135</a>.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-327-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your xterm packages.</p>
-
-<p>For the detailed security status of xterm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xterm">https://security-tracker.debian.org/tracker/xterm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2558-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2558.data b/english/lts/security/2021/dla-2558.data
deleted file mode 100644
index 761ee588671..00000000000
--- a/english/lts/security/2021/dla-2558.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2558-1 xterm</define-tag>
-<define-tag report_date>2021-02-13</define-tag>
-<define-tag secrefs>CVE-2021-27135 Bug#982439</define-tag>
-<define-tag packages>xterm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2558.wml b/english/lts/security/2021/dla-2558.wml
deleted file mode 100644
index eb256197aed..00000000000
--- a/english/lts/security/2021/dla-2558.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>xterm through Patch #365 allows remote attackers to cause a
-denial of service (segmentation fault) or possibly have
-unspecified other impact via a crafted UTF-8 character sequence.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-327-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your xterm packages.</p>
-
-<p>For the detailed security status of xterm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xterm">https://security-tracker.debian.org/tracker/xterm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2558.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2559.data b/english/lts/security/2021/dla-2559.data
deleted file mode 100644
index 07a68e48c8d..00000000000
--- a/english/lts/security/2021/dla-2559.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2559-1 busybox</define-tag>
-<define-tag report_date>2021-2-15</define-tag>
-<define-tag secrefs>CVE-2011-5325 CVE-2015-9261 CVE-2016-2147 CVE-2016-2148 CVE-2017-15873 CVE-2017-16544 CVE-2018-1000517 Bug#902724 Bug#882258 Bug#879732 Bug#818497 Bug#818499 Bug#803097 Bug#802702</define-tag>
-<define-tag packages>busybox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2559.wml b/english/lts/security/2021/dla-2559.wml
deleted file mode 100644
index 0d412f3a5a0..00000000000
--- a/english/lts/security/2021/dla-2559.wml
+++ /dev/null
@@ -1,95 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Busybox, utility programs for small and embedded systems, was affected
-by several security vulnerabilities. The Common Vulnerabilities and
-Exposures project identifies the following issues.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-5325">CVE-2011-5325</a>
-
- <p>A path traversal vulnerability was found in Busybox implementation
- of tar. tar will extract a symlink that points outside of the
- current working directory and then follow that symlink when
- extracting other files. This allows for a directory traversal
- attack when extracting untrusted tarballs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1813">CVE-2013-1813</a>
-
- <p>When device node or symlink in /dev should be created inside
- 2-or-deeper subdirectory (/dev/dir1/dir2.../node), the intermediate
- directories are created with incorrect permissions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4607">CVE-2014-4607</a>
-
- <p>An integer overflow may occur when processing any variant of a
- <q>literal run</q> in the lzo1x_decompress_safe function. Each of these
- three locations is subject to an integer overflow when processing
- zero bytes. This exposes the code that copies literals to memory
- corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9645">CVE-2014-9645</a>
-
- <p>The add_probe function in modutils/modprobe.c in BusyBox allows
- local users to bypass intended restrictions on loading kernel
- modules via a / (slash) character in a module name, as demonstrated
- by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none
- /" command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2147">CVE-2016-2147</a>
-
- <p>Integer overflow in the DHCP client (udhcpc) in BusyBox allows
- remote attackers to cause a denial of service (crash) via a
- malformed RFC1035-encoded domain name, which triggers an
- out-of-bounds heap write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2148">CVE-2016-2148</a>
-
- <p>Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox
- allows remote attackers to have unspecified impact via vectors
- involving OPTION_6RD parsing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15873">CVE-2017-15873</a>
-
- <p>The get_next_block function in archival/libarchive
- /decompress_bunzip2.c in BusyBox has an Integer Overflow that may
- lead to a write access violation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16544">CVE-2017-16544</a>
-
- <p>In the add_match function in libbb/lineedit.c in BusyBox, the tab
- autocomplete feature of the shell, used to get a list of filenames
- in a directory, does not sanitize filenames and results in executing
- any escape sequence in the terminal. This could potentially result
- in code execution, arbitrary file writes, or other attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000517">CVE-2018-1000517</a>
-
- <p>BusyBox contains a Buffer Overflow vulnerability in
- Busybox wget that can result in a heap-based buffer overflow.
- This attack appears to be exploitable via network connectivity.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9621">CVE-2015-9621</a>
-
- <p>Unziping a specially crafted zip file results in a computation of an
- invalid pointer and a crash reading an invalid address.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.22.0-19+deb9u1.</p>
-
-<p>We recommend that you upgrade your busybox packages.</p>
-
-<p>For the detailed security status of busybox please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/busybox">https://security-tracker.debian.org/tracker/busybox</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2559.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2560.data b/english/lts/security/2021/dla-2560.data
deleted file mode 100644
index e393be5c09f..00000000000
--- a/english/lts/security/2021/dla-2560.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2560-1 qemu</define-tag>
-<define-tag report_date>2021-02-18</define-tag>
-<define-tag secrefs>CVE-2020-15469 CVE-2020-15859 CVE-2020-25084 CVE-2020-28916 CVE-2020-29130 CVE-2020-29443 CVE-2021-20181 CVE-2021-20221 Bug#970253 Bug#965978 Bug#970539 Bug#974687 Bug#976388</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2560.wml b/english/lts/security/2021/dla-2560.wml
deleted file mode 100644
index 8895a3b9378..00000000000
--- a/english/lts/security/2021/dla-2560.wml
+++ /dev/null
@@ -1,71 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in QEMU, a fast processor
-emulator (notably used in KVM and Xen HVM virtualization). An attacker
-could trigger a denial-of-service (DoS), information leak, and
-possibly execute arbitrary code with the privileges of the QEMU
-process on the host.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15469">CVE-2020-15469</a>
-
- <p>A MemoryRegionOps object may lack read/write callback methods,
- leading to a NULL pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15859">CVE-2020-15859</a>
-
- <p>QEMU has a use-after-free in hw/net/e1000e_core.c because a guest
- OS user can trigger an e1000e packet with the data's address set
- to the e1000e's MMIO address.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25084">CVE-2020-25084</a>
-
- <p>QEMU has a use-after-free in hw/usb/hcd-xhci.c because the
- usb_packet_map return value is not checked.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28916">CVE-2020-28916</a>
-
- <p>hw/net/e1000e_core.c has an infinite loop via an RX descriptor
- with a NULL buffer address.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29130">CVE-2020-29130</a>
-
- <p>slirp.c has a buffer over-read because it tries to read a certain
- amount of header data even if that exceeds the total packet
- length.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29443">CVE-2020-29443</a>
-
- <p>ide_atapi_cmd_reply_end in hw/ide/atapi.c allows out-of-bounds
- read access because a buffer index is not validated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20181">CVE-2021-20181</a>
-
- <p>9pfs: ZDI-CAN-10904: QEMU Plan 9 file system TOCTOU privilege
- escalation vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20221">CVE-2021-20221</a>
-
- <p>aarch64: GIC: out-of-bound heap buffer access via an interrupt ID
- field.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u13.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2560.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2561.data b/english/lts/security/2021/dla-2561.data
deleted file mode 100644
index ef80731ed0d..00000000000
--- a/english/lts/security/2021/dla-2561.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2561-1 ruby-mechanize</define-tag>
-<define-tag report_date>2021-02-17</define-tag>
-<define-tag secrefs>CVE-2021-21289</define-tag>
-<define-tag packages>ruby-mechanize</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2561.wml b/english/lts/security/2021/dla-2561.wml
deleted file mode 100644
index e632681531e..00000000000
--- a/english/lts/security/2021/dla-2561.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mechanize is an open-source Ruby library that makes automated web
-interaction easy. In Mechanize, from v2.0.0 until v2.7.7, there
-is a command injection vulnerability.</p>
-
-<p>Affected versions of Mechanize allow for OS commands to be
-injected using several classes' methods which implicitly use
-Ruby's Kernel#open method.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.7.5-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-mechanize packages.</p>
-
-<p>For the detailed security status of ruby-mechanize please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-mechanize">https://security-tracker.debian.org/tracker/ruby-mechanize</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2561.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2562.data b/english/lts/security/2021/dla-2562.data
deleted file mode 100644
index 4d9f688b367..00000000000
--- a/english/lts/security/2021/dla-2562.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2562-1 mumble</define-tag>
-<define-tag report_date>2021-02-18</define-tag>
-<define-tag secrefs>CVE-2021-27229</define-tag>
-<define-tag packages>mumble</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2562.wml b/english/lts/security/2021/dla-2562.wml
deleted file mode 100644
index 64f7caa83d4..00000000000
--- a/english/lts/security/2021/dla-2562.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a a remote code execution vulnerability in
-<a href="https://www.mumble.info/">Mumble</a>, a VoIP client commonly used for
-group chats. The exploit could have been been triggered by a maliciously
-crafted URL on the server list.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27229">CVE-2021-27229</a>
-
- <p>Mumble before 1.3.4 allows remote code execution if a victim navigates
- to a crafted URL on a server list and clicks on the Open Webpage
- text.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.2.18-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your mumble packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2562.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2563.data b/english/lts/security/2021/dla-2563.data
deleted file mode 100644
index 34290b0fac2..00000000000
--- a/english/lts/security/2021/dla-2563.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2563-1 openssl</define-tag>
-<define-tag report_date>2021-02-18</define-tag>
-<define-tag secrefs>CVE-2021-23840 CVE-2021-23841</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2563.wml b/english/lts/security/2021/dla-2563.wml
deleted file mode 100644
index c7271046f1f..00000000000
--- a/english/lts/security/2021/dla-2563.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two issues in the openssl cryptographic
-system:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23840">CVE-2021-23840</a>
-
- <p>Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may
- overflow the output length argument in some cases where the input length is
- close to the maximum permissable length for an integer on the platform. In
- such cases the return value from the function call will be 1 (indicating
- success), but the output length value will be negative. This could cause
- applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and
- below are affected by this issue. Users of these versions should upgrade to
- OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this
- issue. However OpenSSL 1.0.2 is out of support and no longer receiving
- public updates. Premium support customers of OpenSSL 1.0.2 should upgrade
- to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j
- (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected
- 1.0.2-1.0.2x).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23841">CVE-2021-23841</a>
-
- <p>The OpenSSL public API function X509_issuer_and_serial_hash() attempts
- to create a unique hash value based on the issuer and serial number data
- contained within an X509 certificate. However it fails to correctly handle
- any errors that may occur while parsing the issuer field (which might occur
- if the issuer field is maliciously constructed). This may subsequently
- result in a NULL pointer deref and a crash leading to a potential
- denial of service attack.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.1.0l-1~deb9u3.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2563.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2564.data b/english/lts/security/2021/dla-2564.data
deleted file mode 100644
index a9d2109c269..00000000000
--- a/english/lts/security/2021/dla-2564.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2564-1 php-horde-text-filter</define-tag>
-<define-tag report_date>2021-02-18</define-tag>
-<define-tag secrefs>CVE-2021-26929 Bug#982769</define-tag>
-<define-tag packages>php-horde-text-filter</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2564.wml b/english/lts/security/2021/dla-2564.wml
deleted file mode 100644
index 5c422cd79cd..00000000000
--- a/english/lts/security/2021/dla-2564.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alex Birnberg discovered a cross-site scripting (XSS) vulnerability in
-the Horde Application Framework, more precisely its Text Filter API.
-An attacker could take control of a user's mailbox by sending a
-crafted e-mail.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26929">CVE-2021-26929</a>
-
- <p>An XSS issue was discovered in Horde Groupware Webmail Edition
- (where the Horde_Text_Filter library is used). The attacker can
- send a plain text e-mail message, with JavaScript encoded as a
- link or email that is mishandled by preProcess in Text2html.php,
- because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes
- with XSS defenses.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.3.5-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your php-horde-text-filter packages.</p>
-
-<p>For the detailed security status of php-horde-text-filter please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-horde-text-filter">https://security-tracker.debian.org/tracker/php-horde-text-filter</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2564.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2565.data b/english/lts/security/2021/dla-2565.data
deleted file mode 100644
index 794ba2071d0..00000000000
--- a/english/lts/security/2021/dla-2565.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2565-1 openssl1.0</define-tag>
-<define-tag report_date>2021-02-18</define-tag>
-<define-tag secrefs>CVE-2021-23840 CVE-2021-23841</define-tag>
-<define-tag packages>openssl1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2565.wml b/english/lts/security/2021/dla-2565.wml
deleted file mode 100644
index 9f8d99c71d4..00000000000
--- a/english/lts/security/2021/dla-2565.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two issues in the 1.0 branch of the
-OpenSSL cryptographic system:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23840">CVE-2021-23840</a>
-
- <p>Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may
- overflow the output length argument in some cases where the input length is
- close to the maximum permissable length for an integer on the platform. In
- such cases the return value from the function call will be 1 (indicating
- success), but the output length value will be negative. This could cause
- applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and
- below are affected by this issue. Users of these versions should upgrade to
- OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this
- issue. However OpenSSL 1.0.2 is out of support and no longer receiving
- public updates. Premium support customers of OpenSSL 1.0.2 should upgrade
- to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j
- (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected
- 1.0.2-1.0.2x).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23841">CVE-2021-23841</a>
-
- <p>The OpenSSL public API function X509_issuer_and_serial_hash() attempts
- to create a unique hash value based on the issuer and serial number data
- contained within an X509 certificate. However it fails to correctly handle
- any errors that may occur while parsing the issuer field (which might occur
- if the issuer field is maliciously constructed). This may subsequently
- result in a NULL pointer deref and a crash leading to a potential
- denial of service attack.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.0.2u-1~deb9u4. For the equivalent changes for the 1.1 branch, please see
-DLA-2563-1.</p>
-
-<p>We recommend that you upgrade your openssl1.0 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2565.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2566.data b/english/lts/security/2021/dla-2566.data
deleted file mode 100644
index 32799588fad..00000000000
--- a/english/lts/security/2021/dla-2566.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2566-1 libbsd</define-tag>
-<define-tag report_date>2021-2-18</define-tag>
-<define-tag secrefs>CVE-2019-20367</define-tag>
-<define-tag packages>libbsd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2566.wml b/english/lts/security/2021/dla-2566.wml
deleted file mode 100644
index 52a72126245..00000000000
--- a/english/lts/security/2021/dla-2566.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libbsd, a library with utility functions from
-BSD systems.
-A non-NUL terminated symbol name in the string table might result in an
-out-of-bounds read.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.8.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libbsd packages.</p>
-
-<p>For the detailed security status of libbsd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libbsd">https://security-tracker.debian.org/tracker/libbsd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2566.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2567.data b/english/lts/security/2021/dla-2567.data
deleted file mode 100644
index 067ba7b392d..00000000000
--- a/english/lts/security/2021/dla-2567.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2567-1 unrar-free</define-tag>
-<define-tag report_date>2021-2-18</define-tag>
-<define-tag secrefs>CVE-2017-14120 CVE-2017-14121 CVE-2017-14122</define-tag>
-<define-tag packages>unrar-free</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2567.wml b/english/lts/security/2021/dla-2567.wml
deleted file mode 100644
index e5cc7e608a4..00000000000
--- a/english/lts/security/2021/dla-2567.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been found in unrar-free, an unarchiver for .rar files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14120">CVE-2017-14120</a>
-
- <p>This CVE is related to a directory traversal vulnerability for
- RAR v2 archives.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14121">CVE-2017-14121</a>
-
- <p>This CVE is related to NULL pointer dereference flaw triggered
- by a specially crafted RAR archive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14122">CVE-2017-14122</a>
-
- <p>This CVE is related to stack-based buffer over-read.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:0.0.1+cvs20140707-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your unrar-free packages.</p>
-
-<p>For the detailed security status of unrar-free please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/unrar-free">https://security-tracker.debian.org/tracker/unrar-free</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2567.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2568.data b/english/lts/security/2021/dla-2568.data
deleted file mode 100644
index 5fbf965c49b..00000000000
--- a/english/lts/security/2021/dla-2568.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2568-1 bind9</define-tag>
-<define-tag report_date>2021-02-19</define-tag>
-<define-tag secrefs>CVE-2020-8625</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2568.wml b/english/lts/security/2021/dla-2568.wml
deleted file mode 100644
index f98a98624fa..00000000000
--- a/english/lts/security/2021/dla-2568.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a buffer overflow attack in the bind9 DNS
-server caused by an issue in the GSSAPI ("Generic Security Services") security
-policy negotiation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8625">CVE-2020-8625</a>
-
- <p>BIND servers are vulnerable if they are running an affected version and
- are configured to use GSS-TSIG features. In a configuration which uses
- BIND's default settings the vulnerable code path is not exposed, but a
- server can be rendered vulnerable by explicitly setting valid values for
- the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options.
- Although the default configuration is not vulnerable, GSS-TSIG is
- frequently used in networks where BIND is integrated with Samba, as well as
- in mixed-server environments that combine BIND servers with Active
- Directory domain controllers. The most likely outcome of a successful
- exploitation of the vulnerability is a crash of the named process. However,
- remote code execution, while unproven, is theoretically possible. Affects:
- BIND 9.5.0 -&gt; 9.11.27, 9.12.0 -&gt; 9.16.11, and versions BIND 9.11.3-S1
- -&gt; 9.11.27-S1 and 9.16.8-S1 -&gt; 9.16.11-S1 of BIND Supported Preview
- Edition. Also release versions 9.17.0 -&gt; 9.17.1 of the BIND 9.17
- development branch</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:9.10.3.dfsg.P4-12.3+deb9u8.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2568.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2569.data b/english/lts/security/2021/dla-2569.data
deleted file mode 100644
index 7ee47d9edbd..00000000000
--- a/english/lts/security/2021/dla-2569.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2569-1 python-django</define-tag>
-<define-tag report_date>2021-02-19</define-tag>
-<define-tag secrefs>CVE-2021-23336</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2569.wml b/english/lts/security/2021/dla-2569.wml
deleted file mode 100644
index 9ac8063b492..00000000000
--- a/english/lts/security/2021/dla-2569.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a web cache poisoning attack in
-Django, a popular Python-based web development framework.</p>
-
-<p>This was caused by the unsafe handling of ";" characters in Python's
-<tt>urllib.parse.parse_qsl</tt> method which had been backported to Django's
-codebase to fix some other security issues in the past.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23336">CVE-2021-23336</a>
-
- <p>The package python/cpython from 0 and before 3.6.13, from 3.7.0 and
- before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are
- vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and
- urllib.parse.parse_qs by using a vector called parameter cloaking. When the
- attacker can separate query parameters using a semicolon (;), they can
- cause a difference in the interpretation of the request between the proxy
- (running with default configuration) and the server. This can result in
- malicious requests being cached as completely safe ones, as the proxy would
- usually not see the semicolon as a separator, and therefore would not
- include it in a cache key of an unkeyed parameter.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u11.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2569.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2570.data b/english/lts/security/2021/dla-2570.data
deleted file mode 100644
index 3bee1ea8542..00000000000
--- a/english/lts/security/2021/dla-2570.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2570-1 screen</define-tag>
-<define-tag report_date>2021-02-20</define-tag>
-<define-tag secrefs>CVE-2021-26937 Bug#982435</define-tag>
-<define-tag packages>screen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2570.wml b/english/lts/security/2021/dla-2570.wml
deleted file mode 100644
index 072c650f014..00000000000
--- a/english/lts/security/2021/dla-2570.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>encoding.c in GNU Screen through 4.8.0 allows remote attackers
-to cause a denial of service (invalid write access and application
-crash) or possibly have unspecified other impact via a crafted
-UTF-8 character sequence.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.5.0-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your screen packages.</p>
-
-<p>For the detailed security status of screen please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/screen">https://security-tracker.debian.org/tracker/screen</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2570.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2571.data b/english/lts/security/2021/dla-2571.data
deleted file mode 100644
index 3ee4b9fc610..00000000000
--- a/english/lts/security/2021/dla-2571.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2571-1 openvswitch</define-tag>
-<define-tag report_date>2021-2-19</define-tag>
-<define-tag secrefs>CVE-2015-8011 CVE-2017-9214 CVE-2018-17204 CVE-2018-17206 CVE-2020-27827 CVE-2020-35498</define-tag>
-<define-tag packages>openvswitch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2571.wml b/english/lts/security/2021/dla-2571.wml
deleted file mode 100644
index b35dbd758a3..00000000000
--- a/english/lts/security/2021/dla-2571.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in openvswitch, a production quality,
-multilayer, software-based, Ethernet virtual switch.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35498">CVE-2020-35498</a>
-
- <p>Denial of service attacks, in which crafted network packets
- could cause the packet lookup to ignore network header fields
- from layers 3 and 4. The crafted network packet is an ordinary
- IPv4 or IPv6 packet with Ethernet padding length above 255 bytes.
- This causes the packet sanity check to abort parsing header
- fields after layer 2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27827">CVE-2020-27827</a>
-
- <p>Denial of service attacks using crafted LLDP packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17206">CVE-2018-17206</a>
-
- <p>Buffer over-read issue during BUNDLE action decoding.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17204">CVE-2018-17204</a>
-
- <p>Assertion failure due to not validating information (group type
- and command) in OF1.5 decoder.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9214">CVE-2017-9214</a>
-
- <p>Buffer over-read that is caused by an unsigned integer underflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8011">CVE-2015-8011</a>
-
- <p>Buffer overflow in the lldp_decode function in
- daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote
- attackers to cause a denial of service (daemon crash) and
- possibly execute arbitrary code via vectors involving large
- management addresses and TLV boundaries.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.6.10-0+deb9u1. This version is a new upstream point release.</p>
-
-<p>We recommend that you upgrade your openvswitch packages.</p>
-
-<p>For the detailed security status of openvswitch please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openvswitch">https://security-tracker.debian.org/tracker/openvswitch</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2571.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2572.data b/english/lts/security/2021/dla-2572.data
deleted file mode 100644
index d29d58e596f..00000000000
--- a/english/lts/security/2021/dla-2572.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2572-1 wpa</define-tag>
-<define-tag report_date>2021-2-20</define-tag>
-<define-tag secrefs>CVE-2021-0326</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2572.wml b/english/lts/security/2021/dla-2572.wml
deleted file mode 100644
index 645dc2b9c6a..00000000000
--- a/english/lts/security/2021/dla-2572.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in wpa, a set of tools to support WPA and WPA2
-(IEEE 802.11i).
-Missing validation of data can result in a buffer over-write, which might
-lead to a DoS of the wpa_supplicant process or potentially arbitrary code
-execution.</p>
-
-<p>On request, together with this upload support for WPA-EAP-SUITE-B(-192)
-has been enabled.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:2.4-1+deb9u8.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>For the detailed security status of wpa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wpa">https://security-tracker.debian.org/tracker/wpa</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2572.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2573.data b/english/lts/security/2021/dla-2573.data
deleted file mode 100644
index f34ab547c3a..00000000000
--- a/english/lts/security/2021/dla-2573.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2573-1 libzstd</define-tag>
-<define-tag report_date>2021-02-20</define-tag>
-<define-tag secrefs>Bug#981404 Bug#982519</define-tag>
-<define-tag packages>libzstd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2573.wml b/english/lts/security/2021/dla-2573.wml
deleted file mode 100644
index 0a75be35b69..00000000000
--- a/english/lts/security/2021/dla-2573.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that zstd, a compression utility, was vulnerable
-to a race condition: it temporarily exposed, during a very short
-timeframe, a world-readable version of its input even if the
-original file had restrictive permissions.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libzstd packages.</p>
-
-<p>For the detailed security status of libzstd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libzstd">https://security-tracker.debian.org/tracker/libzstd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2573.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2574.data b/english/lts/security/2021/dla-2574.data
deleted file mode 100644
index dd6c06568b6..00000000000
--- a/english/lts/security/2021/dla-2574.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2574-1 openldap</define-tag>
-<define-tag report_date>2021-02-21</define-tag>
-<define-tag secrefs>CVE-2021-27212</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2574.wml b/english/lts/security/2021/dla-2574.wml
deleted file mode 100644
index 5a53aa54930..00000000000
--- a/english/lts/security/2021/dla-2574.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability in the Certificate List Exact Assertion validation
-was discovered in OpenLDAP, a free implementation of the Lightweight
-Directory Access Protocol. An unauthenticated remote attacker can
-take advantage of this flaw to cause a denial of service (slapd
-daemon crash) via specially crafted packets.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.4.44+dfsg-5+deb9u8.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>For the detailed security status of openldap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openldap">https://security-tracker.debian.org/tracker/openldap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2574.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2575.data b/english/lts/security/2021/dla-2575.data
deleted file mode 100644
index 6b079201b0c..00000000000
--- a/english/lts/security/2021/dla-2575.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2575-1 firefox-esr</define-tag>
-<define-tag report_date>2021-02-25</define-tag>
-<define-tag secrefs>CVE-2021-23968 CVE-2021-23969 CVE-2021-23973 CVE-2021-23978</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2575.wml b/english/lts/security/2021/dla-2575.wml
deleted file mode 100644
index dbc36a6d8ab..00000000000
--- a/english/lts/security/2021/dla-2575.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.8.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2575.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2576.data b/english/lts/security/2021/dla-2576.data
deleted file mode 100644
index ad008a33c18..00000000000
--- a/english/lts/security/2021/dla-2576.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2576-1 redis</define-tag>
-<define-tag report_date>2021-02-25</define-tag>
-<define-tag secrefs>CVE-2021-21309</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2576.wml b/english/lts/security/2021/dla-2576.wml
deleted file mode 100644
index ea330cfc934..00000000000
--- a/english/lts/security/2021/dla-2576.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of integer overflow issues in
-Redis, a persistent "NoSQL"-style key-value database. It is currently believed
-that the issues only affect 32-bit based systems.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21309">CVE-2021-21309</a></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-3:3.2.6-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2576.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2577.data b/english/lts/security/2021/dla-2577.data
deleted file mode 100644
index 5518fad8864..00000000000
--- a/english/lts/security/2021/dla-2577.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2577-1 python-pysaml2</define-tag>
-<define-tag report_date>2021-02-26</define-tag>
-<define-tag secrefs>CVE-2017-1000433 CVE-2021-21239 Bug#886423 Bug#CVE-2021-21239</define-tag>
-<define-tag packages>python-pysaml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2577.wml b/english/lts/security/2021/dla-2577.wml
deleted file mode 100644
index 49151cb38da..00000000000
--- a/english/lts/security/2021/dla-2577.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been found in python-pysaml2, a pure python
-implementation of SAML Version 2 Standard.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000433">CVE-2017-1000433</a>
-
- <p>pysaml2 accept any password when run with python optimizations
- enabled. This allows attackers to log in as any user without
- knowing their password.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21239">CVE-2021-21239</a>
-
- <p>pysaml2 has an improper verification of cryptographic signature
- vulnerability. Users of pysaml2 that use the default
- CryptoBackendXmlSec1 backend and need to verify signed SAML
- documents are impacted. PySAML2 does not ensure that a signed
- SAML document is correctly signed. The default
- CryptoBackendXmlSec1 backend is using the xmlsec1 binary to
- verify the signature of signed SAML documents, but by default
- xmlsec1 accepts any type of key found within the given document.
- xmlsec1 needs to be configured explicitly to only use only _x509
- certificates_ for the verification process of the SAML document signature.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.0.0-5+deb9u2.</p>
-
-<p>We recommend that you upgrade your python-pysaml2 packages.</p>
-
-<p>For the detailed security status of python-pysaml2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-pysaml2">https://security-tracker.debian.org/tracker/python-pysaml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2577.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2578.data b/english/lts/security/2021/dla-2578.data
deleted file mode 100644
index 03a9c3746de..00000000000
--- a/english/lts/security/2021/dla-2578.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2578-1 thunderbird</define-tag>
-<define-tag report_date>2021-03-01</define-tag>
-<define-tag secrefs>CVE-2021-23968 CVE-2021-23969 CVE-2021-23973 CVE-2021-23978</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2578.wml b/english/lts/security/2021/dla-2578.wml
deleted file mode 100644
index 1493ec9f25b..00000000000
--- a/english/lts/security/2021/dla-2578.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code or information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.8.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2578.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2579.data b/english/lts/security/2021/dla-2579.data
deleted file mode 100644
index de2710395f5..00000000000
--- a/english/lts/security/2021/dla-2579.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2579-1 spip</define-tag>
-<define-tag report_date>2021-03-03</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2579.wml b/english/lts/security/2021/dla-2579.wml
deleted file mode 100644
index 8c74f6c031a..00000000000
--- a/english/lts/security/2021/dla-2579.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that SPIP, a website engine for publishing, would
-allow a malicious user to perform cross-site scripting attacks, access
-sensitive information, or execute arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.4-4~deb9u4+deb9u1.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2579.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2580.data b/english/lts/security/2021/dla-2580.data
deleted file mode 100644
index 633ef77ae9d..00000000000
--- a/english/lts/security/2021/dla-2580.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2580-1 adminer</define-tag>
-<define-tag report_date>2021-03-03</define-tag>
-<define-tag secrefs>CVE-2021-21311</define-tag>
-<define-tag packages>adminer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2580.wml b/english/lts/security/2021/dla-2580.wml
deleted file mode 100644
index 690f01eeb7b..00000000000
--- a/english/lts/security/2021/dla-2580.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Adminer is an open-source database management in a single PHP file.
-In adminer from version 4.0.0 and before 4.7.9 there is a
-server-side request forgery vulnerability. Users of Adminer versions
-bundling all drivers (e.g. `adminer.php`) are affected.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.2.5-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your adminer packages.</p>
-
-<p>For the detailed security status of adminer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/adminer">https://security-tracker.debian.org/tracker/adminer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2580.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2581.data b/english/lts/security/2021/dla-2581.data
deleted file mode 100644
index 698d103993f..00000000000
--- a/english/lts/security/2021/dla-2581.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2581-1 wpa</define-tag>
-<define-tag report_date>2021-03-03</define-tag>
-<define-tag secrefs>CVE-2021-27803</define-tag>
-<define-tag packages>wpa</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2581.wml b/english/lts/security/2021/dla-2581.wml
deleted file mode 100644
index 9f06a6f1eb6..00000000000
--- a/english/lts/security/2021/dla-2581.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant
-before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests.
-It could result in denial of service or other impact (potentially
-execution of arbitrary code), for an attacker within radio range.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:2.4-1+deb9u9.</p>
-
-<p>We recommend that you upgrade your wpa packages.</p>
-
-<p>For the detailed security status of wpa please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wpa">https://security-tracker.debian.org/tracker/wpa</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2581.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2582.data b/english/lts/security/2021/dla-2582.data
deleted file mode 100644
index cbe95919bd0..00000000000
--- a/english/lts/security/2021/dla-2582.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2582-1 mqtt-client</define-tag>
-<define-tag report_date>2021-03-08</define-tag>
-<define-tag secrefs>CVE-2019-0222 Bug#925964</define-tag>
-<define-tag packages>mqtt-client</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2582.wml b/english/lts/security/2021/dla-2582.wml
deleted file mode 100644
index 4210677b2cc..00000000000
--- a/english/lts/security/2021/dla-2582.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in mqtt-client wher unmarshalling
-corrupt MQTT frame can lead to broker Out of Memory exception making
-it unresponsive.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.14-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your mqtt-client packages.</p>
-
-<p>For the detailed security status of mqtt-client please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mqtt-client">https://security-tracker.debian.org/tracker/mqtt-client</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2582.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2583.data b/english/lts/security/2021/dla-2583.data
deleted file mode 100644
index 522a7ad6aba..00000000000
--- a/english/lts/security/2021/dla-2583.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2583-1 activemq</define-tag>
-<define-tag report_date>2021-03-08</define-tag>
-<define-tag secrefs>CVE-2017-15709 CVE-2018-11775 CVE-2019-0222 CVE-2021-26117 Bug#890352 Bug#908950 Bug#982590</define-tag>
-<define-tag packages>activemq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2583.wml b/english/lts/security/2021/dla-2583.wml
deleted file mode 100644
index 9648f8e5052..00000000000
--- a/english/lts/security/2021/dla-2583.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in activemq, a message
-broker built around Java Message Service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15709">CVE-2017-15709</a>
-
- <p>When using the OpenWire protocol in activemq, it was found that
- certain system details (such as the OS and kernel version) are
- exposed as plain text.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11775">CVE-2018-11775</a>
-
- <p>TLS hostname verification when using the Apache ActiveMQ Client
- was missing which could make the client vulnerable to a MITM
- attack between a Java application using the ActiveMQ client and
- the ActiveMQ server. This is now enabled by default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0222">CVE-2019-0222</a>
-
- <p>Unmarshalling corrupt MQTT frame can lead to broker Out of Memory
- exception making it unresponsive</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26117">CVE-2021-26117</a>
-
- <p>The optional ActiveMQ LDAP login module can be configured to use
- anonymous access to the LDAP server. The anonymous context is used
- to verify a valid users password in error, resulting in no check
- on the password.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.14.3-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your activemq packages.</p>
-
-<p>For the detailed security status of activemq please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/activemq">https://security-tracker.debian.org/tracker/activemq</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2583.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2584.data b/english/lts/security/2021/dla-2584.data
deleted file mode 100644
index 2fccbd3fc06..00000000000
--- a/english/lts/security/2021/dla-2584.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2584-1 libcaca</define-tag>
-<define-tag report_date>2021-03-08</define-tag>
-<define-tag secrefs>CVE-2021-3410 Bug#983684</define-tag>
-<define-tag packages>libcaca</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2584.wml b/english/lts/security/2021/dla-2584.wml
deleted file mode 100644
index 1d288a2ff2d..00000000000
--- a/english/lts/security/2021/dla-2584.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow issue in caca_resize function in
-libcaca/caca/canvas.c may lead to local execution of arbitrary code in
-the user context.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.99.beta19-2.1~deb9u2.</p>
-
-<p>We recommend that you upgrade your libcaca packages.</p>
-
-<p>For the detailed security status of libcaca please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libcaca">https://security-tracker.debian.org/tracker/libcaca</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2584.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2585.data b/english/lts/security/2021/dla-2585.data
deleted file mode 100644
index d9725ecfe69..00000000000
--- a/english/lts/security/2021/dla-2585.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2585-1 libupnp</define-tag>
-<define-tag report_date>2021-03-08</define-tag>
-<define-tag secrefs>CVE-2020-13848 Bug#962282</define-tag>
-<define-tag packages>libupnp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2585.wml b/english/lts/security/2021/dla-2585.wml
deleted file mode 100644
index c7e05403173..00000000000
--- a/english/lts/security/2021/dla-2585.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libupnp, the portable SDK for UPnP Devices allows remote attackers to
-cause a denial of service (crash) via a crafted SSDP message due to a
-NULL pointer dereference in the functions FindServiceControlURLPath
-and FindServiceEventURLPath in genlib/service_table/service_table.c.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.6.19+git20160116-1.2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libupnp packages.</p>
-
-<p>For the detailed security status of libupnp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libupnp">https://security-tracker.debian.org/tracker/libupnp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2585.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2586.data b/english/lts/security/2021/dla-2586.data
deleted file mode 100644
index 58ad9b6a1b1..00000000000
--- a/english/lts/security/2021/dla-2586.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2586-1 linux</define-tag>
-<define-tag report_date>2021-03-08</define-tag>
-<define-tag secrefs>CVE-2019-19318 CVE-2019-19813 CVE-2019-19816 CVE-2020-27815 CVE-2020-27825 CVE-2020-28374 CVE-2020-29568 CVE-2020-29569 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 CVE-2021-3178 CVE-2021-3347 CVE-2021-26930 CVE-2021-26931 CVE-2021-26932 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2586.wml b/english/lts/security/2021/dla-2586.wml
deleted file mode 100644
index 601b0e7a7b9..00000000000
--- a/english/lts/security/2021/dla-2586.wml
+++ /dev/null
@@ -1,149 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19318">CVE-2019-19318</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19813">CVE-2019-19813</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2019-19816">CVE-2019-19816</a>
-
- <p><q>Team bobfuzzer</q> reported bugs in Btrfs that could lead to a
- use-after-free or heap buffer overflow, and could be triggered by
- crafted filesystem images. A user permitted to mount and access
- arbitrary filesystems could use these to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27815">CVE-2020-27815</a>
-
- <p>A flaw was reported in the JFS filesystem code allowing a local
- attacker with the ability to set extended attributes to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27825">CVE-2020-27825</a>
-
- <p>Adam <q>pi3</q> Zabrocki reported a use-after-free flaw in the ftrace
- ring buffer resizing logic due to a race condition, which could
- result in denial of service or information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28374">CVE-2020-28374</a>
-
- <p>David Disseldorp discovered that the LIO SCSI target implementation
- performed insufficient checking in certain XCOPY requests. An
- attacker with access to a LUN and knowledge of Unit Serial Number
- assignments can take advantage of this flaw to read and write to any
- LIO backstore, regardless of the SCSI transport settings.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29568">CVE-2020-29568</a> (<a href="https://xenbits.xen.org/xsa/advisory-349.html">XSA-349</a>)
-
- <p>Michael Kurth and Pawel Wieczorkiewicz reported that frontends can
- trigger OOM in backends by updating a watched path.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29569">CVE-2020-29569</a> (<a href="https://xenbits.xen.org/xsa/advisory-350.html">XSA-350</a>)
-
- <p>Olivier Benjamin and Pawel Wieczorkiewicz reported a use-after-free
- flaw which can be triggered by a block frontend in Linux blkback. A
- misbehaving guest can trigger a dom0 crash by continuously
- connecting / disconnecting a block frontend.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29660">CVE-2020-29660</a>
-
- <p>Jann Horn reported a locking inconsistency issue in the tty
- subsystem which may allow a local attacker to mount a
- read-after-free attack against TIOCGSID.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29661">CVE-2020-29661</a>
-
- <p>Jann Horn reported a locking issue in the tty subsystem which can
- result in a use-after-free. A local attacker can take advantage of
- this flaw for memory corruption or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36158">CVE-2020-36158</a>
-
- <p>A buffer overflow flaw was discovered in the mwifiex WiFi driver
- which could result in denial of service or the execution of
- arbitrary code via a long SSID value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3178">CVE-2021-3178</a>
-
- <p>å´å¼‚ reported an information leak in the NFSv3 server. When only
- a subdirectory of a filesystem volume is exported, an NFS client
- listing the exported directory would obtain a file handle to the
- parent directory, allowing it to access files that were not meant
- to be exported.</p>
-
- <p>Even after this update, it is still possible for NFSv3 clients to
- guess valid file handles and access files outside an exported
- subdirectory, unless the <q>subtree_check</q> export option is enabled.
- It is recommended that you do not use that option but only export
- whole filesystem volumes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3347">CVE-2021-3347</a>
-
- <p>It was discovered that PI futexes have a kernel stack use-after-free
- during fault handling. An unprivileged user could use this flaw to
- crash the kernel (resulting in denial of service) or for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26930">CVE-2021-26930</a> (<a href="https://xenbits.xen.org/xsa/advisory-365.html">XSA-365</a>)
-
- <p>Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan
- H. Schönherr discovered that the Xen block backend driver
- (xen-blkback) did not handle grant mapping errors correctly. A
- malicious guest could exploit this bug to cause a denial of
- service (crash), or possibly an information leak or privilege
- escalation, within the domain running the backend, which is
- typically dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26931">CVE-2021-26931</a> (<a href="https://xenbits.xen.org/xsa/advisory-362.html">XSA-362</a>), <a href="https://security-tracker.debian.org/tracker/CVE-2021-26932">CVE-2021-26932</a> (<a href="https://xenbits.xen.org/xsa/advisory-361.html">XSA-361</a>), <a href="https://security-tracker.debian.org/tracker/CVE-2021-28038">CVE-2021-28038</a> (<a href="https://xenbits.xen.org/xsa/advisory-367.html">XSA-367</a>)
-
- <p>Jan Beulich discovered that the Xen support code and various Xen
- backend drivers did not handle grant mapping errors correctly. A
- malicious guest could exploit these bugs to cause a denial of
- service (crash) within the domain running the backend, which is
- typically dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27363">CVE-2021-27363</a>
-
- <p>Adam Nichols reported that the iSCSI initiator subsystem did not
- properly restrict access to transport handle attributes in sysfs.
- On a system acting as an iSCSI initiator, this is an information
- leak to local users and makes it easier to exploit <a href="https://security-tracker.debian.org/tracker/CVE-2021-27364">CVE-2021-27364</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27364">CVE-2021-27364</a>
-
- <p>Adam Nichols reported that the iSCSI initiator subsystem did not
- properly restrict access to its netlink management interface. On
- a system acting as an iSCSI initiator, a local user could use
- these to cause a denial of service (disconnection of storage) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27365">CVE-2021-27365</a>
-
- <p>Adam Nichols reported that the iSCSI initiator subsystem did not
- correctly limit the lengths of parameters or <q>passthrough PDUs</q>
- sent through its netlink management interface. On a system acting
- as an iSCSI initiator, a local user could use these to leak the
- contents of kernel memory, to cause a denial of service (kernel
- memory corruption or crash), and probably for privilege
- escalation.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.258-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2586.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2587.data b/english/lts/security/2021/dla-2587.data
deleted file mode 100644
index 81251a0f9a1..00000000000
--- a/english/lts/security/2021/dla-2587.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2587-1 privoxy</define-tag>
-<define-tag report_date>2021-03-09</define-tag>
-<define-tag secrefs>CVE-2021-20272 CVE-2021-20273 CVE-2021-20275 CVE-2021-20276</define-tag>
-<define-tag packages>privoxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2587.wml b/english/lts/security/2021/dla-2587.wml
deleted file mode 100644
index 17bdf06d303..00000000000
--- a/english/lts/security/2021/dla-2587.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilites were discovered in privoxy, a web proxy with
-advanced filtering capabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20272">CVE-2021-20272</a>
-
- <p>An assertion failure could be triggered with a crafted CGI
- request leading to server crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20273">CVE-2021-20273</a>
-
- <p>A crash can occur via a crafted CGI request if Privoxy is toggled
- off.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20275">CVE-2021-20275</a>
-
- <p>An invalid read of size two may occur in
- chunked_body_is_complete() leading to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20276">CVE-2021-20276</a>
-
- <p>Invalid memory access with an invalid pattern passed to
- pcre_compile() may lead to denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.0.26-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your privoxy packages.</p>
-
-<p>For the detailed security status of privoxy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/privoxy">https://security-tracker.debian.org/tracker/privoxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2587.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2588.data b/english/lts/security/2021/dla-2588.data
deleted file mode 100644
index 6359b99b711..00000000000
--- a/english/lts/security/2021/dla-2588.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2588-1 zeromq3</define-tag>
-<define-tag report_date>2021-03-09</define-tag>
-<define-tag secrefs>CVE-2021-20234 CVE-2021-20235</define-tag>
-<define-tag packages>zeromq3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2588.wml b/english/lts/security/2021/dla-2588.wml
deleted file mode 100644
index 584963598a7..00000000000
--- a/english/lts/security/2021/dla-2588.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been detected in zeromq3.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20234">CVE-2021-20234</a>
-
- <p>Memory leak in client induced by malicious server(s) without CURVE/ZAP.</p>
-
- <p>From issue description [<a href="https://github.com/zeromq/libzmq/security/advisories/GHSA-wfr2-29gj-5w87">1</a>].
- When a pipe processes a delimiter and is already not in active state but
- still has an unfinished message, the message is leaked.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20235">CVE-2021-20235</a>
-
- <p>Heap overflow when receiving malformed ZMTP v1 packets.</p>
-
- <p>From issue description [<a href="https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6">2</a>].
- The static allocator was implemented to shrink its recorded size similarly
- to the shared allocator. But it does not need to, and it should not,
- because unlike the shared one the static allocator always uses a static
- buffer, with a size defined by the ZMQ_IN_BATCH_SIZE socket option
- (default 8192), so changing the size opens the library to heap overflows.
- The static allocator is used only with ZMTP v1 peers.</p>
-
-</li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.2.1-4+deb9u4.</p>
-
-<p>We recommend that you upgrade your zeromq3 packages.</p>
-
-<p>For the detailed security status of zeromq3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zeromq3">https://security-tracker.debian.org/tracker/zeromq3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2588.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2589-2.data b/english/lts/security/2021/dla-2589-2.data
deleted file mode 100644
index 03dea89987b..00000000000
--- a/english/lts/security/2021/dla-2589-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2589-2 mupdf</define-tag>
-<define-tag report_date>2021-03-14</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2589-2.wml b/english/lts/security/2021/dla-2589-2.wml
deleted file mode 100644
index fb77683e343..00000000000
--- a/english/lts/security/2021/dla-2589-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA 2589-1 incorrectly fixed <a href="https://security-tracker.debian.org/tracker/CVE-2020-26519">CVE-2020-26519</a> and also induced
-regression where opening a PDF document resulted in a
-SIGFPE crash, a floating point exception.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.9a+ds1-4+deb9u7.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>For the detailed security status of mupdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mupdf">https://security-tracker.debian.org/tracker/mupdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2589-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2589.data b/english/lts/security/2021/dla-2589.data
deleted file mode 100644
index 6fa0dc39ee6..00000000000
--- a/english/lts/security/2021/dla-2589.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2589-1 mupdf</define-tag>
-<define-tag report_date>2021-03-12</define-tag>
-<define-tag secrefs>CVE-2020-26519 CVE-2021-3407 Bug#971595 Bug#983684</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2589.wml b/english/lts/security/2021/dla-2589.wml
deleted file mode 100644
index f674a38a977..00000000000
--- a/english/lts/security/2021/dla-2589.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26519">CVE-2020-26519</a>
-
- <p>A heap-based buffer overflow flaw was discovered in MuPDF,
- a lightweight PDF viewer, which may result in denial of
- service or the execution of arbitrary code if malformed
- documents are opened.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3407">CVE-2021-3407</a>
-
- <p>A double free of object during linearization was discovered
- in MuPDF, a lightweight PDF viewer, which may lead to memory
- corruption and other potential consequences.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9a+ds1-4+deb9u6.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>For the detailed security status of mupdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mupdf">https://security-tracker.debian.org/tracker/mupdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2589.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2590.data b/english/lts/security/2021/dla-2590.data
deleted file mode 100644
index a231d182754..00000000000
--- a/english/lts/security/2021/dla-2590.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2590-1 pygments</define-tag>
-<define-tag report_date>2021-03-12</define-tag>
-<define-tag secrefs>CVE-2021-20270 Bug#984664</define-tag>
-<define-tag packages>pygments</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2590.wml b/english/lts/security/2021/dla-2590.wml
deleted file mode 100644
index 9a3b4239692..00000000000
--- a/english/lts/security/2021/dla-2590.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that pygments, a generic syntax highlighter, is vulnerable
-to a CPU exhaustion attack via a crafted SML file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.2.0+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your pygments packages.</p>
-
-<p>For the detailed security status of pygments please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pygments">https://security-tracker.debian.org/tracker/pygments</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2590.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2591.data b/english/lts/security/2021/dla-2591.data
deleted file mode 100644
index e2058f21c08..00000000000
--- a/english/lts/security/2021/dla-2591.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2591-1 golang-1.7</define-tag>
-<define-tag report_date>2021-03-15</define-tag>
-<define-tag secrefs>CVE-2017-15041 CVE-2018-16873 CVE-2018-16874 CVE-2019-9741 CVE-2019-16276 CVE-2019-17596 CVE-2021-3114 Bug#924630 Bug#941173 Bug#942628 Bug#942629</define-tag>
-<define-tag packages>golang-1.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2591.wml b/english/lts/security/2021/dla-2591.wml
deleted file mode 100644
index 6b1c4518e35..00000000000
--- a/english/lts/security/2021/dla-2591.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS), bypasss
-access control, and execute arbitrary code on the developer's
-computer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15041">CVE-2017-15041</a>
-
- <p>Go allows <q>go get</q> remote command execution. Using custom
- domains, it is possible to arrange things so that
- example.com/pkg1 points to a Subversion repository but
- example.com/pkg1/pkg2 points to a Git repository. If the
- Subversion repository includes a Git checkout in its pkg2
- directory and some other work is done to ensure the proper
- ordering of operations, <q>go get</q> can be tricked into reusing this
- Git checkout for the fetch of code from pkg2. If the Subversion
- repository's Git checkout has malicious commands in .git/hooks/,
- they will execute on the system running "go get."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16873">CVE-2018-16873</a>
-
- <p>The <q>go get</q> command is vulnerable to remote code execution when
- executed with the -u flag and the import path of a malicious Go
- package, as it may treat the parent directory as a Git repository
- root, containing malicious configuration.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16874">CVE-2018-16874</a>
-
- <p>The <q>go get</q> command is vulnerable to directory traversal when
- executed with the import path of a malicious Go package which
- contains curly braces (both '{' and '}' characters). The attacker
- can cause an arbitrary filesystem write, which can lead to code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9741">CVE-2019-9741</a>
-
- <p>In net/http, CRLF injection is possible if the attacker controls a
- url parameter, as demonstrated by the second argument to
- http.NewRequest with \r\n followed by an HTTP header or a Redis
- command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16276">CVE-2019-16276</a>
-
- <p>Go allows HTTP Request Smuggling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17596">CVE-2019-17596</a>
-
- <p>Go can panic upon an attempt to process network traffic containing
- an invalid DSA public key. There are several attack scenarios,
- such as traffic from a client to a server that verifies client
- certificates.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3114">CVE-2021-3114</a>
-
- <p>crypto/elliptic/p224.go can generate incorrect outputs, related to
- an underflow of the lowest limb during the final complete
- reduction in the P-224 field.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.4-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your golang-1.7 packages.</p>
-
-<p>For the detailed security status of golang-1.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.7">https://security-tracker.debian.org/tracker/golang-1.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2591.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2592.data b/english/lts/security/2021/dla-2592.data
deleted file mode 100644
index 42d55c85cd6..00000000000
--- a/english/lts/security/2021/dla-2592.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2592-1 golang-1.8</define-tag>
-<define-tag report_date>2021-03-15</define-tag>
-<define-tag secrefs>CVE-2017-15041 CVE-2018-16873 CVE-2018-16874 CVE-2019-9741 CVE-2019-16276 CVE-2019-17596 CVE-2021-3114 Bug#924630 Bug#941173 Bug#942628 Bug#942629</define-tag>
-<define-tag packages>golang-1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2592.wml b/english/lts/security/2021/dla-2592.wml
deleted file mode 100644
index 3675836c47c..00000000000
--- a/english/lts/security/2021/dla-2592.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS), bypasss
-access control, and execute arbitrary code on the developer's
-computer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15041">CVE-2017-15041</a>
-
- <p>Go allows <q>go get</q> remote command execution. Using custom
- domains, it is possible to arrange things so that
- example.com/pkg1 points to a Subversion repository but
- example.com/pkg1/pkg2 points to a Git repository. If the
- Subversion repository includes a Git checkout in its pkg2
- directory and some other work is done to ensure the proper
- ordering of operations, <q>go get</q> can be tricked into reusing this
- Git checkout for the fetch of code from pkg2. If the Subversion
- repository's Git checkout has malicious commands in .git/hooks/,
- they will execute on the system running "go get."</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16873">CVE-2018-16873</a>
-
- <p>The <q>go get</q> command is vulnerable to remote code execution when
- executed with the -u flag and the import path of a malicious Go
- package, as it may treat the parent directory as a Git repository
- root, containing malicious configuration.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16874">CVE-2018-16874</a>
-
- <p>The <q>go get</q> command is vulnerable to directory traversal when
- executed with the import path of a malicious Go package which
- contains curly braces (both '{' and '}' characters). The attacker
- can cause an arbitrary filesystem write, which can lead to code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9741">CVE-2019-9741</a>
-
- <p>In net/http, CRLF injection is possible if the attacker controls a
- url parameter, as demonstrated by the second argument to
- http.NewRequest with \r\n followed by an HTTP header or a Redis
- command.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16276">CVE-2019-16276</a>
-
- <p>Go allows HTTP Request Smuggling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17596">CVE-2019-17596</a>
-
- <p>Go can panic upon an attempt to process network traffic containing
- an invalid DSA public key. There are several attack scenarios,
- such as traffic from a client to a server that verifies client
- certificates.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3114">CVE-2021-3114</a>
-
- <p>crypto/elliptic/p224.go can generate incorrect outputs, related to
- an underflow of the lowest limb during the final complete
- reduction in the P-224 field.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8.1-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your golang-1.8 packages.</p>
-
-<p>For the detailed security status of golang-1.8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.8">https://security-tracker.debian.org/tracker/golang-1.8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2592.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2593.data b/english/lts/security/2021/dla-2593.data
deleted file mode 100644
index 5886f6d1ef4..00000000000
--- a/english/lts/security/2021/dla-2593.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2593-1 ca-certificates</define-tag>
-<define-tag report_date>2021-03-14</define-tag>
-<define-tag secrefs>Bug#962596</define-tag>
-<define-tag packages>ca-certificates</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2593.wml b/english/lts/security/2021/dla-2593.wml
deleted file mode 100644
index ced77835705..00000000000
--- a/english/lts/security/2021/dla-2593.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update reverts the Symantec CA blacklist (which was originally
-#911289). The following root certificates were added back (+):
- + <q>GeoTrust Global CA</q>
- + <q>GeoTrust Primary Certification Authority</q>
- + "GeoTrust Primary Certification Authority - G2"
- + "GeoTrust Primary Certification Authority - G3"
- + <q>GeoTrust Universal CA</q>
- + <q>thawte Primary Root CA</q>
- + "thawte Primary Root CA - G2"
- + "thawte Primary Root CA - G3"
- + "VeriSign Class 3 Public Primary Certification Authority - G4"
- + "VeriSign Class 3 Public Primary Certification Authority - G5"
- + <q>VeriSign Universal Root Certification Authority</q>
-<p><b>Note</b>: due to bug #743339, CA certificates added back in this version
-won't automatically be trusted again on upgrade. Affected users may
-need to reconfigure the package to restore the desired state.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-20200601~deb9u2.</p>
-
-<p>We recommend that you upgrade your ca-certificates packages.</p>
-
-<p>For the detailed security status of ca-certificates please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ca-certificates">https://security-tracker.debian.org/tracker/ca-certificates</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2593.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2594.data b/english/lts/security/2021/dla-2594.data
deleted file mode 100644
index b7118259552..00000000000
--- a/english/lts/security/2021/dla-2594.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2594-1 tomcat8</define-tag>
-<define-tag report_date>2021-03-16</define-tag>
-<define-tag secrefs>CVE-2021-24122 CVE-2021-25122 CVE-2021-25329</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2594.wml b/english/lts/security/2021/dla-2594.wml
deleted file mode 100644
index 761b40ef0ae..00000000000
--- a/english/lts/security/2021/dla-2594.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three security issues have been detected in tomcat8.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-24122">CVE-2021-24122</a>
-
- <p>When serving resources from a network location using the NTFS file system,
- Apache Tomcat versions 8.5.0 to 8.5.59 is susceptible to JSP source code
- disclosure in some configurations. The root cause was the unexpected
- behaviour of the JRE API File.getCanonicalPath() which in turn was caused
- by the inconsistent behaviour of the Windows API (FindFirstFileW) in some
- circumstances.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25122">CVE-2021-25122</a>
-
- <p>When responding to new h2c connection requests, Apache Tomcat could
- duplicate request headers and a limited amount of request body from one
- request to another meaning user A and user B could both see the results
- of user A's request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25329">CVE-2021-25329</a>
-
- <p>The fix for 2020-9484 was incomplete. When using Apache Tomcat 8.5.0 to
- 8.5.61 with a configuration edge case that was highly unlikely to be used,
- the Tomcat instance was still vulnerable to <a href="https://security-tracker.debian.org/tracker/CVE-2020-9494">CVE-2020-9494</a>. Note that both
- the previously published prerequisites for <a href="https://security-tracker.debian.org/tracker/CVE-2020-9484">CVE-2020-9484</a> and the
- previously published mitigations for <a href="https://security-tracker.debian.org/tracker/CVE-2020-9484">CVE-2020-9484</a> also apply to this
- issue.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8.5.54-0+deb9u6.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>For the detailed security status of tomcat8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tomcat8">https://security-tracker.debian.org/tracker/tomcat8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2594.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2595.data b/english/lts/security/2021/dla-2595.data
deleted file mode 100644
index 03013e3d09d..00000000000
--- a/english/lts/security/2021/dla-2595.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2595-1 velocity</define-tag>
-<define-tag report_date>2021-03-17</define-tag>
-<define-tag secrefs>CVE-2020-13936</define-tag>
-<define-tag packages>velocity</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2595.wml b/english/lts/security/2021/dla-2595.wml
deleted file mode 100644
index dd9cdfd349f..00000000000
--- a/english/lts/security/2021/dla-2595.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential arbitrary code execution
-vulnerability in velocity, a Java-based template engine for writing web
-applications. It could be exploited by applications which allowed untrusted
-users to upload/modify templates.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13936">CVE-2020-13936</a>
-
- <p>An attacker that is able to modify Velocity templates may execute
- arbitrary Java code or run arbitrary system commands with the same
- privileges as the account running the Servlet container. This applies to
- applications that allow untrusted users to upload/modify velocity templates
- running Apache Velocity Engine versions up to 2.2.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.7-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your velocity packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2595.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2596.data b/english/lts/security/2021/dla-2596.data
deleted file mode 100644
index bc7a8517184..00000000000
--- a/english/lts/security/2021/dla-2596.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2596-1 shadow</define-tag>
-<define-tag report_date>2021-03-17</define-tag>
-<define-tag secrefs>CVE-2017-12424 CVE-2017-20002 Bug#756630 Bug#914957</define-tag>
-<define-tag packages>shadow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2596.wml b/english/lts/security/2021/dla-2596.wml
deleted file mode 100644
index a3c47d59f51..00000000000
--- a/english/lts/security/2021/dla-2596.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the shadow suite of login
-tools. An attacker may escalate privileges in specific configurations.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-20002">CVE-2017-20002</a>
-
- <p>Shadow incorrectly lists pts/0 and pts/1 as physical terminals in
- /etc/securetty. This allows local users to login as password-less
- users even if they are connected by non-physical means such as SSH
- (hence bypassing PAM's nullok_secure configuration). This notably
- affects environments such as virtual machines automatically
- generated with a default blank root password, allowing all local
- users to escalate privileges. It should be noted however that
- /etc/securetty will be dropped in Debian 11/bullseye.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12424">CVE-2017-12424</a>
-
- <p>The newusers tool could be made to manipulate internal data
- structures in ways unintended by the authors. Malformed input may
- lead to crashes (with a buffer overflow or other memory
- corruption) or other unspecified behaviors. This crosses a
- privilege boundary in, for example, certain web-hosting
- environments in which a Control Panel allows an unprivileged user
- account to create subaccounts.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:4.4-4.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your shadow packages.</p>
-
-<p>For the detailed security status of shadow please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/shadow">https://security-tracker.debian.org/tracker/shadow</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2596.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2597.data b/english/lts/security/2021/dla-2597.data
deleted file mode 100644
index df3e1c09ee4..00000000000
--- a/english/lts/security/2021/dla-2597.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2597-1 velocity-tools</define-tag>
-<define-tag report_date>2021-03-17</define-tag>
-<define-tag secrefs>CVE-2020-13959</define-tag>
-<define-tag packages>velocity-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2597.wml b/english/lts/security/2021/dla-2597.wml
deleted file mode 100644
index 2c2e575fcaf..00000000000
--- a/english/lts/security/2021/dla-2597.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability
-in <tt>velocity-tools</tt>, a collection of useful tools for the "Velocity"
-template engine.</p>
-
-<p>The default error page could be exploited to steal session cookies,
-perform requests in the name of the victim, used for phishing attacks
-and many other similar attacks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13959">CVE-2020-13959</a>
-
- <p>The default error page for VelocityView in Apache Velocity Tools prior
- to 3.1 reflects back the vm file that was entered as part of the URL. An
- attacker can set an XSS payload file as this vm file in the URL which
- results in this payload being executed. XSS vulnerabilities allow attackers
- to execute arbitrary JavaScript in the context of the attacked website and
- the attacked user. This can be abused to steal session cookies, perform
- requests in the name of the victim or for phishing attacks.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.0-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your velocity-tools packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2597.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2598.data b/english/lts/security/2021/dla-2598.data
deleted file mode 100644
index a2726b7e938..00000000000
--- a/english/lts/security/2021/dla-2598.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2598-1 squid3</define-tag>
-<define-tag report_date>2021-03-19</define-tag>
-<define-tag secrefs>CVE-2020-25097 Bug#985068</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2598.wml b/english/lts/security/2021/dla-2598.wml
deleted file mode 100644
index ba6c3d7e099..00000000000
--- a/english/lts/security/2021/dla-2598.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Due to improper input validation, Squid is vulnerable to an HTTP
-Request Smuggling attack.</p>
-
-<p>This problem allows a trusted client to perform HTTP Request
-Smuggling and access services otherwise forbidden by Squid
-security controls.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.5.23-5+deb9u6.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>For the detailed security status of squid3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/squid3">https://security-tracker.debian.org/tracker/squid3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2598.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2599.data b/english/lts/security/2021/dla-2599.data
deleted file mode 100644
index fd9b9ca9c0d..00000000000
--- a/english/lts/security/2021/dla-2599.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2599-1 shibboleth-sp2</define-tag>
-<define-tag report_date>2021-03-19</define-tag>
-<define-tag secrefs>not yet available Bug#985405</define-tag>
-<define-tag packages>shibboleth-sp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2599.wml b/english/lts/security/2021/dla-2599.wml
deleted file mode 100644
index a5cd6ce5b58..00000000000
--- a/english/lts/security/2021/dla-2599.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Toni Huttunen discovered that the Shibboleth service provider's template
-engine used to render error pages could be abused for phishing attacks.</p>
-
-<p>For additional information please refer to the upstream advisory at
-<a href="https://shibboleth.net/community/advisories/secadv_20210317.txt">https://shibboleth.net/community/advisories/secadv_20210317.txt</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.6.0+dfsg1-4+deb9u2.</p>
-
-<p>We recommend that you upgrade your shibboleth-sp2 packages.</p>
-
-<p>For the detailed security status of shibboleth-sp2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/shibboleth-sp2">https://security-tracker.debian.org/tracker/shibboleth-sp2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2599.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2600.data b/english/lts/security/2021/dla-2600.data
deleted file mode 100644
index b6dc1ffcdfc..00000000000
--- a/english/lts/security/2021/dla-2600.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2600-1 pygments</define-tag>
-<define-tag report_date>2021-03-19</define-tag>
-<define-tag secrefs>CVE-2021-27291</define-tag>
-<define-tag packages>pygments</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2600.wml b/english/lts/security/2021/dla-2600.wml
deleted file mode 100644
index 4f07a69940a..00000000000
--- a/english/lts/security/2021/dla-2600.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a series of denial of service
-vulnerabilities in Pygments, a popular syntax highlighting library for Python.</p>
-
-<p>A number of regular expressions had exponential or cubic worst-case
-complexity which could cause a remote denial of service (DoS) when provided
-with malicious input.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27291">CVE-2021-27291</a>
-
- <p>In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming
- languages rely heavily on regular expressions. Some of the regular
- expressions have exponential or cubic worst-case complexity and are
- vulnerable to ReDoS. By crafting malicious input, an attacker can cause a
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.2.0+dfsg-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your pygments packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2600.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2601.data b/english/lts/security/2021/dla-2601.data
deleted file mode 100644
index 9f289ae9a55..00000000000
--- a/english/lts/security/2021/dla-2601.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2601-1 cloud-init</define-tag>
-<define-tag report_date>2021-03-20</define-tag>
-<define-tag secrefs>CVE-2021-3429 Bug#985540</define-tag>
-<define-tag packages>cloud-init</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2601.wml b/english/lts/security/2021/dla-2601.wml
deleted file mode 100644
index f04c26257d1..00000000000
--- a/english/lts/security/2021/dla-2601.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>cloud-init has the ability to generate and set a randomized password
-for system users. This functionality is enabled at runtime by
-passing cloud-config data such as:</p>
-
- <p>chpasswd:
- list: |
- user1:RANDOM</p>
-
-<p>When used this way, cloud-init logs the raw, unhashed password to a
-world-readable local file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.7.9-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your cloud-init packages.</p>
-
-<p>For the detailed security status of cloud-init please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cloud-init">https://security-tracker.debian.org/tracker/cloud-init</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2601.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2602.data b/english/lts/security/2021/dla-2602.data
deleted file mode 100644
index 23fac8f177d..00000000000
--- a/english/lts/security/2021/dla-2602.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2602-1 imagemagick</define-tag>
-<define-tag report_date>2021-3-23</define-tag>
-<define-tag secrefs>CVE-2020-25666 CVE-2020-25675 CVE-2020-25676 CVE-2020-27754 CVE-2020-27757 CVE-2020-27758 CVE-2020-27759 CVE-2020-27761 CVE-2020-27762 CVE-2020-27764 CVE-2020-27766 CVE-2020-27767 CVE-2020-27768 CVE-2020-27769 CVE-2020-27770 CVE-2020-27771 CVE-2020-27772 CVE-2020-27774 CVE-2020-27775 CVE-2021-20176 CVE-2021-20241 CVE-2021-20244 CVE-2021-20246</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2602.wml b/english/lts/security/2021/dla-2602.wml
deleted file mode 100644
index 3758bafefcd..00000000000
--- a/english/lts/security/2021/dla-2602.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were found in Imagemagick. Missing or
-incomplete input sanitizing may lead to undefined behavior which can result
-in denial of service (application crash) or other unspecified impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8:6.9.7.4+dfsg-11+deb9u12.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2602.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2603.data b/english/lts/security/2021/dla-2603.data
deleted file mode 100644
index af3de44dd85..00000000000
--- a/english/lts/security/2021/dla-2603.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2603-1 libmediainfo</define-tag>
-<define-tag report_date>2021-03-23</define-tag>
-<define-tag secrefs>CVE-2019-11372 CVE-2019-11373 CVE-2020-15395 CVE-2020-26797</define-tag>
-<define-tag packages>libmediainfo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2603.wml b/english/lts/security/2021/dla-2603.wml
deleted file mode 100644
index 4eb404a7f0b..00000000000
--- a/english/lts/security/2021/dla-2603.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of vulnerabilities in
-<tt>libmediainfo</tt>, a library reading metadata such as track names, lengths,
-etc. from media files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11372">CVE-2019-11372</a>
-
- <p>An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test
- in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to
- a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11373">CVE-2019-11373</a>
-
- <p>An out-of-bounds read in File__Analyze::Get_L8 in
- File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads
- to a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15395">CVE-2020-15395</a>
-
- <p>In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based
- buffer over-read in Streams_Fill_PerStream in Multiple/File_MpegPs.cpp (aka
- an off-by-one during MpegPs parsing).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26797">CVE-2020-26797</a>
-
- <p>Mediainfo before version 20.08 has a heap buffer overflow vulnerability
- via MediaInfoLib::File_Gxf::ChooseParser_ChannelGrouping.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.7.91-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libmediainfo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2603.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2604.data b/english/lts/security/2021/dla-2604.data
deleted file mode 100644
index 0422a9653eb..00000000000
--- a/english/lts/security/2021/dla-2604.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2604-1 dnsmasq</define-tag>
-<define-tag report_date>2021-03-22</define-tag>
-<define-tag secrefs>CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 CVE-2020-25687</define-tag>
-<define-tag packages>dnsmasq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2604.wml b/english/lts/security/2021/dla-2604.wml
deleted file mode 100644
index b734cf62e4a..00000000000
--- a/english/lts/security/2021/dla-2604.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Moshe Kol and Shlomi Oberman of JSOF discovered several
-vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP
-server. They could result in denial of service, cache poisoning or the
-execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.76-5+deb9u3.</p>
-
-<p>We recommend that you upgrade your dnsmasq packages.</p>
-
-<p>For the detailed security status of dnsmasq please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dnsmasq">https://security-tracker.debian.org/tracker/dnsmasq</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2604.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2605.data b/english/lts/security/2021/dla-2605.data
deleted file mode 100644
index a1c36b0a847..00000000000
--- a/english/lts/security/2021/dla-2605.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2605-1 mariadb-10.1</define-tag>
-<define-tag report_date>2021-03-23</define-tag>
-<define-tag secrefs>CVE-2021-27928</define-tag>
-<define-tag packages>mariadb-10.1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2605.wml b/english/lts/security/2021/dla-2605.wml
deleted file mode 100644
index dab6ca0791c..00000000000
--- a/english/lts/security/2021/dla-2605.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A remote code execution issue was discovered in MariaDB. An untrusted search
-path leads to eval injection, in which a database SUPER user can execute OS
-commands after modifying wsrep_provider and wsrep_notify_cmd.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-10.1.48-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your mariadb-10.1 packages.</p>
-
-<p>For the detailed security status of mariadb-10.1 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.1">https://security-tracker.debian.org/tracker/mariadb-10.1</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2605.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2606.data b/english/lts/security/2021/dla-2606.data
deleted file mode 100644
index 1deffb56868..00000000000
--- a/english/lts/security/2021/dla-2606.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2606-1 lxml</define-tag>
-<define-tag report_date>2021-3-24</define-tag>
-<define-tag secrefs>CVE-2021-28957</define-tag>
-<define-tag packages>lxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2606.wml b/english/lts/security/2021/dla-2606.wml
deleted file mode 100644
index d0e849f7447..00000000000
--- a/english/lts/security/2021/dla-2606.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in lxml, a pythonic binding for the libxml2 and
-libxslt libraries.</p>
-
-<p>Due to missing input sanitization, XSS is possible for the HTML5
-formaction attribute.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.7.1-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your lxml packages.</p>
-
-<p>For the detailed security status of lxml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lxml">https://security-tracker.debian.org/tracker/lxml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2606.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2607.data b/english/lts/security/2021/dla-2607.data
deleted file mode 100644
index 3de76568e61..00000000000
--- a/english/lts/security/2021/dla-2607.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2607-1 firefox-esr</define-tag>
-<define-tag report_date>2021-03-25</define-tag>
-<define-tag secrefs>CVE-2021-23981 CVE-2021-23982 CVE-2021-23984 CVE-2021-23987</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2607.wml b/english/lts/security/2021/dla-2607.wml
deleted file mode 100644
index 6e147e98fdf..00000000000
--- a/english/lts/security/2021/dla-2607.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code, information disclosure or spoofing attacks.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.9.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2607.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2608.data b/english/lts/security/2021/dla-2608.data
deleted file mode 100644
index 525c5da6c38..00000000000
--- a/english/lts/security/2021/dla-2608.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2608-1 jquery</define-tag>
-<define-tag report_date>2021-03-25</define-tag>
-<define-tag secrefs>CVE-2020-11022 CVE-2020-11023</define-tag>
-<define-tag packages>jquery</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2608.wml b/english/lts/security/2021/dla-2608.wml
deleted file mode 100644
index c7c615f3c68..00000000000
--- a/english/lts/security/2021/dla-2608.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been discovered in jquery's handling of
-untrusted HTML which may result in execution of untrusted code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.1.1-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your jquery packages.</p>
-
-<p>For the detailed security status of jquery please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jquery">https://security-tracker.debian.org/tracker/jquery</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2608.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2609.data b/english/lts/security/2021/dla-2609.data
deleted file mode 100644
index 3d3eb771d68..00000000000
--- a/english/lts/security/2021/dla-2609.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2609-1 thunderbird</define-tag>
-<define-tag report_date>2021-03-26</define-tag>
-<define-tag secrefs>CVE-2021-23981 CVE-2021-23982 CVE-2021-23984 CVE-2021-23987</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2609.wml b/english/lts/security/2021/dla-2609.wml
deleted file mode 100644
index 5b99e626ee9..00000000000
--- a/english/lts/security/2021/dla-2609.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code or information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.9.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2609.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2610.data b/english/lts/security/2021/dla-2610.data
deleted file mode 100644
index bd48b84934e..00000000000
--- a/english/lts/security/2021/dla-2610.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2610-1 linux-4.19</define-tag>
-<define-tag report_date>2021-3-30</define-tag>
-<define-tag secrefs>CVE-2020-27170 CVE-2020-27171 CVE-2021-3348 CVE-2021-3428 CVE-2021-26930 CVE-2021-26931 CVE-2021-26932 CVE-2021-2736 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038 CVE-2021-28660 Bug#983595</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2610.wml b/english/lts/security/2021/dla-2610.wml
deleted file mode 100644
index 57da0dc7e9b..00000000000
--- a/english/lts/security/2021/dla-2610.wml
+++ /dev/null
@@ -1,112 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2021-26930">CVE-2021-26930</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-26931">CVE-2021-26931</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-26932">CVE-2021-26932</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-27363">CVE-2021-27363</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-27364">CVE-2021-27364</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-27365">CVE-2021-27365</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-28038">CVE-2021-28038</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-28660">CVE-2021-28660</a>
-Debian Bug : 983595</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service, or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27170">CVE-2020-27170</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-27171">CVE-2020-27171</a></p>
-
- <p>Piotr Krysiuk discovered flaws in the BPF subsystem's checks for
- information leaks through speculative execution. A local user
- could use these to obtain sensitive information from kernel
- memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3348">CVE-2021-3348</a>
-
- <p>ADlab of venustech discovered a race condition in the nbd block
- driver that can lead to a use-after-free. A local user with
- access to an nbd block device could use this to cause a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3428">CVE-2021-3428</a>
-
- <p>Wolfgang Frisch reported a potential integer overflow in the
- ext4 filesystem driver. A user permitted to mount arbitrary
- filesystem images could use this to cause a denial of service
- (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26930">CVE-2021-26930</a>
-
-<p>(XSA-365)</p>
-
- <p>Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan
- H. Schönherr discovered that the Xen block backend driver
- (xen-blkback) did not handle grant mapping errors correctly. A
- malicious guest could exploit this bug to cause a denial of
- service (crash), or possibly an information leak or privilege
- escalation, within the domain running the backend, which is
- typically dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26931">CVE-2021-26931</a>
-
-<p>(XSA-362), <a href="https://security-tracker.debian.org/tracker/CVE-2021-26932">CVE-2021-26932</a> (XSA-361), <a href="https://security-tracker.debian.org/tracker/CVE-2021-28038">CVE-2021-28038</a> (XSA-367)</p>
-
- <p>Jan Beulich discovered that the Xen support code and various Xen
- backend drivers did not handle grant mapping errors correctly. A
- malicious guest could exploit these bugs to cause a denial of
- service (crash) within the domain running the backend, which is
- typically dom0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27363">CVE-2021-27363</a>
-
- <p>Adam Nichols reported that the iSCSI initiator subsystem did not
- properly restrict access to transport handle attributes in sysfs.
- On a system acting as an iSCSI initiator, this is an information
- leak to local users and makes it easier to exploit <a href="https://security-tracker.debian.org/tracker/CVE-2021-27364">CVE-2021-27364</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27364">CVE-2021-27364</a>
-
- <p>Adam Nichols reported that the iSCSI initiator subsystem did not
- properly restrict access to its netlink management interface. On
- a system acting as an iSCSI initiator, a local user could use
- these to cause a denial of service (disconnection of storage) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27365">CVE-2021-27365</a>
-
- <p>Adam Nichols reported that the iSCSI initiator subsystem did not
- correctly limit the lengths of parameters or <q>passthrough PDUs</q>
- sent through its netlink management interface. On a system acting
- as an iSCSI initiator, a local user could use these to leak the
- contents of kernel memory, to cause a denial of service (kernel
- memory corruption or crash), and probably for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28660">CVE-2021-28660</a>
-
- <p>It was discovered that the rtl8188eu WiFi driver did not correctly
- limit the length of SSIDs copied into scan results. An attacker
- within WiFi range could use this to cause a denial of service
- (crash or memory corruption) or possibly to execute code on a
- vulnerable system.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.181-1~deb9u1. This update additionally fixes Debian bug
-#983595, and includes many more bug fixes from stable updates
-4.19.172-4.19.181 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2610.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2611.data b/english/lts/security/2021/dla-2611.data
deleted file mode 100644
index 4c2651d0411..00000000000
--- a/english/lts/security/2021/dla-2611.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2611-1 ldb</define-tag>
-<define-tag report_date>2021-3-31</define-tag>
-<define-tag secrefs>CVE-2020-27840 CVE-2021-20277</define-tag>
-<define-tag packages>ldb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2611.wml b/english/lts/security/2021/dla-2611.wml
deleted file mode 100644
index 6fec7624388..00000000000
--- a/english/lts/security/2021/dla-2611.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in ldb, an LDAP-like embedded database, for
-example used with samba.</p>
-
-<p>Both issues are related to out of bounds access, either an out of bound
-read or a heap corrupton, both most likely leading to an application
-crash.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:1.1.27-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your ldb packages.</p>
-
-<p>For the detailed security status of ldb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ldb">https://security-tracker.debian.org/tracker/ldb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2611.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2612.data b/english/lts/security/2021/dla-2612.data
deleted file mode 100644
index 466785facee..00000000000
--- a/english/lts/security/2021/dla-2612.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2612-1 leptonlib</define-tag>
-<define-tag report_date>2021-3-31</define-tag>
-<define-tag secrefs>CVE-2020-36277 CVE-2020-36278 CVE-2020-36279 CVE-2020-36281</define-tag>
-<define-tag packages>leptonlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2612.wml b/english/lts/security/2021/dla-2612.wml
deleted file mode 100644
index d65fa5bb53f..00000000000
--- a/english/lts/security/2021/dla-2612.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found by ClusterFuzz in leptonlib, an image
-processing library.</p>
-
-<p>All issues are related to heap-based buffer over-read in several functions
-or a denial of service (application crash) with crafted data.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.74.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your leptonlib packages.</p>
-
-<p>For the detailed security status of leptonlib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/leptonlib">https://security-tracker.debian.org/tracker/leptonlib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2612.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2613.data b/english/lts/security/2021/dla-2613.data
deleted file mode 100644
index 916dc7cc5db..00000000000
--- a/english/lts/security/2021/dla-2613.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2613-1 underscore</define-tag>
-<define-tag report_date>2021-04-13</define-tag>
-<define-tag secrefs>CVE-2021-23358 Bug#986171</define-tag>
-<define-tag packages>underscore</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2613.wml b/english/lts/security/2021/dla-2613.wml
deleted file mode 100644
index 3ea97bc412c..00000000000
--- a/english/lts/security/2021/dla-2613.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>node-underscore and libjs-underscore are vulnerable to Arbitrary Code
-Execution via the template function, particulary when a variable
-property is passed as an argument as it is not sanitized.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8.3~dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your underscore packages.</p>
-
-<p>For the detailed security status of underscore please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/underscore">https://security-tracker.debian.org/tracker/underscore</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2613.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2614.data b/english/lts/security/2021/dla-2614.data
deleted file mode 100644
index c34406d2ec1..00000000000
--- a/english/lts/security/2021/dla-2614.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2614-1 busybox</define-tag>
-<define-tag report_date>2021-4-01</define-tag>
-<define-tag secrefs>CVE-2021-28831 Bug#986217</define-tag>
-<define-tag packages>busybox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2614.wml b/english/lts/security/2021/dla-2614.wml
deleted file mode 100644
index b2828c62cf9..00000000000
--- a/english/lts/security/2021/dla-2614.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The gunzip decompressor of Busybox, tiny utilities for small and embedded
-systems, mishandled the error bit on the huft_build result pointer, with a
-resultant invalid free or segmentation fault, via malformed gzip data.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.22.0-19+deb9u2.</p>
-
-<p>We recommend that you upgrade your busybox packages.</p>
-
-<p>For the detailed security status of busybox please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/busybox">https://security-tracker.debian.org/tracker/busybox</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2614.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2615.data b/english/lts/security/2021/dla-2615.data
deleted file mode 100644
index 2b11690ea65..00000000000
--- a/english/lts/security/2021/dla-2615.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2615-1 spamassassin</define-tag>
-<define-tag report_date>2021-04-02</define-tag>
-<define-tag secrefs>CVE-2020-1946 Bug#985962</define-tag>
-<define-tag packages>spamassassin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2615.wml b/english/lts/security/2021/dla-2615.wml
deleted file mode 100644
index 342b9658a38..00000000000
--- a/english/lts/security/2021/dla-2615.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Damian Lukowski discovered a flaw in spamassassin, a Perl-based spam
-filter using text analysis. Malicious rule configuration files,
-possibly downloaded from an updates server, could execute arbitrary
-commands under multiple scenarios.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.4.2-1~deb9u4.</p>
-
-<p>We recommend that you upgrade your spamassassin packages.</p>
-
-<p>For the detailed security status of spamassassin please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spamassassin">https://security-tracker.debian.org/tracker/spamassassin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2615.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2616.data b/english/lts/security/2021/dla-2616.data
deleted file mode 100644
index a1ae196e8f8..00000000000
--- a/english/lts/security/2021/dla-2616.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2616-1 libxstream-java</define-tag>
-<define-tag report_date>2021-4-03</define-tag>
-<define-tag secrefs>CVE-2021-21341 CVE-2021-21342 CVE-2021-21343 CVE-2021-21344 CVE-2021-21345 CVE-2021-21346 CVE-2021-21347 CVE-2021-21348 CVE-2021-21349 CVE-2021-21350 CVE-2021-21351 Bug#985843</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2616.wml b/english/lts/security/2021/dla-2616.wml
deleted file mode 100644
index f5ae29ea6df..00000000000
--- a/english/lts/security/2021/dla-2616.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In XStream there is a vulnerability which may allow a remote attacker to
-load and execute arbitrary code from a remote host only by manipulating the
-processed input stream.</p>
-
-<p>The type hierarchies for java.io.InputStream, java.nio.channels.Channel,
-javax.activation.DataSource and javax.sql.rowsel.BaseRowSet are now
-blacklisted as well as the individual types
-com.sun.corba.se.impl.activation.ServerTableEntry,
-com.sun.tools.javac.processing.JavacProcessingEnvironment$NameProcessIterator,
-sun.awt.datatransfer.DataTransferer$IndexOrderComparator, and
-sun.swing.SwingLazyValue. Additionally the internal type
-Accessor$GetterSetterReflection of JAXB, the internal types
-MethodGetter$PrivilegedGetter and ServiceFinder$ServiceNameIterator of
-JAX-WS, all inner classes of javafx.collections.ObservableList and an
-internal ClassLoader used in a private BCEL copy are now part of the
-default blacklist and the deserialization of XML containing one of the
-types will fail. You will have to enable these types by explicit
-configuration, if you need them.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.4.11.1-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>For the detailed security status of libxstream-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxstream-java">https://security-tracker.debian.org/tracker/libxstream-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2616.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2617.data b/english/lts/security/2021/dla-2617.data
deleted file mode 100644
index 0d010d31aeb..00000000000
--- a/english/lts/security/2021/dla-2617.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2617-1 php-nette</define-tag>
-<define-tag report_date>2021-4-04</define-tag>
-<define-tag secrefs>CVE-2020-15227</define-tag>
-<define-tag packages>php-nette</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2617.wml b/english/lts/security/2021/dla-2617.wml
deleted file mode 100644
index 61cf9ffed54..00000000000
--- a/english/lts/security/2021/dla-2617.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cyku Hong from DEVCORE discovered that php-nette, a PHP MVC framework, is
-vulnerable to a code injection attack by passing specially formed parameters to
-URL that may possibly leading to remote code execution.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.4-20160731-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your php-nette packages.</p>
-
-<p>For the detailed security status of php-nette please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/php-nette">https://security-tracker.debian.org/tracker/php-nette</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2617.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2618-2.data b/english/lts/security/2021/dla-2618-2.data
deleted file mode 100644
index dd873738a9b..00000000000
--- a/english/lts/security/2021/dla-2618-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2618-2 smarty3</define-tag>
-<define-tag report_date>2021-05-03</define-tag>
-<define-tag secrefs>CVE-2018-13982 CVE-2021-26119 CVE-2021-26120 Bug#986691</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2618-2.wml b/english/lts/security/2021/dla-2618-2.wml
deleted file mode 100644
index 150cb398fa0..00000000000
--- a/english/lts/security/2021/dla-2618-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update of smarty3 released as DLA-2618-1 induced a regression due
-to a syntax error in sysplugins/smarty_security.php.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-
-<p>For the detailed security status of smarty3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/smarty3">https://security-tracker.debian.org/tracker/smarty3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2618-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2618-3.data b/english/lts/security/2021/dla-2618-3.data
deleted file mode 100644
index e39b9b6eaf3..00000000000
--- a/english/lts/security/2021/dla-2618-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2618-3 smarty3</define-tag>
-<define-tag report_date>2021-10-20</define-tag>
-<define-tag secrefs>CVE-2018-13982 Bug#989141</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2618-3.wml b/english/lts/security/2021/dla-2618-3.wml
deleted file mode 100644
index 50b7f5f0127..00000000000
--- a/english/lts/security/2021/dla-2618-3.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update of smarty3, the compiling PHP template engine, issued as
-DLA 2618-1 introduced a regression in the smarty_security class when secure
-directories are evaluated. Updated smarty3 packages are now available to
-correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-
-<p>For the detailed security status of smarty3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/smarty3">https://security-tracker.debian.org/tracker/smarty3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2618-3.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2618.data b/english/lts/security/2021/dla-2618.data
deleted file mode 100644
index e43960b965c..00000000000
--- a/english/lts/security/2021/dla-2618.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2618-1 smarty3</define-tag>
-<define-tag report_date>2021-04-08</define-tag>
-<define-tag secrefs>CVE-2018-13982 CVE-2021-26119 CVE-2021-26120</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2618.wml b/english/lts/security/2021/dla-2618.wml
deleted file mode 100644
index 273b24087a7..00000000000
--- a/english/lts/security/2021/dla-2618.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in smarty3, a template engine
-for PHP.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13982">CVE-2018-13982</a>
-
- <p>path traversal vulnerability due to insufficient sanitization of
- code in Smarty templates. This allows attackers controlling the
- Smarty template to bypass the trusted directory security
- restriction and read arbitrary files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26119">CVE-2021-26119</a>
-
- <p>allows a Sandbox Escape because $smarty.template_object can be
- accessed in sandbox mode.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26120">CVE-2021-26120</a>
-
- <p>allows code injection vulnerability via an unexpected function
- name after a {function name= substring.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-
-<p>For the detailed security status of smarty3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/smarty3">https://security-tracker.debian.org/tracker/smarty3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2618.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2619.data b/english/lts/security/2021/dla-2619.data
deleted file mode 100644
index 89fe77468c1..00000000000
--- a/english/lts/security/2021/dla-2619.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2619-1 python3.5</define-tag>
-<define-tag report_date>2021-04-05</define-tag>
-<define-tag secrefs>CVE-2021-3177 CVE-2021-3426 CVE-2021-23336</define-tag>
-<define-tag packages>python3.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2619.wml b/english/lts/security/2021/dla-2619.wml
deleted file mode 100644
index 37ae8022738..00000000000
--- a/english/lts/security/2021/dla-2619.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three security issues have been discovered in python3.5:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3177">CVE-2021-3177</a>
-
- <p>Python 3.x has a buffer overflow in PyCArg_repr in _ctypes/callproc.c,
- which may lead to remote code execution in certain Python applications that accept
- floating-point numbers as untrusted input.
- This occurs because sprintf is used unsafely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3426">CVE-2021-3426</a>
-
- <p>Running `pydoc -p` allows other local users to extract arbitrary files.
- The `/getfile?key=path` URL allows to read arbitrary file on the filesystem.</p>
-
- <p>The fix removes the <q>getfile</q> feature of the pydoc module which
- could be abused to read arbitrary files on the disk (directory
- traversal vulnerability).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23336">CVE-2021-23336</a>
-
- <p>The Python3.5 vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl
- and urllib.parse.parse_qs by using a vector called parameter cloaking. When
- the attacker can separate query parameters using a semicolon (;), they can
- cause a difference in the interpretation of the request between the proxy
- (running with default configuration) and the server. This can result in malicious
- requests being cached as completely safe ones, as the proxy would usually not
- see the semicolon as a separator, and therefore would not include it in a cache
- key of an unkeyed parameter.</p>
-
- <p><b>Attention, API-change!</b> </p>
-
- <p> Please be sure your software is working properly if it uses `urllib.parse.parse_qs`
- or `urllib.parse.parse_qsl`, `cgi.parse` or `cgi.parse_multipart`.</p>
-
- <p>Earlier Python versions allowed using both ``;`` and ``&amp;`` as query parameter
- separators in `urllib.parse.parse_qs` and `urllib.parse.parse_qsl`.
- Due to security concerns, and to conform with
- newer W3C recommendations, this has been changed to allow only a single
- separator key, with ``&amp;`` as the default. This change also affects
- `cgi.parse` and `cgi.parse_multipart` as they use the affected
- functions internally. For more details, please see their respective
- documentation.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.3-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your python3.5 packages.</p>
-
-<p>For the detailed security status of python3.5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.5">https://security-tracker.debian.org/tracker/python3.5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2619.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2620.data b/english/lts/security/2021/dla-2620.data
deleted file mode 100644
index 9d9e943b924..00000000000
--- a/english/lts/security/2021/dla-2620.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2620-1 python-bleach</define-tag>
-<define-tag report_date>2021-04-06</define-tag>
-<define-tag secrefs>CVE-2021-23980</define-tag>
-<define-tag packages>python-bleach</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2620.wml b/english/lts/security/2021/dla-2620.wml
deleted file mode 100644
index db439b6b660..00000000000
--- a/english/lts/security/2021/dla-2620.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a cross-site scripting (XSS) vulnerability
-in python-bleach, a whitelist-based HTML sanitisation library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23980">CVE-2021-23980</a>
-
- <p>mutation XSS via allowed math or svg; p or br; and style, title,
- noscript, script, textarea, noframes, iframe, or xmp tags with
- strip_comments=False</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-bleach packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2620.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2621.data b/english/lts/security/2021/dla-2621.data
deleted file mode 100644
index 1ede108dd41..00000000000
--- a/english/lts/security/2021/dla-2621.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2621-1 php-pear</define-tag>
-<define-tag report_date>2021-04-08</define-tag>
-<define-tag secrefs>CVE-2020-36193 Bug#980428</define-tag>
-<define-tag packages>php-pear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2621.wml b/english/lts/security/2021/dla-2621.wml
deleted file mode 100644
index 3b344844e8f..00000000000
--- a/english/lts/security/2021/dla-2621.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in php-pear, which provides core
-packages from the PHP Extension and Application Repository. Tar.php in
-Archive_Tar allows write operations with Directory Traversal due to
-inadequate checking of symbolic links, a related issue to
-<a href="https://security-tracker.debian.org/tracker/CVE-2020-28948">CVE-2020-28948</a>. An attacker could escalate privileges by overwriting
-files outside the extraction directory through a crafted .tar archive.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.10.1+submodules+notgz-9+deb9u3.</p>
-
-<p>We recommend that you upgrade your php-pear packages.</p>
-
-<p>For the detailed security status of php-pear please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-pear">https://security-tracker.debian.org/tracker/php-pear</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2621.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2622.data b/english/lts/security/2021/dla-2622.data
deleted file mode 100644
index cba82d7a899..00000000000
--- a/english/lts/security/2021/dla-2622.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2622-1 python-django</define-tag>
-<define-tag report_date>2021-04-09</define-tag>
-<define-tag secrefs>CVE-2021-28658</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2622.wml b/english/lts/security/2021/dla-2622.wml
deleted file mode 100644
index d93edaad39e..00000000000
--- a/english/lts/security/2021/dla-2622.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential directory traversal issue in
-Django, a Python-based web development framework.</p>
-
-<p>The vulnerability could have been exploited by maliciously crafted
-filenames. However, the upload handlers built into Django itself were not
-affected.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28658">CVE-2021-28658</a>
-
- <p>In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8,
- MultiPartParser allowed directory traversal via uploaded files with
- suitably crafted file names. Built-in upload handlers were not affected by
- this vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u12.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2622.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2623.data b/english/lts/security/2021/dla-2623.data
deleted file mode 100644
index 5b2d56431ec..00000000000
--- a/english/lts/security/2021/dla-2623.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2623-1 qemu</define-tag>
-<define-tag report_date>2021-4-10</define-tag>
-<define-tag secrefs>CVE-2020-17380 CVE-2021-3392 CVE-2021-3409 CVE-2021-3416 CVE-2021-20203 CVE-2021-20255 CVE-2021-20257 Bug#984450 Bug#984451 Bug#984452 Bug#984448 Bug#984449 Bug#970937</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2623.wml b/english/lts/security/2021/dla-2623.wml
deleted file mode 100644
index 65cc0374aca..00000000000
--- a/english/lts/security/2021/dla-2623.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in QEMU, a fast processor
-emulator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20257">CVE-2021-20257</a>
-
- <p>net: e1000: infinite loop while processing transmit descriptors</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20255">CVE-2021-20255</a>
-
- <p>A stack overflow via an infinite recursion vulnerability was found in the
- eepro100 i8255x device emulator of QEMU. This issue occurs while processing
- controller commands due to a DMA reentry issue. This flaw allows a guest
- user or process to consume CPU cycles or crash the QEMU process on the
- host, resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20203">CVE-2021-20203</a>
-
- <p>An integer overflow issue was found in the vmxnet3 NIC emulator of the
- QEMU. It may occur if a guest was to supply invalid values for rx/tx queue
- size or other NIC parameters. A privileged guest user may use this flaw to
- crash the QEMU process on the host resulting in DoS scenario.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3416">CVE-2021-3416</a>
-
- <p>A potential stack overflow via infinite loop issue was found in various NIC
- emulators of QEMU in versions up to and including 5.2.0. The issue occurs
- in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A
- guest user/process may use this flaw to consume CPU cycles or crash the
- QEMU process on the host resulting in DoS scenario.</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3416">CVE-2021-3416</a>
-
- <p>The patch for <a href="https://security-tracker.debian.org/tracker/CVE-2020-17380">CVE-2020-17380</a>/<a href="https://security-tracker.debian.org/tracker/CVE-2020-25085">CVE-2020-25085</a> was found to be ineffective,
- thus making QEMU vulnerable to the out-of-bounds read/write access issues
- previously found in the SDHCI controller emulation code. This flaw allows a
- malicious privileged guest to crash the QEMU process on the host, resulting
- in a denial of service or potential code execution.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u14.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2623.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2624.data b/english/lts/security/2021/dla-2624.data
deleted file mode 100644
index c81f6ec61de..00000000000
--- a/english/lts/security/2021/dla-2624.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2624-1 libpano13</define-tag>
-<define-tag report_date>2021-04-13</define-tag>
-<define-tag secrefs>CVE-2021-20307 Bug#985249</define-tag>
-<define-tag packages>libpano13</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2624.wml b/english/lts/security/2021/dla-2624.wml
deleted file mode 100644
index 857ddda2a83..00000000000
--- a/english/lts/security/2021/dla-2624.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Format string vulnerability in panoFileOutputNamesCreate() in
-libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and
-write arbitrary memory values.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.9.19+dfsg-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libpano13 packages.</p>
-
-<p>For the detailed security status of libpano13 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libpano13">https://security-tracker.debian.org/tracker/libpano13</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2624.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2625.data b/english/lts/security/2021/dla-2625.data
deleted file mode 100644
index 62e11678128..00000000000
--- a/english/lts/security/2021/dla-2625.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2625-1 courier-authlib</define-tag>
-<define-tag report_date>2021-04-14</define-tag>
-<define-tag secrefs>CVE-2021-28374 Bug#984810</define-tag>
-<define-tag packages>courier-authlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2625.wml b/english/lts/security/2021/dla-2625.wml
deleted file mode 100644
index 5bea9e16dee..00000000000
--- a/english/lts/security/2021/dla-2625.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Debian courier-authlib package before 0.71.1-2 for Courier
-Authentication Library creates a /run/courier/authdaemon
-directory with weak permissions, allowing an attacker to read
-user information. This may include a cleartext password in some
-configurations. In general, it includes the user's existence,
-uid and gids, home and/or Maildir directory, quota, and some
-type of password information (such as a hash).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.66.4-9+deb9u1.</p>
-
-<p>We recommend that you upgrade your courier-authlib packages.</p>
-
-<p>For the detailed security status of courier-authlib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/courier-authlib">https://security-tracker.debian.org/tracker/courier-authlib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2625.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2626.data b/english/lts/security/2021/dla-2626.data
deleted file mode 100644
index b6c8cdb5f9e..00000000000
--- a/english/lts/security/2021/dla-2626.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2626-1 clamav</define-tag>
-<define-tag report_date>2021-04-14</define-tag>
-<define-tag secrefs>CVE-2021-1405 Bug#986622 Bug#986790</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2626.wml b/english/lts/security/2021/dla-2626.wml
deleted file mode 100644
index 42724c4ebc9..00000000000
--- a/english/lts/security/2021/dla-2626.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability in the email parsing module in Clam AntiVirus
-(ClamAV) Software version 0.103.1 and all prior versions could
-allow an unauthenticated, remote attacker to cause a denial of
-service condition on an affected device. The vulnerability is
-due to improper variable initialization that may result in an
-NULL pointer read. An attacker could exploit this vulnerability
-by sending a crafted email to an affected device. An exploit
-could allow the attacker to cause the ClamAV scanning process
-crash, resulting in a denial of service condition.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.102.4+dfsg-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2626.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2627.data b/english/lts/security/2021/dla-2627.data
deleted file mode 100644
index e9401e821af..00000000000
--- a/english/lts/security/2021/dla-2627.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2627-1 xorg-server</define-tag>
-<define-tag report_date>2021-04-15</define-tag>
-<define-tag secrefs>CVE-2021-3472</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2627.wml b/english/lts/security/2021/dla-2627.wml
deleted file mode 100644
index dce25857dbc..00000000000
--- a/english/lts/security/2021/dla-2627.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn discovered that there was an input validation failure in the
-X.Org display server.</p>
-
-<p>Insufficient checks on the lengths of the XInput extension's
-ChangeFeedbackControl request could have lead to out of bounds memory accesses
-in the X server. These issues can lead to privilege escalation for authorised
-clients, particularly on systems where the X server is running as a privileged
-user.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3472">CVE-2021-3472</a>
-
- <p>Fix XChangeFeedbackControl() request underflow</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2:1.19.2-1+deb9u8.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2627.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2628.data b/english/lts/security/2021/dla-2628.data
deleted file mode 100644
index 8d3b1a15e43..00000000000
--- a/english/lts/security/2021/dla-2628.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2628-1 python2.7</define-tag>
-<define-tag report_date>2021-04-17</define-tag>
-<define-tag secrefs>CVE-2019-16935 CVE-2021-23336</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2628.wml b/english/lts/security/2021/dla-2628.wml
deleted file mode 100644
index ed372a5064f..00000000000
--- a/english/lts/security/2021/dla-2628.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been discovered in python2.7:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16935">CVE-2019-16935</a>
-
- <p>The documentation XML-RPC server in Python 2.7 has XSS via the server_title
- field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in
- Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with
- untrusted input, arbitrary JavaScript can be delivered to clients that
- visit the http URL for this server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23336">CVE-2021-23336</a>
-
- <p>The Python2.7 vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl
- and urllib.parse.parse_qs by using a vector called parameter cloaking. When
- the attacker can separate query parameters using a semicolon (;), they can
- cause a difference in the interpretation of the request between the proxy
- (running with default configuration) and the server. This can result in malicious
- requests being cached as completely safe ones, as the proxy would usually not
- see the semicolon as a separator, and therefore would not include it in a cache
- key of an unkeyed parameter.</p>
-
- <p>**Attention, API-change!**
- Please be sure your software is working properly if it uses `urllib.parse.parse_qs`
- or `urllib.parse.parse_qsl`, `cgi.parse` or `cgi.parse_multipart`.</p>
-
- <p>Earlier Python versions allowed using both ``;`` and ``&amp;`` as query parameter
- separators in `urllib.parse.parse_qs` and `urllib.parse.parse_qsl`.
- Due to security concerns, and to conform with
- newer W3C recommendations, this has been changed to allow only a single
- separator key, with ``&amp;`` as the default. This change also affects
- `cgi.parse` and `cgi.parse_multipart` as they use the affected
- functions internally. For more details, please see their respective
- documentation.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.7.13-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>For the detailed security status of python2.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python2.7">https://security-tracker.debian.org/tracker/python2.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2628.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2629.data b/english/lts/security/2021/dla-2629.data
deleted file mode 100644
index b42304eaf2a..00000000000
--- a/english/lts/security/2021/dla-2629.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2629-1 libebml</define-tag>
-<define-tag report_date>2021-4-18</define-tag>
-<define-tag secrefs>CVE-2021-3405</define-tag>
-<define-tag packages>libebml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2629.wml b/english/lts/security/2021/dla-2629.wml
deleted file mode 100644
index 118a3738117..00000000000
--- a/english/lts/security/2021/dla-2629.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A heap overflow issue was detected in libebml, a library to read and
-write files in the EBML format, a binary pendant to XML.
-These issues appeared in several ReadData functions of various data type
-classes. This update also fixes the issue in EbmlString::ReadData and
-EbmlUnicodeString::ReadData, which were mentioned in <a href="https://security-tracker.debian.org/tracker/CVE-2021-3405">CVE-2021-3405</a>.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.4-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your libebml packages.</p>
-
-<p>For the detailed security status of libebml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libebml">https://security-tracker.debian.org/tracker/libebml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2629.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2630.data b/english/lts/security/2021/dla-2630.data
deleted file mode 100644
index 450ebf0a152..00000000000
--- a/english/lts/security/2021/dla-2630.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2630-1 wordpress</define-tag>
-<define-tag report_date>2021-04-21</define-tag>
-<define-tag secrefs>CVE-2021-29447 CVE-2021-29450 Bug#987065</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2630.wml b/english/lts/security/2021/dla-2630.wml
deleted file mode 100644
index 56f00896fb7..00000000000
--- a/english/lts/security/2021/dla-2630.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29447">CVE-2021-29447</a>
-
- <p>Wordpress is an open source CMS. A user with the ability to
- upload files (like an Author) can exploit an XML parsing issue
- in the Media Library leading to XXE attacks. This requires
- WordPress installation to be using PHP 8. Access to internal
- files is possible in a successful XXE attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29450">CVE-2021-29450</a>
-
- <p>Wordpress is an open source CMS. One of the blocks in the
- WordPress editor can be exploited in a way that exposes
- password-protected posts and pages. This requires at least
- contributor privileges.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.7.20+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2630.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2631.data b/english/lts/security/2021/dla-2631.data
deleted file mode 100644
index 1edb54d5cb8..00000000000
--- a/english/lts/security/2021/dla-2631.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2631-1 zabbix</define-tag>
-<define-tag report_date>2021-04-21</define-tag>
-<define-tag secrefs>CVE-2019-15132 CVE-2020-15803 Bug#935027 Bug#966146</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2631.wml b/english/lts/security/2021/dla-2631.wml
deleted file mode 100644
index f1684e42156..00000000000
--- a/english/lts/security/2021/dla-2631.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Zabbix, a network
-monitoring solution. An attacker may enumerate valid users and
-redirect to external links through the zabbix web frontend.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15132">CVE-2019-15132</a>
-
- <p>Zabbix allows User Enumeration. With login requests, it is
- possible to enumerate application usernames based on the
- variability of server responses (e.g., the <q>Login name or password
- is incorrect</q> and <q>No permissions for system access</q> messages, or
- just blocking for a number of seconds). This affects both
- api_jsonrpc.php and index.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15803">CVE-2020-15803</a>
-
- <p>Zabbix allows stored XSS in the URL Widget. This fix was
- mistakenly dropped in previous upload 1:3.0.31+dfsg-0+deb9u1.</p></li>
-
-</ul>
-
-<p>This update also includes several other bug fixes and
-improvements. For more information please refer to the upstream
-changelog file.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:3.0.32+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2631.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2632.data b/english/lts/security/2021/dla-2632.data
deleted file mode 100644
index e0a3cf56d1f..00000000000
--- a/english/lts/security/2021/dla-2632.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2632-1 thunderbird</define-tag>
-<define-tag report_date>2021-04-22</define-tag>
-<define-tag secrefs>CVE-2021-23961 CVE-2021-23991 CVE-2021-23992 CVE-2021-23993 CVE-2021-23994 CVE-2021-23995 CVE-2021-23998 CVE-2021-23999 CVE-2021-24002 CVE-2021-29945 CVE-2021-29946 CVE-2021-29948 CVE-2021-29949</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2632.wml b/english/lts/security/2021/dla-2632.wml
deleted file mode 100644
index e1fbed64cee..00000000000
--- a/english/lts/security/2021/dla-2632.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code or information disclosure.
-In adddition a number of security issues were addressed in the OpenPGP
-support.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.10.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2632.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2633.data b/english/lts/security/2021/dla-2633.data
deleted file mode 100644
index 88f74adf9d8..00000000000
--- a/english/lts/security/2021/dla-2633.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2633-1 firefox-esr</define-tag>
-<define-tag report_date>2021-04-23</define-tag>
-<define-tag secrefs>CVE-2021-23961 CVE-2021-23994 CVE-2021-23995 CVE-2021-23998 CVE-2021-23999 CVE-2021-24002 CVE-2021-29945 CVE-2021-29946</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2633.wml b/english/lts/security/2021/dla-2633.wml
deleted file mode 100644
index 7224f0ad441..00000000000
--- a/english/lts/security/2021/dla-2633.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure, privilege escalation or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.10.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2633.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2634.data b/english/lts/security/2021/dla-2634.data
deleted file mode 100644
index 1009266abb2..00000000000
--- a/english/lts/security/2021/dla-2634.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2634-1 openjdk-8</define-tag>
-<define-tag report_date>2021-04-23</define-tag>
-<define-tag secrefs>CVE-2021-2163</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2634.wml b/english/lts/security/2021/dla-2634.wml
deleted file mode 100644
index 500b8094685..00000000000
--- a/english/lts/security/2021/dla-2634.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-resulting in bypass of sandbox restrictions.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u292-b10-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2634.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2635.data b/english/lts/security/2021/dla-2635.data
deleted file mode 100644
index 3f118e1aa1e..00000000000
--- a/english/lts/security/2021/dla-2635.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2635-1 libspring-java</define-tag>
-<define-tag report_date>2021-04-23</define-tag>
-<define-tag secrefs>CVE-2018-1270 CVE-2018-11039 CVE-2018-11040 CVE-2018-15756 Bug#895114 Bug#911786</define-tag>
-<define-tag packages>libspring-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2635.wml b/english/lts/security/2021/dla-2635.wml
deleted file mode 100644
index 401332d1568..00000000000
--- a/english/lts/security/2021/dla-2635.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in libspring-java, a modular
-Java/J2EE application framework. An attacker may execute code, perform
-XST attack, issue unauthorized cross-domain requests or cause a DoS
-(Denial-of-Service) in specific configurations.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1270">CVE-2018-1270</a>
-
- <p>Spring Framework allows applications to expose STOMP over
- WebSocket endpoints with a simple, in-memory STOMP broker through
- the spring-messaging module. A malicious user (or attacker) can
- craft a message to the broker that can lead to a remote code
- execution attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11039">CVE-2018-11039</a>
-
- <p>Spring Framework allows web applications to change the HTTP
- request method to any HTTP method (including TRACE) using the
- HiddenHttpMethodFilter in Spring MVC. If an application has a
- pre-existing XSS vulnerability, a malicious user (or attacker) can
- use this filter to escalate to an XST (Cross Site Tracing) attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11040">CVE-2018-11040</a>
-
- <p>Spring Framework allows web applications to enable cross-domain
- requests via JSONP (JSON with Padding) through
- AbstractJsonpResponseBodyAdvice for REST controllers and
- MappingJackson2JsonView for browser requests. Both are not enabled
- by default in Spring Framework nor Spring Boot, however, when
- MappingJackson2JsonView is configured in an application, JSONP
- support is automatically ready to use through the <q>jsonp</q> and
- <q>callback</q> JSONP parameters, enabling cross-domain requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15756">CVE-2018-15756</a>
-
- <p>Spring Framework provides support for range requests when serving
- static resources through the ResourceHttpRequestHandler, or
- starting in 5.0 when an annotated controller returns an
- org.springframework.core.io.Resource. A malicious user (or
- attacker) can add a range header with a high number of ranges, or
- with wide ranges that overlap, or both, for a denial of service
- attack.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.3.5-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libspring-java packages.</p>
-
-<p>For the detailed security status of libspring-java please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libspring-java">https://security-tracker.debian.org/tracker/libspring-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2635.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2636.data b/english/lts/security/2021/dla-2636.data
deleted file mode 100644
index 90af6e04653..00000000000
--- a/english/lts/security/2021/dla-2636.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2636-1 pjproject</define-tag>
-<define-tag report_date>2021-4-23</define-tag>
-<define-tag secrefs>CVE-2021-21375</define-tag>
-<define-tag packages>pjproject</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2636.wml b/english/lts/security/2021/dla-2636.wml
deleted file mode 100644
index b7acd103b99..00000000000
--- a/english/lts/security/2021/dla-2636.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in pjproject, a set of libraries for the PJ
-Project.
-Due to bad handling of two consecutive crafted answers to an INVITE, the
-attacker is able to crash the server resulting in a denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.5.5~dfsg-6+deb9u2.</p>
-
-<p>We recommend that you upgrade your pjproject packages.</p>
-
-<p>For the detailed security status of pjproject please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pjproject">https://security-tracker.debian.org/tracker/pjproject</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2636.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2637.data b/english/lts/security/2021/dla-2637.data
deleted file mode 100644
index f1324d7934c..00000000000
--- a/english/lts/security/2021/dla-2637.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2637-1 drupal7</define-tag>
-<define-tag report_date>2021-4-23</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2637.wml b/english/lts/security/2021/dla-2637.wml
deleted file mode 100644
index b859d585308..00000000000
--- a/english/lts/security/2021/dla-2637.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Drupal project identified a vulnerability in the sanitization
-performed in the _filter_xss_arttributes function, potentially
-allowing a cross-site scripting, and granted it the Drupal Security
-Advisory ID SA-CORE-2021-002:</p>
-
- <p>https://www.drupal.org/sa-core-2021-002</p>
-
-<p>No CVE number has been announced.</p>
-
-<p>For Debian 9 <q>Stretch</q>, the fix to this issue was backported in
-version 7.52-2+deb9u15.</p>
-
-<p>We recommend you upgrade your drupal7 package.</p>
-
-<p>For detailed security status of drupal7, please refer to its security
-tracker page:</p>
-
- <p>https://security-tracker.debian.org/tracker/source-package/drupal7</p>
-
-<p>Further information about Debian LTS security advisories, how to
-apply these updates to your system, and other frequently asked
-questions can be found at:</p>
-
- <p>https://wiki.debian.org/LTS</p>
-
-<p>For Debian 9 <q>Stretch</q>, these issues have been fixed in drupal7 version 7.52-2+deb9u15</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2637.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2638.data b/english/lts/security/2021/dla-2638.data
deleted file mode 100644
index 21e9af4743d..00000000000
--- a/english/lts/security/2021/dla-2638.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2638-1 jackson-databind</define-tag>
-<define-tag report_date>2021-04-25</define-tag>
-<define-tag secrefs>CVE-2020-24616 CVE-2020-24750 CVE-2020-35490 CVE-2020-35491 CVE-2020-35728 CVE-2020-36179 CVE-2020-36180 CVE-2020-36181 CVE-2020-36182 CVE-2020-36183 CVE-2020-36184 CVE-2020-36185 CVE-2020-36186 CVE-2020-36187 CVE-2020-36188 CVE-2020-36189 CVE-2021-20190</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2638.wml b/english/lts/security/2021/dla-2638.wml
deleted file mode 100644
index 41110852da3..00000000000
--- a/english/lts/security/2021/dla-2638.wml
+++ /dev/null
@@ -1,136 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were found in Jackson Databind.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24616">CVE-2020-24616</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the
- interaction between serialization gadgets and typing, related
- to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24750">CVE-2020-24750</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the
- interaction between serialization gadgets and typing, related
- to com.pastdev.httpcomponents.configuration.JndiConfiguration.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25649">CVE-2020-25649</a>
-
- <p>A flaw was found in FasterXML Jackson Databind, where it did not
- have entity expansion secured properly. This flaw allows
- vulnerability to XML external entity (XXE) attacks. The highest
- threat from this vulnerability is data integrity.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35490">CVE-2020-35490</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35491">CVE-2020-35491</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35728">CVE-2020-35728</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
- (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36179">CVE-2020-36179</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36180">CVE-2020-36180</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36181">CVE-2020-36181</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36182">CVE-2020-36182</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36183">CVE-2020-36183</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related
- to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36184">CVE-2020-36184</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36185">CVE-2020-36185</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36186">CVE-2020-36186</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36187">CVE-2020-36187</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36188">CVE-2020-36188</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- com.newrelic.agent.deps.ch.qos.logback.core.db.JNDICS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36189">CVE-2020-36189</a>
-
- <p>FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
- interaction between serialization gadgets and typing, related to
- com.newrelic.agent.deps.ch.qos.logback.core.db.DMCS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20190">CVE-2021-20190</a>
-
- <p>A flaw was found in jackson-databind before 2.9.10.7. FasterXML
- mishandles the interaction between serialization gadgets and
- typing. The highest threat from this vulnerability is to data
- confidentiality and integrity as well as system availability.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.8.6-1+deb9u9.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>For the detailed security status of jackson-databind please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jackson-databind">https://security-tracker.debian.org/tracker/jackson-databind</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2638.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2639.data b/english/lts/security/2021/dla-2639.data
deleted file mode 100644
index 9127536ec88..00000000000
--- a/english/lts/security/2021/dla-2639.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2639-1 opendmarc</define-tag>
-<define-tag report_date>2021-04-25</define-tag>
-<define-tag secrefs>CVE-2020-12460 Bug#966464</define-tag>
-<define-tag packages>opendmarc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2639.wml b/english/lts/security/2021/dla-2639.wml
deleted file mode 100644
index ad292d9822f..00000000000
--- a/english/lts/security/2021/dla-2639.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that OpenDMARC, a milter implementation of DMARC,
-has improper null termination in the function opendmarc_xml_parse that
-can result in a one-byte heap overflow in opendmarc_xml when parsing a
-specially crafted DMARC aggregate report. This can cause remote memory
-corruption when a '\0' byte overwrites the heap metadata of the next
-chunk and its PREV_INUSE flag.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.2-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your opendmarc packages.</p>
-
-<p>For the detailed security status of opendmarc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/opendmarc">https://security-tracker.debian.org/tracker/opendmarc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2639.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2640.data b/english/lts/security/2021/dla-2640.data
deleted file mode 100644
index 783c722676f..00000000000
--- a/english/lts/security/2021/dla-2640.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2640-1 gst-plugins-good1.0</define-tag>
-<define-tag report_date>2021-04-26</define-tag>
-<define-tag secrefs>CVE-2021-3497 Bug#986910</define-tag>
-<define-tag packages>gst-plugins-good1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2640.wml b/english/lts/security/2021/dla-2640.wml
deleted file mode 100644
index cf78bcee217..00000000000
--- a/english/lts/security/2021/dla-2640.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free vulnerability was found in the Matroska plugin of the
-the GStreamer media framework, which may result in denial of service or
-potentially the execution of arbitrary code if a malformed media file
-is opened.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-good1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-good1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-good1.0">https://security-tracker.debian.org/tracker/gst-plugins-good1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2640.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2641.data b/english/lts/security/2021/dla-2641.data
deleted file mode 100644
index 76bf4a04a2b..00000000000
--- a/english/lts/security/2021/dla-2641.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2641-1 gst-plugins-base1.0</define-tag>
-<define-tag report_date>2021-04-27</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>gst-plugins-base1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2641.wml b/english/lts/security/2021/dla-2641.wml
deleted file mode 100644
index 5de8c0d2ae5..00000000000
--- a/english/lts/security/2021/dla-2641.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in plugins for the GStreamer
-media framework, which may result in denial of service or potentially
-the execution of arbitrary code if a malformed media file is opened.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.4-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-base1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-base1.0">https://security-tracker.debian.org/tracker/gst-plugins-base1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2641.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2642.data b/english/lts/security/2021/dla-2642.data
deleted file mode 100644
index dc6fa19fff7..00000000000
--- a/english/lts/security/2021/dla-2642.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2642-1 gst-plugins-bad1.0</define-tag>
-<define-tag report_date>2021-04-27</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>gst-plugins-bad1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2642.wml b/english/lts/security/2021/dla-2642.wml
deleted file mode 100644
index 440e7db3b78..00000000000
--- a/english/lts/security/2021/dla-2642.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in plugins for the GStreamer
-media framework, which may result in denial of service or potentially
-the execution of arbitrary code if a malformed media file is opened.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.4-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-bad1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-bad1.0">https://security-tracker.debian.org/tracker/gst-plugins-bad1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2642.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2643.data b/english/lts/security/2021/dla-2643.data
deleted file mode 100644
index 492e14b3ad1..00000000000
--- a/english/lts/security/2021/dla-2643.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2643-1 gst-plugins-ugly1.0</define-tag>
-<define-tag report_date>2021-04-27</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>gst-plugins-ugly1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2643.wml b/english/lts/security/2021/dla-2643.wml
deleted file mode 100644
index e3d319beb84..00000000000
--- a/english/lts/security/2021/dla-2643.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in plugins for the GStreamer
-media framework, which may result in denial of service or potentially
-the execution of arbitrary code if a malformed media file is opened.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gst-plugins-ugly1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-ugly1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0">https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2643.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2644.data b/english/lts/security/2021/dla-2644.data
deleted file mode 100644
index c7e25915a9d..00000000000
--- a/english/lts/security/2021/dla-2644.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2644-1 gst-libav1.0</define-tag>
-<define-tag report_date>2021-04-27</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>gst-libav1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2644.wml b/english/lts/security/2021/dla-2644.wml
deleted file mode 100644
index 9892b2daff7..00000000000
--- a/english/lts/security/2021/dla-2644.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in plugins for the GStreamer
-media framework, which may result in denial of service or potentially
-the execution of arbitrary code if a malformed media file is opened.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gst-libav1.0 packages.</p>
-
-<p>For the detailed security status of gst-libav1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-libav1.0">https://security-tracker.debian.org/tracker/gst-libav1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2644.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2645.data b/english/lts/security/2021/dla-2645.data
deleted file mode 100644
index 1cdff1684c4..00000000000
--- a/english/lts/security/2021/dla-2645.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2645-1 edk2</define-tag>
-<define-tag report_date>2021-4-29</define-tag>
-<define-tag secrefs>CVE-2019-0161 CVE-2019-14558 CVE-2019-14559 CVE-2019-14562 CVE-2019-14563 CVE-2019-14575 CVE-2019-14584 CVE-2019-14586 CVE-2019-14587 CVE-2021-28210 CVE-2021-28211 Bug#952926 Bug#968819 Bug#952934 Bug#977300</define-tag>
-<define-tag packages>edk2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2645.wml b/english/lts/security/2021/dla-2645.wml
deleted file mode 100644
index ed042497572..00000000000
--- a/english/lts/security/2021/dla-2645.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in edk2, firmware for
-virtual machines. Integer and stack overflows and uncontrolled resource
-consumption may lead to a denial-of-service or in a worst case scenario,
-allow an authenticated local user to potentially enable escalation of
-privilege.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0~20161202.7bbe0b3e-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your edk2 packages.</p>
-
-<p>For the detailed security status of edk2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/edk2">https://security-tracker.debian.org/tracker/edk2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2645.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2646.data b/english/lts/security/2021/dla-2646.data
deleted file mode 100644
index d71ca5cd900..00000000000
--- a/english/lts/security/2021/dla-2646.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2646-1 subversion</define-tag>
-<define-tag report_date>2021-05-03</define-tag>
-<define-tag secrefs>CVE-2020-17525</define-tag>
-<define-tag packages>subversion</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2646.wml b/english/lts/security/2021/dla-2646.wml
deleted file mode 100644
index d72a1eb0cf3..00000000000
--- a/english/lts/security/2021/dla-2646.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in subversion:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17525">CVE-2020-17525</a>:
-
- <p>Subversion's mod_authz_svn module will crash if the server is using
- in-repository authz rules with the AuthzSVNReposRelativeAccessFile
- option and a client sends a request for a non-existing repository URL.
- This can lead to disruption for users of the service.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.9.5-1+deb9u6.</p>
-
-<p>We recommend that you upgrade your subversion packages.</p>
-
-<p>For the detailed security status of subversion please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/subversion">https://security-tracker.debian.org/tracker/subversion</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2646.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2647.data b/english/lts/security/2021/dla-2647.data
deleted file mode 100644
index 68d3fdfd45b..00000000000
--- a/english/lts/security/2021/dla-2647.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2647-1 bind9</define-tag>
-<define-tag report_date>2021-05-04</define-tag>
-<define-tag secrefs>CVE-2021-25214 CVE-2021-25215 CVE-2021-25216 Bug#987741 Bug#987742 Bug#987743</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2647.wml b/english/lts/security/2021/dla-2647.wml
deleted file mode 100644
index f3fa90bbd89..00000000000
--- a/english/lts/security/2021/dla-2647.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in BIND, a DNS server
-implementation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25214">CVE-2021-25214</a>
-
- <p>Greg Kuechle discovered that a malformed incoming IXFR transfer
- could trigger an assertion failure in named, resulting in denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25215">CVE-2021-25215</a>
-
- <p>Siva Kakarla discovered that named could crash when a DNAME record
- placed in the ANSWER section during DNAME chasing turned out to be
- the final answer to a client query.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25216">CVE-2021-25216</a>
-
- <p>It was discovered that the SPNEGO implementation used by BIND is
- prone to a buffer overflow vulnerability. This update switches to
- use the SPNEGO implementation from the Kerberos libraries.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:9.10.3.dfsg.P4-12.3+deb9u9.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2647.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2648-2.data b/english/lts/security/2021/dla-2648-2.data
deleted file mode 100644
index ccf4f772f80..00000000000
--- a/english/lts/security/2021/dla-2648-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2648-2 mediawiki</define-tag>
-<define-tag report_date>2021-05-11</define-tag>
-<define-tag secrefs>CVE-2021-20270 CVE-2021-27291 CVE-2021-30152 CVE-2021-30155 CVE-2021-30158 CVE-2021-30159 Bug#985574 Bug#984664</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2648-2.wml b/english/lts/security/2021/dla-2648-2.wml
deleted file mode 100644
index 85c2a96fcb7..00000000000
--- a/english/lts/security/2021/dla-2648-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The patch from latest upstream release to address <a href="https://security-tracker.debian.org/tracker/CVE-2021-30152">CVE-2021-30152</a> was
-not portable to stretch-security version causing MediaWiki APIs to
-fail. This update includes a patch from upstream REL_31 release which
-fix the issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.27.7-1~deb9u9.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2648-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2648.data b/english/lts/security/2021/dla-2648.data
deleted file mode 100644
index 086b7795c73..00000000000
--- a/english/lts/security/2021/dla-2648.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2648-1 mediawiki</define-tag>
-<define-tag report_date>2021-05-11</define-tag>
-<define-tag secrefs>CVE-2021-20270 CVE-2021-27291 CVE-2021-30152 CVE-2021-30155 CVE-2021-30158 CVE-2021-30159 Bug#985574 Bug#984664</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2648.wml b/english/lts/security/2021/dla-2648.wml
deleted file mode 100644
index 7bbcf96cec6..00000000000
--- a/english/lts/security/2021/dla-2648.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in mediawiki, a wiki
-website engine for collaborative work.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20270">CVE-2021-20270</a>
-
- <p>An infinite loop in SMLLexer in Pygments used by mediawiki as
- one if its lexers may lead to denial of service when performing
- syntax highlighting of a Standard ML (SML) source file, as
- demonstrated by input that only contains the <q>exception</q> keyword.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27291">CVE-2021-27291</a>
-
- <p>pygments, the lexers used by mediawiki rely heavily on regular
- expressions. Some of the regular expressions have exponential or
- cubic worst-case complexity and are vulnerable to ReDoS. By
- crafting malicious input, an attacker can cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30152">CVE-2021-30152</a>
-
- <p>An issue was discovered in MediaWiki. When using the MediaWiki
- API to <q>protect</q> a page, a user is currently able to protect to a
- higher level than they currently have permissions for.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30155">CVE-2021-30155</a>
-
- <p>An issue was discovered in MediaWiki before. ContentModelChange
- does not check if a user has correct permissions to create and set
- the content model of a nonexistent page.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30158">CVE-2021-30158</a>
-
- <p>An issue was discovered in MediaWiki. Blocked users are unable to
- use Special:ResetTokens. This has security relevance because a
- blocked user might have accidentally shared a token, or might know
- that a token has been compromised, and yet is not able to block
- any potential future use of the token by an unauthorized party.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30159">CVE-2021-30159</a>
-
- <p>An issue was discovered in MediaWiki. Users can bypass intended
- restrictions on deleting pages in certain <q>fast double move</q>
- situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but
- it's only called if Title::getArticleID() returns non-zero with no
- special flags. Next, MovePage::moveToInternal() will delete the
- page if getArticleID(READ_LATEST) is non-zero. Therefore, if the
- page is missing in the replica DB, isValidMove() will return true,
- and then moveToInternal() will unconditionally delete the page if
- it can be found in the master.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.27.7-1~deb9u8.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2648.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2649.data b/english/lts/security/2021/dla-2649.data
deleted file mode 100644
index 5727186ab8c..00000000000
--- a/english/lts/security/2021/dla-2649.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2649-1 cgal</define-tag>
-<define-tag report_date>2021-05-04</define-tag>
-<define-tag secrefs>CVE-2020-28601 CVE-2020-28636 CVE-2020-35628 CVE-2020-35636</define-tag>
-<define-tag packages>cgal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2649.wml b/english/lts/security/2021/dla-2649.wml
deleted file mode 100644
index 28c3b4f67e9..00000000000
--- a/english/lts/security/2021/dla-2649.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Four security issues have been discovered in cgal. A code execution vulnerability exists
-in the Nef polygon-parsing functionality of CGAL.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28601">CVE-2020-28601</a>
-
- <p>An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex()
- Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28636">CVE-2020-28636</a>
-
- <p>An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop()
- slh->twin() An attacker can provide malicious input to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35628">CVE-2020-35628</a>
-
- <p>An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop()
- slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35636">CVE-2020-35636</a>
-
- <p>An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface()
- sfh->volume(). An attacker can provide malicious input to trigger this vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your cgal packages.</p>
-
-<p>For the detailed security status of cgal please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cgal">https://security-tracker.debian.org/tracker/cgal</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2649.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2650.data b/english/lts/security/2021/dla-2650.data
deleted file mode 100644
index eface027f1b..00000000000
--- a/english/lts/security/2021/dla-2650.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2650-1 exim4</define-tag>
-<define-tag report_date>2021-5-5</define-tag>
-<define-tag secrefs>CVE-2020-28007 CVE-2020-28008 CVE-2020-28009 CVE-2020-28011 CVE-2020-28012 CVE-2020-28013 CVE-2020-28014 CVE-2020-28015 CVE-2020-28017 CVE-2020-28019 CVE-2020-28020 CVE-2020-28021 CVE-2020-28022 CVE-2020-28023 CVE-2020-28024 CVE-2020-28025 CVE-2020-28026</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2650.wml b/english/lts/security/2021/dla-2650.wml
deleted file mode 100644
index 79e1815e3ca..00000000000
--- a/english/lts/security/2021/dla-2650.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The Qualys Research Labs reported several vulnerabilities in Exim, a mail
-transport agent, which could result in local privilege escalation and
-remote code execution.</p>
-
-<p>Details can be found in the Qualys advisory at
-<a href="https://www.qualys.com/2021/05/04/21nails/21nails.txt">https://www.qualys.com/2021/05/04/21nails/21nails.txt</a></p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.89-2+deb9u8.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>For the detailed security status of exim4 please refer to its security
-tracker page at: <a href="https://security-tracker.debian.org/tracker/exim4">https://security-tracker.debian.org/tracker/exim4</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2650.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2651.data b/english/lts/security/2021/dla-2651.data
deleted file mode 100644
index 4fb5cd29633..00000000000
--- a/english/lts/security/2021/dla-2651.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2651-1 python-django</define-tag>
-<define-tag report_date>2021-05-06</define-tag>
-<define-tag secrefs>CVE-2021-31542</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2651.wml b/english/lts/security/2021/dla-2651.wml
deleted file mode 100644
index d75103ba2a0..00000000000
--- a/english/lts/security/2021/dla-2651.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was potential directory-traversal vulnerability
-in Django, a popular Python-based web development framework.</p>
-
-<p>The MultiPartParser, UploadedFile and FieldFile classes allowed
-directory-traversal via uploaded files with suitably crafted file names. In
-order to mitigate this risk, stricter basename and path sanitation is now
-applied. Specifically, empty file names and paths with dot segments are
-rejected.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31542">CVE-2021-31542</a></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u13.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2651.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2652.data b/english/lts/security/2021/dla-2652.data
deleted file mode 100644
index 4a20ff96c3c..00000000000
--- a/english/lts/security/2021/dla-2652.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2652-1 unbound1.9</define-tag>
-<define-tag report_date>2021-5-06</define-tag>
-<define-tag secrefs>CVE-2019-25031 CVE-2019-25032 CVE-2019-25033 CVE-2019-25034 CVE-2019-25035 CVE-2019-25036 CVE-2019-25037 CVE-2019-25038 CVE-2019-25039 CVE-2019-25040 CVE-2019-25041 CVE-2019-25042</define-tag>
-<define-tag packages>unbound1.9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2652.wml b/english/lts/security/2021/dla-2652.wml
deleted file mode 100644
index ff8c2d828e6..00000000000
--- a/english/lts/security/2021/dla-2652.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in Unbound, a validating,
-recursive, caching DNS resolver, by security researchers of X41 D-SEC located
-in Aachen, Germany. Integer overflows, assertion failures, an out-of-bound
-write and an infinite loop vulnerability may lead to a denial-of-service or
-have a negative impact on data confidentiality.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9.0-2+deb10u2~deb9u2.</p>
-
-<p>We recommend that you upgrade your unbound1.9 packages.</p>
-
-<p>For the detailed security status of unbound1.9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/unbound1.9">https://security-tracker.debian.org/tracker/unbound1.9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2652.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2653.data b/english/lts/security/2021/dla-2653.data
deleted file mode 100644
index 2490eb0504e..00000000000
--- a/english/lts/security/2021/dla-2653.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2653-1 libxml2</define-tag>
-<define-tag report_date>2021-05-10</define-tag>
-<define-tag secrefs>CVE-2021-3516 CVE-2021-3517 CVE-2021-3518 CVE-2021-3537</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2653.wml b/english/lts/security/2021/dla-2653.wml
deleted file mode 100644
index 24319bb6eca..00000000000
--- a/english/lts/security/2021/dla-2653.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in libxml2, a library providing
-support to read, modify and write XML and HTML files, which could cause
-denial of service via application crash when parsing specially crafted
-files.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.9.4+dfsg1-2.2+deb9u4.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2653.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2654.data b/english/lts/security/2021/dla-2654.data
deleted file mode 100644
index dfb611c5d76..00000000000
--- a/english/lts/security/2021/dla-2654.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2654-1 composer</define-tag>
-<define-tag report_date>2021-05-12</define-tag>
-<define-tag secrefs>CVE-2021-29472</define-tag>
-<define-tag packages>composer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2654.wml b/english/lts/security/2021/dla-2654.wml
deleted file mode 100644
index 49d9bf77ed1..00000000000
--- a/english/lts/security/2021/dla-2654.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that composer, a dependency manager for PHP, did
-not properly sanitize Mercurial URLs, which could lead to arbitrary
-code execution.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your composer packages.</p>
-
-<p>For the detailed security status of composer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/composer">https://security-tracker.debian.org/tracker/composer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2654.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2655.data b/english/lts/security/2021/dla-2655.data
deleted file mode 100644
index 64cf88ba404..00000000000
--- a/english/lts/security/2021/dla-2655.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2655-1 rails</define-tag>
-<define-tag report_date>2021-05-12</define-tag>
-<define-tag secrefs>CVE-2021-22885 CVE-2021-22904 Bug#988214</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2655.wml b/english/lts/security/2021/dla-2655.wml
deleted file mode 100644
index 6339cddbd70..00000000000
--- a/english/lts/security/2021/dla-2655.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22885">CVE-2021-22885</a>
-
- <p>There is a possible information disclosure/unintended method
- execution vulnerability in Action Pack when using the
- `redirect_to` or `polymorphic_url` helper with untrusted user
- input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22904">CVE-2021-22904</a>
-
- <p>There is a possible DoS vulnerability in the Token Authentication
- logic in Action Controller. Impacted code uses
- `authenticate_or_request_with_http_token` or
- `authenticate_with_http_token` for request authentication.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:4.2.7.1-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>For the detailed security status of rails please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rails">https://security-tracker.debian.org/tracker/rails</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2655.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2656.data b/english/lts/security/2021/dla-2656.data
deleted file mode 100644
index 5927da26cf2..00000000000
--- a/english/lts/security/2021/dla-2656.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2656-1 hivex</define-tag>
-<define-tag report_date>2021-05-12</define-tag>
-<define-tag secrefs>CVE-2021-3504 Bug#988024</define-tag>
-<define-tag packages>hivex</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2656.wml b/english/lts/security/2021/dla-2656.wml
deleted file mode 100644
index 5e18bd81711..00000000000
--- a/english/lts/security/2021/dla-2656.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jemery Galindo discovered an out-of-bounds memory access in Hivex,
-a library to parse Windows Registry hive files.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.13-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your hivex packages.</p>
-
-<p>For the detailed security status of hivex please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/hivex">https://security-tracker.debian.org/tracker/hivex</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2656.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2657.data b/english/lts/security/2021/dla-2657.data
deleted file mode 100644
index 1120ba140c0..00000000000
--- a/english/lts/security/2021/dla-2657.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2657-1 lz4</define-tag>
-<define-tag report_date>2021-05-12</define-tag>
-<define-tag secrefs>CVE-2021-3520</define-tag>
-<define-tag packages>lz4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2657.wml b/english/lts/security/2021/dla-2657.wml
deleted file mode 100644
index 84a7e489c73..00000000000
--- a/english/lts/security/2021/dla-2657.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential memory corruption vulnerability
-in the lz4 compression algorithm library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3520">CVE-2021-3520</a>
-
- <p>memory corruption due to an integer overflow bug caused by memmove
- argument</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.0~r131-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your lz4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2657.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2658.data b/english/lts/security/2021/dla-2658.data
deleted file mode 100644
index 167a9609814..00000000000
--- a/english/lts/security/2021/dla-2658.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2658-1 redmine</define-tag>
-<define-tag report_date>2021-05-13</define-tag>
-<define-tag secrefs>CVE-2019-25026 CVE-2020-36306 CVE-2020-36307 CVE-2020-36308 CVE-2021-30163 CVE-2021-30164 CVE-2021-31863 CVE-2021-31864 CVE-2021-31865 CVE-2021-31866</define-tag>
-<define-tag packages>redmine</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2658.wml b/english/lts/security/2021/dla-2658.wml
deleted file mode 100644
index 3d8cad64871..00000000000
--- a/english/lts/security/2021/dla-2658.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in Redmine, a project management web application,
-which could lead to cross-site scripting, information disclosure, and reading
-arbitrary files from the server.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.3.1-4+deb9u4.</p>
-
-<p>We recommend that you upgrade your redmine packages.</p>
-
-<p>For the detailed security status of redmine please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/redmine">https://security-tracker.debian.org/tracker/redmine</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2658.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2659.data b/english/lts/security/2021/dla-2659.data
deleted file mode 100644
index 544df8005f8..00000000000
--- a/english/lts/security/2021/dla-2659.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2659-1 graphviz</define-tag>
-<define-tag report_date>2021-05-13</define-tag>
-<define-tag secrefs>CVE-2018-10196 CVE-2020-18032 Bug#898841 Bug#988000</define-tag>
-<define-tag packages>graphviz</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2659.wml b/english/lts/security/2021/dla-2659.wml
deleted file mode 100644
index 73e16fa042e..00000000000
--- a/english/lts/security/2021/dla-2659.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10196">CVE-2018-10196</a>
-
- <p>NULL pointer dereference vulnerability in the rebuild_vlists
- function in lib/dotgen/conc.c in the dotgen library allows
- remote attackers to cause a denial of service (application
- crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-18032">CVE-2020-18032</a>
-
- <p>A buffer overflow was discovered in Graphviz, which could
- potentially result in the execution of arbitrary code when
- processing a malformed file.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.38.0-17+deb9u1.</p>
-
-<p>We recommend that you upgrade your graphviz packages.</p>
-
-<p>For the detailed security status of graphviz please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/graphviz">https://security-tracker.debian.org/tracker/graphviz</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2659.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2660.data b/english/lts/security/2021/dla-2660.data
deleted file mode 100644
index 33fd11f397c..00000000000
--- a/english/lts/security/2021/dla-2660.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2660-1 libgetdata</define-tag>
-<define-tag report_date>2021-05-13</define-tag>
-<define-tag secrefs>CVE-2021-20204</define-tag>
-<define-tag packages>libgetdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2660.wml b/english/lts/security/2021/dla-2660.wml
deleted file mode 100644
index 952b2f4d671..00000000000
--- a/english/lts/security/2021/dla-2660.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in libgetdata</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2021-20204">CVE-2021-20204</a></p>
-
- <p>A heap memory corruption problem (use after free) can be triggered when processing
- maliciously crafted dirfile databases. This degrades the confidentiality,
- integrity and availability of third-party software that uses libgetdata as a library.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libgetdata packages.</p>
-
-<p>For the detailed security status of libgetdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libgetdata">https://security-tracker.debian.org/tracker/libgetdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2660.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2661.data b/english/lts/security/2021/dla-2661.data
deleted file mode 100644
index 0fc36168247..00000000000
--- a/english/lts/security/2021/dla-2661.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2661-1 jetty9</define-tag>
-<define-tag report_date>2021-05-14</define-tag>
-<define-tag secrefs>CVE-2017-9735 CVE-2018-12536 CVE-2019-10241 CVE-2019-10247 CVE-2020-27216 Bug#864898 Bug#902774 Bug#928444</define-tag>
-<define-tag packages>jetty9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2661.wml b/english/lts/security/2021/dla-2661.wml
deleted file mode 100644
index c0ecd400685..00000000000
--- a/english/lts/security/2021/dla-2661.wml
+++ /dev/null
@@ -1,84 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in jetty, a Java servlet
-engine and webserver. An attacker may reveal cryptographic credentials
-such as passwords to a local user, disclose installation paths, hijack
-user sessions or tamper with collocated webapps.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9735">CVE-2017-9735</a>
-
- <p>Jetty is prone to a timing channel in util/security/Password.java,
- which makes it easier for remote attackers to obtain access by
- observing elapsed times before rejection of incorrect passwords.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12536">CVE-2018-12536</a>
-
- <p>On webapps deployed using default Error Handling, when an
- intentionally bad query arrives that doesn't match a dynamic
- url-pattern, and is eventually handled by the DefaultServlet's
- static file serving, the bad characters can trigger a
- java.nio.file.InvalidPathException which includes the full path to
- the base resource directory that the DefaultServlet and/or webapp
- is using. If this InvalidPathException is then handled by the
- default Error Handler, the InvalidPathException message is
- included in the error response, revealing the full server path to
- the requesting system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10241">CVE-2019-10241</a>
-
- <p>The server is vulnerable to XSS conditions if a remote client USES
- a specially formatted URL against the DefaultServlet or
- ResourceHandler that is configured for showing a Listing of
- directory contents.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10247">CVE-2019-10247</a>
-
- <p>The server running on any OS and Jetty version combination will
- reveal the configured fully qualified directory base resource
- location on the output of the 404 error for not finding a Context
- that matches the requested path. The default server behavior on
- jetty-distribution and jetty-home will include at the end of the
- Handler tree a DefaultHandler, which is responsible for reporting
- this 404 error, it presents the various configured contexts as
- HTML for users to click through to. This produced HTML includes
- output that contains the configured fully qualified directory base
- resource location for each context.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27216">CVE-2020-27216</a>
-
- <p>On Unix like systems, the system's temporary directory is shared
- between all users on that system. A collocated user can observe
- the process of creating a temporary sub directory in the shared
- temporary directory and race to complete the creation of the
- temporary subdirectory. If the attacker wins the race then they
- will have read and write permission to the subdirectory used to
- unpack web applications, including their WEB-INF/lib jar files and
- JSP files. If any code is ever executed out of this temporary
- directory, this can lead to a local privilege escalation
- vulnerability.</p></li>
-
-</ul>
-
-<p>This update also includes several other bug fixes and
-improvements. For more information please refer to the upstream
-changelog file.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-9.2.30-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your jetty9 packages.</p>
-
-<p>For the detailed security status of jetty9 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jetty9">https://security-tracker.debian.org/tracker/jetty9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2661.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2662.data b/english/lts/security/2021/dla-2662.data
deleted file mode 100644
index 3a2d3974676..00000000000
--- a/english/lts/security/2021/dla-2662.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2662-1 postgresql-9.6</define-tag>
-<define-tag report_date>2021-05-15</define-tag>
-<define-tag secrefs>CVE-2021-32027 CVE-2021-32028</define-tag>
-<define-tag packages>postgresql-9.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2662.wml b/english/lts/security/2021/dla-2662.wml
deleted file mode 100644
index a5b9e29d785..00000000000
--- a/english/lts/security/2021/dla-2662.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been discovered in the PostgreSQL
-database system, which could result in the execution of arbitrary
-code or disclosure of memory content.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-9.6.22-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
-
-<p>For the detailed security status of postgresql-9.6 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2662.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2663.data b/english/lts/security/2021/dla-2663.data
deleted file mode 100644
index 247c6d7f29d..00000000000
--- a/english/lts/security/2021/dla-2663.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2663-1 libimage-exiftool-perl</define-tag>
-<define-tag report_date>2021-05-16</define-tag>
-<define-tag secrefs>CVE-2021-22204 Bug#987505</define-tag>
-<define-tag packages>libimage-exiftool-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2663.wml b/english/lts/security/2021/dla-2663.wml
deleted file mode 100644
index ef94c285cfb..00000000000
--- a/english/lts/security/2021/dla-2663.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in libimage-exiftool-perl, a library
-and program to read and write meta information in multimedia files,
-which may result in execution of arbitrary code if a malformed DjVu
-file is processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-10.40-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libimage-exiftool-perl packages.</p>
-
-<p>For the detailed security status of libimage-exiftool-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libimage-exiftool-perl">https://security-tracker.debian.org/tracker/libimage-exiftool-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2663.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2664.data b/english/lts/security/2021/dla-2664.data
deleted file mode 100644
index df445c8013b..00000000000
--- a/english/lts/security/2021/dla-2664.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2664-1 curl</define-tag>
-<define-tag report_date>2021-05-17</define-tag>
-<define-tag secrefs>CVE-2021-22876 Bug#986269</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2664.wml b/english/lts/security/2021/dla-2664.wml
deleted file mode 100644
index 1577795a8a3..00000000000
--- a/english/lts/security/2021/dla-2664.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Viktor Szakats reported that libcurl, an URL transfer library, does
-not strip off user credentials from the URL when automatically
-populating the Referer HTTP request header field in outgoing HTTP
-requests. Sensitive authentication data may leak to the server that is
-the target of the second HTTP request.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.52.1-5+deb9u14.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2664.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2665.data b/english/lts/security/2021/dla-2665.data
deleted file mode 100644
index 944c229ef3b..00000000000
--- a/english/lts/security/2021/dla-2665.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2665-1 ring</define-tag>
-<define-tag report_date>2021-5-23</define-tag>
-<define-tag secrefs>CVE-2021-21375</define-tag>
-<define-tag packages>ring</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2665.wml b/english/lts/security/2021/dla-2665.wml
deleted file mode 100644
index a0c6d378724..00000000000
--- a/english/lts/security/2021/dla-2665.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in ring, a secure and distributed voice, video and
-chat platform. Actually the embedded copy of pjproject is affected by this
-CVE.
-Due to bad handling of two consecutive crafted answers to an INVITE, the
-attacker is able to crash the server resulting in a denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-20161221.2.7bd7d91~dfsg1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ring packages.</p>
-
-<p>For the detailed security status of ring please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ring">https://security-tracker.debian.org/tracker/ring</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2665.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2666.data b/english/lts/security/2021/dla-2666.data
deleted file mode 100644
index 4b587498381..00000000000
--- a/english/lts/security/2021/dla-2666.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2666-1 libx11</define-tag>
-<define-tag report_date>2021-05-24</define-tag>
-<define-tag secrefs>CVE-2021-31535 Bug#988737</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2666.wml b/english/lts/security/2021/dla-2666.wml
deleted file mode 100644
index b5ea05c6f0d..00000000000
--- a/english/lts/security/2021/dla-2666.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Roman Fiedler found that libX11, the X11 protocol client library, was
-vulnerable to protocol command injection due to insufficient validation
-of arguments to some functions.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:1.6.4-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>For the detailed security status of libx11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libx11">https://security-tracker.debian.org/tracker/libx11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2666.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2667.data b/english/lts/security/2021/dla-2667.data
deleted file mode 100644
index 7ed372558d1..00000000000
--- a/english/lts/security/2021/dla-2667.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2667-1 djvulibre</define-tag>
-<define-tag report_date>2021-05-26</define-tag>
-<define-tag secrefs>CVE-2019-15142 CVE-2019-15143 CVE-2019-15144 CVE-2019-15145 CVE-2019-18804 CVE-2021-3500 CVE-2021-32490 CVE-2021-32491 CVE-2021-32492 CVE-2021-32493 Bug#945114 Bug#988215</define-tag>
-<define-tag packages>djvulibre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2667.wml b/english/lts/security/2021/dla-2667.wml
deleted file mode 100644
index 9bc907f4215..00000000000
--- a/english/lts/security/2021/dla-2667.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in djvulibre, a library and
-set of tools to handle documents in the DjVu format. An attacker could
-crash document viewers and possibly execute arbitrary code through
-crafted DjVu files.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.27.1-7+deb9u1.</p>
-
-<p>We recommend that you upgrade your djvulibre packages.</p>
-
-<p>For the detailed security status of djvulibre please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/djvulibre">https://security-tracker.debian.org/tracker/djvulibre</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2667.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2668.data b/english/lts/security/2021/dla-2668.data
deleted file mode 100644
index ae87a0740d2..00000000000
--- a/english/lts/security/2021/dla-2668.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2668-1 samba</define-tag>
-<define-tag report_date>2021-05-31</define-tag>
-<define-tag secrefs>CVE-2019-10218 CVE-2019-14833 CVE-2019-14847 CVE-2019-14861 CVE-2019-14870 CVE-2019-14902 CVE-2019-14907 CVE-2021-20254 Bug#946786</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2668.wml b/english/lts/security/2021/dla-2668.wml
deleted file mode 100644
index 0e379c6a0b3..00000000000
--- a/english/lts/security/2021/dla-2668.wml
+++ /dev/null
@@ -1,106 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Samba, SMB/CIFS file,
-print, and login server for Unix</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10218">CVE-2019-10218</a>
-
- <p>A flaw was found in the samba client, where a malicious server can
- supply a pathname to the client with separators. This could allow
- the client to access files and folders outside of the SMB network
- pathnames. An attacker could use this vulnerability to create
- files outside of the current working directory using the
- privileges of the client user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14833">CVE-2019-14833</a>
-
- <p>A flaw was found in Samba, in the way it handles a user password
- change or a new password for a samba user. The Samba Active
- Directory Domain Controller can be configured to use a custom
- script to check for password complexity. This configuration can
- fail to verify password complexity when non-ASCII characters are
- used in the password, which could lead to weak passwords being set
- for samba users, making it vulnerable to dictionary attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14847">CVE-2019-14847</a>
-
- <p>A flaw was found in samba where an attacker can crash AD DC LDAP
- server via dirsync resulting in denial of service. Privilege
- escalation is not possible with this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14861">CVE-2019-14861</a>
-
- <p>Samba have an issue, where the (poorly named) dnsserver RPC pipe
- provides administrative facilities to modify DNS records and
- zones. Samba, when acting as an AD DC, stores DNS records in LDAP.
- In AD, the default permissions on the DNS partition allow creation
- of new records by authenticated users. This is used for example to
- allow machines to self-register in DNS. If a DNS record was
- created that case-insensitively matched the name of the zone, the
- ldb_qsort() and dns_name_compare() routines could be confused into
- reading memory prior to the list of DNS entries when responding to
- DnssrvEnumRecords() or DnssrvEnumRecords2() and so following
- invalid memory as a pointer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14870">CVE-2019-14870</a>
-
- <p>Samba have an issue, where the S4U (MS-SFU) Kerberos delegation
- model includes a feature allowing for a subset of clients to be
- opted out of constrained delegation in any way, either S4U2Self or
- regular Kerberos authentication, by forcing all tickets for these
- clients to be non-forwardable. In AD this is implemented by a user
- attribute delegation_not_allowed (aka not-delegated), which
- translates to disallow-forwardable. However the Samba AD DC does
- not do that for S4U2Self and does set the forwardable flag even if
- the impersonated client has the not-delegated flag set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14902">CVE-2019-14902</a>
-
- <p>There is an issue in samba, where the removal of the right to
- create or modify a subtree would not automatically be taken away
- on all domain controllers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14907">CVE-2019-14907</a>
-
- <p>samba have an issue where if it is set with "log level = 3" (or
- above) then the string obtained from the client, after a failed
- character conversion, is printed. Such strings can be provided
- during the NTLMSSP authentication exchange. In the Samba AD DC in
- particular, this may cause a long-lived process(such as the RPC
- server) to terminate. (In the file server case, the most likely
- target, smbd, operates as process-per-client and so a crash there is harmless).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20254">CVE-2021-20254</a>
-
- <p>A flaw was found in samba. The Samba smbd file server must map
- Windows group identities (SIDs) into unix group ids (gids). The
- code that performs this had a flaw that could allow it to read
- data beyond the end of the array in the case where a negative
- cache entry had been added to the mapping cache. This could cause
- the calling code to return those values into the process token
- that stores the group membership for a user. The highest threat
- from this vulnerability is to data confidentiality and integrity.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:4.5.16+dfsg-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>For the detailed security status of samba please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/samba">https://security-tracker.debian.org/tracker/samba</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2668.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2669.data b/english/lts/security/2021/dla-2669.data
deleted file mode 100644
index 1a55f9dbd3d..00000000000
--- a/english/lts/security/2021/dla-2669.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2669-1 libxml2</define-tag>
-<define-tag report_date>2021-5-30</define-tag>
-<define-tag secrefs>CVE-2021-3541</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2669.wml b/english/lts/security/2021/dla-2669.wml
deleted file mode 100644
index 86b6503c446..00000000000
--- a/english/lts/security/2021/dla-2669.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libxml2, the GNOME XML library.
-This issue is called "Parameter Laughs"-attack and is related to parameter
-entities expansion.
-It is similar to the "Billion Laughs"-attacks found earlier in libexpat.
-More information can be found at [1]</p>
-
-<p>[1] <a href="https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/">https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/</a></p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.9.4+dfsg1-2.2+deb9u5.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2669.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2670.data b/english/lts/security/2021/dla-2670.data
deleted file mode 100644
index a556d567a88..00000000000
--- a/english/lts/security/2021/dla-2670.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2670-1 nginx</define-tag>
-<define-tag report_date>2021-05-30</define-tag>
-<define-tag secrefs>CVE-2021-23017 Bug#989095</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2670.wml b/english/lts/security/2021/dla-2670.wml
deleted file mode 100644
index 15c288a89fd..00000000000
--- a/english/lts/security/2021/dla-2670.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Luis Merino, Markus Vervier and Eric Sesterhenn discovered an off-by-one
-in Nginx, a high-performance web and reverse proxy server, which could
-result in denial of service and potentially the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.3-1+deb9u6.</p>
-
-<p>We recommend that you upgrade your nginx packages.</p>
-
-<p>For the detailed security status of nginx please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nginx">https://security-tracker.debian.org/tracker/nginx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2670.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2671.data b/english/lts/security/2021/dla-2671.data
deleted file mode 100644
index cf3977a9f6a..00000000000
--- a/english/lts/security/2021/dla-2671.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2671-1 rxvt-unicode</define-tag>
-<define-tag report_date>2021-05-30</define-tag>
-<define-tag secrefs>CVE-2021-33477 Bug#988763</define-tag>
-<define-tag packages>rxvt-unicode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2671.wml b/english/lts/security/2021/dla-2671.wml
deleted file mode 100644
index a8af79b15e3..00000000000
--- a/english/lts/security/2021/dla-2671.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>rxvt-unicode allow (potentially remote) code execution because of
-improper handling of certain escape sequences (ESC G Q). A response is
-terminated by a newline.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-9.22-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your rxvt-unicode packages.</p>
-
-<p>For the detailed security status of rxvt-unicode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rxvt-unicode">https://security-tracker.debian.org/tracker/rxvt-unicode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2671.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2672.data b/english/lts/security/2021/dla-2672.data
deleted file mode 100644
index ab3e33fca8a..00000000000
--- a/english/lts/security/2021/dla-2672.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2672-1 imagemagick</define-tag>
-<define-tag report_date>2021-06-05</define-tag>
-<define-tag secrefs>CVE-2020-27751 CVE-2021-20243 CVE-2021-20245 CVE-2021-20309 CVE-2021-20312 CVE-2021-20313</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2672.wml b/english/lts/security/2021/dla-2672.wml
deleted file mode 100644
index da2af5006a8..00000000000
--- a/english/lts/security/2021/dla-2672.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been discovered in imagemagick.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27751">CVE-2020-27751</a>
-
- <p>A flaw was found in MagickCore/quantum-export.c. An attacker who submits a
- crafted file that is processed by ImageMagick could trigger undefined behavior
- in the form of values outside the range of type
- `unsigned long long` as well as a shift exponent that is too large for
- 64-bit type. This would most likely lead to an impact to application availability,
- but could potentially cause other problems related to undefined behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20243">CVE-2021-20243</a>
-
- <p>A flaw was found in MagickCore/resize.c. An attacker who submits a crafted
- file that is processed by ImageMagick could trigger undefined behavior
- in the form of math division by zero.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20245">CVE-2021-20245</a>
-
- <p>A flaw was found in coders/webp.c. An attacker who submits a crafted file that
- is processed by ImageMagick could trigger undefined behavior in the form of
- math division by zero.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20309">CVE-2021-20309</a>
-
- <p>A division by zero in WaveImage() of MagickCore/visual-effects.c may trigger
- undefined behavior via a crafted image file submitted to an application using
- ImageMagick.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20312">CVE-2021-20312</a>
-
- <p>An integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger
- undefined behavior via a crafted image file that is submitted by an attacker
- and processed by an application using ImageMagick.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20313">CVE-2021-20313</a>
-
- <p>A potential cipher leak when the calculate signatures in TransformSignature is possible.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8:6.9.7.4+dfsg-11+deb9u13.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2672.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2673.data b/english/lts/security/2021/dla-2673.data
deleted file mode 100644
index a98c7b752f1..00000000000
--- a/english/lts/security/2021/dla-2673.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2673-1 firefox-esr</define-tag>
-<define-tag report_date>2021-06-03</define-tag>
-<define-tag secrefs>CVE-2021-29967</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2673.wml b/english/lts/security/2021/dla-2673.wml
deleted file mode 100644
index eea16cd14dd..00000000000
--- a/english/lts/security/2021/dla-2673.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-78.11.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2673.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2674.data b/english/lts/security/2021/dla-2674.data
deleted file mode 100644
index 355ea338794..00000000000
--- a/english/lts/security/2021/dla-2674.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2674-1 isc-dhcp</define-tag>
-<define-tag report_date>2021-06-03</define-tag>
-<define-tag secrefs>CVE-2021-25217 Bug#989157</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2674.wml b/english/lts/security/2021/dla-2674.wml
deleted file mode 100644
index 496bd7e98dc..00000000000
--- a/english/lts/security/2021/dla-2674.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jon Franklin and Pawel Wieczorkiewicz found an issue in the ISC DHCP
-client and server when parsing lease information, which could lead to
-denial of service via application crash.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.3.5-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your isc-dhcp packages.</p>
-
-<p>For the detailed security status of isc-dhcp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/isc-dhcp">https://security-tracker.debian.org/tracker/isc-dhcp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2674.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2675.data b/english/lts/security/2021/dla-2675.data
deleted file mode 100644
index f7f55992398..00000000000
--- a/english/lts/security/2021/dla-2675.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2675-1 caribou</define-tag>
-<define-tag report_date>2021-06-03</define-tag>
-<define-tag secrefs>Bug#980061</define-tag>
-<define-tag packages>caribou</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2675.wml b/english/lts/security/2021/dla-2675.wml
deleted file mode 100644
index a02f874b068..00000000000
--- a/english/lts/security/2021/dla-2675.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2020-25712">CVE-2020-25712</a> in the Xorg X server, addressed
-in DLA-2486-1, caused a regression in caribou, making it crash whenever
-special (shifted) characters were entered.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.4.21-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your caribou packages.</p>
-
-<p>For the detailed security status of caribou please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/caribou">https://security-tracker.debian.org/tracker/caribou</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2675.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2676.data b/english/lts/security/2021/dla-2676.data
deleted file mode 100644
index f6ab5658d3b..00000000000
--- a/english/lts/security/2021/dla-2676.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2676-1 python-django</define-tag>
-<define-tag report_date>2021-06-05</define-tag>
-<define-tag secrefs>CVE-2021-33203 CVE-2021-33571</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2676.wml b/english/lts/security/2021/dla-2676.wml
deleted file mode 100644
index 9b5a2f74338..00000000000
--- a/english/lts/security/2021/dla-2676.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues were discovered in Django, the Python-based web development
-framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33203">CVE-2021-33203</a>
-
- <p>Potential directory traversal via admindocs</p>
-
- <p>Staff members could use the admindocs TemplateDetailView view to check
- the existence of arbitrary files. Additionally, if (and only if) the
- default admindocs templates have been customized by the developers to also
- expose the file contents, then not only the existence but also the file
- contents would have been exposed.</p>
-
- <p>As a mitigation, path sanitation is now applied and only files within
- the template root directories can be loaded.</p>
-
- <p>This issue has low severity, according to the Django security policy.
- Thanks to Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen from the
- CodeQL Python team for the report.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33571">CVE-2021-33571</a>
-
- <p>Possible indeterminate SSRF, RFI, and LFI attacks since validators
- accepted leading zeros in IPv4 addresses</p>
-
- <p>URLValidator, validate_ipv4_address(), and validate_ipv46_address()
- didn't prohibit leading zeros in octal literals. If you used such values
- you could suffer from indeterminate SSRF, RFI, and LFI attacks.</p>
-
- <p>validate_ipv4_address() and validate_ipv46_address() validators were not
- affected on Python 3.9.5+.</p>
-
- <p>This issue has medium severity, according to the Django security
- policy.</p>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u14.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2676.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2677.data b/english/lts/security/2021/dla-2677.data
deleted file mode 100644
index 301179af2ed..00000000000
--- a/english/lts/security/2021/dla-2677.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2677-1 libwebp</define-tag>
-<define-tag report_date>2021-06-05</define-tag>
-<define-tag secrefs>CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331</define-tag>
-<define-tag packages>libwebp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2677.wml b/english/lts/security/2021/dla-2677.wml
deleted file mode 100644
index ab3b7782232..00000000000
--- a/english/lts/security/2021/dla-2677.wml
+++ /dev/null
@@ -1,86 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been discovered in libwebp</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25009">CVE-2018-25009</a>
-
- <p>An out-of-bounds read was found in function WebPMuxCreateInternal.
- The highest threat from this vulnerability is to data confidentiality
- and to the service availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25010">CVE-2018-25010</a>
-
- <p>An out-of-bounds read was found in function ApplyFilter.
- The highest threat from this vulnerability is to data confidentiality
- and to the service availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25011">CVE-2018-25011</a>
-
- <p>A heap-based buffer overflow was found in PutLE16().
- The highest threat from this vulnerability is to data confidentiality
- and integrity as well as system availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25012">CVE-2018-25012</a>
-
- <p>An out-of-bounds read was found in function WebPMuxCreateInternal.
- The highest threat from this vulnerability is to data confidentiality
- and to the service availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25013">CVE-2018-25013</a>
-
- <p>An out-of-bounds read was found in function ShiftBytes.
- The highest threat from this vulnerability is to data confidentiality
- and to the service availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25014">CVE-2018-25014</a>
-
- <p>An unitialized variable is used in function ReadSymbol.
- The highest threat from this vulnerability is to data confidentiality
- and integrity as well as system availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36328">CVE-2020-36328</a>
-
- <p>A heap-based buffer overflow in function WebPDecodeRGBInto is possible
- due to an invalid check for buffer size. The highest threat from this
- vulnerability is to data confidentiality and integrity as well as system
- availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36329">CVE-2020-36329</a>
-
- <p>A use-after-free was found due to a thread being killed too early.
- The highest threat from this vulnerability is to data confidentiality
- and integrity as well as system availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36330">CVE-2020-36330</a>
-
- <p>An out-of-bounds read was found in function ChunkVerifyAndAssign.
- The highest threat from this vulnerability is to data confidentiality
- and to the service availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36331">CVE-2020-36331</a>
-
- <p>An out-of-bounds read was found in function ChunkAssignData.
- The highest threat from this vulnerability is to data confidentiality
- and to the service availability.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.5.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libwebp packages.</p>
-
-<p>For the detailed security status of libwebp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libwebp">https://security-tracker.debian.org/tracker/libwebp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2677.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2678.data b/english/lts/security/2021/dla-2678.data
deleted file mode 100644
index 79a5681d200..00000000000
--- a/english/lts/security/2021/dla-2678.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2678-1 ruby-nokogiri</define-tag>
-<define-tag report_date>2021-6-06</define-tag>
-<define-tag secrefs>CVE-2020-26247 Bug#978967</define-tag>
-<define-tag packages>ruby-nokogiri</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2678.wml b/english/lts/security/2021/dla-2678.wml
deleted file mode 100644
index e9199c3894b..00000000000
--- a/english/lts/security/2021/dla-2678.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An XXE vulnerability was found in Nokogiri, a Rubygem providing HTML, XML, SAX,
-and Reader parsers with XPath and CSS selector support.</p>
-
-<p>XML Schemas parsed by Nokogiri::XML::Schema were trusted by default, allowing
-external resources to be accessed over the network, potentially enabling XXE or
-SSRF attacks. The new default behavior is to treat all input as untrusted.
-The upstream advisory provides further information how to mitigate the problem
-or restore the old behavior again.</p>
-
-<p><a rel="nofollow" href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.6.8.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-nokogiri packages.</p>
-
-<p>For the detailed security status of ruby-nokogiri please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ruby-nokogiri">https://security-tracker.debian.org/tracker/ruby-nokogiri</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2678.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2679.data b/english/lts/security/2021/dla-2679.data
deleted file mode 100644
index 129e0d53067..00000000000
--- a/english/lts/security/2021/dla-2679.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2679-1 thunderbird</define-tag>
-<define-tag report_date>2021-06-07</define-tag>
-<define-tag secrefs>CVE-2021-29956 CVE-2021-29957 CVE-2021-29967</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2679.wml b/english/lts/security/2021/dla-2679.wml
deleted file mode 100644
index adce84a8d82..00000000000
--- a/english/lts/security/2021/dla-2679.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code. In addition two security
-issues were addressed in the OpenPGP support.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.11.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2679.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2680.data b/english/lts/security/2021/dla-2680.data
deleted file mode 100644
index 02011bdb0f3..00000000000
--- a/english/lts/security/2021/dla-2680.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2680-1 nginx</define-tag>
-<define-tag report_date>2021-6-07</define-tag>
-<define-tag secrefs>CVE-2017-20005</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2680.wml b/english/lts/security/2021/dla-2680.wml
deleted file mode 100644
index c8e988e4537..00000000000
--- a/english/lts/security/2021/dla-2680.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jamie Landeg-Jones and Manfred Paul discovered a buffer overflow vulnerability
-in NGINX, a small, powerful, scalable web/proxy server.</p>
-
-<p>NGINX has a buffer overflow for years that exceed four digits, as demonstrated
-by a file with a modification date in 1969 that causes an integer overflow (or
-a false modification date far in the future), when encountered by the autoindex
-module.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.3-1+deb9u7.</p>
-
-<p>We recommend that you upgrade your nginx packages.</p>
-
-<p>For the detailed security status of nginx please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/nginx">https://security-tracker.debian.org/tracker/nginx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2680.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2681.data b/english/lts/security/2021/dla-2681.data
deleted file mode 100644
index a3c17716fab..00000000000
--- a/english/lts/security/2021/dla-2681.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2681-1 eterm</define-tag>
-<define-tag report_date>2021-06-09</define-tag>
-<define-tag secrefs>CVE-2021-33477 Bug#989041</define-tag>
-<define-tag packages>eterm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2681.wml b/english/lts/security/2021/dla-2681.wml
deleted file mode 100644
index 959a0345ee6..00000000000
--- a/english/lts/security/2021/dla-2681.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>eterm, an enlightened terminal emulator, allowed (potentially
-remote) code execution because of improper handling of certain
-escape sequences (ESC G Q).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.6-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your eterm packages.</p>
-
-<p>For the detailed security status of eterm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/eterm">https://security-tracker.debian.org/tracker/eterm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2681.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2682.data b/english/lts/security/2021/dla-2682.data
deleted file mode 100644
index dd15aa4b71b..00000000000
--- a/english/lts/security/2021/dla-2682.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2682-1 mrxvt</define-tag>
-<define-tag report_date>2021-06-09</define-tag>
-<define-tag secrefs>CVE-2021-33477</define-tag>
-<define-tag packages>mrxvt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2682.wml b/english/lts/security/2021/dla-2682.wml
deleted file mode 100644
index c4a1a303f37..00000000000
--- a/english/lts/security/2021/dla-2682.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>mrxvt, lightweight multi-tabbed X terminal emulator, allowed
-(potentially remote) code execution because of improper handling
-of certain escape sequences (ESC G Q).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.5.4-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your mrxvt packages.</p>
-
-<p>For the detailed security status of mrxvt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mrxvt">https://security-tracker.debian.org/tracker/mrxvt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2682.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2683.data b/english/lts/security/2021/dla-2683.data
deleted file mode 100644
index 2446da0187e..00000000000
--- a/english/lts/security/2021/dla-2683.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2683-1 rxvt</define-tag>
-<define-tag report_date>2021-06-09</define-tag>
-<define-tag secrefs>CVE-2017-7483 CVE-2021-33477 Bug#861694</define-tag>
-<define-tag packages>rxvt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2683.wml b/english/lts/security/2021/dla-2683.wml
deleted file mode 100644
index 6727146b64a..00000000000
--- a/english/lts/security/2021/dla-2683.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>rxvt, VT102 terminal emulator for the X Window System, allowed
-(potentially remote) code execution because of improper handling
-of certain escape sequences (ESC G Q).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.7.10-7+deb9u2.</p>
-
-<p>We recommend that you upgrade your rxvt packages.</p>
-
-<p>For the detailed security status of rxvt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rxvt">https://security-tracker.debian.org/tracker/rxvt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2683.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2684.data b/english/lts/security/2021/dla-2684.data
deleted file mode 100644
index e25c97d5d50..00000000000
--- a/english/lts/security/2021/dla-2684.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2684-1 lasso</define-tag>
-<define-tag report_date>2021-6-10</define-tag>
-<define-tag secrefs>CVE-2021-28091</define-tag>
-<define-tag packages>lasso</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2684.wml b/english/lts/security/2021/dla-2684.wml
deleted file mode 100644
index fe4cc1b8b12..00000000000
--- a/english/lts/security/2021/dla-2684.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in lasso, a library for Liberty Alliance
-and SAML protocols, which results to a improper verification of a
-cryptographic signature.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.5.0-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your lasso packages.</p>
-
-<p>For the detailed security status of lasso please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lasso">https://security-tracker.debian.org/tracker/lasso</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2684.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2685.data b/english/lts/security/2021/dla-2685.data
deleted file mode 100644
index 1e3ba71d8a2..00000000000
--- a/english/lts/security/2021/dla-2685.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2685-1 squid3</define-tag>
-<define-tag report_date>2021-06-28</define-tag>
-<define-tag secrefs>CVE-2021-28651 CVE-2021-28652 CVE-2021-31806 CVE-2021-31807 CVE-2021-31808 CVE-2021-33620</define-tag>
-<define-tag packages>squid3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2685.wml b/english/lts/security/2021/dla-2685.wml
deleted file mode 100644
index 05d4eea5124..00000000000
--- a/english/lts/security/2021/dla-2685.wml
+++ /dev/null
@@ -1,68 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Squid, a proxy caching
-server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28651">CVE-2021-28651</a>
-
- <p>Due to a buffer-management bug, it allows a denial of service.
- When resolving a request with the urn: scheme, the parser leaks a
- small amount of memory. However, there is an unspecified attack
- methodology that can easily trigger a large amount of memory
- consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28652">CVE-2021-28652</a>
-
- <p>Due to incorrect parser validation, it allows a Denial of Service
- attack against the Cache Manager API. This allows a trusted client
- to trigger memory leaks that. over time, lead to a Denial of
- Service via an unspecified short query string. This attack is
- limited to clients with Cache Manager API access privilege.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31806">CVE-2021-31806</a>
-
- <p>Due to a memory-management bug, it is vulnerable to a Denial of
- Service attack (against all clients using the proxy) via HTTP
- Range request processing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31807">CVE-2021-31807</a>
-
- <p>An integer overflow problem allows a remote server to achieve
- Denial of Service when delivering responses to HTTP Range
- requests. The issue trigger is a header that can be expected to
- exist in HTTP traffic without any malicious intent.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31808">CVE-2021-31808</a>
-
- <p>Due to an input-validation bug, it is vulnerable to a Denial of
- Service attack (against all clients using the proxy). A client
- sends an HTTP Range request to trigger this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33620">CVE-2021-33620</a>
-
- <p>Remote servers to cause a denial of service (affecting
- availability to all clients) via an HTTP response. The issue
- trigger is a header that can be expected to exist in HTTP traffic
- without any malicious intent by the server.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.23-5+deb9u7.</p>
-
-<p>We recommend that you upgrade your squid3 packages.</p>
-
-<p>For the detailed security status of squid3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/squid3">https://security-tracker.debian.org/tracker/squid3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2685.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2686.data b/english/lts/security/2021/dla-2686.data
deleted file mode 100644
index 8f020120020..00000000000
--- a/english/lts/security/2021/dla-2686.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2686-1 python-urllib3</define-tag>
-<define-tag report_date>2021-06-28</define-tag>
-<define-tag secrefs>CVE-2018-20060 CVE-2019-11236 CVE-2019-11324 CVE-2020-26137</define-tag>
-<define-tag packages>python-urllib3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2686.wml b/english/lts/security/2021/dla-2686.wml
deleted file mode 100644
index cc8ba4b3ce3..00000000000
--- a/english/lts/security/2021/dla-2686.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in python-urllib3, a HTTP
-client for Python.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20060">CVE-2018-20060</a>
-
- <p>Urllib3 does not remove the Authorization HTTP header when
- following a cross-origin redirect (i.e., a redirect that differs
- in host, port, or scheme). This can allow for credentials in the
- Authorization header to be exposed to unintended hosts or
- transmitted in cleartext.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11236">CVE-2019-11236</a>
-
- <p>CRLF injection is possible if the attacker controls the request
- parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11324">CVE-2019-11324</a>
-
- <p>Urllib3 mishandles certain cases where the desired set of CA
- certificates is different from the OS store of CA certificates,
- which results in SSL connections succeeding in situations where a
- verification failure is the correct outcome. This is related to
- use of the ssl_context, ca_certs, or ca_certs_dir argument.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26137">CVE-2020-26137</a>
-
- <p>Urllib3 allows CRLF injection if the attacker controls the HTTP
- request method, as demonstrated by inserting CR and LF control
- characters in the first argument of putrequest().</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.19.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-urllib3 packages.</p>
-
-<p>For the detailed security status of python-urllib3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-urllib3">https://security-tracker.debian.org/tracker/python-urllib3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2686.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2687-2.data b/english/lts/security/2021/dla-2687-2.data
deleted file mode 100644
index a5ce4533dd7..00000000000
--- a/english/lts/security/2021/dla-2687-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2687-2 prosody</define-tag>
-<define-tag report_date>2021-06-19</define-tag>
-<define-tag secrefs>CVE-2021-32921</define-tag>
-<define-tag packages>prosody</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2687-2.wml b/english/lts/security/2021/dla-2687-2.wml
deleted file mode 100644
index 07ae7a34dac..00000000000
--- a/english/lts/security/2021/dla-2687-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the previous upload of the package prosody
-versioned 0.9.12-2+deb9u3 introduced a regression in the
-mod_auth_internal_hashed module. Big thanks to Andre Bianchi for the reporting
-an issue and for testing the update.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.12-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your prosody packages.</p>
-
-<p>For the detailed security status of prosody please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/prosody">https://security-tracker.debian.org/tracker/prosody</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2687-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2687.data b/english/lts/security/2021/dla-2687.data
deleted file mode 100644
index b58fbc2f5bd..00000000000
--- a/english/lts/security/2021/dla-2687.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2687-1 prosody</define-tag>
-<define-tag report_date>2021-06-16</define-tag>
-<define-tag secrefs>CVE-2021-32917 CVE-2021-32921</define-tag>
-<define-tag packages>prosody</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2687.wml b/english/lts/security/2021/dla-2687.wml
deleted file mode 100644
index 8fc2492d693..00000000000
--- a/english/lts/security/2021/dla-2687.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been discovered in prosody:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32917">CVE-2021-32917</a>
-
- <p>The proxy65 component allows open access by default, even if neither of the
- users has an XMPP account on the local server, allowing unrestricted use of
- the server's bandwidth.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32921">CVE-2021-32921</a>
-
- <p>Authentication module does not use a constant-time algorithm for comparing
- certain secret strings when running under Lua 5.2 or later. This can
- potentially be used in a timing attack to reveal the contents of secret
- strings to an attacker.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.9.12-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your prosody packages.</p>
-
-<p>For the detailed security status of prosody please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/prosody">https://security-tracker.debian.org/tracker/prosody</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2687.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2688.data b/english/lts/security/2021/dla-2688.data
deleted file mode 100644
index f4ace78bb1a..00000000000
--- a/english/lts/security/2021/dla-2688.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2688-1 jetty9</define-tag>
-<define-tag report_date>2021-06-17</define-tag>
-<define-tag secrefs>CVE-2021-28169</define-tag>
-<define-tag packages>jetty9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2688.wml b/english/lts/security/2021/dla-2688.wml
deleted file mode 100644
index 12f3adf2385..00000000000
--- a/english/lts/security/2021/dla-2688.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Steven Seeley discovered that in jetty, a Java servlet engine and
-webserver, requests to the ConcatServlet and WelcomeFilter are able to
-access protected resources within the WEB-INF directory. An attacker
-may access sensitive information regarding the implementation of a web
-application.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-9.2.30-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your jetty9 packages.</p>
-
-<p>For the detailed security status of jetty9 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jetty9">https://security-tracker.debian.org/tracker/jetty9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2688.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2689.data b/english/lts/security/2021/dla-2689.data
deleted file mode 100644
index cbf67cdc032..00000000000
--- a/english/lts/security/2021/dla-2689.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2689-1 linux</define-tag>
-<define-tag report_date>2021-06-22</define-tag>
-<define-tag secrefs>CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-26139 CVE-2020-26147 CVE-2020-26558 CVE-2020-29374 CVE-2020-36322 CVE-2021-0129 CVE-2021-3428 CVE-2021-3483 CVE-2021-3564 CVE-2021-3573 CVE-2021-3587 CVE-2021-20292 CVE-2021-23133 CVE-2021-23134 CVE-2021-28660 CVE-2021-28688 CVE-2021-28950 CVE-2021-28964 CVE-2021-28971 CVE-2021-29154 CVE-2021-29265 CVE-2021-29647 CVE-2021-29650 CVE-2021-30002 CVE-2021-31916 CVE-2021-32399 CVE-2021-33034</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2689.wml b/english/lts/security/2021/dla-2689.wml
deleted file mode 100644
index 1fe3d55bc3d..00000000000
--- a/english/lts/security/2021/dla-2689.wml
+++ /dev/null
@@ -1,244 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service, or information leaks.</p>
-
-<p>This update is not yet available for the armel (ARM EABI soft-float)
-architecture.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24586">CVE-2020-24586</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-24587">CVE-2020-24587</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-26147">CVE-2020-26147</a>
-
- <p>Mathy Vanhoef discovered that many Wi-Fi implementations,
- including Linux's mac80211, did not correctly implement reassembly
- of fragmented packets. In some circumstances, an attacker within
- range of a network could exploit these flaws to forge arbitrary
- packets and/or to access sensitive data on that network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24588">CVE-2020-24588</a>
-
- <p>Mathy Vanhoef discovered that most Wi-Fi implementations,
- including Linux's mac80211, did not authenticate the <q>is
- aggregated</q> packet header flag. An attacker within range of a
- network could exploit this to forge arbitrary packets on that
- network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25670">CVE-2020-25670</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-25671">CVE-2020-25671</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-23134">CVE-2021-23134</a>
-
- <p>kiyin (尹亮) of TenCent discovered several reference counting bugs
- in the NFC LLCP implementation which could lead to use-after-free.
- A local user could exploit these for denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p>
-
- <p>Nadav Markus and Or Cohen of Palo Alto Networks discovered that
- the original fixes for these introduced a new bug that could
- result in use-after-free and double-free. This has also been
- fixed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25672">CVE-2020-25672</a>
-
- <p>kiyin (尹亮) of TenCent discovered a memory leak in the NFC LLCP
- implementation. A local user could exploit this for denial of
- service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26139">CVE-2020-26139</a>
-
- <p>Mathy Vanhoef discovered that a bug in some Wi-Fi implementations,
- including Linux's mac80211. When operating in AP mode, they would
- forward EAPOL frames from one client to another while the sender
- was not yet authenticated. An attacker within range of a network
- could use this for denial of service or as an aid to exploiting
- other vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26558">CVE-2020-26558</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-0129">CVE-2021-0129</a>
-
- <p>Researchers at ANSSI discovered vulnerabilities in the Bluetooth
- Passkey authentication method, and in Linux's implementation of
- it. An attacker within range of two Bluetooth devices while they
- pair using Passkey authentication could exploit this to obtain the
- shared secret (Passkey) and then impersonate either of the devices
- to each other.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29374">CVE-2020-29374</a>
-
- <p>Jann Horn of Google reported a flaw in Linux's virtual memory
- management. A parent and child process initially share all their
- memory, but when either writes to a shared page, the page is
- duplicated and unshared (copy-on-write). However, in case an
- operation such as vmsplice() required the kernel to take an
- additional reference to a shared page, and a copy-on-write occurs
- during this operation, the kernel might have accessed the wrong
- process's memory. For some programs, this could lead to an
- information leak or data corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36322">CVE-2020-36322</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28950">CVE-2021-28950</a>
-
- <p>The syzbot tool found that the FUSE (filesystem-in-user-space)
- implementation did not correctly handle a FUSE server returning
- invalid attributes for a file. A local user permitted to run a
- FUSE server could use this to cause a denial of service (crash).</p>
-
- <p>The original fix for this introduced a different potential denial
- of service (infinite loop in kernel space), which has also been
- fixed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3428">CVE-2021-3428</a>
-
- <p>Wolfgang Frisch reported a potential integer overflow in the ext4
- filesystem driver. A user permitted to mount arbitrary filesystem
- images could use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3483">CVE-2021-3483</a>
-
- <p>马哲宇 (Zheyu Ma) reported a bug in the <q>nosy</q> driver for TI
- PCILynx FireWire controllers, which could lead to list corruption
- and a use-after-free. On a system that uses this driver, local
- users granted access to /dev/nosy could exploit this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3564">CVE-2021-3564</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-3573">CVE-2021-3573</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-32399">CVE-2021-32399</a>
-
- <p>The BlockSec team discovered several race conditions in the
- Bluetooth subsystem that could lead to a use-after-free or
- double-free. A local user could exploit these to caue a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3587">CVE-2021-3587</a>
-
- <p>Active Defense Lab of Venustech discovered a potential null
- pointer dereference in the NFC LLCP implementation. A local user
- could use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20292">CVE-2021-20292</a>
-
- <p>It was discovered that the TTM buffer allocation API used by GPU
- drivers did not handle allocation failures in the way that most
- drivers expected, resulting in a double-free on failure. A local
- user on a system using one of these drivers could possibly exploit
- this to cause a denial of service (crash or memory corruption) or
- for privilege escalation. The API has been changed to match
- driver expectations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23133">CVE-2021-23133</a>
-
- <p>Or Cohen of Palo Alto Networks discovered a race condition in the
- SCTP implementation, which can lead to list corruption. A local
- user could exploit this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28660">CVE-2021-28660</a>
-
- <p>It was discovered that the rtl8188eu WiFi driver did not correctly
- limit the length of SSIDs copied into scan results. An attacker
- within WiFi range could use this to cause a denial of service
- (crash or memory corruption) or possibly to execute code on a
- vulnerable system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28688">CVE-2021-28688</a> (<a href="https://xenbits.xen.org/xsa/advisory-371.html">XSA-371</a>)
-
- <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2021-26930">CVE-2021-26930</a>
- (<a href="https://xenbits.xen.org/xsa/advisory-365.html">XSA-365</a>) introduced a potential resource leak. A malicious guest
- could presumably exploit this to cause a denial of service
- (resource exhaustion) within the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28964">CVE-2021-28964</a>
-
- <p>Zygo Blaxell reported a race condition in the Btrfs driver which
- can lead to an assertion failure. On systems using Btrfs, a local
- user could exploit this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28971">CVE-2021-28971</a>
-
- <p>Vince Weaver reported a bug in the performance event handler for
- Intel PEBS. A workaround for a hardware bug on Intel CPUs
- codenamed <q>Haswell</q> and earlier could lead to a null pointer
- dereference. On systems with the affected CPUs, if users are
- permitted to access performance events, a local user may exploit
- this to cause a denial of service (crash).</p>
-
- <p>By default, unprivileged users do not have access to performance
- events, which mitigates this issue. This is controlled by the
- kernel.perf_event_paranoid sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29154">CVE-2021-29154</a>
-
- <p>It was discovered that the Extended BPF (eBPF) JIT compiler
- for x86_64 generated incorrect branch instructions in some
- cases. On systems where eBPF JIT is enabled, users could
- exploit this to execute arbitrary code in the kernel.</p>
-
- <p>By default, eBPF JIT is disabled, mitigating this issue. This is
- controlled by the net.core.bpf_jit_enable sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29265">CVE-2021-29265</a>
-
- <p>The syzbot tool found a race condition in the USB/IP host
- (server) implementation which can lead to a null pointer
- dereference. On a system acting as a USB/IP host, a client
- can exploit this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29647">CVE-2021-29647</a>
-
- <p>The syzbot tool found an information leak in the Qualcomm IPC
- Router (qrtr) implementation.</p>
-
- <p>This protocol is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29650">CVE-2021-29650</a>
-
- <p>It was discovered that a data race in the netfilter subsystem
- could lead to a null pointer dereference during replacement of a
- table. A local user with CAP_NET_ADMIN capability in any user
- namespace could use this to cause a denial of service (crash).</p>
-
- <p>By default, unprivileged users cannot create user namespaces,
- which mitigates this issue. This is controlled by the
- kernel.unprivileged_userns_clone sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30002">CVE-2021-30002</a>
-
- <p>Arnd Bergmann and the syzbot tool found a memory leak in the
- Video4Linux (v4l) subsystem. A local user permitted to access
- video devices (by default, any member of the <q>video</q> group) could
- exploit this to cause a denial of service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31916">CVE-2021-31916</a>
-
- <p>Dan Carpenter reported incorrect parameter validation in the
- device-mapper (dm) subsystem, which could lead to a heap buffer
- overrun. However, only users with CAP_SYS_ADMIN capability
- (i.e. root-equivalent) could trigger this bug, so it did not
- have any security impact in this kernel version.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33034">CVE-2021-33034</a>
-
- <p>The syzbot tool found a bug in the Bluetooth subsystem that could
- lead to a use-after-free. A local user could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.272-1. This update additionally includes many more bug fixes from
-stable updates 4.9.259-4.9.272 inclusive.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2689.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2690.data b/english/lts/security/2021/dla-2690.data
deleted file mode 100644
index 18372529ce7..00000000000
--- a/english/lts/security/2021/dla-2690.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2690-1 linux-4.19</define-tag>
-<define-tag report_date>2021-06-22</define-tag>
-<define-tag secrefs>CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-26139 CVE-2020-26147 CVE-2020-26558 CVE-2020-29374 CVE-2021-0129 CVE-2021-3483 CVE-2021-3506 CVE-2021-3564 CVE-2021-3573 CVE-2021-3587 CVE-2021-23133 CVE-2021-23134 CVE-2021-28688 CVE-2021-28964 CVE-2021-28971 CVE-2021-29154 CVE-2021-29155 CVE-2021-29264 CVE-2021-29647 CVE-2021-29650 CVE-2021-31829 CVE-2021-31916 CVE-2021-32399 CVE-2021-33034 Bug#986949 Bug#988352 Bug#989451</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2690.wml b/english/lts/security/2021/dla-2690.wml
deleted file mode 100644
index 17e88118e26..00000000000
--- a/english/lts/security/2021/dla-2690.wml
+++ /dev/null
@@ -1,219 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to the execution of arbitrary code, privilege escalation,
-denial of service, or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24586">CVE-2020-24586</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-24587">CVE-2020-24587</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-26147">CVE-2020-26147</a>
-
- <p>Mathy Vanhoef discovered that many Wi-Fi implementations,
- including Linux's mac80211, did not correctly implement reassembly
- of fragmented packets. In some circumstances, an attacker within
- range of a network could exploit these flaws to forge arbitrary
- packets and/or to access sensitive data on that network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24588">CVE-2020-24588</a>
-
- <p>Mathy Vanhoef discovered that most Wi-Fi implementations,
- including Linux's mac80211, did not authenticate the <q>is
- aggregated</q> packet header flag. An attacker within range of a
- network could exploit this to forge arbitrary packets on that
- network.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25670">CVE-2020-25670</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2020-25671">CVE-2020-25671</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-23134">CVE-2021-23134</a>
-
- <p>kiyin (尹亮) of TenCent discovered several reference counting bugs
- in the NFC LLCP implementation which could lead to use-after-free.
- A local user could exploit these for denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p>
-
- <p>Nadav Markus and Or Cohen of Palo Alto Networks discovered that
- the original fixes for these introduced a new bug that could
- result in use-after-free and double-free. This has also been
- fixed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25672">CVE-2020-25672</a>
-
- <p>kiyin (尹亮) of TenCent discovered a memory leak in the NFC LLCP
- implementation. A local user could exploit this for denial of
- service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26139">CVE-2020-26139</a>
-
- <p>Mathy Vanhoef discovered that a bug in some Wi-Fi implementations,
- including Linux's mac80211. When operating in AP mode, they would
- forward EAPOL frames from one client to another while the sender
- was not yet authenticated. An attacker within range of a network
- could use this for denial of service or as an aid to exploiting
- other vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26558">CVE-2020-26558</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-0129">CVE-2021-0129</a>
-
- <p>Researchers at ANSSI discovered vulnerabilities in the Bluetooth
- Passkey authentication method, and in Linux's implementation of
- it. An attacker within range of two Bluetooth devices while they
- pair using Passkey authentication could exploit this to obtain the
- shared secret (Passkey) and then impersonate either of the devices
- to each other.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29374">CVE-2020-29374</a>
-
- <p>Jann Horn of Google reported a flaw in Linux's virtual memory
- management. A parent and child process initially share all their
- memory, but when either writes to a shared page, the page is
- duplicated and unshared (copy-on-write). However, in case an
- operation such as vmsplice() required the kernel to take an
- additional reference to a shared page, and a copy-on-write occurs
- during this operation, the kernel might have accessed the wrong
- process's memory. For some programs, this could lead to an
- information leak or data corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3483">CVE-2021-3483</a>
-
- <p>马哲宇 (Zheyu Ma) reported a bug in the <q>nosy</q> driver for TI
- PCILynx FireWire controllers, which could lead to list corruption
- and a use-after-free. On a system that uses this driver, local
- users granted access to /dev/nosy could exploit this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3506">CVE-2021-3506</a>
-
- <p>The ADLab of venustech discovered a bug in the F2FS driver which
- could lead to an out-of-bounds read when accessing a crafted
- filesystem. A local user permitted to mount arbitrary filesystems
- could exploit this to cause a denial of service (crash) or other
- security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3564">CVE-2021-3564</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-3573">CVE-2021-3573</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-32399">CVE-2021-32399</a>
-
- <p>The BlockSec team discovered several race conditions in the
- Bluetooth subsystem that could lead to a use-after-free or
- double-free. A local user could exploit these to caue a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3587">CVE-2021-3587</a>
-
- <p>Active Defense Lab of Venustech discovered a potential null
- pointer dereference in the NFC LLCP implementation. A local user
- could use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23133">CVE-2021-23133</a>
-
- <p>Or Cohen of Palo Alto Networks discovered a race condition in the
- SCTP implementation, which can lead to list corruption. A local
- user could exploit this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28688">CVE-2021-28688</a> (<a href="https://xenbits.xen.org/xsa/advisory-371.html">XSA-371</a>)
-
- <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2021-26930">CVE-2021-26930</a>
- (<a href="https://xenbits.xen.org/xsa/advisory-365.html">XSA-365</a>) introduced a potential resource leak. A malicious guest
- could presumably exploit this to cause a denial of service
- (resource exhaustion) within the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28964">CVE-2021-28964</a>
-
- <p>Zygo Blaxell reported a race condition in the Btrfs driver which
- can lead to an assertion failure. On systems using Btrfs, a local
- user could exploit this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28971">CVE-2021-28971</a>
-
- <p>Vince Weaver reported a bug in the performance event handler for
- Intel PEBS. A workaround for a hardware bug on Intel CPUs
- codenamed <q>Haswell</q> and earlier could lead to a null pointer
- dereference. On systems with the affected CPUs, if users are
- permitted to access performance events, a local user may exploit
- this to cause a denial of service (crash).</p>
-
- <p>By default, unprivileged users do not have access to performance
- events, which mitigates this issue. This is controlled by the
- kernel.perf_event_paranoid sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29154">CVE-2021-29154</a>
-
- <p>It was discovered that the Extended BPF (eBPF) JIT compiler
- for x86_64 generated incorrect branch instructions in some
- cases. On systems where eBPF JIT is enabled, users could
- exploit this to execute arbitrary code in the kernel.</p>
-
- <p>By default, eBPF JIT is disabled, mitigating this issue. This is
- controlled by the net.core.bpf_jit_enable sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29155">CVE-2021-29155</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-31829">CVE-2021-31829</a>
-
- <p>Piotr Krysiuk and Benedict Schlueter discovered that the Extended
- BPF (eBPF) verifier did not completely protect against information
- leaks due to speculative execution. A local user could exploit
- these to obtain sensitive information from kernel memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29264">CVE-2021-29264</a>
-
- <p>It was discovered that the <q>gianfar</q> Ethernet driver used with
- some Freescale SoCs did not correctly handle a Rx queue overrun
- when jumbo packets were enabled. On systems using this driver and
- jumbo packets, an attacker on the network could exploit this to
- cause a denial of service (crash).</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29647">CVE-2021-29647</a>
-
- <p>The syzbot tool found an information leak in the Qualcomm IPC
- Router (qrtr) implementation.</p>
-
- <p>This protocol is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29650">CVE-2021-29650</a>
-
- <p>It was discovered that a data race in the netfilter subsystem
- could lead to a null pointer dereference during replacement of a
- table. A local user with CAP_NET_ADMIN capability in any user
- namespace could use this to cause a denial of service (crash).</p>
-
- <p>By default, unprivileged users cannot create user namespaces,
- which mitigates this issue. This is controlled by the
- kernel.unprivileged_userns_clone sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31916">CVE-2021-31916</a>
-
- <p>Dan Carpenter reported incorrect parameter validation in the
- device-mapper (dm) subsystem, which could lead to a heap buffer
- overrun. However, only users with CAP_SYS_ADMIN capability
- (i.e. root-equivalent) could trigger this bug, so it did not
- have any security impact in this kernel version.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33034">CVE-2021-33034</a>
-
- <p>The syzbot tool found a bug in the Bluetooth subsystem that could
- lead to a use-after-free. A local user could use this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.194-1~deb9u1. This update additionally fixes Debian bug
-<a href="https://bugs.debian.org/986949">#986949</a>, <a href="https://bugs.debian.org/988352">#988352</a>, and <a href="https://bugs.debian.org/989451">#989451</a>; and includes many more bug fixes from
-stable updates 4.19.182-4.19.194 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2690.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2691.data b/english/lts/security/2021/dla-2691.data
deleted file mode 100644
index ada1ab76973..00000000000
--- a/english/lts/security/2021/dla-2691.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2691-1 libgcrypt20</define-tag>
-<define-tag report_date>2021-6-24</define-tag>
-<define-tag secrefs>CVE-2021-40528</define-tag>
-<define-tag packages>libgcrypt20</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2691.wml b/english/lts/security/2021/dla-2691.wml
deleted file mode 100644
index cc29027eda8..00000000000
--- a/english/lts/security/2021/dla-2691.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libgcrypt20, a crypto library.
-Mishandling of ElGamal encryption results in a possible side-channel
-attack and an interoperability problem with keys not generated by
-GnuPG/libgcrypt.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.6-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your libgcrypt20 packages.</p>
-
-<p>For the detailed security status of libgcrypt20 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libgcrypt20">https://security-tracker.debian.org/tracker/libgcrypt20</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2691.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2692.data b/english/lts/security/2021/dla-2692.data
deleted file mode 100644
index b0e36a7e810..00000000000
--- a/english/lts/security/2021/dla-2692.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2692-1 bluez</define-tag>
-<define-tag report_date>2021-6-26</define-tag>
-<define-tag secrefs>CVE-2020-26558 CVE-2021-0129</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2692.wml b/english/lts/security/2021/dla-2692.wml
deleted file mode 100644
index 4344b0751ff..00000000000
--- a/english/lts/security/2021/dla-2692.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in bluez, a package with Bluetooth tools and
-daemons. One issue is about a man-in-the-middle attack during secure
-pairing, the other is about information disclosure due to improper access
-control.</p>
-
-<p>In order to completely fix both issues, you need an updated kernel as
-well! For Debian 9 Stretch this has been uploaded some days ago.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.43-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>For the detailed security status of bluez please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bluez">https://security-tracker.debian.org/tracker/bluez</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2692.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2693.data b/english/lts/security/2021/dla-2693.data
deleted file mode 100644
index 5b86a4ee21d..00000000000
--- a/english/lts/security/2021/dla-2693.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2693-1 xmlbeans</define-tag>
-<define-tag report_date>2021-6-28</define-tag>
-<define-tag secrefs>CVE-2021-23926</define-tag>
-<define-tag packages>xmlbeans</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2693.wml b/english/lts/security/2021/dla-2693.wml
deleted file mode 100644
index 56219dc32ef..00000000000
--- a/english/lts/security/2021/dla-2693.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The XML parsers used by XMLBeans did not set the properties needed to protect
-the user from malicious XML input. Vulnerabilities include the possibility for
-XML Entity Expansion attacks which could lead to a denial-of-service. This
-update implements sensible defaults for the XML parsers to prevent these kind
-of attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.6.0+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your xmlbeans packages.</p>
-
-<p>For the detailed security status of xmlbeans please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/xmlbeans">https://security-tracker.debian.org/tracker/xmlbeans</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2693.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2694.data b/english/lts/security/2021/dla-2694.data
deleted file mode 100644
index 29b222586e3..00000000000
--- a/english/lts/security/2021/dla-2694.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2694-1 tiff</define-tag>
-<define-tag report_date>2021-6-27</define-tag>
-<define-tag secrefs>CVE-2020-35523 CVE-2020-35524</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2694.wml b/english/lts/security/2021/dla-2694.wml
deleted file mode 100644
index 38164565e3e..00000000000
--- a/english/lts/security/2021/dla-2694.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities have been discovered in the libtiff library and the
-included tools, which may result in denial of service or the execution
-of arbitrary code if malformed image files are processed.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0.8-2+deb9u6.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2694.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2695.data b/english/lts/security/2021/dla-2695.data
deleted file mode 100644
index b07d5cdb008..00000000000
--- a/english/lts/security/2021/dla-2695.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2695-1 klibc</define-tag>
-<define-tag report_date>2021-06-28</define-tag>
-<define-tag secrefs>CVE-2021-31870 CVE-2021-31871 CVE-2021-31872 CVE-2021-31873 Bug#989505</define-tag>
-<define-tag packages>klibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2695.wml b/english/lts/security/2021/dla-2695.wml
deleted file mode 100644
index 9577932b74f..00000000000
--- a/english/lts/security/2021/dla-2695.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in klibc. Depending on
-how klibc is used, these could lead to the execution of arbitrary
-code, privilege escalation, or denial of service.</p>
-
-<p>Thanks to Microsoft Vulnerability Research for reporting the heap bugs
-and going some of the way to identifying the cpio bugs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31870">CVE-2021-31870</a>
-
- <p>Multiplication in the calloc() function may result in an integer
- overflow and a subsequent heap buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31871">CVE-2021-31871</a>
-
- <p>An integer overflow in the cpio command may result in a NULL
- pointer dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31872">CVE-2021-31872</a>
-
- <p>Multiple possible integer overflows in the cpio command on 32-bit
- systems may result in a buffer overflow or other security impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31873">CVE-2021-31873</a>
-
- <p>Additions in malloc() function may result in integer overflow and
- subsequent heap buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.0.4-9+deb9u1.</p>
-
-<p>We recommend that you upgrade your klibc packages.</p>
-
-<p>For the detailed security status of klibc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/klibc">https://security-tracker.debian.org/tracker/klibc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2695.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2696.data b/english/lts/security/2021/dla-2696.data
deleted file mode 100644
index 7b3a0858c60..00000000000
--- a/english/lts/security/2021/dla-2696.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2696-1 libjdom2-java</define-tag>
-<define-tag report_date>2021-06-29</define-tag>
-<define-tag secrefs>CVE-2021-33813</define-tag>
-<define-tag packages>libjdom2-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2696.wml b/english/lts/security/2021/dla-2696.wml
deleted file mode 100644
index a6bb25b39ea..00000000000
--- a/english/lts/security/2021/dla-2696.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an XML External Entity (XXE) issue in
-libjdom2-java, a library for reading and manipulating XML documents. Attackers
-could have caused a denial of service attack via a specially-crafted HTTP
-request.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33813">CVE-2021-33813</a>
-
- <p>An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to
- cause a denial of service via a crafted HTTP request.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.0.6-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libjdom2-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2696.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2697.data b/english/lts/security/2021/dla-2697.data
deleted file mode 100644
index e837e5ea7c8..00000000000
--- a/english/lts/security/2021/dla-2697.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2697-1 fluidsynth</define-tag>
-<define-tag report_date>2021-6-29</define-tag>
-<define-tag secrefs>CVE-2021-28421</define-tag>
-<define-tag packages>fluidsynth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2697.wml b/english/lts/security/2021/dla-2697.wml
deleted file mode 100644
index c70ad10c729..00000000000
--- a/english/lts/security/2021/dla-2697.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A vulnerbility has been found in fluidsynth, a real-time MIDI software
-synthesizer.
-Using a special crafted soundfont2 file, a use after free vulnerability
-might result in arbitrary code execution or a denial of service (DoS).</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.6-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your fluidsynth packages.</p>
-
-<p>For the detailed security status of fluidsynth please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/fluidsynth">https://security-tracker.debian.org/tracker/fluidsynth</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2697.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2698.data b/english/lts/security/2021/dla-2698.data
deleted file mode 100644
index ff0e6141bdd..00000000000
--- a/english/lts/security/2021/dla-2698.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2698-1 node-bl</define-tag>
-<define-tag report_date>2021-6-30</define-tag>
-<define-tag secrefs>CVE-2020-8244</define-tag>
-<define-tag packages>node-bl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2698.wml b/english/lts/security/2021/dla-2698.wml
deleted file mode 100644
index 058c2176104..00000000000
--- a/english/lts/security/2021/dla-2698.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in node-bl, a Node.js module to access multiple
-buffers with Buffer interface.
-Due to a buffer over-read, uninitialized memory might be exposed by
-providing crafted user input.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.2-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your node-bl packages.</p>
-
-<p>For the detailed security status of node-bl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-bl">https://security-tracker.debian.org/tracker/node-bl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2698.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2699.data b/english/lts/security/2021/dla-2699.data
deleted file mode 100644
index e75ade9083f..00000000000
--- a/english/lts/security/2021/dla-2699.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2699-1 ipmitool</define-tag>
-<define-tag report_date>2021-6-30</define-tag>
-<define-tag secrefs>CVE-2020-5208</define-tag>
-<define-tag packages>ipmitool</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2699.wml b/english/lts/security/2021/dla-2699.wml
deleted file mode 100644
index 3fcec860fca..00000000000
--- a/english/lts/security/2021/dla-2699.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in ipmitool, an utility for IPMI control with
-kernel driver or LAN interface.
-Neglecting proper checking of input data might result in buffer overflows
-and possible remote code execution.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8.18-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your ipmitool packages.</p>
-
-<p>For the detailed security status of ipmitool please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ipmitool">https://security-tracker.debian.org/tracker/ipmitool</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2699.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2700.data b/english/lts/security/2021/dla-2700.data
deleted file mode 100644
index d798d36d547..00000000000
--- a/english/lts/security/2021/dla-2700.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2700-1 htmldoc</define-tag>
-<define-tag report_date>2021-07-01</define-tag>
-<define-tag secrefs>CVE-2019-19630 CVE-2021-20308 CVE-2021-23158 CVE-2021-23165 CVE-2021-23180 CVE-2021-23191 CVE-2021-23206 CVE-2021-26252 CVE-2021-26259 CVE-2021-26948</define-tag>
-<define-tag packages>htmldoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2700.wml b/english/lts/security/2021/dla-2700.wml
deleted file mode 100644
index 17942f3fb77..00000000000
--- a/english/lts/security/2021/dla-2700.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow was discovered in HTMLDOC, a HTML processor that
-generates indexed HTML, PS, and PDF, which could potentially result
-in the execution of arbitrary code. In addition a number of crashes
-were addressed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8.27-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your htmldoc packages.</p>
-
-<p>For the detailed security status of htmldoc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/htmldoc">https://security-tracker.debian.org/tracker/htmldoc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2700.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2701.data b/english/lts/security/2021/dla-2701.data
deleted file mode 100644
index d68e266dd13..00000000000
--- a/english/lts/security/2021/dla-2701.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2701-1 openexr</define-tag>
-<define-tag report_date>2021-07-03</define-tag>
-<define-tag secrefs>CVE-2020-16587 CVE-2021-3474 CVE-2021-3475 CVE-2021-3476 CVE-2021-3477 CVE-2021-3478 CVE-2021-3479 CVE-2021-3598 CVE-2021-20296 CVE-2021-23215 CVE-2021-26260 Bug#986796 Bug#990450</define-tag>
-<define-tag packages>openexr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2701.wml b/english/lts/security/2021/dla-2701.wml
deleted file mode 100644
index daad8bf8614..00000000000
--- a/english/lts/security/2021/dla-2701.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in OpenEXR, a library and
-tools for the OpenEXR high dynamic-range (HDR) image format. An
-attacker could cause a denial of service (DoS) through application
-crash and excessive memory consumption.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.2.0-11+deb9u3.</p>
-
-<p>We recommend that you upgrade your openexr packages.</p>
-
-<p>For the detailed security status of openexr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openexr">https://security-tracker.debian.org/tracker/openexr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2701.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2702.data b/english/lts/security/2021/dla-2702.data
deleted file mode 100644
index 1890892a9d7..00000000000
--- a/english/lts/security/2021/dla-2702.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2702-1 djvulibre</define-tag>
-<define-tag report_date>2021-07-04</define-tag>
-<define-tag secrefs>CVE-2021-3630</define-tag>
-<define-tag packages>djvulibre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2702.wml b/english/lts/security/2021/dla-2702.wml
deleted file mode 100644
index 1190641769e..00000000000
--- a/english/lts/security/2021/dla-2702.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds write vulnerability was found in DjVuLibre in
-DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file
-which may lead to crash and segmentation fault.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.5.27.1-7+deb9u2.</p>
-
-<p>We recommend that you upgrade your djvulibre packages.</p>
-
-<p>For the detailed security status of djvulibre please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/djvulibre">https://security-tracker.debian.org/tracker/djvulibre</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2702.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2703.data b/english/lts/security/2021/dla-2703.data
deleted file mode 100644
index 4977fe01f44..00000000000
--- a/english/lts/security/2021/dla-2703.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2703-1 ieee-data</define-tag>
-<define-tag report_date>2021-07-04</define-tag>
-<define-tag secrefs>Bug#908623 Bug#932711</define-tag>
-<define-tag packages>ieee-data</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2703.wml b/english/lts/security/2021/dla-2703.wml
deleted file mode 100644
index 910194d33bd..00000000000
--- a/english/lts/security/2021/dla-2703.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ieee-data package, which provides the OUI and IAB listings of
-identifiers assigned by IEEE Standards Association, ships a script
-(update-ieee-data) which queries ieee.org to download the most recent
-dataset and save it to /var/lib/ieee-data/.</p>
-
-<p>This script broke for stretch at the end of 2018 when the URL changed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-20160613.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ieee-data packages.</p>
-
-<p>For the detailed security status of ieee-data please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ieee-data">https://security-tracker.debian.org/tracker/ieee-data</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2703.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2704.data b/english/lts/security/2021/dla-2704.data
deleted file mode 100644
index 422918bd9db..00000000000
--- a/english/lts/security/2021/dla-2704.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2704-1 libxstream-java</define-tag>
-<define-tag report_date>2021-07-05</define-tag>
-<define-tag secrefs>CVE-2021-29505 Bug#989491</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2704.wml b/english/lts/security/2021/dla-2704.wml
deleted file mode 100644
index 170e673873b..00000000000
--- a/english/lts/security/2021/dla-2704.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability in XStream, a Java library to serialize objects to and
-from XML, may allow a remote attacker to execute commands of the host
-only by manipulating the processed input stream.
-<p><b>Note</b>: the XStream project recommends to setup its security framework
-with a whitelist limited to the minimal required types, rather than
-relying on the black list (which got updated to address this
-vulnerability). The project is also phasing out maintainance of the
-black list, see <a href="https://x-stream.github.io/security.html">https://x-stream.github.io/security.html</a> .</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.11.1-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>For the detailed security status of libxstream-java please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxstream-java">https://security-tracker.debian.org/tracker/libxstream-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2704.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2705.data b/english/lts/security/2021/dla-2705.data
deleted file mode 100644
index a34892bc5af..00000000000
--- a/english/lts/security/2021/dla-2705.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2705-1 scilab</define-tag>
-<define-tag report_date>2021-07-08</define-tag>
-<define-tag secrefs>CVE-2021-30485 CVE-2021-31229 CVE-2021-31347 CVE-2021-31348 CVE-2021-31598</define-tag>
-<define-tag packages>scilab</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2705.wml b/english/lts/security/2021/dla-2705.wml
deleted file mode 100644
index e64df6d661b..00000000000
--- a/english/lts/security/2021/dla-2705.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been discovered in scilab, particularly in ezXML embedded library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30485">CVE-2021-30485</a>
-
- <p>Descriptionincorrect memory handling, leading to a NULL pointer dereference
- in ezxml_internal_dtd()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31229">CVE-2021-31229</a>
-
- <p>Out-of-bounds write in ezxml_internal_dtd() leading to out-of-bounds write
- of a one byte constant</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31347">CVE-2021-31347</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-31348">CVE-2021-31348</a>
-
- <p>incorrect memory handling in ezxml_parse_str() leading to out-of-bounds read</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31598">CVE-2021-31598</a>
-
- <p>Out-of-bounds write in ezxml_decode() leading to heap corruption</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.5.2-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your scilab packages.</p>
-
-<p>For the detailed security status of scilab please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/scilab">https://security-tracker.debian.org/tracker/scilab</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2705.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2706.data b/english/lts/security/2021/dla-2706.data
deleted file mode 100644
index 93e81a4ebe0..00000000000
--- a/english/lts/security/2021/dla-2706.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2706-1 apache2</define-tag>
-<define-tag report_date>2021-07-09</define-tag>
-<define-tag secrefs>CVE-2020-1927 CVE-2020-1934 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-30641 CVE-2021-31618</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2706.wml b/english/lts/security/2021/dla-2706.wml
deleted file mode 100644
index 886a89c19cf..00000000000
--- a/english/lts/security/2021/dla-2706.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the Apache HTTP server, which
-could result in denial of service. In addition the implementation of
-the MergeSlashes option could result in unexpected behaviour.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.25-3+deb9u10.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>For the detailed security status of apache2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2706.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2707.data b/english/lts/security/2021/dla-2707.data
deleted file mode 100644
index 1ae3e06dbc9..00000000000
--- a/english/lts/security/2021/dla-2707.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2707-1 sogo</define-tag>
-<define-tag report_date>2021-07-12</define-tag>
-<define-tag secrefs>CVE-2021-33054</define-tag>
-<define-tag packages>sogo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2707.wml b/english/lts/security/2021/dla-2707.wml
deleted file mode 100644
index 34605628c07..00000000000
--- a/english/lts/security/2021/dla-2707.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in sogo.</p>
-
-<p>SOGo does not validate the signatures of any SAML assertions it receives.
-Any actor with network access to the deployment could impersonate users when
-SAML is the authentication method.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.2.6-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your sogo packages.</p>
-
-<p>ATTENTION! If you are using SAML authentication, use sogo-tool to immediately
-delete users sessions and force all users to visit the login page:</p>
-
- <p>sogo-tool -v expire-sessions 1</p>
- <p>systemctl restart memcached</p>
-
-<p>For the detailed security status of sogo please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sogo">https://security-tracker.debian.org/tracker/sogo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2707.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2708.data b/english/lts/security/2021/dla-2708.data
deleted file mode 100644
index f71e5f2f378..00000000000
--- a/english/lts/security/2021/dla-2708.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2708-1 php7.0</define-tag>
-<define-tag report_date>2021-07-15</define-tag>
-<define-tag secrefs>CVE-2019-18218 CVE-2020-7071 CVE-2021-21702 CVE-2021-21704 CVE-2021-21705 Bug#942830 Bug#990575</define-tag>
-<define-tag packages>php7.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2708.wml b/english/lts/security/2021/dla-2708.wml
deleted file mode 100644
index 6a954580348..00000000000
--- a/english/lts/security/2021/dla-2708.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in php5, a server-side,
-HTML-embedded scripting language. An attacker could cause denial of
-service (DoS), memory corruption and potentially execution of
-arbitrary code, and server-side request forgery (SSRF) bypass.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18218">CVE-2019-18218</a>
-
- <p>fileinfo: cdf_read_property_info in cdf.c does not restrict the
- number of CDF_VECTOR elements, which allows a heap-based buffer
- overflow (4-byte out-of-bounds write).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7071">CVE-2020-7071</a>
-
- <p>When validating URL with functions like filter_var($url,
- FILTER_VALIDATE_URL), PHP will accept an URL with invalid password
- as valid URL. This may lead to functions that rely on URL being
- valid to mis-parse the URL and produce wrong data as components of
- the URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21702">CVE-2021-21702</a>
-
- <p>When using SOAP extension to connect to a SOAP server, a malicious
- SOAP server could return malformed XML data as a response that
- would cause PHP to access a null pointer and thus cause a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21704">CVE-2021-21704</a>
-
- <p>Multiple firebird issues.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21705">CVE-2021-21705</a>
-
- <p>SSRF bypass in FILTER_VALIDATE_URL.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.0.33-0+deb9u11.</p>
-
-<p>We recommend that you upgrade your php7.0 packages.</p>
-
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.0">https://security-tracker.debian.org/tracker/php7.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2708.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2709.data b/english/lts/security/2021/dla-2709.data
deleted file mode 100644
index e323fd35032..00000000000
--- a/english/lts/security/2021/dla-2709.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2709-1 firefox-esr</define-tag>
-<define-tag report_date>2021-07-15</define-tag>
-<define-tag secrefs>CVE-2021-29970 CVE-2021-29976 CVE-2021-30547</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2709.wml b/english/lts/security/2021/dla-2709.wml
deleted file mode 100644
index 95bb428c9d2..00000000000
--- a/english/lts/security/2021/dla-2709.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.12.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2709.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2710-2.data b/english/lts/security/2021/dla-2710-2.data
deleted file mode 100644
index eeffb7e73f2..00000000000
--- a/english/lts/security/2021/dla-2710-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2710-2 rabbitmq-server</define-tag>
-<define-tag report_date>2021-07-26</define-tag>
-<define-tag packages>rabbitmq-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2710-2.wml b/english/lts/security/2021/dla-2710-2.wml
deleted file mode 100644
index f8b1f8de0af..00000000000
--- a/english/lts/security/2021/dla-2710-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the previous upload of the package
-rabbitmq-server versioned 3.6.6-1+deb9u1 introduced a regression in
-function fmt_strip_tags. Big thanks to Christoph Haas for the
-reporting an issue and for testing the update.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.6.6-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your rabbitmq-server packages.</p>
-
-<p>For the detailed security status of rabbitmq-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rabbitmq-server">https://security-tracker.debian.org/tracker/rabbitmq-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2710-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2710.data b/english/lts/security/2021/dla-2710.data
deleted file mode 100644
index f07b40623cb..00000000000
--- a/english/lts/security/2021/dla-2710.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2710-1 rabbitmq-server</define-tag>
-<define-tag report_date>2021-07-26</define-tag>
-<define-tag secrefs>CVE-2017-4965 CVE-2017-4966 CVE-2017-4967 CVE-2019-11281 CVE-2019-11287 CVE-2021-22116</define-tag>
-<define-tag packages>rabbitmq-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2710.wml b/english/lts/security/2021/dla-2710.wml
deleted file mode 100644
index 1f0056fd970..00000000000
--- a/english/lts/security/2021/dla-2710.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in rabbitmq-server, a
-message-broker software.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-4965">CVE-2017-4965</a>
-
- <p>Several forms in the RabbitMQ management UI are vulnerable to XSS
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-4966">CVE-2017-4966</a>
-
- <p>RabbitMQ management UI stores signed-in user credentials in a
- browser's local storage without expiration, making it possible to
- retrieve them using a chained attack</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-4967">CVE-2017-4967</a>
-
- <p>Several forms in the RabbitMQ management UI are vulnerable to XSS
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11281">CVE-2019-11281</a>
-
- <p>The virtual host limits page, and the federation management UI,
- which do not properly sanitize user input. A remote authenticated
- malicious user with administrative access could craft a cross site
- scripting attack that would gain access to virtual hosts and
- policy management information</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11287">CVE-2019-11287</a>
-
- <p>The "X-Reason" HTTP Header can be leveraged to insert a malicious
- Erlang format string that will expand and consume the heap,
- resulting in the server crashing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22116">CVE-2021-22116</a>
-
- <p>A malicious user can exploit the vulnerability by sending
- malicious AMQP messages to the target RabbitMQ instance.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.6.6-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your rabbitmq-server packages.</p>
-
-<p>For the detailed security status of rabbitmq-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rabbitmq-server">https://security-tracker.debian.org/tracker/rabbitmq-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2710.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2711.data b/english/lts/security/2021/dla-2711.data
deleted file mode 100644
index 29aef46e228..00000000000
--- a/english/lts/security/2021/dla-2711.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2711-1 thunderbird</define-tag>
-<define-tag report_date>2021-07-19</define-tag>
-<define-tag secrefs>CVE-2021-29969 CVE-2021-29970 CVE-2021-29976 CVE-2021-30547</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2711.wml b/english/lts/security/2021/dla-2711.wml
deleted file mode 100644
index 5b258bacc7d..00000000000
--- a/english/lts/security/2021/dla-2711.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30547">CVE-2021-30547</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.12.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2711.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2712.data b/english/lts/security/2021/dla-2712.data
deleted file mode 100644
index 331a9286bb0..00000000000
--- a/english/lts/security/2021/dla-2712.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2712-1 libjdom1-java</define-tag>
-<define-tag report_date>2021-07-20</define-tag>
-<define-tag secrefs>CVE-2021-33813</define-tag>
-<define-tag packages>libjdom1-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2712.wml b/english/lts/security/2021/dla-2712.wml
deleted file mode 100644
index ab50e3fcce6..00000000000
--- a/english/lts/security/2021/dla-2712.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>
-It was discovered that there was a potential entity-expansion issue in
-libjdom1-java, a lightweight and fast library for using XML. Attackers
-could have caused a denial of service via a specially-crafted HTTP
-request.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33813">CVE-2021-33813</a>
-
- <p>An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to
- cause a denial of service via a crafted HTTP request.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.1.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libjdom1-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2712.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2713-2.data b/english/lts/security/2021/dla-2713-2.data
deleted file mode 100644
index 1bee541c2d2..00000000000
--- a/english/lts/security/2021/dla-2713-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2713-2 linux</define-tag>
-<define-tag report_date>2021-07-20</define-tag>
-<define-tag secrefs>CVE-2021-3609 CVE-2021-21781 CVE-2021-33909 CVE-2021-34693 Bug#990072</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2713-2.wml b/english/lts/security/2021/dla-2713-2.wml
deleted file mode 100644
index c44452513eb..00000000000
--- a/english/lts/security/2021/dla-2713-2.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3609">CVE-2021-3609</a>
-
- <p>Norbert Slusarek reported a race condition vulnerability in the CAN
- BCM networking protocol, allowing a local attacker to escalate
- privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21781">CVE-2021-21781</a>
-
- <p>"Lilith >_>" of Cisco Talos discovered that the Arm initialisation
- code does not fully initialise the <q>sigpage</q> that is mapped into
- user-space processes to support signal handling. This could
- result in leaking sensitive information, particularly when the
- system is rebooted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33909">CVE-2021-33909</a>
-
- <p>The Qualys Research Labs discovered a size_t-to-int conversion
- vulnerability in the Linux kernel's filesystem layer. An
- unprivileged local attacker able to create, mount, and then delete a
- deep directory structure whose total path length exceeds 1GB, can
- take advantage of this flaw for privilege escalation.</p>
-
- <p>Details can be found in the Qualys advisory at
- <a href="https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt">https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-34693">CVE-2021-34693</a>
-
- <p>Norbert Slusarek discovered an information leak in the CAN BCM
- networking protocol. A local attacker can take advantage of this
- flaw to obtain sensitive information from kernel stack memory.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.272-2. This additionally fixes a regression in the previous
-update (<a href="https://bugs.debian.org/990072">#990072</a>) that affected LXC.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2713-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2713.data b/english/lts/security/2021/dla-2713.data
deleted file mode 100644
index 5da6ab0cfd5..00000000000
--- a/english/lts/security/2021/dla-2713.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2713-1 linux</define-tag>
-<define-tag report_date>2021-07-20</define-tag>
-<define-tag secrefs>CVE-2021-3609 CVE-2021-21781 CVE-2021-33909 CVE-2021-34693 Bug#990072</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2713.wml b/english/lts/security/2021/dla-2713.wml
deleted file mode 100644
index 702746c63b4..00000000000
--- a/english/lts/security/2021/dla-2713.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3609">CVE-2021-3609</a>
-
- <p>Norbert Slusarek reported a race condition vulnerability in the CAN
- BCM networking protocol, allowing a local attacker to escalate
- privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21781">CVE-2021-21781</a>
-
- <p>"Lilith >_>" of Cisco Talos discovered that the Arm initialisation
- code does not fully initialise the <q>sigpage</q> that is mapped into
- user-space processes to support signal handling. This could
- result in leaking sensitive information, particularly when the
- system is rebooted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33909">CVE-2021-33909</a>
-
- <p>The Qualys Research Labs discovered a size_t-to-int conversion
- vulnerability in the Linux kernel's filesystem layer. An
- unprivileged local attacker able to create, mount, and then delete a
- deep directory structure whose total path length exceeds 1GB, can
- take advantage of this flaw for privilege escalation.</p>
-
- <p>Details can be found in the Qualys advisory at
- <a href="https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt">https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-34693">CVE-2021-34693</a>
-
- <p>Norbert Slusarek discovered an information leak in the CAN BCM
- networking protocol. A local attacker can take advantage of this
- flaw to obtain sensitive information from kernel stack memory.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.272-2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2713.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2714.data b/english/lts/security/2021/dla-2714.data
deleted file mode 100644
index 2e5dc580585..00000000000
--- a/english/lts/security/2021/dla-2714.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2714-1 linux-4.19</define-tag>
-<define-tag report_date>2021-07-20</define-tag>
-<define-tag secrefs>CVE-2020-36311 CVE-2021-3609 CVE-2021-33909 CVE-2021-34693 Bug#990072</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2714.wml b/english/lts/security/2021/dla-2714.wml
deleted file mode 100644
index 3a484041bee..00000000000
--- a/english/lts/security/2021/dla-2714.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<p>This update is not yet available for the armhf (ARM EABI hard-float)
-architecture.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36311">CVE-2020-36311</a>
-
- <p>A flaw was discovered in the KVM subsystem for AMD CPUs, allowing an
- attacker to cause a denial of service by triggering destruction of a
- large SEV VM.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3609">CVE-2021-3609</a>
-
- <p>Norbert Slusarek reported a race condition vulnerability in the CAN
- BCM networking protocol, allowing a local attacker to escalate
- privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33909">CVE-2021-33909</a>
-
- <p>The Qualys Research Labs discovered a size_t-to-int conversion
- vulnerability in the Linux kernel's filesystem layer. An
- unprivileged local attacker able to create, mount, and then delete a
- deep directory structure whose total path length exceeds 1GB, can
- take advantage of this flaw for privilege escalation.</p>
-
- <p>Details can be found in the Qualys advisory at
- <a href="https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt">https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-34693">CVE-2021-34693</a>
-
- <p>Norbert Slusarek discovered an information leak in the CAN BCM
- networking protocol. A local attacker can take advantage of this
- flaw to obtain sensitive information from kernel stack memory.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.194-3~deb9u1. This additionally fixes a regression in the
-previous update (<a href="https://bugs.debian.org/990072">#990072</a>) that affected LXC.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2714.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2715.data b/english/lts/security/2021/dla-2715.data
deleted file mode 100644
index 52ce08accef..00000000000
--- a/english/lts/security/2021/dla-2715.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2715-1 systemd</define-tag>
-<define-tag report_date>2021-07-20</define-tag>
-<define-tag secrefs>CVE-2021-33910</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2715.wml b/english/lts/security/2021/dla-2715.wml
deleted file mode 100644
index 6d0d12044ac..00000000000
--- a/english/lts/security/2021/dla-2715.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Labs discovered that an attacker-controlled
-allocation using the alloca() function could result in memory
-corruption, allowing to crash systemd and hence the entire operating
-system.</p>
-
-<p>Details can be found in the Qualys advisory at
-<a href="https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt">https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-232-25+deb9u13.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>For the detailed security status of systemd please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/systemd">https://security-tracker.debian.org/tracker/systemd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2715.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2716.data b/english/lts/security/2021/dla-2716.data
deleted file mode 100644
index 078e71eacdb..00000000000
--- a/english/lts/security/2021/dla-2716.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2716-1 pillow</define-tag>
-<define-tag report_date>2021-07-22</define-tag>
-<define-tag secrefs>CVE-2020-35653 CVE-2021-25290 CVE-2021-28676 CVE-2021-28677 CVE-2021-34552 Bug##991293 Bug##989062</define-tag>
-<define-tag packages>pillow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2716.wml b/english/lts/security/2021/dla-2716.wml
deleted file mode 100644
index d2f9bf3755a..00000000000
--- a/english/lts/security/2021/dla-2716.wml
+++ /dev/null
@@ -1,71 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in pillow (Python Imaging
-Library - PIL).</p>
-
-<p>Affected binary packages:</p>
-
- <p>python-imaging
- python-pil-dbg
- python-pil-doc
- python-pil.imagetk-dbg
- python-pil.imagetk
- python-pil
- python3-pil-dbg
- python3-pil.imagetk-dbg
- python3-pil.imagetk
- python3-pil</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35653">CVE-2020-35653</a>
-
- <p>Pillow through 8.2.0 and PIL (aka Python Imaging Library) through
- 1.1.7 allow an attacker to pass controlled parameters directly into
- a convert function to trigger a buffer overflow in Convert.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25290">CVE-2021-25290</a>
-
- <p>An issue was discovered in Pillow before 8.1.1. In TiffDecode.c,
- there is a negative-offset memcpy with an invalid size.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28676">CVE-2021-28676</a>
-
- <p>An issue was discovered in Pillow before 8.2.0. For FLI data,
- FliDecode did not properly check that the block advance was
- non-zero, potentially leading to an infinite loop on load.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28677">CVE-2021-28677</a>
-
- <p>An issue was discovered in Pillow before 8.2.0. For EPS data, the
- readline implementation used in EPSImageFile has to deal with any
- combination of \r and \n as line endings. It used an accidentally
- quadratic method of accumulating lines while looking for a line
- ending. A malicious EPS file could use this to perform a DoS of
- Pillow in the open phase, before an image was accepted for opening.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-34552">CVE-2021-34552</a>
-
- <p>Pillow through 8.2.0 and PIL (aka Python Imaging Library) through
- 1.1.7 allow an attacker to pass controlled parameters directly into
- a convert function to trigger a buffer overflow in Convert.c.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0.0-4+deb9u3.</p>
-
-<p>We recommend that you upgrade your pillow packages.</p>
-
-<p>For the detailed security status of pillow please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pillow">https://security-tracker.debian.org/tracker/pillow</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2716.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2717-2.data b/english/lts/security/2021/dla-2717-2.data
deleted file mode 100644
index a5a9276e167..00000000000
--- a/english/lts/security/2021/dla-2717-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2717-2 redis</define-tag>
-<define-tag report_date>2021-08-27</define-tag>
-<define-tag secrefs>CVE-2021-32761</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2717-2.wml b/english/lts/security/2021/dla-2717-2.wml
deleted file mode 100644
index e87ce2e79e5..00000000000
--- a/english/lts/security/2021/dla-2717-2.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>
-It was discovered that there was a regression in a previous update to the Redis
-key-value database.
-</p>
-
-<p>A test was not correctly backported from the latest upstream release which
-meant that binaries were not available on all LTS platforms. The Redis server
-code was unaffected.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32761">CVE-2021-32761</a></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
-3:3.2.6-3+deb9u6.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2717.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2717.data b/english/lts/security/2021/dla-2717.data
deleted file mode 100644
index c029a5c7730..00000000000
--- a/english/lts/security/2021/dla-2717.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2717-1 redis</define-tag>
-<define-tag report_date>2021-07-22</define-tag>
-<define-tag secrefs>CVE-2021-32761</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2717.wml b/english/lts/security/2021/dla-2717.wml
deleted file mode 100644
index d5c9053d1b2..00000000000
--- a/english/lts/security/2021/dla-2717.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were several integer overflow issues in
-Redis, a popular key-value database system. Some BITFIELD-related commands
-were affected on 32-bit systems.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32761">CVE-2021-32761</a></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-3:3.2.6-3+deb9u5.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2717.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2718.data b/english/lts/security/2021/dla-2718.data
deleted file mode 100644
index 380d0c0ce83..00000000000
--- a/english/lts/security/2021/dla-2718.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2718-1 intel-microcode</define-tag>
-<define-tag report_date>2021-07-26</define-tag>
-<define-tag secrefs>CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2718.wml b/english/lts/security/2021/dla-2718.wml
deleted file mode 100644
index b03182e9818..00000000000
--- a/english/lts/security/2021/dla-2718.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update ships updated CPU microcode for some types of Intel CPUs
-and provides mitigations for security vulnerabilities which could
-result in privilege escalation in combination with VT-d and various
-side channel attacks.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.20210608.2~deb9u2.</p>
-
-<p>Please note that one of the processors is not receiving this update
-and so the users of 0x906ea processors that don't have Intel Wireless
-on-board can use the package from the buster-security, instead.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>For the detailed security status of intel-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2718.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2719.data b/english/lts/security/2021/dla-2719.data
deleted file mode 100644
index bfe108f0073..00000000000
--- a/english/lts/security/2021/dla-2719.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2719-1 ruby-actionpack-page-caching</define-tag>
-<define-tag report_date>2021-07-23</define-tag>
-<define-tag secrefs>CVE-2020-8159 Bug#960680</define-tag>
-<define-tag packages>ruby-actionpack-page-caching</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2719.wml b/english/lts/security/2021/dla-2719.wml
deleted file mode 100644
index 18a7ee02359..00000000000
--- a/english/lts/security/2021/dla-2719.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ooooooo_q discovered that the actionpack_page-caching Ruby gem, a
-static page caching module for Rails, allows an attacker to write
-arbitrary files to a web server, potentially resulting in remote code
-execution if the attacker can write unescaped ERB to a view.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.2-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-actionpack-page-caching packages.</p>
-
-<p>For the detailed security status of ruby-actionpack-page-caching please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-actionpack-page-caching">https://security-tracker.debian.org/tracker/ruby-actionpack-page-caching</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2719.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2720.data b/english/lts/security/2021/dla-2720.data
deleted file mode 100644
index d94cc622521..00000000000
--- a/english/lts/security/2021/dla-2720.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2720-1 aspell</define-tag>
-<define-tag report_date>2021-7-25</define-tag>
-<define-tag secrefs>CVE-2019-17544 CVE-2019-25051</define-tag>
-<define-tag packages>aspell</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2720.wml b/english/lts/security/2021/dla-2720.wml
deleted file mode 100644
index db713063956..00000000000
--- a/english/lts/security/2021/dla-2720.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issue have been found in aspell, the GNU Aspell spell-checker.</p>
-
-<p>One issue is related to a stack-based buffer over-read via an isolated \
-character when processing a configuration file.
-The other issue is related to a heap-based buffer overflow.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.60.7~20110707-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your aspell packages.</p>
-
-<p>For the detailed security status of aspell please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/aspell">https://security-tracker.debian.org/tracker/aspell</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2720.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2721.data b/english/lts/security/2021/dla-2721.data
deleted file mode 100644
index 38e1450a6df..00000000000
--- a/english/lts/security/2021/dla-2721.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2721-1 drupal7</define-tag>
-<define-tag report_date>2021-7-26</define-tag>
-<define-tag secrefs>CVE-2021-32610</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2721.wml b/english/lts/security/2021/dla-2721.wml
deleted file mode 100644
index f88d97425fb..00000000000
--- a/english/lts/security/2021/dla-2721.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Drupal project uses the pear Archive_Tar library, which has
-released a security update that impacts Drupal.</p>
-
-<p>The vulnerability is mitigated by the fact that Drupal core's use of
-the Archive_Tar library is not vulnerable, as it does not permit
-symlinks.</p>
-
-<p>Exploitation may be possible if contrib or custom code uses the
-library to extract tar archives (for example .tar, .tar.gz, .bz2, or
-.tlz) which come from a potentially untrusted source.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.52-2+deb9u16.</p>
-
-<p>We recommend that you upgrade your drupal7 packages.</p>
-
-<p>For the detailed security status of drupal7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/drupal7">https://security-tracker.debian.org/tracker/drupal7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-
-<p>
-<p>--u3/rZRmxL6MmkK24
-Content-Type: application/pgp-signature; name="signature.asc"</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2721.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2722.data b/english/lts/security/2021/dla-2722.data
deleted file mode 100644
index e963bc48118..00000000000
--- a/english/lts/security/2021/dla-2722.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2722-1 libsndfile</define-tag>
-<define-tag report_date>2021-7-29</define-tag>
-<define-tag secrefs>CVE-2021-3246</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2722.wml b/english/lts/security/2021/dla-2722.wml
deleted file mode 100644
index e241ffb0bf6..00000000000
--- a/english/lts/security/2021/dla-2722.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libsndfile, a library for reading/writing audio
-files. A crafted WAV file can trigger a heap buffer overflow and might
-allow exectution of arbitrary code.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.27-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>For the detailed security status of libsndfile please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsndfile">https://security-tracker.debian.org/tracker/libsndfile</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2722.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2723.data b/english/lts/security/2021/dla-2723.data
deleted file mode 100644
index bd23863e949..00000000000
--- a/english/lts/security/2021/dla-2723.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2723-1 linuxptp</define-tag>
-<define-tag report_date>2021-7-31</define-tag>
-<define-tag secrefs>CVE-2021-3570</define-tag>
-<define-tag packages>linuxptp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2723.wml b/english/lts/security/2021/dla-2723.wml
deleted file mode 100644
index 0f60b25cbf8..00000000000
--- a/english/lts/security/2021/dla-2723.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Miroslav Lichvar reported that the ptp4l program in linuxptp, an
-implementation of the Precision Time Protocol (PTP), does not validate the
-messageLength field of incoming messages, allowing a remote attacker to
-cause a denial of service, information leak, or potentially remote code
-execution.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your linuxptp packages.</p>
-
-<p>For the detailed security status of linuxptp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linuxptp">https://security-tracker.debian.org/tracker/linuxptp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2723.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2724.data b/english/lts/security/2021/dla-2724.data
deleted file mode 100644
index 1fc6b789c3c..00000000000
--- a/english/lts/security/2021/dla-2724.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2724-1 condor</define-tag>
-<define-tag report_date>2021-8-01</define-tag>
-<define-tag secrefs>CVE-2019-18823 Bug#963777</define-tag>
-<define-tag packages>condor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2724.wml b/english/lts/security/2021/dla-2724.wml
deleted file mode 100644
index 6a1bbec028d..00000000000
--- a/english/lts/security/2021/dla-2724.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>HTCondor, a distributed workload management system, has Incorrect Access
-Control. It is possible to use a different authentication method to submit a
-job than the administrator has specified. If the administrator has configured
-the READ or WRITE methods to include CLAIMTOBE, then it is possible to
-impersonate another user to the condor_schedd, for example to submit or remove
-jobs.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8.4.11~dfsg.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your condor packages.</p>
-
-<p>For the detailed security status of condor please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/condor">https://security-tracker.debian.org/tracker/condor</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2724.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2725.data b/english/lts/security/2021/dla-2725.data
deleted file mode 100644
index c75ef786a65..00000000000
--- a/english/lts/security/2021/dla-2725.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2725-1 lrzip</define-tag>
-<define-tag report_date>2021-8-01</define-tag>
-<define-tag secrefs>CVE-2017-8844 CVE-2017-8846 CVE-2017-9928 CVE-2017-9929 CVE-2018-5650 CVE-2018-5747 CVE-2018-5786 CVE-2018-10685 CVE-2018-11496</define-tag>
-<define-tag packages>lrzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2725.wml b/english/lts/security/2021/dla-2725.wml
deleted file mode 100644
index 9942d20e111..00000000000
--- a/english/lts/security/2021/dla-2725.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in lrzip, a compression
-program. Heap-based and stack buffer overflows, use-after-free and infinite
-loops would allow attackers to cause a denial of service or possibly other
-unspecified impact via a crafted file.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.631-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your lrzip packages.</p>
-
-<p>For the detailed security status of lrzip please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/lrzip">https://security-tracker.debian.org/tracker/lrzip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2725.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2726.data b/english/lts/security/2021/dla-2726.data
deleted file mode 100644
index c662ccd5085..00000000000
--- a/english/lts/security/2021/dla-2726.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2726-1 shiro</define-tag>
-<define-tag report_date>2021-08-02</define-tag>
-<define-tag secrefs>CVE-2020-13933 CVE-2020-17510 Bug#968753</define-tag>
-<define-tag packages>shiro</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2726.wml b/english/lts/security/2021/dla-2726.wml
deleted file mode 100644
index 852d71644d6..00000000000
--- a/english/lts/security/2021/dla-2726.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there were two issues in shiro, a security
-framework for Java applications:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13933">CVE-2020-13933</a>
-
- <p>Fix an authentication bypass resulting from a specially
- crafted HTTP request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17510">CVE-2020-17510</a>
-
- <p>Fix an authentication bypass resulting from a specially
- crafted HTTP request.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.3.2-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your shiro packages.</p>
-
-<p>For the detailed security status of shiro please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/shiro">https://security-tracker.debian.org/tracker/shiro</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2726.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2727.data b/english/lts/security/2021/dla-2727.data
deleted file mode 100644
index 17813bd471b..00000000000
--- a/english/lts/security/2021/dla-2727.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2727-1 pyxdg</define-tag>
-<define-tag report_date>2021-08-03</define-tag>
-<define-tag secrefs>CVE-2019-12761</define-tag>
-<define-tag packages>pyxdg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2727.wml b/english/lts/security/2021/dla-2727.wml
deleted file mode 100644
index 17c905bfbf3..00000000000
--- a/english/lts/security/2021/dla-2727.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a code injection issue in PyXDG, a library
-used to locate freedesktop.org configuration/cache/etc. directories.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12761">CVE-2019-12761</a>
-
- <p>A code injection issue was discovered in PyXDG before 0.26 via crafted
- Python code in a Category element of a Menu XML document in a .menu file.
- XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the
- directory containing this file. This is due to a lack of sanitization in
- xdg/Menu.py before an eval call.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.25-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your pyxdg packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2727.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2728.data b/english/lts/security/2021/dla-2728.data
deleted file mode 100644
index 33ab88724cb..00000000000
--- a/english/lts/security/2021/dla-2728.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2728-1 vlc</define-tag>
-<define-tag report_date>2021-08-03</define-tag>
-<define-tag secrefs>CVE-2021-25801 CVE-2021-25802 CVE-2021-25803 CVE-2021-25804</define-tag>
-<define-tag packages>vlc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2728.wml b/english/lts/security/2021/dla-2728.wml
deleted file mode 100644
index aa9199d5d46..00000000000
--- a/english/lts/security/2021/dla-2728.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of issues in VideoLAN (aka 'vlc',
-a popular video and multimedia player:</p>
-
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25801">CVE-2021-25801</a>
-
- <p>A buffer overflow vulnerability in the __Parse_indx component allowed
- attackers to cause an out-of-bounds read via a crafted .avi file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25802">CVE-2021-25802</a>
-
- <p>A buffer overflow vulnerability in the AVI_ExtractSubtitle component
- could have allowed attackers to cause an out-of-bounds read via a crafted
- .avi file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25803">CVE-2021-25803</a>
-
- <p>A buffer overflow vulnerability in the vlc_input_attachment_New
- component allowed attackers to cause an out-of-bounds read via a
- specially-crafted .avi file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25804">CVE-2021-25804</a>
-
- <p>A NULL-pointer dereference in "Open" in avi.c can result in a denial of
- service (DoS) vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-3.0.11-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your vlc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2728.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2729.data b/english/lts/security/2021/dla-2729.data
deleted file mode 100644
index 9039c2c8b43..00000000000
--- a/english/lts/security/2021/dla-2729.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2729-1 asterisk</define-tag>
-<define-tag report_date>2021-08-04</define-tag>
-<define-tag secrefs>CVE-2021-32558</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2729.wml b/english/lts/security/2021/dla-2729.wml
deleted file mode 100644
index cafb96357c1..00000000000
--- a/english/lts/security/2021/dla-2729.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the Asterisk telephony system.
-If the IAX2 channel driver received a packet that contained an unsupported
-media format, a crash could have occured.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32558">CVE-2021-32558</a>
-
- <p>An issue was discovered in Sangoma Asterisk 13.x before 13.38.3,
- 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and
- Certified Asterisk before 16.8-cert10. If the IAX2 channel driver
- receives a packet that contains an unsupported media format, a crash
- can occur.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:13.14.1~dfsg-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>In addition, Asterisk are tracking this issue as <tt>AST-2021-008</tt></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2729.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2730.data b/english/lts/security/2021/dla-2730.data
deleted file mode 100644
index cefe95ea96e..00000000000
--- a/english/lts/security/2021/dla-2730.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2730-1 libpam-tacplus</define-tag>
-<define-tag report_date>2021-08-04</define-tag>
-<define-tag secrefs>CVE-2020-13881 Bug#962830</define-tag>
-<define-tag packages>libpam-tacplus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2730.wml b/english/lts/security/2021/dla-2730.wml
deleted file mode 100644
index c066ef94591..00000000000
--- a/english/lts/security/2021/dla-2730.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that there was an issue in libpam-tacplus (a
-security module for using the TACACS+ authentication service) where
-shared secrets such as private server keys were being added in
-the clear to various logs.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.8-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libpam-tacplus packages.</p>
-
-<p>For the detailed security status of libpam-tacplus please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libpam-tacplus">https://security-tracker.debian.org/tracker/libpam-tacplus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2730.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2731.data b/english/lts/security/2021/dla-2731.data
deleted file mode 100644
index 9403a4321ca..00000000000
--- a/english/lts/security/2021/dla-2731.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2731-1 wordpress</define-tag>
-<define-tag report_date>2021-08-04</define-tag>
-<define-tag secrefs>not assigned yet</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2731.wml b/english/lts/security/2021/dla-2731.wml
deleted file mode 100644
index 5715c7fb2e5..00000000000
--- a/english/lts/security/2021/dla-2731.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue affects WordPress, a weblog manager, versions
-between 3.7 and 5.7. This update fixes the following security issues:
-Object injection in PHPMailer (<a href="https://security-tracker.debian.org/tracker/CVE-2020-36326">CVE-2020-36326</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2018-19296">CVE-2018-19296</a>).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.7.21+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2731.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2732.data b/english/lts/security/2021/dla-2732.data
deleted file mode 100644
index 172bcf96880..00000000000
--- a/english/lts/security/2021/dla-2732.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2732-1 openexr</define-tag>
-<define-tag report_date>2021-08-04</define-tag>
-<define-tag secrefs>CVE-2021-3605 CVE-2021-20299 CVE-2021-20300 CVE-2021-20302 CVE-2021-20303 Bug#990899</define-tag>
-<define-tag packages>openexr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2732.wml b/english/lts/security/2021/dla-2732.wml
deleted file mode 100644
index 0a5056ce3e5..00000000000
--- a/english/lts/security/2021/dla-2732.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in OpenEXR, a library and
-tools for the OpenEXR high dynamic-range (HDR) image format. An
-attacker could cause a denial of service (DoS) through application
-crash, and possibly execute code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.2.0-11+deb9u4.</p>
-
-<p>We recommend that you upgrade your openexr packages.</p>
-
-<p>For the detailed security status of openexr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openexr">https://security-tracker.debian.org/tracker/openexr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2732.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2733.data b/english/lts/security/2021/dla-2733.data
deleted file mode 100644
index d68a1870804..00000000000
--- a/english/lts/security/2021/dla-2733.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2733-1 tomcat8</define-tag>
-<define-tag report_date>2021-8-05</define-tag>
-<define-tag secrefs>CVE-2021-30640 CVE-2021-33037 Bug#991046 Bug#991046</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2733.wml b/english/lts/security/2021/dla-2733.wml
deleted file mode 100644
index 1c2a9f7c075..00000000000
--- a/english/lts/security/2021/dla-2733.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30640">CVE-2021-30640</a>
-
- <p>A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to
- authenticate using variations of a valid user name and/or to bypass some of
- the protection provided by the LockOut Realm.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33037">CVE-2021-33037</a>
-
- <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
- header in some circumstances leading to the possibility to request
- smuggling when used with a reverse proxy. Specifically: - Tomcat
- incorrectly ignored the transfer encoding header if the client declared it
- would only accept an HTTP/1.0 response; - Tomcat honoured the identify
- encoding; and - Tomcat did not ensure that, if present, the chunked
- encoding was the final encoding.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8.5.54-0+deb9u7.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>For the detailed security status of tomcat8 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat8">https://security-tracker.debian.org/tracker/tomcat8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2733.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2734.data b/english/lts/security/2021/dla-2734.data
deleted file mode 100644
index e218b00e869..00000000000
--- a/english/lts/security/2021/dla-2734.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2734-1 curl</define-tag>
-<define-tag report_date>2021-08-13</define-tag>
-<define-tag secrefs>CVE-2021-22898 CVE-2021-22924</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2734.wml b/english/lts/security/2021/dla-2734.wml
deleted file mode 100644
index fdc838ce3d2..00000000000
--- a/english/lts/security/2021/dla-2734.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in curl,
-a client-side URL transfer library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22898">CVE-2021-22898</a>
-
- <p>Information disclosure in connection to telnet servers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22924">CVE-2021-22924</a>
-
- <p>Bad connection reuse due to flawed path name checks.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.52.1-5+deb9u15.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2734.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2735.data b/english/lts/security/2021/dla-2735.data
deleted file mode 100644
index cdfd06ff357..00000000000
--- a/english/lts/security/2021/dla-2735.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2735-1 ceph</define-tag>
-<define-tag report_date>2021-8-11</define-tag>
-<define-tag secrefs>CVE-2018-14662 CVE-2018-16846 CVE-2020-1760 CVE-2020-10753 CVE-2021-3524 Bug#921948 Bug#921947 Bug#956142 Bug#975300 Bug#988889</define-tag>
-<define-tag packages>ceph</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2735.wml b/english/lts/security/2021/dla-2735.wml
deleted file mode 100644
index 0ecf42b6066..00000000000
--- a/english/lts/security/2021/dla-2735.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Ceph, a distributed storage
-and file system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14662">CVE-2018-14662</a>
-
- <p>Authenticated ceph users with read only permissions could steal dm-crypt
- encryption keys used in ceph disk encryption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16846">CVE-2018-16846</a>
-
- <p>Authenticated ceph RGW users can cause a denial of service against OMAPs
- holding bucket indices.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10753">CVE-2020-10753</a>
-
- <p>A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object
- Gateway).
- The vulnerability is related to the injection of HTTP headers via a CORS
- ExposeHeader tag. The newline character in the ExposeHeader tag in the
- CORS configuration file generates a header injection in the response when
- the CORS request is made.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1760">CVE-2020-1760</a>
-
- <p>A flaw was found in the Ceph Object Gateway, where it supports request
- sent by an anonymous user in Amazon S3. This flaw could lead to potential
- XSS attacks due to the lack of proper neutralization of untrusted input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3524">CVE-2021-3524</a>
-
- <p>A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway)
- The vulnerability is related to the injection of HTTP headers via a CORS
- ExposeHeader tag. The newline character in the ExposeHeader tag in the
- CORS configuration file generates a header injection in the response when
- the CORS request is made. In addition, the prior bug fix for CVE-2020 10753 did not account for the use of \r as a header separator, thus a new
- flaw has been created.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-10.2.11-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your ceph packages.</p>
-
-<p>For the detailed security status of ceph please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ceph">https://security-tracker.debian.org/tracker/ceph</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2735.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2736.data b/english/lts/security/2021/dla-2736.data
deleted file mode 100644
index 393d69093bf..00000000000
--- a/english/lts/security/2021/dla-2736.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2736-1 lynx</define-tag>
-<define-tag report_date>2021-08-09</define-tag>
-<define-tag secrefs>CVE-2021-38165</define-tag>
-<define-tag packages>lynx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2736.wml b/english/lts/security/2021/dla-2736.wml
deleted file mode 100644
index 22e1b69959b..00000000000
--- a/english/lts/security/2021/dla-2736.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a remote authentication credential leak in
-the "lynx" text-based web browser.</p>
-
-<p>The package now correctly handles authentication subcomponents in URIs (eg.
-<tt>https://user:pass@example.com</tt>) to avoid remote attackers discovering
-cleartext credentials in SSL connection data.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38165">CVE-2021-38165</a>
-
- <p> Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which
- allows remote attackers to discover cleartext credentials because they may
- appear in SNI data.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
-2.8.9dev11-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your lynx packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2736.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2737.data b/english/lts/security/2021/dla-2737.data
deleted file mode 100644
index adf0a1cf0c9..00000000000
--- a/english/lts/security/2021/dla-2737.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2737-1 openjdk-8</define-tag>
-<define-tag report_date>2021-08-09</define-tag>
-<define-tag secrefs>CVE-2021-2341 CVE-2021-2369 CVE-2021-2388</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2737.wml b/english/lts/security/2021/dla-2737.wml
deleted file mode 100644
index 5bfac911160..00000000000
--- a/english/lts/security/2021/dla-2737.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-resulting in bypass of sandbox restrictions, incorrect validation of
-signed Jars or information disclosure.</p>
-
-<p>Thanks to Thorsten Glaser and ⮡ tarent for contributing the updated
-packages to address these vulnerabilities.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u302-b08-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2737.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2738.data b/english/lts/security/2021/dla-2738.data
deleted file mode 100644
index c74f02dbded..00000000000
--- a/english/lts/security/2021/dla-2738.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2738-1 c-ares</define-tag>
-<define-tag report_date>2021-8-10</define-tag>
-<define-tag secrefs>CVE-2021-3672</define-tag>
-<define-tag packages>c-ares</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2738.wml b/english/lts/security/2021/dla-2738.wml
deleted file mode 100644
index 41d3ec24a26..00000000000
--- a/english/lts/security/2021/dla-2738.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in c-ares, an asynchronous name resolver.
-Missing input validation of host names returned by Domain Name Servers can
-lead to output of wrong hostnames.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.12.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your c-ares packages.</p>
-
-<p>For the detailed security status of c-ares please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/c-ares">https://security-tracker.debian.org/tracker/c-ares</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2738.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2739.data b/english/lts/security/2021/dla-2739.data
deleted file mode 100644
index 8968fab0322..00000000000
--- a/english/lts/security/2021/dla-2739.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2739-1 libspf2</define-tag>
-<define-tag report_date>2021-8-11</define-tag>
-<define-tag secrefs>CVE-2021-20314</define-tag>
-<define-tag packages>libspf2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2739.wml b/english/lts/security/2021/dla-2739.wml
deleted file mode 100644
index a5e345a18ef..00000000000
--- a/english/lts/security/2021/dla-2739.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Philipp Jeitner and Haya Shulman discovered a stack-based buffer
-overflow in libspf2, a library for validating mail senders with SPF,
-which could result in denial of service, or potentially execution of
-arbitrary code when processing a specially crafted SPF record.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.10-7+deb9u1.</p>
-
-<p>We recommend that you upgrade your libspf2 packages.</p>
-
-<p>For the detailed security status of libspf2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libspf2">https://security-tracker.debian.org/tracker/libspf2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2739.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2740.data b/english/lts/security/2021/dla-2740.data
deleted file mode 100644
index 91898dd7cb0..00000000000
--- a/english/lts/security/2021/dla-2740.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2740-1 firefox-esr</define-tag>
-<define-tag report_date>2021-08-12</define-tag>
-<define-tag secrefs>CVE-2021-29980 CVE-2021-29984 CVE-2021-29985 CVE-2021-29986 CVE-2021-29988 CVE-2021-29989</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2740.wml b/english/lts/security/2021/dla-2740.wml
deleted file mode 100644
index 4c4fbb55aaa..00000000000
--- a/english/lts/security/2021/dla-2740.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.13.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2740.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2741.data b/english/lts/security/2021/dla-2741.data
deleted file mode 100644
index ad46af0cbc0..00000000000
--- a/english/lts/security/2021/dla-2741.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2741-1 commons-io</define-tag>
-<define-tag report_date>2021-8-12</define-tag>
-<define-tag secrefs>CVE-2021-29425</define-tag>
-<define-tag packages>commons-io</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2741.wml b/english/lts/security/2021/dla-2741.wml
deleted file mode 100644
index 692f0198c02..00000000000
--- a/english/lts/security/2021/dla-2741.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Lukas Euler discovered a path traversal vulnerability in commons-io, a Java
-library for common useful IO related classes. When invoking the method
-FileNameUtils.normalize with an improper input string, like "//../foo", or
-"\\..\foo", the result would be the same value, thus possibly providing access
-to files in the parent directory, but not further above (thus <q>limited</q> path
-traversal), if the calling code would use the result to construct a path value.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.5-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your commons-io packages.</p>
-
-<p>For the detailed security status of commons-io please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/commons-io">https://security-tracker.debian.org/tracker/commons-io</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2741.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2742-2.data b/english/lts/security/2021/dla-2742-2.data
deleted file mode 100644
index ee179bca489..00000000000
--- a/english/lts/security/2021/dla-2742-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2742-2 ffmpeg</define-tag>
-<define-tag report_date>2021-08-22</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2742-2.wml b/english/lts/security/2021/dla-2742-2.wml
deleted file mode 100644
index 48d52e3ea0e..00000000000
--- a/english/lts/security/2021/dla-2742-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>During the backporting of one of patches in <a href="https://security-tracker.debian.org/tracker/CVE-2020-22021">CVE-2020-22021</a> one line was wrongly
-interpreted and it caused the regression during the deinterlacing process.
-Thanks to Jari Ruusu for the reporting the issue and for the testing of
-prepared update.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7:3.2.15-0+deb9u4.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2742-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2742.data b/english/lts/security/2021/dla-2742.data
deleted file mode 100644
index 1d3d43aaef8..00000000000
--- a/english/lts/security/2021/dla-2742.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2742-1 ffmpeg</define-tag>
-<define-tag report_date>2021-08-14</define-tag>
-<define-tag secrefs>CVE-2020-21041 CVE-2020-22015 CVE-2020-22016 CVE-2020-22020 CVE-2020-22021 CVE-2020-22022 CVE-2020-22023 CVE-2020-22025 CVE-2020-22026 CVE-2020-22028 CVE-2020-22031 CVE-2020-22032 CVE-2020-22036 CVE-2021-3566 CVE-2021-38114</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2742.wml b/english/lts/security/2021/dla-2742.wml
deleted file mode 100644
index a6e4fda768b..00000000000
--- a/english/lts/security/2021/dla-2742.wml
+++ /dev/null
@@ -1,114 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been discovered in ffmpeg.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21041">CVE-2020-21041</a>
-
- <p>Buffer Overflow vulnerability exists via apng_do_inverse_blend in
- libavcodec/pngenc.c, which could let a remote malicious user cause a
- Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22015">CVE-2020-22015</a>
-
- <p>Buffer Overflow vulnerability in mov_write_video_tag due to the out of
- bounds in libavformat/movenc.c, which could let a remote malicious user
- obtain sensitive information, cause a Denial of Service, or execute
- arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22016">CVE-2020-22016</a>
-
- <p>A heap-based Buffer Overflow vulnerability at libavcodec/get_bits.h when
- writing .mov files, which might lead to memory corruption and other
- potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22020">CVE-2020-22020</a>
-
- <p>Buffer Overflow vulnerability in the build_diff_map function in
- libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause
- a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22021">CVE-2020-22021</a>
-
- <p>Buffer Overflow vulnerability at filter_edges function in
- libavfilter/vf_yadif.c, which could let a remote malicious user cause a
- Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22022">CVE-2020-22022</a>
-
- <p>A heap-based Buffer Overflow vulnerability exists in filter_frame at
- libavfilter/vf_fieldorder.c, which might lead to memory corruption and other
- potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22023">CVE-2020-22023</a>
-
- <p>A heap-based Buffer Overflow vulnerabililty exists in filter_frame at
- libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and
- other potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22025">CVE-2020-22025</a>
-
- <p>A heap-based Buffer Overflow vulnerability exists in gaussian_blur at
- libavfilter/vf_edgedetect.c, which might lead to memory corruption and other
- potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22026">CVE-2020-22026</a>
-
- <p>Buffer Overflow vulnerability exists in the config_input function at
- libavfilter/af_tremolo.c, which could let a remote malicious user cause a
- Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22028">CVE-2020-22028</a>
-
- <p>Buffer Overflow vulnerability in filter_vertically_8 at
- libavfilter/vf_avgblur.c, which could cause a remote Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22031">CVE-2020-22031</a>
-
- <p>A Heap-based Buffer Overflow vulnerability in filter16_complex_low, which
- might lead to memory corruption and other potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22032">CVE-2020-22032</a>
-
- <p>A heap-based Buffer Overflow vulnerability in gaussian_blur, which might
- lead to memory corruption and other potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22036">CVE-2020-22036</a>
-
- <p>A heap-based Buffer Overflow vulnerability in filter_intra at
- libavfilter/vf_bwdif.c, which might lead to memory corruption and other
- potential consequences.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3566">CVE-2021-3566</a>
-
- <p>The tty demuxer did not have a <q>read_probe</q> function assigned to it. By
- crafting a legitimate <q>ffconcat</q> file that references an image, followed by
- a file the triggers the tty demuxer, the contents of the second file will be
- copied into the output file verbatim (as long as the `-vcodec copy` option
- is passed to ffmpeg).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38114">CVE-2021-38114</a>
-
- <p>libavcodec/dnxhddec.c does not check the return value of the init_vlc
- function. Crafted DNxHD data can cause unspecified impact.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7:3.2.15-0+deb9u3.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2742.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2743-2.data b/english/lts/security/2021/dla-2743-2.data
deleted file mode 100644
index a17927a8022..00000000000
--- a/english/lts/security/2021/dla-2743-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2743-2 amd64-microcode</define-tag>
-<define-tag report_date>2021-10-18</define-tag>
-<define-tag packages>amd64-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2743-2.wml b/english/lts/security/2021/dla-2743-2.wml
deleted file mode 100644
index 99546dbfcc0..00000000000
--- a/english/lts/security/2021/dla-2743-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA-2743-1 was issued for <a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>, affecting amd64-microcode,
-processor microcode firmware for AMD CPUs. However, the binaries for
-the resulting upload weren't built and published, thereby preventing
-the users to upgrade to a fixed version.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.20181128.1~deb9u2.</p>
-
-<p>We recommend that you upgrade your amd64-microcode packages.</p>
-
-<p>For the detailed security status of amd64-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/amd64-microcode">https://security-tracker.debian.org/tracker/amd64-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2743-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2743.data b/english/lts/security/2021/dla-2743.data
deleted file mode 100644
index dc9982c4257..00000000000
--- a/english/lts/security/2021/dla-2743.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2743-1 amd64-microcode</define-tag>
-<define-tag report_date>2021-08-16</define-tag>
-<define-tag secrefs>CVE-2017-5715 Bug#886382</define-tag>
-<define-tag packages>amd64-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2743.wml b/english/lts/security/2021/dla-2743.wml
deleted file mode 100644
index 486f022322d..00000000000
--- a/english/lts/security/2021/dla-2743.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that systems with microprocessors utilizing
-speculative execution and indirect branch prediction may allow
-unauthorized disclosure of information to an attacker with local
-user access via a side-channel analysis (Spectre v2).
-Multiple fixes were done already in Linux kernel, intel-microcode,
-et al. This fix adds amd-microcode-based IBPB support.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.20181128.1~deb9u1.</p>
-
-<p>We recommend that you upgrade your amd64-microcode packages.</p>
-
-<p>For the detailed security status of amd64-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/amd64-microcode">https://security-tracker.debian.org/tracker/amd64-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2743.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2744.data b/english/lts/security/2021/dla-2744.data
deleted file mode 100644
index 989e242f87f..00000000000
--- a/english/lts/security/2021/dla-2744.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2744-1 usermode</define-tag>
-<define-tag report_date>2021-08-16</define-tag>
-<define-tag secrefs>Bug#991808</define-tag>
-<define-tag packages>usermode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2744.wml b/english/lts/security/2021/dla-2744.wml
deleted file mode 100644
index 9f87c9286ae..00000000000
--- a/english/lts/security/2021/dla-2744.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update is merely a rebuild of the usermode package, which are
-a set of graphical tools for certain user account management tasks,
-fixing two issues:</p>
-
-<p>a) the versioning issue as wheezy (Debian 7) had a greater version
- than jessie (Debian 8) and stretch (Debian 9), thereby causing
- upgrade issues.
-b) the package now Depends and Build-Depends on the newer
- libuser1-dev (>= 1:0.62~dfsg-0.1) to ensure the latest
- version of libuser is used (which was a security fix).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.109-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your usermode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2744.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2745.data b/english/lts/security/2021/dla-2745.data
deleted file mode 100644
index 667f5e13571..00000000000
--- a/english/lts/security/2021/dla-2745.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2745-1 thunderbird</define-tag>
-<define-tag report_date>2021-08-16</define-tag>
-<define-tag secrefs>CVE-2021-29980 CVE-2021-29984 CVE-2021-29985 CVE-2021-29986 CVE-2021-29988 CVE-2021-29989</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2745.wml b/english/lts/security/2021/dla-2745.wml
deleted file mode 100644
index a573756f2cf..00000000000
--- a/english/lts/security/2021/dla-2745.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:78.13.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2745.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2746.data b/english/lts/security/2021/dla-2746.data
deleted file mode 100644
index b9554dcab10..00000000000
--- a/english/lts/security/2021/dla-2746.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2746-1 scrollz</define-tag>
-<define-tag report_date>2021-8-21</define-tag>
-<define-tag secrefs>CVE-2021-29376</define-tag>
-<define-tag packages>scrollz</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2746.wml b/english/lts/security/2021/dla-2746.wml
deleted file mode 100644
index c6d50dfae23..00000000000
--- a/english/lts/security/2021/dla-2746.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in scrollz, an advanced ircII-based IRC client.
-A crafted CTCP UTC message could allow an attacker to disconnect the
-victim from an IRC server due to a segmentation fault and client crash.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.2.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your scrollz packages.</p>
-
-<p>For the detailed security status of scrollz please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/scrollz">https://security-tracker.debian.org/tracker/scrollz</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2746.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2747.data b/english/lts/security/2021/dla-2747.data
deleted file mode 100644
index 6a061c995b7..00000000000
--- a/english/lts/security/2021/dla-2747.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2747-1 ircii</define-tag>
-<define-tag report_date>2021-8-22</define-tag>
-<define-tag secrefs>CVE-2021-29376</define-tag>
-<define-tag packages>ircii</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2747.wml b/english/lts/security/2021/dla-2747.wml
deleted file mode 100644
index 223bd45e1a1..00000000000
--- a/english/lts/security/2021/dla-2747.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in ircii, an Internet Relay Chat client.
-A crafted CTCP UTC message could allow an attacker to disconnect the
-victim from an IRC server due to a segmentation fault and client crash.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-20151120-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ircii packages.</p>
-
-<p>For the detailed security status of ircii please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ircii">https://security-tracker.debian.org/tracker/ircii</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2747.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2748.data b/english/lts/security/2021/dla-2748.data
deleted file mode 100644
index 8aede3b28f2..00000000000
--- a/english/lts/security/2021/dla-2748.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2748-1 tnef</define-tag>
-<define-tag report_date>2021-8-23</define-tag>
-<define-tag secrefs>CVE-2019-18849</define-tag>
-<define-tag packages>tnef</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2748.wml b/english/lts/security/2021/dla-2748.wml
deleted file mode 100644
index 947dce1e35b..00000000000
--- a/english/lts/security/2021/dla-2748.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in tnef, a tool to unpack MIME application/ms-tnef
-attachments.
-Using emails with a crafted winmail.dat application/ms-tnef attachment
-might allow an attacker to change .ssh/authorized_keys.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.12-1.2+deb9u1.</p>
-
-<p>We recommend that you upgrade your tnef packages.</p>
-
-<p>For the detailed security status of tnef please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tnef">https://security-tracker.debian.org/tracker/tnef</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2748.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2749.data b/english/lts/security/2021/dla-2749.data
deleted file mode 100644
index bf5eedcfb74..00000000000
--- a/english/lts/security/2021/dla-2749.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2749-1 gthumb</define-tag>
-<define-tag report_date>2021-8-29</define-tag>
-<define-tag secrefs>CVE-2019-20326</define-tag>
-<define-tag packages>gthumb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2749.wml b/english/lts/security/2021/dla-2749.wml
deleted file mode 100644
index 5d39937c17c..00000000000
--- a/english/lts/security/2021/dla-2749.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in gthumb, an image viewer and browser.
-A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg()
-in extensions/cairo_io/cairo-image-surface-jpeg.c allows attackers to
-cause a crash and potentially execute arbitrary code via a crafted JPEG
-file.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3:3.4.4.1-5+deb9u2.</p>
-
-<p>We recommend that you upgrade your gthumb packages.</p>
-
-<p>For the detailed security status of gthumb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gthumb">https://security-tracker.debian.org/tracker/gthumb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2749.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2750.data b/english/lts/security/2021/dla-2750.data
deleted file mode 100644
index b45aef113ef..00000000000
--- a/english/lts/security/2021/dla-2750.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2750-1 exiv2</define-tag>
-<define-tag report_date>2021-08-30</define-tag>
-<define-tag secrefs>CVE-2019-20421 CVE-2021-3482 CVE-2021-29457 CVE-2021-29473 CVE-2021-31291 CVE-2021-31292 Bug#950183 Bug#986888 Bug#987277 Bug#991705 Bug#991705 Bug#991706</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2750.wml b/english/lts/security/2021/dla-2750.wml
deleted file mode 100644
index df3d5cb44aa..00000000000
--- a/english/lts/security/2021/dla-2750.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Exiv2, a C++ library
-and a command line utility to manage image metadata which could result
-in denial of service or the execution of arbitrary code if a malformed
-file is parsed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.25-3.1+deb9u3.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>For the detailed security status of exiv2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/exiv2">https://security-tracker.debian.org/tracker/exiv2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2750.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2751.data b/english/lts/security/2021/dla-2751.data
deleted file mode 100644
index f16391fdeab..00000000000
--- a/english/lts/security/2021/dla-2751.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2751-1 postgresql-9.6</define-tag>
-<define-tag report_date>2021-08-31</define-tag>
-<define-tag secrefs>CVE-2021-3449</define-tag>
-<define-tag packages>postgresql-9.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2751.wml b/english/lts/security/2021/dla-2751.wml
deleted file mode 100644
index 5dbb85104db..00000000000
--- a/english/lts/security/2021/dla-2751.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>PostgreSQL 9.6.23 fixes this security issue:</p>
-
- <p>Disallow SSL renegotiation more completely (Michael Paquier)</p>
-
- <p>SSL renegotiation has been disabled for some time, but the server would
- still cooperate with a client-initiated renegotiation request. A
- maliciously crafted renegotiation request could result in a server crash
- (see OpenSSL issue <a href="https://security-tracker.debian.org/tracker/CVE-2021-3449">CVE-2021-3449</a>). Disable the feature altogether on
- OpenSSL versions that permit doing so, which are 1.1.0h and newer.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-9.6.23-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
-
-<p>For the detailed security status of postgresql-9.6 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2751.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2752.data b/english/lts/security/2021/dla-2752.data
deleted file mode 100644
index da08e39769c..00000000000
--- a/english/lts/security/2021/dla-2752.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2752-1 squashfs-tools</define-tag>
-<define-tag report_date>2021-8-31</define-tag>
-<define-tag secrefs>CVE-2021-40153</define-tag>
-<define-tag packages>squashfs-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2752.wml b/english/lts/security/2021/dla-2752.wml
deleted file mode 100644
index 7c5b2dd980a..00000000000
--- a/english/lts/security/2021/dla-2752.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in squashfs-tools, a tool to create and append to
-squashfs filesystems.
-As unsquashfs did not validate all filepaths, it would allow writing
-outside of the original destination.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:4.3-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your squashfs-tools packages.</p>
-
-<p>For the detailed security status of squashfs-tools please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/squashfs-tools">https://security-tracker.debian.org/tracker/squashfs-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2752.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2753-2.data b/english/lts/security/2021/dla-2753-2.data
deleted file mode 100644
index c627021f2e8..00000000000
--- a/english/lts/security/2021/dla-2753-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2753-2 qemu</define-tag>
-<define-tag report_date>2021-9-12</define-tag>
-<define-tag secrefs>CVE-2021-3592 Bug#994080</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2753-2.wml b/english/lts/security/2021/dla-2753-2.wml
deleted file mode 100644
index 78e3561d462..00000000000
--- a/english/lts/security/2021/dla-2753-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2021-3592">CVE-2021-3592</a> introduced a regression which
-prevented ssh connections to the host system. Since there is no imminent
-solution for the problem, the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2021-3592">CVE-2021-3592</a> has been reverted.
-Updated qemu packages are now available to correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.8+dfsg-6+deb9u16.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2753-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2753.data b/english/lts/security/2021/dla-2753.data
deleted file mode 100644
index 8041314c818..00000000000
--- a/english/lts/security/2021/dla-2753.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2753-1 qemu</define-tag>
-<define-tag report_date>2021-9-02</define-tag>
-<define-tag secrefs>CVE-2021-3527 CVE-2021-3592 CVE-2021-3594 CVE-2021-3595 CVE-2021-3682 CVE-2021-3713 Bug#988157 Bug#989993 Bug#989995 Bug#989996 Bug#991911 Bug#992727</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2753.wml b/english/lts/security/2021/dla-2753.wml
deleted file mode 100644
index 6d3d78298f8..00000000000
--- a/english/lts/security/2021/dla-2753.wml
+++ /dev/null
@@ -1,82 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been found in Qemu, a fast processor
-emulator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3713">CVE-2021-3713</a>
-
- <p>An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device
- emulation of QEMU. The device uses the guest supplied stream number
- unchecked, which can lead to out-of-bounds access to the UASDevice-&gt;data3
- and UASDevice-&gt;status3 fields. A malicious guest user could use this flaw
- to crash QEMU or potentially achieve code execution with the privileges of
- the QEMU process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3682">CVE-2021-3682</a>
-
- <p>A flaw was found in the USB redirector device emulation of QEMU. It occurs
- when dropping packets during a bulk transfer from a SPICE client due to the
- packet queue being full. A malicious SPICE client could use this flaw to
- make QEMU call free() with faked heap chunk metadata, resulting in a crash
- of QEMU or potential code execution with the privileges of the QEMU process
- on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3527">CVE-2021-3527</a>
-
- <p>A flaw was found in the USB redirector device (usb-redir) of QEMU. Small
- USB packets are combined into a single, large transfer request, to reduce
- the overhead and improve performance. The combined size of the bulk
- transfer is used to dynamically allocate a variable length array (VLA) on
- the stack without proper validation. Since the total size is not bounded, a
- malicious guest could use this flaw to influence the array length and cause
- the QEMU process to perform an excessive allocation on the stack, resulting
- in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3594">CVE-2021-3594</a>
-
- <p>An invalid pointer initialization issue was found in the SLiRP networking
- implementation of QEMU. The flaw exists in the udp_input() function and
- could occur while processing a udp packet that is smaller than the size of
- the <q>udphdr</q> structure. This issue may lead to out-of-bounds read access or
- indirect host memory disclosure to the guest. The highest threat from this
- vulnerability is to data confidentiality.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3592">CVE-2021-3592</a>
-
- <p>An invalid pointer initialization issue was found in the SLiRP networking
- implementation of QEMU. The flaw exists in the bootp_input() function and
- could occur while processing a udp packet that is smaller than the size of
- the <q>bootp_t</q> structure. A malicious guest could use this flaw to leak 10
- bytes of uninitialized heap memory from the host. The highest threat from
- this vulnerability is to data confidentiality.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3595">CVE-2021-3595</a>
-
- <p>An invalid pointer initialization issue was found in the SLiRP networking
- implementation of QEMU. The flaw exists in the tftp_input() function and
- could occur while processing a udp packet that is smaller than the size of
- the <q>tftp_t</q> structure. This issue may lead to out-of-bounds read access or
- indirect host memory disclosure to the guest. The highest threat from this
- vulnerability is to data confidentiality.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u15.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2753.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2754.data b/english/lts/security/2021/dla-2754.data
deleted file mode 100644
index 979cb282002..00000000000
--- a/english/lts/security/2021/dla-2754.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2754-1 pywps</define-tag>
-<define-tag report_date>2021-09-07</define-tag>
-<define-tag secrefs>CVE-2021-39371</define-tag>
-<define-tag packages>pywps</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2754.wml b/english/lts/security/2021/dla-2754.wml
deleted file mode 100644
index 4978e1dcfc5..00000000000
--- a/english/lts/security/2021/dla-2754.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA text goes here</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.0.0-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your pywps packages.</p>
-
-<p>For the detailed security status of pywps please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pywps">https://security-tracker.debian.org/tracker/pywps</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2754.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2755.data b/english/lts/security/2021/dla-2755.data
deleted file mode 100644
index d876ca65183..00000000000
--- a/english/lts/security/2021/dla-2755.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2755-1 btrbk</define-tag>
-<define-tag report_date>2021-9-5</define-tag>
-<define-tag secrefs>CVE-2021-38173</define-tag>
-<define-tag packages>btrbk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2755.wml b/english/lts/security/2021/dla-2755.wml
deleted file mode 100644
index 635b3632d58..00000000000
--- a/english/lts/security/2021/dla-2755.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in btrbk, a backup tool for btrfs subvolumes.
-Due to mishandling of remote hosts filtering SSH commands using
-ssh_filter_btrbk.sh in authorized_keys an arbitrary code execution would
-have been allowed.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.24.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your btrbk packages.</p>
-
-<p>For the detailed security status of btrbk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/btrbk">https://security-tracker.debian.org/tracker/btrbk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2755.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2756.data b/english/lts/security/2021/dla-2756.data
deleted file mode 100644
index ed2bc744ec0..00000000000
--- a/english/lts/security/2021/dla-2756.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2756-1 firefox-esr</define-tag>
-<define-tag report_date>2021-09-10</define-tag>
-<define-tag secrefs>CVE-2021-38493</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2756.wml b/english/lts/security/2021/dla-2756.wml
deleted file mode 100644
index 6ee2fad7fff..00000000000
--- a/english/lts/security/2021/dla-2756.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-78.14.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2756.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2757.data b/english/lts/security/2021/dla-2757.data
deleted file mode 100644
index f31c5c83a2e..00000000000
--- a/english/lts/security/2021/dla-2757.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2757-1 thunderbird</define-tag>
-<define-tag report_date>2021-09-13</define-tag>
-<define-tag secrefs>CVE-2021-38493</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2757.wml b/english/lts/security/2021/dla-2757.wml
deleted file mode 100644
index 4c0ed628fdc..00000000000
--- a/english/lts/security/2021/dla-2757.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:78.14.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2757.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2758.data b/english/lts/security/2021/dla-2758.data
deleted file mode 100644
index e37b0c3d378..00000000000
--- a/english/lts/security/2021/dla-2758.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2758-1 sssd</define-tag>
-<define-tag report_date>2021-09-15</define-tag>
-<define-tag secrefs>CVE-2021-3621</define-tag>
-<define-tag packages>sssd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2758.wml b/english/lts/security/2021/dla-2758.wml
deleted file mode 100644
index 218f3f9d52b..00000000000
--- a/english/lts/security/2021/dla-2758.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in sssd.</p>
-
-<p>The sssctl command was vulnerable to shell command injection via the logs-fetch
-and cache-expire subcommands. This flaw allows an attacker to trick the root
-user into running a specially crafted sssctl command, such as via sudo, to gain
-root access. The highest threat from this vulnerability is to confidentiality,
-integrity, as well as system availability.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.15.0-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your sssd packages.</p>
-
-<p>For the detailed security status of sssd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sssd">https://security-tracker.debian.org/tracker/sssd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2758.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2759.data b/english/lts/security/2021/dla-2759.data
deleted file mode 100644
index fcb936e7595..00000000000
--- a/english/lts/security/2021/dla-2759.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2759-1 gnutls28</define-tag>
-<define-tag report_date>2021-09-18</define-tag>
-<define-tag secrefs>Bug#961889</define-tag>
-<define-tag packages>gnutls28</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2759.wml b/english/lts/security/2021/dla-2759.wml
deleted file mode 100644
index 178d42bc16d..00000000000
--- a/english/lts/security/2021/dla-2759.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>GnuTLS, a portable cryptography library, fails to validate alternate
-trust chains in some conditions. In particular this breaks connecting
-to servers that use Let's Encrypt certificates, starting 2021-10-01.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.5.8-5+deb9u6.</p>
-
-<p>We recommend that you upgrade your gnutls28 packages.</p>
-
-<p>For the detailed security status of gnutls28 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gnutls28">https://security-tracker.debian.org/tracker/gnutls28</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2759.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2760.data b/english/lts/security/2021/dla-2760.data
deleted file mode 100644
index d432affe2a7..00000000000
--- a/english/lts/security/2021/dla-2760.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2760-1 nettle</define-tag>
-<define-tag report_date>2021-9-18</define-tag>
-<define-tag secrefs>CVE-2021-3580 CVE-2021-20305 Bug#985652 Bug#989631</define-tag>
-<define-tag packages>nettle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2760.wml b/english/lts/security/2021/dla-2760.wml
deleted file mode 100644
index 3ef3bba091f..00000000000
--- a/english/lts/security/2021/dla-2760.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in nettle, a low level
-cryptographic library, which could result in denial of service (remote
-crash in RSA decryption via specially crafted ciphertext, crash on ECDSA
-signature verification) or incorrect verification of ECDSA signatures.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your nettle packages.</p>
-
-<p>For the detailed security status of nettle please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/nettle">https://security-tracker.debian.org/tracker/nettle</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2760.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2761.data b/english/lts/security/2021/dla-2761.data
deleted file mode 100644
index a3a5a4e0472..00000000000
--- a/english/lts/security/2021/dla-2761.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2761-1 openssl1.0</define-tag>
-<define-tag report_date>2021-09-18</define-tag>
-<define-tag packages>openssl1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2761.wml b/english/lts/security/2021/dla-2761.wml
deleted file mode 100644
index 9583f37ced0..00000000000
--- a/english/lts/security/2021/dla-2761.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The legacy 1.0 version of OpenSSL, a cryptography library for secure
-communication, fails to validate alternate trust chains in some
-conditions. In particular this breaks connecting to servers that use
-Let's Encrypt certificates, starting 2021-10-01.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.2u-1~deb9u5.</p>
-
-<p>We recommend that you upgrade your openssl1.0 packages.</p>
-
-<p>For the detailed security status of openssl1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2761.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2762.data b/english/lts/security/2021/dla-2762.data
deleted file mode 100644
index c3f45865f59..00000000000
--- a/english/lts/security/2021/dla-2762.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2762-1 grilo</define-tag>
-<define-tag report_date>2021-9-21</define-tag>
-<define-tag secrefs>CVE-2021-39365</define-tag>
-<define-tag packages>grilo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2762.wml b/english/lts/security/2021/dla-2762.wml
deleted file mode 100644
index 842e2ff56c2..00000000000
--- a/english/lts/security/2021/dla-2762.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in grilo, a framework for discovering and browsing
-media. Due to missing TLS certificate verification, users are vulnerable
-to network MITM attacks.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.3.2-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your grilo packages.</p>
-
-<p>For the detailed security status of grilo please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/grilo">https://security-tracker.debian.org/tracker/grilo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2762.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2763.data b/english/lts/security/2021/dla-2763.data
deleted file mode 100644
index 3d488452d5f..00000000000
--- a/english/lts/security/2021/dla-2763.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2763-1 ruby-kaminari</define-tag>
-<define-tag report_date>2021-9-22</define-tag>
-<define-tag secrefs>CVE-2020-11082 Bug#961847</define-tag>
-<define-tag packages>ruby-kaminari</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2763.wml b/english/lts/security/2021/dla-2763.wml
deleted file mode 100644
index 6f5e8730a7a..00000000000
--- a/english/lts/security/2021/dla-2763.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability has been found in Kaminari, a pagination engine plugin
-for Rails 3+ and other modern frameworks, that would allow an attacker to
-inject arbitrary code into pages with pagination links.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.17.0-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-kaminari packages.</p>
-
-<p>For the detailed security status of ruby-kaminari please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ruby-kaminari">https://security-tracker.debian.org/tracker/ruby-kaminari</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2763.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2764.data b/english/lts/security/2021/dla-2764.data
deleted file mode 100644
index ef49b04a87c..00000000000
--- a/english/lts/security/2021/dla-2764.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2764-1 tomcat8</define-tag>
-<define-tag report_date>2021-9-23</define-tag>
-<define-tag secrefs>CVE-2021-41079</define-tag>
-<define-tag packages>tomcat8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2764.wml b/english/lts/security/2021/dla-2764.wml
deleted file mode 100644
index a5bcf2a9336..00000000000
--- a/english/lts/security/2021/dla-2764.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apache Tomcat did not properly validate incoming TLS packets. When Tomcat
-was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially
-crafted packet could be used to trigger an infinite loop resulting in a
-denial of service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8.5.54-0+deb9u8.</p>
-
-<p>We recommend that you upgrade your tomcat8 packages.</p>
-
-<p>For the detailed security status of tomcat8 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat8">https://security-tracker.debian.org/tracker/tomcat8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2764.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2765.data b/english/lts/security/2021/dla-2765.data
deleted file mode 100644
index a69b778665a..00000000000
--- a/english/lts/security/2021/dla-2765.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2765-1 mupdf</define-tag>
-<define-tag report_date>2021-09-23</define-tag>
-<define-tag secrefs>CVE-2016-10246 CVE-2016-10247 CVE-2017-6060 CVE-2018-10289 CVE-2018-1000036 CVE-2020-19609</define-tag>
-<define-tag packages>mupdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2765.wml b/english/lts/security/2021/dla-2765.wml
deleted file mode 100644
index 906ef524bca..00000000000
--- a/english/lts/security/2021/dla-2765.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been discovered in mupdf.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10246">CVE-2016-10246</a>
-
- <p>Buffer overflow in the main function in jstest_main.c allows remote attackers
- to cause a denial of service (out-of-bounds write) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10247">CVE-2016-10247</a>
-
- <p>Buffer overflow in the my_getline function in jstest_main.c allows remote attackers
- to cause a denial of service (out-of-bounds write) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6060">CVE-2017-6060</a>
-
- <p>Stack-based buffer overflow in jstest_main.c allows remote attackers
- to have unspecified impact via a crafted image.</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10289">CVE-2018-10289</a>
-
- <p>An infinite loop in the fz_skip_space function of the pdf/pdf-xref.c file.
- A remote adversary could leverage this vulnerability to cause a denial of
- service via a crafted pdf file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000036">CVE-2018-1000036</a>
-
- <p>Multiple memory leaks in the PDF parser allow an attacker to cause a denial
- of service (memory leak) via a crafted file.</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19609">CVE-2020-19609</a>
-
- <p>A heap based buffer over-write in tiff_expand_colormap() function when parsing TIFF
- files allowing attackers to cause a denial of service.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.14.0+ds1-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your mupdf packages.</p>
-
-<p>For the detailed security status of mupdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mupdf">https://security-tracker.debian.org/tracker/mupdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2765.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2766.data b/english/lts/security/2021/dla-2766.data
deleted file mode 100644
index 30a979ff1d3..00000000000
--- a/english/lts/security/2021/dla-2766.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2766-1 openssl</define-tag>
-<define-tag report_date>2021-9-26</define-tag>
-<define-tag secrefs>CVE-2021-3712</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2766.wml b/english/lts/security/2021/dla-2766.wml
deleted file mode 100644
index 47608f355f0..00000000000
--- a/english/lts/security/2021/dla-2766.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in openssl, a Secure Sockets Layer toolkit.
-Ingo Schwarze reported a buffer overrun flaw when processing ASN.1
-strings, which can result in denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.0l-1~deb9u4.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2766.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2767.data b/english/lts/security/2021/dla-2767.data
deleted file mode 100644
index 1e91977f0b8..00000000000
--- a/english/lts/security/2021/dla-2767.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2767-1 libxml-security-java</define-tag>
-<define-tag report_date>2021-9-27</define-tag>
-<define-tag secrefs>CVE-2021-40690 Bug#994569</define-tag>
-<define-tag packages>libxml-security-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2767.wml b/english/lts/security/2021/dla-2767.wml
deleted file mode 100644
index bca64d11d2e..00000000000
--- a/english/lts/security/2021/dla-2767.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apache Santuario, XML Security for Java, is vulnerable to an issue where the
-<q>secureValidation</q> property is not passed correctly when creating a KeyInfo
-from a KeyInfoReference element. This allows an attacker to abuse an XPath
-Transform to extract any local .xml files in a RetrievalMethod element.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.5.8-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libxml-security-java packages.</p>
-
-<p>For the detailed security status of libxml-security-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxml-security-java">https://security-tracker.debian.org/tracker/libxml-security-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2767.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2768-2.data b/english/lts/security/2021/dla-2768-2.data
deleted file mode 100644
index 1b583f9c14e..00000000000
--- a/english/lts/security/2021/dla-2768-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2768-2 uwsgi</define-tag>
-<define-tag report_date>2021-10-20</define-tag>
-<define-tag secrefs>CVE-2021-36160 Bug#995368</define-tag>
-<define-tag packages>uwsgi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2768-2.wml b/english/lts/security/2021/dla-2768-2.wml
deleted file mode 100644
index 2331e30cc92..00000000000
--- a/english/lts/security/2021/dla-2768-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was introduced in DLA-2768-1, where the uwsgi proxy
-module for Apache2 (mod_proxy_uwsgi) interprets incorrect Apache
-configurations in a less forgiving way, causing existing setups to
-fail after upgrade.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.0.14+20161117-3+deb9u5.</p>
-
-<p>We recommend that you upgrade your uwsgi packages.</p>
-
-<p>For the detailed security status of uwsgi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/uwsgi">https://security-tracker.debian.org/tracker/uwsgi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2768-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2768.data b/english/lts/security/2021/dla-2768.data
deleted file mode 100644
index e643a39c667..00000000000
--- a/english/lts/security/2021/dla-2768.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2768-1 uwsgi</define-tag>
-<define-tag report_date>2021-10-02</define-tag>
-<define-tag secrefs>CVE-2021-36160</define-tag>
-<define-tag packages>uwsgi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2768.wml b/english/lts/security/2021/dla-2768.wml
deleted file mode 100644
index 5eb1468c145..00000000000
--- a/english/lts/security/2021/dla-2768.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the uwsgi proxy module for Apache2
-(mod_proxy_uwsgi) can read above the allocated memory when processing
-a request with a carefully crafted uri-path. An attacker may cause the
-server to crash (DoS).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.0.14+20161117-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your uwsgi packages.</p>
-
-<p>For the detailed security status of uwsgi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/uwsgi">https://security-tracker.debian.org/tracker/uwsgi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2768.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2769.data b/english/lts/security/2021/dla-2769.data
deleted file mode 100644
index 5de642fc220..00000000000
--- a/english/lts/security/2021/dla-2769.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2769-1 libxstream-java</define-tag>
-<define-tag report_date>2021-9-30</define-tag>
-<define-tag secrefs>CVE-2021-39139 CVE-2021-39140 CVE-2021-39141 CVE-2021-39144 CVE-2021-39145 CVE-2021-39146 CVE-2021-39147 CVE-2021-39148 CVE-2021-39149 CVE-2021-39150 CVE-2021-39151 CVE-2021-39152 CVE-2021-39153 CVE-2021-39154</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2769.wml b/english/lts/security/2021/dla-2769.wml
deleted file mode 100644
index f6be7c5218c..00000000000
--- a/english/lts/security/2021/dla-2769.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in XStream, a Java
-library to serialize objects to XML and back again.</p>
-
-<p>These vulnerabilities may allow a remote attacker to load and execute arbitrary
-code from a remote host only by manipulating the processed input stream.</p>
-
-<p>XStream itself sets up a whitelist by default now, i.e. it blocks all classes
-except those types it has explicit converters for. It used to have a blacklist
-by default, i.e. it tried to block all currently known critical classes of the
-Java runtime. Main reason for the blacklist were compatibility, it allowed to
-use newer versions of XStream as drop-in replacement. However, this approach
-has failed. A growing list of security reports has proven, that a blacklist is
-inherently unsafe, apart from the fact that types of 3rd libraries were not
-even considered. A blacklist scenario should be avoided in general, because it
-provides a false sense of security.</p>
-
-<p>See also <a rel="nofollow" href="https://x-stream.github.io/security.html#framework">https://x-stream.github.io/security.html#framework</a></p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.4.11.1-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>For the detailed security status of libxstream-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxstream-java">https://security-tracker.debian.org/tracker/libxstream-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2769.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2770.data b/english/lts/security/2021/dla-2770.data
deleted file mode 100644
index 21cb8005e8a..00000000000
--- a/english/lts/security/2021/dla-2770.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2770-1 weechat</define-tag>
-<define-tag report_date>2021-09-30</define-tag>
-<define-tag secrefs>CVE-2020-8955 CVE-2020-9759 CVE-2020-9760 CVE-2021-40516 Bug#951289 Bug#993803</define-tag>
-<define-tag packages>weechat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2770.wml b/english/lts/security/2021/dla-2770.wml
deleted file mode 100644
index afd1a37c63f..00000000000
--- a/english/lts/security/2021/dla-2770.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the chat client WeeChat.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8955">CVE-2020-8955</a>
-
- <p>A crafted irc message 324 (channel mode) could result in a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9759">CVE-2020-9759</a>
-
- <p>A crafted irc message 352 (who) could result in a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9760">CVE-2020-9760</a>
-
- <p>A crafted irc message 005 (setting a new mode for a nick) could result in a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40516">CVE-2021-40516</a>
-
- <p>A crafted WebSocket frame could result in a crash in the Relay plugin.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.6-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your weechat packages.</p>
-
-<p>For the detailed security status of weechat please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/weechat">https://security-tracker.debian.org/tracker/weechat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2770.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2771.data b/english/lts/security/2021/dla-2771.data
deleted file mode 100644
index 2c76c7b2e18..00000000000
--- a/english/lts/security/2021/dla-2771.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2771-1 krb5</define-tag>
-<define-tag report_date>2021-09-30</define-tag>
-<define-tag secrefs>CVE-2018-5729 CVE-2018-5730 CVE-2018-20217 CVE-2021-37750 Bug#891869 Bug#917387 Bug#992607</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2771.wml b/english/lts/security/2021/dla-2771.wml
deleted file mode 100644
index a4b258ec6f7..00000000000
--- a/english/lts/security/2021/dla-2771.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in MIT Kerberos,
-a system for authenticating users and services on a network.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5729">CVE-2018-5729</a>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5730">CVE-2018-5730</a>
-
- <p>Fix flaws in LDAP DN checking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20217">CVE-2018-20217</a>
-
- <p>Ignore password attributes for S4U2Self requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37750">CVE-2021-37750</a>
-
- <p>Fix KDC null deref on TGS inner body null server.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.15-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>For the detailed security status of krb5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/krb5">https://security-tracker.debian.org/tracker/krb5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2771.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2772.data b/english/lts/security/2021/dla-2772.data
deleted file mode 100644
index 7302b65a88c..00000000000
--- a/english/lts/security/2021/dla-2772.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2772-1 taglib</define-tag>
-<define-tag report_date>2021-09-30</define-tag>
-<define-tag secrefs>CVE-2017-12678 CVE-2018-11439 Bug#871511 Bug#903847 Bug#915281 Bug#871511 Bug#903847</define-tag>
-<define-tag packages>taglib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2772.wml b/english/lts/security/2021/dla-2772.wml
deleted file mode 100644
index ad28c1d4fdd..00000000000
--- a/english/lts/security/2021/dla-2772.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several problems were corrected in TagLib,
-a library for reading and editing audio meta data.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12678">CVE-2017-12678</a>
-
- <p>A crafted audio file could result in a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11439">CVE-2018-11439</a>
-
- <p>A crafted audio file could result in information disclosure.</p></li>
-
-<li><p>Additionally, a bug that can lead to corruption of ogg files
-has been fixed.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.11.1+dfsg.1-0.3+deb9u1.</p>
-
-<p>We recommend that you upgrade your taglib packages.</p>
-
-<p>For the detailed security status of taglib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/taglib">https://security-tracker.debian.org/tracker/taglib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2772.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2773.data b/english/lts/security/2021/dla-2773.data
deleted file mode 100644
index 5d09b9de8ae..00000000000
--- a/english/lts/security/2021/dla-2773.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2773-1 curl</define-tag>
-<define-tag report_date>2021-9-30</define-tag>
-<define-tag secrefs>CVE-2021-22946 CVE-2021-22947</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2773.wml b/english/lts/security/2021/dla-2773.wml
deleted file mode 100644
index 2fd65ca1ac4..00000000000
--- a/english/lts/security/2021/dla-2773.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in curl, a command line tool and an easy-to-use
-client-side library for transferring data with URL syntax.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22946">CVE-2021-22946</a>
-
- <p>Crafted answers from a server might force clients to not use TLS on
- connections though TLS was required and expected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22947">CVE-2021-22947</a>
-
- <p>When using STARTTLS to initiate a TLS connection, the server might
- send multiple answers before the TLS upgrade and such the client
- would handle them as being trusted. This could be used by a
- MITM-attacker to inject fake response data.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.52.1-5+deb9u16.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2773.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2774.data b/english/lts/security/2021/dla-2774.data
deleted file mode 100644
index e67fb4e7d7a..00000000000
--- a/english/lts/security/2021/dla-2774.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2774-1 openssl1.0</define-tag>
-<define-tag report_date>2021-9-30</define-tag>
-<define-tag secrefs>CVE-2021-3712</define-tag>
-<define-tag packages>openssl1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2774.wml b/english/lts/security/2021/dla-2774.wml
deleted file mode 100644
index f833d1e33e7..00000000000
--- a/english/lts/security/2021/dla-2774.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in openssl1.0, a Secure Sockets Layer library.
-The issue is related to read buffer overruns while processing ASN.1
-strings.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.2u-1~deb9u6.</p>
-
-<p>We recommend that you upgrade your openssl1.0 packages.</p>
-
-<p>For the detailed security status of openssl1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2774.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2775.data b/english/lts/security/2021/dla-2775.data
deleted file mode 100644
index 28a01ac7179..00000000000
--- a/english/lts/security/2021/dla-2775.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2775-1 plib</define-tag>
-<define-tag report_date>2021-10-02</define-tag>
-<define-tag secrefs>CVE-2021-38714</define-tag>
-<define-tag packages>plib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2775.wml b/english/lts/security/2021/dla-2775.wml
deleted file mode 100644
index 8f54b6d16f3..00000000000
--- a/english/lts/security/2021/dla-2775.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in plib.</p>
-
-<p>Integer overflow vulnerability that could result in arbitrary code execution.
-The vulnerability is found in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8.5-7+deb9u1.</p>
-
-<p>We recommend that you upgrade your plib packages.</p>
-
-<p>For the detailed security status of plib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/plib">https://security-tracker.debian.org/tracker/plib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2775.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2776.data b/english/lts/security/2021/dla-2776.data
deleted file mode 100644
index 5b5da5b40f9..00000000000
--- a/english/lts/security/2021/dla-2776.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2776-1 apache2</define-tag>
-<define-tag report_date>2021-10-02</define-tag>
-<define-tag secrefs>CVE-2021-34798 CVE-2021-39275 CVE-2021-40438</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2776.wml b/english/lts/security/2021/dla-2776.wml
deleted file mode 100644
index e5df733af4f..00000000000
--- a/english/lts/security/2021/dla-2776.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Apache HTTP server.
-An attacker could send proxied requests to arbitrary servers, corrupt
-memory in some setups involving third-party modules, and cause the
-server to crash.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-34798">CVE-2021-34798</a>
-
- <p>Malformed requests may cause the server to dereference
- a NULL pointer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39275">CVE-2021-39275</a>
-
- <p>ap_escape_quotes() may write beyond the end of a buffer when given
- malicious input. No included modules pass untrusted data to these
- functions, but third-party / external modules may.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40438">CVE-2021-40438</a>
-
- <p>A crafted request uri-path can cause mod_proxy to forward the
- request to an origin server choosen by the remote user.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.25-3+deb9u11.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>For the detailed security status of apache2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2776.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2777.data b/english/lts/security/2021/dla-2777.data
deleted file mode 100644
index 86270d3e42e..00000000000
--- a/english/lts/security/2021/dla-2777.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2777-1 tiff</define-tag>
-<define-tag report_date>2021-10-03</define-tag>
-<define-tag secrefs>CVE-2020-19131 CVE-2020-19144</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2777.wml b/english/lts/security/2021/dla-2777.wml
deleted file mode 100644
index e1b3f267b71..00000000000
--- a/english/lts/security/2021/dla-2777.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were found in TIFF, a widely used format for
-storing image data, as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19131">CVE-2020-19131</a>
-
- <p>Buffer Overflow in LibTiff allows attackers to cause
- a denial of service via the "invertImage()" function
- in the component <q>tiffcrop</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19144">CVE-2020-19144</a>
-
- <p>Buffer Overflow in LibTiff allows attackers to cause
- a denial of service via the <q>in _TIFFmemcpy</q> funtion
- in the component <q>tif_unix.c</q>.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0.8-2+deb9u7.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2777.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2778.data b/english/lts/security/2021/dla-2778.data
deleted file mode 100644
index e3903348eff..00000000000
--- a/english/lts/security/2021/dla-2778.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2778-1 fig2dev</define-tag>
-<define-tag report_date>2021-10-04</define-tag>
-<define-tag secrefs>CVE-2019-19797 CVE-2020-21529 CVE-2020-21530 CVE-2020-21531 CVE-2020-21532 CVE-2020-21533 CVE-2020-21534 CVE-2020-21535 CVE-2020-21675 CVE-2020-21676 CVE-2021-3561 CVE-2021-32280</define-tag>
-<define-tag packages>fig2dev</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2778.wml b/english/lts/security/2021/dla-2778.wml
deleted file mode 100644
index cde189ea25f..00000000000
--- a/english/lts/security/2021/dla-2778.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in fig2dev, utilities
-for converting XFig figure files. Buffer overflows, out-of-bounds reads and
-NULL pointer dereferences could lead to a denial-of-service or other
-unspecified impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:3.2.6a-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your fig2dev packages.</p>
-
-<p>For the detailed security status of fig2dev please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/fig2dev">https://security-tracker.debian.org/tracker/fig2dev</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2778.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2779.data b/english/lts/security/2021/dla-2779.data
deleted file mode 100644
index 2452c352f68..00000000000
--- a/english/lts/security/2021/dla-2779.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2779-1 mediawiki</define-tag>
-<define-tag report_date>2021-10-09</define-tag>
-<define-tag secrefs>CVE-2021-35197 CVE-2021-41798 CVE-2021-41799</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2779.wml b/english/lts/security/2021/dla-2779.wml
deleted file mode 100644
index 09dd8a55ac0..00000000000
--- a/english/lts/security/2021/dla-2779.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in MediaWiki, a website engine for
-collaborative work, which could result in cross-site scripting,
-denial of service and certain unintended API access.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.27.7-1~deb9u10.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2779.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2780.data b/english/lts/security/2021/dla-2780.data
deleted file mode 100644
index 043126cbe22..00000000000
--- a/english/lts/security/2021/dla-2780.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2780-1 ruby2.3</define-tag>
-<define-tag report_date>2021-10-13</define-tag>
-<define-tag secrefs>CVE-2021-31799 CVE-2021-31810 CVE-2021-32066 Bug#990815</define-tag>
-<define-tag packages>ruby2.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2780.wml b/english/lts/security/2021/dla-2780.wml
deleted file mode 100644
index 03510e7efff..00000000000
--- a/english/lts/security/2021/dla-2780.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilites in ruby2.3, interpreter of object-oriented
-scripting language Ruby, were discovered.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31799">CVE-2021-31799</a>
-
- <p>In RDoc 3.11 through 6.x before 6.3.1, as distributed with
- Ruby through 2.3.3, it is possible to execute arbitrary
- code via | and tags in a filename.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31810">CVE-2021-31810</a>
-
- <p>An issue was discovered in Ruby through 2.3.3. A malicious
- FTP server can use the PASV response to trick Net::FTP into
- connecting back to a given IP address and port. This
- potentially makes curl extract information about services
- that are otherwise private and not disclosed (e.g., the
- attacker can conduct port scans and service banner extractions).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32066">CVE-2021-32066</a>
-
- <p>An issue was discovered in Ruby through 2.3.3. Net::IMAP does
- not raise an exception when StartTLS fails with an an unknown
- response, which might allow man-in-the-middle attackers to
- bypass the TLS protections by leveraging a network position
- between the client and the registry to block the StartTLS
- command, aka a "StartTLS stripping attack."</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.3.3-1+deb9u10.</p>
-
-<p>We recommend that you upgrade your ruby2.3 packages.</p>
-
-<p>For the detailed security status of ruby2.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby2.3">https://security-tracker.debian.org/tracker/ruby2.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2780.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2781.data b/english/lts/security/2021/dla-2781.data
deleted file mode 100644
index 86b97136b20..00000000000
--- a/english/lts/security/2021/dla-2781.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2781-1 neutron</define-tag>
-<define-tag report_date>2021-10-11</define-tag>
-<define-tag secrefs>CVE-2021-40085</define-tag>
-<define-tag packages>neutron</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2781.wml b/english/lts/security/2021/dla-2781.wml
deleted file mode 100644
index ca1df834080..00000000000
--- a/english/lts/security/2021/dla-2781.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue where authenticated attackers
-could have reconfigured dnsmasq via a crafted extra_dhcp_opts value within
-OpenStack's Neutron virtual network service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40085">CVE-2021-40085</a>
-
- <p>An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before
- 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure
- dnsmasq via a crafted extra_dhcp_opts value.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2:9.1.1-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your neutron packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2781.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2782.data b/english/lts/security/2021/dla-2782.data
deleted file mode 100644
index c532b6e3012..00000000000
--- a/english/lts/security/2021/dla-2782.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2782-1 firefox-esr</define-tag>
-<define-tag report_date>2021-10-11</define-tag>
-<define-tag secrefs>CVE-2021-38496 CVE-2021-38500</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2782.wml b/english/lts/security/2021/dla-2782.wml
deleted file mode 100644
index 6017214adaf..00000000000
--- a/english/lts/security/2021/dla-2782.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-78.15.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2782.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2783.data b/english/lts/security/2021/dla-2783.data
deleted file mode 100644
index eb7eb76303a..00000000000
--- a/english/lts/security/2021/dla-2783.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2783-1 hiredis</define-tag>
-<define-tag report_date>2021-10-12</define-tag>
-<define-tag secrefs>CVE-2021-32765</define-tag>
-<define-tag packages>hiredis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2783.wml b/english/lts/security/2021/dla-2783.wml
deleted file mode 100644
index 74e01016534..00000000000
--- a/english/lts/security/2021/dla-2783.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an integer-overflow vulnerability in
-hiredis, a C client library for communicating with Redis databases. This
-occurred within the handling and parsing of 'multi-bulk' replies.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32765">CVE-2021-32765</a>
-
- <p>Hiredis is a minimalistic C client library for the Redis database. In
- affected versions Hiredis is vulnurable to integer overflow if provided
- maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When
- parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count
- * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and
- the `calloc()` call doesn't itself make this check, it would result in a
- short allocation and subsequent buffer overflow. Users of hiredis who are
- unable to update may set the
- [maxelements](https://github.com/redis/hiredis#reader-max-array-elements)
- context option to a value small enough that no overflow is
- possible.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.13.3-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your hiredis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2783.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2784.data b/english/lts/security/2021/dla-2784.data
deleted file mode 100644
index a62226775ab..00000000000
--- a/english/lts/security/2021/dla-2784.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2784-1 icu</define-tag>
-<define-tag report_date>2021-10-12</define-tag>
-<define-tag secrefs>CVE-2020-21913</define-tag>
-<define-tag packages>icu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2784.wml b/english/lts/security/2021/dla-2784.wml
deleted file mode 100644
index 9fb8d2947d6..00000000000
--- a/english/lts/security/2021/dla-2784.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential use-after-free vulnerability in
-icu, a library which provides Unicode and locale functionality.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21913">CVE-2020-21913</a>
-
- <p>International Components for Unicode (ICU-20850) v66.1 was discovered to
- contain a use after free bug in the pkg_createWithAssemblyCode function in
- the file tools/pkgdata/pkgdata.cpp.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-57.1-6+deb9u5.</p>
-
-<p>We recommend that you upgrade your icu packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2784.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2785.data b/english/lts/security/2021/dla-2785.data
deleted file mode 100644
index 78f4c37f8b4..00000000000
--- a/english/lts/security/2021/dla-2785.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2785-1 linux-4.19</define-tag>
-<define-tag report_date>2021-10-15</define-tag>
-<define-tag secrefs>CVE-2020-3702 CVE-2020-16119 CVE-2021-3444 CVE-2021-3600 CVE-2021-3612 CVE-2021-3653 CVE-2021-3655 CVE-2021-3656 CVE-2021-3679 CVE-2021-3732 CVE-2021-3743 CVE-2021-3753 CVE-2021-22543 CVE-2021-33624 CVE-2021-34556 CVE-2021-35039 CVE-2021-35477 CVE-2021-37159 CVE-2021-38160 CVE-2021-38198 CVE-2021-38199 CVE-2021-38205 CVE-2021-40490</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2785.wml b/english/lts/security/2021/dla-2785.wml
deleted file mode 100644
index 533111f42bf..00000000000
--- a/english/lts/security/2021/dla-2785.wml
+++ /dev/null
@@ -1,179 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3702">CVE-2020-3702</a>
-
- <p>A flaw was found in the driver for Atheros IEEE 802.11n family of
- chipsets (ath9k) allowing information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16119">CVE-2020-16119</a>
-
- <p>Hadar Manor reported a use-after-free in the DCCP protocol
- implementation in the Linux kernel. A local attacker can take
- advantage of this flaw to cause a denial of service or potentially
- to execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3444">CVE-2021-3444</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-3600">CVE-2021-3600</a></p>
-
- <p>Two flaws were discovered in the Extended BPF (eBPF) verifier. A
- local user could exploit these to read and write arbitrary memory
- in the kernel, which could be used for privilege escalation.</p>
-
- <p>This can be mitigated by setting sysctl
- kernel.unprivileged_bpf_disabled=1, which disables eBPF use by
- unprivileged users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3612">CVE-2021-3612</a>
-
- <p>Murray McAllister reported a flaw in the joystick input subsystem.
- A local user permitted to access a joystick device could exploit
- this to read and write out-of-bounds in the kernel, which could
- be used for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3653">CVE-2021-3653</a>
-
- <p>Maxim Levitsky discovered a vulnerability in the KVM hypervisor
- implementation for AMD processors in the Linux kernel: Missing
- validation of the `int_ctl` VMCB field could allow a malicious L1
- guest to enable AVIC support (Advanced Virtual Interrupt
- Controller) for the L2 guest. The L2 guest can take advantage of
- this flaw to write to a limited but still relatively large subset
- of the host physical memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3655">CVE-2021-3655</a>
-
- <p>Ilja Van Sprundel and Marcelo Ricardo Leitner found multiple flaws
- in the SCTP implementation, where missing validation could lead to
- an out-of-bounds read. On a system using SCTP, a networked
- attacker could exploit these to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3656">CVE-2021-3656</a>
-
- <p>Maxim Levitsky and Paolo Bonzini discovered a flaw in the KVM
- hypervisor implementation for AMD processors in the Linux
- kernel. Missing validation of the `virt_ext` VMCB field could
- allow a malicious L1 guest to disable both VMLOAD/VMSAVE
- intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. Under
- these circumstances, the L2 guest is able to run VMLOAD/VMSAVE
- unintercepted and thus read/write portions of the host's physical
- memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3679">CVE-2021-3679</a>
-
- <p>A flaw in the Linux kernel tracing module functionality could
- allow a privileged local user (with CAP_SYS_ADMIN capability) to
- cause a denial of service (resource starvation).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3732">CVE-2021-3732</a>
-
- <p>Alois Wohlschlager reported a flaw in the implementation of the
- overlayfs subsystem, allowing a local attacker with privileges to
- mount a filesystem to reveal files hidden in the original mount.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3743">CVE-2021-3743</a>
-
- <p>An out-of-bounds memory read was discovered in the Qualcomm IPC
- router protocol implementation, allowing to cause a denial of
- service or information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3753">CVE-2021-3753</a>
-
- <p>Minh Yuan reported a race condition in the vt_k_ioctl in
- drivers/tty/vt/vt_ioctl.c, which may cause an out of bounds read
- in vt.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22543">CVE-2021-22543</a>
-
- <p>David Stevens discovered a flaw in how the KVM hypervisor maps
- host memory into a guest. A local user permitted to access
- /dev/kvm could use this to cause certain pages to be freed when
- they should not, leading to a use-after-free. This could be used
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33624">CVE-2021-33624</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-34556">CVE-2021-34556</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-35477">CVE-2021-35477</a></p>
-
- <p>Multiple researchers discovered flaws in the Extended BPF (eBPF)
- verifier's protections against information leaks through
- speculation execution. A local user could exploit these to read
- sensitive information.</p>
-
- <p>This can be mitigated by setting sysctl
- kernel.unprivileged_bpf_disabled=1, which disables eBPF use by
- unprivileged users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-35039">CVE-2021-35039</a>
-
- <p>A flaw was discovered in module signature enforcement. A custom
- kernel with IMA enabled might have allowed loading unsigned kernel
- modules when it should not have.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37159">CVE-2021-37159</a>
-
- <p>A flaw was discovered in the hso driver for Option mobile
- broadband modems. An error during initialisation could lead to a
- double-free or use-after-free. An attacker able to plug in USB
- devices could use this to cause a denial of service (crash or
- memory corruption) or possibly to run arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38160">CVE-2021-38160</a>
-
- <p>A flaw in the virtio_console was discovered allowing data
- corruption or data loss by an untrusted device.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38198">CVE-2021-38198</a>
-
- <p>A flaw was discovered in the KVM implementation for x86
- processors, that could result in virtual memory protection within
- a guest not being applied correctly. When shadow page tables are
- used - i.e. for nested virtualisation, or on CPUs lacking the EPT
- or NPT feature - a user of the guest OS might be able to exploit
- this for denial of service or privilege escalation within the
- guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38199">CVE-2021-38199</a>
-
- <p>Michael Wakabayashi reported a flaw in the NFSv4 client
- implementation, where incorrect connection setup ordering allows
- operations of a remote NFSv4 server to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38205">CVE-2021-38205</a>
-
- <p>An information leak was discovered in the xilinx_emaclite network
- driver. On a custom kernel where this driver is enabled and used,
- this might make it easier to exploit other kernel bugs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40490">CVE-2021-40490</a>
-
- <p>A race condition was discovered in the ext4 subsystem when writing
- to an inline_data file while its xattrs are changing. This could
- result in denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.208-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2785.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2786.data b/english/lts/security/2021/dla-2786.data
deleted file mode 100644
index df1fd5410fd..00000000000
--- a/english/lts/security/2021/dla-2786.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2786-1 nghttp2</define-tag>
-<define-tag report_date>2021-10-16</define-tag>
-<define-tag secrefs>CVE-2018-1000168 CVE-2020-11080</define-tag>
-<define-tag packages>nghttp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2786.wml b/english/lts/security/2021/dla-2786.wml
deleted file mode 100644
index 60f242a8de8..00000000000
--- a/english/lts/security/2021/dla-2786.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issue have been discovered in nghttp2: server, proxy and client
-implementing HTTP/2.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000168">CVE-2018-1000168</a>
-
- <p>An Improper Input Validation CWE-20 vulnerability found in ALTSVC frame handling
- that can result in segmentation fault leading to denial of service. This attack
- appears to be exploitable via network client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11080">CVE-2020-11080</a>
-
- <p>The overly large HTTP/2 SETTINGS frame payload causes denial of service.
- The proof of concept attack involves a malicious client constructing a SETTINGS
- frame with a length of 14,400 bytes (2400 individual settings entries) over and over again.
- The attack causes the CPU to spike at 100%.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.18.1-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your nghttp2 packages.</p>
-
-<p>For the detailed security status of nghttp2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nghttp2">https://security-tracker.debian.org/tracker/nghttp2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2786.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2787.data b/english/lts/security/2021/dla-2787.data
deleted file mode 100644
index 31763238830..00000000000
--- a/english/lts/security/2021/dla-2787.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2787-1 redmine</define-tag>
-<define-tag report_date>2021-10-19</define-tag>
-<define-tag secrefs>CVE-2021-42326</define-tag>
-<define-tag packages>redmine</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2787.wml b/english/lts/security/2021/dla-2787.wml
deleted file mode 100644
index 4417ad94de5..00000000000
--- a/english/lts/security/2021/dla-2787.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Redmine, a project management web application, may disclose the names
-of users on activity views due to an insufficient access filter. An
-attacker may infer information of users working on private projects.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.3.1-4+deb9u5.</p>
-
-<p>We recommend that you upgrade your redmine packages.</p>
-
-<p>For the detailed security status of redmine please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/redmine">https://security-tracker.debian.org/tracker/redmine</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2787.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2788.data b/english/lts/security/2021/dla-2788.data
deleted file mode 100644
index cfa8d2fb70a..00000000000
--- a/english/lts/security/2021/dla-2788.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2788-1 strongswan</define-tag>
-<define-tag report_date>2021-10-19</define-tag>
-<define-tag secrefs>CVE-2021-41991</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2788.wml b/english/lts/security/2021/dla-2788.wml
deleted file mode 100644
index 19aada317fd..00000000000
--- a/english/lts/security/2021/dla-2788.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Researchers at the United States of America National Security Agency (NSA)
-identified a denial of services vulnerability in strongSwan, an
-IKE/IPsec suite.</p>
-
-<p>Once the in-memory certificate cache is full it tries to randomly replace
-lesser used entries. Depending on the generated random value, this could
-lead to an integer overflow that results in a double-dereference and a
-call using out-of-bounds memory that most likely leads to a segmentation
-fault.</p>
-
-<p>Remote code execution can't be ruled out completely, but attackers have
-no control over the dereferenced memory, so it seems unlikely at this
-point.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.5.1-4+deb9u5.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-
-<p>For the detailed security status of strongswan please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/strongswan">https://security-tracker.debian.org/tracker/strongswan</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2788.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2789.data b/english/lts/security/2021/dla-2789.data
deleted file mode 100644
index 263d77c0992..00000000000
--- a/english/lts/security/2021/dla-2789.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2789-1 squashfs-tools</define-tag>
-<define-tag report_date>2021-10-20</define-tag>
-<define-tag secrefs>CVE-2021-41072</define-tag>
-<define-tag packages>squashfs-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2789.wml b/english/lts/security/2021/dla-2789.wml
deleted file mode 100644
index fd3308d0111..00000000000
--- a/english/lts/security/2021/dla-2789.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Richard Weinberger reported that unsquashfs in squashfs-tools, the tools
-to create and extract Squashfs filesystems, does not check for duplicate
-filenames within a directory. An attacker can take advantage of this flaw
-for writing to arbitrary files to the filesystem if a malformed Squashfs
-image is processed.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:4.3-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your squashfs-tools packages.</p>
-
-<p>For the detailed security status of squashfs-tools please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/squashfs-tools">https://security-tracker.debian.org/tracker/squashfs-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2789.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2790.data b/english/lts/security/2021/dla-2790.data
deleted file mode 100644
index 049dac1289d..00000000000
--- a/english/lts/security/2021/dla-2790.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2790-1 python-babel</define-tag>
-<define-tag report_date>2021-10-21</define-tag>
-<define-tag secrefs>CVE-2021-42771 Bug#987824</define-tag>
-<define-tag packages>python-babel</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2790.wml b/english/lts/security/2021/dla-2790.wml
deleted file mode 100644
index bf2dd82ae52..00000000000
--- a/english/lts/security/2021/dla-2790.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tenable discovered that in Babel, a set of tools for
-internationalizing Python applications, Babel.Locale allows attackers
-to load arbitrary locale .dat files (containing serialized Python
-objects) via directory traversal, leading to code execution. This
-vulnerability was also previously addressed under <a href="https://security-tracker.debian.org/tracker/CVE-2021-20095">CVE-2021-20095</a> in
-other distributions and suites.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.3.4+dfsg.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-babel packages.</p>
-
-<p>For the detailed security status of python-babel please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-babel">https://security-tracker.debian.org/tracker/python-babel</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2790.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2791.data b/english/lts/security/2021/dla-2791.data
deleted file mode 100644
index 478c1729dc7..00000000000
--- a/english/lts/security/2021/dla-2791.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2791-1 mailman</define-tag>
-<define-tag report_date>2021-10-26</define-tag>
-<define-tag secrefs>CVE-2021-42096 CVE-2021-42097</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2791.wml b/english/lts/security/2021/dla-2791.wml
deleted file mode 100644
index 4f7da4a20de..00000000000
--- a/english/lts/security/2021/dla-2791.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote privilege escalation
-vulnerability in the Mailman mailing-list manager. Some CSRF token values were
-derived from the admin password, and that could have been used to conductg a
-brute-force attack against that password.</p>
-
-<ul>
-
-<li>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-42096">CVE-2021-42096</a>
- &amp;
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-42097">CVE-2021-42097</a>
-
- <p>GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A
- certain csrf_token value is derived from the admin password, and may be
- useful in conducting a brute-force attack against that password.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:2.1.23-1+deb9u7.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2791.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2792.data b/english/lts/security/2021/dla-2792.data
deleted file mode 100644
index 1ec666dd169..00000000000
--- a/english/lts/security/2021/dla-2792.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2792-1 faad2</define-tag>
-<define-tag report_date>2021-10-24</define-tag>
-<define-tag secrefs>CVE-2018-20199 CVE-2018-20360 CVE-2019-6956 CVE-2021-32274 CVE-2021-32276 CVE-2021-32277 CVE-2021-32278</define-tag>
-<define-tag packages>faad2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2792.wml b/english/lts/security/2021/dla-2792.wml
deleted file mode 100644
index 88c74bb4288..00000000000
--- a/english/lts/security/2021/dla-2792.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in faad2, a freeware Advanced Audio Decoder
-player. They are related to heap buffer overflows or null pointer
-dereferences, which both might allow an attacker to execute code by
-providing crafted files.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.8.0~cvs20161113-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your faad2 packages.</p>
-
-<p>For the detailed security status of faad2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/faad2">https://security-tracker.debian.org/tracker/faad2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2792.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2793.data b/english/lts/security/2021/dla-2793.data
deleted file mode 100644
index 0226a221d59..00000000000
--- a/english/lts/security/2021/dla-2793.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2793-1 mosquitto</define-tag>
-<define-tag report_date>2021-10-27</define-tag>
-<define-tag secrefs>CVE-2017-7655</define-tag>
-<define-tag packages>mosquitto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2793.wml b/english/lts/security/2021/dla-2793.wml
deleted file mode 100644
index ce7b35f4908..00000000000
--- a/english/lts/security/2021/dla-2793.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in mosquitto: MQTT message broker.
-A null dereference vulnerability was found which could lead to crashes for
-applications using the library.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.10-3+deb9u5.</p>
-
-<p>We recommend that you upgrade your mosquitto packages.</p>
-
-<p>For the detailed security status of mosquitto please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mosquitto">https://security-tracker.debian.org/tracker/mosquitto</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2793.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2794.data b/english/lts/security/2021/dla-2794.data
deleted file mode 100644
index dbbd8d666b5..00000000000
--- a/english/lts/security/2021/dla-2794.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2794-1 php7.0</define-tag>
-<define-tag report_date>2021-10-27</define-tag>
-<define-tag secrefs>CVE-2021-21703 Bug#997003</define-tag>
-<define-tag packages>php7.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2794.wml b/english/lts/security/2021/dla-2794.wml
deleted file mode 100644
index ba8fa22bee3..00000000000
--- a/english/lts/security/2021/dla-2794.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds read and write flaw was discovered in the PHP-FPM code,
-which could result in escalation of privileges from local unprivileged
-user to the root user.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-7.0.33-0+deb9u12.</p>
-
-<p>We recommend that you upgrade your php7.0 packages.</p>
-
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.0">https://security-tracker.debian.org/tracker/php7.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2794.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2795.data b/english/lts/security/2021/dla-2795.data
deleted file mode 100644
index 3a8673444c3..00000000000
--- a/english/lts/security/2021/dla-2795.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2795-1 gpsd</define-tag>
-<define-tag report_date>2021-10-29</define-tag>
-<define-tag secrefs>CVE-2018-17937 Bug#925327</define-tag>
-<define-tag packages>gpsd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2795.wml b/english/lts/security/2021/dla-2795.wml
deleted file mode 100644
index d9bbb63571b..00000000000
--- a/english/lts/security/2021/dla-2795.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in gpsd, the Global Positioning
-System daemon. A stack-based buffer overflow may allow remote attackers
-to execute arbitrary code via traffic on port 2947/TCP or crafted JSON
-inputs.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.16-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your gpsd packages.</p>
-
-<p>For the detailed security status of gpsd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gpsd">https://security-tracker.debian.org/tracker/gpsd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2795.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2796.data b/english/lts/security/2021/dla-2796.data
deleted file mode 100644
index a007b6f8d9a..00000000000
--- a/english/lts/security/2021/dla-2796.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2796-1 jbig2dec</define-tag>
-<define-tag report_date>2021-10-28</define-tag>
-<define-tag secrefs>CVE-2017-9216 CVE-2020-12268</define-tag>
-<define-tag packages>jbig2dec</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2796.wml b/english/lts/security/2021/dla-2796.wml
deleted file mode 100644
index 208a21c79cd..00000000000
--- a/english/lts/security/2021/dla-2796.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in jbig2dec, a JBIG2 decoder library.
-One issue is related to an overflow with a crafted image file. The other
-is related to a NULL pointer dereference.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.13-4.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your jbig2dec packages.</p>
-
-<p>For the detailed security status of jbig2dec please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jbig2dec">https://security-tracker.debian.org/tracker/jbig2dec</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2796.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2797.data b/english/lts/security/2021/dla-2797.data
deleted file mode 100644
index a76432ae2bc..00000000000
--- a/english/lts/security/2021/dla-2797.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2797-1 tzdata</define-tag>
-<define-tag report_date>2021-10-29</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2797.wml b/english/lts/security/2021/dla-2797.wml
deleted file mode 100644
index 8a49c93bbbc..00000000000
--- a/english/lts/security/2021/dla-2797.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2021e. Notable
-changes are:</p>
-
-<p>- Fiji suspends DST for the 2021/2022 season.
-- Palestine falls back 2021-10-29 (not 2021-10-30) at 01:00.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2021a-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2797.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2798.data b/english/lts/security/2021/dla-2798.data
deleted file mode 100644
index f72eb41109f..00000000000
--- a/english/lts/security/2021/dla-2798.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2798-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2021-10-29</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2798.wml b/english/lts/security/2021/dla-2798.wml
deleted file mode 100644
index 1048e12662a..00000000000
--- a/english/lts/security/2021/dla-2798.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2021e for the
-Perl bindings. For the list of changes, see DLA-2797-1.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.09-1+2021e.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2798.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2799.data b/english/lts/security/2021/dla-2799.data
deleted file mode 100644
index 9ebf4c20c65..00000000000
--- a/english/lts/security/2021/dla-2799.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2799-1 opencv</define-tag>
-<define-tag report_date>2021-10-30</define-tag>
-<define-tag secrefs>CVE-2016-1516 CVE-2017-12597 CVE-2017-12598 CVE-2017-12599 CVE-2017-12601 CVE-2017-12603 CVE-2017-12604 CVE-2017-12605 CVE-2017-12606 CVE-2017-12862 CVE-2017-12863 CVE-2017-12864 CVE-2017-17760 CVE-2017-1000450 CVE-2018-5268 CVE-2018-5269 CVE-2019-14493 CVE-2019-15939 Bug#886282 Bug#885843 Bug#875342 Bug#872044 Bug#872043</define-tag>
-<define-tag packages>opencv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2799.wml b/english/lts/security/2021/dla-2799.wml
deleted file mode 100644
index 2025e0ed0dd..00000000000
--- a/english/lts/security/2021/dla-2799.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in OpenCV, the Open
-Computer Vision Library. Buffer overflows, NULL pointer dereferences and
-out-of-bounds write errors may lead to a denial-of-service or other
-unspecified impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.9.1+dfsg1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your opencv packages.</p>
-
-<p>For the detailed security status of opencv please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/opencv">https://security-tracker.debian.org/tracker/opencv</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2799.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2800.data b/english/lts/security/2021/dla-2800.data
deleted file mode 100644
index 44245005db3..00000000000
--- a/english/lts/security/2021/dla-2800.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2800-1 cups</define-tag>
-<define-tag report_date>2021-10-30</define-tag>
-<define-tag secrefs>CVE-2020-10001</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2800.wml b/english/lts/security/2021/dla-2800.wml
deleted file mode 100644
index 7d6fa560828..00000000000
--- a/english/lts/security/2021/dla-2800.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in cups, the Common UNIX Printing System.
-Due to an input validation issue a malicious application might be allowed
-to read restricted memory.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.2.1-8+deb9u7.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>For the detailed security status of cups please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cups">https://security-tracker.debian.org/tracker/cups</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2800.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2801.data b/english/lts/security/2021/dla-2801.data
deleted file mode 100644
index 72379af7cca..00000000000
--- a/english/lts/security/2021/dla-2801.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2801-1 cron</define-tag>
-<define-tag report_date>2021-10-30</define-tag>
-<define-tag secrefs>CVE-2017-9525 CVE-2019-9704 CVE-2019-9705 CVE-2019-9706 Bug#809167 Bug#809167</define-tag>
-<define-tag packages>cron</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2801.wml b/english/lts/security/2021/dla-2801.wml
deleted file mode 100644
index 557e48b6c71..00000000000
--- a/english/lts/security/2021/dla-2801.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security problems have been fixed in the cron daemon.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9525">CVE-2017-9525</a>
-
- <p>Fix group crontab to root escalation via postinst.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9704">CVE-2019-9704</a>
-
- <p>A very large crontab created by a user could crash the daemon.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9705">CVE-2019-9705</a>
-
- <p>Enforce maximum crontab line count of 10000 to prevent a malicious
- user from creating an excessivly large crontab.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9706">CVE-2019-9706</a>
-
- <p>Fix for possible DoS by use-after-free.</p></li>
-
-<li><p>Additionally, a bypass of /etc/cron.{allow,deny} on failure to open has
-been fixed. If these files exist, then they must be readable by the user
-executing crontab(1). Users will now be denied by default if they aren't.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.0pl1-128+deb9u2.</p>
-
-<p>We recommend that you upgrade your cron packages.</p>
-
-<p>For the detailed security status of cron please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cron">https://security-tracker.debian.org/tracker/cron</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2801.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2802.data b/english/lts/security/2021/dla-2802.data
deleted file mode 100644
index 7b71718ec26..00000000000
--- a/english/lts/security/2021/dla-2802.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2802-1 elfutils</define-tag>
-<define-tag report_date>2021-10-31</define-tag>
-<define-tag secrefs>CVE-2018-16062 CVE-2018-16402 CVE-2018-18310 CVE-2018-18520 CVE-2018-18521 CVE-2019-7150 CVE-2019-7665 Bug#907562 Bug#911083 Bug#911413 Bug#911414 Bug#920909 Bug#921880</define-tag>
-<define-tag packages>elfutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2802.wml b/english/lts/security/2021/dla-2802.wml
deleted file mode 100644
index 661beb599ea..00000000000
--- a/english/lts/security/2021/dla-2802.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in elfutils, a collection of
-utilities and libraries to handle ELF objects.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16062">CVE-2018-16062</a>
-
- <p>dwarf_getaranges in dwarf_getaranges.c in libdw allowed a denial of
- service (heap-based buffer over-read) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16402">CVE-2018-16402</a>
-
- <p>libelf/elf_end.c in allowed to cause a denial of service (double
- free and application crash) because it tried to decompress twice.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18310">CVE-2018-18310</a>
-
- <p>An invalid memory address dereference libdwfl allowed a denial of
- service (application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18520">CVE-2018-18520</a>
-
- <p>A use-after-free in recursive ELF ar files allowed a denial of
- service (application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18521">CVE-2018-18521</a>
-
- <p>A divide-by-zero in arlib_add_symbols() allowed a denial of service
- (application crash) via a crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7150">CVE-2019-7150</a>
-
- <p>A segmentation fault could occur due to dwfl_segment_report_module()
- not checking whether the dyn data read from a core file is truncated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7665">CVE-2019-7665</a>
-
- <p>NT_PLATFORM core notes contain a zero terminated string allowed a
- denial of service (application crash) via a crafted file.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.168-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your elfutils packages.</p>
-
-<p>For the detailed security status of elfutils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/elfutils">https://security-tracker.debian.org/tracker/elfutils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2802.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2803.data b/english/lts/security/2021/dla-2803.data
deleted file mode 100644
index c8ccac7f58d..00000000000
--- a/english/lts/security/2021/dla-2803.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2803-1 libsdl2</define-tag>
-<define-tag report_date>2021-10-31</define-tag>
-<define-tag secrefs>CVE-2017-2888 CVE-2019-7637 Bug#878264</define-tag>
-<define-tag packages>libsdl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2803.wml b/english/lts/security/2021/dla-2803.wml
deleted file mode 100644
index c3b5645c4d2..00000000000
--- a/english/lts/security/2021/dla-2803.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been fixed in libsdl2, the newer version of the
-Simple DirectMedia Layer library that provides low level access to
-audio, keyboard, mouse, joystick, and graphics hardware.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-2888">CVE-2017-2888</a>
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-7637">CVE-2019-7637</a>
-
- <p>Potential overflow in surface allocation was fixed.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.0.5+dfsg1-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your libsdl2 packages.</p>
-
-<p>For the detailed security status of libsdl2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsdl2">https://security-tracker.debian.org/tracker/libsdl2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2803.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2804.data b/english/lts/security/2021/dla-2804.data
deleted file mode 100644
index b6e2cf9dbc7..00000000000
--- a/english/lts/security/2021/dla-2804.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2804-1 libsdl1.2</define-tag>
-<define-tag report_date>2021-10-31</define-tag>
-<define-tag secrefs>CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638 CVE-2019-13616 Bug#924609</define-tag>
-<define-tag packages>libsdl1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2804.wml b/english/lts/security/2021/dla-2804.wml
deleted file mode 100644
index dd96ad4561a..00000000000
--- a/english/lts/security/2021/dla-2804.wml
+++ /dev/null
@@ -1,75 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerability have been fixed in libsdl2, the older version of
-the Simple DirectMedia Layer library that provides low level access to
-audio, keyboard, mouse, joystick, and graphics hardware.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7572">CVE-2019-7572</a>
-
- <p>Buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7573">CVE-2019-7573</a>
-
- <p>Heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7574">CVE-2019-7574</a>
-
- <p>Heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7575">CVE-2019-7575</a>
-
- <p>Heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7576">CVE-2019-7576</a>
-
- <p>Heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7577">CVE-2019-7577</a>
-
- <p>Buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7578">CVE-2019-7578</a>
-
- <p>Heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7635">CVE-2019-7635</a>
-
- <p>Heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7636">CVE-2019-7636</a>
-
- <p>Heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7637">CVE-2019-7637</a>
-
- <p>Heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-7638">CVE-2019-7638</a>
-
- <p>Heap-based buffer over-read in Map1toN in video/SDL_pixels.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13616">CVE-2019-13616</a>
-
- <p>Heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.2.15+dfsg1-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your libsdl1.2 packages.</p>
-
-<p>For the detailed security status of libsdl1.2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsdl1.2">https://security-tracker.debian.org/tracker/libsdl1.2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2804.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2805.data b/english/lts/security/2021/dla-2805.data
deleted file mode 100644
index a372090a323..00000000000
--- a/english/lts/security/2021/dla-2805.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2805-1 libmspack</define-tag>
-<define-tag report_date>2021-10-31</define-tag>
-<define-tag secrefs>CVE-2019-1010305</define-tag>
-<define-tag packages>libmspack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2805.wml b/english/lts/security/2021/dla-2805.wml
deleted file mode 100644
index ad3528d6fab..00000000000
--- a/english/lts/security/2021/dla-2805.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Opening a crafted chm file could result in a buffer overflow in libmspack,
-a library for Microsoft compression formats.
-</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.5-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your libmspack packages.</p>
-
-<p>For the detailed security status of libmspack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libmspack">https://security-tracker.debian.org/tracker/libmspack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2805.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2806.data b/english/lts/security/2021/dla-2806.data
deleted file mode 100644
index 04afac8ebb8..00000000000
--- a/english/lts/security/2021/dla-2806.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2806-1 glusterfs</define-tag>
-<define-tag report_date>2021-11-02</define-tag>
-<define-tag secrefs>CVE-2018-1088 CVE-2018-10841 CVE-2018-10904 CVE-2018-10907 CVE-2018-10911 CVE-2018-10913 CVE-2018-10914 CVE-2018-10923 CVE-2018-10926 CVE-2018-10927 CVE-2018-10928 CVE-2018-10929 CVE-2018-10930 CVE-2018-14652 CVE-2018-14653 CVE-2018-14654 CVE-2018-14659 CVE-2018-14660 CVE-2018-14661 Bug#909215</define-tag>
-<define-tag packages>glusterfs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2806.wml b/english/lts/security/2021/dla-2806.wml
deleted file mode 100644
index 635b03aa27b..00000000000
--- a/english/lts/security/2021/dla-2806.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in GlusterFS, a
-clustered file system. Buffer overflows and path traversal issues may
-lead to information disclosure, denial-of-service or the execution of
-arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.8.8-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your glusterfs packages.</p>
-
-<p>For the detailed security status of glusterfs please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/glusterfs">https://security-tracker.debian.org/tracker/glusterfs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2806.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2807.data b/english/lts/security/2021/dla-2807.data
deleted file mode 100644
index 3e2185a5b5d..00000000000
--- a/english/lts/security/2021/dla-2807.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2807-1 bind9</define-tag>
-<define-tag report_date>2021-11-02</define-tag>
-<define-tag secrefs>CVE-2018-5740 CVE-2021-25219 Bug#905743</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2807.wml b/english/lts/security/2021/dla-2807.wml
deleted file mode 100644
index 0820749e776..00000000000
--- a/english/lts/security/2021/dla-2807.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25219">CVE-2021-25219</a>
-
- <p>Kishore Kumar Kothapalli discovered that the lame server cache in BIND,
- a DNS server implementation, can be abused by an attacker to
- significantly degrade resolver performance, resulting in denial of
- service (large delays for responses for client queries and DNS timeouts
- on client hosts).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5740">CVE-2018-5740</a>
-
- <p>"deny-answer-aliases" is a little-used feature intended to help recursive
- server operators protect end users against DNS rebinding attacks, a
- potential method of circumventing the security model used by client
- browsers. However, a defect in this feature makes it easy, when the
- feature is in use, to experience an assertion failure in name.c.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:9.10.3.dfsg.P4-12.3+deb9u10.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2807.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2808.data b/english/lts/security/2021/dla-2808.data
deleted file mode 100644
index 5cc4645dac3..00000000000
--- a/english/lts/security/2021/dla-2808.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2808-1 python3.5</define-tag>
-<define-tag report_date>2021-11-05</define-tag>
-<define-tag secrefs>CVE-2021-3733 CVE-2021-3737</define-tag>
-<define-tag packages>python3.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2808.wml b/english/lts/security/2021/dla-2808.wml
deleted file mode 100644
index 8fd68e8dbc4..00000000000
--- a/english/lts/security/2021/dla-2808.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There were a couple of vulnerabilites found in src:python3.5, the
-Python interpreter v3.5, and are as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3733">CVE-2021-3733</a>
-
- <p>The ReDoS-vulnerable regex has quadratic worst-case complexity
- and it allows cause a denial of service when identifying
- crafted invalid RFCs. This ReDoS issue is on the client side
- and needs remote attackers to control the HTTP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3737">CVE-2021-3737</a>
-
- <p>HTTP client can get stuck infinitely reading len(line) < 64k
- lines after receiving a <q>100 Continue</q> HTTP response. This
- could lead to the client being a bandwidth sink for anyone
- in control of a server.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.5.3-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your python3.5 packages.</p>
-
-<p>For the detailed security status of python3.5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.5">https://security-tracker.debian.org/tracker/python3.5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2808.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2809.data b/english/lts/security/2021/dla-2809.data
deleted file mode 100644
index b893956f8cb..00000000000
--- a/english/lts/security/2021/dla-2809.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2809-1 udisks2</define-tag>
-<define-tag report_date>2021-11-05</define-tag>
-<define-tag secrefs>CVE-2021-3802</define-tag>
-<define-tag packages>udisks2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2809.wml b/english/lts/security/2021/dla-2809.wml
deleted file mode 100644
index cb15277a125..00000000000
--- a/english/lts/security/2021/dla-2809.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Stefan Walter found that udisks2, a service to access and manipulate
-storage devices, could cause denial of service via system crash if a
-corrupted or specially crafted ext2/3/4 device or image was mounted,
-which could happen automatically on certain environments.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.1.8-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your udisks2 packages.</p>
-
-<p>For the detailed security status of udisks2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/udisks2">https://security-tracker.debian.org/tracker/udisks2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2809.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2810.data b/english/lts/security/2021/dla-2810.data
deleted file mode 100644
index 78a5045b499..00000000000
--- a/english/lts/security/2021/dla-2810.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2810-1 redis</define-tag>
-<define-tag report_date>2021-11-05</define-tag>
-<define-tag secrefs>CVE-2021-41099 CVE-2021-32762 CVE-2021-32687 CVE-2021-32675 CVE-2021-32672 CVE-2021-32626</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2810.wml b/english/lts/security/2021/dla-2810.wml
deleted file mode 100644
index 2a767f3dd4f..00000000000
--- a/english/lts/security/2021/dla-2810.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of issues in redis, a popular
-key-value database system:</p>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41099">CVE-2021-41099</a>:
- Integer to heap buffer overflow handling certain string commands and network
- payloads, when proto-max-bulk-len is manually configured to a non-default, very
- large value.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32762">CVE-2021-32762</a>:
- Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing
- large multi-bulk replies on some older and less common platforms.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32687">CVE-2021-32687</a>:
- Integer to heap buffer overflow with intsets, when set-max-intset-entries is
- manually configured to a non-default, very large value.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32675">CVE-2021-32675</a>:
- Denial Of Service when processing RESP request payloads with a large number of
- elements on many connections.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32672">CVE-2021-32672</a>:
- Random heap reading issue with Lua Debugger.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32626">CVE-2021-32626</a>:
- Specially crafted Lua scripts may result with Heap buffer overflow.</li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-3:3.2.6-3+deb9u8.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2810.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2811.data b/english/lts/security/2021/dla-2811.data
deleted file mode 100644
index 2163eaf299d..00000000000
--- a/english/lts/security/2021/dla-2811.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2811-1 sqlalchemy</define-tag>
-<define-tag report_date>2021-11-06</define-tag>
-<define-tag secrefs>CVE-2019-7164 CVE-2019-7548 Bug#922669</define-tag>
-<define-tag packages>sqlalchemy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2811.wml b/english/lts/security/2021/dla-2811.wml
deleted file mode 100644
index a2740aa4b1c..00000000000
--- a/english/lts/security/2021/dla-2811.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two SQL injection vulnerabilities were discovered in SQLAlchemy, a SQL
-toolkit and Object Relational Mapper for Python, when the order_by or
-group_by parameters can be controlled by an attacker.</p>
-
-<p>Warning: The text coercion feature of SQLAlchemy is rarely used but the
-warning that has been previously emitted is now an ArgumentError or in case
-of the order_by() and group_by() parameters a CompileError.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.15+ds1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your sqlalchemy packages.</p>
-
-<p>For the detailed security status of sqlalchemy please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/sqlalchemy">https://security-tracker.debian.org/tracker/sqlalchemy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2811.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2812.data b/english/lts/security/2021/dla-2812.data
deleted file mode 100644
index 019f91ddff1..00000000000
--- a/english/lts/security/2021/dla-2812.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2812-1 botan1.10</define-tag>
-<define-tag report_date>2021-11-09</define-tag>
-<define-tag secrefs>CVE-2017-14737</define-tag>
-<define-tag packages>botan1.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2812.wml b/english/lts/security/2021/dla-2812.wml
deleted file mode 100644
index d101dad6eaf..00000000000
--- a/english/lts/security/2021/dla-2812.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in botan1.10: a C++ cryptography
-library.</p>
-
-
-<p>An attacker of a local or a cross-VM may be able to recover bits of
-secret exponents as used in RSA, DH, etc. with help of cache analysis.
-<a href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/wang-shuai">https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/wang-shuai</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.10.17-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your botan1.10 packages.</p>
-
-<p>For the detailed security status of botan1.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/botan1.10">https://security-tracker.debian.org/tracker/botan1.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2812.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2813.data b/english/lts/security/2021/dla-2813.data
deleted file mode 100644
index 73c6a807778..00000000000
--- a/english/lts/security/2021/dla-2813.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2813-1 ckeditor</define-tag>
-<define-tag report_date>2021-11-09</define-tag>
-<define-tag secrefs>CVE-2021-33829 CVE-2021-37695 Bug#992290</define-tag>
-<define-tag packages>ckeditor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2813.wml b/english/lts/security/2021/dla-2813.wml
deleted file mode 100644
index 733325017f1..00000000000
--- a/english/lts/security/2021/dla-2813.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>CKEditor, an open source WYSIWYG HTML editor with rich content
-support, which can be embedded into web pages, had two
-vulnerabilites as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33829">CVE-2021-33829</a>
-
- <p>A cross-site scripting (XSS) vulnerability in the HTML Data
- Processor in CKEditor 4 allows remote attackers to inject
- executable JavaScript code through a crafted comment because
- --!> is mishandled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37695">CVE-2021-37695</a>
-
- <p>A potential vulnerability has been discovered in CKEditor 4
- Fake Objects package. The vulnerability allowed to inject
- malformed Fake Objects HTML, which could result in executing
- JavaScript code.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.5.7+dfsg-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your ckeditor packages.</p>
-
-<p>For the detailed security status of ckeditor please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ckeditor">https://security-tracker.debian.org/tracker/ckeditor</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2813.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2814.data b/english/lts/security/2021/dla-2814.data
deleted file mode 100644
index 0ba9d9cc1cc..00000000000
--- a/english/lts/security/2021/dla-2814.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2814-1 openjdk-8</define-tag>
-<define-tag report_date>2021-11-09</define-tag>
-<define-tag secrefs>CVE-2021-35550 CVE-2021-35556 CVE-2021-35559 CVE-2021-35561 CVE-2021-35564 CVE-2021-35565 CVE-2021-35567 CVE-2021-35578 CVE-2021-35586 CVE-2021-35588 CVE-2021-35603</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2814.wml b/english/lts/security/2021/dla-2814.wml
deleted file mode 100644
index 6428dfd7800..00000000000
--- a/english/lts/security/2021/dla-2814.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-including issues with cyprographic hashing, TLS client handshaking, and
-various other issues.</p>
-
-<p>Thanks to Thorsten Glaser and ⮡ tarent for contributing the updated
-packages to address these vulnerabilities.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u312-b07-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2814.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2815.data b/english/lts/security/2021/dla-2815.data
deleted file mode 100644
index 20404d500d3..00000000000
--- a/english/lts/security/2021/dla-2815.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2815-1 salt</define-tag>
-<define-tag report_date>2021-11-10</define-tag>
-<define-tag secrefs>CVE-2020-28243 CVE-2020-28972 CVE-2020-35662 CVE-2021-3144 CVE-2021-3148 CVE-2021-3197 CVE-2021-25281 CVE-2021-25282 CVE-2021-25283 CVE-2021-25284 CVE-2021-31607 Bug#987496 Bug#987496</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2815.wml b/english/lts/security/2021/dla-2815.wml
deleted file mode 100644
index 3ae5fd3b4ac..00000000000
--- a/english/lts/security/2021/dla-2815.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Salt, a powerful
-remote execution manager, that allow for local privilege escalation on a
-minion, server side template injection attacks, insufficient checks for
-eauth credentials, shell and command injections or incorrect validation of
-SSL certificates.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2016.11.2+ds-1+deb9u7.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>For the detailed security status of salt please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2815.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2816.data b/english/lts/security/2021/dla-2816.data
deleted file mode 100644
index 439d2741565..00000000000
--- a/english/lts/security/2021/dla-2816.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2816-1 icinga2</define-tag>
-<define-tag report_date>2021-11-10</define-tag>
-<define-tag secrefs>CVE-2021-32739 CVE-2021-32743 CVE-2021-37698 Bug#991494</define-tag>
-<define-tag packages>icinga2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2816.wml b/english/lts/security/2021/dla-2816.wml
deleted file mode 100644
index 41f39c9c4df..00000000000
--- a/english/lts/security/2021/dla-2816.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Icinga 2, a general-purpose
-monitoring application. An attacker could retrieve sensitive
-information such as service passwords and ticket salt by querying the
-web API, or by intercepting unsufficiently checked encrypted
-connections.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32739">CVE-2021-32739</a>
-
- <p>A vulnerability exists that may allow privilege escalation for
- authenticated API users. With a read-only user's credentials, an
- attacker can view most attributes of all config objects including
- `ticket_salt` of `ApiListener`. This salt is enough to compute a
- ticket for every possible common name (CN). A ticket, the master
- node's certificate, and a self-signed certificate are enough to
- successfully request the desired certificate from Icinga. That
- certificate may in turn be used to steal an endpoint or API user's
- identity. See also complementary manual procedures:
- <a href="https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/#change-ticket-salt">https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/#change-ticket-salt</a>
- <a href="https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/#replace-icinga-ca">https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/#replace-icinga-ca</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32743">CVE-2021-32743</a>
-
- <p>Some of the Icinga 2 features that require credentials for
- external services expose those credentials through the API to
- authenticated API users with read permissions for the
- corresponding object types. IdoMysqlConnection and
- IdoPgsqlConnection exposes the password of the user used to
- connect to the database. An attacker who obtains these credentials
- can impersonate Icinga to these services and add, modify and
- delete information there. If credentials with more permissions are
- in use, this increases the impact accordingly.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37698">CVE-2021-37698</a>
-
- <p>InfluxdbWriter and Influxdb2Writer do not verify the server's
- certificate despite a certificate authority being
- specified. Icinga 2 instances which connect to any of the
- mentioned time series databases (TSDBs) using TLS over a spoofable
- infrastructure should immediately upgrade. Such instances should
- also change the credentials (if any) used by the TSDB writer
- feature to authenticate against the TSDB.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.6.0-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your icinga2 packages.</p>
-
-<p>For the detailed security status of icinga2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/icinga2">https://security-tracker.debian.org/tracker/icinga2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2816.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2817.data b/english/lts/security/2021/dla-2817.data
deleted file mode 100644
index 0ef398424d1..00000000000
--- a/english/lts/security/2021/dla-2817.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2817-1 postgresql-9.6</define-tag>
-<define-tag report_date>2021-11-12</define-tag>
-<define-tag secrefs>CVE-2021-23214 CVE-2021-23222</define-tag>
-<define-tag packages>postgresql-9.6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2817.wml b/english/lts/security/2021/dla-2817.wml
deleted file mode 100644
index 14ad4c1dfc9..00000000000
--- a/english/lts/security/2021/dla-2817.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jacob Champion discovered two vulnerabilities in the PostgreSQL
-database system, which could result in man-in-the-middle attacks.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-9.6.24-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
-
-<p>For the detailed security status of postgresql-9.6 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-9.6">https://security-tracker.debian.org/tracker/postgresql-9.6</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2817.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2818.data b/english/lts/security/2021/dla-2818.data
deleted file mode 100644
index 48f678ff2a8..00000000000
--- a/english/lts/security/2021/dla-2818.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2818-1 ffmpeg</define-tag>
-<define-tag report_date>2021-11-14</define-tag>
-<define-tag secrefs>CVE-2020-20445 CVE-2020-20446 CVE-2020-20451 CVE-2020-20453 CVE-2020-22037 CVE-2020-22041 CVE-2020-22044 CVE-2020-22046 CVE-2020-22048 CVE-2020-22049 CVE-2020-22054 CVE-2021-38171 CVE-2021-38291</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2818.wml b/english/lts/security/2021/dla-2818.wml
deleted file mode 100644
index cce33eae0c0..00000000000
--- a/english/lts/security/2021/dla-2818.wml
+++ /dev/null
@@ -1,95 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been discovered in ffmpeg - tools for transcoding,
-streaming and playing of multimedia files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-20445">CVE-2020-20445</a>
-
- <p>Divide By Zero issue via libavcodec/lpc.h, which allows a remote malicious
- user to cause a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-20446">CVE-2020-20446</a>
-
- <p>Divide By Zero issue via libavcodec/aacpsy.c, which allows a remote malicious
- user to cause a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-20451">CVE-2020-20451</a>
-
- <p>Denial of Service issue due to resource management errors via
- fftools/cmdutils.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-20453">CVE-2020-20453</a>
-
- <p>Divide By Zero issue via libavcodec/aaccoder, which allows a remote
- malicious user to cause a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22037">CVE-2020-22037</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in
- avcodec_alloc_context3 at options.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22041">CVE-2020-22041</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in
- the av_buffersrc_add_frame_flags function in buffersrc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22044">CVE-2020-22044</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in the
- url_open_dyn_buf_internal function in libavformat/aviobuf.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22046">CVE-2020-22046</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in the
- avpriv_float_dsp_allocl function in libavutil/float_dsp.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22048">CVE-2020-22048</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in the
- ff_frame_pool_get function in framepool.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22049">CVE-2020-22049</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in the
- wtvfile_open_sector function in wtvdec.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22054">CVE-2020-22054</a>
-
- <p>A Denial of Service vulnerability due to a memory leak in the av_dict_set
- function in dict.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38171">CVE-2021-38171</a>
-
- <p>adts_decode_extradata in libavformat/adtsenc.c does not check the
- init_get_bits return value, which is a necessary step because the second
- argument to init_get_bits can be crafted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38291">CVE-2021-38291</a>
-
- <p>Assertion failure at src/libavutil/mathematics.c, causing ffmpeg aborted
- is detected. In some extreme cases, like with adpcm_ms samples with an
- extremely high channel count, get_audio_frame_duration() may return a
- negative frame duration value.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7:3.2.16-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2818.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2819.data b/english/lts/security/2021/dla-2819.data
deleted file mode 100644
index e35b87d8616..00000000000
--- a/english/lts/security/2021/dla-2819.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2819-1 ntfs-3g</define-tag>
-<define-tag report_date>2021-11-16</define-tag>
-<define-tag secrefs>CVE-2021-33285 CVE-2021-33286 CVE-2021-33287 CVE-2021-33289 CVE-2021-35266 CVE-2021-35267 CVE-2021-35268 CVE-2021-35269 CVE-2021-39251 CVE-2021-39252 CVE-2021-39253 CVE-2021-39254 CVE-2021-39255 CVE-2021-39256 CVE-2021-39257 CVE-2021-39258 CVE-2021-39259 CVE-2021-39260 CVE-2021-39261 CVE-2021-39262 CVE-2021-39263 Bug#988386</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2819.wml b/english/lts/security/2021/dla-2819.wml
deleted file mode 100644
index e58e66bc03f..00000000000
--- a/english/lts/security/2021/dla-2819.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in NTFS-3G, a read-write NTFS
-driver for FUSE. A local user can take advantage of these flaws for
-local root privilege escalation.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2016.2.22AR.1+dfsg-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your ntfs-3g packages.</p>
-
-<p>For the detailed security status of ntfs-3g please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ntfs-3g">https://security-tracker.debian.org/tracker/ntfs-3g</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2819.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2820.data b/english/lts/security/2021/dla-2820.data
deleted file mode 100644
index 8fc8c749ffb..00000000000
--- a/english/lts/security/2021/dla-2820.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2820-1 atftp</define-tag>
-<define-tag report_date>2021-11-17</define-tag>
-<define-tag secrefs>CVE-2020-6097 CVE-2021-41054</define-tag>
-<define-tag packages>atftp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2820.wml b/english/lts/security/2021/dla-2820.wml
deleted file mode 100644
index e2e41db0b3b..00000000000
--- a/english/lts/security/2021/dla-2820.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in atftp, an advanced TFTP client.
-Both are related to sending crafted requests to the server and triggering
-a denial-of-service due to for example a buffer overflow.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.7.git20120829-3.1~deb9u2.</p>
-
-<p>We recommend that you upgrade your atftp packages.</p>
-
-<p>For the detailed security status of atftp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/atftp">https://security-tracker.debian.org/tracker/atftp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2820.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2821.data b/english/lts/security/2021/dla-2821.data
deleted file mode 100644
index 8d34399ecfc..00000000000
--- a/english/lts/security/2021/dla-2821.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2821-1 axis</define-tag>
-<define-tag report_date>2021-11-17</define-tag>
-<define-tag secrefs>CVE-2018-8032</define-tag>
-<define-tag packages>axis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2821.wml b/english/lts/security/2021/dla-2821.wml
deleted file mode 100644
index 84fee33c946..00000000000
--- a/english/lts/security/2021/dla-2821.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in axis, a SOAP implementation in Java.
-The issue is related to a cross-site scripting (XSS) attack in the default
-servlet/services.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4-25+deb9u1.</p>
-
-<p>We recommend that you upgrade your axis packages.</p>
-
-<p>For the detailed security status of axis please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/axis">https://security-tracker.debian.org/tracker/axis</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2821.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2822.data b/english/lts/security/2021/dla-2822.data
deleted file mode 100644
index 7a3773f0c8d..00000000000
--- a/english/lts/security/2021/dla-2822.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2822-1 netkit-rsh</define-tag>
-<define-tag report_date>2021-11-18</define-tag>
-<define-tag secrefs>CVE-2019-7282 CVE-2019-7283</define-tag>
-<define-tag packages>netkit-rsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2822.wml b/english/lts/security/2021/dla-2822.wml
deleted file mode 100644
index 213ca753107..00000000000
--- a/english/lts/security/2021/dla-2822.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in netkit-rsh, client and server programs for
-remote shell connections.
-Due to insufficient input validation in path names sent by server, a
-malicious server can do arbitrary file overwrites in the target directory
-or modify permissions of the target directory.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.17-17+deb9u1.</p>
-
-<p>We recommend that you upgrade your netkit-rsh packages.</p>
-
-<p>For the detailed security status of netkit-rsh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/netkit-rsh">https://security-tracker.debian.org/tracker/netkit-rsh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2822.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2823-2.data b/english/lts/security/2021/dla-2823-2.data
deleted file mode 100644
index 67a02a77274..00000000000
--- a/english/lts/security/2021/dla-2823-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2823-2 salt</define-tag>
-<define-tag report_date>2021-11-21</define-tag>
-<define-tag secrefs>CVE-2021-21996 Bug#1000265</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2823-2.wml b/english/lts/security/2021/dla-2823-2.wml
deleted file mode 100644
index ddf24b11717..00000000000
--- a/english/lts/security/2021/dla-2823-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update of Salt, a remote execution manager, to fix <a href="https://security-tracker.debian.org/tracker/CVE-2021-21996">CVE-2021-21996</a>
-introduced a regression in salt/fileclient.py which raised an unexpected
-exception and made file.managed states fail.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2016.11.2+ds-1+deb9u9.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>For the detailed security status of salt please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2823-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2823.data b/english/lts/security/2021/dla-2823.data
deleted file mode 100644
index 428e3a0a1ed..00000000000
--- a/english/lts/security/2021/dla-2823.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2823-1 salt</define-tag>
-<define-tag report_date>2021-11-19</define-tag>
-<define-tag secrefs>CVE-2021-21996 Bug#994016</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2823.wml b/english/lts/security/2021/dla-2823.wml
deleted file mode 100644
index a20ef47e469..00000000000
--- a/english/lts/security/2021/dla-2823.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jonathan Schlue discovered a vulnerability in Salt, a powerful remote execution
-manager. A user who has control of the source, and source_hash URLs can gain
-full file system access as root on a salt minion.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2016.11.2+ds-1+deb9u8.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>For the detailed security status of salt please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2823.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2824.data b/english/lts/security/2021/dla-2824.data
deleted file mode 100644
index 3d8582a3159..00000000000
--- a/english/lts/security/2021/dla-2824.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2824-1 firebird3.0</define-tag>
-<define-tag report_date>2021-11-20</define-tag>
-<define-tag secrefs>CVE-2017-11509</define-tag>
-<define-tag packages>firebird3.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2824.wml b/english/lts/security/2021/dla-2824.wml
deleted file mode 100644
index 300ddd106f5..00000000000
--- a/english/lts/security/2021/dla-2824.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An authenticated remote attacker can execute arbitrary code in
-Firebird, a relational database based on InterBase 6.0, by executing a
-malformed SQL statement. The only known solution is to disable
-external UDF libraries from being loaded. In order to achieve this,
-the default configuration has changed to UdfAccess=None. This will
-prevent the fbudf module from being loaded, but may also break other
-functionality relying on modules.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.0.1.32609.ds4-14+deb9u1.</p>
-
-<p>We recommend that you upgrade your firebird3.0 packages.</p>
-
-<p>For the detailed security status of firebird3.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firebird3.0">https://security-tracker.debian.org/tracker/firebird3.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2824.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2825.data b/english/lts/security/2021/dla-2825.data
deleted file mode 100644
index e8cc0579bc6..00000000000
--- a/english/lts/security/2021/dla-2825.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2825-1 libmodbus</define-tag>
-<define-tag report_date>2021-11-22</define-tag>
-<define-tag secrefs>CVE-2019-14462 CVE-2019-14463</define-tag>
-<define-tag packages>libmodbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2825.wml b/english/lts/security/2021/dla-2825.wml
deleted file mode 100644
index 898de3ada43..00000000000
--- a/english/lts/security/2021/dla-2825.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in libmodbus, a library for the Modbus
-protocol.
-Both issues are related to out of bound reads, which could result in a
-denial of service or other unspecified impact.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.0.6-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your libmodbus packages.</p>
-
-<p>For the detailed security status of libmodbus please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libmodbus">https://security-tracker.debian.org/tracker/libmodbus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2825.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2826.data b/english/lts/security/2021/dla-2826.data
deleted file mode 100644
index 029251fb25a..00000000000
--- a/english/lts/security/2021/dla-2826.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2826-1 mbedtls</define-tag>
-<define-tag report_date>2021-11-23</define-tag>
-<define-tag secrefs>CVE-2018-9988 CVE-2018-9989 CVE-2020-36475 CVE-2020-36476 CVE-2020-36478 CVE-2021-24119</define-tag>
-<define-tag packages>mbedtls</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2826.wml b/english/lts/security/2021/dla-2826.wml
deleted file mode 100644
index 919afc4b40e..00000000000
--- a/english/lts/security/2021/dla-2826.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in mbed TLS, a lightweight crypto
-and SSL/TLS library, which could result in denial of service, information
-disclosure or side-channel attacks.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.2-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your mbedtls packages.</p>
-
-<p>For the detailed security status of mbedtls please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mbedtls">https://security-tracker.debian.org/tracker/mbedtls</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2826.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2827.data b/english/lts/security/2021/dla-2827.data
deleted file mode 100644
index d602c125fc3..00000000000
--- a/english/lts/security/2021/dla-2827.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2827-1 bluez</define-tag>
-<define-tag report_date>2021-11-27</define-tag>
-<define-tag secrefs>CVE-2019-8921 CVE-2019-8922 CVE-2021-41229 Bug#1000262</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2827.wml b/english/lts/security/2021/dla-2827.wml
deleted file mode 100644
index ee9b1d6cb1c..00000000000
--- a/english/lts/security/2021/dla-2827.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in BlueZ, the Linux Bluetooth
-protocol stack. An attacker could cause a denial-of-service (DoS) or
-leak information.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8921">CVE-2019-8921</a>
-
- <p>SDP infoleak; the vulnerability lies in the handling of a
- SVC_ATTR_REQ by the SDP implementation of BlueZ. By crafting a
- malicious CSTATE, it is possible to trick the server into
- returning more bytes than the buffer actually holds, resulting in
- leaking arbitrary heap data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8922">CVE-2019-8922</a>
-
- <p>SDP Heap Overflow; this vulnerability lies in the SDP protocol
- handling of attribute requests as well. By requesting a huge
- number of attributes at the same time, an attacker can overflow
- the static buffer provided to hold the response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41229">CVE-2021-41229</a>
-
- <p>sdp_cstate_alloc_buf allocates memory which will always be hung in
- the singly linked list of cstates and will not be freed. This will
- cause a memory leak over time. The data can be a very large
- object, which can be caused by an attacker continuously sending
- sdp packets and this may cause the service of the target device to
- crash.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.43-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>For the detailed security status of bluez please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bluez">https://security-tracker.debian.org/tracker/bluez</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2827.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2828.data b/english/lts/security/2021/dla-2828.data
deleted file mode 100644
index e47be98f6d1..00000000000
--- a/english/lts/security/2021/dla-2828.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2828-1 libvorbis</define-tag>
-<define-tag report_date>2021-11-27</define-tag>
-<define-tag secrefs>CVE-2017-14160 CVE-2018-10392 CVE-2018-10393 Bug#876780</define-tag>
-<define-tag packages>libvorbis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2828.wml b/english/lts/security/2021/dla-2828.wml
deleted file mode 100644
index 974a989e278..00000000000
--- a/english/lts/security/2021/dla-2828.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in libvorbis, a popular library for
-the Vorbis audio codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14160">CVE-2017-14160</a>
-<a href="https://security-tracker.debian.org/tracker/CVE-2018-10393">CVE-2018-10393</a>
-
- <p>Improve bound checking for very low sample rates.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10392">CVE-2018-10392</a>
-
- <p>Validate the number of channels in vorbisenc.c</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.3.5-4+deb9u3.</p>
-
-<p>We recommend that you upgrade your libvorbis packages.</p>
-
-<p>For the detailed security status of libvorbis please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvorbis">https://security-tracker.debian.org/tracker/libvorbis</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2828.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2829.data b/english/lts/security/2021/dla-2829.data
deleted file mode 100644
index 3984fba5fcc..00000000000
--- a/english/lts/security/2021/dla-2829.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2829-1 libvpx</define-tag>
-<define-tag report_date>2021-11-27</define-tag>
-<define-tag secrefs>CVE-2020-0034</define-tag>
-<define-tag packages>libvpx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2829.wml b/english/lts/security/2021/dla-2829.wml
deleted file mode 100644
index e31e5460147..00000000000
--- a/english/lts/security/2021/dla-2829.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds buffer read on truncated key frames in vp8_decode_frame
-has been fixed in libvpx, a popular library for the VP8 and VP9 video codecs.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.6.1-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your libvpx packages.</p>
-
-<p>For the detailed security status of libvpx please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvpx">https://security-tracker.debian.org/tracker/libvpx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2829.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2830.data b/english/lts/security/2021/dla-2830.data
deleted file mode 100644
index 364a8b353f9..00000000000
--- a/english/lts/security/2021/dla-2830.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2830-1 tar</define-tag>
-<define-tag report_date>2021-11-28</define-tag>
-<define-tag secrefs>CVE-2018-20482 Bug#917377</define-tag>
-<define-tag packages>tar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2830.wml b/english/lts/security/2021/dla-2830.wml
deleted file mode 100644
index 0b64ff6bc9d..00000000000
--- a/english/lts/security/2021/dla-2830.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An infinite loop when --sparse is used with file shrinkage during read
-access was fixed in the GNU tar archiving utility.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.29b-1.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your tar packages.</p>
-
-<p>For the detailed security status of tar please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tar">https://security-tracker.debian.org/tracker/tar</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2830.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2831.data b/english/lts/security/2021/dla-2831.data
deleted file mode 100644
index edb24b5810e..00000000000
--- a/english/lts/security/2021/dla-2831.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2831-1 libntlm</define-tag>
-<define-tag report_date>2021-11-28</define-tag>
-<define-tag secrefs>CVE-2019-17455 Bug#942145</define-tag>
-<define-tag packages>libntlm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2831.wml b/english/lts/security/2021/dla-2831.wml
deleted file mode 100644
index b727f7ea525..00000000000
--- a/english/lts/security/2021/dla-2831.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Stack-based buffer over-reads for crafted NTLM requests were fixed in
-libntlm, a library that implements Microsoft's NTLM authentication</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your libntlm packages.</p>
-
-<p>For the detailed security status of libntlm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libntlm">https://security-tracker.debian.org/tracker/libntlm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2831.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2832.data b/english/lts/security/2021/dla-2832.data
deleted file mode 100644
index 7049272aa5a..00000000000
--- a/english/lts/security/2021/dla-2832.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2832-1 opensc</define-tag>
-<define-tag report_date>2021-11-29</define-tag>
-<define-tag secrefs>CVE-2019-15945 CVE-2019-15946 CVE-2019-19479 CVE-2020-26570 CVE-2020-26571 CVE-2020-26572 Bug#939668 Bug#939669 Bug#947383 Bug#972035 Bug#972036 Bug#972037</define-tag>
-<define-tag packages>opensc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2832.wml b/english/lts/security/2021/dla-2832.wml
deleted file mode 100644
index 0b9901c0ce0..00000000000
--- a/english/lts/security/2021/dla-2832.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the OpenSC smart card utilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15945">CVE-2019-15945</a>
-
- <p>Out-of-bounds access of an ASN.1 Bitstring.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15946">CVE-2019-15946</a>
-
- <p>Out-of-bounds access of an ASN.1 Octet string.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19479">CVE-2019-19479</a>
-
- <p>Incorrect read operation in the Setec driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26570">CVE-2020-26570</a>
-
- <p>Heap-based buffer overflow in the Oberthur driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26571">CVE-2020-26571</a>
-
- <p>Stack-based buffer overflow in the GPK driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26572">CVE-2020-26572</a>
-
- <p>Stack-based buffer overflow in the TCOS driver.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.16.0-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your opensc packages.</p>
-
-<p>For the detailed security status of opensc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/opensc">https://security-tracker.debian.org/tracker/opensc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2832.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2833.data b/english/lts/security/2021/dla-2833.data
deleted file mode 100644
index f275dd46cf6..00000000000
--- a/english/lts/security/2021/dla-2833.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2833-1 rsync</define-tag>
-<define-tag report_date>2021-11-30</define-tag>
-<define-tag secrefs>CVE-2018-5764 Bug#887588</define-tag>
-<define-tag packages>rsync</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2833.wml b/english/lts/security/2021/dla-2833.wml
deleted file mode 100644
index be1c21288dd..00000000000
--- a/english/lts/security/2021/dla-2833.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In rsync, a remote file-copying tool, remote attackers were able to
-bypass the argument-sanitization protection mechanism by passing
-additional --protect-args.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.2-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your rsync packages.</p>
-
-<p>For the detailed security status of rsync please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rsync">https://security-tracker.debian.org/tracker/rsync</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2833.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2834.data b/english/lts/security/2021/dla-2834.data
deleted file mode 100644
index 283f7fcf25f..00000000000
--- a/english/lts/security/2021/dla-2834.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2834-1 uriparser</define-tag>
-<define-tag report_date>2021-11-30</define-tag>
-<define-tag secrefs>CVE-2018-20721</define-tag>
-<define-tag packages>uriparser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2834.wml b/english/lts/security/2021/dla-2834.wml
deleted file mode 100644
index 8ce8311dd2c..00000000000
--- a/english/lts/security/2021/dla-2834.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Out-of-bounds read for an incomplete URI with an IPv6 address containing
-an embedded IPv4 address has been fixed in uriparser, a library to parse
-Uniform Resource Identifiers (URIs).</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.8.4-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your uriparser packages.</p>
-
-<p>For the detailed security status of uriparser please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/uriparser">https://security-tracker.debian.org/tracker/uriparser</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2834.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2835.data b/english/lts/security/2021/dla-2835.data
deleted file mode 100644
index 5411b3ac281..00000000000
--- a/english/lts/security/2021/dla-2835.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2835-1 rsyslog</define-tag>
-<define-tag report_date>2021-11-30</define-tag>
-<define-tag secrefs>CVE-2019-17041 CVE-2019-17042 Bug#942065 Bug#942067</define-tag>
-<define-tag packages>rsyslog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2835.wml b/english/lts/security/2021/dla-2835.wml
deleted file mode 100644
index 12add1f146e..00000000000
--- a/english/lts/security/2021/dla-2835.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two heap overflows were fixed in the rsyslog logging daemon.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17041">CVE-2019-17041</a>
-
- <p>Heap overflow in the AIX message parser.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17042">CVE-2019-17042</a>
-
- <p>Heap overflow in the Cisco log message parser.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8.24.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your rsyslog packages.</p>
-
-<p>For the detailed security status of rsyslog please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rsyslog">https://security-tracker.debian.org/tracker/rsyslog</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2835.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2836-2.data b/english/lts/security/2021/dla-2836-2.data
deleted file mode 100644
index efd14c80657..00000000000
--- a/english/lts/security/2021/dla-2836-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2836-2 nss</define-tag>
-<define-tag report_date>2021-12-08</define-tag>
-<define-tag secrefs>Bug#1001219</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2836-2.wml b/english/lts/security/2021/dla-2836-2.wml
deleted file mode 100644
index df7ebe3f8ba..00000000000
--- a/english/lts/security/2021/dla-2836-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>DLA-2836-1 was rolled out, fixing <a href="https://security-tracker.debian.org/tracker/CVE-2021-43527">CVE-2021-43527</a> in nss, but that
-lead to a regression, preventing SSL connections in Chromium. The
-complete bug report could be found here:
-<a href="https://bugs.debian.org/1001219.">https://bugs.debian.org/1001219.</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:3.26.2-1.1+deb9u4.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>For the detailed security status of nss please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nss">https://security-tracker.debian.org/tracker/nss</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2836-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2836.data b/english/lts/security/2021/dla-2836.data
deleted file mode 100644
index a6e1e46fdfc..00000000000
--- a/english/lts/security/2021/dla-2836.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2836-1 nss</define-tag>
-<define-tag report_date>2021-12-06</define-tag>
-<define-tag secrefs>CVE-2021-43527</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2836.wml b/english/lts/security/2021/dla-2836.wml
deleted file mode 100644
index 2f456968320..00000000000
--- a/english/lts/security/2021/dla-2836.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that nss, the Mozilla Network Security Service
-library, is prone to a heap overflow flaw when verifying DSA or RSA-PPS
-signatures, which could result in denial of service or potentially the
-execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:3.26.2-1.1+deb9u3.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>For the detailed security status of nss please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nss">https://security-tracker.debian.org/tracker/nss</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2836.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2837.data b/english/lts/security/2021/dla-2837.data
deleted file mode 100644
index cac91772379..00000000000
--- a/english/lts/security/2021/dla-2837.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2837-1 gmp</define-tag>
-<define-tag report_date>2021-12-02</define-tag>
-<define-tag secrefs>CVE-2021-43618 Bug#994405</define-tag>
-<define-tag packages>gmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2837.wml b/english/lts/security/2021/dla-2837.wml
deleted file mode 100644
index ab295dc8aa1..00000000000
--- a/english/lts/security/2021/dla-2837.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in gmp: GNU Multiple Precision Arithmetic Library.
-It was discovered that integer overflow is possible in mpz/inp_raw.c and
-resultant buffer overflow via crafted input, leading to a segmentation fault
-on 32-bit platforms.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:6.1.2+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your gmp packages.</p>
-
-<p>For the detailed security status of gmp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gmp">https://security-tracker.debian.org/tracker/gmp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2837.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2838.data b/english/lts/security/2021/dla-2838.data
deleted file mode 100644
index 198145e8ca1..00000000000
--- a/english/lts/security/2021/dla-2838.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2838-1 librecad</define-tag>
-<define-tag report_date>2021-12-03</define-tag>
-<define-tag secrefs>CVE-2021-21898 CVE-2021-21899 CVE-2021-21900</define-tag>
-<define-tag packages>librecad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2838.wml b/english/lts/security/2021/dla-2838.wml
deleted file mode 100644
index 04eb664238a..00000000000
--- a/english/lts/security/2021/dla-2838.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in LibreCAD, an application
-for computer aided design (CAD) in two dimensions. An attacker could
-trigger code execution through malicious .dwg and .dxf files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21898">CVE-2021-21898</a>
-
- <p>A code execution vulnerability exists in the
- dwgCompressor::decompress18() functionality of LibreCad
- libdxfrw. A specially-crafted .dwg file can lead to an
- out-of-bounds write.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21899">CVE-2021-21899</a>
-
- <p>A code execution vulnerability exists in the
- dwgCompressor::copyCompBytes21 functionality of LibreCad
- libdxfrw. A specially-crafted .dwg file can lead to a heap buffer
- overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21900">CVE-2021-21900</a>
-
- <p>A code execution vulnerability exists in the dxfRW::processLType()
- functionality of LibreCad libdxfrw. A specially-crafted .dxf file
- can lead to a use-after-free vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.2-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your librecad packages.</p>
-
-<p>For the detailed security status of librecad please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/librecad">https://security-tracker.debian.org/tracker/librecad</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2838.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2839.data b/english/lts/security/2021/dla-2839.data
deleted file mode 100644
index 30abe4e885e..00000000000
--- a/english/lts/security/2021/dla-2839.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2839-1 gerbv</define-tag>
-<define-tag report_date>2021-12-03</define-tag>
-<define-tag secrefs>CVE-2021-40391</define-tag>
-<define-tag packages>gerbv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2839.wml b/english/lts/security/2021/dla-2839.wml
deleted file mode 100644
index 6f8e0b35fff..00000000000
--- a/english/lts/security/2021/dla-2839.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been discovered in gerbv: a viewer for Gerber RS-274X files.</p>
-
-<p>It was discovered that an out-of-bounds write vulnerability exists in the drill
-format T-code tool. A specially-crafted drill file can lead to code execution.
-An attacker can provide a malicious file to trigger this vulnerability.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.6.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your gerbv packages.</p>
-
-<p>For the detailed security status of gerbv please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gerbv">https://security-tracker.debian.org/tracker/gerbv</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2839.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2840.data b/english/lts/security/2021/dla-2840.data
deleted file mode 100644
index bee99d786e1..00000000000
--- a/english/lts/security/2021/dla-2840.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2840-1 roundcube</define-tag>
-<define-tag report_date>2021-12-06</define-tag>
-<define-tag secrefs>CVE-2021-44025 CVE-2021-44026 Bug#1000156</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2840.wml b/english/lts/security/2021/dla-2840.wml
deleted file mode 100644
index 0cbe08b920f..00000000000
--- a/english/lts/security/2021/dla-2840.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that roundcube, a skinnable AJAX based webmail solution
-for IMAP servers, did not properly sanitize requests and mail messages.
-This would allow an attacker to perform Cross-Side Scripting (XSS) or SQL
-injection attacks.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.2.3+dfsg.1-4+deb9u9.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2840.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2841.data b/english/lts/security/2021/dla-2841.data
deleted file mode 100644
index b79940ebcce..00000000000
--- a/english/lts/security/2021/dla-2841.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2841-1 runc</define-tag>
-<define-tag report_date>2021-12-06</define-tag>
-<define-tag secrefs>CVE-2021-43784</define-tag>
-<define-tag packages>runc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2841.wml b/english/lts/security/2021/dla-2841.wml
deleted file mode 100644
index 4a9b2e2a00c..00000000000
--- a/english/lts/security/2021/dla-2841.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an overflow issue in runc, the runtime for
-the Open Container Project, often used with Docker.</p>
-
-<p>The Netlink 'bytemsg' length field could have allowed an attacker to
-override Netlink-based container configurations. This vulnerability required
-the attacker to have some control over the configuration of the container, but
-would have allowed the attacker to bypass the namespace restrictions of the
-container by simply adding their own Netlink payload which disables all
-namespaces.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43784">CVE-2021-43784</a></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.1.1+dfsg1-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your runc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2841.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2842.data b/english/lts/security/2021/dla-2842.data
deleted file mode 100644
index 27a8d9e84ff..00000000000
--- a/english/lts/security/2021/dla-2842.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2842-1 apache-log4j2</define-tag>
-<define-tag report_date>2021-12-12</define-tag>
-<define-tag secrefs>CVE-2021-44228 Bug#1001478</define-tag>
-<define-tag packages>apache-log4j2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2842.wml b/english/lts/security/2021/dla-2842.wml
deleted file mode 100644
index 73ff5522dc1..00000000000
--- a/english/lts/security/2021/dla-2842.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Chen Zhaojun of Alibaba Cloud Security Team discovered that JNDI features
-used in configuration, log messages, and parameters do not protect
-against attacker controlled LDAP and other JNDI related endpoints. An
-attacker who can control log messages or log message parameters can
-execute arbitrary code loaded from LDAP servers when message lookup
-substitution is enabled.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.7-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your apache-log4j2 packages.</p>
-
-<p>For the detailed security status of apache-log4j2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/apache-log4j2">https://security-tracker.debian.org/tracker/apache-log4j2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2842.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2843.data b/english/lts/security/2021/dla-2843.data
deleted file mode 100644
index d0384f9798f..00000000000
--- a/english/lts/security/2021/dla-2843.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2843-1 linux</define-tag>
-<define-tag report_date>2021-12-16</define-tag>
-<define-tag secrefs>CVE-2020-3702 CVE-2020-16119 CVE-2021-0920 CVE-2021-3612 CVE-2021-3653 CVE-2021-3655 CVE-2021-3679 CVE-2021-3732 CVE-2021-3753 CVE-2021-3760 CVE-2021-20317 CVE-2021-20321 CVE-2021-20322 CVE-2021-22543 CVE-2021-37159 CVE-2021-3816 CVE-2021-38198 CVE-2021-38199 CVE-2021-38204 CVE-2021-3820 CVE-2021-40490 CVE-2021-41864 CVE-2021-42008 CVE-2021-4273 CVE-2021-43389</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2843.wml b/english/lts/security/2021/dla-2843.wml
deleted file mode 100644
index 4603900eba9..00000000000
--- a/english/lts/security/2021/dla-2843.wml
+++ /dev/null
@@ -1,216 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2021-3653">CVE-2021-3653</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-3655">CVE-2021-3655</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-3679">CVE-2021-3679</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-3732">CVE-2021-3732</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-3753">CVE-2021-3753</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-3760">CVE-2021-3760</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-20317">CVE-2021-20317</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-20321">CVE-2021-20321</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-20322">CVE-2021-20322</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-22543">CVE-2021-22543</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-37159">CVE-2021-37159</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-38160">CVE-2021-38160</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-38198">CVE-2021-38198</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-38199">CVE-2021-38199</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-38204">CVE-2021-38204</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-38205">CVE-2021-38205</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-40490">CVE-2021-40490</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-41864">CVE-2021-41864</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-42008">CVE-2021-42008</a> <a href="https://security-tracker.debian.org/tracker/CVE-2021-42739">CVE-2021-42739</a>
- <a href="https://security-tracker.debian.org/tracker/CVE-2021-43389">CVE-2021-43389</a></p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-3702">CVE-2020-3702</a>
-
- <p>A flaw was found in the driver for Atheros IEEE 802.11n family of
- chipsets (ath9k) allowing information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16119">CVE-2020-16119</a>
-
- <p>Hadar Manor reported a use-after-free in the DCCP protocol
- implementation in the Linux kernel. A local attacker can take
- advantage of this flaw to cause a denial of service or potentially
- to execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-0920">CVE-2021-0920</a>
-
- <p>A race condition was discovered in the local sockets (AF_UNIX)
- subsystem, which could lead to a use-after-free. A local user
- could exploit this for denial of service (memory corruption or
- crash), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3612">CVE-2021-3612</a>
-
- <p>Murray McAllister reported a flaw in the joystick input subsystem.
- A local user permitted to access a joystick device could exploit
- this to read and write out-of-bounds in the kernel, which could
- be used for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3653">CVE-2021-3653</a>
-
- <p>Maxim Levitsky discovered a vulnerability in the KVM hypervisor
- implementation for AMD processors in the Linux kernel: Missing
- validation of the `int_ctl` VMCB field could allow a malicious L1
- guest to enable AVIC support (Advanced Virtual Interrupt
- Controller) for the L2 guest. The L2 guest can take advantage of
- this flaw to write to a limited but still relatively large subset
- of the host physical memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3655">CVE-2021-3655</a>
-
- <p>Ilja Van Sprundel and Marcelo Ricardo Leitner found multiple flaws
- in the SCTP implementation, where missing validation could lead to
- an out-of-bounds read. On a system using SCTP, a networked
- attacker could exploit these to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3679">CVE-2021-3679</a>
-
- <p>A flaw in the Linux kernel tracing module functionality could
- allow a privileged local user (with CAP_SYS_ADMIN capability) to
- cause a denial of service (resource starvation).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3732">CVE-2021-3732</a>
-
- <p>Alois Wohlschlager reported a flaw in the implementation of the
- overlayfs subsystem, allowing a local attacker with privileges to
- mount a filesystem to reveal files hidden in the original mount.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3753">CVE-2021-3753</a>
-
- <p>Minh Yuan reported a race condition in the vt_k_ioctl in
- drivers/tty/vt/vt_ioctl.c, which may cause an out of bounds read
- in vt.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3760">CVE-2021-3760</a>
-
- <p>Lin Horse reported a flaw in the NCI (NFC Controller Interface)
- driver, which could lead to a use-after-free.</p>
-
- <p>However, this driver is not included in the binary packages
- provided by Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20317">CVE-2021-20317</a>
-
- <p>It was discovered that the timer queue structure could become
- corrupt, leading to waiting tasks never being woken up. A local
- user with certain privileges could exploit this to cause a denial
- of service (system hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20321">CVE-2021-20321</a>
-
- <p>A race condition was discovered in the overlayfs filesystem
- driver. A local user with access to an overlayfs mount and to its
- underlying upper directory could exploit this for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20322">CVE-2021-20322</a>
-
- <p>An information leak was discovered in the IPv4 implementation. A
- remote attacker could exploit this to quickly discover which UDP
- ports a system is using, making it easier for them to carry out a
- DNS poisoning attack against that system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22543">CVE-2021-22543</a>
-
- <p>David Stevens discovered a flaw in how the KVM hypervisor maps
- host memory into a guest. A local user permitted to access
- /dev/kvm could use this to cause certain pages to be freed when
- they should not, leading to a use-after-free. This could be used
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37159">CVE-2021-37159</a>
-
- <p>A flaw was discovered in the hso driver for Option mobile
- broadband modems. An error during initialisation could lead to a
- double-free or use-after-free. An attacker able to plug in USB
- devices could use this to cause a denial of service (crash or
- memory corruption) or possibly to run arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38160">CVE-2021-38160</a>
-
- <p>A flaw in the virtio_console was discovered allowing data
- corruption or data loss by an untrusted device.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38198">CVE-2021-38198</a>
-
- <p>A flaw was discovered in the KVM implementation for x86
- processors, that could result in virtual memory protection within
- a guest not being applied correctly. When shadow page tables are
- used - i.e. for nested virtualisation, or on CPUs lacking the EPT
- or NPT feature - a user of the guest OS might be able to exploit
- this for denial of service or privilege escalation within the
- guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38199">CVE-2021-38199</a>
-
- <p>Michael Wakabayashi reported a flaw in the NFSv4 client
- implementation, where incorrect connection setup ordering allows
- operations of a remote NFSv4 server to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38204">CVE-2021-38204</a>
-
- <p>A flaw was discovered in the max4321-hcd USB host controller
- driver, which could lead to a use-after-free.</p>
-
- <p>However, this driver is not included in the binary packages
- provided by Debian.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38205">CVE-2021-38205</a>
-
- <p>An information leak was discovered in the xilinx_emaclite network
- driver. On a custom kernel where this driver is enabled and used,
- this might make it easier to exploit other kernel bugs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40490">CVE-2021-40490</a>
-
- <p>A race condition was discovered in the ext4 subsystem when writing
- to an inline_data file while its xattrs are changing. This could
- result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41864">CVE-2021-41864</a>
-
- <p>An integer overflow was discovered in the Extended BPF (eBPF)
- subsystem. A local user could exploit this for denial of service
- (memory corruption or crash), or possibly for privilege
- escalation.</p>
-
- <p>This can be mitigated by setting sysctl
- kernel.unprivileged_bpf_disabled=1, which disables eBPF use by
- unprivileged users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42008">CVE-2021-42008</a>
-
- <p>A heap buffer overflow was discovered in the 6pack serial port
- network driver. A local user with CAP_NET_ADMIN capability could
- exploit this for denial of service (memory corruption or crash), or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42739">CVE-2021-42739</a>
-
- <p>A heap buffer overflow was discovered in the firedtv driver for
- FireWire-connected DVB receivers. A local user with access to a
- firedtv device could exploit this for denial of service (memory
- corruption or crash), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43389">CVE-2021-43389</a>
-
- <p>The Active Defense Lab of Venustech discovered a flaw in the CMTP
- subsystem as used by Bluetooth, which could lead to an
- out-of-bounds read and object type confusion. A local user with
- CAP_NET_ADMIN capability in the initial user namespace could
- exploit this for denial of service (memory corruption or crash),
- or possibly for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.290-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2843.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2844.data b/english/lts/security/2021/dla-2844.data
deleted file mode 100644
index b5e2db389d3..00000000000
--- a/english/lts/security/2021/dla-2844.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2844-1 privoxy</define-tag>
-<define-tag report_date>2021-12-13</define-tag>
-<define-tag secrefs>CVE-2021-44540 CVE-2021-44543</define-tag>
-<define-tag packages>privoxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2844.wml b/english/lts/security/2021/dla-2844.wml
deleted file mode 100644
index d1018a66d0b..00000000000
--- a/english/lts/security/2021/dla-2844.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Artem Ivanov and Joshua Rogers found an XSS and a DOS issue,
-respectively, affecting src:privoxy, a non-caching web proxy with
-advanced filtering capabilities for enhancing privacy, modifying
-web page data and HTTP headers, controlling access, and removing
-ads and other obnoxious Internet junk.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.0.26-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your privoxy packages.</p>
-
-<p>For the detailed security status of privoxy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/privoxy">https://security-tracker.debian.org/tracker/privoxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2844.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2845.data b/english/lts/security/2021/dla-2845.data
deleted file mode 100644
index b3bb0294835..00000000000
--- a/english/lts/security/2021/dla-2845.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2845-1 libsamplerate</define-tag>
-<define-tag report_date>2021-12-14</define-tag>
-<define-tag secrefs>CVE-2017-7697</define-tag>
-<define-tag packages>libsamplerate</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2845.wml b/english/lts/security/2021/dla-2845.wml
deleted file mode 100644
index 02c76b84d72..00000000000
--- a/english/lts/security/2021/dla-2845.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libsamplerate, an audio sample rate conversion
-library. Using a crafted audio file a buffer over-read might happen in
-calc_output_single() in src_sinc.c.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.1.8-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your libsamplerate packages.</p>
-
-<p>For the detailed security status of libsamplerate please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsamplerate">https://security-tracker.debian.org/tracker/libsamplerate</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2845.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2846.data b/english/lts/security/2021/dla-2846.data
deleted file mode 100644
index 262c83524de..00000000000
--- a/english/lts/security/2021/dla-2846.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2846-1 raptor2</define-tag>
-<define-tag report_date>2021-12-14</define-tag>
-<define-tag secrefs>CVE-2020-25713</define-tag>
-<define-tag packages>raptor2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2846.wml b/english/lts/security/2021/dla-2846.wml
deleted file mode 100644
index 761823c993f..00000000000
--- a/english/lts/security/2021/dla-2846.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in raptor2, a Raptor RDF parser and serializer
-library. Malformed input file can lead to a segfault.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.0.14-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your raptor2 packages.</p>
-
-<p>For the detailed security status of raptor2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/raptor2">https://security-tracker.debian.org/tracker/raptor2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2846.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2847.data b/english/lts/security/2021/dla-2847.data
deleted file mode 100644
index f82c6713965..00000000000
--- a/english/lts/security/2021/dla-2847.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2847-1 mediawiki</define-tag>
-<define-tag report_date>2021-12-21</define-tag>
-<define-tag secrefs>CVE-2021-44858</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2847.wml b/english/lts/security/2021/dla-2847.wml
deleted file mode 100644
index e27c0933c78..00000000000
--- a/english/lts/security/2021/dla-2847.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue was discovered in MediaWiki, a website engine for
-collaborative work: Missing validation in the mcrundo action may allow
-allow an attacker to leak page content from private wikis or to bypass
-edit restrictions.</p>
-
-<p>For additional information please refer to
-<a href="https://www.mediawiki.org/wiki/2021-12_security_release/FAQ">https://www.mediawiki.org/wiki/2021-12_security_release/FAQ</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.27.7-1+deb9u11.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2847.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2848.data b/english/lts/security/2021/dla-2848.data
deleted file mode 100644
index a959aafc26c..00000000000
--- a/english/lts/security/2021/dla-2848.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2848-1 libssh2</define-tag>
-<define-tag report_date>2021-12-17</define-tag>
-<define-tag secrefs>CVE-2019-13115 CVE-2019-17498</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2848.wml b/english/lts/security/2021/dla-2848.wml
deleted file mode 100644
index adc111a08ee..00000000000
--- a/english/lts/security/2021/dla-2848.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues have been discovered in libssh2, a client-side C library implementing
-the SSH2 protocol:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13115">CVE-2019-13115</a>:
-
- <p>kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has
- an integer overflow that could lead to an out-of-bounds read in the way
- packets are read from the server. A remote attacker who compromises a
- SSH server may be able to disclose sensitive information or cause a denial
- of service condition on the client system when a user connects to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17498">CVE-2019-17498</a>:
-
- <p>SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check,
- enabling an attacker to specify an arbitrary (out-of-bounds) offset for a
- subsequent memory read. A crafted SSH server may be able to disclose sensitive
- information or cause a denial of service condition on the client system when
- a user connects to the server.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>For the detailed security status of libssh2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libssh2">https://security-tracker.debian.org/tracker/libssh2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2848.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2849.data b/english/lts/security/2021/dla-2849.data
deleted file mode 100644
index 7f1f7025d35..00000000000
--- a/english/lts/security/2021/dla-2849.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2849-1 wireshark</define-tag>
-<define-tag report_date>2021-12-26</define-tag>
-<define-tag secrefs>CVE-2021-22207 CVE-2021-22235 CVE-2021-39921 CVE-2021-39922 CVE-2021-39923 CVE-2021-39924 CVE-2021-39925 CVE-2021-39928 CVE-2021-39929 Bug#987853</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2849.wml b/english/lts/security/2021/dla-2849.wml
deleted file mode 100644
index f22239c4b91..00000000000
--- a/english/lts/security/2021/dla-2849.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the network traffic analyzer Wireshark.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22207">CVE-2021-22207</a>
-
- <p>Excessive memory consumption in the MS-WSP dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22235">CVE-2021-22235</a>
-
- <p>Crash in the DNP dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39921">CVE-2021-39921</a>
-
- <p>NULL pointer exception in the Modbus dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39922">CVE-2021-39922</a>
-
- <p>Buffer overflow in the C12.22 dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39923">CVE-2021-39923</a>
-
- <p>Large loop in the PNRP dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39924">CVE-2021-39924</a>
-
- <p>Large loop in the Bluetooth DHT dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39925">CVE-2021-39925</a>
-
- <p>Buffer overflow in the Bluetooth SDP dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39928">CVE-2021-39928</a>
-
- <p>NULL pointer exception in the IEEE 802.11 dissector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39929">CVE-2021-39929</a>
-
- <p>Uncontrolled Recursion in the Bluetooth DHT dissector.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.6.20-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2849.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2850.data b/english/lts/security/2021/dla-2850.data
deleted file mode 100644
index 6f92ec92506..00000000000
--- a/english/lts/security/2021/dla-2850.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2850-1 libpcap</define-tag>
-<define-tag report_date>2021-12-26</define-tag>
-<define-tag secrefs>CVE-2019-15165 Bug#941697</define-tag>
-<define-tag packages>libpcap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2850.wml b/english/lts/security/2021/dla-2850.wml
deleted file mode 100644
index e62294cd315..00000000000
--- a/english/lts/security/2021/dla-2850.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Improper PHB header length validation was fixed in libpcap,
-a library for capturing network traffic.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.8.1-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your libpcap packages.</p>
-
-<p>For the detailed security status of libpcap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libpcap">https://security-tracker.debian.org/tracker/libpcap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2850.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2851.data b/english/lts/security/2021/dla-2851.data
deleted file mode 100644
index 046b554085f..00000000000
--- a/english/lts/security/2021/dla-2851.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2851-1 libextractor</define-tag>
-<define-tag report_date>2021-12-26</define-tag>
-<define-tag secrefs>CVE-2019-15531 Bug#935553</define-tag>
-<define-tag packages>libextractor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2851.wml b/english/lts/security/2021/dla-2851.wml
deleted file mode 100644
index d3781e07a6f..00000000000
--- a/english/lts/security/2021/dla-2851.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Invalid read for malformed DVI files was fixed in GNU libextractor,
-a library that extracts meta-data from files of arbitrary type.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.3-4+deb9u4.</p>
-
-<p>We recommend that you upgrade your libextractor packages.</p>
-
-<p>For the detailed security status of libextractor please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libextractor">https://security-tracker.debian.org/tracker/libextractor</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2851.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2852.data b/english/lts/security/2021/dla-2852.data
deleted file mode 100644
index 1cc658166be..00000000000
--- a/english/lts/security/2021/dla-2852.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2852-1 apache-log4j2</define-tag>
-<define-tag report_date>2021-12-26</define-tag>
-<define-tag secrefs>CVE-2020-9488 CVE-2021-45105 Bug#959450 Bug#1001891</define-tag>
-<define-tag packages>apache-log4j2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2852.wml b/english/lts/security/2021/dla-2852.wml
deleted file mode 100644
index 2347d0e17da..00000000000
--- a/english/lts/security/2021/dla-2852.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in Apache Log4j2, a Logging
-Framework for Java, which could lead to a denial of service or information
-disclosure.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9488">CVE-2020-9488</a>
-
- <p>Improper validation of certificate with host mismatch in Apache Log4j SMTP
- appender. This could allow an SMTPS connection to be intercepted by a
- man-in-the-middle attack which could leak any log messages sent through
- that appender.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45105">CVE-2021-45105</a>
-
- <p>Apache Log4j2 did not protect from uncontrolled recursion from
- self-referential lookups. This allows an attacker with control over Thread
- Context Map data to cause a denial of service when a crafted string is
- interpreted.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.12.3-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your apache-log4j2 packages.</p>
-
-<p>For the detailed security status of apache-log4j2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/apache-log4j2">https://security-tracker.debian.org/tracker/apache-log4j2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2852.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2853.data b/english/lts/security/2021/dla-2853.data
deleted file mode 100644
index 8651ede27eb..00000000000
--- a/english/lts/security/2021/dla-2853.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2853-1 ruby2.3</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2021-41817 CVE-2021-41819</define-tag>
-<define-tag packages>ruby2.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2853.wml b/english/lts/security/2021/dla-2853.wml
deleted file mode 100644
index 102115252e0..00000000000
--- a/english/lts/security/2021/dla-2853.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A cookie prefix spoofing vulnerability in CGI::Cookie.parse and a
-regular expression denial of service vulnerability (ReDoS) on date
-parsing methods was discovered in src:ruby2.1, the Ruby interpreter.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.3.3-1+deb9u11.</p>
-
-<p>We recommend that you upgrade your ruby2.3 packages.</p>
-
-<p>For the detailed security status of ruby2.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby2.3">https://security-tracker.debian.org/tracker/ruby2.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2853.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2854.data b/english/lts/security/2021/dla-2854.data
deleted file mode 100644
index 35d03006506..00000000000
--- a/english/lts/security/2021/dla-2854.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2854-1 novnc</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2017-18635</define-tag>
-<define-tag packages>novnc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2854.wml b/english/lts/security/2021/dla-2854.wml
deleted file mode 100644
index 935f7ba8077..00000000000
--- a/english/lts/security/2021/dla-2854.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An XSS vulnerability was discovered in noVNC, a HTML5 VNC client, in
-which the remote VNC server could inject arbitrary HTML into the
-noVNC web page via the messages propagated to the status field, such
-as the VNC server name.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:0.4+dfsg+1+20131010+gitf68af8af3d-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your novnc packages.</p>
-
-<p>For the detailed security status of novnc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/novnc">https://security-tracker.debian.org/tracker/novnc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2854.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2855.data b/english/lts/security/2021/dla-2855.data
deleted file mode 100644
index 59bc425f237..00000000000
--- a/english/lts/security/2021/dla-2855.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2855-1 monit</define-tag>
-<define-tag report_date>2021-12-27</define-tag>
-<define-tag secrefs>CVE-2019-11454 CVE-2019-11455 Bug#927775</define-tag>
-<define-tag packages>monit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2855.wml b/english/lts/security/2021/dla-2855.wml
deleted file mode 100644
index c3c280ca702..00000000000
--- a/english/lts/security/2021/dla-2855.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were fixed in monit, a utility for monitoring and
-managing Unix systems.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11454">CVE-2019-11454</a>
-
- <p>Persistent cross-site scripting in http/cervlet.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11455">CVE-2019-11455</a>
-
- <p>Buffer over-read in Util_urlDecode in util.c</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:5.20.0-6+deb9u2.</p>
-
-<p>We recommend that you upgrade your monit packages.</p>
-
-<p>For the detailed security status of monit please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/monit">https://security-tracker.debian.org/tracker/monit</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2855.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2856.data b/english/lts/security/2021/dla-2856.data
deleted file mode 100644
index ef7fd2152b8..00000000000
--- a/english/lts/security/2021/dla-2856.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2856-1 okular</define-tag>
-<define-tag report_date>2021-12-27</define-tag>
-<define-tag secrefs>CVE-2020-9359 Bug#954891</define-tag>
-<define-tag packages>okular</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2856.wml b/english/lts/security/2021/dla-2856.wml
deleted file mode 100644
index a03598d8d90..00000000000
--- a/english/lts/security/2021/dla-2856.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Code execution via an action link in a PDF document was fixed in the
-KDE document viewer Okular.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4:16.08.2-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your okular packages.</p>
-
-<p>For the detailed security status of okular please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/okular">https://security-tracker.debian.org/tracker/okular</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2856.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2857-2.data b/english/lts/security/2021/dla-2857-2.data
deleted file mode 100644
index b2f550ef5a7..00000000000
--- a/english/lts/security/2021/dla-2857-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2857-2 postgis</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag packages>postgis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2857-2.wml b/english/lts/security/2021/dla-2857-2.wml
deleted file mode 100644
index ba747f2b872..00000000000
--- a/english/lts/security/2021/dla-2857-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The regression of postgresql-9.6-postgis-2.3-scripts being empty in
-2.3.1+dfsg-2+deb9u1 has been fixed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.3.1+dfsg-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your postgis packages.</p>
-
-<p>For the detailed security status of postgis please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgis">https://security-tracker.debian.org/tracker/postgis</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2857-2.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2857.data b/english/lts/security/2021/dla-2857.data
deleted file mode 100644
index 4a6d16e7bf2..00000000000
--- a/english/lts/security/2021/dla-2857.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2857-1 postgis</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2017-18359</define-tag>
-<define-tag packages>postgis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2857.wml b/english/lts/security/2021/dla-2857.wml
deleted file mode 100644
index 21226fec25c..00000000000
--- a/english/lts/security/2021/dla-2857.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In PostGIS, which adds support for geographic objects to the PostgreSQL
-database, denial of service via crafted ST_AsX3D function input was
-fixed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.3.1+dfsg-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your postgis packages.</p>
-
-<p>For the detailed security status of postgis please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgis">https://security-tracker.debian.org/tracker/postgis</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2857.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2858.data b/english/lts/security/2021/dla-2858.data
deleted file mode 100644
index a03e8168c52..00000000000
--- a/english/lts/security/2021/dla-2858.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2858-1 libzip</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2017-14107</define-tag>
-<define-tag packages>libzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2858.wml b/english/lts/security/2021/dla-2858.wml
deleted file mode 100644
index 09fac738285..00000000000
--- a/english/lts/security/2021/dla-2858.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libzip, a library for reading, creating, and
-modifying zip archives.
-Crafted ZIP archives could allow remote attackers to cause denial of
-service due to memory allocation failure by mishandling EOCD records.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.2-1.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libzip packages.</p>
-
-<p>For the detailed security status of libzip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libzip">https://security-tracker.debian.org/tracker/libzip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2858.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2859.data b/english/lts/security/2021/dla-2859.data
deleted file mode 100644
index f02199e5b31..00000000000
--- a/english/lts/security/2021/dla-2859.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2859-1 zziplib</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2020-18442</define-tag>
-<define-tag packages>zziplib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2859.wml b/english/lts/security/2021/dla-2859.wml
deleted file mode 100644
index ddfc084d6cb..00000000000
--- a/english/lts/security/2021/dla-2859.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in zziplib, a library providing read access on
-ZIP-archive.
-Because of mishandling a return value, an attacker might cause a denial of
-service due to an infinite loop.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.13.62-3.2~deb9u2.</p>
-
-<p>We recommend that you upgrade your zziplib packages.</p>
-
-<p>For the detailed security status of zziplib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zziplib">https://security-tracker.debian.org/tracker/zziplib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2859.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2860.data b/english/lts/security/2021/dla-2860.data
deleted file mode 100644
index 4f4e5e96c25..00000000000
--- a/english/lts/security/2021/dla-2860.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2860-1 paramiko</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2018-7750 CVE-2018-1000805 Bug#892859 Bug#910760</define-tag>
-<define-tag packages>paramiko</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2860.wml b/english/lts/security/2021/dla-2860.wml
deleted file mode 100644
index f4b23704877..00000000000
--- a/english/lts/security/2021/dla-2860.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A couple of vulnerabilities were found in paramiko, an implementation
-of SSHv2 protocol in Python.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000805">CVE-2018-1000805</a>
-
- <p>Fix to prevent malicious clients to trick the Paramiko server
- into thinking an unauthenticated client is authenticated.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7750">CVE-2018-7750</a>
-
- <p>Fix check whether authentication is completed before processing
- other requests. A customized SSH client can simply skip the
- authentication step.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.0.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your paramiko packages.</p>
-
-<p>For the detailed security status of paramiko please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/paramiko">https://security-tracker.debian.org/tracker/paramiko</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2860.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2861.data b/english/lts/security/2021/dla-2861.data
deleted file mode 100644
index a4d58d69819..00000000000
--- a/english/lts/security/2021/dla-2861.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2861-1 rdflib</define-tag>
-<define-tag report_date>2021-12-28</define-tag>
-<define-tag secrefs>CVE-2019-7653 Bug#921751</define-tag>
-<define-tag packages>rdflib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2861.wml b/english/lts/security/2021/dla-2861.wml
deleted file mode 100644
index 3c62328d8e5..00000000000
--- a/english/lts/security/2021/dla-2861.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The python-rdflib-tools package (tools for converting to and from RDF)
-had wrappers that could load Python modules from the current
-working directory, allowing code injection.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.2.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your rdflib packages.</p>
-
-<p>For the detailed security status of rdflib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rdflib">https://security-tracker.debian.org/tracker/rdflib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2861.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2862.data b/english/lts/security/2021/dla-2862.data
deleted file mode 100644
index cd22e118871..00000000000
--- a/english/lts/security/2021/dla-2862.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2862-1 python-gnupg</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2018-12020 CVE-2019-6690</define-tag>
-<define-tag packages>python-gnupg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2862.wml b/english/lts/security/2021/dla-2862.wml
deleted file mode 100644
index 18f960920fc..00000000000
--- a/english/lts/security/2021/dla-2862.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A couple of vulnerabilites were found in python-gnupg, a Python
-wrapper for the GNU Privacy Guard.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12020">CVE-2018-12020</a>
-
- <p>Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly
- handled certain command line parameters. A remote attacker
- could use this to spoof the output of GnuPG and cause unsigned
- e-mail to appear signed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6690">CVE-2019-6690</a>
-
- <p>It was discovered that python-gnupg incorrectly handled the GPG
- passphrase. A remote attacker could send a specially crafted
- passphrase that would allow them to control the output of
- encryption and decryption operations.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.3.9-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-gnupg packages.</p>
-
-<p>For the detailed security status of python-gnupg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-gnupg">https://security-tracker.debian.org/tracker/python-gnupg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2862.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2863.data b/english/lts/security/2021/dla-2863.data
deleted file mode 100644
index 96246b0a347..00000000000
--- a/english/lts/security/2021/dla-2863.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2863-1 firefox-esr</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2021-38503 CVE-2021-38504 CVE-2021-38506 CVE-2021-38507 CVE-2021-38508 CVE-2021-38509 CVE-2021-43534 CVE-2021-43535 CVE-2021-43536 CVE-2021-43537 CVE-2021-43538 CVE-2021-43539 CVE-2021-43541 CVE-2021-43542 CVE-2021-43543 CVE-2021-43545 CVE-2021-43546</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2863.wml b/english/lts/security/2021/dla-2863.wml
deleted file mode 100644
index c5e8cd4be36..00000000000
--- a/english/lts/security/2021/dla-2863.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code, information disclosure or spoofing.</p>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 78.x series has ended, so starting with this update we're now
-following the 91.x releases.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.4.1esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2863.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2864.data b/english/lts/security/2021/dla-2864.data
deleted file mode 100644
index bba9191a27f..00000000000
--- a/english/lts/security/2021/dla-2864.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2864-1 ruby-haml</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2017-1002201</define-tag>
-<define-tag packages>ruby-haml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2864.wml b/english/lts/security/2021/dla-2864.wml
deleted file mode 100644
index dbc2d0f33ba..00000000000
--- a/english/lts/security/2021/dla-2864.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In ruby-haml, which is an elegant, structured XHTML/XML templating
-engine, when using user input to perform tasks on the server,
-characters like < > " ' must be escaped properly. In this case,
-the ' character was missed. An attacker can manipulate the input to
-introduce additional attributes, potentially executing code.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.0.7-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-haml packages.</p>
-
-<p>For the detailed security status of ruby-haml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-haml">https://security-tracker.debian.org/tracker/ruby-haml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2864.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2865.data b/english/lts/security/2021/dla-2865.data
deleted file mode 100644
index 38e02781bd6..00000000000
--- a/english/lts/security/2021/dla-2865.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2865-1 resiprocate</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2017-11521 CVE-2018-12584 Bug#869404 Bug#905495</define-tag>
-<define-tag packages>resiprocate</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2865.wml b/english/lts/security/2021/dla-2865.wml
deleted file mode 100644
index 178a9d670f2..00000000000
--- a/english/lts/security/2021/dla-2865.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were fixed in the reSIProcate SIP stack.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11521">CVE-2017-11521</a>
-
- <p>The SdpContents::Session::Medium::parse function allowed remote
- attackers to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12584">CVE-2018-12584</a>
-
- <p>The ConnectionBase::preparseNewBytes function allowed remote
- attackers to cause a denial of service or possibly execute arbitrary
- code when TLS communication is enabled.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:1.11.0~beta1-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your resiprocate packages.</p>
-
-<p>For the detailed security status of resiprocate please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/resiprocate">https://security-tracker.debian.org/tracker/resiprocate</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2865.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2866.data b/english/lts/security/2021/dla-2866.data
deleted file mode 100644
index 1acf449c11c..00000000000
--- a/english/lts/security/2021/dla-2866.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2866-1 uw-imap</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2018-19518 Bug#914632</define-tag>
-<define-tag packages>uw-imap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2866.wml b/english/lts/security/2021/dla-2866.wml
deleted file mode 100644
index d1f3848ff1d..00000000000
--- a/english/lts/security/2021/dla-2866.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Access to IMAP mailboxes through running imapd over rsh and ssh is
-now disabled by default in uw-imap, the University of Washington IMAP
-Toolkit. Code using the library can enable it with tcp_parameters()
-after making sure that the IMAP server name is sanitized.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8:2007f~dfsg-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your uw-imap packages.</p>
-
-<p>For the detailed security status of uw-imap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/uw-imap">https://security-tracker.debian.org/tracker/uw-imap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2866.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2867.data b/english/lts/security/2021/dla-2867.data
deleted file mode 100644
index 16621b713be..00000000000
--- a/english/lts/security/2021/dla-2867.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2867-1 spip</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2867.wml b/english/lts/security/2021/dla-2867.wml
deleted file mode 100644
index 2ef99006ba1..00000000000
--- a/english/lts/security/2021/dla-2867.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that SPIP, a website engine for publishing, would
-allow a malicious user to perform cross-site scripting and SQL
-injection attacks, or execute arbitrary code.</p>
-
-<p>This update also fixes issues introduced in the previous security
-uploads.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.4-4~deb9u4+deb9u2.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2867.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2868.data b/english/lts/security/2021/dla-2868.data
deleted file mode 100644
index dc33d76f8a4..00000000000
--- a/english/lts/security/2021/dla-2868.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2868-1 advancecomp</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2018-1056 CVE-2019-8379 CVE-2019-8383 CVE-2019-9210 Bug#889270 Bug#923416 Bug#928729 Bug#928730</define-tag>
-<define-tag packages>advancecomp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2868.wml b/english/lts/security/2021/dla-2868.wml
deleted file mode 100644
index 5416005d6de..00000000000
--- a/english/lts/security/2021/dla-2868.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in the AdvanceCOMP recompression utilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1056">CVE-2018-1056</a>
-
- <p>Out-of-bounds heap buffer read in advzip.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8379">CVE-2019-8379</a>
-
- <p>NULL pointer dereference in be_uint32_read().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8383">CVE-2019-8383</a>
-
- <p>Invalid memory access in adv_png_unfilter_8().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-9210">CVE-2019-9210</a>
-
- <p>Integer overflow in advpng with invalid PNG size.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.20-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your advancecomp packages.</p>
-
-<p>For the detailed security status of advancecomp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/advancecomp">https://security-tracker.debian.org/tracker/advancecomp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2868.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2869.data b/english/lts/security/2021/dla-2869.data
deleted file mode 100644
index 03f03de90ba..00000000000
--- a/english/lts/security/2021/dla-2869.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2869-1 xorg-server</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2021-4008 CVE-2021-4009 CVE-2021-4011</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2869.wml b/english/lts/security/2021/dla-2869.wml
deleted file mode 100644
index 3f7c19337e5..00000000000
--- a/english/lts/security/2021/dla-2869.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn discovered that multiple input validation failures in X
-server extensions of the X.org X server may result in privilege
-escalation if the X server is running privileged.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:1.19.2-1+deb9u9.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2869.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2870.data b/english/lts/security/2021/dla-2870.data
deleted file mode 100644
index 2b5338c8687..00000000000
--- a/english/lts/security/2021/dla-2870.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2870-1 apache-log4j2</define-tag>
-<define-tag report_date>2021-12-29</define-tag>
-<define-tag secrefs>CVE-2021-44832 Bug#1002813</define-tag>
-<define-tag packages>apache-log4j2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2870.wml b/english/lts/security/2021/dla-2870.wml
deleted file mode 100644
index ce1c95afcbc..00000000000
--- a/english/lts/security/2021/dla-2870.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Apache Log4j2, a Java Logging Framework, is vulnerable to a remote code
-execution (RCE) attack where an attacker with permission to modify the logging
-configuration file can construct a malicious configuration using a JDBC
-Appender with a data source referencing a JNDI URI which can execute remote
-code. This issue is fixed by limiting JNDI data source names to the java
-protocol.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.12.4-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your apache-log4j2 packages.</p>
-
-<p>For the detailed security status of apache-log4j2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/apache-log4j2">https://security-tracker.debian.org/tracker/apache-log4j2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2870.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2871.data b/english/lts/security/2021/dla-2871.data
deleted file mode 100644
index 7859d1384ab..00000000000
--- a/english/lts/security/2021/dla-2871.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2871-1 lxml</define-tag>
-<define-tag report_date>2021-12-30</define-tag>
-<define-tag secrefs>CVE-2021-43818 Bug#1001885</define-tag>
-<define-tag packages>lxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2871.wml b/english/lts/security/2021/dla-2871.wml
deleted file mode 100644
index fc29457fe18..00000000000
--- a/english/lts/security/2021/dla-2871.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>lxml is a library for processing XML and HTML in the Python language.
-Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain
-crafted script content pass through, as well as script content in
-SVG files embedded using data URIs.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.7.1-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your lxml packages.</p>
-
-<p>For the detailed security status of lxml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lxml">https://security-tracker.debian.org/tracker/lxml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2871.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2872.data b/english/lts/security/2021/dla-2872.data
deleted file mode 100644
index 8c668d354df..00000000000
--- a/english/lts/security/2021/dla-2872.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2872-1 agg</define-tag>
-<define-tag report_date>2021-12-31</define-tag>
-<define-tag secrefs>CVE-2019-6245 Bug#919322</define-tag>
-<define-tag packages>agg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2872.wml b/english/lts/security/2021/dla-2872.wml
deleted file mode 100644
index 63863cedda7..00000000000
--- a/english/lts/security/2021/dla-2872.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Stack overflow due to infinite recursion was fixed in agg,
-the Anti-Grain Geometry graphical toolkit.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.5+dfsg1-11+deb9u1.</p>
-
-<p>We recommend that you upgrade your agg packages.</p>
-
-<p>For the detailed security status of agg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/agg">https://security-tracker.debian.org/tracker/agg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2872.data"
-# $Id: $
diff --git a/english/lts/security/2021/dla-2873.data b/english/lts/security/2021/dla-2873.data
deleted file mode 100644
index b72da84f1c4..00000000000
--- a/english/lts/security/2021/dla-2873.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2873-1 aria2</define-tag>
-<define-tag report_date>2021-12-31</define-tag>
-<define-tag secrefs>CVE-2019-3500 Bug#918058</define-tag>
-<define-tag packages>aria2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2021/dla-2873.wml b/english/lts/security/2021/dla-2873.wml
deleted file mode 100644
index 085d026ff33..00000000000
--- a/english/lts/security/2021/dla-2873.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In the download utility aria2, --log was leaking HTTP user credentials in
-local log file.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.30.0-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your aria2 packages.</p>
-
-<p>For the detailed security status of aria2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/aria2">https://security-tracker.debian.org/tracker/aria2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2021/dla-2873.data"
-# $Id: $
diff --git a/english/lts/security/2021/index.wml b/english/lts/security/2021/index.wml
deleted file mode 100644
index f1864dcfe8a..00000000000
--- a/english/lts/security/2021/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2021</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2021' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2022/Makefile b/english/lts/security/2022/Makefile
deleted file mode 100644
index 521d03ac61b..00000000000
--- a/english/lts/security/2022/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2022
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
diff --git a/english/lts/security/2022/dla-2480-2.data b/english/lts/security/2022/dla-2480-2.data
deleted file mode 100644
index e9e00ceb13f..00000000000
--- a/english/lts/security/2022/dla-2480-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2480-2 salt</define-tag>
-<define-tag report_date>2022-01-03</define-tag>
-<define-tag secrefs>CVE-2020-16846 CVE-2021-3197 CVE-2020-28243 CVE-2021-25282 CVE-2021-25284</define-tag>
-<define-tag packages>salt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2480-2.wml b/english/lts/security/2022/dla-2480-2.wml
deleted file mode 100644
index 7438addf8cd..00000000000
--- a/english/lts/security/2022/dla-2480-2.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Past security updates of Salt, a remote execution manager, introduced
-regressions for which follow-up fixes were published:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16846">CVE-2020-16846</a> regression
-
- <p><q>salt-ssh</q> master key initialization fails</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3197">CVE-2021-3197</a> regression
-
- <p>Valid parameters are discarded for the SSHClient</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28243">CVE-2020-28243</a> follow-up
-
- <p>Prevent argument injection in restartcheck</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25282">CVE-2021-25282</a> regression
-
- <p>pillar_roots.write cannot write to subdirs</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25284">CVE-2021-25284</a> regression
-
- <p>The <q>cmd.run</q> function crashes if passing tuple arg</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2016.11.2+ds-1+deb9u10.</p>
-
-<p>We recommend that you upgrade your salt packages.</p>
-
-<p>For the detailed security status of salt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2480-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2874.data b/english/lts/security/2022/dla-2874.data
deleted file mode 100644
index f370bb1edc6..00000000000
--- a/english/lts/security/2022/dla-2874.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2874-1 thunderbird</define-tag>
-<define-tag report_date>2022-01-04</define-tag>
-<define-tag secrefs>CVE-2021-4126 CVE-2021-38496 CVE-2021-38500 CVE-2021-38502 CVE-2021-38503 CVE-2021-38504 CVE-2021-38506 CVE-2021-38507 CVE-2021-38508 CVE-2021-38509 CVE-2021-43528 CVE-2021-43529 CVE-2021-43534 CVE-2021-43535 CVE-2021-43536 CVE-2021-43537 CVE-2021-43538 CVE-2021-43539 CVE-2021-43541 CVE-2021-43542 CVE-2021-43543 CVE-2021-43545 CVE-2021-43546 CVE-2021-44538</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2874.wml b/english/lts/security/2022/dla-2874.wml
deleted file mode 100644
index ecbac83815c..00000000000
--- a/english/lts/security/2022/dla-2874.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code, spoofing, information disclosure,
-downgrade attacks on SMTP STARTTLS connections or misleading display of
-OpenPGP/MIME signatures.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.4.1-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2874.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2875.data b/english/lts/security/2022/dla-2875.data
deleted file mode 100644
index 5d2f98d6a2c..00000000000
--- a/english/lts/security/2022/dla-2875.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2875-1 clamav</define-tag>
-<define-tag report_date>2022-01-10</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2875.wml b/english/lts/security/2022/dla-2875.wml
deleted file mode 100644
index 665a760f4aa..00000000000
--- a/english/lts/security/2022/dla-2875.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Version 0.102 of ClamAV, an anti-virus toolkit, is end-of-life. ClamAV
-has been updated to version 0.103 to be able to receive virus signature
-updates.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.103.4+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2875.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2876.data b/english/lts/security/2022/dla-2876.data
deleted file mode 100644
index a6f84b855ed..00000000000
--- a/english/lts/security/2022/dla-2876.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2876-1 vim</define-tag>
-<define-tag report_date>2022-01-10</define-tag>
-<define-tag secrefs>CVE-2017-17087 CVE-2019-20807 CVE-2021-3778 CVE-2021-3796</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2876.wml b/english/lts/security/2022/dla-2876.wml
deleted file mode 100644
index 07c838ad2ae..00000000000
--- a/english/lts/security/2022/dla-2876.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues have been discovered in vim: an enhanced vi text editor:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17087">CVE-2017-17087</a>
-
- <p>fileio.c in Vim sets the group ownership of a .swp file to the editor's primary
- group (which may be different from the group ownership of the original file),
- which allows local users to obtain sensitive information by leveraging an
- applicable group membership.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20807">CVE-2019-20807</a>
-
- <p>Users can circumvent the rvim restricted mode and execute arbitrary OS
- commands via scripting interfaces (e.g., Python, Ruby, or Lua).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3778">CVE-2021-3778</a>
-
- <p>Heap-based Buffer Overflow with invalid utf-8 character was detected in
- regexp_nfa.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3796">CVE-2021-3796</a>
-
- <p>Heap Use-After-Free memory error was detected in normal.c. A successful
- exploitation may lead to code execution.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:8.0.0197-4+deb9u4.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2876.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2877.data b/english/lts/security/2022/dla-2877.data
deleted file mode 100644
index c534dda7299..00000000000
--- a/english/lts/security/2022/dla-2877.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2877-1 gdal</define-tag>
-<define-tag report_date>2022-01-12</define-tag>
-<define-tag secrefs>CVE-2019-17545 CVE-2021-45943</define-tag>
-<define-tag packages>gdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2877.wml b/english/lts/security/2022/dla-2877.wml
deleted file mode 100644
index 23f3febabaa..00000000000
--- a/english/lts/security/2022/dla-2877.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues were found in GDAL, a geospatial library, that could lead to
-denial of service via application crash or possibly the execution of
-arbitrary code if maliciously crafted data was parsed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.2+dfsg-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your gdal packages.</p>
-
-<p>For the detailed security status of gdal please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gdal">https://security-tracker.debian.org/tracker/gdal</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2877.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2878.data b/english/lts/security/2022/dla-2878.data
deleted file mode 100644
index 77e00df15f6..00000000000
--- a/english/lts/security/2022/dla-2878.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2878-1 roundcube</define-tag>
-<define-tag report_date>2022-01-12</define-tag>
-<define-tag secrefs>CVE-2021-46144 Bug#1003027</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2878.wml b/english/lts/security/2022/dla-2878.wml
deleted file mode 100644
index 63a412c9e5c..00000000000
--- a/english/lts/security/2022/dla-2878.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that roundcube, a skinnable AJAX based webmail
-solution for IMAP servers, did not properly sanitize HTML
-messages. This would allow an attacker to perform Cross-Site Scripting
-(XSS) attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.3+dfsg.1-4+deb9u10.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2878.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2879.data b/english/lts/security/2022/dla-2879.data
deleted file mode 100644
index 2bbc460e1aa..00000000000
--- a/english/lts/security/2022/dla-2879.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2879-1 ghostscript</define-tag>
-<define-tag report_date>2022-1-14</define-tag>
-<define-tag secrefs>CVE-2021-45944 CVE-2021-45949</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2879.wml b/english/lts/security/2022/dla-2879.wml
deleted file mode 100644
index 08f6ff522e1..00000000000
--- a/english/lts/security/2022/dla-2879.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Ghostscript, the GPL
-PostScript/PDF interpreter, which could result in denial of service and
-potentially the execution of arbitrary code if malformed document files
-are processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-9.26a~dfsg-0+deb9u8.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>For the detailed security status of ghostscript please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2879.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2880.data b/english/lts/security/2022/dla-2880.data
deleted file mode 100644
index aa360cef425..00000000000
--- a/english/lts/security/2022/dla-2880.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2880-1 firefox-esr</define-tag>
-<define-tag report_date>2022-01-16</define-tag>
-<define-tag secrefs>CVE-2021-4140 CVE-2022-22737 CVE-2022-22738 CVE-2022-22739 CVE-2022-22740 CVE-2022-22741 CVE-2022-22742 CVE-2022-22743 CVE-2022-22745 CVE-2022-22747 CVE-2022-22748 CVE-2022-22751</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2880.wml b/english/lts/security/2022/dla-2880.wml
deleted file mode 100644
index d59f14a33fc..00000000000
--- a/english/lts/security/2022/dla-2880.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary code,
-information disclosure, denial of service or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.5.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2880.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2881.data b/english/lts/security/2022/dla-2881.data
deleted file mode 100644
index 1ca8c3cb2cf..00000000000
--- a/english/lts/security/2022/dla-2881.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2881-1 thunderbird</define-tag>
-<define-tag report_date>2022-01-16</define-tag>
-<define-tag secrefs>CVE-2021-4140 CVE-2022-22737 CVE-2022-22738 CVE-2022-22739 CVE-2022-22740 CVE-2022-22741 CVE-2022-22742 CVE-2022-22743 CVE-2022-22745 CVE-2022-22747 CVE-2022-22748 CVE-2022-22751</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2881.wml b/english/lts/security/2022/dla-2881.wml
deleted file mode 100644
index 980fd720299..00000000000
--- a/english/lts/security/2022/dla-2881.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.5.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2881.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2882.data b/english/lts/security/2022/dla-2882.data
deleted file mode 100644
index a140fb79a0f..00000000000
--- a/english/lts/security/2022/dla-2882.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2882-1 sphinxsearch</define-tag>
-<define-tag report_date>2022-1-17</define-tag>
-<define-tag secrefs>CVE-2020-29050</define-tag>
-<define-tag packages>sphinxsearch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2882.wml b/english/lts/security/2022/dla-2882.wml
deleted file mode 100644
index f8ce892e14f..00000000000
--- a/english/lts/security/2022/dla-2882.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that sphinxsearch, a fast standalone full-text SQL
-search engine, could allow arbitrary files to be read by abusing a
-configuration option.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.2.11-1.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your sphinxsearch packages.</p>
-
-<p>For the detailed security status of sphinxsearch please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sphinxsearch">https://security-tracker.debian.org/tracker/sphinxsearch</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2882.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2883-2.data b/english/lts/security/2022/dla-2883-2.data
deleted file mode 100644
index 67e49d64ed3..00000000000
--- a/english/lts/security/2022/dla-2883-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2883-2</define-tag>
-<define-tag report_date>2022-01-26</define-tag>
-<define-tag secrefs>CVE-2021-46141</define-tag>
-<define-tag packages></define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2883-2.wml b/english/lts/security/2022/dla-2883-2.wml
deleted file mode 100644
index 124b45b155f..00000000000
--- a/english/lts/security/2022/dla-2883-2.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the fix for CVE-2021-46141 released in uriparser
-version 0.8.4-1+deb9u3 was incomplete.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-46141">CVE-2021-46141</a>
-
- <p>An issue was discovered in uriparser before 0.9.6. It performs invalid
- free operations in uriFreeUriMembers and uriMakeOwner.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.8.4-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2883-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2883.data b/english/lts/security/2022/dla-2883.data
deleted file mode 100644
index 371d46a1704..00000000000
--- a/english/lts/security/2022/dla-2883.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2883-1 </define-tag>
-<define-tag report_date>2022-01-25</define-tag>
-<define-tag secrefs>CVE-2021-46141 CVE-2021-46142</define-tag>
-<define-tag packages></define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2883.wml b/english/lts/security/2022/dla-2883.wml
deleted file mode 100644
index 570ee1c0b77..00000000000
--- a/english/lts/security/2022/dla-2883.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two "invalid free" issues in uriparser, a
-C library for parsing URLs according to RFC 3986.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-46141">CVE-2021-46141</a>
-
- <p>An issue was discovered in uriparser before 0.9.6. It performs invalid
- free operations in uriFreeUriMembers and uriMakeOwner.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-46142">CVE-2021-46142</a>
-
- <p>An issue was discovered in uriparser before 0.9.6. It performs invalid
- free operations in uriNormalizeSyntax.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-0.8.4-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2883.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2884.data b/english/lts/security/2022/dla-2884.data
deleted file mode 100644
index a94116237a5..00000000000
--- a/english/lts/security/2022/dla-2884.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2884-1 wordpress</define-tag>
-<define-tag report_date>2022-01-24</define-tag>
-<define-tag secrefs>CVE-2022-21661 CVE-2022-21662 CVE-2022-21663 CVE-2022-21664 Bug#1003243</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2884.wml b/english/lts/security/2022/dla-2884.wml
deleted file mode 100644
index d504ccbcf67..00000000000
--- a/english/lts/security/2022/dla-2884.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Wordpress, a web blogging
-tool. They allowed remote attackers to perform SQL injection, run
-unchecked SQL queries, bypass hardening, or perform Cross-Site
-Scripting (XSS) attacks.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.7.22+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2884.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2885.data b/english/lts/security/2022/dla-2885.data
deleted file mode 100644
index 6f768e7c5d7..00000000000
--- a/english/lts/security/2022/dla-2885.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2885-1 qtsvg-opensource-src</define-tag>
-<define-tag report_date>2022-01-24</define-tag>
-<define-tag secrefs>CVE-2021-3481 CVE-2021-45930 Bug#986798 Bug#1002991</define-tag>
-<define-tag packages>qtsvg-opensource-src</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2885.wml b/english/lts/security/2022/dla-2885.wml
deleted file mode 100644
index c5668c7922a..00000000000
--- a/english/lts/security/2022/dla-2885.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple out-of-bounds error were discovered in qtsvg-opensource-src.
-The highest threat from <a href="https://security-tracker.debian.org/tracker/CVE-2021-3481">CVE-2021-3481</a> (at least) is to data
-confidentiality the application availability.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-5.7.1~20161021-2.1+deb9u1.</p>
-
-<p>We recommend that you upgrade your qtsvg-opensource-src packages.</p>
-
-<p>For the detailed security status of qtsvg-opensource-src please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qtsvg-opensource-src">https://security-tracker.debian.org/tracker/qtsvg-opensource-src</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2885.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2886.data b/english/lts/security/2022/dla-2886.data
deleted file mode 100644
index f7f3069c2e5..00000000000
--- a/english/lts/security/2022/dla-2886.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2886-1 slurm-llnl</define-tag>
-<define-tag report_date>2022-01-17</define-tag>
-<define-tag secrefs>CVE-2019-12838 CVE-2020-12693 CVE-2020-27745 CVE-2021-31215 Bug#931880 Bug#961406 Bug#974721 Bug#988439</define-tag>
-<define-tag packages>slurm-llnl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2886.wml b/english/lts/security/2022/dla-2886.wml
deleted file mode 100644
index 9516773758b..00000000000
--- a/english/lts/security/2022/dla-2886.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in the Simple Linux Utility
-for Resource Management (SLURM), a cluster resource management and job
-scheduling system, which could result in denial of service,
-information disclosure or privilege escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12838">CVE-2019-12838</a>
-
- <p>SchedMD Slurm allows SQL Injection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12693">CVE-2020-12693</a>
-
- <p>In the rare case where Message Aggregation is enabled, Slurm
- allows Authentication Bypass via an Alternate Path or Channel. A
- race condition allows a user to launch a process as an arbitrary
- user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27745">CVE-2020-27745</a>
-
- <p>RPC Buffer Overflow in the PMIx MPI plugin.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31215">CVE-2021-31215</a>
-
- <p>SchedMD Slurm allows remote code execution as SlurmUser because
- use of a PrologSlurmctld or EpilogSlurmctld script leads to
- environment mishandling.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-16.05.9-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your slurm-llnl packages.</p>
-
-<p>For the detailed security status of slurm-llnl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/slurm-llnl">https://security-tracker.debian.org/tracker/slurm-llnl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2886.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2887.data b/english/lts/security/2022/dla-2887.data
deleted file mode 100644
index 27f2741f8e0..00000000000
--- a/english/lts/security/2022/dla-2887.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2887-1 lighttpd</define-tag>
-<define-tag report_date>2022-01-18</define-tag>
-<define-tag secrefs>CVE-2018-19052</define-tag>
-<define-tag packages>lighttpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2887.wml b/english/lts/security/2022/dla-2887.wml
deleted file mode 100644
index 26bdf0184bf..00000000000
--- a/english/lts/security/2022/dla-2887.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One issue has been discovered in lighttpd: fast webserver with minimal memory
-footprint.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19052">CVE-2018-19052</a>:
-
-<p>an issue was discovered in mod_alias_physical_handler in
-mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of
-a single directory above an alias target, with a specific mod_alias
-configuration where the matched alias lacks a trailing '/' character, but the
-alias target filesystem path does have a trailing '/' character.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.4.45-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your lighttpd packages.</p>
-
-<p>For the detailed security status of lighttpd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lighttpd">https://security-tracker.debian.org/tracker/lighttpd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2887.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2888.data b/english/lts/security/2022/dla-2888.data
deleted file mode 100644
index 4c8f4edae89..00000000000
--- a/english/lts/security/2022/dla-2888.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2888-1 nvidia-graphics-drivers</define-tag>
-<define-tag report_date>2022-1-18</define-tag>
-<define-tag secrefs>CVE-2021-1056 CVE-2021-1076 CVE-2021-1093 CVE-2021-1094 CVE-2021-1095 Bug#987216 Bug#987217 Bug#987218 Bug#987219 Bug#987220 Bug#987221 Bug#987222 Bug#991351</define-tag>
-<define-tag packages>nvidia-graphics-drivers</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2888.wml b/english/lts/security/2022/dla-2888.wml
deleted file mode 100644
index a3187c3c202..00000000000
--- a/english/lts/security/2022/dla-2888.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in the NVIDIA binary
-driver and libraries that provide optimized hardware acceleration which may
-lead to denial of service, information disclosure or data corruption.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-390.144-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your nvidia-graphics-drivers packages.</p>
-
-<p>For the detailed security status of nvidia-graphics-drivers please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/nvidia-graphics-drivers">https://security-tracker.debian.org/tracker/nvidia-graphics-drivers</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2888.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2889.data b/english/lts/security/2022/dla-2889.data
deleted file mode 100644
index a5d1eb52f35..00000000000
--- a/english/lts/security/2022/dla-2889.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2889-1 drupal7</define-tag>
-<define-tag report_date>2022-1-19</define-tag>
-<define-tag secrefs>CVE-2021-41182 CVE-2021-41183 CVE-2016-7103 CVE-2010-5312</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2889.wml b/english/lts/security/2022/dla-2889.wml
deleted file mode 100644
index 4e0798f62de..00000000000
--- a/english/lts/security/2022/dla-2889.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Drupal project includes a very old version of jQuery. Security
-vulnerabilities leading to cross-site scripting attacks in different
-components of the jQuery UI libraries were found and fixed for Drupal
-version 7.86.</p>
-
-<p>The fixes for said vulnerabilities were backported to the version in
-Debian 9 Stretch (7.52).</p>
-
-<p>Drupal is a rich Web content management system; it was included in
-Debian until Stretch, but is not present in any newer releases. If you
-run a web server with Drupal7, we strongly recommend you to upgrade
-the drupal7 package.</p>
-
-<p>For the detailed security status of drupal7 please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/drupal7">https://security-tracker.debian.org/tracker/drupal7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>--AWNW9msBK4+52Jxu
-Content-Type: application/pgp-signature; name="signature.asc"</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2889.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2890.data b/english/lts/security/2022/dla-2890.data
deleted file mode 100644
index 70f2ab0f80e..00000000000
--- a/english/lts/security/2022/dla-2890.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2890-1 libspf2</define-tag>
-<define-tag report_date>2022-1-21</define-tag>
-<define-tag secrefs>CVE-2021-33912 CVE-2021-33913</define-tag>
-<define-tag packages>libspf2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2890.wml b/english/lts/security/2022/dla-2890.wml
deleted file mode 100644
index 00f0ab6c686..00000000000
--- a/english/lts/security/2022/dla-2890.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in libspf2, a library for validating mail
-senders with SPF.
-Both issues are related to heap-based buffer overflows.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.2.10-7+deb9u2.</p>
-
-<p>We recommend that you upgrade your libspf2 packages.</p>
-
-<p>For the detailed security status of libspf2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libspf2">https://security-tracker.debian.org/tracker/libspf2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2890.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2891.data b/english/lts/security/2022/dla-2891.data
deleted file mode 100644
index 337cadc7b97..00000000000
--- a/english/lts/security/2022/dla-2891.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2891-1 golang-1.8</define-tag>
-<define-tag report_date>2022-01-21</define-tag>
-<define-tag secrefs>CVE-2021-33196 CVE-2021-36221 CVE-2021-39293 CVE-2021-41771 CVE-2021-44716 CVE-2021-44717 Bug#989492 Bug#991961</define-tag>
-<define-tag packages>golang-1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2891.wml b/english/lts/security/2022/dla-2891.wml
deleted file mode 100644
index 08b58f212e4..00000000000
--- a/english/lts/security/2022/dla-2891.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS) and
-information leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33196">CVE-2021-33196</a>
-
- <p>In archive/zip, a crafted file count (in an archive's header) can
- cause a NewReader or OpenReader panic.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36221">CVE-2021-36221</a>
-
- <p>Go has a race condition that can lead to a net/http/httputil
- ReverseProxy panic upon an ErrAbortHandler abort.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39293">CVE-2021-39293</a>
-
- <p>Follow-up fix to <a href="https://security-tracker.debian.org/tracker/CVE-2021-33196">CVE-2021-33196</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41771">CVE-2021-41771</a>
-
- <p>ImportedSymbols in debug/macho (for Open or OpenFat) accesses a
- Memory Location After the End of a Buffer, aka an out-of-bounds
- slice situation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44716">CVE-2021-44716</a>
-
- <p>net/http allows uncontrolled memory consumption in the header
- canonicalization cache via HTTP/2 requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44717">CVE-2021-44717</a>
-
- <p>Go on UNIX allows write operations to an unintended file or
- unintended network connection as a consequence of erroneous
- closing of file descriptor 0 after file-descriptor exhaustion.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8.1-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your golang-1.8 packages.</p>
-
-<p>For the detailed security status of golang-1.8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.8">https://security-tracker.debian.org/tracker/golang-1.8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2891.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2892.data b/english/lts/security/2022/dla-2892.data
deleted file mode 100644
index baecfc7b446..00000000000
--- a/english/lts/security/2022/dla-2892.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2892-1 golang-1.7</define-tag>
-<define-tag report_date>2022-01-21</define-tag>
-<define-tag secrefs>CVE-2021-33196 CVE-2021-36221 CVE-2021-39293 CVE-2021-41771 CVE-2021-44716 CVE-2021-44717 Bug#989492 Bug#991961</define-tag>
-<define-tag packages>golang-1.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2892.wml b/english/lts/security/2022/dla-2892.wml
deleted file mode 100644
index 231841469f5..00000000000
--- a/english/lts/security/2022/dla-2892.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS) and
-information leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33196">CVE-2021-33196</a>
-
- <p>In archive/zip, a crafted file count (in an archive's header) can
- cause a NewReader or OpenReader panic.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36221">CVE-2021-36221</a>
-
- <p>Go has a race condition that can lead to a net/http/httputil
- ReverseProxy panic upon an ErrAbortHandler abort.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39293">CVE-2021-39293</a>
-
- <p>Follow-up fix to <a href="https://security-tracker.debian.org/tracker/CVE-2021-33196">CVE-2021-33196</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41771">CVE-2021-41771</a>
-
- <p>ImportedSymbols in debug/macho (for Open or OpenFat) accesses a
- Memory Location After the End of a Buffer, aka an out-of-bounds
- slice situation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44716">CVE-2021-44716</a>
-
- <p>net/http allows uncontrolled memory consumption in the header
- canonicalization cache via HTTP/2 requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44717">CVE-2021-44717</a>
-
- <p>Go on UNIX allows write operations to an unintended file or
- unintended network connection as a consequence of erroneous
- closing of file descriptor 0 after file-descriptor exhaustion.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.4-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your golang-1.7 packages.</p>
-
-<p>For the detailed security status of golang-1.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.7">https://security-tracker.debian.org/tracker/golang-1.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2892.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2893.data b/english/lts/security/2022/dla-2893.data
deleted file mode 100644
index 8bd055232a2..00000000000
--- a/english/lts/security/2022/dla-2893.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2893-1 pillow</define-tag>
-<define-tag report_date>2022-01-23</define-tag>
-<define-tag secrefs>CVE-2022-22815 CVE-2022-22816 CVE-2022-22817</define-tag>
-<define-tag packages>pillow</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2893.wml b/english/lts/security/2022/dla-2893.wml
deleted file mode 100644
index e3d46046316..00000000000
--- a/english/lts/security/2022/dla-2893.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Pillow, a Python imaging
-library, which could result in denial of service and potentially
-the execution of arbitrary code if malformed images are processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0.0-4+deb9u4.</p>
-
-<p>We recommend that you upgrade your pillow packages.</p>
-
-<p>For the detailed security status of pillow please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pillow">https://security-tracker.debian.org/tracker/pillow</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2893.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2894.data b/english/lts/security/2022/dla-2894.data
deleted file mode 100644
index c3fafb7b822..00000000000
--- a/english/lts/security/2022/dla-2894.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2894-1 aide</define-tag>
-<define-tag report_date>2022-01-25</define-tag>
-<define-tag secrefs>CVE-2021-45417</define-tag>
-<define-tag packages>aide</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2894.wml b/english/lts/security/2022/dla-2894.wml
deleted file mode 100644
index 203ceeed712..00000000000
--- a/english/lts/security/2022/dla-2894.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>David Bouman discovered a heap-based buffer overflow vulnerability in
-the base64 functions of aide, an advanced intrusion detection system,
-which can be triggered via large extended file attributes or ACLs. This
-may result in denial of service or privilege escalation.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.16-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your aide packages.</p>
-
-<p>For the detailed security status of aide please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/aide">https://security-tracker.debian.org/tracker/aide</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2894.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2895.data b/english/lts/security/2022/dla-2895.data
deleted file mode 100644
index 59eab7b8ddb..00000000000
--- a/english/lts/security/2022/dla-2895.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2895-1 qt4-x11</define-tag>
-<define-tag report_date>2022-01-24</define-tag>
-<define-tag secrefs>CVE-2021-3481 CVE-2021-45930 Bug#986798 Bug#1002991</define-tag>
-<define-tag packages>qt4-x11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2895.wml b/english/lts/security/2022/dla-2895.wml
deleted file mode 100644
index b997233ba2b..00000000000
--- a/english/lts/security/2022/dla-2895.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple out-of-bounds error were discovered in qt4-x11.
-The highest threat from <a href="https://security-tracker.debian.org/tracker/CVE-2021-3481">CVE-2021-3481</a> (at least) is to data
-confidentiality the application availability.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4:4.8.7+dfsg-11+deb9u3.</p>
-
-<p>We recommend that you upgrade your qt4-x11 packages.</p>
-
-<p>For the detailed security status of qt4-x11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qt4-x11">https://security-tracker.debian.org/tracker/qt4-x11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2895.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2896.data b/english/lts/security/2022/dla-2896.data
deleted file mode 100644
index b478885aca6..00000000000
--- a/english/lts/security/2022/dla-2896.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2896-1 ipython</define-tag>
-<define-tag report_date>2022-01-24</define-tag>
-<define-tag secrefs>CVE-2022-21699</define-tag>
-<define-tag packages>ipython</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2896.wml b/english/lts/security/2022/dla-2896.wml
deleted file mode 100644
index 42b78f55b23..00000000000
--- a/english/lts/security/2022/dla-2896.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential arbitrary code execution
-vulnerability in IPython, the interactive Python shell.</p>
-
-<p>This issue stemmed from IPython executing untrusted files in the current
-working directory. According to upstream:</p>
-
-<blockquote>
-<p>
- Almost all versions of IPython looks for configuration and profiles in
- current working directory. Since IPython was developed before pip and
- environments existed, it was used a convenient way to load code/packages in a
- project dependant way.
-</p>
-<p>
- In 2022, it is not necessary anymore, and can lead to confusing behavior
- where for example cloning a repository and starting IPython or loading a
- notebook from any Jupyter-Compatible interface that has ipython set as a
- kernel can lead to code execution.
-</p>
-</blockquote>
-
-<p>To address this problem, the current working directory is no longer searched
-for profiles or configuration files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21699">CVE-2022-21699</a>
-
- <p>IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-5.1.0-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your ipython packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2896.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2897.data b/english/lts/security/2022/dla-2897.data
deleted file mode 100644
index cac8792e2d8..00000000000
--- a/english/lts/security/2022/dla-2897.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2897-1 apr</define-tag>
-<define-tag report_date>2022-1-24</define-tag>
-<define-tag secrefs>CVE-2017-12613</define-tag>
-<define-tag packages>apr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2897.wml b/english/lts/security/2022/dla-2897.wml
deleted file mode 100644
index 4b67ed839ae..00000000000
--- a/english/lts/security/2022/dla-2897.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in apr, the Apache Portable Runtime Library.
-The issue is related to out of bounds memory access due to invalid date
-fields.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.5.2-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your apr packages.</p>
-
-<p>For the detailed security status of apr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apr">https://security-tracker.debian.org/tracker/apr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2897.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2898.data b/english/lts/security/2022/dla-2898.data
deleted file mode 100644
index c734b3b29c7..00000000000
--- a/english/lts/security/2022/dla-2898.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2898-1 nss</define-tag>
-<define-tag report_date>2022-01-25</define-tag>
-<define-tag secrefs>CVE-2022-22747</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2898.wml b/english/lts/security/2022/dla-2898.wml
deleted file mode 100644
index 9463960ee3a..00000000000
--- a/english/lts/security/2022/dla-2898.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that nss, the Mozilla Network Security Service library, was
-vulnerable to a NULL pointer dereference when parsing empty PKCS 7
-sequences, which could result in denial of service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2:3.26.2-1.1+deb9u5.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>For the detailed security status of nss please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nss">https://security-tracker.debian.org/tracker/nss</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2898.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2899.data b/english/lts/security/2022/dla-2899.data
deleted file mode 100644
index a97c24dc279..00000000000
--- a/english/lts/security/2022/dla-2899.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2899-1 policykit-1</define-tag>
-<define-tag report_date>2022-01-25</define-tag>
-<define-tag secrefs>CVE-2021-4034</define-tag>
-<define-tag packages>policykit-1</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2899.wml b/english/lts/security/2022/dla-2899.wml
deleted file mode 100644
index a10290247af..00000000000
--- a/english/lts/security/2022/dla-2899.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Labs discovered a local privilege escalation in
-PolicyKit's pkexec.</p>
-
-<p>Details can be found in the Qualys advisory at
-<a href="https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</a></p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.105-18+deb9u2.</p>
-
-<p>We recommend that you upgrade your policykit-1 packages.</p>
-
-<p>For the detailed security status of policykit-1 please refer to its
-security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/policykit-1">https://security-tracker.debian.org/tracker/policykit-1</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2899.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2900.data b/english/lts/security/2022/dla-2900.data
deleted file mode 100644
index aedc6181e6b..00000000000
--- a/english/lts/security/2022/dla-2900.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2900-1 lrzsz</define-tag>
-<define-tag report_date>2022-1-25</define-tag>
-<define-tag secrefs>CVE-2018-10195</define-tag>
-<define-tag packages>lrzsz</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2900.wml b/english/lts/security/2022/dla-2900.wml
deleted file mode 100644
index a47141eff64..00000000000
--- a/english/lts/security/2022/dla-2900.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in lrzsz, a set of tools for zmodem/xmodem/ymodem
-file transfer.
-Due to an incorrect length check, which might result in a size_t wrap
-around, an information leak to the receiving side could happen.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.12.21-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your lrzsz packages.</p>
-
-<p>For the detailed security status of lrzsz please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lrzsz">https://security-tracker.debian.org/tracker/lrzsz</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2900.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2901.data b/english/lts/security/2022/dla-2901.data
deleted file mode 100644
index 27459876e85..00000000000
--- a/english/lts/security/2022/dla-2901.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2901-1 libxfont</define-tag>
-<define-tag report_date>2022-1-25</define-tag>
-<define-tag secrefs>CVE-2017-16611</define-tag>
-<define-tag packages>libxfont</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2901.wml b/english/lts/security/2022/dla-2901.wml
deleted file mode 100644
index 4aedffce13e..00000000000
--- a/english/lts/security/2022/dla-2901.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libxfont, an X11 font rasterisation library.
-By creating symlinks, a local attacker can open (but not read) local files
-as user root. This might create unwanted actions with special files like
-/dev/watchdog.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.0.1-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your libxfont packages.</p>
-
-<p>For the detailed security status of libxfont please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxfont">https://security-tracker.debian.org/tracker/libxfont</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2901.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2902.data b/english/lts/security/2022/dla-2902.data
deleted file mode 100644
index 411946ca8fd..00000000000
--- a/english/lts/security/2022/dla-2902.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2902-1 graphicsmagick</define-tag>
-<define-tag report_date>2022-1-27</define-tag>
-<define-tag secrefs>CVE-2020-12672</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2902.wml b/english/lts/security/2022/dla-2902.wml
deleted file mode 100644
index b120c6e132d..00000000000
--- a/english/lts/security/2022/dla-2902.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in graphicsmagick, a collection of image
-processing tools, that results in a heap buffer overwrite when
-magnifying MNG images.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.30+hg15796-1~deb9u5.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>For the detailed security status of graphicsmagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/graphicsmagick">https://security-tracker.debian.org/tracker/graphicsmagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2902.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2903.data b/english/lts/security/2022/dla-2903.data
deleted file mode 100644
index 0c3430bcdeb..00000000000
--- a/english/lts/security/2022/dla-2903.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2903-1 libraw</define-tag>
-<define-tag report_date>2022-02-22</define-tag>
-<define-tag secrefs>CVE-2017-14608 CVE-2017-16909 CVE-2017-16910 CVE-2018-5800 CVE-2018-5801 CVE-2018-5802 CVE-2018-5804 CVE-2018-5805 CVE-2018-5806 CVE-2018-5807 CVE-2018-5808 CVE-2018-5810 CVE-2018-5811 CVE-2018-5812 CVE-2018-5813 CVE-2018-5815 CVE-2018-5817 CVE-2018-5818 CVE-2018-5819 CVE-2018-20363 CVE-2018-20364 CVE-2018-20365</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2903.wml b/english/lts/security/2022/dla-2903.wml
deleted file mode 100644
index 20f58154f62..00000000000
--- a/english/lts/security/2022/dla-2903.wml
+++ /dev/null
@@ -1,113 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14608">CVE-2017-14608</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16909">CVE-2017-16909</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16910">CVE-2017-16910</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5800">CVE-2018-5800</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5801">CVE-2018-5801</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5802">CVE-2018-5802</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5804">CVE-2018-5804</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5805">CVE-2018-5805</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5806">CVE-2018-5806</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5807">CVE-2018-5807</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5808">CVE-2018-5808</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5810">CVE-2018-5810</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5811">CVE-2018-5811</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5812">CVE-2018-5812</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5813">CVE-2018-5813</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5815">CVE-2018-5815</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5817">CVE-2018-5817</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5818">CVE-2018-5818</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5819">CVE-2018-5819</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20363">CVE-2018-20363</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20364">CVE-2018-20364</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20365">CVE-2018-20365</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.17.2-6+deb9u2.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>For the detailed security status of libraw please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libraw">https://security-tracker.debian.org/tracker/libraw</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2903.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2904.data b/english/lts/security/2022/dla-2904.data
deleted file mode 100644
index bd3ad162379..00000000000
--- a/english/lts/security/2022/dla-2904.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2904-1 expat</define-tag>
-<define-tag report_date>2022-1-30</define-tag>
-<define-tag secrefs>CVE-2021-45960 CVE-2021-46143 CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826 CVE-2022-22827 CVE-2022-23852 CVE-2022-23990 Bug#1002994 Bug#1003474</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2904.wml b/english/lts/security/2022/dla-2904.wml
deleted file mode 100644
index 4c0ed20a2c6..00000000000
--- a/english/lts/security/2022/dla-2904.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Expat, the XML
-parsing C library. Integer overflows or invalid shifts may lead to a denial
-of service or other unspecified impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.2.0-2+deb9u4.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>For the detailed security status of expat please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/expat">https://security-tracker.debian.org/tracker/expat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2904.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2905.data b/english/lts/security/2022/dla-2905.data
deleted file mode 100644
index 5c5e45fd7ba..00000000000
--- a/english/lts/security/2022/dla-2905.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2905-1 apache-log4j1.2</define-tag>
-<define-tag report_date>2022-1-31</define-tag>
-<define-tag secrefs>CVE-2021-4104 CVE-2022-23302 CVE-2022-23305 CVE-2022-23307 Bug#1004482</define-tag>
-<define-tag packages>apache-log4j1.2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2905.wml b/english/lts/security/2022/dla-2905.wml
deleted file mode 100644
index 5261fd465fb..00000000000
--- a/english/lts/security/2022/dla-2905.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Apache Log4j 1.2, a
-Java logging framework, when it is configured to use JMSSink, JDBCAppender,
-JMSAppender or Apache Chainsaw which could be exploited for remote code
-execution.</p>
-
-<p>Note that a possible attacker requires write access to the Log4j configuration
-and the aforementioned features are not enabled by default. In order to
-completely mitigate against these type of vulnerabilities the related classes
-have been removed from the resulting jar file.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.2.17-7+deb9u2.</p>
-
-<p>We recommend that you upgrade your apache-log4j1.2 packages.</p>
-
-<p>For the detailed security status of apache-log4j1.2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/apache-log4j1.2">https://security-tracker.debian.org/tracker/apache-log4j1.2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2905.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2906.data b/english/lts/security/2022/dla-2906.data
deleted file mode 100644
index 19c5eb29283..00000000000
--- a/english/lts/security/2022/dla-2906.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2906-1 python-django</define-tag>
-<define-tag report_date>2022-02-01</define-tag>
-<define-tag secrefs>CVE-2022-22818 CVE-2022-23833</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2906.wml b/english/lts/security/2022/dla-2906.wml
deleted file mode 100644
index e1fbb07c479..00000000000
--- a/english/lts/security/2022/dla-2906.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two vulnerabilities in Django, a popular
-Python-based web development framework:</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-22818">CVE-2022-22818</a>
-
- <p>Possible XSS via {% debug %} template tag.</p>
-
- <p>The {% debug %} template tag didn't properly encode the current context,
- posing an XSS attack vector.</p>
-
- <p>In order to avoid this vulnerability, {% debug %} no longer outputs
- information when the DEBUG setting is False, and it ensures all context
- variables are correctly escaped when the DEBUG setting is True.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23833">CVE-2022-23833</a>
-
- <p>Denial-of-service possibility in file uploads</p>
-
- <p>Passing certain inputs to multipart forms could result in an infinite
- loop when parsing files.</p>
-</li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u15.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2906.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2907.data b/english/lts/security/2022/dla-2907.data
deleted file mode 100644
index 88470d7e23f..00000000000
--- a/english/lts/security/2022/dla-2907.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2907-1 apache2</define-tag>
-<define-tag report_date>2022-02-01</define-tag>
-<define-tag secrefs>CVE-2021-44224 CVE-2021-44790</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2907.wml b/english/lts/security/2022/dla-2907.wml
deleted file mode 100644
index 8c50d508cda..00000000000
--- a/english/lts/security/2022/dla-2907.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been discovered in the Apache HTTP server:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44224">CVE-2021-44224</a>
-
- <p>When operating as a forward proxy, Apache was depending on the setup
- suspectable to denial of service or Server Side Request forgery.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44790">CVE-2021-44790</a>
-
- <p>A buffer overflow in mod_lua may result in denial of service or potentially
- the execution of arbitrary code.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.25-3+deb9u12.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>For the detailed security status of apache2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2907.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2908.data b/english/lts/security/2022/dla-2908.data
deleted file mode 100644
index 59cbc1baab7..00000000000
--- a/english/lts/security/2022/dla-2908.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2908-1 librecad</define-tag>
-<define-tag report_date>2022-2-03</define-tag>
-<define-tag secrefs>CVE-2021-45341 CVE-2021-45342 CVE-2021-45343 Bug#1004518</define-tag>
-<define-tag packages>librecad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2908.wml b/english/lts/security/2022/dla-2908.wml
deleted file mode 100644
index 9e565e82915..00000000000
--- a/english/lts/security/2022/dla-2908.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in librecad, a
-computer-aided design (CAD) system. Buffer overflows may lead to remote code
-execution if a specially crafted JWW document is processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.2-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your librecad packages.</p>
-
-<p>For the detailed security status of librecad please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/librecad">https://security-tracker.debian.org/tracker/librecad</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2908.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2909.data b/english/lts/security/2022/dla-2909.data
deleted file mode 100644
index be16cbc4ac6..00000000000
--- a/english/lts/security/2022/dla-2909.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2909-1 strongswan</define-tag>
-<define-tag report_date>2022-02-04</define-tag>
-<define-tag secrefs>CVE-2021-45079</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2909.wml b/english/lts/security/2022/dla-2909.wml
deleted file mode 100644
index d7c270b3f79..00000000000
--- a/english/lts/security/2022/dla-2909.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Zhuowei Zhang discovered a bug in the EAP authentication client code
-of strongSwan, an IKE/IPsec suite, that may allow to bypass the client
-and in some scenarios even the server authentication, or could lead to
-a denial-of-service attack.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.5.1-4+deb9u6.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-
-<p>For the detailed security status of strongswan please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/strongswan">https://security-tracker.debian.org/tracker/strongswan</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2909.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2910.data b/english/lts/security/2022/dla-2910.data
deleted file mode 100644
index c7d352da1b3..00000000000
--- a/english/lts/security/2022/dla-2910.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2910-1 ldns</define-tag>
-<define-tag report_date>2022-02-04</define-tag>
-<define-tag secrefs>CVE-2020-19860 CVE-2020-19861 CVE-2017-1000231 CVE-2017-1000232</define-tag>
-<define-tag packages>ldns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2910.wml b/english/lts/security/2022/dla-2910.wml
deleted file mode 100644
index 63d353f3040..00000000000
--- a/english/lts/security/2022/dla-2910.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were four issues in ldns, a library used in
-Domain Name System (DNS) related programs:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19860">CVE-2020-19860</a>
-
- <p>When ldns version 1.7.1 verifies a zone file, the
- ldns_rr_new_frm_str_internal function has a heap out of bounds read
- vulnerability. An attacker can leak information on the heap by constructing
- a zone file payload.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19861">CVE-2020-19861</a>
-
- <p>When a zone file in ldns 1.7.1 is parsed, the function
- ldns_nsec3_salt_data is too trusted for the length value obtained from the
- zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf)
- byte data can be copied, causing heap overflow information
- leakage.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000231">CVE-2017-1000231</a>
-
- <p>A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified
- impact and attack vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000232">CVE-2017-1000232</a>
-
- <p>A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified
- impact and attack vectors.</p></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these four problems have been fixed in version
-1.7.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ldns packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2910.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2911.data b/english/lts/security/2022/dla-2911.data
deleted file mode 100644
index 3dab842c381..00000000000
--- a/english/lts/security/2022/dla-2911.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2911-1 apng2gif</define-tag>
-<define-tag report_date>2022-2-04</define-tag>
-<define-tag secrefs>CVE-2017-6960 CVE-2017-6961 CVE-2017-6962 Bug#854447</define-tag>
-<define-tag packages>apng2gif</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2911.wml b/english/lts/security/2022/dla-2911.wml
deleted file mode 100644
index 2cb8eebbcff..00000000000
--- a/english/lts/security/2022/dla-2911.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in apng2gif, a tool for converting
-APNG images to animated GIF format. Improper sanitization of user input can
-result in denial of service (application crash) or possible execution of
-arbitrary code if a malformed image file is processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8-0.1~deb9u1.</p>
-
-<p>We recommend that you upgrade your apng2gif packages.</p>
-
-<p>For the detailed security status of apng2gif please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/apng2gif">https://security-tracker.debian.org/tracker/apng2gif</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2911.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2912.data b/english/lts/security/2022/dla-2912.data
deleted file mode 100644
index 4cd4b4d1986..00000000000
--- a/english/lts/security/2022/dla-2912.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2912-1 libphp-adodb</define-tag>
-<define-tag report_date>2022-02-06</define-tag>
-<define-tag secrefs>CVE-2021-3850 Bug#1004376</define-tag>
-<define-tag packages>libphp-adodb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2912.wml b/english/lts/security/2022/dla-2912.wml
deleted file mode 100644
index 16e3e670bf7..00000000000
--- a/english/lts/security/2022/dla-2912.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that in libphp-adodb, a PHP database abstraction layer
-library, an attacker can inject values into the PostgreSQL connection
-string by bypassing adodb_addslashes(). The function can be bypassed
-in phppgadmin, for example, by surrounding the username in quotes and
-submitting with other parameters injected in between.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.20.9-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libphp-adodb packages.</p>
-
-<p>For the detailed security status of libphp-adodb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libphp-adodb">https://security-tracker.debian.org/tracker/libphp-adodb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2912.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2913.data b/english/lts/security/2022/dla-2913.data
deleted file mode 100644
index 4adec75102f..00000000000
--- a/english/lts/security/2022/dla-2913.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2913-1 xterm</define-tag>
-<define-tag report_date>2022-02-07</define-tag>
-<define-tag secrefs>CVE-2022-24130 Bug#1004689</define-tag>
-<define-tag packages>xterm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2913.wml b/english/lts/security/2022/dla-2913.wml
deleted file mode 100644
index a080bfe0733..00000000000
--- a/english/lts/security/2022/dla-2913.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>xterm, an X terminal emulator, when Sixel support is enabled, allows
-attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c
-via crafted text.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-327-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your xterm packages.</p>
-
-<p>For the detailed security status of xterm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xterm">https://security-tracker.debian.org/tracker/xterm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2913.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2914.data b/english/lts/security/2022/dla-2914.data
deleted file mode 100644
index 208b3b85cf2..00000000000
--- a/english/lts/security/2022/dla-2914.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2914-1 zabbix</define-tag>
-<define-tag report_date>2022-02-07</define-tag>
-<define-tag secrefs>CVE-2022-23134</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2914.wml b/english/lts/security/2022/dla-2914.wml
deleted file mode 100644
index ae7ff8323a1..00000000000
--- a/english/lts/security/2022/dla-2914.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Thomas Chauchefoin from SonarSource discovered that in Zabbix, a
-server/client network monitoring system, after the initial setup
-process, some steps of setup.php file are reachable not only by
-super-administrators, but by unauthenticated users as well. An
-attacker could bypass checks and potentially change the configuration
-of Zabbix Frontend.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:3.0.32+dfsg-0+deb9u2.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2914.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2915.data b/english/lts/security/2022/dla-2915.data
deleted file mode 100644
index fb82c776c9b..00000000000
--- a/english/lts/security/2022/dla-2915.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2915-1 connman</define-tag>
-<define-tag report_date>2022-02-09</define-tag>
-<define-tag secrefs>CVE-2021-33833 CVE-2022-23096 CVE-2022-23097 CVE-2022-23098</define-tag>
-<define-tag packages>connman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2915.wml b/english/lts/security/2022/dla-2915.wml
deleted file mode 100644
index 1ef9fade226..00000000000
--- a/english/lts/security/2022/dla-2915.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in ConnMan, a connection manager for embedded
-devices, that could cause denial of service via service crash or excessive
-CPU usage.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.33-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your connman packages.</p>
-
-<p>For the detailed security status of connman please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/connman">https://security-tracker.debian.org/tracker/connman</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2915.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2916.data b/english/lts/security/2022/dla-2916.data
deleted file mode 100644
index 8aaa82b1464..00000000000
--- a/english/lts/security/2022/dla-2916.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2916-1 firefox-esr</define-tag>
-<define-tag report_date>2022-02-09</define-tag>
-<define-tag secrefs>CVE-2022-22754 CVE-2022-22756 CVE-2022-22759 CVE-2022-22760 CVE-2022-22761 CVE-2022-22763 CVE-2022-22764</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2916.wml b/english/lts/security/2022/dla-2916.wml
deleted file mode 100644
index bb10ff1f9aa..00000000000
--- a/english/lts/security/2022/dla-2916.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.6.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2916.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2917.data b/english/lts/security/2022/dla-2917.data
deleted file mode 100644
index 3eec5e09262..00000000000
--- a/english/lts/security/2022/dla-2917.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2917-1 openjdk-8</define-tag>
-<define-tag report_date>2022-02-10</define-tag>
-<define-tag secrefs>CVE-2022-21248 CVE-2022-21282 CVE-2022-21283 CVE-2022-21293 CVE-2022-21294 CVE-2022-21296 CVE-2022-21299 CVE-2022-21305 CVE-2022-21340 CVE-2022-21341 CVE-2022-21349 CVE-2022-21360 CVE-2022-21365</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2917.wml b/english/lts/security/2022/dla-2917.wml
deleted file mode 100644
index dd5a7614081..00000000000
--- a/english/lts/security/2022/dla-2917.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-which may result in denial of service, bypass of deserialization
-restrictions or information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u322-b06-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2917.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2918.data b/english/lts/security/2022/dla-2918.data
deleted file mode 100644
index a972d190a51..00000000000
--- a/english/lts/security/2022/dla-2918.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2918-1 debian-edu-config</define-tag>
-<define-tag report_date>2022-02-12</define-tag>
-<define-tag secrefs>CVE-2021-20001</define-tag>
-<define-tag packages>debian-edu-config</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2918.wml b/english/lts/security/2022/dla-2918.wml
deleted file mode 100644
index bfd0fac723f..00000000000
--- a/english/lts/security/2022/dla-2918.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Marcel Neumann, Robert Altschaffel, Loris Guba and Dustin Hermann
-discovered that debian-edu-config, a set of configuration files used
-for the Debian Edu blend configured insecure permissions for the user
-web shares (~/public_html), which could result in privilege escalation.</p>
-
-<p>If PHP functionality is needed for the user web shares, please refer to
-/usr/share/doc/debian-edu-config/README.public_html_with_PHP-CGI+suExec.md</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.929+deb9u5.</p>
-
-<p>We recommend that you upgrade your debian-edu-config packages.</p>
-
-<p>For the detailed security status of debian-edu-config please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/debian-edu-config">https://security-tracker.debian.org/tracker/debian-edu-config</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2918.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2919.data b/english/lts/security/2022/dla-2919.data
deleted file mode 100644
index 508c03e9aca..00000000000
--- a/english/lts/security/2022/dla-2919.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2919-1 python2.7</define-tag>
-<define-tag report_date>2022-02-12</define-tag>
-<define-tag secrefs>CVE-2021-3177 CVE-2021-4189</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2919.wml b/english/lts/security/2022/dla-2919.wml
deleted file mode 100644
index 2d87cb9fb35..00000000000
--- a/english/lts/security/2022/dla-2919.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues have been discovered in python2.7:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3177">CVE-2021-3177</a>
-
- <p>Python has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may
- lead to remote code execution in certain Python applications that accept
- floating-point numbers as untrusted input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4189">CVE-2021-4189</a>
-
- <p>A flaw was found in Python, specifically in the FTP (File Transfer Protocol)
- client library when using it in PASV (passive) mode. The flaw lies in how
- the FTP client trusts the host from PASV response by default. An attacker
- could use this flaw to setup a malicious FTP server that can trick FTP
- clients into connecting back to a given IP address and port. This could lead
- to FTP client scanning ports which otherwise would not have been possible.
- .
- Instead of using the returned address, ftplib now uses the IP address we're
- already connected to. For the rare user who wants an old behavior, set a
- `trust_server_pasv_ipv4_address` attribute on your `ftplib.FTP` instance to
- True.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.7.13-2+deb9u6.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>For the detailed security status of python2.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python2.7">https://security-tracker.debian.org/tracker/python2.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2919.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2920.data b/english/lts/security/2022/dla-2920.data
deleted file mode 100644
index c6551425d79..00000000000
--- a/english/lts/security/2022/dla-2920.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2920-1 varnish</define-tag>
-<define-tag report_date>2022-2-14</define-tag>
-<define-tag secrefs>CVE-2022-23959 Bug#1004433</define-tag>
-<define-tag packages>varnish</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2920.wml b/english/lts/security/2022/dla-2920.wml
deleted file mode 100644
index 7eddef07a6a..00000000000
--- a/english/lts/security/2022/dla-2920.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>James Kettle discovered that a request smuggling attack can be performed on
-HTTP/1 connections on Varnish servers, high-performance web accelerators. The
-smuggled request would be treated as an additional request by the Varnish
-server which may lead to information disclosure and cache poisoning.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.0.0-7+deb9u3.</p>
-
-<p>We recommend that you upgrade your varnish packages.</p>
-
-<p>For the detailed security status of varnish please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/varnish">https://security-tracker.debian.org/tracker/varnish</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2920.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2921.data b/english/lts/security/2022/dla-2921.data
deleted file mode 100644
index a5043efd725..00000000000
--- a/english/lts/security/2022/dla-2921.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2921-1 thunderbird</define-tag>
-<define-tag report_date>2022-02-14</define-tag>
-<define-tag secrefs>CVE-2022-22754 CVE-2022-22756 CVE-2022-22759 CVE-2022-22760 CVE-2022-22761 CVE-2022-22763 CVE-2022-22764</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2921.wml b/english/lts/security/2022/dla-2921.wml
deleted file mode 100644
index 84d734cd3d7..00000000000
--- a/english/lts/security/2022/dla-2921.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.6.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2921.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2922.data b/english/lts/security/2022/dla-2922.data
deleted file mode 100644
index 551e067e60a..00000000000
--- a/english/lts/security/2022/dla-2922.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2922-1 pgbouncer</define-tag>
-<define-tag report_date>2022-02-14</define-tag>
-<define-tag secrefs>CVE-2021-3935</define-tag>
-<define-tag packages>pgbouncer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2922.wml b/english/lts/security/2022/dla-2922.wml
deleted file mode 100644
index 1497647d45b..00000000000
--- a/english/lts/security/2022/dla-2922.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that PgBouncer, a PostgreSQL connection pooler, was
-susceptible to an arbitrary SQL injection attack if a man-in-the-middle
-could inject data when a connection using certificate authentication is
-established.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.2-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your pgbouncer packages.</p>
-
-<p>For the detailed security status of pgbouncer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pgbouncer">https://security-tracker.debian.org/tracker/pgbouncer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2922.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2923.data b/english/lts/security/2022/dla-2923.data
deleted file mode 100644
index c364fcc3ac1..00000000000
--- a/english/lts/security/2022/dla-2923.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2923-1 h2database</define-tag>
-<define-tag report_date>2022-2-15</define-tag>
-<define-tag secrefs>CVE-2021-42392 CVE-2022-23221 Bug#1003894</define-tag>
-<define-tag packages>h2database</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2923.wml b/english/lts/security/2022/dla-2923.wml
deleted file mode 100644
index 87e66ee3837..00000000000
--- a/english/lts/security/2022/dla-2923.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security researchers of JFrog Security and Ismail Aydemir discovered two
-remote code execution vulnerabilities in the H2 Java SQL database engine
-which can be exploited through various attack vectors, most notably through
-the H2 Console and by loading custom classes from remote servers through
-JNDI. The H2 console is a developer tool and not required by any reversedependency in Debian. It has been disabled in (old)stable releases.
-Database developers are advised to use at least version 2.1.210-1, currently
-available in Debian unstable.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.4.193-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your h2database packages.</p>
-
-<p>For the detailed security status of h2database please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/h2database">https://security-tracker.debian.org/tracker/h2database</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2923.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2924.data b/english/lts/security/2022/dla-2924.data
deleted file mode 100644
index f3430953d26..00000000000
--- a/english/lts/security/2022/dla-2924.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2924-1 libxstream-java</define-tag>
-<define-tag report_date>2022-02-15</define-tag>
-<define-tag secrefs>CVE-2021-43859</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2924.wml b/english/lts/security/2022/dla-2924.wml
deleted file mode 100644
index b83d9bdb071..00000000000
--- a/english/lts/security/2022/dla-2924.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote denial of service (DoS)
-attack in XStream, a Java library used to serialize objects to XML and back
-again.</p>
-
-<p>An attacker could have consumed 100% of the CPU resources, but the library
-now monitors and accumulates the time it takes to add elements to collections,
-and throws an exception if a set threshold is exceeded.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43859">CVE-2021-43859</a>
-
- <p>XStream is an open source java library to serialize objects to XML and
- back again. Versions prior to 1.4.19 may allow a remote attacker to
- allocate 100% CPU time on the target system depending on CPU type or
- parallel execution of such a payload resulting in a denial of service only
- by manipulating the processed input stream. XStream 1.4.19 monitors and
- accumulates the time it takes to add elements to collections and throws an
- exception if a set threshold is exceeded. Users are advised to upgrade as
- soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to
- prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a
- workaround if an upgrade is not possible.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.4.11.1-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2924.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2925.data b/english/lts/security/2022/dla-2925.data
deleted file mode 100644
index 77523dce4fd..00000000000
--- a/english/lts/security/2022/dla-2925.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2925-1 drupal7</define-tag>
-<define-tag report_date>2022-2-16</define-tag>
-<define-tag packages>drupal7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2925.wml b/english/lts/security/2022/dla-2925.wml
deleted file mode 100644
index d68df764a46..00000000000
--- a/english/lts/security/2022/dla-2925.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This security updates includes two fixes, backported respectively from
-Drupal version 7.87 and 7.88:</p>
-
-<p>- Fix a regression caused by Query ui position() backport in version
- 7.86 (backported as 7.52-2+deb9u17): was not checking for possible
- <q>undefined</q> value in options</p>
-
-<p>- Fix improper input validation in Drupal's form API</p>
-
-<p>Drupal is a dynamic web site platform which allows an individual or
-community of users to publish, manage and organize a variety of
-content.</p>
-
-<p>--+PsIA3X1y1N/ZpZZ
-Content-Type: application/pgp-signature; name="signature.asc"</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2925.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2926.data b/english/lts/security/2022/dla-2926.data
deleted file mode 100644
index 3a5fe376f03..00000000000
--- a/english/lts/security/2022/dla-2926.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2926-1 zsh</define-tag>
-<define-tag report_date>2022-02-18</define-tag>
-<define-tag secrefs>CVE-2021-45444</define-tag>
-<define-tag packages>zsh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2926.wml b/english/lts/security/2022/dla-2926.wml
deleted file mode 100644
index 9b4adc5089a..00000000000
--- a/english/lts/security/2022/dla-2926.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that zsh, a powerful shell and scripting language,
-did not prevent recursive prompt expansion. This would allow an
-attacker to execute arbitrary commands into a user's shell, for
-instance by tricking a vcs_info user into checking out a git branch
-with a specially crafted name.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.3.1-4+deb9u5.</p>
-
-<p>We recommend that you upgrade your zsh packages.</p>
-
-<p>For the detailed security status of zsh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zsh">https://security-tracker.debian.org/tracker/zsh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2926.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2927.data b/english/lts/security/2022/dla-2927.data
deleted file mode 100644
index a1c1d9f4748..00000000000
--- a/english/lts/security/2022/dla-2927.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2927-1 twisted</define-tag>
-<define-tag report_date>2022-02-19</define-tag>
-<define-tag secrefs>CVE-2020-10108 CVE-2020-10109 CVE-2022-21712 Bug#953950</define-tag>
-<define-tag packages>twisted</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2927.wml b/english/lts/security/2022/dla-2927.wml
deleted file mode 100644
index 2422d28384b..00000000000
--- a/english/lts/security/2022/dla-2927.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Twisted, a Python event-based framework for
-internet applications, is affected by HTTP request splitting
-vulnerabilities, and may expose sensitive data when following
-redirects. An attacker may bypass validation checks and retrieve
-credentials.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10108">CVE-2020-10108</a>
-
- <p>HTTP request splitting vulnerability. When presented with two
- content-length headers, it ignored the first header. When the
- second content-length value was set to zero, the request body was
- interpreted as a pipelined request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10109">CVE-2020-10109</a>
-
- <p>HTTP request splitting vulnerability. When presented with a
- content-length and a chunked encoding header, the content-length
- took precedence and the remainder of the request body was
- interpreted as a pipelined request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21712">CVE-2022-21712</a>
-
- <p>Twisted exposes cookies and authorization headers when following
- cross-origin redirects. This issue is present in the
- `twisted.web.RedirectAgent` and
- `twisted.web.BrowserLikeRedirectAgent` functions.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-16.6.0-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your twisted packages.</p>
-
-<p>For the detailed security status of twisted please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/twisted">https://security-tracker.debian.org/tracker/twisted</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2927.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2928.data b/english/lts/security/2022/dla-2928.data
deleted file mode 100644
index f4225ed531c..00000000000
--- a/english/lts/security/2022/dla-2928.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2928-1 htmldoc</define-tag>
-<define-tag report_date>2022-2-26</define-tag>
-<define-tag secrefs>CVE-2021-40985 CVE-2021-43579 CVE-2022-0534</define-tag>
-<define-tag packages>htmldoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2928.wml b/english/lts/security/2022/dla-2928.wml
deleted file mode 100644
index 067e7662071..00000000000
--- a/english/lts/security/2022/dla-2928.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in htmldoc, an HTML processor that
-generates indexed HTML, PS, and PDF.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0534">CVE-2022-0534</a>
-
- <p>A crafted GIF file could lead to a stack out-of-bounds read,
- which could result in a crash (segmentation fault).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43579">CVE-2021-43579</a>
-
- <p>Converting an HTML document, which links to a crafted BMP file,
- could lead to a stack-based buffer overflow, which could result
- in remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40985">CVE-2021-40985</a>
-
- <p>A crafted BMP image could lead to a buffer overflow, which could
- cause a denial of service.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8.27-8+deb9u2.</p>
-
-<p>We recommend that you upgrade your htmldoc packages.</p>
-
-<p>For the detailed security status of htmldoc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/htmldoc">https://security-tracker.debian.org/tracker/htmldoc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2928.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2929.data b/english/lts/security/2022/dla-2929.data
deleted file mode 100644
index f79ad8e3738..00000000000
--- a/english/lts/security/2022/dla-2929.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2929-1 ujson</define-tag>
-<define-tag report_date>2022-03-01</define-tag>
-<define-tag secrefs>CVE-2021-45958</define-tag>
-<define-tag packages>ujson</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2929.wml b/english/lts/security/2022/dla-2929.wml
deleted file mode 100644
index 5cd145c3613..00000000000
--- a/english/lts/security/2022/dla-2929.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One issue have been discovered in ujson: ultra fast JSON encoder and decoder for Python.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45958">CVE-2021-45958</a>
-
- <p>Stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode) has
- been detected. Exploitation can, for example, use a large amount of indentation.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.35-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ujson packages.</p>
-
-<p>For the detailed security status of ujson please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ujson">https://security-tracker.debian.org/tracker/ujson</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2929.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2930.data b/english/lts/security/2022/dla-2930.data
deleted file mode 100644
index d9fb2299ee1..00000000000
--- a/english/lts/security/2022/dla-2930.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2930-1 thunderbird</define-tag>
-<define-tag report_date>2022-03-01</define-tag>
-<define-tag secrefs>CVE-2022-0566</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2930.wml b/english/lts/security/2022/dla-2930.wml
deleted file mode 100644
index 371d7c7e9b6..00000000000
--- a/english/lts/security/2022/dla-2930.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds write was discovered in Thunderbird, which could
-be triggered via a malformed email message.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:91.6.1-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2930.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2931.data b/english/lts/security/2022/dla-2931.data
deleted file mode 100644
index cafd3c50fe0..00000000000
--- a/english/lts/security/2022/dla-2931.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2931-1 cyrus-sasl2</define-tag>
-<define-tag report_date>2022-3-6</define-tag>
-<define-tag secrefs>CVE-2022-24407</define-tag>
-<define-tag packages>cyrus-sasl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2931.wml b/english/lts/security/2022/dla-2931.wml
deleted file mode 100644
index 86d6aa92cfd..00000000000
--- a/english/lts/security/2022/dla-2931.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the SQL plugin in cyrus-sasl2, a library
-implementing the Simple Authentication and Security Layer, is prone to a
-SQL injection attack. An authenticated remote attacker can take advantage
-of this flaw to execute arbitrary SQL commands and for privilege
-escalation.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.1.27~101-g0780600+dfsg-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your cyrus-sasl2 packages.</p>
-
-<p>For the detailed security status of cyrus-sasl2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cyrus-sasl2">https://security-tracker.debian.org/tracker/cyrus-sasl2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2931.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2932.data b/english/lts/security/2022/dla-2932.data
deleted file mode 100644
index 0c63fd00d94..00000000000
--- a/english/lts/security/2022/dla-2932.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2932-1 tiff</define-tag>
-<define-tag report_date>2022-3-6</define-tag>
-<define-tag secrefs>CVE-2022-0561 CVE-2022-0562 CVE-2022-22844</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2932.wml b/english/lts/security/2022/dla-2932.wml
deleted file mode 100644
index ef9d8317703..00000000000
--- a/english/lts/security/2022/dla-2932.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been found in tiff, a library and tools to manipulate
-and convert files in the Tag Image File Format (TIFF).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-22844">CVE-2022-22844</a>
-
- <p>out-of-bounds read in _TIFFmemcpy in certain situations involving a
- custom tag and 0x0200 as the second word of the DE field.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0562">CVE-2022-0562</a>
-
- <p>Null source pointer passed as an argument to memcpy() function within
- TIFFReadDirectory(). This could result in a Denial of Service via
- crafted TIFF files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0561">CVE-2022-0561</a>
-
- <p>Null source pointer passed as an argument to memcpy() function within
- TIFFFetchStripThing(). This could result in a Denial of Service via
- crafted TIFF files.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0.8-2+deb9u8.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2932.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2933.data b/english/lts/security/2022/dla-2933.data
deleted file mode 100644
index 564957d161f..00000000000
--- a/english/lts/security/2022/dla-2933.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2933-1 firefox-esr</define-tag>
-<define-tag report_date>2022-03-07</define-tag>
-<define-tag secrefs>CVE-2022-26485 CVE-2022-26486</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2933.wml b/english/lts/security/2022/dla-2933.wml
deleted file mode 100644
index 9b77fd2b0e2..00000000000
--- a/english/lts/security/2022/dla-2933.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been found in the Mozilla Firefox web browser,
-which result in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.6.1esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2933.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2934.data b/english/lts/security/2022/dla-2934.data
deleted file mode 100644
index d8618cd9c87..00000000000
--- a/english/lts/security/2022/dla-2934.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2934-1 freecad</define-tag>
-<define-tag report_date>2022-03-07</define-tag>
-<define-tag secrefs>CVE-2021-45844 Bug#1005747</define-tag>
-<define-tag packages>freecad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2934.wml b/english/lts/security/2022/dla-2934.wml
deleted file mode 100644
index 6c433fd534b..00000000000
--- a/english/lts/security/2022/dla-2934.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A command injection vulnerability was found in FreeCAD, a parametric 3D
-modeler, when importing DWF files with crafted filenames.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.16+dfsg2-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your freecad packages.</p>
-
-<p>For the detailed security status of freecad please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freecad">https://security-tracker.debian.org/tracker/freecad</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2934.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2935.data b/english/lts/security/2022/dla-2935.data
deleted file mode 100644
index a10ebefca3b..00000000000
--- a/english/lts/security/2022/dla-2935.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2935-1 expat</define-tag>
-<define-tag report_date>2022-03-07</define-tag>
-<define-tag secrefs>CVE-2022-23852 CVE-2022-25235 CVE-2022-25236 CVE-2022-25313 CVE-2022-25315 Bug#1005894 Bug#1005895</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2935.wml b/english/lts/security/2022/dla-2935.wml
deleted file mode 100644
index b7d837c77cd..00000000000
--- a/english/lts/security/2022/dla-2935.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Expat, an XML parsing C
-library, which could result in denial of service or potentially the
-execution of arbitrary code, if a malformed XML file is processed.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.2.0-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>For the detailed security status of expat please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/expat">https://security-tracker.debian.org/tracker/expat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2935.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2936.data b/english/lts/security/2022/dla-2936.data
deleted file mode 100644
index 22a722f353d..00000000000
--- a/english/lts/security/2022/dla-2936.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2936-1 libgit2</define-tag>
-<define-tag report_date>2022-03-21</define-tag>
-<define-tag secrefs>CVE-2018-8098 CVE-2018-8099 CVE-2018-10887 CVE-2018-10888 CVE-2018-15501 CVE-2020-12278 CVE-2020-12279 Bug#892961 Bug#892962 Bug#903508 Bug#903509</define-tag>
-<define-tag packages>libgit2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2936.wml b/english/lts/security/2022/dla-2936.wml
deleted file mode 100644
index c07ca3e7edd..00000000000
--- a/english/lts/security/2022/dla-2936.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in libgit2, a low-level Git library,
-and are as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8098">CVE-2018-8098</a>
-
- <p>Integer overflow in the index.c:read_entry() function while
- decompressing a compressed prefix length in libgit2 before
- v0.26.2 allows an attacker to cause a denial of service
- (out-of-bounds read) via a crafted repository index file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8099">CVE-2018-8099</a>
-
- <p>Incorrect returning of an error code in the index.c:read_entry()
- function leads to a double free in libgit2 before v0.26.2, which
- allows an attacker to cause a denial of service via a crafted
- repository index file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10887">CVE-2018-10887</a>
-
- <p>It has been discovered that an unexpected sign extension in
- git_delta_apply function in delta-apply.c file may lead to an
- integer overflow which in turn leads to an out of bound read,
- allowing to read before the base object. An attacker may use
- this flaw to leak memory addresses or cause a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10888">CVE-2018-10888</a>
-
- <p>A missing check in git_delta_apply function in delta-apply.c file,
- may lead to an out-of-bound read while reading a binary delta file.
- An attacker may use this flaw to cause a Denial of Service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-15501">CVE-2018-15501</a>
-
- <p>In ng_pkt in transports/smart_pkt.c in libgit2, a remote attacker
- can send a crafted smart-protocol <q>ng</q> packet that lacks a '\0'
- byte to trigger an out-of-bounds read that leads to DoS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12278">CVE-2020-12278</a>
-
- <p>path.c mishandles equivalent filenames that exist because of NTFS
- Alternate Data Streams. This may allow remote code execution when
- cloning a repository. This issue is similar to <a href="https://security-tracker.debian.org/tracker/CVE-2019-1352">CVE-2019-1352</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12279">CVE-2020-12279</a>
-
- <p>checkout.c mishandles equivalent filenames that exist because of
- NTFS short names. This may allow remote code execution when cloning
- a repository. This issue is similar to <a href="https://security-tracker.debian.org/tracker/CVE-2019-1353">CVE-2019-1353</a>.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.25.1+really0.24.6-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libgit2 packages.</p>
-
-<p>For the detailed security status of libgit2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libgit2">https://security-tracker.debian.org/tracker/libgit2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2936.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2937.data b/english/lts/security/2022/dla-2937.data
deleted file mode 100644
index dd8895435ba..00000000000
--- a/english/lts/security/2022/dla-2937.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2937-1 gif2apng</define-tag>
-<define-tag report_date>2022-03-07</define-tag>
-<define-tag secrefs>CVE-2021-45909 CVE-2021-45910 CVE-2021-45911</define-tag>
-<define-tag packages>gif2apng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2937.wml b/english/lts/security/2022/dla-2937.wml
deleted file mode 100644
index 0695c7f6b0f..00000000000
--- a/english/lts/security/2022/dla-2937.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three issues have been discovered in gif2apng: tool for converting animated GIF images to APNG format.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45909">CVE-2021-45909</a>
-
- <p>heap-based buffer overflow vulnerability in the DecodeLZW function.
- It allows an attacker to write a large amount of arbitrary data outside the
- boundaries of a buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45910">CVE-2021-45910</a>:
-
- <p>heap-based buffer overflow within the main function. It allows an attacker
- to write data outside of the allocated buffer.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45911">CVE-2021-45911</a>:
-
- <p>heap based buffer overflow in processing of delays in the main function.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.9+srconly-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your gif2apng packages.</p>
-
-<p>For the detailed security status of gif2apng please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gif2apng">https://security-tracker.debian.org/tracker/gif2apng</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2937.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2938.data b/english/lts/security/2022/dla-2938.data
deleted file mode 100644
index 2090930b0e2..00000000000
--- a/english/lts/security/2022/dla-2938.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2938-1 twisted</define-tag>
-<define-tag report_date>2022-03-08</define-tag>
-<define-tag secrefs>CVE-2022-21716</define-tag>
-<define-tag packages>twisted</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2938.wml b/english/lts/security/2022/dla-2938.wml
deleted file mode 100644
index b1e81e0b31d..00000000000
--- a/english/lts/security/2022/dla-2938.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the Twisted Python network
-framework where SSH client and server implementions could accept an infinite
-amount of data for the peer's SSH version identifier and that a buffer then
-uses all available memory.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21716">CVE-2022-21716</a>
-
- <p>CVE-2022-21716: Twisted is an event-based framework for internet
- applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client
- and server implement is able to accept an infinite amount of data for the
- peer's SSH version identifier. This ends up with a buffer using all the
- available memory. The attach is a simple as `nc -rv localhost 22 &lt;
- /dev/zero`. A patch is available in version 22.2.0. There are currently no
- known workarounds.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
-16.6.0-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your twisted packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2938.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2939.data b/english/lts/security/2022/dla-2939.data
deleted file mode 100644
index 68724585557..00000000000
--- a/english/lts/security/2022/dla-2939.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2939-1 thunderbird</define-tag>
-<define-tag report_date>2022-03-09</define-tag>
-<define-tag secrefs>CVE-2022-26485 CVE-2022-26486</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2939.wml b/english/lts/security/2022/dla-2939.wml
deleted file mode 100644
index 8cb57b7e021..00000000000
--- a/english/lts/security/2022/dla-2939.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were discovered in Thunderbird, which could result
-in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.6.2-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2939.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2940.data b/english/lts/security/2022/dla-2940.data
deleted file mode 100644
index e188b18a574..00000000000
--- a/english/lts/security/2022/dla-2940.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2940-1 linux</define-tag>
-<define-tag report_date>2022-3-9</define-tag>
-<define-tag secrefs>CVE-2021-3640 CVE-2021-3752 CVE-2021-4002 CVE-2021-4083 CVE-2021-4155 CVE-2021-4202 CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 CVE-2021-28714 CVE-2021-28715 CVE-2021-29264 CVE-2021-33033 CVE-2021-39685 CVE-2021-39686 CVE-2021-39698 CVE-2021-39714 CVE-2021-43976 CVE-2021-45095 CVE-2022-0001 CVE-2022-0002 CVE-2022-0330 CVE-2022-0435 CVE-2022-0487 CVE-2022-0492 CVE-2022-0617 CVE-2022-24448 CVE-2022-25258 CVE-2022-25375 Bug#990411</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2940.wml b/english/lts/security/2022/dla-2940.wml
deleted file mode 100644
index 314f67e8a1b..00000000000
--- a/english/lts/security/2022/dla-2940.wml
+++ /dev/null
@@ -1,231 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3640">CVE-2021-3640</a>
-
- <p>LinMa of BlockSec Team discovered a race condition in the
- Bluetooth SCO implementation that can lead to a use-after-free. A
- local user could exploit this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3752">CVE-2021-3752</a>
-
- <p>Likang Luo of NSFOCUS Security Team discovered a flaw in the
- Bluetooth L2CAP implementation that can lead to a user-after-free.
- A local user could exploit this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4002">CVE-2021-4002</a>
-
- <p>It was discovered that hugetlbfs, the virtual filesystem used by
- applications to allocate huge pages in RAM, did not flush the
- CPU's TLB in one case where it was necessary. In some
- circumstances a local user would be able to read and write huge
- pages after they are freed and reallocated to a different process.
- This could lead to privilege escalation, denial of service or
- information leaks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4083">CVE-2021-4083</a>
-
- <p>Jann Horn reported a race condition in the local (Unix) sockets
- garbage collector, that can lead to use-after-free. A local user
- could exploit this to cause a denial of service (memory corruption
- or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4155">CVE-2021-4155</a>
-
- <p>Kirill Tkhai discovered a data leak in the way the XFS_IOC_ALLOCSP
- IOCTL in the XFS filesystem allowed for a size increase of files
- with unaligned size. A local attacker can take advantage of this
- flaw to leak data on the XFS filesystem.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4202">CVE-2021-4202</a>
-
- <p>Lin Ma discovered a race condition in the NCI (NFC Controller
- Interface) driver, which could lead to a use-after-free. A local
- user could exploit this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p>
-
- <p>This protocol is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28711">CVE-2021-28711</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28712">CVE-2021-28712</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28713">CVE-2021-28713</a> (XSA-391)</p>
-
- <p>Juergen Gross reported that malicious PV backends can cause a denial
- of service to guests being serviced by those backends via high
- frequency events, even if those backends are running in a less
- privileged environment.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28714">CVE-2021-28714</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28715">CVE-2021-28715</a> (XSA-392)</p>
-
- <p>Juergen Gross discovered that Xen guests can force the Linux
- netback driver to hog large amounts of kernel memory, resulting in
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29264">CVE-2021-29264</a>
-
- <p>It was discovered that the <q>gianfar</q> Ethernet driver used with
- some Freescale SoCs did not correctly handle a Rx queue overrun
- when jumbo packets were enabled. On systems using this driver and
- jumbo packets, an attacker on the network could exploit this to
- cause a denial of service (crash).</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33033">CVE-2021-33033</a>
-
- <p>The syzbot tool found a reference counting bug in the CIPSO
- implementation that can lead to a use-after-free.</p>
-
- <p>This protocol is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39685">CVE-2021-39685</a>
-
- <p>Szymon Heidrich discovered a buffer overflow vulnerability in the
- USB gadget subsystem, resulting in information disclosure, denial of
- service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39686">CVE-2021-39686</a>
-
- <p>A race condition was discovered in the Android binder driver, that
- could lead to incorrect security checks. On systems where the
- binder driver is loaded, a local user could exploit this for
- privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39698">CVE-2021-39698</a>
-
- <p>Linus Torvalds reported a flaw in the file polling implementation,
- which could lead to a use-after-free. A local user could exploit
- this for denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39714">CVE-2021-39714</a>
-
- <p>A potential reference count overflow was found in the Android Ion
- driver. On systems where the Ion driver is loaded, a local user
- could exploit this for denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43976">CVE-2021-43976</a>
-
- <p>Zekun Shen and Brendan Dolan-Gavitt discovered a flaw in the
- mwifiex_usb_recv() function of the Marvell WiFi-Ex USB Driver. An
- attacker able to connect a crafted USB device can take advantage of
- this flaw to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45095">CVE-2021-45095</a>
-
- <p>It was discovered that the Phone Network protocol (PhoNet) driver
- has a reference count leak in the pep_sock_accept() function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0001">CVE-2022-0001</a>
-
-<p>(INTEL-SA-00598)</p>
-
- <p>Researchers at VUSec discovered that the Branch History Buffer in
- Intel processors can be exploited to create information side channels with speculative execution. This issue is similar to
- Spectre variant 2, but requires additional mitigations on some
- processors.</p>
-
- <p>This can be exploited to obtain sensitive information from a
- different security context, such as from user-space to the kernel,
- or from a KVM guest to the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0002">CVE-2022-0002</a>
-
-<p>(INTEL-SA-00598)</p>
-
- <p>This is a similar issue to <a href="https://security-tracker.debian.org/tracker/CVE-2022-0001">CVE-2022-0001</a>, but covers exploitation
- within a security context, such as from JIT-compiled code in a
- sandbox to hosting code in the same process.</p>
-
- <p>This can be partly mitigated by disabling eBPF for unprivileged
- users with the sysctl: kernel.unprivileged_bpf_disabled=2. This
- update does that by default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0330">CVE-2022-0330</a>
-
- <p>Sushma Venkatesh Reddy discovered a missing GPU TLB flush in the
- i915 driver, resulting in denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0435">CVE-2022-0435</a>
-
- <p>Samuel Page and Eric Dumazet reported a stack overflow in the
- networking module for the Transparent Inter-Process Communication
- (TIPC) protocol, resulting in denial of service or potentially the
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0487">CVE-2022-0487</a>
-
- <p>A use-after-free was discovered in the MOXART SD/MMC Host Controller
- support driver. This flaw does not impact the Debian binary packages
- as CONFIG_MMC_MOXART is not set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0492">CVE-2022-0492</a>
-
- <p>Yiqi Sun and Kevin Wang reported that the cgroup-v1 subsystem does
- not properly restrict access to the release-agent feature. A local
- user can take advantage of this flaw for privilege escalation and
- bypass of namespace isolation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0617">CVE-2022-0617</a>
-
- <p>butt3rflyh4ck discovered a NULL pointer dereference in the UDF
- filesystem. A local user that can mount a specially crafted UDF
- image can use this flaw to crash the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24448">CVE-2022-24448</a>
-
- <p>Lyu Tao reported a flaw in the NFS implementation in the Linux
- kernel when handling requests to open a directory on a regular file,
- which could result in a information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25258">CVE-2022-25258</a>
-
- <p>Szymon Heidrich reported the USB Gadget subsystem lacks certain
- validation of interface OS descriptor requests, resulting in memory
- corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25375">CVE-2022-25375</a>
-
- <p>Szymon Heidrich reported that the RNDIS USB gadget lacks validation
- of the size of the RNDIS_MSG_SET command, resulting in information
- leak from kernel memory.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.303-1. This update additionally includes many more bug fixes from
-stable updates 4.9.291-4.9.303 inclusive.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2940.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2941.data b/english/lts/security/2022/dla-2941.data
deleted file mode 100644
index 3328cfb1635..00000000000
--- a/english/lts/security/2022/dla-2941.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2941-1 linux-4.19</define-tag>
-<define-tag report_date>2022-3-9</define-tag>
-<define-tag secrefs>CVE-2020-29374 CVE-2020-36322 CVE-2021-3640 CVE-2021-3744 CVE-2021-3752 CVE-2021-3760 CVE-2021-3764 CVE-2021-3772 CVE-2021-4002 CVE-2021-4083 CVE-2021-4135 CVE-2021-4155 CVE-2021-4203 CVE-2021-20317 CVE-2021-20321 CVE-2021-20322 CVE-2021-22600 CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 CVE-2021-28714 CVE-2021-28715 CVE-2021-28950 CVE-2021-38300 CVE-2021-39685 CVE-2021-39686 CVE-2021-39698 CVE-2021-39713 CVE-2021-41864 CVE-2021-42739 CVE-2021-43389 CVE-2021-43975 CVE-2021-43976 CVE-2021-44733 CVE-2021-45095 CVE-2021-45469 CVE-2021-45480 CVE-2022-0001 CVE-2022-0002 CVE-2022-0322 CVE-2022-0330 CVE-2022-0435 CVE-2022-0487 CVE-2022-0492 CVE-2022-0617 CVE-2022-22942 CVE-2022-24448 CVE-2022-24959 CVE-2022-25258 CVE-2022-25375 Bug#988044 Bug#989285 Bug#990411 Bug#994050</define-tag>
-<define-tag packages>linux-4.19</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2941.wml b/english/lts/security/2022/dla-2941.wml
deleted file mode 100644
index 5ebcf63489c..00000000000
--- a/english/lts/security/2022/dla-2941.wml
+++ /dev/null
@@ -1,376 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29374">CVE-2020-29374</a>
-
- <p>Jann Horn of Google reported a flaw in Linux's virtual memory
- management. A parent and child process initially share all their
- memory, but when either writes to a shared page, the page is
- duplicated and unshared (copy-on-write). However, in case an
- operation such as vmsplice() required the kernel to take an
- additional reference to a shared page, and a copy-on-write occurs
- during this operation, the kernel might have accessed the wrong
- process's memory. For some programs, this could lead to an
- information leak or data corruption.</p>
-
- <p>This issue was already fixed for most architectures, but not on
- MIPS and System z. This update corrects that.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36322">CVE-2020-36322</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28950">CVE-2021-28950</a></p>
-
- <p>The syzbot tool found that the FUSE (filesystem-in-user-space)
- implementation did not correctly handle a FUSE server returning
- invalid attributes for a file. A local user permitted to run a
- FUSE server could use this to cause a denial of service (crash).</p>
-
- <p>The original fix for this introduced a different potential denial
- of service (infinite loop in kernel space), which has also been
- fixed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3640">CVE-2021-3640</a>
-
- <p>Lin Ma discovered a race condiiton in the Bluetooth protocol
- implementation that can lead to a use-after-free. A local
- user could exploit this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3744">CVE-2021-3744</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-3764">CVE-2021-3764</a></p>
-
- <p>minihanshen reported bugs in the ccp driver for AMD
- Cryptographic Coprocessors that could lead to a resource leak.
- On systems using this driver, a local user could exploit this to
- cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3752">CVE-2021-3752</a>
-
- <p>Likang Luo of NSFOCUS Security Team discovered a flaw in the
- Bluetooth L2CAP implementation that can lead to a user-after-free.
- A local user could exploit this to cause a denial of service
- (memory corruption or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3760">CVE-2021-3760</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-4202">CVE-2021-4202</a></p>
-
- <p>Lin Ma discovered race conditions in the NCI (NFC Controller
- Interface) driver, which could lead to a use-after-free. A local
- user could exploit this to cause a denial of service (memory
- corruption or crash) or possibly for privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3772">CVE-2021-3772</a>
-
- <p>A flaw was found in the SCTP protocol implementation, which would
- allow a networked attacker to break an SCTP association. The
- attacker would only need to know or guess the IP addresses and
- ports for the association.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4002">CVE-2021-4002</a>
-
- <p>It was discovered that hugetlbfs, the virtual filesystem used by
- applications to allocate huge pages in RAM, did not flush the
- CPU's TLB in one case where it was necessary. In some
- circumstances a local user would be able to read and write huge
- pages after they are freed and reallocated to a different process.
- This could lead to privilege escalation, denial of service or
- information leaks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4083">CVE-2021-4083</a>
-
- <p>Jann Horn reported a race condition in the local (Unix) sockets
- garbage collector, that can lead to use-after-free. A local user
- could exploit this to cause a denial of service (memory corruption
- or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4135">CVE-2021-4135</a>
-
- <p>A flaw was found in the netdevsim driver which would lead to an
- information leak.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4155">CVE-2021-4155</a>
-
- <p>Kirill Tkhai discovered a data leak in the way the XFS_IOC_ALLOCSP
- IOCTL in the XFS filesystem allowed for a size increase of files
- with unaligned size. A local attacker can take advantage of this
- flaw to leak data on the XFS filesystem.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4203">CVE-2021-4203</a>
-
- <p>Jann Horn reported a race condition in the local (Unix) sockets
- implementation that can lead to a use-after-free. A local user
- could exploit this to leak sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20317">CVE-2021-20317</a>
-
- <p>It was discovered that the timer queue structure could become
- corrupt, leading to waiting tasks never being woken up. A local
- user with certain privileges could exploit this to cause a denial
- of service (system hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20321">CVE-2021-20321</a>
-
- <p>A race condition was discovered in the overlayfs filesystem
- driver. A local user with access to an overlayfs mount and to its
- underlying upper directory could exploit this for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20322">CVE-2021-20322</a>
-
- <p>An information leak was discovered in the IPv4 implementation. A
- remote attacker could exploit this to quickly discover which UDP
- ports a system is using, making it easier for them to carry out a
- DNS poisoning attack against that system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22600">CVE-2021-22600</a>
-
- <p>The syzbot tool found a flaw in the packet socket (AF_PACKET)
- implementation which could lead to incorrectly freeing memory. A
- local user with CAP_NET_RAW capability (in any user namespace)
- could exploit this for denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28711">CVE-2021-28711</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28712">CVE-2021-28712</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28713">CVE-2021-28713</a> (XSA-391)</p>
-
- <p>Juergen Gross reported that malicious PV backends can cause a denial
- of service to guests being serviced by those backends via high
- frequency events, even if those backends are running in a less
- privileged environment.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28714">CVE-2021-28714</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-28715">CVE-2021-28715</a> (XSA-392)</p>
-
- <p>Juergen Gross discovered that Xen guests can force the Linux
- netback driver to hog large amounts of kernel memory, resulting in
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38300">CVE-2021-38300</a>
-
- <p>Piotr Krysiuk discovered a flaw in the classic BPF (cBPF) JIT
- compiler for MIPS architectures. A local user could exploit
- this to excute arbitrary code in the kernel.</p>
-
- <p>This issue is mitigated by setting sysctl
- net.core.bpf_jit_enable=0, which is the default. It is *not*
- mitigated by disabling unprivileged use of eBPF.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39685">CVE-2021-39685</a>
-
- <p>Szymon Heidrich discovered a buffer overflow vulnerability in the
- USB gadget subsystem, resulting in information disclosure, denial of
- service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39686">CVE-2021-39686</a>
-
- <p>A race condition was discovered in the Android binder driver, that
- could lead to incorrect security checks. On systems where the
- binder driver is loaded, a local user could exploit this for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39698">CVE-2021-39698</a>
-
- <p>Linus Torvalds reported a flaw in the file polling implementation,
- which could lead to a use-after-free. A local user could exploit
- this for denial of service (memory corruption or crash) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39713">CVE-2021-39713</a>
-
- <p>The syzbot tool found a race condition in the network scheduling
- subsystem which could lead to a use-after-free. A local user
- could exploit this for denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41864">CVE-2021-41864</a>
-
- <p>An integer overflow was discovered in the Extended BPF (eBPF)
- subsystem. A local user could exploit this for denial of service
- (memory corruption or crash), or possibly for privilege
- escalation.</p>
-
- <p>This can be mitigated by setting sysctl
- kernel.unprivileged_bpf_disabled=1, which disables eBPF use by
- unprivileged users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42739">CVE-2021-42739</a>
-
- <p>A heap buffer overflow was discovered in the firedtv driver for
- FireWire-connected DVB receivers. A local user with access to a
- firedtv device could exploit this for denial of service (memory
- corruption or crash), or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43389">CVE-2021-43389</a>
-
- <p>The Active Defense Lab of Venustech discovered a flaw in the CMTP
- subsystem as used by Bluetooth, which could lead to an
- out-of-bounds read and object type confusion. A local user with
- CAP_NET_ADMIN capability in the initial user namespace could
- exploit this for denial of service (memory corruption or crash),
- or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43975">CVE-2021-43975</a>
-
- <p>Brendan Dolan-Gavitt reported a flaw in the
- hw_atl_utils_fw_rpc_wait() function in the aQuantia AQtion ethernet
- device driver which can result in denial of service or the execution
- of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43976">CVE-2021-43976</a>
-
- <p>Zekun Shen and Brendan Dolan-Gavitt discovered a flaw in the
- mwifiex_usb_recv() function of the Marvell WiFi-Ex USB Driver. An
- attacker able to connect a crafted USB device can take advantage of
- this flaw to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44733">CVE-2021-44733</a>
-
- <p>A race condition was discovered in the Trusted Execution
- Environment (TEE) subsystem for Arm processors, which could lead
- to a use-after-free. A local user permitted to access a TEE
- device could exploit this for denial of service (memory corruption
- or crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45095">CVE-2021-45095</a>
-
- <p>It was discovered that the Phone Network protocol (PhoNet) driver
- has a reference count leak in the pep_sock_accept() function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45469">CVE-2021-45469</a>
-
- <p>Wenqing Liu reported an out-of-bounds memory access in the f2fs
- implementation if an inode has an invalid last xattr entry. An
- attacker able to mount a specially crafted image can take advantage
- of this flaw for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45480">CVE-2021-45480</a>
-
- <p>A memory leak flaw was discovered in the __rds_conn_create()
- function in the RDS (Reliable Datagram Sockets) protocol subsystem.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0001">CVE-2022-0001</a>
-
-<p>(INTEL-SA-00598)</p>
-
- <p>Researchers at VUSec discovered that the Branch History Buffer in
- Intel processors can be exploited to create information side channels with speculative execution. This issue is similar to
- Spectre variant 2, but requires additional mitigations on some
- processors.</p>
-
- <p>This can be exploited to obtain sensitive information from a
- different security context, such as from user-space to the kernel,
- or from a KVM guest to the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0002">CVE-2022-0002</a>
-
-<p>(INTEL-SA-00598)</p>
-
- <p>This is a similar issue to <a href="https://security-tracker.debian.org/tracker/CVE-2022-0001">CVE-2022-0001</a>, but covers exploitation
- within a security context, such as from JIT-compiled code in a
- sandbox to hosting code in the same process.</p>
-
- <p>This can be partly mitigated by disabling eBPF for unprivileged
- users with the sysctl: kernel.unprivileged_bpf_disabled=2. This
- update does that by default.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0322">CVE-2022-0322</a>
-
- <p>Eiichi Tsukata discovered a flaw in the sctp_make_strreset_req()
- function in the SCTP network protocol implementation which can
- result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0330">CVE-2022-0330</a>
-
- <p>Sushma Venkatesh Reddy discovered a missing GPU TLB flush in the
- i915 driver, resulting in denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0435">CVE-2022-0435</a>
-
- <p>Samuel Page and Eric Dumazet reported a stack overflow in the
- networking module for the Transparent Inter-Process Communication
- (TIPC) protocol, resulting in denial of service or potentially the
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0487">CVE-2022-0487</a>
-
- <p>A use-after-free was discovered in the MOXART SD/MMC Host Controller
- support driver. This flaw does not impact the Debian binary packages
- as CONFIG_MMC_MOXART is not set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0492">CVE-2022-0492</a>
-
- <p>Yiqi Sun and Kevin Wang reported that the cgroup-v1 subsystem does
- not properly restrict access to the release-agent feature. A local
- user can take advantage of this flaw for privilege escalation and
- bypass of namespace isolation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0617">CVE-2022-0617</a>
-
- <p>butt3rflyh4ck discovered a NULL pointer dereference in the UDF
- filesystem. A local user that can mount a specially crafted UDF
- image can use this flaw to crash the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-22942">CVE-2022-22942</a>
-
- <p>It was discovered that wrong file file descriptor handling in the
- VMware Virtual GPU driver (vmwgfx) could result in information leak
- or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24448">CVE-2022-24448</a>
-
- <p>Lyu Tao reported a flaw in the NFS implementation in the Linux
- kernel when handling requests to open a directory on a regular file,
- which could result in a information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24959">CVE-2022-24959</a>
-
- <p>A memory leak was discovered in the yam_siocdevprivate() function of
- the YAM driver for AX.25, which could result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25258">CVE-2022-25258</a>
-
- <p>Szymon Heidrich reported the USB Gadget subsystem lacks certain
- validation of interface OS descriptor requests, resulting in memory
- corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25375">CVE-2022-25375</a>
-
- <p>Szymon Heidrich reported that the RNDIS USB gadget lacks validation
- of the size of the RNDIS_MSG_SET command, resulting in information
- leak from kernel memory.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.19.232-1~deb9u1. This update additionally includes many more bug
-fixes from stable updates 4.19.209-4.19.232 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-4.19 packages.</p>
-
-<p>For the detailed security status of linux-4.19 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-4.19">https://security-tracker.debian.org/tracker/linux-4.19</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2941.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2942.data b/english/lts/security/2022/dla-2942.data
deleted file mode 100644
index a5a2d5d380c..00000000000
--- a/english/lts/security/2022/dla-2942.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2942-1 firefox-esr</define-tag>
-<define-tag report_date>2022-03-10</define-tag>
-<define-tag secrefs>CVE-2022-26381 CVE-2022-26383 CVE-2022-26384 CVE-2022-26386 CVE-2022-26387</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2942.wml b/english/lts/security/2022/dla-2942.wml
deleted file mode 100644
index ff550174fed..00000000000
--- a/english/lts/security/2022/dla-2942.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure, spoofing or sandbox bypass.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.7.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2942.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2943.data b/english/lts/security/2022/dla-2943.data
deleted file mode 100644
index 2047e4113ee..00000000000
--- a/english/lts/security/2022/dla-2943.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2943-1 ruby-sidekiq</define-tag>
-<define-tag report_date>2022-03-10</define-tag>
-<define-tag secrefs>CVE-2021-30151 CVE-2022-23837 Bug#987354 Bug#1004193</define-tag>
-<define-tag packages>ruby-sidekiq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2943.wml b/english/lts/security/2022/dla-2943.wml
deleted file mode 100644
index 7a3cdd71c6a..00000000000
--- a/english/lts/security/2022/dla-2943.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ruby-sidekiq, a simple, efficient background processing for Ruby,
-had a couple of vulnerabilities as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30151">CVE-2021-30151</a>
-
- <p>Sidekiq allows XSS via the queue name of the live-poll feature
- when Internet Explorer is used.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23837">CVE-2022-23837</a>
-
- <p>In api.rb in Sidekiq, there is no limit on the number of days
- when requesting stats for the graph. This overloads the system,
- affecting the Web UI, and makes it unavailable to users.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.2.3+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your ruby-sidekiq packages.</p>
-
-<p>For the detailed security status of ruby-sidekiq please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-sidekiq">https://security-tracker.debian.org/tracker/ruby-sidekiq</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2943.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2944.data b/english/lts/security/2022/dla-2944.data
deleted file mode 100644
index 5b0c218b756..00000000000
--- a/english/lts/security/2022/dla-2944.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2944-1 nbd</define-tag>
-<define-tag report_date>2022-03-10</define-tag>
-<define-tag secrefs>CVE-2022-26495</define-tag>
-<define-tag packages>nbd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2944.wml b/english/lts/security/2022/dla-2944.wml
deleted file mode 100644
index a3a5b1553c1..00000000000
--- a/english/lts/security/2022/dla-2944.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An integer overflow (with a resultant heap-based buffer overflow) was
-discovered in the nbd Network Block Device server. A value of 0xffffffff in the
-name length field could have caused a zero-sized buffer to be allocated for the
-name, resulting in a write to a dangling pointer.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26495">CVE-2022-26495</a>
-
- <p>In nbd-server in nbd before 3.24, there is an integer overflow with a
- resultant heap-based buffer overflow. A value of 0xffffffff in the name
- length field will cause a zero-sized buffer to be allocated for the name,
- resulting in a write to a dangling pointer. This issue exists for the
- NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.</p</li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:3.15.2-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your nbd packages.</p>
-
-<p>Thanks to Wouter Verhelst for help in preparing this update.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2944.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2945.data b/english/lts/security/2022/dla-2945.data
deleted file mode 100644
index 85ffe96a6ec..00000000000
--- a/english/lts/security/2022/dla-2945.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2945-1 tryton-server</define-tag>
-<define-tag report_date>2022-03-11</define-tag>
-<define-tag secrefs>CVE-2022-26661 CVE-2022-26662</define-tag>
-<define-tag packages>tryton-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2945.wml b/english/lts/security/2022/dla-2945.wml
deleted file mode 100644
index 70dde8419f9..00000000000
--- a/english/lts/security/2022/dla-2945.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton
-application platform, which may result in information disclosure or
-denial of service.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.2.1-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your tryton-server packages.</p>
-
-<p>For the detailed security status of tryton-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tryton-server">https://security-tracker.debian.org/tracker/tryton-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2945.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2946.data b/english/lts/security/2022/dla-2946.data
deleted file mode 100644
index 58f558b4000..00000000000
--- a/english/lts/security/2022/dla-2946.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2946-1 tryton-proteus</define-tag>
-<define-tag report_date>2022-03-11</define-tag>
-<define-tag secrefs>CVE-2022-26661 CVE-2022-26662</define-tag>
-<define-tag packages>tryton-proteus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2946.wml b/english/lts/security/2022/dla-2946.wml
deleted file mode 100644
index be299fe4dca..00000000000
--- a/english/lts/security/2022/dla-2946.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton
-application platform, which may result in information disclosure or
-denial of service.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.2.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your tryton-proteus packages.</p>
-
-<p>For the detailed security status of tryton-proteus please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tryton-proteus">https://security-tracker.debian.org/tracker/tryton-proteus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2946.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2947.data b/english/lts/security/2022/dla-2947.data
deleted file mode 100644
index 48be3f0c9ef..00000000000
--- a/english/lts/security/2022/dla-2947.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2947-1 vim</define-tag>
-<define-tag report_date>2022-3-11</define-tag>
-<define-tag secrefs>CVE-2021-3984 CVE-2021-4019 CVE-2021-4069 CVE-2021-4193 CVE-2022-0213 CVE-2022-0319 CVE-2022-0368 CVE-2022-0554 CVE-2022-0361 CVE-2022-0408 CVE-2022-0685 CVE-2022-0714 CVE-2022-0359 CVE-2021-4192 CVE-2021-3872 CVE-2021-3927 CVE-2021-3928 CVE-2021-3973 CVE-2021-3974 CVE-2022-0729</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2947.wml b/english/lts/security/2022/dla-2947.wml
deleted file mode 100644
index a47a33bb98f..00000000000
--- a/english/lts/security/2022/dla-2947.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in vim, an
-enhanced vi editor. Buffer overflows, out-of-bounds reads and Null pointer
-dereferences may lead to a denial of service (application crash) or other
-unspecified impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:8.0.0197-4+deb9u5.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2947.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2948.data b/english/lts/security/2022/dla-2948.data
deleted file mode 100644
index f775f48a6c3..00000000000
--- a/english/lts/security/2022/dla-2948.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2948-1 debian-archive-keyring</define-tag>
-<define-tag report_date>2022-03-13</define-tag>
-<define-tag packages>debian-archive-keyring</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2948.wml b/english/lts/security/2022/dla-2948.wml
deleted file mode 100644
index 2b1839edc96..00000000000
--- a/english/lts/security/2022/dla-2948.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-archive-keyring is a package containing GnuPG archive keys of the Debian
-archive. New GPG-keys are being constantly added with every new Debian release.</p>
-
-
-<p>For Debian 9 stretch, GPG-keys for 11/bullseye Debian release are added
-in the version 2017.5+deb9u2.</p>
-
-<p>We recommend that you upgrade your debian-archive-keyring packages only if you
-need to work with packages from 11/bullseye release.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2948.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2949.data b/english/lts/security/2022/dla-2949.data
deleted file mode 100644
index 33cda0d6b59..00000000000
--- a/english/lts/security/2022/dla-2949.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2949-1 spip</define-tag>
-<define-tag report_date>2022-03-15</define-tag>
-<define-tag secrefs>CVE-2022-26846 CVE-2022-26847</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2949.wml b/english/lts/security/2022/dla-2949.wml
deleted file mode 100644
index 5dba090ff48..00000000000
--- a/english/lts/security/2022/dla-2949.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that SPIP, a website engine for publishing, would
-allow a malicious user to execute arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.1.4-4~deb9u5.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2949.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2950.data b/english/lts/security/2022/dla-2950.data
deleted file mode 100644
index 5508b95012a..00000000000
--- a/english/lts/security/2022/dla-2950.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2950-1 python-scrapy</define-tag>
-<define-tag report_date>2022-03-16</define-tag>
-<define-tag secrefs>CVE-2021-41125 CVE-2022-0577</define-tag>
-<define-tag packages>python-scrapy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2950.wml b/english/lts/security/2022/dla-2950.wml
deleted file mode 100644
index 7dcc9a246f0..00000000000
--- a/english/lts/security/2022/dla-2950.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Scrapy, a framework for extracting data from websites,
-could send HTTP Authorization as well as cookies to other domains in case
-of redirections, possibly leaking user credentials.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.3-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-scrapy packages.</p>
-
-<p>For the detailed security status of python-scrapy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-scrapy">https://security-tracker.debian.org/tracker/python-scrapy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2950.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2951.data b/english/lts/security/2022/dla-2951.data
deleted file mode 100644
index 93eeaf4d41f..00000000000
--- a/english/lts/security/2022/dla-2951.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2951-1 flac</define-tag>
-<define-tag report_date>2022-03-17</define-tag>
-<define-tag secrefs>CVE-2021-0561 Bug#1006339</define-tag>
-<define-tag packages>flac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2951.wml b/english/lts/security/2022/dla-2951.wml
deleted file mode 100644
index d8d0ddaf8f9..00000000000
--- a/english/lts/security/2022/dla-2951.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is
-a possible out of bounds write due to a missing bounds check. This
-could lead to local information disclosure with no additional
-execution privileges needed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.3.2-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your flac packages.</p>
-
-<p>For the detailed security status of flac please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/flac">https://security-tracker.debian.org/tracker/flac</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2951.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2952.data b/english/lts/security/2022/dla-2952.data
deleted file mode 100644
index 85aae23756b..00000000000
--- a/english/lts/security/2022/dla-2952.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2952-1 openssl</define-tag>
-<define-tag report_date>2022-03-17</define-tag>
-<define-tag secrefs>CVE-2019-1551 CVE-2022-0778</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2952.wml b/english/lts/security/2022/dla-2952.wml
deleted file mode 100644
index d10af930105..00000000000
--- a/english/lts/security/2022/dla-2952.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL
-could be tricked into an infinite loop. This could result in denial of
-service via malformed certificates.</p>
-
-<p>In addition, this update fixes an overflow bug in the x64_64 Montgomery
-squaring procedure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.1.0l-1~deb9u5.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2952.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2953.data b/english/lts/security/2022/dla-2953.data
deleted file mode 100644
index f40906966d8..00000000000
--- a/english/lts/security/2022/dla-2953.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2953-1 openssl1.0</define-tag>
-<define-tag report_date>2022-03-17</define-tag>
-<define-tag secrefs>CVE-2022-0778</define-tag>
-<define-tag packages>openssl1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2953.wml b/english/lts/security/2022/dla-2953.wml
deleted file mode 100644
index ea3a4e26194..00000000000
--- a/english/lts/security/2022/dla-2953.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL
-could be tricked into an infinite loop. This could result in denial of
-service via malformed certificates.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.0.2u-1~deb9u7.</p>
-
-<p>We recommend that you upgrade your openssl1.0 packages.</p>
-
-<p>For the detailed security status of openssl1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl1.0">https://security-tracker.debian.org/tracker/openssl1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2953.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2954.data b/english/lts/security/2022/dla-2954.data
deleted file mode 100644
index cfeb3f3418b..00000000000
--- a/english/lts/security/2022/dla-2954.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2954-1 python-treq</define-tag>
-<define-tag report_date>2022-03-18</define-tag>
-<define-tag secrefs>CVE-2022-23607</define-tag>
-<define-tag packages>python-treq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2954.wml b/english/lts/security/2022/dla-2954.wml
deleted file mode 100644
index 7ca9d808b4b..00000000000
--- a/english/lts/security/2022/dla-2954.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an information disclosure issue in
-python-treq, a high-level library/API for making HTTP requests using the
-Twisted network programming library. HTTP cookies were not bound to a single
-domain and were instead sent to every domain.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23607">CVE-2022-23607</a>
-
- <p>treq is an HTTP library inspired by requests but written on top of
- Twisted's Agents. Treq's request methods (`treq.get`, `treq.post`, etc.)
- and `treq.client.HTTPClient` constructor accept cookies as a dictionary.
- Such cookies are not bound to a single domain, and are therefore sent to
- *every* domain ("supercookies"). This can potentially cause sensitive
- information to leak upon an HTTP redirect to a different domain., e.g.
- should `https://example.com` redirect to `http://cloudstorageprovider.com`
- the latter will receive the cookie `session`. Treq 2021.1.0 and later bind
- cookies given to request methods (`treq.request`, `treq.get`,
- `HTTPClient.request`, `HTTPClient.get`, etc.) to the origin of the *url*
- parameter. Users are advised to upgrade. For users unable to upgrade
- Instead of passing a dictionary as the *cookies* argument, pass a
- `http.cookiejar.CookieJar` instance with properly domain- and scheme-scoped
- cookies in it.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-15.1.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your python-treq packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2954.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2955-2.data b/english/lts/security/2022/dla-2955-2.data
deleted file mode 100644
index f2697efba34..00000000000
--- a/english/lts/security/2022/dla-2955-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2955-2 bind9</define-tag>
-<define-tag report_date>2022-3-19</define-tag>
-<define-tag secrefs>CVE-2021-25220 Bug#1007945</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2955-2.wml b/english/lts/security/2022/dla-2955-2.wml
deleted file mode 100644
index 870abf9a4c1..00000000000
--- a/english/lts/security/2022/dla-2955-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA 2955-1 caused a regression in named due to
-an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2021-25220">CVE-2021-25220</a> when the Forwarders option was configured.
-Updated bind9 packages are now available to correct this issue.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:9.10.3.dfsg.P4-12.3+deb9u12.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2955-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2955.data b/english/lts/security/2022/dla-2955.data
deleted file mode 100644
index f68221595fd..00000000000
--- a/english/lts/security/2022/dla-2955.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2955-1 bind9</define-tag>
-<define-tag report_date>2022-3-19</define-tag>
-<define-tag secrefs>CVE-2021-25220</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2955.wml b/english/lts/security/2022/dla-2955.wml
deleted file mode 100644
index 97f1eec67e1..00000000000
--- a/english/lts/security/2022/dla-2955.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that bind9, an internet domain name server, was vulnerable to
-cache poisoning. When using forwarders, bogus NS records supplied by, or via,
-those forwarders may be cached and used by named if it needs to recurse for any
-reason, causing it to obtain and pass on potentially incorrect answers.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:9.10.3.dfsg.P4-12.3+deb9u11.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2955.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2956.data b/english/lts/security/2022/dla-2956.data
deleted file mode 100644
index 20ebf750239..00000000000
--- a/english/lts/security/2022/dla-2956.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2956-1 wordpress</define-tag>
-<define-tag report_date>2022-03-21</define-tag>
-<define-tag secrefs>Bug#1007145</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2956.wml b/english/lts/security/2022/dla-2956.wml
deleted file mode 100644
index db2ae81273b..00000000000
--- a/english/lts/security/2022/dla-2956.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities like Prototype Pollution Vulnerability in a
-jQuery dependency and in the block editor, and Stored Cross Site
-Scripting Vulnerability were discovered in Wordpress, a web blogging
-tool.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-4.7.23+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2956.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2957.data b/english/lts/security/2022/dla-2957.data
deleted file mode 100644
index 590686b0c5c..00000000000
--- a/english/lts/security/2022/dla-2957.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2957-1 libpano13</define-tag>
-<define-tag report_date>2022-3-20</define-tag>
-<define-tag secrefs>CVE-2021-33293 Bug#1008024</define-tag>
-<define-tag packages>libpano13</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2957.wml b/english/lts/security/2022/dla-2957.wml
deleted file mode 100644
index 2afc272b2e1..00000000000
--- a/english/lts/security/2022/dla-2957.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Panorama Tools, a toolkit to generate, edit and
-transform many kinds of panoramic images, contained an out-of-bounds read
-vulnerability which could lead to a denial of service (application crash)
-when a malformed image file is processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.9.19+dfsg-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your libpano13 packages.</p>
-
-<p>For the detailed security status of libpano13 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libpano13">https://security-tracker.debian.org/tracker/libpano13</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2957.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2958.data b/english/lts/security/2022/dla-2958.data
deleted file mode 100644
index 7eaade8a046..00000000000
--- a/english/lts/security/2022/dla-2958.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2958-1 usbredir</define-tag>
-<define-tag report_date>2022-03-21</define-tag>
-<define-tag secrefs>CVE-2021-3700</define-tag>
-<define-tag packages>usbredir</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2958.wml b/english/lts/security/2022/dla-2958.wml
deleted file mode 100644
index 7c39cd79977..00000000000
--- a/english/lts/security/2022/dla-2958.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A use-after-free vulnerability was found in Usbredirparser, a parser
-for the usbredir protocol, which could result in denial of service or
-potentially arbitrary code execution.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.7.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your usbredir packages.</p>
-
-<p>For the detailed security status of usbredir please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/usbredir">https://security-tracker.debian.org/tracker/usbredir</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2958.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2959.data b/english/lts/security/2022/dla-2959.data
deleted file mode 100644
index e22eac20347..00000000000
--- a/english/lts/security/2022/dla-2959.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2959-1 paramiko</define-tag>
-<define-tag report_date>2022-03-21</define-tag>
-<define-tag secrefs>CVE-2022-24302</define-tag>
-<define-tag packages>paramiko</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2959.wml b/english/lts/security/2022/dla-2959.wml
deleted file mode 100644
index 798c8bb8445..00000000000
--- a/english/lts/security/2022/dla-2959.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential race condition in Paramiko, a
-pure-Python implementation of the SSH algorithm. In particular, unauthorised
-information disclosure could have occurred during the creation of SSH private
-keys.</p>
-
-<ul>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24302">CVE-2022-24302:
- In Paramiko before 2.10.1, a race condition (between creation and chmod) in the
- write_private_key_file function could allow unauthorized information
- disclosure.</a>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.0.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your paramiko packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2959.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2960.data b/english/lts/security/2022/dla-2960.data
deleted file mode 100644
index c8feb012d02..00000000000
--- a/english/lts/security/2022/dla-2960.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2960-1 apache2</define-tag>
-<define-tag report_date>2022-03-22</define-tag>
-<define-tag secrefs>CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2960.wml b/english/lts/security/2022/dla-2960.wml
deleted file mode 100644
index f619d4b05ff..00000000000
--- a/english/lts/security/2022/dla-2960.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Apache HTTP server,
-which could result in denial of service, request smuggling or buffer
-overflows.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.25-3+deb9u13.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>For the detailed security status of apache2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2960.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2961.data b/english/lts/security/2022/dla-2961.data
deleted file mode 100644
index be252f2541c..00000000000
--- a/english/lts/security/2022/dla-2961.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2961-1 thunderbird</define-tag>
-<define-tag report_date>2022-03-22</define-tag>
-<define-tag secrefs>CVE-2022-26381 CVE-2022-26383 CVE-2022-26384 CVE-2022-26386 CVE-2022-26387</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2961.wml b/english/lts/security/2022/dla-2961.wml
deleted file mode 100644
index 59b31f4c19c..00000000000
--- a/english/lts/security/2022/dla-2961.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in the execution of arbitrary code or information disclosure.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.7.0-2~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2961.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2962-2.data b/english/lts/security/2022/dla-2962-2.data
deleted file mode 100644
index 6d6ac63f6dc..00000000000
--- a/english/lts/security/2022/dla-2962-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2962-2 pjproject</define-tag>
-<define-tag report_date>2022-3-31</define-tag>
-<define-tag secrefs>CVE-2022-23608</define-tag>
-<define-tag packages>pjproject</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2962-2.wml b/english/lts/security/2022/dla-2962-2.wml
deleted file mode 100644
index 3400e6db331..00000000000
--- a/english/lts/security/2022/dla-2962-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA 2962-1 have a regression due to
-mistake in backported <a href="https://security-tracker.debian.org/tracker/CVE-2022-23608">CVE-2022-23608</a> patch. Updated packages of
-pjproject are now available.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.5.5~dfsg-6+deb9u4.</p>
-
-<p>We recommend that you upgrade your pjproject packages.</p>
-
-<p>For the detailed security status of pjproject please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pjproject">https://security-tracker.debian.org/tracker/pjproject</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2962-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2962.data b/english/lts/security/2022/dla-2962.data
deleted file mode 100644
index daa7f2a2765..00000000000
--- a/english/lts/security/2022/dla-2962.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2962-1 pjproject</define-tag>
-<define-tag report_date>2022-03-28</define-tag>
-<define-tag secrefs>CVE-2021-32686 CVE-2021-37706 CVE-2021-41141 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608 CVE-2022-24754 CVE-2022-24764</define-tag>
-<define-tag packages>pjproject</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2962.wml b/english/lts/security/2022/dla-2962.wml
deleted file mode 100644
index a43f68750e7..00000000000
--- a/english/lts/security/2022/dla-2962.wml
+++ /dev/null
@@ -1,134 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in pjproject, is a free and
-open source multimedia communication library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32686">CVE-2021-32686</a>
-
- <p>A race condition between callback and destroy, due to the accepted
- socket having no group lock. Second, the SSL socket
- parent/listener may get destroyed during handshake. s. They cause
- crash, resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37706">CVE-2021-37706</a>
-
- <p>An incoming STUN message contains an ERROR-CODE attribute, the
- header length is not checked before performing a subtraction
- operation, potentially resulting in an integer underflow scenario.
- This issue affects all users that use STUN. A malicious actor
- located within the victim’s network may forge and send a specially
- crafted UDP (STUN) message that could remotely execute arbitrary
- code on the victim’s machine</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41141">CVE-2021-41141</a>
-
- <p>In various parts of PJSIP, when error/failure occurs, it is found
- that the function returns without releasing the currently held
- locks. This could result in a system deadlock, which cause a
- denial of service for the users.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43299">CVE-2021-43299</a>
-
- <p>Stack overflow in PJSUA API when calling pjsua_player_create. An
- attacker-controlled <q>filename</q> argument may cause a buffer
- overflow since it is copied to a fixed-size stack buffer without
- any size validation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43300">CVE-2021-43300</a>
-
- <p>Stack overflow in PJSUA API when calling pjsua_recorder_create. An
- attacker-controlled <q>filename</q> argument may cause a buffer
- overflow since it is copied to a fixed-size stack buffer without
- any size validation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43301">CVE-2021-43301</a>
-
- <p>Stack overflow in PJSUA API when calling pjsua_playlist_create. An
- attacker-controlled <q>file_names</q> argument may cause a buffer
- overflow since it is copied to a fixed-size stack buffer without
- any size validation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43302">CVE-2021-43302</a>
-
- <p>Read out-of-bounds in PJSUA API when calling
- pjsua_recorder_create. An attacker-controlled <q>filename</q> argument
- may cause an out-of-bounds read when the filename is shorter than
- 4 characters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43303">CVE-2021-43303</a>
-
- <p>Buffer overflow in PJSUA API when calling pjsua_call_dump. An
- attacker-controlled <q>buffer</q> argument may cause a buffer overflow,
- since supplying an output buffer smaller than 128 characters may
- overflow the output buffer, regardless of the <q>maxlen</q> argument
- supplied</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43804">CVE-2021-43804</a>
-
- <p>An incoming RTCP BYE message contains a reason's length, this
- declared length is not checked against the actual received packet
- size, potentially resulting in an out-of-bound read access. A
- malicious actor can send a RTCP BYE message with an invalid reason
- length</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43845">CVE-2021-43845</a>
-
- <p>if incoming RTCP XR message contain block, the data field is not
- checked against the received packet size, potentially resulting in
- an out-of-bound read access</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21722">CVE-2022-21722</a>
-
- <p>it is possible that certain incoming RTP/RTCP packets can
- potentially cause out-of-bound read access. This issue affects
- all users that use PJMEDIA and accept incoming RTP/RTCP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21723">CVE-2022-21723</a>
-
- <p>Parsing an incoming SIP message that contains a malformed
- multipart can potentially cause out-of-bound read access. This
- issue affects all PJSIP users that accept SIP multipart.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23608">CVE-2022-23608</a>
-
- <p>When in a dialog set (or forking) scenario, a hash key shared by
- multiple UAC dialogs can potentially be prematurely freed when one
- of the dialogs is destroyed . The issue may cause a dialog set to
- be registered in the hash table multiple times (with different
- hash keys) leading to undefined behavior such as dialog list
- collision which eventually leading to endless loop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24754">CVE-2022-24754</a>
-
- <p>There is a stack-buffer overflow vulnerability which only impacts
- PJSIP users who accept hashed digest credentials (credentials with
- data_type `PJSIP_CRED_DATA_DIGEST`).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24764">CVE-2022-24764</a>
-
- <p>A stack buffer overflow vulnerability that affects PJSUA2 users
- or users that call the API `pjmedia_sdp_print(),
- pjmedia_sdp_media_print()`</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.5.5~dfsg-6+deb9u3.</p>
-
-<p>We recommend that you upgrade your pjproject packages.</p>
-
-<p>For the detailed security status of pjproject please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pjproject">https://security-tracker.debian.org/tracker/pjproject</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2962.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2963.data b/english/lts/security/2022/dla-2963.data
deleted file mode 100644
index dea23a4a8dc..00000000000
--- a/english/lts/security/2022/dla-2963.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2963-1 tzdata</define-tag>
-<define-tag report_date>2022-03-29</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2963.wml b/english/lts/security/2022/dla-2963.wml
deleted file mode 100644
index e0130ce61b4..00000000000
--- a/english/lts/security/2022/dla-2963.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2022a. Notable
-changes are:</p>
-
-<p>- Adjusted DST rules for Palestine, already in effect.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2021a-0+deb9u3.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2963.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2964.data b/english/lts/security/2022/dla-2964.data
deleted file mode 100644
index 12e7fd69bf0..00000000000
--- a/english/lts/security/2022/dla-2964.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2964-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2022-03-29</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2964.wml b/english/lts/security/2022/dla-2964.wml
deleted file mode 100644
index 356f1f2f39f..00000000000
--- a/english/lts/security/2022/dla-2964.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2022a for the
-Perl bindings. For the list of changes, see DLA-2963-1.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:2.09-1+2022a.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2964.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2965.data b/english/lts/security/2022/dla-2965.data
deleted file mode 100644
index fd723be4fdd..00000000000
--- a/english/lts/security/2022/dla-2965.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2965-1 cacti</define-tag>
-<define-tag report_date>2022-03-29</define-tag>
-<define-tag secrefs>CVE-2018-10060 CVE-2018-10061 CVE-2019-11025 CVE-2020-7106 CVE-2020-13230 CVE-2020-23226 CVE-2021-23225 CVE-2022-0730 Bug#926700 Bug#949996</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2965.wml b/english/lts/security/2022/dla-2965.wml
deleted file mode 100644
index 8aa883f72da..00000000000
--- a/english/lts/security/2022/dla-2965.wml
+++ /dev/null
@@ -1,74 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Cacti, a web interface for
-graphing of monitoring systems, leading to authentication bypass and
-cross-site scripting (XSS). An attacker may get access to unauthorized
-areas and impersonate other users, under certain conditions.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10060">CVE-2018-10060</a>
-
- <p>Cacti has XSS because it does not properly reject unintended
- characters, related to use of the sanitize_uri function in
- lib/functions.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10061">CVE-2018-10061</a>
-
- <p>Cacti has XSS because it makes certain htmlspecialchars calls
- without the ENT_QUOTES flag (these calls occur when the
- html_escape function in lib/html.php is not used).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11025">CVE-2019-11025</a>
-
- <p>No escaping occurs before printing out the value of the SNMP
- community string (SNMP Options) in the View poller cache, leading
- to XSS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-7106">CVE-2020-7106</a>
-
- <p>Cacti has stored XSS in multiple files as demonstrated by the
- description parameter in data_sources.php (a raw string from the
- database that is displayed by $header to trigger the XSS).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13230">CVE-2020-13230</a>
-
- <p>Disabling a user account does not immediately invalidate any
- permissions granted to that account (e.g., permission to view
- logs).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-23226">CVE-2020-23226</a>
-
- <p>Multiple Cross Site Scripting (XSS) vulnerabilities exist in
- multiple files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23225">CVE-2021-23225</a>
-
- <p>Cacti allows authenticated users with User Management permissions
- to inject arbitrary web script or HTML in the <q>new_username</q> field
- during creation of a new user via <q>Copy</q> method at user_admin.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0730">CVE-2022-0730</a>
-
- <p>Under certain ldap conditions, Cacti authentication can be
- bypassed with certain credential types.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.8.8h+ds1-10+deb9u2.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>For the detailed security status of cacti please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cacti">https://security-tracker.debian.org/tracker/cacti</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2965.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2966.data b/english/lts/security/2022/dla-2966.data
deleted file mode 100644
index aa9f8e5e7e6..00000000000
--- a/english/lts/security/2022/dla-2966.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2966-1 libgc</define-tag>
-<define-tag report_date>2022-3-30</define-tag>
-<define-tag secrefs>CVE-2016-9427</define-tag>
-<define-tag packages>libgc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2966.wml b/english/lts/security/2022/dla-2966.wml
deleted file mode 100644
index 4b469081aba..00000000000
--- a/english/lts/security/2022/dla-2966.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>libgc, a conservative garbage collector, is vulnerable to integer
-overflows in multiple places. In some cases, when asked to allocate a huge
-quantity of memory, instead of failing the request, it will return a
-pointer to a small amount of memory possibly tricking the application into
-a buffer overwrite.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:7.4.2-8+deb9u1.</p>
-
-<p>We recommend that you upgrade your libgc packages.</p>
-
-<p>For the detailed security status of libgc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libgc">https://security-tracker.debian.org/tracker/libgc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2966.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2967.data b/english/lts/security/2022/dla-2967.data
deleted file mode 100644
index f452db5c914..00000000000
--- a/english/lts/security/2022/dla-2967.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2967-1 wireshark</define-tag>
-<define-tag report_date>2022-3-31</define-tag>
-<define-tag secrefs>CVE-2021-4181 CVE-2021-4184 CVE-2021-4185 CVE-2021-22191 CVE-2022-0581 CVE-2022-0582 CVE-2022-0583 CVE-2022-0585 CVE-2022-0586</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2967.wml b/english/lts/security/2022/dla-2967.wml
deleted file mode 100644
index 8eefd96370b..00000000000
--- a/english/lts/security/2022/dla-2967.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Wireshark, a network
-traffic analyzer. An attacker could cause a denial of service (infinite loop or
-application crash) via packet injection or a crafted capture file. Improper URL
-handling in Wireshark could also allow remote code execution. A double-click
-will no longer automatically open the URL in pcap(ng) files and instead copy it
-to the clipboard where it can be inspected and pasted to the browser's address
-bar.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.6.20-0+deb9u3.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2967.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2968.data b/english/lts/security/2022/dla-2968.data
deleted file mode 100644
index a7683b497ed..00000000000
--- a/english/lts/security/2022/dla-2968.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2968-1 zlib</define-tag>
-<define-tag report_date>2022-04-03</define-tag>
-<define-tag secrefs>CVE-2018-25032 Bug#1008265</define-tag>
-<define-tag packages>zlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2968.wml b/english/lts/security/2022/dla-2968.wml
deleted file mode 100644
index 7e78093aeac..00000000000
--- a/english/lts/security/2022/dla-2968.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been found in a compression library zlib.</p>
-
-<p>Danilo Ramos discovered that incorrect memory handling in zlib's deflate
-handling could result in denial of service or potentially the execution
-of arbitrary code if specially crafted input is processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.2.8.dfsg-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your zlib packages.</p>
-
-<p>For the detailed security status of zlib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zlib">https://security-tracker.debian.org/tracker/zlib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2968.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2969.data b/english/lts/security/2022/dla-2969.data
deleted file mode 100644
index 598a6bc4dd3..00000000000
--- a/english/lts/security/2022/dla-2969.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2969-1 asterisk</define-tag>
-<define-tag report_date>2022-04-03</define-tag>
-<define-tag secrefs>CVE-2019-13161 CVE-2019-18610 CVE-2019-18790 CVE-2019-18976 CVE-2020-28242</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2969.wml b/english/lts/security/2022/dla-2969.wml
deleted file mode 100644
index 2da5c30298e..00000000000
--- a/english/lts/security/2022/dla-2969.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13161">CVE-2019-13161</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18610">CVE-2019-18610</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18790">CVE-2019-18790</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18976">CVE-2019-18976</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28242">CVE-2020-28242</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:13.14.1~dfsg-2+deb9u6.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>For the detailed security status of asterisk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/asterisk">https://security-tracker.debian.org/tracker/asterisk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2969.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2970.data b/english/lts/security/2022/dla-2970.data
deleted file mode 100644
index c8da6738203..00000000000
--- a/english/lts/security/2022/dla-2970.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2970-1 qemu</define-tag>
-<define-tag report_date>2022-04-04</define-tag>
-<define-tag secrefs>CVE-2021-3593 CVE-2021-3748 CVE-2021-3930 CVE-2021-20196 CVE-2022-26354</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2970.wml b/english/lts/security/2022/dla-2970.wml
deleted file mode 100644
index fb373f03ec5..00000000000
--- a/english/lts/security/2022/dla-2970.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in QEMU, a fast processor emulator, which
-could result in denial of service, information disclosure or the the
-execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.8+dfsg-6+deb9u17.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2970.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2971.data b/english/lts/security/2022/dla-2971.data
deleted file mode 100644
index 27c856dfe82..00000000000
--- a/english/lts/security/2022/dla-2971.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2971-1 firefox-esr</define-tag>
-<define-tag report_date>2022-04-07</define-tag>
-<define-tag secrefs>CVE-2022-1097 CVE-2022-1196 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28285 CVE-2022-28286 CVE-2022-28289</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2971.wml b/english/lts/security/2022/dla-2971.wml
deleted file mode 100644
index 8deda2729b7..00000000000
--- a/english/lts/security/2022/dla-2971.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.8.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2971.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2972.data b/english/lts/security/2022/dla-2972.data
deleted file mode 100644
index 085d9b8f7b7..00000000000
--- a/english/lts/security/2022/dla-2972.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2972-1 libxml2</define-tag>
-<define-tag report_date>2022-04-08</define-tag>
-<define-tag secrefs>CVE-2016-9318 CVE-2017-5130 CVE-2017-5969 CVE-2017-16932 CVE-2022-23308</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2972.wml b/english/lts/security/2022/dla-2972.wml
deleted file mode 100644
index ad057819f20..00000000000
--- a/english/lts/security/2022/dla-2972.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Five security issues have been discovered in libxml2: XML C parser and toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9318">CVE-2016-9318</a>
-
- <p>Vulnerable versions do not offer a flag directly indicating that the current
- document may be read but other files may not be opened, which makes it
- easier for remote attackers to conduct XML External Entity (XXE) attacks via
- a crafted document.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5130">CVE-2017-5130</a>
-
- <p>Integer overflow in memory debug code, allowed a remote attacker to
- potentially exploit heap corruption via a crafted XML file.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5969">CVE-2017-5969</a>
-
- <p>Parser in a recover mode allows remote attackers to cause a denial of service
- (NULL pointer dereference) via a crafted XML document.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16932">CVE-2017-16932</a>
-
- <p>When expanding a parameter entity in a DTD, infinite recursion could lead to
- an infinite loop or memory exhaustion.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23308">CVE-2022-23308</a>
-
- <p>the application that validates XML using xmlTextReaderRead() with
- XML_PARSE_DTDATTR and XML_PARSE_DTDVALID enabled becomes vulnerable to this
- use-after-free bug. This issue can result in denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.9.4+dfsg1-2.2+deb9u6.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2972.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2973.data b/english/lts/security/2022/dla-2973.data
deleted file mode 100644
index 601e1bf0223..00000000000
--- a/english/lts/security/2022/dla-2973.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2973-1 minidlna</define-tag>
-<define-tag report_date>2022-4-9</define-tag>
-<define-tag secrefs>CVE-2022-26505</define-tag>
-<define-tag packages>minidlna</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2973.wml b/english/lts/security/2022/dla-2973.wml
deleted file mode 100644
index c1a5713d536..00000000000
--- a/english/lts/security/2022/dla-2973.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in minidlna, a lightweight DLNA/UPnP-AV server
-targeted at embedded systems. HTTP requests needed more checks to protect
-against DNS rebinding, thus forbid a remote web server to exfiltrate
-media files.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.6+dfsg-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your minidlna packages.</p>
-
-<p>For the detailed security status of minidlna please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/minidlna">https://security-tracker.debian.org/tracker/minidlna</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2973.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2974.data b/english/lts/security/2022/dla-2974.data
deleted file mode 100644
index 2413dfb1236..00000000000
--- a/english/lts/security/2022/dla-2974.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2974-1 fribidi</define-tag>
-<define-tag report_date>2022-4-14</define-tag>
-<define-tag secrefs>CVE-2022-25308 CVE-2022-25309 CVE-2022-25310</define-tag>
-<define-tag packages>fribidi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2974.wml b/english/lts/security/2022/dla-2974.wml
deleted file mode 100644
index 05764e59d3b..00000000000
--- a/english/lts/security/2022/dla-2974.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in fribidi, a free Implementation of the
-Unicode BiDi algorithm. The issues are related to stack-buffer-overflow,
-heap-buffer-overflow, and a SEGV.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25308">CVE-2022-25308</a>
-
- <p>stack-buffer-overflow issue in main()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25309">CVE-2022-25309</a>
-
- <p>heap-buffer-overflow issue in fribidi_cap_rtl_to_unicode()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25310">CVE-2022-25310</a>
-
- <p>SEGV issue in fribidi_remove_bidi_marks()</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.19.7-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your fribidi packages.</p>
-
-<p>For the detailed security status of fribidi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/fribidi">https://security-tracker.debian.org/tracker/fribidi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2974.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2975.data b/english/lts/security/2022/dla-2975.data
deleted file mode 100644
index 64917f28584..00000000000
--- a/english/lts/security/2022/dla-2975.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2975-1 openjpeg2</define-tag>
-<define-tag report_date>2022-04-10</define-tag>
-<define-tag secrefs>CVE-2020-27842 CVE-2020-27843 CVE-2021-29338 CVE-2022-1122</define-tag>
-<define-tag packages>openjpeg2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2975.wml b/english/lts/security/2022/dla-2975.wml
deleted file mode 100644
index 8d0454e8390..00000000000
--- a/english/lts/security/2022/dla-2975.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in openjpeg2, the open-source
-JPEG 2000 codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27842">CVE-2020-27842</a>
-
- <p>Null pointer dereference through specially crafted input. The highest impact
- of this flaw is to application availability.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27843">CVE-2020-27843</a>
-
- <p>The flaw allows an attacker to provide specially crafted input to the
- conversion or encoding functionality, causing an out-of-bounds read. The
- highest threat from this vulnerability is system availability.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29338">CVE-2021-29338</a>
-
- <p>Integer overflow allows remote attackers to crash the application, causing a
- denial of service. This occurs when the attacker uses the command line
- option "-ImgDir" on a directory that contains 1048576 files.</p>
-</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1122">CVE-2022-1122</a>
-
- <p>Input directory with a large number of files can lead to a segmentation
- fault and a denial of service due to a call of free() on an uninitialized
- pointer.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.1.2-1.1+deb9u7.</p>
-
-<p>We recommend that you upgrade your openjpeg2 packages.</p>
-
-<p>For the detailed security status of openjpeg2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjpeg2">https://security-tracker.debian.org/tracker/openjpeg2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2975.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2976.data b/english/lts/security/2022/dla-2976.data
deleted file mode 100644
index 9b3d72ea964..00000000000
--- a/english/lts/security/2022/dla-2976.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2976-1 gzip</define-tag>
-<define-tag report_date>2022-04-10</define-tag>
-<define-tag secrefs>CVE-2022-1271 Bug#1009168</define-tag>
-<define-tag packages>gzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2976.wml b/english/lts/security/2022/dla-2976.wml
deleted file mode 100644
index a3e430bae10..00000000000
--- a/english/lts/security/2022/dla-2976.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An arbitrary-file-write vulnerability was discovered in gzip, which
-provides GNU compression utilities.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.6-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your gzip packages.</p>
-
-<p>For the detailed security status of gzip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gzip">https://security-tracker.debian.org/tracker/gzip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2976.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2977.data b/english/lts/security/2022/dla-2977.data
deleted file mode 100644
index 199913ce01d..00000000000
--- a/english/lts/security/2022/dla-2977.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2977-1 xz-utils</define-tag>
-<define-tag report_date>2022-04-10</define-tag>
-<define-tag secrefs>CVE-2022-1271 Bug#1009167</define-tag>
-<define-tag packages>xz-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2977.wml b/english/lts/security/2022/dla-2977.wml
deleted file mode 100644
index 153b644a418..00000000000
--- a/english/lts/security/2022/dla-2977.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An arbitrary-file-write vulnerability was discovered in xz-utils,
-which provides XZ-format compression utilities.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-5.2.2-1.2+deb9u1.</p>
-
-<p>We recommend that you upgrade your xz-utils packages.</p>
-
-<p>For the detailed security status of xz-utils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xz-utils">https://security-tracker.debian.org/tracker/xz-utils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2977.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2978.data b/english/lts/security/2022/dla-2978.data
deleted file mode 100644
index 2167aa0cf90..00000000000
--- a/english/lts/security/2022/dla-2978.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2978-1 thunderbird</define-tag>
-<define-tag report_date>2022-04-11</define-tag>
-<define-tag secrefs>CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28285 CVE-2022-28286 CVE-2022-28289</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2978.wml b/english/lts/security/2022/dla-2978.wml
deleted file mode 100644
index a1c0e0186aa..00000000000
--- a/english/lts/security/2022/dla-2978.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.8.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2978.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2979.data b/english/lts/security/2022/dla-2979.data
deleted file mode 100644
index 9407535eab4..00000000000
--- a/english/lts/security/2022/dla-2979.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2979-1 usbguard</define-tag>
-<define-tag report_date>2022-4-11</define-tag>
-<define-tag secrefs>CVE-2019-25058 Bug#1008026</define-tag>
-<define-tag packages>usbguard</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2979.wml b/english/lts/security/2022/dla-2979.wml
deleted file mode 100644
index d0132aaa8c4..00000000000
--- a/english/lts/security/2022/dla-2979.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in usbguard, an USB device authorization policy framework.
-When using the usbguard-dbus daemon an unprivileged user could make USBGuard
-allow all USB devices to be connected in the future.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.6.2+ds1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your usbguard packages.</p>
-
-<p>For the detailed security status of usbguard please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/usbguard">https://security-tracker.debian.org/tracker/usbguard</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2979.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2980.data b/english/lts/security/2022/dla-2980.data
deleted file mode 100644
index 8d4418bd449..00000000000
--- a/english/lts/security/2022/dla-2980.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2980-1 zabbix</define-tag>
-<define-tag report_date>2022-4-12</define-tag>
-<define-tag secrefs>CVE-2022-24349 CVE-2022-24917 CVE-2022-24919</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2980.wml b/english/lts/security/2022/dla-2980.wml
deleted file mode 100644
index 201167001bb..00000000000
--- a/english/lts/security/2022/dla-2980.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in zabbix, a network
-monitoring solution. An authenticated user can create a link with reflected
-Javascript code inside it for graphs, actions and services pages and send it to
-other users. The payload can be executed only with a known CSRF token value of
-the victim, which is changed periodically and is difficult to predict.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:3.0.32+dfsg-0+deb9u3.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2980.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2981.data b/english/lts/security/2022/dla-2981.data
deleted file mode 100644
index 905d17ae013..00000000000
--- a/english/lts/security/2022/dla-2981.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2981-1 lrzip</define-tag>
-<define-tag report_date>2022-04-13</define-tag>
-<define-tag secrefs>CVE-2018-5786 CVE-2020-25467 CVE-2021-27345 CVE-2021-27347 CVE-2022-26291 Bug#888506 Bug#990583</define-tag>
-<define-tag packages>lrzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2981.wml b/english/lts/security/2022/dla-2981.wml
deleted file mode 100644
index 52dd6a9c347..00000000000
--- a/english/lts/security/2022/dla-2981.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in lrzip, a
-compression program. Invalid pointers, use-after-free and infinite
-loops would allow attackers to cause a denial of service or possibly
-other unspecified impact via a crafted compressed file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5786">CVE-2018-5786</a>
-
- <p>There is an infinite loop and application hang in the get_fileinfo
- function (lrzip.c). Remote attackers could leverage this
- vulnerability to cause a denial of service via a crafted lrz file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25467">CVE-2020-25467</a>
-
- <p>A null pointer dereference was discovered lzo_decompress_buf in
- stream.c which allows an attacker to cause a denial of service
- (DOS) via a crafted compressed file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27345">CVE-2021-27345</a>
-
- <p>A null pointer dereference was discovered in ucompthread in
- stream.c which allows attackers to cause a denial of service (DOS)
- via a crafted compressed file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27347">CVE-2021-27347</a>
-
- <p>Use after free in lzma_decompress_buf function in stream.c in
- allows attackers to cause Denial of Service (DoS) via a crafted
- compressed file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26291">CVE-2022-26291</a>
-
- <p>lrzip was discovered to contain a multiple concurrency
- use-after-free between the functions zpaq_decompress_buf() and
- clear_rulist(). This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted lrz file.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.631-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your lrzip packages.</p>
-
-<p>For the detailed security status of lrzip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lrzip">https://security-tracker.debian.org/tracker/lrzip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2981.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2982.data b/english/lts/security/2022/dla-2982.data
deleted file mode 100644
index e997b0eb4c7..00000000000
--- a/english/lts/security/2022/dla-2982.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-2982-1 python-django</define-tag>
-<define-tag report_date>2022-04-14</define-tag>
-<define-tag secrefs>CVE-2022-28346</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-2982.wml b/english/lts/security/2022/dla-2982.wml
deleted file mode 100644
index 2237630f488..00000000000
--- a/english/lts/security/2022/dla-2982.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was potential SQL injection attack
-vulnerability in Django, a popular Python-based web development framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28346">CVE-2022-28346</a>
-
- <p> CVE-2022-28346: An issue was discovered in Django 2.2 before
- 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(),
- aggregate(), and extra() methods are subject to SQL injection in column
- aliases via a crafted dictionary (with dictionary expansion) as the
- passed **kwargs.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this problem have been fixed in version
-1:1.10.7-2+deb9u16.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2982.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2983.data b/english/lts/security/2022/dla-2983.data
deleted file mode 100644
index d0c2297e5c6..00000000000
--- a/english/lts/security/2022/dla-2983.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2983-1 abcm2ps</define-tag>
-<define-tag report_date>2022-04-17</define-tag>
-<define-tag secrefs>CVE-2018-10753 CVE-2018-10771 CVE-2019-1010069 CVE-2021-32434</define-tag>
-<define-tag packages>abcm2ps</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2983.wml b/english/lts/security/2022/dla-2983.wml
deleted file mode 100644
index 7cf4ec06c0c..00000000000
--- a/english/lts/security/2022/dla-2983.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in abcm2ps: program which
-translates ABC music description files to PostScript.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10753">CVE-2018-10753</a>
-
- <p>Stack-based buffer overflow in the delayed_output function in music.c
- allows remote attackers to cause a denial of service (application crash) or
- possibly have unspecified other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10771">CVE-2018-10771</a>
-
- <p>Stack-based buffer overflow in the get_key function in parse.c allows remote
- attackers to cause a denial of service (application crash) or possibly have
- unspecified other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010069">CVE-2019-1010069</a>
-
- <p>Incorrect access control allows attackers to cause a denial of service via a
- crafted file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32434">CVE-2021-32434</a>
-
- <p>Array overflow when wrong duration in voice overlay.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32435">CVE-2021-32435</a>
-
- <p>Stack-based buffer overflow in the function get_key in parse.c allows remote
- attackers to cause a senial of service (DoS) via unspecified vectors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32436">CVE-2021-32436</a>
-
- <p>Out-of-bounds read in the function write_title() in subs.c allows remote
- attackers to cause a denial of service via unspecified vectors.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-7.8.9-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your abcm2ps packages.</p>
-
-<p>For the detailed security status of abcm2ps please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/abcm2ps">https://security-tracker.debian.org/tracker/abcm2ps</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2983.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2984.data b/english/lts/security/2022/dla-2984.data
deleted file mode 100644
index f987a81c58b..00000000000
--- a/english/lts/security/2022/dla-2984.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2984-1 condor</define-tag>
-<define-tag report_date>2022-4-19</define-tag>
-<define-tag secrefs>CVE-2022-26110 Bug#1008634</define-tag>
-<define-tag packages>condor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2984.wml b/english/lts/security/2022/dla-2984.wml
deleted file mode 100644
index b1c6d16f5ff..00000000000
--- a/english/lts/security/2022/dla-2984.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jaime Frey discovered a flaw in HTCondor, a distributed workload management
-system. An attacker need only have READ-level authorization to a vulnerable
-daemon using the CLAIMTOBE authentication method. This means they are able to
-run tools like condor_q or condor_status. Many pools do not restrict who can
-issue READ-level commands, and CLAIMTOBE is allowed for READ-level commands in
-the default configuration. Thus, it is likely that an attacker could execute
-this command remotely from an untrusted network, unless prevented by a firewall
-or other network-level access controls.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-8.4.11~dfsg.1-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your condor packages.</p>
-
-<p>For the detailed security status of condor please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/condor">https://security-tracker.debian.org/tracker/condor</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2984.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2985.data b/english/lts/security/2022/dla-2985.data
deleted file mode 100644
index 3d9f8367906..00000000000
--- a/english/lts/security/2022/dla-2985.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2985-1 golang-1.7</define-tag>
-<define-tag report_date>2022-04-28</define-tag>
-<define-tag secrefs>CVE-2022-23772 CVE-2022-23806 CVE-2022-24921</define-tag>
-<define-tag packages>golang-1.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2985.wml b/english/lts/security/2022/dla-2985.wml
deleted file mode 100644
index f965d9f29d7..00000000000
--- a/english/lts/security/2022/dla-2985.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS) or
-invalid cryptographic computation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23772">CVE-2022-23772</a>
-
- <p>Rat.SetString in math/big has an overflow that can lead to
- Uncontrolled Memory Consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23806">CVE-2022-23806</a>
-
- <p>Curve.IsOnCurve in crypto/elliptic can incorrectly return true in
- situations with a big.Int value that is not a valid field element.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24921">CVE-2022-24921</a>
-
- <p>regexp.Compile allows stack exhaustion via a deeply nested
- expression.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.4-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your golang-1.7 packages.</p>
-
-<p>For the detailed security status of golang-1.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.7">https://security-tracker.debian.org/tracker/golang-1.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2985.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2986.data b/english/lts/security/2022/dla-2986.data
deleted file mode 100644
index 9d45579ff95..00000000000
--- a/english/lts/security/2022/dla-2986.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2986-1 golang-1.8</define-tag>
-<define-tag report_date>2022-04-28</define-tag>
-<define-tag secrefs>CVE-2022-23772 CVE-2022-23806 CVE-2022-24921</define-tag>
-<define-tag packages>golang-1.8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2986.wml b/english/lts/security/2022/dla-2986.wml
deleted file mode 100644
index e032d8e0f42..00000000000
--- a/english/lts/security/2022/dla-2986.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS) or
-invalid cryptographic computation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23772">CVE-2022-23772</a>
-
- <p>Rat.SetString in math/big has an overflow that can lead to
- Uncontrolled Memory Consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23806">CVE-2022-23806</a>
-
- <p>Curve.IsOnCurve in crypto/elliptic can incorrectly return true in
- situations with a big.Int value that is not a valid field element.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24921">CVE-2022-24921</a>
-
- <p>regexp.Compile allows stack exhaustion via a deeply nested
- expression.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.8.1-1+deb9u5.</p>
-
-<p>We recommend that you upgrade your golang-1.8 packages.</p>
-
-<p>For the detailed security status of golang-1.8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.8">https://security-tracker.debian.org/tracker/golang-1.8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2986.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2987.data b/english/lts/security/2022/dla-2987.data
deleted file mode 100644
index e3d68b5838b..00000000000
--- a/english/lts/security/2022/dla-2987.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2987-1 libarchive</define-tag>
-<define-tag report_date>2022-4-30</define-tag>
-<define-tag secrefs>CVE-2019-19221 CVE-2021-23177 CVE-2021-31566</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2987.wml b/english/lts/security/2022/dla-2987.wml
deleted file mode 100644
index 0e266ba969b..00000000000
--- a/english/lts/security/2022/dla-2987.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three issues have been found in libarchive, a multi-format archive and
-compression library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31566">CVE-2021-31566</a>
-
- <p>symbolic links incorrectly followed when changing modes, times, ACL
- and flags of a file while extracting an archive</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23177">CVE-2021-23177</a>
-
- <p>extracting a symlink with ACLs modifies ACLs of target</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19221">CVE-2019-19221</a>
-
- <p>out-of-bounds read because of an incorrect mbrtowc or mbtowc call</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.2.2-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>For the detailed security status of libarchive please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libarchive">https://security-tracker.debian.org/tracker/libarchive</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2987.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2988.data b/english/lts/security/2022/dla-2988.data
deleted file mode 100644
index 66de6c1d447..00000000000
--- a/english/lts/security/2022/dla-2988.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2988-1 tinyxml</define-tag>
-<define-tag report_date>2022-4-30</define-tag>
-<define-tag secrefs>CVE-2021-42260</define-tag>
-<define-tag packages>tinyxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2988.wml b/english/lts/security/2022/dla-2988.wml
deleted file mode 100644
index d8d9aed67a5..00000000000
--- a/english/lts/security/2022/dla-2988.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in tinyxml, a C++ XML parsing library.</p>
-
-<p>Crafted XML messages could lead to an infinite loop in
-TiXmlParsingData::Stamp(), which results in a denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.6.2-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your tinyxml packages.</p>
-
-<p>For the detailed security status of tinyxml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tinyxml">https://security-tracker.debian.org/tracker/tinyxml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2988.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2989.data b/english/lts/security/2022/dla-2989.data
deleted file mode 100644
index b43a0468977..00000000000
--- a/english/lts/security/2022/dla-2989.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2989-1 ghostscript</define-tag>
-<define-tag report_date>2022-5-01</define-tag>
-<define-tag secrefs>CVE-2019-25059</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2989.wml b/english/lts/security/2022/dla-2989.wml
deleted file mode 100644
index 5b954819aa9..00000000000
--- a/english/lts/security/2022/dla-2989.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was found in Ghostscript, the GPL PostScript/PDF
-interpreter. It was discovered that some privileged Postscript operators
-remained accessible from various places. For instance a specially crafted
-PostScript file could use this flaw in order to have access to the file
-system outside of the constrains imposed by -dSAFER.</p>
-
-<p>This problem exists because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2019-3839">CVE-2019-3839</a>.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-9.26a~dfsg-0+deb9u9.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>For the detailed security status of ghostscript please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2989.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2990.data b/english/lts/security/2022/dla-2990.data
deleted file mode 100644
index 601f2932628..00000000000
--- a/english/lts/security/2022/dla-2990.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2990-1 jackson-databind</define-tag>
-<define-tag report_date>2022-5-02</define-tag>
-<define-tag secrefs>CVE-2020-36518 Bug#1007109</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2990.wml b/english/lts/security/2022/dla-2990.wml
deleted file mode 100644
index c712a7678a7..00000000000
--- a/english/lts/security/2022/dla-2990.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the implementation of UntypedObjectDeserializer in
-jackson-databind, a fast and powerful JSON library for Java, was prone to a
-denial of service attack when deeply nested object and array values were
-processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.8.6-1+deb9u10.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>For the detailed security status of jackson-databind please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/jackson-databind">https://security-tracker.debian.org/tracker/jackson-databind</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2990.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2991.data b/english/lts/security/2022/dla-2991.data
deleted file mode 100644
index da06cd2bacd..00000000000
--- a/english/lts/security/2022/dla-2991.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2991-1 twisted</define-tag>
-<define-tag report_date>2022-05-10</define-tag>
-<define-tag secrefs>CVE-2022-24801 Bug#1009030</define-tag>
-<define-tag packages>twisted</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2991.wml b/english/lts/security/2022/dla-2991.wml
deleted file mode 100644
index c849e68f78f..00000000000
--- a/english/lts/security/2022/dla-2991.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Twisted Web HTTP 1.1 server, located in the twisted.web.http module, parsed
-several HTTP request constructs more leniently than permitted by RFC 7230. This
-non-conformant parsing can lead to desync if requests pass through multiple
-HTTP parsers, potentially resulting in HTTP request smuggling.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-16.6.0-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your twisted packages.</p>
-
-<p>For the detailed security status of twisted please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/twisted">https://security-tracker.debian.org/tracker/twisted</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2991.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2992.data b/english/lts/security/2022/dla-2992.data
deleted file mode 100644
index 7ab82ce5662..00000000000
--- a/english/lts/security/2022/dla-2992.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2992-1 openvpn</define-tag>
-<define-tag report_date>2022-05-03</define-tag>
-<define-tag secrefs>CVE-2017-12166 CVE-2020-11810 CVE-2020-15078 CVE-2022-0547</define-tag>
-<define-tag packages>openvpn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2992.wml b/english/lts/security/2022/dla-2992.wml
deleted file mode 100644
index 700d444b2af..00000000000
--- a/english/lts/security/2022/dla-2992.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in OpenVPN, a Virtual Private Network server
-and client, that could lead to authentication bypass when using deferred
-auth plugins.</p>
-
-<p>Note that this upload disables support for multiple deferred auth plugins,
-following the upstream fix for <a href="https://security-tracker.debian.org/tracker/CVE-2022-0547">CVE-2022-0547</a>.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.4.0-6+deb9u4.</p>
-
-<p>We recommend that you upgrade your openvpn packages.</p>
-
-<p>For the detailed security status of openvpn please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openvpn">https://security-tracker.debian.org/tracker/openvpn</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2992.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2993.data b/english/lts/security/2022/dla-2993.data
deleted file mode 100644
index 32bf486dd9a..00000000000
--- a/english/lts/security/2022/dla-2993.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2993-1 libz-mingw-w64</define-tag>
-<define-tag report_date>2022-05-04</define-tag>
-<define-tag secrefs>CVE-2018-25032</define-tag>
-<define-tag packages>libz-mingw-w64</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2993.wml b/english/lts/security/2022/dla-2993.wml
deleted file mode 100644
index d1fb46302aa..00000000000
--- a/english/lts/security/2022/dla-2993.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been found in a compression library
-libz-mingw-w64.</p>
-
-<p>Danilo Ramos discovered that incorrect memory handling in
-libz-mingw-w64's deflate handling could result in denial of service or
-potentially the execution of arbitrary code if specially crafted input
-is processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.2.11+dfsg-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libz-mingw-w64 packages.</p>
-
-<p>For the detailed security status of libz-mingw-w64 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libz-mingw-w64">https://security-tracker.debian.org/tracker/libz-mingw-w64</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2993.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2994.data b/english/lts/security/2022/dla-2994.data
deleted file mode 100644
index 9f842fe259d..00000000000
--- a/english/lts/security/2022/dla-2994.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2994-1 firefox-esr</define-tag>
-<define-tag report_date>2022-05-05</define-tag>
-<define-tag secrefs>CVE-2022-29909 CVE-2022-29911 CVE-2022-29912 CVE-2022-29914 CVE-2022-29916 CVE-2022-29917</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2994.wml b/english/lts/security/2022/dla-2994.wml
deleted file mode 100644
index 7e517a58aac..00000000000
--- a/english/lts/security/2022/dla-2994.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.9.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2994.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2995.data b/english/lts/security/2022/dla-2995.data
deleted file mode 100644
index 92d5d67cbd6..00000000000
--- a/english/lts/security/2022/dla-2995.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2995-1 smarty3</define-tag>
-<define-tag report_date>2022-5-05</define-tag>
-<define-tag secrefs>CVE-2021-21408 CVE-2021-29454 Bug#1010375</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2995.wml b/english/lts/security/2022/dla-2995.wml
deleted file mode 100644
index 2af73ee5fff..00000000000
--- a/english/lts/security/2022/dla-2995.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Smarty3, a template engine for PHP, allowed template authors to run restricted
-static php methods. The same authors could also run arbitrary PHP code by
-crafting a malicious math string. If a math string was passed through as user
-provided data to the math function, remote users were able to run arbitrary PHP
-code as well.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u5.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-
-<p>For the detailed security status of smarty3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/smarty3">https://security-tracker.debian.org/tracker/smarty3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2995.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2996.data b/english/lts/security/2022/dla-2996.data
deleted file mode 100644
index 5d92b123612..00000000000
--- a/english/lts/security/2022/dla-2996.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2996-1 mruby</define-tag>
-<define-tag report_date>2022-05-18</define-tag>
-<define-tag secrefs>CVE-2017-9527 CVE-2018-10191 CVE-2018-11743 CVE-2018-12249 CVE-2018-14337 CVE-2020-15866</define-tag>
-<define-tag packages>mruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2996.wml b/english/lts/security/2022/dla-2996.wml
deleted file mode 100644
index 75e34702270..00000000000
--- a/english/lts/security/2022/dla-2996.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9527">CVE-2017-9527</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10191">CVE-2018-10191</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11743">CVE-2018-11743</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-12249">CVE-2018-12249</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14337">CVE-2018-14337</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15866">CVE-2020-15866</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.2.0+20161228+git30d5424a-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your mruby packages.</p>
-
-<p>For the detailed security status of mruby please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mruby">https://security-tracker.debian.org/tracker/mruby</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2996.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2997.data b/english/lts/security/2022/dla-2997.data
deleted file mode 100644
index e5aa88d97be..00000000000
--- a/english/lts/security/2022/dla-2997.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2997-1 ecdsautils</define-tag>
-<define-tag report_date>2022-05-07</define-tag>
-<define-tag secrefs>CVE-2022-24884</define-tag>
-<define-tag packages>ecdsautils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2997.wml b/english/lts/security/2022/dla-2997.wml
deleted file mode 100644
index df9fd4170ee..00000000000
--- a/english/lts/security/2022/dla-2997.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In ecdsautils, a collection of ECDSA elliptic curve cryptography command
-line tools, an improper verification of cryptographic signatures was
-detected. A signature consisting only of zeroes is always considered
-valid, making it trivial to forge signatures.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24884">CVE-2022-24884</a></li>
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.3.2+git20151018-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your ecdsautils packages.</p>
-
-<p>For the detailed security status of ecdsautils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ecdsautils">https://security-tracker.debian.org/tracker/ecdsautils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2997.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2998.data b/english/lts/security/2022/dla-2998.data
deleted file mode 100644
index df86f1a34ef..00000000000
--- a/english/lts/security/2022/dla-2998.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2998-1 kicad</define-tag>
-<define-tag report_date>2022-05-10</define-tag>
-<define-tag secrefs>CVE-2022-23803 CVE-2022-23804 CVE-2022-23946 CVE-2022-23947</define-tag>
-<define-tag packages>kicad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2998.wml b/english/lts/security/2022/dla-2998.wml
deleted file mode 100644
index d7364433c6a..00000000000
--- a/english/lts/security/2022/dla-2998.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>KiCad is a suite of programs for the creation of printed circuit boards.
-It includes a schematic editor, a PCB layout tool, support tools and a 3D
-viewer to display a finished &amp; fully populated PCB.</p>
-
-<p>Several buffer-overflows were discovered in the Gerber Viewer and excellon
-file parser, that could lead to code execution when opening a
-maliciously-crafted file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23803">CVE-2022-23803</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon ReadXYCoord coordinate parsing functionality of KiCad
- EDA.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23804">CVE-2022-23804</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad
- EDA.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23946">CVE-2022-23946</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon GCodeNumber parsing functionality of KiCad EDA.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23947">CVE-2022-23947</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon DCodeNumber parsing functionality of KiCad EDA.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.0.5+dfsg1-4+deb9u1.</p>
-
-<p>We recommend that you upgrade your kicad packages.</p>
-
-<p>For the detailed security status of kicad please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/kicad">https://security-tracker.debian.org/tracker/kicad</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2998.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-2999.data b/english/lts/security/2022/dla-2999.data
deleted file mode 100644
index c62a57a849f..00000000000
--- a/english/lts/security/2022/dla-2999.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-2999-1 mutt</define-tag>
-<define-tag report_date>2022-05-11</define-tag>
-<define-tag secrefs>CVE-2022-1328 Bug#1009734</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-2999.wml b/english/lts/security/2022/dla-2999.wml
deleted file mode 100644
index 6a410eeb82d..00000000000
--- a/english/lts/security/2022/dla-2999.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Mutt, a text-based mailreader supporting MIME,
-GPG, PGP and threading, incorrectly handled certain input. An attacker
-could possibly use this issue to cause a crash, or expose sensitive
-information.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.7.2-1+deb9u6.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>For the detailed security status of mutt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mutt">https://security-tracker.debian.org/tracker/mutt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-2999.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3000.data b/english/lts/security/2022/dla-3000.data
deleted file mode 100644
index 120789b47fb..00000000000
--- a/english/lts/security/2022/dla-3000.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3000-1 waitress</define-tag>
-<define-tag report_date>2022-05-12</define-tag>
-<define-tag secrefs>CVE-2019-16785 CVE-2019-16786 CVE-2019-16789 CVE-2019-16792 CVE-2022-24761 Bug#1008013</define-tag>
-<define-tag packages>waitress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3000.wml b/english/lts/security/2022/dla-3000.wml
deleted file mode 100644
index 7c05cb930e7..00000000000
--- a/english/lts/security/2022/dla-3000.wml
+++ /dev/null
@@ -1,75 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Waitress is a Python WSGI server, an application server for Python web apps.</p>
-
-<p>Security updates to fix request smuggling bugs, when combined with another http
-proxy that interprets requests differently. This can lead to a potential for
-HTTP request smuggling/splitting whereby Waitress may see two requests while
-the front-end server only sees a single HTTP message. This can result in cache
-poisoning or unexpected information disclosure.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16785">CVE-2019-16785</a>
-
- <p>Only recognise CRLF as a line-terminator, not a plain LF. Before this
- change waitress could see two requests where the front-end proxy only saw
- one.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16786">CVE-2019-16786</a>
-
- <p>Waitress would parse the Transfer-Encoding header and only look for a
- single string value, if that value was not <q>chunked</q> it would fall through
- and use the Content-Length header instead. This could allow for Waitress
- to treat a single request as multiple requests in the case of HTTP
- pipelining.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16789">CVE-2019-16789</a>
-
- <p>Specially crafted requests containing special whitespace characters in the
- Transfer-Encoding header would get parsed by Waitress as being a chunked
- request, but a front-end server would use the Content-Length instead as the
- Transfer-Encoding header is considered invalid due to containing invalid
- characters. If a front-end server does HTTP pipelining to a backend
- Waitress server this could lead to HTTP request splitting which may lead to
- potential cache poisoning or unexpected information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16792">CVE-2019-16792</a>
-
- <p>If two Content-Length headers are sent in a single request, Waitress would
- treat the request as having no body, thereby treating the body of the
- request as a new request in HTTP pipelining.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24761">CVE-2022-24761</a>
-
- <p>There are two classes of vulnerability that may lead to request smuggling
- that are addressed by this advisory:</p>
-
- <ol>
- <li>The use of Python's int() to parse strings into integers, leading
- to +10 to be parsed as 10, or 0x01 to be parsed as 1, where as the
- standard specifies that the string should contain only digits or hex
- digits.</li>
- <li>Waitress does not support chunk extensions, however it was
- discarding them without validating that they did not contain illegal
- characters.</li>
- </ol>
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your waitress packages.</p>
-
-<p>For the detailed security status of waitress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/waitress">https://security-tracker.debian.org/tracker/waitress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3000.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3001.data b/english/lts/security/2022/dla-3001.data
deleted file mode 100644
index 6d86bf10c59..00000000000
--- a/english/lts/security/2022/dla-3001.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3001-1 libgoogle-gson-java</define-tag>
-<define-tag report_date>2022-05-13</define-tag>
-<define-tag secrefs>CVE-2022-25647 Bug#1010670</define-tag>
-<define-tag packages>libgoogle-gson-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3001.wml b/english/lts/security/2022/dla-3001.wml
deleted file mode 100644
index f63e5d49bed..00000000000
--- a/english/lts/security/2022/dla-3001.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the package com.google.code.gson:gson
-before 2.8.9 is vulnerable to Deserialization of Untrusted Data
-via the writeReplace() method in internal classes, which may
-lead to DoS attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.4-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libgoogle-gson-java packages.</p>
-
-<p>For the detailed security status of libgoogle-gson-java please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libgoogle-gson-java">https://security-tracker.debian.org/tracker/libgoogle-gson-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3001.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3002.data b/english/lts/security/2022/dla-3002.data
deleted file mode 100644
index bda527aad85..00000000000
--- a/english/lts/security/2022/dla-3002.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3002-1 adminer</define-tag>
-<define-tag report_date>2022-05-13</define-tag>
-<define-tag secrefs>CVE-2021-43008</define-tag>
-<define-tag packages>adminer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3002.wml b/english/lts/security/2022/dla-3002.wml
deleted file mode 100644
index ff51ae5a70d..00000000000
--- a/english/lts/security/2022/dla-3002.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the web-based database tool
-Adminer whereby an attacker could have performed an Arbitrary File Read on the
-remote server by requesting Adminer connect to a crafted remote MySQL
-database.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43008">CVE-2021-43008</a>
-
- <p>CVE-2021-43008: Improper Access Control in Adminer versions 1.12.0 to
- 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File
- Read on the remote server by requesting the Adminer to connect to a remote
- MySQL database.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4.2.5-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your adminer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3002.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3003.data b/english/lts/security/2022/dla-3003.data
deleted file mode 100644
index a5461732dd5..00000000000
--- a/english/lts/security/2022/dla-3003.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3003-1 ruby-nokogiri</define-tag>
-<define-tag report_date>2022-05-13</define-tag>
-<define-tag secrefs>CVE-2022-24836</define-tag>
-<define-tag packages>ruby-nokogiri</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3003.wml b/english/lts/security/2022/dla-3003.wml
deleted file mode 100644
index 8c8afef4db8..00000000000
--- a/english/lts/security/2022/dla-3003.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial of service attack in
-ruby-nokogiri, a HTML, XML, SAX etc. parser written in/for the Ruby programming
-language. This was caused by the use of inefficient regular expressions that
-were susceptible to excessive backtracking.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24836">CVE-2022-24836</a>
-
- <p>CVE-2022-24836: Nokogiri is an open source XML and HTML library for
- Ruby. Nokogiri `&lt; v1.13.4` contains an inefficient regular
- expression that is susceptible to excessive backtracking when
- attempting to detect encoding in HTML documents. Users are advised to
- upgrade to Nokogiri `&gt;= 1.13.4`. There are no known workarounds for
- this issue.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.6.8.1-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your ruby-nokogiri packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3003.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3004.data b/english/lts/security/2022/dla-3004.data
deleted file mode 100644
index 6723cb5a641..00000000000
--- a/english/lts/security/2022/dla-3004.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3004-1 htmldoc</define-tag>
-<define-tag report_date>2022-05-13</define-tag>
-<define-tag secrefs>CVE-2022-27114</define-tag>
-<define-tag packages>htmldoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3004.wml b/english/lts/security/2022/dla-3004.wml
deleted file mode 100644
index 09d70179742..00000000000
--- a/english/lts/security/2022/dla-3004.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an integer overflow vulnerabiliity in
-htmldoc, a HTML processor that generates indexed HTML, PS and PDF files. This
-was caused by a programming error in image_load_jpeg function due to a
-conflation or confusion of declared/expected/observed image dimensions.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-27114">CVE-2022-27114</a>
-
- <p>CVE-2022-27114: There is a vulnerability in htmldoc 1.9.16. In
- image_load_jpeg function image.cxx when it calls malloc,'img-&gt;width'
- and 'img-&gt;height' they are large enough to cause an integer
- overflow. So, the malloc function may return a heap block smaller than the
- expected size, and it will cause a buffer overflow/Address boundary
- error in the jpeg_read_scanlines function.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.8.27-8+deb9u3.</p>
-
-<p>We recommend that you upgrade your htmldoc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3004.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3005.data b/english/lts/security/2022/dla-3005.data
deleted file mode 100644
index 6a099802414..00000000000
--- a/english/lts/security/2022/dla-3005.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3005-1 lrzip</define-tag>
-<define-tag report_date>2022-05-13</define-tag>
-<define-tag secrefs>CVE-2022-28044</define-tag>
-<define-tag packages>lrzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3005.wml b/english/lts/security/2022/dla-3005.wml
deleted file mode 100644
index 8eb35dacf55..00000000000
--- a/english/lts/security/2022/dla-3005.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>lrzip, a compression program, was found to have a heap memory corruption bug.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.631-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your lrzip packages.</p>
-
-<p>For the detailed security status of lrzip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lrzip">https://security-tracker.debian.org/tracker/lrzip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3005.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3006.data b/english/lts/security/2022/dla-3006.data
deleted file mode 100644
index 8f1845cbbac..00000000000
--- a/english/lts/security/2022/dla-3006.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3006-1 openjdk-8</define-tag>
-<define-tag report_date>2022-05-14</define-tag>
-<define-tag secrefs>CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496</define-tag>
-<define-tag packages>openjdk-8</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3006.wml b/english/lts/security/2022/dla-3006.wml
deleted file mode 100644
index 24fdef91ad0..00000000000
--- a/english/lts/security/2022/dla-3006.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java
-runtime, which may result in information disclosure or denial of service.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8u332-ga-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your openjdk-8 packages.</p>
-
-<p>For the detailed security status of openjdk-8 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-8">https://security-tracker.debian.org/tracker/openjdk-8</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3006.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3007.data b/english/lts/security/2022/dla-3007.data
deleted file mode 100644
index e167b19d422..00000000000
--- a/english/lts/security/2022/dla-3007.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3007-1 imagemagick</define-tag>
-<define-tag report_date>2022-05-14</define-tag>
-<define-tag secrefs>CVE-2021-3596 CVE-2022-28463</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3007.wml b/english/lts/security/2022/dla-3007.wml
deleted file mode 100644
index c0bb81643bf..00000000000
--- a/english/lts/security/2022/dla-3007.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3596">CVE-2021-3596</a>
-
- <p>A NULL pointer dereference flaw was found in
- ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in
- coders/svg.c. This issue is due to not checking the return value from
- libxml2's xmlCreatePushParserCtxt() and uses the value directly, which
- leads to a crash and segmentation fault.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28463">CVE-2022-28463</a>
-
- <p>ImageMagick is vulnerable to Buffer Overflow.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8:6.9.7.4+dfsg-11+deb9u14.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3007.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3008.data b/english/lts/security/2022/dla-3008.data
deleted file mode 100644
index 600e66c2faf..00000000000
--- a/english/lts/security/2022/dla-3008.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3008-1 openssl</define-tag>
-<define-tag report_date>2022-05-14</define-tag>
-<define-tag secrefs>CVE-2022-1292</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3008.wml b/english/lts/security/2022/dla-3008.wml
deleted file mode 100644
index b06c4470c33..00000000000
--- a/english/lts/security/2022/dla-3008.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The c_rehash script does not properly sanitise shell metacharacters to prevent
-command injection. This script is executed by update-ca-certificates, from
-ca-certificates, to re-hash certificates in /etc/ssl/certs/. An attacker able
-to place files in this directory could execute arbitrary commands with the
-privileges of the script.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.1.0l-1~deb9u6.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3008.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3009.data b/english/lts/security/2022/dla-3009.data
deleted file mode 100644
index fcba9ac4c0d..00000000000
--- a/english/lts/security/2022/dla-3009.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3009-1 cifs-utils</define-tag>
-<define-tag report_date>2022-05-16</define-tag>
-<define-tag secrefs>CVE-2022-27239 CVE-2022-29869 Bug#1010818</define-tag>
-<define-tag packages>cifs-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3009.wml b/english/lts/security/2022/dla-3009.wml
deleted file mode 100644
index dc03ec1ed29..00000000000
--- a/english/lts/security/2022/dla-3009.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A couple of vulnerabilities were found in src:cifs-utils, a Common
-Internet File System utilities, and are as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-27239">CVE-2022-27239</a>
-
- <p>In cifs-utils, a stack-based buffer overflow when parsing the
- mount.cifs ip= command-line argument could lead to local attackers
- gaining root privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29869">CVE-2022-29869</a>
-
- <p>cifs-utils, with verbose logging, can cause an information leak
- when a file contains = (equal sign) characters but is not a valid
- credentials file.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:6.7-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your cifs-utils packages.</p>
-
-<p>For the detailed security status of cifs-utils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cifs-utils">https://security-tracker.debian.org/tracker/cifs-utils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3009.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3010.data b/english/lts/security/2022/dla-3010.data
deleted file mode 100644
index e088d02bd52..00000000000
--- a/english/lts/security/2022/dla-3010.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3010-1 ffmpeg</define-tag>
-<define-tag report_date>2022-05-16</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3010.wml b/english/lts/security/2022/dla-3010.wml
deleted file mode 100644
index 975bee934e6..00000000000
--- a/english/lts/security/2022/dla-3010.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The ffmpeg project released the new version 3.2.18 with fixes for various
-issues found by the OSS-Fuzz project.</p>
-
-<p>For Debian 9 stretch, this release is packaged in version 7:3.2.18-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3010.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3011.data b/english/lts/security/2022/dla-3011.data
deleted file mode 100644
index 10bb0c6925e..00000000000
--- a/english/lts/security/2022/dla-3011.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3011-1 vim</define-tag>
-<define-tag report_date>2022-5-16</define-tag>
-<define-tag secrefs>CVE-2022-0261 CVE-2022-0351 CVE-2022-0413 CVE-2022-0443 CVE-2022-0572 CVE-2022-1154 CVE-2022-1616 CVE-2022-1619 CVE-2022-1621</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3011.wml b/english/lts/security/2022/dla-3011.wml
deleted file mode 100644
index 8820c5f56e2..00000000000
--- a/english/lts/security/2022/dla-3011.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in vim, an enhanced
-vi editor. Buffer overflows, out-of-bounds reads and use-after-free may
-lead to a denial-of-service (application crash) or other unspecified
-impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:8.0.0197-4+deb9u6.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3011.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3012.data b/english/lts/security/2022/dla-3012.data
deleted file mode 100644
index 8062eaac8f9..00000000000
--- a/english/lts/security/2022/dla-3012.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3012-1 libxml2</define-tag>
-<define-tag report_date>2022-5-17</define-tag>
-<define-tag secrefs>CVE-2022-29824 Bug#1010526</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3012.wml b/english/lts/security/2022/dla-3012.wml
deleted file mode 100644
index 0d0e18360db..00000000000
--- a/english/lts/security/2022/dla-3012.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Felix Wilhelm discovered that libxml2, the GNOME XML library, did not correctly
-check for integer overflows or used wrong types for buffer sizes. This could
-result in out-of-bounds writes or other memory errors when working on large,
-multi-gigabyte buffers.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.9.4+dfsg1-2.2+deb9u7.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3012.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3013.data b/english/lts/security/2022/dla-3013.data
deleted file mode 100644
index d45f1050c42..00000000000
--- a/english/lts/security/2022/dla-3013.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3013-1 needrestart</define-tag>
-<define-tag report_date>2022-05-18</define-tag>
-<define-tag secrefs>CVE-2022-30688 Bug#1011154</define-tag>
-<define-tag packages>needrestart</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3013.wml b/english/lts/security/2022/dla-3013.wml
deleted file mode 100644
index 7a634fa75b9..00000000000
--- a/english/lts/security/2022/dla-3013.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jakub Wilk discovered a local privilege escalation in needrestart, a
-utility to check which daemons need to be restarted after library
-upgrades. Regular expressions to detect the Perl, Python, and Ruby
-interpreters are not anchored, allowing a local user to escalate
-privileges when needrestart tries to detect if interpreters are using
-old source files.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.11-3+deb9u2.</p>
-
-<p>We recommend that you upgrade your needrestart packages.</p>
-
-<p>For the detailed security status of needrestart please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/needrestart">https://security-tracker.debian.org/tracker/needrestart</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3013.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3014.data b/english/lts/security/2022/dla-3014.data
deleted file mode 100644
index 57003ddf766..00000000000
--- a/english/lts/security/2022/dla-3014.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3014-1 elog</define-tag>
-<define-tag report_date>2022-05-18</define-tag>
-<define-tag secrefs>CVE-2020-8659</define-tag>
-<define-tag packages>elog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3014.wml b/english/lts/security/2022/dla-3014.wml
deleted file mode 100644
index 2675a2bd9b2..00000000000
--- a/english/lts/security/2022/dla-3014.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was reported in src:elog, a logbook system to manage
-notes through a Web interface. This vulnerability allows remote
-attackers to create a denial-of-service condition on affected
-installations of ELOG Electronic Logbook. Authentication is not
-required to exploit this vulnerability. The specific flaw exists
-within the processing of HTTP parameters. A crafted request can
-trigger the dereference of a null pointer. An attacker can leverage
-this vulnerability to create a denial-of-service condition.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.2-1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your elog packages.</p>
-
-<p>For the detailed security status of elog please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/elog">https://security-tracker.debian.org/tracker/elog</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3014.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3015.data b/english/lts/security/2022/dla-3015.data
deleted file mode 100644
index 3a687d41310..00000000000
--- a/english/lts/security/2022/dla-3015.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3015-1 ark</define-tag>
-<define-tag report_date>2022-5-20</define-tag>
-<define-tag secrefs>CVE-2020-16116 CVE-2020-24654 Bug#969437</define-tag>
-<define-tag packages>ark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3015.wml b/english/lts/security/2022/dla-3015.wml
deleted file mode 100644
index 764e906a150..00000000000
--- a/english/lts/security/2022/dla-3015.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Fabian Vogt and Dominik Penner discovered that the Ark archive manager did not
-sanitize extraction paths, which could result in maliciously crafted archives
-with symlinks writing outside the extraction directory.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4:16.08.3-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your ark packages.</p>
-
-<p>For the detailed security status of ark please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ark">https://security-tracker.debian.org/tracker/ark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3015.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3016.data b/english/lts/security/2022/dla-3016.data
deleted file mode 100644
index e02773bfaaa..00000000000
--- a/english/lts/security/2022/dla-3016.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3016-1 rsyslog</define-tag>
-<define-tag report_date>2022-05-20</define-tag>
-<define-tag secrefs>CVE-2018-16881 CVE-2022-24903 Bug#1010619</define-tag>
-<define-tag packages>rsyslog</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3016.wml b/english/lts/security/2022/dla-3016.wml
deleted file mode 100644
index fb451e4fe1b..00000000000
--- a/english/lts/security/2022/dla-3016.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in rsyslog, a system and
-kernel logging daemon. When a log server is configured to accept logs
-from remote clients through specific modules such as <q>imptcp</q>, an
-attacker can cause a denial of service (DoS) and possibly execute code
-on the server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16881">CVE-2018-16881</a>
-
- <p>A denial of service vulnerability was found in rsyslog
- in the imptcp module. An attacker could send a specially crafted
- message to the imptcp socket, which would cause rsyslog to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24903">CVE-2022-24903</a>
-
- <p>Modules for TCP syslog reception have a potential heap buffer
- overflow when octet-counted framing is used. This can result in a
- segfault or some other malfunction.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-8.24.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your rsyslog packages.</p>
-
-<p>For the detailed security status of rsyslog please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rsyslog">https://security-tracker.debian.org/tracker/rsyslog</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3016.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3017.data b/english/lts/security/2022/dla-3017.data
deleted file mode 100644
index 230827038a2..00000000000
--- a/english/lts/security/2022/dla-3017.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3017-1 openldap</define-tag>
-<define-tag report_date>2022-05-21</define-tag>
-<define-tag secrefs>CVE-2022-29155</define-tag>
-<define-tag packages>openldap</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3017.wml b/english/lts/security/2022/dla-3017.wml
deleted file mode 100644
index 525e6d7b86a..00000000000
--- a/english/lts/security/2022/dla-3017.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jacek Konieczny discovered a SQL injection vulnerability in the back-sql
-backend to slapd in OpenLDAP, a free implementation of the Lightweight
-Directory Access Protocol, allowing an attacker to alter the database
-during an LDAP search operations when a specially crafted search filter
-is processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.4.44+dfsg-5+deb9u9.</p>
-
-<p>We recommend that you upgrade your openldap packages.</p>
-
-<p>For the detailed security status of openldap please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openldap">https://security-tracker.debian.org/tracker/openldap</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3017.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3018.data b/english/lts/security/2022/dla-3018.data
deleted file mode 100644
index 713627341af..00000000000
--- a/english/lts/security/2022/dla-3018.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3018-1 libpgjava</define-tag>
-<define-tag report_date>2022-5-20</define-tag>
-<define-tag secrefs>CVE-2022-21724</define-tag>
-<define-tag packages>libpgjava</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3018.wml b/english/lts/security/2022/dla-3018.wml
deleted file mode 100644
index 8e031ff61a1..00000000000
--- a/english/lts/security/2022/dla-3018.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that libpgjava, the official PostgreSQL JDBC Driver, would be
-vulnerable if an attacker controlled jdbc url or properties. The JDBC driver
-did not verify if certain classes implemented the expected interface before
-instantiating the class. This can lead to code execution loaded via arbitrary
-classes.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-9.4.1212-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your libpgjava packages.</p>
-
-<p>For the detailed security status of libpgjava please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libpgjava">https://security-tracker.debian.org/tracker/libpgjava</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3018.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3019.data b/english/lts/security/2022/dla-3019.data
deleted file mode 100644
index dfe49269df3..00000000000
--- a/english/lts/security/2022/dla-3019.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3019-1 admesh</define-tag>
-<define-tag report_date>2022-05-23</define-tag>
-<define-tag secrefs>CVE-2018-25033 Bug#1010770</define-tag>
-<define-tag packages>admesh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3019.wml b/english/lts/security/2022/dla-3019.wml
deleted file mode 100644
index 094cea4a90e..00000000000
--- a/english/lts/security/2022/dla-3019.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One security issue has been found in a tool for processing triangulated solid
-meshes admesh.</p>
-
-<p>A heap-based buffer over-read in stl_update_connects_remove_1 (called from
-stl_remove_degenerate) in connect.c was detected which might lead to memory
-corruption and other potential consequences.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.98.2-3+deb9u1.</p>
-
-<p>We recommend that you upgrade your admesh packages.</p>
-
-<p>For the detailed security status of admesh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/admesh">https://security-tracker.debian.org/tracker/admesh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3019.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3020.data b/english/lts/security/2022/dla-3020.data
deleted file mode 100644
index 4bd5ee48c97..00000000000
--- a/english/lts/security/2022/dla-3020.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3020-1 thunderbird</define-tag>
-<define-tag report_date>2022-05-23</define-tag>
-<define-tag secrefs>CVE-2022-1520 CVE-2022-29909 CVE-2022-29911 CVE-2022-29912 CVE-2022-29913 CVE-2022-29914 CVE-2022-29916 CVE-2022-29917</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3020.wml b/english/lts/security/2022/dla-3020.wml
deleted file mode 100644
index aa0ac5d5d4e..00000000000
--- a/english/lts/security/2022/dla-3020.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.9.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3020.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3021.data b/english/lts/security/2022/dla-3021.data
deleted file mode 100644
index cf260af336b..00000000000
--- a/english/lts/security/2022/dla-3021.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3021-1 firefox-esr</define-tag>
-<define-tag report_date>2022-05-24</define-tag>
-<define-tag secrefs>CVE-2022-1529 CVE-2022-1802</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3021.wml b/english/lts/security/2022/dla-3021.wml
deleted file mode 100644
index ad07b47c286..00000000000
--- a/english/lts/security/2022/dla-3021.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Manfred Paul discovered two security issues in the Mozilla Firefox web
-browser, which could result in the execution of arbitrary code.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.9.1esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3021.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3022.data b/english/lts/security/2022/dla-3022.data
deleted file mode 100644
index 0fd64b049d3..00000000000
--- a/english/lts/security/2022/dla-3022.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3022-1 dpkg</define-tag>
-<define-tag report_date>2022-05-25</define-tag>
-<define-tag secrefs>CVE-2022-1664</define-tag>
-<define-tag packages>dpkg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3022.wml b/english/lts/security/2022/dla-3022.wml
deleted file mode 100644
index 33f8333407a..00000000000
--- a/english/lts/security/2022/dla-3022.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Max Justicz reported a directory traversal vulnerability in
-Dpkg::Source::Archive in dpkg, the Debian package management system.
-This affects extracting untrusted source packages in the v2 and v3
-source package formats that include a debian.tar.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.18.26.</p>
-
-<p>We recommend that you upgrade your dpkg packages.</p>
-
-<p>For the detailed security status of dpkg please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dpkg">https://security-tracker.debian.org/tracker/dpkg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3022.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3023.data b/english/lts/security/2022/dla-3023.data
deleted file mode 100644
index 2b3e314fbb8..00000000000
--- a/english/lts/security/2022/dla-3023.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3023-1 puma</define-tag>
-<define-tag report_date>2022-5-26</define-tag>
-<define-tag secrefs>CVE-2019-16770 CVE-2020-5247 CVE-2022-23634 Bug#946312 Bug#952766 Bug#1005391</define-tag>
-<define-tag packages>puma</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3023.wml b/english/lts/security/2022/dla-3023.wml
deleted file mode 100644
index 082d2c79bf6..00000000000
--- a/english/lts/security/2022/dla-3023.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in puma, a web server for
-Ruby/Rack applications. These flaws may lead to information leakage due to not
-always closing response bodies, allowing untrusted input in a response header
-(HTTP Response Splitting) and thus potentially facilitating several other
-attacks like cross-site scripting. A poorly-behaved client could also use
-keepalive requests to monopolize Puma's reactor and create a denial of service
-attack.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-3.6.0-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your puma packages.</p>
-
-<p>For the detailed security status of puma please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/puma">https://security-tracker.debian.org/tracker/puma</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3023.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3024.data b/english/lts/security/2022/dla-3024.data
deleted file mode 100644
index 04b9fd49515..00000000000
--- a/english/lts/security/2022/dla-3024.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3024-1 python-django</define-tag>
-<define-tag report_date>2022-05-26</define-tag>
-<define-tag secrefs>CVE-2020-9402</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3024.wml b/english/lts/security/2022/dla-3024.wml
deleted file mode 100644
index 51229d707d4..00000000000
--- a/english/lts/security/2022/dla-3024.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential SQL injection vulnerability in
-the Django web development framework.</p>
-
-<p>Untrusted data was used as a tolerance parameter in GIS functions and
-aggregates when using the Oracle database backend. By passing a suitably
-crafted tolerance to GIS functions and aggregates on Oracle, it was potentially
-possible to break escaping and inject malicious SQL.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9402">CVE-2020-9402</a>
- <p>Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4
- allows SQL Injection if untrusted data is used as a tolerance parameter
- in GIS functions and aggregates on Oracle. By passing a suitably
- crafted tolerance to GIS functions and aggregates on Oracle, it was
- possible to break escaping and inject malicious SQL.</p></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1:1.10.7-2+deb9u17.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3024.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3025.data b/english/lts/security/2022/dla-3025.data
deleted file mode 100644
index a25a48f1556..00000000000
--- a/english/lts/security/2022/dla-3025.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3025-1 irssi</define-tag>
-<define-tag report_date>2022-05-26</define-tag>
-<define-tag secrefs>CVE-2019-13045</define-tag>
-<define-tag packages>irssi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3025.wml b/english/lts/security/2022/dla-3025.wml
deleted file mode 100644
index 10e4941ccff..00000000000
--- a/english/lts/security/2022/dla-3025.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a user-after-free vulnerability in irssi,
-the popular terminal-based IRC client.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13045">CVE-2019-13045</a>
-
- <p>Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when
- SASL is enabled, has a use after free when sending SASL login to the
- server.</p></li>
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-1.0.7-1~deb9u2.</p>
-
-<p>We recommend that you upgrade your irssi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3025.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3026.data b/english/lts/security/2022/dla-3026.data
deleted file mode 100644
index 9511480e861..00000000000
--- a/english/lts/security/2022/dla-3026.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3026-1 filezilla</define-tag>
-<define-tag report_date>2022-05-26</define-tag>
-<define-tag secrefs>CVE-2019-5429</define-tag>
-<define-tag packages>filezilla</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3026.wml b/english/lts/security/2022/dla-3026.wml
deleted file mode 100644
index 912521d9fd1..00000000000
--- a/english/lts/security/2022/dla-3026.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Untrusted search path in FileZilla before 3.41.0-rc1 allows an
-attacker to gain privileges via a malicious <q>fzsftp</q> binary in
-the user's home directory.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.24.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your filezilla packages.</p>
-
-<p>For the detailed security status of filezilla please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/filezilla">https://security-tracker.debian.org/tracker/filezilla</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3026.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3027.data b/english/lts/security/2022/dla-3027.data
deleted file mode 100644
index d24c7ff4171..00000000000
--- a/english/lts/security/2022/dla-3027.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3027-1 neutron</define-tag>
-<define-tag report_date>2022-05-26</define-tag>
-<define-tag secrefs>CVE-2021-40085</define-tag>
-<define-tag packages>neutron</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3027.wml b/english/lts/security/2022/dla-3027.wml
deleted file mode 100644
index 954c4b02a61..00000000000
--- a/english/lts/security/2022/dla-3027.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that the previous upload to neutron to Debian 9 "Stretch"
-(ie. version 2:9.1.1-3+deb9u2) was incomplete and did not actually apply the
-fix for CVE-2021-40085.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40085">CVE-2021-40085</a>
-
- <p>An issue was discovered in OpenStack Neutron before 16.4.1, 17.x
- before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can
- reconfigure dnsmasq via a crafted extra_dhcp_opts value.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this has now been fixed in version
-2:9.1.1-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your neutron packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3027.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3028.data b/english/lts/security/2022/dla-3028.data
deleted file mode 100644
index ae6493308bd..00000000000
--- a/english/lts/security/2022/dla-3028.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3028-1 atftp</define-tag>
-<define-tag report_date>2022-5-27</define-tag>
-<define-tag secrefs>CVE-2021-46671</define-tag>
-<define-tag packages>atftp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3028.wml b/english/lts/security/2022/dla-3028.wml
deleted file mode 100644
index f0276a6a4a2..00000000000
--- a/english/lts/security/2022/dla-3028.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in package atftp, an advanced TFTP client/server.</p>
-
-<p>Due to missing bound checks, data could be read behind a buffer so that
-sensible information might be disclosed to a remote client.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.7.git20120829-3.1~deb9u3.</p>
-
-<p>We recommend that you upgrade your atftp packages.</p>
-
-<p>For the detailed security status of atftp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/atftp">https://security-tracker.debian.org/tracker/atftp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3028.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3029.data b/english/lts/security/2022/dla-3029.data
deleted file mode 100644
index 8a7e9897c1c..00000000000
--- a/english/lts/security/2022/dla-3029.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3029-1 cups</define-tag>
-<define-tag report_date>2022-5-27</define-tag>
-<define-tag secrefs>CVE-2022-26691 Bug#1011769</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3029.wml b/english/lts/security/2022/dla-3029.wml
deleted file mode 100644
index 0bebdfe3a76..00000000000
--- a/english/lts/security/2022/dla-3029.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Joshua Mason discovered that a logic error in the validation of the
-secret key used in the <q>local</q> authorisation mode of the CUPS printing
-system may result in privilege escalation.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.2.1-8+deb9u8.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>For the detailed security status of cups please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cups">https://security-tracker.debian.org/tracker/cups</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3029.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3030.data b/english/lts/security/2022/dla-3030.data
deleted file mode 100644
index 9596d2ae9fc..00000000000
--- a/english/lts/security/2022/dla-3030.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3030-1 zipios++</define-tag>
-<define-tag report_date>2022-5-27</define-tag>
-<define-tag secrefs>CVE-2019-13453</define-tag>
-<define-tag packages>zipios++</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3030.wml b/english/lts/security/2022/dla-3030.wml
deleted file mode 100644
index 45746cdfee3..00000000000
--- a/english/lts/security/2022/dla-3030.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue was found in zipios++, a small C++ library for reading zip files.
-Due to wrong handling of malformed zip files, an infinite loop could be
-entered, which results in a denial of service.</p>
-
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.1.5.9+cvs.2007.04.28-6+deb9u1.</p>
-
-<p>We recommend that you upgrade your zipios++ packages.</p>
-
-<p>For the detailed security status of zipios++ please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zipios++">https://security-tracker.debian.org/tracker/zipios++</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3030.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3031.data b/english/lts/security/2022/dla-3031.data
deleted file mode 100644
index 31612d10dcf..00000000000
--- a/english/lts/security/2022/dla-3031.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3031-1 modsecurity-apache</define-tag>
-<define-tag report_date>2022-05-28</define-tag>
-<define-tag secrefs>CVE-2021-42717</define-tag>
-<define-tag packages>modsecurity-apache</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3031.wml b/english/lts/security/2022/dla-3031.wml
deleted file mode 100644
index 06d74545e63..00000000000
--- a/english/lts/security/2022/dla-3031.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential resource exhaustion attack in
-modsecurity-apache, an Apache module which inspects HTTP requests with the aim
-of preventing typical web application attacks such as XSS and SQL.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42717">CVE-2021-42717</a>
-
- <p>ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON
- objects. Crafted JSON objects with nesting tens-of-thousands deep could
- result in the web server being unable to service legitimate requests. Even
- a moderately large (e.g., 300KB) HTTP request can occupy one of the limited
- NGINX worker processes for minutes and consume almost all of the available
- CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected
- versions include 2.8.0 through 2.9.4.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
-2.9.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your modsecurity-apache packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3031.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3032.data b/english/lts/security/2022/dla-3032.data
deleted file mode 100644
index 34a4336bd0f..00000000000
--- a/english/lts/security/2022/dla-3032.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3032-1 pngcheck</define-tag>
-<define-tag report_date>2022-5-29</define-tag>
-<define-tag secrefs>CVE-2020-27818 Bug#976350</define-tag>
-<define-tag packages>pngcheck</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3032.wml b/english/lts/security/2022/dla-3032.wml
deleted file mode 100644
index b4364c24e8e..00000000000
--- a/english/lts/security/2022/dla-3032.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in the check_chunk_name() function of pngcheck, a tool to&nbsp;
-verify the integrity of PNG, JNG and MNG files. This flaw allows an attacker
-who can pass a malicious file to be processed by pngcheck to cause a temporary
-denial of service.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.3.0-7+deb9u1.</p>
-
-<p>We recommend that you upgrade your pngcheck packages.</p>
-
-<p>For the detailed security status of pngcheck please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/pngcheck">https://security-tracker.debian.org/tracker/pngcheck</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3032.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3033.data b/english/lts/security/2022/dla-3033.data
deleted file mode 100644
index 0b9e90c1f38..00000000000
--- a/english/lts/security/2022/dla-3033.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3033-1 smarty3</define-tag>
-<define-tag report_date>2022-5-29</define-tag>
-<define-tag secrefs>CVE-2022-29221 Bug#1011758</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3033.wml b/english/lts/security/2022/dla-3033.wml
deleted file mode 100644
index e2fc788aa0f..00000000000
--- a/english/lts/security/2022/dla-3033.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Smarty3 is a template engine for PHP. It was found that template authors could
-inject PHP code by choosing a malicious {block} name or {include} file name.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u6.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-
-<p>For the detailed security status of smarty3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/smarty3">https://security-tracker.debian.org/tracker/smarty3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3033.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3034.data b/english/lts/security/2022/dla-3034.data
deleted file mode 100644
index 1e7c91ae915..00000000000
--- a/english/lts/security/2022/dla-3034.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3034-1 haproxy</define-tag>
-<define-tag report_date>2022-5-30</define-tag>
-<define-tag secrefs>CVE-2018-20102 CVE-2018-20103 CVE-2019-18277 Bug#916308 Bug#916307</define-tag>
-<define-tag packages>haproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3034.wml b/english/lts/security/2022/dla-3034.wml
deleted file mode 100644
index 678d036cc43..00000000000
--- a/english/lts/security/2022/dla-3034.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nathan Davison discovered that HAProxy, a load balancing reverse proxy, did not
-correctly reject requests or responses featuring a transfer-encoding header
-missing the <q>chunked</q> value which could facilitate a HTTP request smuggling
-attack. Furthermore several flaws were discovered in DNS related functions that
-may trigger infinite recursion leading to a denial of service or to information
-leakage due to a out-of-bounds read.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.7.5-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your haproxy packages.</p>
-
-<p>For the detailed security status of haproxy please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/haproxy">https://security-tracker.debian.org/tracker/haproxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3034.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3035.data b/english/lts/security/2022/dla-3035.data
deleted file mode 100644
index 7fe44d40f12..00000000000
--- a/english/lts/security/2022/dla-3035.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3035-1 libdbi-perl</define-tag>
-<define-tag report_date>2022-05-30</define-tag>
-<define-tag secrefs>CVE-2014-10402 Bug#972180</define-tag>
-<define-tag packages>libdbi-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3035.wml b/english/lts/security/2022/dla-3035.wml
deleted file mode 100644
index 7f2874ea4eb..00000000000
--- a/english/lts/security/2022/dla-3035.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that <a href="https://security-tracker.debian.org/tracker/CVE-2014-10401">CVE-2014-10401</a> was fixed incompletely in the
-Perl5 Database Interface (DBI). An attacker could trigger information
-disclosure through a different vector.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-10401">CVE-2014-10401</a>
-
- <p>DBD::File drivers can open files from folders other than those
- specifically passed via the f_dir attribute.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-10402">CVE-2014-10402</a>
-
- <p>DBD::File drivers can open files from folders other than those
- specifically passed via the f_dir attribute in the data source
- name (DSN). NOTE: this issue exists because of an incomplete fix
- for <a href="https://security-tracker.debian.org/tracker/CVE-2014-10401">CVE-2014-10401</a>.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.636-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your libdbi-perl packages.</p>
-
-<p>For the detailed security status of libdbi-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdbi-perl">https://security-tracker.debian.org/tracker/libdbi-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3035.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3036.data b/english/lts/security/2022/dla-3036.data
deleted file mode 100644
index da0dc40a14d..00000000000
--- a/english/lts/security/2022/dla-3036.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3036-1 pjproject</define-tag>
-<define-tag report_date>2022-06-02</define-tag>
-<define-tag secrefs>CVE-2022-24763 CVE-2022-24792 CVE-2022-24793</define-tag>
-<define-tag packages>pjproject</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3036.wml b/english/lts/security/2022/dla-3036.wml
deleted file mode 100644
index f2be219c651..00000000000
--- a/english/lts/security/2022/dla-3036.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24763">CVE-2022-24763</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24792">CVE-2022-24792</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24793">CVE-2022-24793</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.5.5~dfsg-6+deb9u5.</p>
-
-<p>We recommend that you upgrade your pjproject packages.</p>
-
-<p>For the detailed security status of pjproject please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pjproject">https://security-tracker.debian.org/tracker/pjproject</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3036.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3037.data b/english/lts/security/2022/dla-3037.data
deleted file mode 100644
index d36558d50b9..00000000000
--- a/english/lts/security/2022/dla-3037.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3037-1 libjpeg-turbo</define-tag>
-<define-tag report_date>2022-5-31</define-tag>
-<define-tag secrefs>CVE-2019-2201</define-tag>
-<define-tag packages>libjpeg-turbo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3037.wml b/english/lts/security/2022/dla-3037.wml
deleted file mode 100644
index b776c58495c..00000000000
--- a/english/lts/security/2022/dla-3037.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several integer overflows have been discovered in TurboJPEG, a JPEG image
-library, which can lead to a denial of service (application crash) if someone
-attempts to compress or decompress gigapixel images with the TurboJPEG API.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:1.5.1-2+deb9u2.</p>
-
-<p>We recommend that you upgrade your libjpeg-turbo packages.</p>
-
-<p>For the detailed security status of libjpeg-turbo please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libjpeg-turbo">https://security-tracker.debian.org/tracker/libjpeg-turbo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3037.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3038.data b/english/lts/security/2022/dla-3038.data
deleted file mode 100644
index eef5a48e6b9..00000000000
--- a/english/lts/security/2022/dla-3038.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3038-1 debian-security-support</define-tag>
-<define-tag report_date>2022-06-03</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3038.wml b/english/lts/security/2022/dla-3038.wml
deleted file mode 100644
index 41228a48b9f..00000000000
--- a/english/lts/security/2022/dla-3038.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker,
-has been updated in stretch-security to mark the end of life of the
-following packages:</p>
-
-<p>* keystone:
- See <a href="https://lists.debian.org/debian-lts/2020/05/msg00011.html">https://lists.debian.org/debian-lts/2020/05/msg00011.html</a> for
- further information.</p>
-
-<p>* libspring-java:
- See <a href="https://lists.debian.org/debian-lts/2021/12/msg00008.html">https://lists.debian.org/debian-lts/2021/12/msg00008.html</a> for
- further information.</p>
-
-<p>* guacamole-client:
- See <a href="https://lists.debian.org/debian-lts/2022/01/msg00015.html">https://lists.debian.org/debian-lts/2022/01/msg00015.html</a> for
- further information.</p>
-
-<p>* gpac:
- See <a href="https://lists.debian.org/debian-lts/2022/04/msg00008.html">https://lists.debian.org/debian-lts/2022/04/msg00008.html</a> for
- further information.</p>
-
-<p>* ansible:
- Lack of an effective test suite makes proper support impossible.</p>
-
-<p>* mysql-connector-java:
- Details of security vulnerabilities are not disclosed. MySQL has
- been replaced by MariaDB. We recommend to use mariadb-connector-java
- instead.</p>
-
-<p>* ckeditor3:
- See <a href="https://lists.debian.org/debian-lts/2022/05/msg00060.html">https://lists.debian.org/debian-lts/2022/05/msg00060.html</a> for
- further information.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1:9+2022.06.02.</p>
-
-<p>We recommend that you upgrade your debian-security-support packages.</p>
-
-<p>For the detailed security status of debian-security-support please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/debian-security-support">https://security-tracker.debian.org/tracker/debian-security-support</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3038.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3039.data b/english/lts/security/2022/dla-3039.data
deleted file mode 100644
index c9258bebdf8..00000000000
--- a/english/lts/security/2022/dla-3039.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3039-1 pypdf2</define-tag>
-<define-tag report_date>2022-6-03</define-tag>
-<define-tag secrefs>CVE-2022-24859 Bug#1009879</define-tag>
-<define-tag packages>pypdf2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3039.wml b/english/lts/security/2022/dla-3039.wml
deleted file mode 100644
index db541a56a8e..00000000000
--- a/english/lts/security/2022/dla-3039.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sebastian Krause discovered that manipulated inline images can force
-PyPDF2, a pure Python PDF library, into an infinite loop, if a maliciously
-crafted PDF file is processed.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.26.0-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your pypdf2 packages.</p>
-
-<p>For the detailed security status of pypdf2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/pypdf2">https://security-tracker.debian.org/tracker/pypdf2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3039.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3040.data b/english/lts/security/2022/dla-3040.data
deleted file mode 100644
index 4ea06fe5e20..00000000000
--- a/english/lts/security/2022/dla-3040.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3040-1 firefox-esr</define-tag>
-<define-tag report_date>2022-06-03</define-tag>
-<define-tag secrefs>CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31740 CVE-2022-31741 CVE-2022-31742 CVE-2022-31747</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3040.wml b/english/lts/security/2022/dla-3040.wml
deleted file mode 100644
index f068954fea6..00000000000
--- a/english/lts/security/2022/dla-3040.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.10.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3040.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3041.data b/english/lts/security/2022/dla-3041.data
deleted file mode 100644
index 2f80f9ff1d5..00000000000
--- a/english/lts/security/2022/dla-3041.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3041-1 thunderbird</define-tag>
-<define-tag report_date>2022-06-03</define-tag>
-<define-tag secrefs>CVE-2022-1529 CVE-2022-1802 CVE-2022-1834 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31740 CVE-2022-31741 CVE-2022-31742 CVE-2022-31747</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3041.wml b/english/lts/security/2022/dla-3041.wml
deleted file mode 100644
index f105e32ec6b..00000000000
--- a/english/lts/security/2022/dla-3041.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which could
-potentially result in the execution of arbitrary code, information
-disclosure or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:91.10.0-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3041.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3042.data b/english/lts/security/2022/dla-3042.data
deleted file mode 100644
index 715019b99f1..00000000000
--- a/english/lts/security/2022/dla-3042.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3042-1 clamav</define-tag>
-<define-tag report_date>2022-06-03</define-tag>
-<define-tag secrefs>CVE-2022-20770 CVE-2022-20771 CVE-2022-20785 CVE-2022-20792 CVE-2022-20796</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3042.wml b/english/lts/security/2022/dla-3042.wml
deleted file mode 100644
index cfb58c133a7..00000000000
--- a/english/lts/security/2022/dla-3042.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in the ClamAV antivirus toolkit,
-that could result in denial of service or other unspecified impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.103.6+dfsg-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3042.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3043.data b/english/lts/security/2022/dla-3043.data
deleted file mode 100644
index 37742301503..00000000000
--- a/english/lts/security/2022/dla-3043.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3043-1 pidgin</define-tag>
-<define-tag report_date>2022-06-06</define-tag>
-<define-tag secrefs>CVE-2022-26491</define-tag>
-<define-tag packages>pidgin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3043.wml b/english/lts/security/2022/dla-3043.wml
deleted file mode 100644
index de40088229f..00000000000
--- a/english/lts/security/2022/dla-3043.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was discovered in Pidgin before 2.14.9. A remote attacker
-who can spoof DNS responses can redirect a client connection to a
-malicious server. The client will perform TLS certificate
-verification of the malicious domain name instead of the original
-XMPP service domain, allowing the attacker to take over control
-over the XMPP connection and to obtain user credentials and all
-communication content.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2.12.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your pidgin packages.</p>
-
-<p>For the detailed security status of pidgin please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pidgin">https://security-tracker.debian.org/tracker/pidgin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3043.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3044.data b/english/lts/security/2022/dla-3044.data
deleted file mode 100644
index 0cfaaf631eb..00000000000
--- a/english/lts/security/2022/dla-3044.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3044-1 glib2.0</define-tag>
-<define-tag report_date>2022-6-06</define-tag>
-<define-tag secrefs>CVE-2021-27218 CVE-2021-27219 CVE-2021-28153 Bug#984969 Bug#982778 Bug#982779</define-tag>
-<define-tag packages>glib2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3044.wml b/english/lts/security/2022/dla-3044.wml
deleted file mode 100644
index 51ce2fdaf44..00000000000
--- a/english/lts/security/2022/dla-3044.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in glib2.0, a general-purpose
-utility library for the GNOME environment.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27218">CVE-2021-27218</a>
-
- <p>If g_byte_array_new_take() was called with a buffer of 4GB or more on a
- 64-bit platform, the length would be truncated modulo 2**32, causing
- unintended length truncation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27219">CVE-2021-27219</a>
-
- <p>The function g_bytes_new has an integer overflow on 64-bit platforms due to
- an implicit cast from 64 bits to 32 bits. The overflow could potentially
- lead to memory corruption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28153">CVE-2021-28153</a>
-
- <p>When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to
- replace a path that is a dangling symlink, it incorrectly also creates the
- target of the symlink as an empty file, which could conceivably have
- security relevance if the symlink is attacker-controlled. (If the path is
- a symlink to a file that already exists, then the contents of that file
- correctly remain unchanged.)</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.50.3-2+deb9u3.</p>
-
-<p>We recommend that you upgrade your glib2.0 packages.</p>
-
-<p>For the detailed security status of glib2.0 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/glib2.0">https://security-tracker.debian.org/tracker/glib2.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3044.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3045.data b/english/lts/security/2022/dla-3045.data
deleted file mode 100644
index c132f23b2d1..00000000000
--- a/english/lts/security/2022/dla-3045.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3045-1 php-horde-mime-viewer</define-tag>
-<define-tag report_date>2022-06-06</define-tag>
-<define-tag secrefs>CVE-2022-26874</define-tag>
-<define-tag packages>php-horde-mime-viewer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3045.wml b/english/lts/security/2022/dla-3045.wml
deleted file mode 100644
index 5b0c960e173..00000000000
--- a/english/lts/security/2022/dla-3045.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential XSS vulnerability in
-php-horde-mime-viewer, a MIME viewer library for the Horde groupware
-platform.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26874">CVE-2022-26874</a>
-
- <p>lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows
- XSS via an OpenOffice document, leading to account takeover in Horde
- Groupware Webmail Edition. This occurs after XSLT rendering.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.2.1-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your php-horde-mime-viewer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3045.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3046.data b/english/lts/security/2022/dla-3046.data
deleted file mode 100644
index 1b0aeb0b08d..00000000000
--- a/english/lts/security/2022/dla-3046.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3046-1 librecad</define-tag>
-<define-tag report_date>2022-06-07</define-tag>
-<define-tag secrefs>CVE-2021-21897</define-tag>
-<define-tag packages>librecad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3046.wml b/english/lts/security/2022/dla-3046.wml
deleted file mode 100644
index c8c0870a0af..00000000000
--- a/english/lts/security/2022/dla-3046.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential heap buffer overflow in
-librecad, a popular computer-aided design (CAD) system. A specially crafted
-.dxf file could have led to arbitrary code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21897">CVE-2021-21897</a>
-
- <p>A code execution vulnerability exists in the
- DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib 3.17.0. A
- specially-crafted .dxf file can lead to a heap buffer overflow. An attacker
- can provide a malicious file to trigger this vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-2.1.2-1+deb9u4.</p>
-
-<p>We recommend that you upgrade your librecad packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3046.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3047.data b/english/lts/security/2022/dla-3047.data
deleted file mode 100644
index 108cd119a50..00000000000
--- a/english/lts/security/2022/dla-3047.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3047-1 avahi</define-tag>
-<define-tag report_date>2022-6-07</define-tag>
-<define-tag secrefs>CVE-2021-3468 CVE-2021-26720 Bug#984938</define-tag>
-<define-tag packages>avahi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3047.wml b/english/lts/security/2022/dla-3047.wml
deleted file mode 100644
index 8551f731d72..00000000000
--- a/english/lts/security/2022/dla-3047.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Debian package of Avahi, a framework for Multicast
-DNS Service Discovery, executed the script avahi-daemon-check-dns.sh with root
-privileges which would allow a local attacker to cause a denial of service or
-create arbitrary empty files via a symlink attack on files under
-/var/run/avahi-daemon. This script is now executed with the privileges of user
-and group avahi and requires sudo in order to achieve that.</p>
-
-<p>The aforementioned script has been removed from Debian 10 <q>Buster</q> onwards. The
-workaround could not be implemented for Debian 9 <q>Stretch</q> because libnss-mdns
-0.10 does not provide the required functionality to replace it.</p>
-
-<p>Furthermore it was found (<a href="https://security-tracker.debian.org/tracker/CVE-2021-3468">CVE-2021-3468</a>) that the event used to signal the
-termination of the client connection on the avahi Unix socket is not correctly
-handled in the client_work function, allowing a local attacker to trigger an
-infinite loop.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-0.6.32-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your avahi packages.</p>
-
-<p>For the detailed security status of avahi please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/avahi">https://security-tracker.debian.org/tracker/avahi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3047.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3048.data b/english/lts/security/2022/dla-3048.data
deleted file mode 100644
index d33cbd359af..00000000000
--- a/english/lts/security/2022/dla-3048.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3048-1 python-bottle</define-tag>
-<define-tag report_date>2022-06-09</define-tag>
-<define-tag secrefs>CVE-2022-31799</define-tag>
-<define-tag packages>python-bottle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3048.wml b/english/lts/security/2022/dla-3048.wml
deleted file mode 100644
index b909771ed19..00000000000
--- a/english/lts/security/2022/dla-3048.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Bottle, which is a fast, simple and lightweight WSGI micro
-web-framework for Python, mishandles errors during early request
-binding.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.12.13-1+deb9u2.</p>
-
-<p>We recommend that you upgrade your python-bottle packages.</p>
-
-<p>For the detailed security status of python-bottle please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-bottle">https://security-tracker.debian.org/tracker/python-bottle</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3048.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3049.data b/english/lts/security/2022/dla-3049.data
deleted file mode 100644
index d3a23c45947..00000000000
--- a/english/lts/security/2022/dla-3049.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3049-1 mailman</define-tag>
-<define-tag report_date>2022-06-09</define-tag>
-<define-tag secrefs>CVE-2021-43331 CVE-2021-43332 CVE-2021-44227 Bug#1000367 Bug#1001685</define-tag>
-<define-tag packages>mailman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3049.wml b/english/lts/security/2022/dla-3049.wml
deleted file mode 100644
index b15b68b02b3..00000000000
--- a/english/lts/security/2022/dla-3049.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Mailman, a web-based
-mailing list manager. An attacker could impersonate more privileged
-accounts through different vectors.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43331">CVE-2021-43331</a>
-
- <p>A crafted URL to the Cgi/options.py user options page can execute
- arbitrary JavaScript for XSS.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43332">CVE-2021-43332</a>
-
- <p>The CSRF token for the Cgi/admindb.py admindb page contains an
- encrypted version of the list admin password. This could
- potentially be cracked by a moderator via an offline brute-force
- attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44227">CVE-2021-44227</a>
-
- <p>A list member or moderator can get a CSRF token and craft an admin
- request (using that token) to set a new admin password or make
- other changes.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2.1.23-1+deb9u8.</p>
-
-<p>We recommend that you upgrade your mailman packages.</p>
-
-<p>For the detailed security status of mailman please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mailman">https://security-tracker.debian.org/tracker/mailman</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3049.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3050.data b/english/lts/security/2022/dla-3050.data
deleted file mode 100644
index 53bd14ab3f5..00000000000
--- a/english/lts/security/2022/dla-3050.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3050-1 vlc</define-tag>
-<define-tag report_date>2022-06-10</define-tag>
-<define-tag secrefs>CVE-2020-26664 Bug#979676</define-tag>
-<define-tag packages>vlc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3050.wml b/english/lts/security/2022/dla-3050.wml
deleted file mode 100644
index 926e5d60662..00000000000
--- a/english/lts/security/2022/dla-3050.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the VLC media player,
-which could result in the execution of arbitrary code or denial of
-service if a malformed media file is opened.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.0.12-0+deb9u1.</p>
-
-<p>We recommend that you upgrade your vlc packages.</p>
-
-<p>For the detailed security status of vlc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vlc">https://security-tracker.debian.org/tracker/vlc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3050.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3051.data b/english/lts/security/2022/dla-3051.data
deleted file mode 100644
index 5265ece4e6d..00000000000
--- a/english/lts/security/2022/dla-3051.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3051-1 tzdata</define-tag>
-<define-tag report_date>2022-06-15</define-tag>
-<define-tag secrefs>Bug#1012191</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3051.wml b/english/lts/security/2022/dla-3051.wml
deleted file mode 100644
index 627ef62ac63..00000000000
--- a/english/lts/security/2022/dla-3051.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the latest changes to the leap second list,
-including an update to its expiry date, which was set for the end of
-June.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-2021a-0+deb9u4.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3051.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3052.data b/english/lts/security/2022/dla-3052.data
deleted file mode 100644
index d4df7c7c0f1..00000000000
--- a/english/lts/security/2022/dla-3052.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3052-1 cyrus-imapd</define-tag>
-<define-tag report_date>2022-6-20</define-tag>
-<define-tag secrefs>CVE-2019-18928 CVE-2021-33582 Bug#993433</define-tag>
-<define-tag packages>cyrus-imapd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3052.wml b/english/lts/security/2022/dla-3052.wml
deleted file mode 100644
index c91a8d0a2f6..00000000000
--- a/english/lts/security/2022/dla-3052.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Cyrus IMAP server was prone to a denial of service
-attack via input that is mishandled during hash-table interaction. Furthermore
-it allowed privilege escalation because an HTTP request may be interpreted in
-the authentication context of an unrelated previous request that arrived over
-the same connection.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.5.10-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your cyrus-imapd packages.</p>
-
-<p>For the detailed security status of cyrus-imapd please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/cyrus-imapd">https://security-tracker.debian.org/tracker/cyrus-imapd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3052.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3053.data b/english/lts/security/2022/dla-3053.data
deleted file mode 100644
index 68947f6cbab..00000000000
--- a/english/lts/security/2022/dla-3053.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3053-1 vim</define-tag>
-<define-tag report_date>2022-6-20</define-tag>
-<define-tag secrefs>CVE-2021-3903 CVE-2022-0417 CVE-2022-0943 CVE-2022-1720 CVE-2022-1851 CVE-2022-1898 CVE-2022-1968 CVE-2022-2124 CVE-2022-2126</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3053.wml b/english/lts/security/2022/dla-3053.wml
deleted file mode 100644
index 9b779c04ff5..00000000000
--- a/english/lts/security/2022/dla-3053.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in vim, an enhanced
-vi editor. Buffer overflows, out-of-bounds reads and use-after-free may
-lead to a denial-of-service (application crash) or other unspecified
-impact.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2:8.0.0197-4+deb9u7.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3053.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3054.data b/english/lts/security/2022/dla-3054.data
deleted file mode 100644
index cce3d8821bb..00000000000
--- a/english/lts/security/2022/dla-3054.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3054-1 sleuthkit</define-tag>
-<define-tag report_date>2022-06-20</define-tag>
-<define-tag secrefs>CVE-2017-13755 CVE-2017-13756 CVE-2017-13760 CVE-2018-19497 CVE-2020-10232 CVE-2019-1010065</define-tag>
-<define-tag packages>sleuthkit</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3054.wml b/english/lts/security/2022/dla-3054.wml
deleted file mode 100644
index c3eaed1aa1f..00000000000
--- a/english/lts/security/2022/dla-3054.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13755">CVE-2017-13755</a>
-
- <p>Opening a crafted ISO 9660 image triggers an out-of-bounds
- read in iso9660_proc_dir() in tsk/fs/iso9660_dent.c in libtskfs.a, as
- demonstrated by fls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13756">CVE-2017-13756</a>
-
- <p>Opening a crafted disk image triggers infinite recursion in
- dos_load_ext_table() in tsk/vs/dos.c in libtskvs.a, as demonstrated by
- mmls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13760">CVE-2017-13760</a>
-
- <p>fls hangs on a corrupt exfat image in tsk_img_read() in
- tsk/img/img_io.c in libtskimg.a.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19497">CVE-2018-19497</a>
-
- <p>In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in
- tsk/fs/hfs.c does not properly determine when a key length is too large,
- which allows attackers to cause a denial of service (SEGV on unknown
- address with READ memory access in a tsk_getu16 call in
- hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10232">CVE-2020-10232</a>
-
- <p>Prevent a stack buffer overflow in yaffsfs_istat by
- increasing the buffer size to the size required by tsk_fs_time_to_str.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-1010065">CVE-2019-1010065</a>
-
- <p>The Sleuth Kit 4.6.0 and earlier is affected by: Integer
- Overflow. The impact is: Opening crafted disk image triggers crash in
- tsk/fs/hfs_dent.c:237. The component is: Overflow in fls tool used on HFS
- image. Bug is in tsk/fs/hfs.c file in function hfs_cat_traverse() in lines:
- 952, 1062. The attack vector is: Victim must open a crafted HFS filesystem
- image.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.4.0-5+deb9u1.</p>
-
-<p>We recommend that you upgrade your sleuthkit packages.</p>
-
-<p>For the detailed security status of sleuthkit please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sleuthkit">https://security-tracker.debian.org/tracker/sleuthkit</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3054.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3055.data b/english/lts/security/2022/dla-3055.data
deleted file mode 100644
index 1d6a72ba2da..00000000000
--- a/english/lts/security/2022/dla-3055.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3055-1 ntfs-3g</define-tag>
-<define-tag report_date>2022-06-21</define-tag>
-<define-tag secrefs>CVE-2022-30783 CVE-2022-30784 CVE-2022-30785 CVE-2022-30786 CVE-2022-30787 CVE-2022-30788 CVE-2022-30789 Bug#1011770</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3055.wml b/english/lts/security/2022/dla-3055.wml
deleted file mode 100644
index 30bd0b1791f..00000000000
--- a/english/lts/security/2022/dla-3055.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in NTFS-3G, a read-write NTFS
-driver for FUSE. A local user can take advantage of these flaws for
-local root privilege escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30783">CVE-2022-30783</a>
-
- <p>An invalid return code in fuse_kern_mount enables intercepting of
- libfuse-lite protocol traffic between NTFS-3G and the kernel when
- using libfuse-lite.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30784">CVE-2022-30784</a>
-
- <p>A crafted NTFS image can cause heap exhaustion in
- ntfs_get_attribute_value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30785">CVE-2022-30785</a>
-
- <p>A file handle created in fuse_lib_opendir, and later used in
- fuse_lib_readdir, enables arbitrary memory read and write
- operations when using libfuse-lite.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30786">CVE-2022-30786</a>
-
- <p>A crafted NTFS image can cause a heap-based buffer overflow in
- ntfs_names_full_collate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30787">CVE-2022-30787</a>
-
- <p>An integer underflow in fuse_lib_readdir enables arbitrary memory
- read operations when using libfuse-lite.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30788">CVE-2022-30788</a>
-
- <p>A crafted NTFS image can cause a heap-based buffer overflow in
- ntfs_mft_rec_alloc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30789">CVE-2022-30789</a>
-
- <p>A crafted NTFS image can cause a heap-based buffer overflow in
- ntfs_check_log_client_array.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1:2016.2.22AR.1+dfsg-1+deb9u3.</p>
-
-<p>We recommend that you upgrade your ntfs-3g packages.</p>
-
-<p>For the detailed security status of ntfs-3g please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ntfs-3g">https://security-tracker.debian.org/tracker/ntfs-3g</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3055.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3056.data b/english/lts/security/2022/dla-3056.data
deleted file mode 100644
index 81b7ba27640..00000000000
--- a/english/lts/security/2022/dla-3056.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3056-1 exo</define-tag>
-<define-tag report_date>2022-06-22</define-tag>
-<define-tag secrefs>CVE-2022-32278</define-tag>
-<define-tag packages>exo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3056.wml b/english/lts/security/2022/dla-3056.wml
deleted file mode 100644
index cbc3d528057..00000000000
--- a/english/lts/security/2022/dla-3056.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in XFCE where allowed attackers
-could execute arbitrary code because xdg-open could execute a .desktop file on
-an attacker-controlled FTP server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32278">CVE-2022-32278</a>
-
- <p>XFCE 4.16 allows attackers to execute arbitrary code because xdg-open
- can execute a .desktop file on an attacker-controlled FTP server.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
-0.10.7-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your exo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3056.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3057.data b/english/lts/security/2022/dla-3057.data
deleted file mode 100644
index 060f5afa461..00000000000
--- a/english/lts/security/2022/dla-3057.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3057-1 request-tracker4</define-tag>
-<define-tag report_date>2022-06-23</define-tag>
-<define-tag secrefs>CVE-2021-38562</define-tag>
-<define-tag packages>request-tracker4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3057.wml b/english/lts/security/2022/dla-3057.wml
deleted file mode 100644
index 223ecb5fcc2..00000000000
--- a/english/lts/security/2022/dla-3057.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in request-tracker4, a extensible
-ticket/issue tracking system. Sensitive information could have been revealed by
-way of a timing attack on the authentication system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38562">CVE-2021-38562</a>
-
- <p>Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5,
- and 5.0 before 5.0.2 allows sensitive information disclosure via a timing
- attack against lib/RT/REST2/Middleware/Auth.pm.</p></li>
-
-</ul>
-
-<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
-4.4.1-3+deb9u4.</p>
-
-<p>We recommend that you upgrade your request-tracker4 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3057.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3058.data b/english/lts/security/2022/dla-3058.data
deleted file mode 100644
index 20dd58395bf..00000000000
--- a/english/lts/security/2022/dla-3058.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3058-1 libsndfile</define-tag>
-<define-tag report_date>2022-6-28</define-tag>
-<define-tag secrefs>CVE-2017-12562 CVE-2021-4156</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3058.wml b/english/lts/security/2022/dla-3058.wml
deleted file mode 100644
index de03481d320..00000000000
--- a/english/lts/security/2022/dla-3058.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in libsndfile, a library for reading/writing
-audio files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12562">CVE-2017-12562</a>
-
- <p>Due to a possible heap buffer overflow attack in an attacker could
- cause a remote denial of service attack by tricking the function into
- outputting a largeamount of data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4156">CVE-2021-4156</a>
-
- <p>Using a crafted FLAC file, an attacker could trigger an out-of-bounds
- read that would most likely cause a crash but could potentially leak
- memory information.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.0.27-3+deb9u3.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>For the detailed security status of libsndfile please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsndfile">https://security-tracker.debian.org/tracker/libsndfile</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3058.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3059.data b/english/lts/security/2022/dla-3059.data
deleted file mode 100644
index 055d2f297a0..00000000000
--- a/english/lts/security/2022/dla-3059.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3059-1 maven-shared-utils</define-tag>
-<define-tag report_date>2022-06-29</define-tag>
-<define-tag secrefs>CVE-2022-29599 Bug#1012314</define-tag>
-<define-tag packages>maven-shared-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3059.wml b/english/lts/security/2022/dla-3059.wml
deleted file mode 100644
index 9a838b63717..00000000000
--- a/english/lts/security/2022/dla-3059.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Commandline class in maven-shared-utils, a
-collection of various utility classes for the Maven build system, can emit
-double-quoted strings without proper escaping, allowing shell injection
-attacks.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-3.0.0-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your maven-shared-utils packages.</p>
-
-<p>For the detailed security status of maven-shared-utils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/maven-shared-utils">https://security-tracker.debian.org/tracker/maven-shared-utils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3059.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3060.data b/english/lts/security/2022/dla-3060.data
deleted file mode 100644
index d137565b681..00000000000
--- a/english/lts/security/2022/dla-3060.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3060-1 blender</define-tag>
-<define-tag report_date>2022-6-28</define-tag>
-<define-tag secrefs>CVE-2022-0544 CVE-2022-0545 CVE-2022-0546</define-tag>
-<define-tag packages>blender</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3060.wml b/english/lts/security/2022/dla-3060.wml
deleted file mode 100644
index 4c805c4a312..00000000000
--- a/english/lts/security/2022/dla-3060.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in blender, a very fast and versatile 3D
-modeller/renderer.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0546">CVE-2022-0546</a>
-
- <p>An out-of-bounds heap access due to missing checks in the image
- loader could result in denial of service, memory corruption or
- potentially code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0545">CVE-2022-0545</a>
-
- <p>An integer overflow while processing 2d images might result in a
- write-what-where vulnerability or an out-of-bounds read vulnerability
- which could leak sensitive information or achieve code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0544">CVE-2022-0544</a>
-
- <p>Crafted DDS image files could create an integer underflow in the
- DDS loader which leads to an out-of-bounds read and might leak
- sensitive information.</p>
-
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-2.79.b+dfsg0-1~deb9u2.</p>
-
-<p>We recommend that you upgrade your blender packages.</p>
-
-<p>For the detailed security status of blender please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/blender">https://security-tracker.debian.org/tracker/blender</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3060.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3061.data b/english/lts/security/2022/dla-3061.data
deleted file mode 100644
index 4255410f51c..00000000000
--- a/english/lts/security/2022/dla-3061.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3061-1 firejail</define-tag>
-<define-tag report_date>2022-06-29</define-tag>
-<define-tag secrefs>CVE-2022-31214 Bug#1012510</define-tag>
-<define-tag packages>firejail</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3061.wml b/english/lts/security/2022/dla-3061.wml
deleted file mode 100644
index 907b8c676ec..00000000000
--- a/english/lts/security/2022/dla-3061.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Matthias Gerstner discovered that the --join option of Firejail, a
-sandbox to restrict an application environment, was susceptible to
-local privilege escalation to root.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-0.9.58.2-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your firejail packages.</p>
-
-<p>For the detailed security status of firejail please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firejail">https://security-tracker.debian.org/tracker/firejail</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3061.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3062.data b/english/lts/security/2022/dla-3062.data
deleted file mode 100644
index eb768097b69..00000000000
--- a/english/lts/security/2022/dla-3062.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3062-1 ublock-origin</define-tag>
-<define-tag report_date>2022-6-29</define-tag>
-<define-tag secrefs>CVE-2021-36773 Bug#991386</define-tag>
-<define-tag packages>ublock-origin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3062.wml b/english/lts/security/2022/dla-3062.wml
deleted file mode 100644
index dcae43fdef7..00000000000
--- a/english/lts/security/2022/dla-3062.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>uBlock, a Firefox add-on and efficient ads, malware and trackers blocker,
-supported an arbitrary depth of parameter nesting for strict blocking, which
-allows crafted web sites to cause a denial of service (unbounded recursion that
-can trigger memory consumption and a loss of all blocking functionality).</p>
-
-<p>Please note that webext-ublock-origin was replaced by webext-ublock-originfirefox.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-1.42.0+dfsg-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your ublock-origin packages.</p>
-
-<p>For the detailed security status of ublock-origin please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ublock-origin">https://security-tracker.debian.org/tracker/ublock-origin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3062.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3063.data b/english/lts/security/2022/dla-3063.data
deleted file mode 100644
index 311069d66f4..00000000000
--- a/english/lts/security/2022/dla-3063.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3063-1 systemd</define-tag>
-<define-tag report_date>2022-06-30</define-tag>
-<define-tag secrefs>CVE-2020-1712 Bug#950732</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3063.wml b/english/lts/security/2022/dla-3063.wml
deleted file mode 100644
index bf1baf57673..00000000000
--- a/english/lts/security/2022/dla-3063.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap use-after-free vulnerability was found in systemd, a system and
-service manager, where asynchronous Polkit queries are performed while
-handling dbus messages. A local unprivileged attacker can abuse this
-flaw to crash systemd services or potentially execute code and elevate
-their privileges, by sending specially crafted dbus messages.</p>
-
-<p>For Debian 9 stretch, this problem has been fixed in version
-232-25+deb9u14.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>For the detailed security status of systemd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/systemd">https://security-tracker.debian.org/tracker/systemd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3063.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3064.data b/english/lts/security/2022/dla-3064.data
deleted file mode 100644
index e8d25af8506..00000000000
--- a/english/lts/security/2022/dla-3064.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3064-1 firefox-esr</define-tag>
-<define-tag report_date>2022-07-01</define-tag>
-<define-tag secrefs>CVE-2022-2200 CVE-2022-31744 CVE-2022-34468 CVE-2022-34470 CVE-2022-34472 CVE-2022-34479 CVE-2022-34481 CVE-2022-34484</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3064.wml b/english/lts/security/2022/dla-3064.wml
deleted file mode 100644
index 5c3128d0b30..00000000000
--- a/english/lts/security/2022/dla-3064.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or spoofing.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-91.11.0esr-1~deb9u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3064.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3065.data b/english/lts/security/2022/dla-3065.data
deleted file mode 100644
index 1c554fd2e97..00000000000
--- a/english/lts/security/2022/dla-3065.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3065-1 linux</define-tag>
-<define-tag report_date>2022-7-1</define-tag>
-<define-tag secrefs>CVE-2018-1108 CVE-2021-4149 CVE-2021-39713 CVE-2022-0494 CVE-2022-0812 CVE-2022-0854 CVE-2022-1011 CVE-2022-1012 CVE-2022-1016 CVE-2022-1198 CVE-2022-1199 CVE-2022-1353 CVE-2022-1516 CVE-2022-1729 CVE-2022-1734 CVE-2022-1974 CVE-2022-1975 CVE-2022-2153 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 CVE-2022-23960 CVE-2022-24958 CVE-2022-26490 CVE-2022-26966 CVE-2022-27223 CVE-2022-28356 CVE-2022-28390 CVE-2022-30594 CVE-2022-32250 CVE-2022-32296 CVE-2022-33981 Bug#922204</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3065.wml b/english/lts/security/2022/dla-3065.wml
deleted file mode 100644
index f60d033e71d..00000000000
--- a/english/lts/security/2022/dla-3065.wml
+++ /dev/null
@@ -1,281 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<p>This update is unfortunately not available for the armel architecture.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1108">CVE-2018-1108</a>
-
- <p>It was discovered that the random driver could generate random
- bytes through /dev/random and the getrandom() system call before
- gathering enough entropy that these would be unpredictable. This
- could compromise the confidentiality and integrity of encrypted
- communications.</p>
-
- <p>The original fix for this issue had to be reverted because it
- caused the boot process to hang on many systems. In this version,
- the random driver has been updated, making it more effective in
- gathering entropy without needing a hardware RNG.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4149">CVE-2021-4149</a>
-
- <p>Hao Sun reported a flaw in the Btrfs fileysstem driver. There
- is a potential lock imbalance in an error path. A local user
- might be able to exploit this for denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39713">CVE-2021-39713</a>
-
- <p>The syzbot tool found a race condition in the network scheduling
- subsystem which could lead to a use-after-free. A local user
- could exploit this for denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0494">CVE-2022-0494</a>
-
- <p>The scsi_ioctl() was susceptible to an information leak only
- exploitable by users with CAP_SYS_ADMIN or CAP_SYS_RAWIO
- capabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0812">CVE-2022-0812</a>
-
- <p>It was discovered that the RDMA transport for NFS (xprtrdma)
- miscalculated the size of message headers, which could lead to a
- leak of sensitive information between NFS servers and clients.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0854">CVE-2022-0854</a>
-
- <p>Ali Haider discovered a potential information leak in the DMA
- subsystem. On systems where the swiotlb feature is needed, this
- might allow a local user to read sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1011">CVE-2022-1011</a>
-
- <p>Jann Horn discovered a flaw in the FUSE (Filesystem in User-Space)
- implementation. A local user permitted to mount FUSE filesystems
- could exploit this to cause a use-after-free and read sensitive
- information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1012">CVE-2022-1012</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-32296">CVE-2022-32296</a></p>
-
- <p>Moshe Kol, Amit Klein, and Yossi Gilad discovered a weakness
- in randomisation of TCP source port selection.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1016">CVE-2022-1016</a>
-
- <p>David Bouman discovered a flaw in the netfilter subsystem where
- the nft_do_chain function did not initialize register data that
- nf_tables expressions can read from and write to. A local attacker
- can take advantage of this to read sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1198">CVE-2022-1198</a>
-
- <p>Duoming Zhou discovered a race condition in the 6pack hamradio
- driver, which could lead to a use-after-free. A local user could
- exploit this to cause a denial of service (memory corruption or
- crash) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1199">CVE-2022-1199</a>
-
- <p>Duoming Zhou discovered race conditions in the AX.25 hamradio
- protocol, which could lead to a use-after-free or null pointer
- dereference. A local user could exploit this to cause a denial of
- service (memory corruption or crash) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1353">CVE-2022-1353</a>
-
- <p>The TCS Robot tool found an information leak in the PF_KEY
- subsystem. A local user can receive a netlink message when an
- IPsec daemon registers with the kernel, and this could include
- sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1516">CVE-2022-1516</a>
-
- <p>A NULL pointer dereference flaw in the implementation of the X.25
- set of standardized network protocols, which can result in denial
- of service.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1729">CVE-2022-1729</a>
-
- <p>Norbert Slusarek discovered a race condition in the perf subsystem
- which could result in local privilege escalation to root. The
- default settings in Debian prevent exploitation unless more
- permissive settings have been applied in the
- kernel.perf_event_paranoid sysctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1734">CVE-2022-1734</a>
-
- <p>Duoming Zhou discovered race conditions in the nfcmrvl NFC driver
- that could lead to a use-after-free, double-free or null pointer
- dereference. A local user might be able to exploit these for
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1974">CVE-2022-1974</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-1975">CVE-2022-1975</a></p>
-
- <p>Duoming Zhou discovered that the NFC netlink interface was
- suspectible to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2153">CVE-2022-2153</a>
-
- <p><q>kangel</q> reported a flaw in the KVM implementation for x86
- processors which could lead to a null pointer dereference. A local
- user permitted to access /dev/kvm could exploit this to cause a
- denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21123">CVE-2022-21123</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-21125">CVE-2022-21125</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-21166">CVE-2022-21166</a></p>
-
- <p>Various researchers discovered flaws in Intel x86 processors,
- collectively referred to as MMIO Stale Data vulnerabilities.
- These are similar to the previously published Microarchitectural
- Data Sampling (MDS) issues and could be exploited by local users
- to leak sensitive information.</p>
-
- <p>For some CPUs, the mitigations for these issues require updated
- microcode. An updated intel-microcode package may be provided at
- a later date. The updated CPU microcode may also be available as
- part of a system firmware ("BIOS") update.</p>
-
- <p>Further information on the mitigation can be found at
- <https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html>
- or in the linux-doc-4.9 package.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23036">CVE-2022-23036</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-23037">CVE-2022-23037</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-23038">CVE-2022-23038</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-23039">CVE-2022-23039</a>,
-<a href="https://security-tracker.debian.org/tracker/CVE-2022-23040">CVE-2022-23040</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-23041">CVE-2022-23041</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-23042">CVE-2022-23042</a> (XSA-396)</p>
-
- <p>Demi Marie Obenour and Simon Gaiser of Invisible Things Lab
- discovered flaws in several Xen PV device frontends. These drivers
- misused the Xen grant table API in a way that could be exploited
- by a malicious device backend to cause data corruption, leaks of
- sensitive information, or a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23960">CVE-2022-23960</a>
-
- <p>Researchers at VUSec discovered that the Branch History Buffer in
- Arm processors can be exploited to create information side channels with speculative execution. This issue is similar to
- Spectre variant 2, but requires additional mitigations on some
- processors.</p>
-
- <p>This can be exploited to obtain sensitive information from a
- different security context, such as from user-space to the kernel,
- or from a KVM guest to the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24958">CVE-2022-24958</a>
-
- <p>A flaw was discovered that the USB gadget subsystem that could
- lead to a use-after-free. A local user permitted to configure USB
- gadgets could exploit this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26490">CVE-2022-26490</a>
-
- <p>Buffer overflows in the STMicroelectronics ST21NFCA core driver
- can result in denial of service or privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26966">CVE-2022-26966</a>
-
- <p>A flaw was discovered in the sr9700 USB networking driver. A local
- user able to attach a specially designed USB device could use this
- to leak sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-27223">CVE-2022-27223</a>
-
- <p>A flaw was discovered in the udc-xilinx USB gadget-mode controller
- driver. On systems using this driver, a malicious USB host could
- exploit this to cause a denial of service (crash or memory
- corruption) or possibly to execute arbitrary code.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28356">CVE-2022-28356</a>
-
- <p><q>Beraphin</q> discovered that the ANSI/IEEE 802.2 LLC type 2 driver did
- not properly perform reference counting on some error paths. A
- local attacker can take advantage of this flaw to cause a denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28390">CVE-2022-28390</a>
-
- <p>A double free vulnerability was discovered in the EMS CPC-USB/ARM7
- CAN/USB interface driver.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30594">CVE-2022-30594</a>
-
- <p>Jann Horn discovered a flaw in the interaction between ptrace and
- seccomp subsystems. A process sandboxed using seccomp() but still
- permitted to use ptrace() could exploit this to remove the seccomp
- restrictions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32250">CVE-2022-32250</a>
-
- <p>Aaron Adams discovered a use-after-free in Netfilter which may
- result in local privilege escalation to root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-33981">CVE-2022-33981</a>
-
- <p>Yuan Ming from Tsinghua University reported a a race condition in
- the floppy driver involving use of the FDRAWCMD ioctl, which could
- lead to a use-after-free. A local user with access to a floppy
- drive device could exploit this to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.
- This ioctl is now disabled by default.</p></li>
-
-</ul>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-4.9.320-2.</p>
-
-<p>For the armhf architecture, this update enables optimised
-implementations of several cryptographic and CRC algorithms. For at
-least AES, this should remove a timing side-channel that could lead to
-a leak of sensitive information.</p>
-
-<p>This update includes many more bug fixes from stable updates
-4.9.304-4.9.320 inclusive. The random driver has been backported from
-Linux 5.19, fixing numerous performance and correctness issues. Some
-changes will be visible:</p>
-
-<p>- The entropy pool size is now 256 bits instead of 4096. You may need
- to adjust the configuration of system monitoring or user-space
- entropy gathering services to allow for this.</p>
-
-<p>- On systems without a hardware RNG, the kernel will log many more
- uses of /dev/urandom before it is fully initialised. These uses
- were previously under-counted and this is not a regression.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3065.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3066.data b/english/lts/security/2022/dla-3066.data
deleted file mode 100644
index 6d5c6694882..00000000000
--- a/english/lts/security/2022/dla-3066.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3066-1 isync</define-tag>
-<define-tag report_date>2022-7-01</define-tag>
-<define-tag secrefs>CVE-2021-3578 CVE-2021-3657 CVE-2021-20247 Bug#983351 Bug#989564</define-tag>
-<define-tag packages>isync</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3066.wml b/english/lts/security/2022/dla-3066.wml
deleted file mode 100644
index 2b223808b2d..00000000000
--- a/english/lts/security/2022/dla-3066.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in isync, an IMAP and
-MailDir mailbox synchronizer. An malicious attacker who can control an IMAP
-server may exploit these flaws for remote code execution.</p>
-
-<p>For Debian 9 stretch, these problems have been fixed in version
-1.2.1-2+deb9u1.</p>
-
-<p>We recommend that you upgrade your isync packages.</p>
-
-<p>For the detailed security status of isync please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/isync">https://security-tracker.debian.org/tracker/isync</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3066.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3067.data b/english/lts/security/2022/dla-3067.data
deleted file mode 100644
index 25dd912d303..00000000000
--- a/english/lts/security/2022/dla-3067.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3067-1 </define-tag>
-<define-tag report_date>2022-07-01</define-tag>
-<define-tag packages></define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3067.wml b/english/lts/security/2022/dla-3067.wml
deleted file mode 100644
index 0b5044dedf6..00000000000
--- a/english/lts/security/2022/dla-3067.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>Debian 9 Long Term Support reaching end-of-life</define-tag>
-<define-tag moreinfo></p>
-<p>
-The Debian Long Term Support (LTS) Team hereby announces that Debian 9
-stretch support has reached its end-of-life on July 1, 2022,
-five years after its initial release on June 17, 2017.
-</p>
-<p>
-Debian will not provide further security updates for Debian 9. A
-subset of stretch packages will be supported by external parties.
-Detailed information can be found at <a href="https://wiki.debian.org/LTS/Extended">Extended LTS</a>.
-</p>
-<p>
-The LTS Team will prepare the transition to Debian 10 buster, which is the
-current oldstable release. The LTS team will take over support from the
-Security Team during August, while the final point update for buster will
-be released during that month.
-</p>
-<p>
-Debian 10 will also receive Long Term Support for five years after its
-initial release with support ending on June 30, 2024. The supported
-architectures will be announced at a later date.
-</p>
-<p>
-For further information about using buster and upgrading from stretch
-LTS, please refer to <a href="https://wiki.debian.org/LTS/Using">LTS/Using</a>.
-</p>
-<p>
-Debian and its LTS Team would like to thank all contributing users,
-developers and sponsors who are making it possible to extend the life
-of previous stable releases, and who have made this LTS a success.
-</p>
-<p>
-If you rely on Debian LTS, please consider <a href="https://wiki.debian.org/LTS/Development">joining the team</a>,
-providing patches, testing or <a href="https://wiki.debian.org/LTS/Funding">funding the efforts</a>.
-</p>
-<p>
-More information about Debian Long Term Support can be found at
-<a href="https://wiki.debian.org/LTS/">the LTS wiki page</a>.
-</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3067.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3068.data b/english/lts/security/2022/dla-3068.data
deleted file mode 100644
index 50c1dbc491f..00000000000
--- a/english/lts/security/2022/dla-3068.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3068-1 xorg-server</define-tag>
-<define-tag report_date>2022-08-04</define-tag>
-<define-tag secrefs>CVE-2022-2319 CVE-2022-2320</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3068.wml b/english/lts/security/2022/dla-3068.wml
deleted file mode 100644
index e62bff8a391..00000000000
--- a/english/lts/security/2022/dla-3068.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jan-Niklas Sohn discovered two out of bound memory writes in X.Org Server's
-ProcXkbSetGeometry and ProcXkbSetDeviceInfo Xkb extensions. These issues
-could be exploited by an attacker to cause denial of service, privilege
-escalation or arbitrary code execution.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.20.4-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3068.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3069.data b/english/lts/security/2022/dla-3069.data
deleted file mode 100644
index e209a8e41d0..00000000000
--- a/english/lts/security/2022/dla-3069.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3069-1 gst-plugins-good1.0</define-tag>
-<define-tag report_date>2022-08-09</define-tag>
-<define-tag secrefs>CVE-2022-1920 CVE-2022-1921 CVE-2022-1922 CVE-2022-1923 CVE-2022-1924 CVE-2022-1925 CVE-2022-2122</define-tag>
-<define-tag packages>gst-plugins-good1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3069.wml b/english/lts/security/2022/dla-3069.wml
deleted file mode 100644
index d686bfcad02..00000000000
--- a/english/lts/security/2022/dla-3069.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in plugins for the GStreamer
-media framework, which may result in denial of service or potentially
-the execution of arbitrary code if a malformed media file is opened.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.14.4-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-good1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-good1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-good1.0">https://security-tracker.debian.org/tracker/gst-plugins-good1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3069.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3070.data b/english/lts/security/2022/dla-3070.data
deleted file mode 100644
index 5ea27dafabc..00000000000
--- a/english/lts/security/2022/dla-3070.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3070-1 gnutls28</define-tag>
-<define-tag report_date>2022-08-11</define-tag>
-<define-tag secrefs>CVE-2021-4209 CVE-2022-2509</define-tag>
-<define-tag packages>gnutls28</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3070.wml b/english/lts/security/2022/dla-3070.wml
deleted file mode 100644
index cf256d637c6..00000000000
--- a/english/lts/security/2022/dla-3070.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues were found in GnuTLS, a library implementing the TLS and SSL
-protocols. A remote attacker could take advantage of these flaws to
-cause an application using the GnuTLS library to crash (denial of
-service), or potentially, to execute arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.6.7-4+deb10u9.</p>
-
-<p>We recommend that you upgrade your gnutls28 packages.</p>
-
-<p>For the detailed security status of gnutls28 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gnutls28">https://security-tracker.debian.org/tracker/gnutls28</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3070.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3071.data b/english/lts/security/2022/dla-3071.data
deleted file mode 100644
index ac5dcb8893c..00000000000
--- a/english/lts/security/2022/dla-3071.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3071-1 libtirpc</define-tag>
-<define-tag report_date>2022-08-11</define-tag>
-<define-tag secrefs>CVE-2021-46828 Bug#1015873</define-tag>
-<define-tag packages>libtirpc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3071.wml b/english/lts/security/2022/dla-3071.wml
deleted file mode 100644
index 2ae5dd76a7e..00000000000
--- a/english/lts/security/2022/dla-3071.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libtirpc, a transport-independent RPC library,
-does not properly handle idle TCP connections. A remote attacker can
-take advantage of this flaw to cause a denial of service.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.1.4-0.4+deb10u1.</p>
-
-<p>We recommend that you upgrade your libtirpc packages.</p>
-
-<p>For the detailed security status of libtirpc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libtirpc">https://security-tracker.debian.org/tracker/libtirpc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3071.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3072.data b/english/lts/security/2022/dla-3072.data
deleted file mode 100644
index f705264eb20..00000000000
--- a/english/lts/security/2022/dla-3072.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3072-1 postgresql-11</define-tag>
-<define-tag report_date>2022-08-11</define-tag>
-<define-tag secrefs>CVE-2022-2625</define-tag>
-<define-tag packages>postgresql-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3072.wml b/english/lts/security/2022/dla-3072.wml
deleted file mode 100644
index 9d47472d3c2..00000000000
--- a/english/lts/security/2022/dla-3072.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sven Klemm found that some extensions in the PostgreSQL database system
-could replace objects not belonging to the extension. An attacker could
-leverage this to run arbitrary commands as another user.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-11.17-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your postgresql-11 packages.</p>
-
-<p>For the detailed security status of postgresql-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3072.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3073.data b/english/lts/security/2022/dla-3073.data
deleted file mode 100644
index a8f99429c6d..00000000000
--- a/english/lts/security/2022/dla-3073.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3073-1 webkit2gtk</define-tag>
-<define-tag report_date>2022-08-17</define-tag>
-<define-tag secrefs>CVE-2022-32792 CVE-2022-32816</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3073.wml b/english/lts/security/2022/dla-3073.wml
deleted file mode 100644
index 181108af0ae..00000000000
--- a/english/lts/security/2022/dla-3073.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32792">CVE-2022-32792</a>
-
- <p>Manfred Paul discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32816">CVE-2022-32816</a>
-
- <p>Dohyun Lee discovered that visiting a website that frames
- malicious content may lead to UI spoofing.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.36.6-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3073.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3074.data b/english/lts/security/2022/dla-3074.data
deleted file mode 100644
index 71eaba3c1f7..00000000000
--- a/english/lts/security/2022/dla-3074.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3074-1 epiphany-browser</define-tag>
-<define-tag report_date>2022-08-18</define-tag>
-<define-tag secrefs>CVE-2021-45085 CVE-2021-45087 CVE-2021-45088 CVE-2022-29536 Bug#1009959</define-tag>
-<define-tag packages>epiphany-browser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3074.wml b/english/lts/security/2022/dla-3074.wml
deleted file mode 100644
index 78a39514123..00000000000
--- a/english/lts/security/2022/dla-3074.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were discovered in Epiphany, the GNOME web browser, allowing
-XSS attacks by malicious websites, or memory corruption and application
-crash by a page with a very long title.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.32.1.2-3~deb10u2.</p>
-
-<p>We recommend that you upgrade your epiphany-browser packages.</p>
-
-<p>For the detailed security status of epiphany-browser please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/epiphany-browser">https://security-tracker.debian.org/tracker/epiphany-browser</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3074.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3075.data b/english/lts/security/2022/dla-3075.data
deleted file mode 100644
index 21ecc6c65de..00000000000
--- a/english/lts/security/2022/dla-3075.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3075-1 schroot</define-tag>
-<define-tag report_date>2022-8-18</define-tag>
-<define-tag secrefs>CVE-2022-2787</define-tag>
-<define-tag packages>schroot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3075.wml b/english/lts/security/2022/dla-3075.wml
deleted file mode 100644
index 8f52a055829..00000000000
--- a/english/lts/security/2022/dla-3075.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Julian Gilbey discovered that schroot, a tool allowing users to execute
-commands in a chroot environment, had too permissive rules on chroot or
-session names, allowing a denial of service on the schroot service for
-all users that may start a schroot session.</p>
-
-<p>Note that existing chroots and sessions are checked during upgrade, and
-an upgrade is aborted if any future invalid name is detected.</p>
-
-<p>Problematic session and chroots can be checked before upgrading with the
-following command:</p>
-
- <p>schroot --list --all | LC_ALL=C grep -vE '^[a-z]+:[a-zA-Z0-9][a-zA-Z0-9_.-]*$'</p>
-
-<p>See
-<url "https://codeberg.org/shelter/reschroot/src/tag/release/reschroot-1.6.13/NEWS#L10-L41">
-for instructions on how to resolve such a situation.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.6.10-6+deb10u1.</p>
-
-<p>We recommend that you upgrade your schroot packages.</p>
-
-<p>For the detailed security status of schroot please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/schroot">https://security-tracker.debian.org/tracker/schroot</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3075.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3076.data b/english/lts/security/2022/dla-3076.data
deleted file mode 100644
index 9435ba2d84e..00000000000
--- a/english/lts/security/2022/dla-3076.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3076-1 freecad</define-tag>
-<define-tag report_date>2022-08-18</define-tag>
-<define-tag secrefs>CVE-2021-45844 Bug#1005747</define-tag>
-<define-tag packages>freecad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3076.wml b/english/lts/security/2022/dla-3076.wml
deleted file mode 100644
index b6c3e25b5a1..00000000000
--- a/english/lts/security/2022/dla-3076.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A command injection vulnerability was found in FreeCAD, a parametric 3D
-modeler, when importing DWG files with crafted filenames.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.18~pre1+dfsg1-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your freecad packages.</p>
-
-<p>For the detailed security status of freecad please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freecad">https://security-tracker.debian.org/tracker/freecad</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3076.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3077.data b/english/lts/security/2022/dla-3077.data
deleted file mode 100644
index c35f65edbba..00000000000
--- a/english/lts/security/2022/dla-3077.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3077-1 ruby-tzinfo</define-tag>
-<define-tag report_date>2022-08-18</define-tag>
-<define-tag secrefs>CVE-2022-31163</define-tag>
-<define-tag packages>ruby-tzinfo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3077.wml b/english/lts/security/2022/dla-3077.wml
deleted file mode 100644
index 29635d1721a..00000000000
--- a/english/lts/security/2022/dla-3077.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential directory traversal
-vulnerablilty in ruby-tzinfo, a timezone library for the Ruby
-programming language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31163">CVE-2022-31163</a>
-
- <p>TZInfo is a Ruby library that provides access to time zone
- data and allows times to be converted using time zone rules.
- Versions prior to 0.36.1, as well as those prior to 1.2.10 when
- used with the Ruby data source tzinfo-data, are vulnerable to
- relative path traversal. With the Ruby data source, time zones
- are defined in Ruby files. There is one file per time zone. Time
- zone files are loaded with `require` on demand. In the affected
- versions, `TZInfo::Timezone.get` fails to validate time zone
- identifiers correctly, allowing a new line character within the
- identifier. With Ruby version 1.9.3 and later,
- `TZInfo::Timezone.get` can be made to load unintended files with
- `require`, executing them within the Ruby process. Versions
- 0.3.61 and 1.2.10 include fixes to correctly validate time zone
- identifiers. Versions 2.0.0 and later are not vulnerable. Version
- 0.3.61 can still load arbitrary files from the Ruby load path if
- their name follows the rules for a valid time zone identifier and
- the file has a prefix of `tzinfo/definition` within a directory
- in the load path. Applications should ensure that untrusted files
- are not placed in a directory on the load path. As a workaround,
- the time zone identifier can be validated before passing to
- `TZInfo::Timezone.get` by ensuring it matches the regular
- expression
- `\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1.2.5-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-tzinfo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3077.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3078.data b/english/lts/security/2022/dla-3078.data
deleted file mode 100644
index c85f7f0d7fd..00000000000
--- a/english/lts/security/2022/dla-3078.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3078-1 kicad</define-tag>
-<define-tag report_date>2022-08-20</define-tag>
-<define-tag secrefs>CVE-2022-23803 CVE-2022-23804 CVE-2022-23946 CVE-2022-23947</define-tag>
-<define-tag packages>kicad</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3078.wml b/english/lts/security/2022/dla-3078.wml
deleted file mode 100644
index 82765838bee..00000000000
--- a/english/lts/security/2022/dla-3078.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>KiCad is a suite of programs for the creation of printed circuit boards.
-It includes a schematic editor, a PCB layout tool, support tools and a 3D
-viewer to display a finished &amp; fully populated PCB.</p>
-
-<p>Several buffer-overflows were discovered in the Gerber Viewer and excellon
-file parser, that could lead to code execution when opening a
-maliciously-crafted file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23803">CVE-2022-23803</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon ReadXYCoord coordinate parsing functionality of KiCad
- EDA.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23804">CVE-2022-23804</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad
- EDA.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23946">CVE-2022-23946</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon GCodeNumber parsing functionality of KiCad EDA.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23947">CVE-2022-23947</a>
-
- <p>A stack-based buffer overflow vulnerability exists in the Gerber Viewer
- gerber and excellon DCodeNumber parsing functionality of KiCad EDA.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.0.2+dfsg1-1+deb10u1.
-These problems were previously dealt with in DLA-2998-1 for Debian 9 stretch,
-but the buster update wasn't applied, at the time.</p>
-
-<p>We recommend that you upgrade your kicad packages.</p>
-
-<p>For the detailed security status of kicad please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/kicad">https://security-tracker.debian.org/tracker/kicad</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3078.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3079.data b/english/lts/security/2022/dla-3079.data
deleted file mode 100644
index a4494177a4b..00000000000
--- a/english/lts/security/2022/dla-3079.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3079-1 jetty9</define-tag>
-<define-tag report_date>2022-8-22</define-tag>
-<define-tag secrefs>CVE-2022-2047 CVE-2022-2048</define-tag>
-<define-tag packages>jetty9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3079.wml b/english/lts/security/2022/dla-3079.wml
deleted file mode 100644
index 51dca1712ef..00000000000
--- a/english/lts/security/2022/dla-3079.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities were discovered in Jetty, a Java servlet engine
-and webserver.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2047">CVE-2022-2047</a>
-
- <p>In Eclipse Jetty the parsing of the authority segment of an http scheme
- URI, the Jetty HttpURI class improperly detects an invalid input as a
- hostname. This can lead to failures in a Proxy scenario.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2048">CVE-2022-2048</a>
-
- <p>In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid
- HTTP/2 request, the error handling has a bug that can wind up not properly
- cleaning up the active connections and associated resources. This can lead
- to a Denial of Service scenario where there are no enough resources left to
- process good requests.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.4.16-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your jetty9 packages.</p>
-
-<p>For the detailed security status of jetty9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/jetty9">https://security-tracker.debian.org/tracker/jetty9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3079.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3080.data b/english/lts/security/2022/dla-3080.data
deleted file mode 100644
index ad6538b1fe6..00000000000
--- a/english/lts/security/2022/dla-3080.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3080-1 firefox-esr</define-tag>
-<define-tag report_date>2022-08-24</define-tag>
-<define-tag secrefs>CVE-2022-38472 CVE-2022-38473 CVE-2022-38478</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3080.wml b/english/lts/security/2022/dla-3080.wml
deleted file mode 100644
index 65ab0a09af5..00000000000
--- a/english/lts/security/2022/dla-3080.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-91.13.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3080.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3081.data b/english/lts/security/2022/dla-3081.data
deleted file mode 100644
index a01ccf08532..00000000000
--- a/english/lts/security/2022/dla-3081.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3081-1 open-vm-tools</define-tag>
-<define-tag report_date>2022-09-02</define-tag>
-<define-tag secrefs>CVE-2022-31676</define-tag>
-<define-tag packages>open-vm-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3081.wml b/english/lts/security/2022/dla-3081.wml
deleted file mode 100644
index 1677e5dd120..00000000000
--- a/english/lts/security/2022/dla-3081.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was discovered in open-vm-tools, an open source
-implementation of VMware Tools, allowing an unprivileged local guest
-user to escalate their privileges as root user in the virtual machine.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:10.3.10-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your open-vm-tools packages.</p>
-
-<p>For the detailed security status of open-vm-tools please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/open-vm-tools">https://security-tracker.debian.org/tracker/open-vm-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3081.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3082.data b/english/lts/security/2022/dla-3082.data
deleted file mode 100644
index 66bf905f320..00000000000
--- a/english/lts/security/2022/dla-3082.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3082-1 exim4</define-tag>
-<define-tag report_date>2022-08-27</define-tag>
-<define-tag secrefs>CVE-2022-37452</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3082.wml b/english/lts/security/2022/dla-3082.wml
deleted file mode 100644
index 4f76f7ed0f9..00000000000
--- a/english/lts/security/2022/dla-3082.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that in Exim, a mail transport agent, handling an
-e-mail can cause a heap-based buffer overflow in some situations. An
-attacker can cause a denial-of-service (DoS) and possibly execute
-arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.92-8+deb10u7.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>For the detailed security status of exim4 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/exim4">https://security-tracker.debian.org/tracker/exim4</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3082.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3083.data b/english/lts/security/2022/dla-3083.data
deleted file mode 100644
index b8ef8040150..00000000000
--- a/english/lts/security/2022/dla-3083.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3083-1 puma</define-tag>
-<define-tag report_date>2022-09-02</define-tag>
-<define-tag secrefs>CVE-2021-29509 CVE-2021-41136 CVE-2022-23634 CVE-2022-24790</define-tag>
-<define-tag packages>puma</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3083.wml b/english/lts/security/2022/dla-3083.wml
deleted file mode 100644
index be3e191b406..00000000000
--- a/english/lts/security/2022/dla-3083.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29509">CVE-2021-29509</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41136">CVE-2021-41136</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23634">CVE-2022-23634</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24790">CVE-2022-24790</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.12.0-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your puma packages.</p>
-
-<p>For the detailed security status of puma please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/puma">https://security-tracker.debian.org/tracker/puma</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3083.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3084.data b/english/lts/security/2022/dla-3084.data
deleted file mode 100644
index 93d88eb7295..00000000000
--- a/english/lts/security/2022/dla-3084.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3084-1 ndpi</define-tag>
-<define-tag report_date>2022-08-28</define-tag>
-<define-tag secrefs>CVE-2020-15472 CVE-2020-15476</define-tag>
-<define-tag packages>ndpi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3084.wml b/english/lts/security/2022/dla-3084.wml
deleted file mode 100644
index 8c8a8670fb0..00000000000
--- a/english/lts/security/2022/dla-3084.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been discovered in ndpi: deep packet inspection
-library.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15472">CVE-2020-15472</a>
-
- <p>H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15476">CVE-2020-15476</a>
-
- <p>Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.6-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your ndpi packages.</p>
-
-<p>For the detailed security status of ndpi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ndpi">https://security-tracker.debian.org/tracker/ndpi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3084.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3085.data b/english/lts/security/2022/dla-3085.data
deleted file mode 100644
index 8d498d488be..00000000000
--- a/english/lts/security/2022/dla-3085.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3085-1 curl</define-tag>
-<define-tag report_date>2022-8-29</define-tag>
-<define-tag secrefs>CVE-2021-22898 CVE-2021-22924 CVE-2021-22946 CVE-2021-22947 CVE-2022-22576 CVE-2022-27776 CVE-2022-27781 CVE-2022-27782 CVE-2022-32206 CVE-2022-32208 Bug#989228 Bug#991492 Bug#1010295 Bug#1010254 Bug#1010253 Bug#1010252</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3085.wml b/english/lts/security/2022/dla-3085.wml
deleted file mode 100644
index ceaa9718ff4..00000000000
--- a/english/lts/security/2022/dla-3085.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in cURL, an URL transfer
-library. These flaws may allow remote attackers to obtain sensitive
-information, leak authentication or cookie header data or facilitate a
-denial of service attack.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.64.0-4+deb10u3.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3085.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3086.data b/english/lts/security/2022/dla-3086.data
deleted file mode 100644
index 7cbf70d2707..00000000000
--- a/english/lts/security/2022/dla-3086.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3086-1 maven-shared-utils</define-tag>
-<define-tag report_date>2022-8-29</define-tag>
-<define-tag secrefs>CVE-2022-29599 Bug#1012314</define-tag>
-<define-tag packages>maven-shared-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3086.wml b/english/lts/security/2022/dla-3086.wml
deleted file mode 100644
index fc4548e4727..00000000000
--- a/english/lts/security/2022/dla-3086.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Commandline class in maven-shared-utils, a
-collection of various utility classes for the Maven build system, can emit
-double-quoted strings without proper escaping, allowing shell injection
-attacks.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.3.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your maven-shared-utils packages.</p>
-
-<p>For the detailed security status of maven-shared-utils please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/maven-shared-utils">https://security-tracker.debian.org/tracker/maven-shared-utils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3086.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3087.data b/english/lts/security/2022/dla-3087.data
deleted file mode 100644
index a2c3f09958e..00000000000
--- a/english/lts/security/2022/dla-3087.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3087-1 webkit2gtk</define-tag>
-<define-tag report_date>2022-09-05</define-tag>
-<define-tag secrefs>CVE-2022-32893</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3087.wml b/english/lts/security/2022/dla-3087.wml
deleted file mode 100644
index e229caf7423..00000000000
--- a/english/lts/security/2022/dla-3087.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32893">CVE-2022-32893</a>
-
- <p>An anonymous researcher discovered that processing maliciously
- crafted web content may lead to arbitrary code execution. Apple is
- aware of a report that this issue may have been actively
- exploited.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.36.7-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3087.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3088.data b/english/lts/security/2022/dla-3088.data
deleted file mode 100644
index 756af683a19..00000000000
--- a/english/lts/security/2022/dla-3088.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3088-1 net-snmp</define-tag>
-<define-tag report_date>2022-8-30</define-tag>
-<define-tag secrefs>CVE-2022-24805 CVE-2022-24806 CVE-2022-24807 CVE-2022-24808 CVE-2022-24809 CVE-2022-24810</define-tag>
-<define-tag packages>net-snmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3088.wml b/english/lts/security/2022/dla-3088.wml
deleted file mode 100644
index a07b94716b5..00000000000
--- a/english/lts/security/2022/dla-3088.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Yu Zhang and Nanyu Zhong discovered several vulnerabilities in net-snmp, a
-suite of Simple Network Management Protocol applications, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.7.3+dfsg-5+deb10u3.</p>
-
-<p>We recommend that you upgrade your net-snmp packages.</p>
-
-<p>For the detailed security status of net-snmp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/net-snmp">https://security-tracker.debian.org/tracker/net-snmp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3088.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3089.data b/english/lts/security/2022/dla-3089.data
deleted file mode 100644
index 65b707bc07b..00000000000
--- a/english/lts/security/2022/dla-3089.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3089-1 php-horde-mime-viewer</define-tag>
-<define-tag report_date>2022-08-31</define-tag>
-<define-tag secrefs>CVE-2022-26874</define-tag>
-<define-tag packages>php-horde-mime-viewer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3089.wml b/english/lts/security/2022/dla-3089.wml
deleted file mode 100644
index 5f0c90b1184..00000000000
--- a/english/lts/security/2022/dla-3089.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential XSS vulnerability in
-php-horde-mime-viewer, a MIME viewer library for the Horde groupware
-platform.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26874">CVE-2022-26874</a>
-
- <p>lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows
- XSS via an OpenOffice document, leading to account takeover in Horde
- Groupware Webmail Edition. This occurs after XSLT rendering.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-2.2.2-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your php-horde-mime-viewer packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3089.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3090.data b/english/lts/security/2022/dla-3090.data
deleted file mode 100644
index fb690bbc8c8..00000000000
--- a/english/lts/security/2022/dla-3090.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3090-1 php-horde-turba</define-tag>
-<define-tag report_date>2022-08-31</define-tag>
-<define-tag secrefs>CVE-2022-30287</define-tag>
-<define-tag packages>php-horde-turba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3090.wml b/english/lts/security/2022/dla-3090.wml
deleted file mode 100644
index f4fd1116b45..00000000000
--- a/english/lts/security/2022/dla-3090.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an arbitrary object deserialization
-vulnerability in php-horde-turba, an address book component for the Horde
-groupware suite.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30287">CVE-2022-30287</a>
-
- <p>Horde Groupware Webmail Edition through 5.2.22 allows a reflection
- injection attack through which an attacker can instantiate a driver class.
- This then leads to arbitrary deserialization of PHP objects.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-4.2.23-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your php-horde-turba packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3090.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3091.data b/english/lts/security/2022/dla-3091.data
deleted file mode 100644
index 944e56ba0df..00000000000
--- a/english/lts/security/2022/dla-3091.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3091-1 sofia-sip</define-tag>
-<define-tag report_date>2022-09-02</define-tag>
-<define-tag secrefs>CVE-2022-31001 CVE-2022-31002 CVE-2022-31003</define-tag>
-<define-tag packages>sofia-sip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3091.wml b/english/lts/security/2022/dla-3091.wml
deleted file mode 100644
index 26e9d9bb80d..00000000000
--- a/english/lts/security/2022/dla-3091.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31001">CVE-2022-31001</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31002">CVE-2022-31002</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31003">CVE-2022-31003</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.12.11+20110422.1-2.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your sofia-sip packages.</p>
-
-<p>For the detailed security status of sofia-sip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sofia-sip">https://security-tracker.debian.org/tracker/sofia-sip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3091.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3092.data b/english/lts/security/2022/dla-3092.data
deleted file mode 100644
index 0e468eb79a0..00000000000
--- a/english/lts/security/2022/dla-3092.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3092-1 dpdk</define-tag>
-<define-tag report_date>2022-9-02</define-tag>
-<define-tag secrefs>CVE-2022-2132</define-tag>
-<define-tag packages>dpdk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3092.wml b/english/lts/security/2022/dla-3092.wml
deleted file mode 100644
index 12aa72101ab..00000000000
--- a/english/lts/security/2022/dla-3092.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow was discovered in the vhost code of DPDK,
-a set of libraries for fast packet processing, which could result
-in denial of service or the execution of arbitrary code by malicious
-guests/containers.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-18.11.11-1~deb10u2.</p>
-
-<p>We recommend that you upgrade your dpdk packages.</p>
-
-<p>For the detailed security status of dpdk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/dpdk">https://security-tracker.debian.org/tracker/dpdk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3092.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3093-2.data b/english/lts/security/2022/dla-3093-2.data
deleted file mode 100644
index 34285c3cd99..00000000000
--- a/english/lts/security/2022/dla-3093-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3093-2 rails</define-tag>
-<define-tag report_date>2022-10-02</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3093-2.wml b/english/lts/security/2022/dla-3093-2.wml
deleted file mode 100644
index f6e6e3e37d1..00000000000
--- a/english/lts/security/2022/dla-3093-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update announced as DLA 3093-1 which included fix
-for <a href="https://security-tracker.debian.org/tracker/CVE-2022-32224">CVE-2022-32224</a> caused a regression due to incompatibility with
-ruby 2.5 version. We have dropped aforementioned fix. Updated rails
-packages are now available.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:5.2.2.1+dfsg-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>For the detailed security status of rails please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rails">https://security-tracker.debian.org/tracker/rails</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3093-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3093.data b/english/lts/security/2022/dla-3093.data
deleted file mode 100644
index 40357cd21f9..00000000000
--- a/english/lts/security/2022/dla-3093.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3093-1 rails</define-tag>
-<define-tag report_date>2022-09-13</define-tag>
-<define-tag secrefs>CVE-2022-21831 CVE-2022-22577 CVE-2022-23633 CVE-2022-27777 CVE-2022-32224</define-tag>
-<define-tag packages>rails</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3093.wml b/english/lts/security/2022/dla-3093.wml
deleted file mode 100644
index 9f9e0465984..00000000000
--- a/english/lts/security/2022/dla-3093.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in rails, a ruby
-based MVC frame work for web development.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21831">CVE-2022-21831</a>
-
- <p>A code injection vulnerability exists in the Active Storage that
- could allow an attacker to execute code via image_processing
- arguments.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-22577">CVE-2022-22577</a>
-
- <p>An XSS Vulnerability in Action Pack that could allow an attacker
- to bypass CSP for non HTML like responses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23633">CVE-2022-23633</a>
-
- <p>Action Pack is a framework for handling and responding to web
- requests. Under certain circumstances response bodies will not be
- closed. In the event a response is *not* notified of a `close`,
- `ActionDispatch::Executor` will not know to reset thread local
- state for the next request. This can lead to data being leaked to
- subsequent requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-27777">CVE-2022-27777</a>
-
- <p>A XSS Vulnerability in Action View tag helpers which would allow
- an attacker to inject content if able to control input into
- specific attributes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32224">CVE-2022-32224</a>
-
- <p>When serialized columns that use YAML (the default) are
- deserialized, Rails uses YAML.unsafe_load to convert the YAML data
- in to Ruby objects. If an attacker can manipulate data in the
- database (via means like SQL injection), then it may be possible
- for the attacker to escalate to an RCE.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:5.2.2.1+dfsg-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your rails packages.</p>
-
-<p>For the detailed security status of rails please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rails">https://security-tracker.debian.org/tracker/rails</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3093.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3094.data b/english/lts/security/2022/dla-3094.data
deleted file mode 100644
index fbb26303d5d..00000000000
--- a/english/lts/security/2022/dla-3094.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3094-1 flac</define-tag>
-<define-tag report_date>2022-09-04</define-tag>
-<define-tag secrefs>CVE-2021-0561 Bug#1006339</define-tag>
-<define-tag packages>flac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3094.wml b/english/lts/security/2022/dla-3094.wml
deleted file mode 100644
index 3ef60833ef2..00000000000
--- a/english/lts/security/2022/dla-3094.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is
-a possible out of bounds write due to a missing bounds check. This
-could lead to local information disclosure with no additional
-execution privileges needed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.2-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your flac packages.</p>
-
-<p>For the detailed security status of flac please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/flac">https://security-tracker.debian.org/tracker/flac</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3094.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3095.data b/english/lts/security/2022/dla-3095.data
deleted file mode 100644
index 93650c7957b..00000000000
--- a/english/lts/security/2022/dla-3095.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3095-1 ruby-rack</define-tag>
-<define-tag report_date>2022-09-04</define-tag>
-<define-tag secrefs>CVE-2022-30122 CVE-2022-30123</define-tag>
-<define-tag packages>ruby-rack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3095.wml b/english/lts/security/2022/dla-3095.wml
deleted file mode 100644
index 170d47262e0..00000000000
--- a/english/lts/security/2022/dla-3095.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in `ruby-rack`, a popular Ruby
-webserver:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30122">CVE-2022-30122</a>:
-
- <p>Prevent a Denial of Service (DoS) vulnerability in the HTTP
- multipart parsing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30123">CVE-2022-30123</a>:
-
- <p>Prevent a potential shell escape sequence injection
- vulnerability that could be triggered through the logging system.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.6-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-rack packages.</p>
-
-<p>For the detailed security status of ruby-rack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rack">https://security-tracker.debian.org/tracker/ruby-rack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3095.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3096.data b/english/lts/security/2022/dla-3096.data
deleted file mode 100644
index 791fa0fbe26..00000000000
--- a/english/lts/security/2022/dla-3096.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3096-1 ghostscript</define-tag>
-<define-tag report_date>2022-9-04</define-tag>
-<define-tag secrefs>CVE-2020-27792</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3096.wml b/english/lts/security/2022/dla-3096.wml
deleted file mode 100644
index ccc5fb4c045..00000000000
--- a/english/lts/security/2022/dla-3096.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer over write vulnerability was found in GhostScript, the GPL
-PostScript/PDF interpreter. An attacker could trick a user to open a crafted
-PDF file, triggering the heap buffer overflow that could lead to memory
-corruption or a denial of service.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-9.27~dfsg-2+deb10u6.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>For the detailed security status of ghostscript please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3096.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3097.data b/english/lts/security/2022/dla-3097.data
deleted file mode 100644
index 3a80c6b54c2..00000000000
--- a/english/lts/security/2022/dla-3097.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3097-1 thunderbird</define-tag>
-<define-tag report_date>2022-09-04</define-tag>
-<define-tag secrefs>CVE-2022-38472 CVE-2022-38473 CVE-2022-38478</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3097.wml b/english/lts/security/2022/dla-3097.wml
deleted file mode 100644
index 6123aad493f..00000000000
--- a/english/lts/security/2022/dla-3097.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:91.13.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3097.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3098.data b/english/lts/security/2022/dla-3098.data
deleted file mode 100644
index 708f576e26e..00000000000
--- a/english/lts/security/2022/dla-3098.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3098-1 libmodbus</define-tag>
-<define-tag report_date>2022-9-04</define-tag>
-<define-tag secrefs>CVE-2022-0367</define-tag>
-<define-tag packages>libmodbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3098.wml b/english/lts/security/2022/dla-3098.wml
deleted file mode 100644
index 88c516390ee..00000000000
--- a/english/lts/security/2022/dla-3098.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A heap-based buffer overflow flaw was found in libmodbus, a library for the
-Modbus protocol, which can be abused for a denial of service attack or
-memory corruption.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.1.4-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your libmodbus packages.</p>
-
-<p>For the detailed security status of libmodbus please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libmodbus">https://security-tracker.debian.org/tracker/libmodbus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3098.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3099.data b/english/lts/security/2022/dla-3099.data
deleted file mode 100644
index 5138308d4a0..00000000000
--- a/english/lts/security/2022/dla-3099.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3099-1 qemu</define-tag>
-<define-tag report_date>2022-09-05</define-tag>
-<define-tag secrefs>CVE-2020-13253 CVE-2020-15469 CVE-2020-15859 CVE-2020-25084 CVE-2020-25085 CVE-2020-25624 CVE-2020-25625 CVE-2020-25723 CVE-2020-27617 CVE-2020-27821 CVE-2020-28916 CVE-2020-29129 CVE-2020-29443 CVE-2020-35504 CVE-2020-35505 CVE-2021-3392 CVE-2021-3416 CVE-2021-3507 CVE-2021-3527 CVE-2021-3582 CVE-2021-3607 CVE-2021-3608 CVE-2021-3682 CVE-2021-3713 CVE-2021-3748 CVE-2021-3930 CVE-2021-4206 CVE-2021-4207 CVE-2021-20181 CVE-2021-20196 CVE-2021-20203 CVE-2021-20221 CVE-2021-20257 CVE-2022-26354 CVE-2022-35414</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3099.wml b/english/lts/security/2022/dla-3099.wml
deleted file mode 100644
index e88dcc682f5..00000000000
--- a/english/lts/security/2022/dla-3099.wml
+++ /dev/null
@@ -1,165 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13253">CVE-2020-13253</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15469">CVE-2020-15469</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15859">CVE-2020-15859</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25084">CVE-2020-25084</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25085">CVE-2020-25085</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25624">CVE-2020-25624</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25625">CVE-2020-25625</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25723">CVE-2020-25723</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27617">CVE-2020-27617</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27821">CVE-2020-27821</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28916">CVE-2020-28916</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29129">CVE-2020-29129</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29443">CVE-2020-29443</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35504">CVE-2020-35504</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35505">CVE-2020-35505</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3392">CVE-2021-3392</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3416">CVE-2021-3416</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3507">CVE-2021-3507</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3527">CVE-2021-3527</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3582">CVE-2021-3582</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3607">CVE-2021-3607</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3608">CVE-2021-3608</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3682">CVE-2021-3682</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3713">CVE-2021-3713</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3748">CVE-2021-3748</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3930">CVE-2021-3930</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4206">CVE-2021-4206</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4207">CVE-2021-4207</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20181">CVE-2021-20181</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20196">CVE-2021-20196</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20203">CVE-2021-20203</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20221">CVE-2021-20221</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20257">CVE-2021-20257</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26354">CVE-2022-26354</a>
-
- <p>Description</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-35414">CVE-2022-35414</a>
-
- <p>Description</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.1+dfsg-8+deb10u9.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3099.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3100.data b/english/lts/security/2022/dla-3100.data
deleted file mode 100644
index 295e6315f4c..00000000000
--- a/english/lts/security/2022/dla-3100.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3100-1 libgoogle-gson-java</define-tag>
-<define-tag report_date>2022-9-07</define-tag>
-<define-tag secrefs>CVE-2022-25647 Bug#1010670</define-tag>
-<define-tag packages>libgoogle-gson-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3100.wml b/english/lts/security/2022/dla-3100.wml
deleted file mode 100644
index ba12ca84087..00000000000
--- a/english/lts/security/2022/dla-3100.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Gson, a Java library that can be used to convert Java
-Objects into their JSON representations and vice versa, was vulnerable to a deserialization flaw. An application would de-serialize untrusted data without
-sufficiently verifying that the resulting data will be valid, letting the
-attacker to control the state or the flow of the execution. This can lead to a
-denial of service or even the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.8.5-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your libgoogle-gson-java packages.</p>
-
-<p>For the detailed security status of libgoogle-gson-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libgoogle-gson-java">https://security-tracker.debian.org/tracker/libgoogle-gson-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3100.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3101.data b/english/lts/security/2022/dla-3101.data
deleted file mode 100644
index 93d06840221..00000000000
--- a/english/lts/security/2022/dla-3101.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3101-1 libxslt</define-tag>
-<define-tag report_date>2022-09-09</define-tag>
-<define-tag secrefs>CVE-2019-5815 CVE-2021-30560</define-tag>
-<define-tag packages>libxslt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3101.wml b/english/lts/security/2022/dla-3101.wml
deleted file mode 100644
index 6a61a686bdd..00000000000
--- a/english/lts/security/2022/dla-3101.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in libxslt, an XSLT processing
-runtime library, that could result in denial of service or potentially
-the execution of arbitrary code if malicious files are processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.1.32-2.2~deb10u2.</p>
-
-<p>We recommend that you upgrade your libxslt packages.</p>
-
-<p>For the detailed security status of libxslt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxslt">https://security-tracker.debian.org/tracker/libxslt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3101.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3102.data b/english/lts/security/2022/dla-3102.data
deleted file mode 100644
index 24e6df0b5bd..00000000000
--- a/english/lts/security/2022/dla-3102.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3102-1 linux-5.10</define-tag>
-<define-tag report_date>2022-9-11</define-tag>
-<define-tag secrefs>CVE-2022-2585 CVE-2022-2586 CVE-2022-2588 CVE-2022-26373 CVE-2022-29900 CVE-2022-29901 CVE-2022-36879 CVE-2022-36946</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3102.wml b/english/lts/security/2022/dla-3102.wml
deleted file mode 100644
index 4f6d86ba44e..00000000000
--- a/english/lts/security/2022/dla-3102.wml
+++ /dev/null
@@ -1,127 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Linux 5.10 has been packaged for Debian 10 as linux-5.10. This
-provides a supported upgrade path for systems that currently use
-kernel packages from the "buster-backports" suite.</p>
-
-<p>There is no need to upgrade systems using Linux 4.19, as that kernel
-version will also continue to be supported in the LTS period.</p>
-
-<p>The "apt full-upgrade" command will <em>not</em> automatically install the
-updated kernel packages. You should explicitly install one of the
-following metapackages first, as appropriate for your system:</p>
-
-<ul>
-<li>linux-image-5.10-686</li>
-<li>linux-image-5.10-686-pae</li>
-<li>linux-image-5.10-amd64</li>
-<li>linux-image-5.10-arm64</li>
-<li>linux-image-5.10-armmp</li>
-<li>linux-image-5.10-armmp-lpae</li>
-<li>linux-image-5.10-cloud-amd64</li>
-<li>linux-image-5.10-cloud-arm64</li>
-<li>linux-image-5.10-rt-686-pae</li>
-<li>linux-image-5.10-rt-amd64</li>
-<li>linux-image-5.10-rt-arm64</li>
-<li>linux-image-5.10-rt-armmp</li>
-</ul>
-
-<p>For example, if the command "uname -r" currently shows
-"5.10.0-0.deb10.16-amd64", you should install linux-image-5.10-amd64.</p>
-
-<p>This backport does not include the following binary packages:</p>
-
-<blockquote><div>bpftool hyperv-daemons libcpupower-dev libcpupower1
-linux-compiler-gcc-8-arm linux-compiler-gcc-8-x86 linux-cpupower
-linux-libc-dev usbip</div></blockquote>
-
-<p>Older versions of most of those are built from the linux source
-package in Debian 10.</p>
-
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2585">CVE-2022-2585</a>
-
- <p>A use-after-free flaw in the implementation of POSIX CPU timers
- may result in denial of service or in local privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2586">CVE-2022-2586</a>
-
- <p>A use-after-free in the Netfilter subsystem may result in local
- privilege escalation for a user with the CAP_NET_ADMIN capability
- in any user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2588">CVE-2022-2588</a>
-
- <p>Zhenpeng Lin discovered a use-after-free flaw in the cls_route
- filter implementation which may result in local privilege
- escalation for a user with the CAP_NET_ADMIN capability in any
- user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26373">CVE-2022-26373</a>
-
- <p>It was discovered that on certain processors with Intel's Enhanced
- Indirect Branch Restricted Speculation (eIBRS) capabilities there
- are exceptions to the documented properties in some situations,
- which may result in information disclosure.</p>
-
- <p>Intel's explanation of the issue can be found at
- <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29900">CVE-2022-29900</a>
-
- <p>Johannes Wikner and Kaveh Razavi reported that for AMD/Hygon
- processors, mis-trained branch predictions for return instructions
- may allow arbitrary speculative code execution under certain
- microarchitecture-dependent conditions.</p>
-
- <p>A list of affected AMD CPU types can be found at
- <a href="https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29901">CVE-2022-29901</a>
-
- <p>Johannes Wikner and Kaveh Razavi reported that for Intel
- processors (Intel Core generation 6, 7 and 8), protections against
- speculative branch target injection attacks were insufficient in
- some circumstances, which may allow arbitrary speculative code
- execution under certain microarchitecture-dependent conditions.</p>
-
- <p>More information can be found at
- <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36879">CVE-2022-36879</a>
-
- <p>A flaw was discovered in xfrm_expand_policies in the xfrm
- subsystem which can cause a reference count to be dropped twice.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36946">CVE-2022-36946</a>
-
- <p>Domingo Dirutigliano and Nicola Guerrera reported a memory
- corruption flaw in the Netfilter subsystem which may result in
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.136-1~deb10u3. This update additionally includes many more bug
-fixes from stable updates 5.10.128-5.10.136 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3102.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3103.data b/english/lts/security/2022/dla-3103.data
deleted file mode 100644
index 08d7a0b3cf1..00000000000
--- a/english/lts/security/2022/dla-3103.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3103-1 zlib</define-tag>
-<define-tag report_date>2022-09-12</define-tag>
-<define-tag secrefs>CVE-2022-37434 Bug#1016710</define-tag>
-<define-tag packages>zlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3103.wml b/english/lts/security/2022/dla-3103.wml
deleted file mode 100644
index 11d6272c273..00000000000
--- a/english/lts/security/2022/dla-3103.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Evgeny Legerov reported a heap-based buffer overflow vulnerability in
-the inflate operation in zlib, which could result in denial of service
-or potentially the execution of arbitrary code if specially crafted
-input is processed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:1.2.11.dfsg-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your zlib packages.</p>
-
-<p>For the detailed security status of zlib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zlib">https://security-tracker.debian.org/tracker/zlib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3103.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3104.data b/english/lts/security/2022/dla-3104.data
deleted file mode 100644
index bc4e51149c7..00000000000
--- a/english/lts/security/2022/dla-3104.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3104-1 paramiko</define-tag>
-<define-tag report_date>2022-09-12</define-tag>
-<define-tag secrefs>CVE-2022-24302</define-tag>
-<define-tag packages>paramiko</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3104.wml b/english/lts/security/2022/dla-3104.wml
deleted file mode 100644
index 7d8367d1505..00000000000
--- a/english/lts/security/2022/dla-3104.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential race condition in Paramiko, a
-pure-Python implementation of the SSH algorithm. In particular, unauthorised
-information disclosure could have occurred during the creation of SSH private
-keys.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24302">CVE-2022-24302</a>
-
- <p>In Paramiko before 2.10.1, a race condition (between creation and chmod)
- in the write_private_key_file function could allow unauthorized information
- disclosure.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-2.4.2-0.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your paramiko packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3104.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3105.data b/english/lts/security/2022/dla-3105.data
deleted file mode 100644
index cdd8f7064a1..00000000000
--- a/english/lts/security/2022/dla-3105.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3105-1 connman</define-tag>
-<define-tag report_date>2022-09-13</define-tag>
-<define-tag secrefs>CVE-2022-32292 CVE-2022-32293</define-tag>
-<define-tag packages>connman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3105.wml b/english/lts/security/2022/dla-3105.wml
deleted file mode 100644
index 185cd392197..00000000000
--- a/english/lts/security/2022/dla-3105.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two issues in connman, a daemon for
-managing internet connections within embedded devices:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32292">CVE-2022-32292</a>
-
- <p>In ConnMan through 1.41, remote attackers able to send HTTP requests to
- the gweb component are able to exploit a heap-based buffer overflow in
- received_data to execute code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32292">CVE-2022-32292</a>
-
- <p>In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP
- query could be used to trigger a use-after-free in WISPR handling, leading
- to crashes or code execution.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1.36-2.1~deb10u3.</p>
-
-<p>We recommend that you upgrade your connman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3105.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3106.data b/english/lts/security/2022/dla-3106.data
deleted file mode 100644
index 6bd9eb23479..00000000000
--- a/english/lts/security/2022/dla-3106.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3106-1 python-oslo.utils</define-tag>
-<define-tag report_date>2022-09-13</define-tag>
-<define-tag secrefs>CVE-2022-0718</define-tag>
-<define-tag packages>python-oslo.utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3106.wml b/english/lts/security/2022/dla-3106.wml
deleted file mode 100644
index 8df3795b65f..00000000000
--- a/english/lts/security/2022/dla-3106.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was credential disclosure vulnerability
-python-oslo.utils, a set of utilities used by OpenStack.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0718">CVE-2022-0718</a>
-
- <p>A flaw was found in python-oslo-utils. Due to improper parsing,
- passwords with a double quote ( " ) in them cause incorrect masking in
- debug logs, causing any part of the password after the double quote to be
- plaintext.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-3.36.5-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your python-oslo.utils packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3106.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3107.data b/english/lts/security/2022/dla-3107.data
deleted file mode 100644
index e05ac4d603e..00000000000
--- a/english/lts/security/2022/dla-3107.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3107-1 sqlite3</define-tag>
-<define-tag report_date>2022-09-13</define-tag>
-<define-tag secrefs>CVE-2020-35525 CVE-2020-35527</define-tag>
-<define-tag packages>sqlite3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3107.wml b/english/lts/security/2022/dla-3107.wml
deleted file mode 100644
index 71a7ab2c9db..00000000000
--- a/english/lts/security/2022/dla-3107.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Three issues were discovered in SQLite, a popular embedded database:</p>
-
-<ul><li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35525">CVE-2020-35525</a>: Prevent a potential null pointer deference issue in INTERSEC query processing.</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35527">CVE-2020-35527</a>: Prevent an out-of-bounds access issue that could be exploited via ALTER TABLE in views that have a nested FROM clauses.</li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-3.27.2-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your sqlite3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3107.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3108.data b/english/lts/security/2022/dla-3108.data
deleted file mode 100644
index b01b8cb7b1b..00000000000
--- a/english/lts/security/2022/dla-3108.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3108-1 pcs</define-tag>
-<define-tag report_date>2022-09-15</define-tag>
-<define-tag secrefs>CVE-2022-1049</define-tag>
-<define-tag packages>pcs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3108.wml b/english/lts/security/2022/dla-3108.wml
deleted file mode 100644
index c8c078d716d..00000000000
--- a/english/lts/security/2022/dla-3108.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue was discovered in pcs, a corosync and pacemaker
-configuration tool:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1049">CVE-2022-1049</a>
-
- <p>It was discovered that expired accounts were still able to login via PAM.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.10.1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your pcs packages.</p>
-
-<p>For the detailed security status of pcs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pcs">https://security-tracker.debian.org/tracker/pcs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3108.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3109.data b/english/lts/security/2022/dla-3109.data
deleted file mode 100644
index cd73276d858..00000000000
--- a/english/lts/security/2022/dla-3109.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3109-1 nova</define-tag>
-<define-tag report_date>2022-09-15</define-tag>
-<define-tag secrefs>CVE-2019-14433 Bug#934114</define-tag>
-<define-tag packages>nova</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3109.wml b/english/lts/security/2022/dla-3109.wml
deleted file mode 100644
index 20b01f9d0cb..00000000000
--- a/english/lts/security/2022/dla-3109.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that authenticated users could trigger a fault in Nova, a
-cloud computing fabric controller, to cause information leak.</p>
-
-<p>In addition, this update includes some fixes for volume live migration,
-as well as the addition of a /healthcheck URL for monitoring.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:18.1.0-6+deb10u1.</p>
-
-<p>We recommend that you upgrade your nova packages.</p>
-
-<p>For the detailed security status of nova please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nova">https://security-tracker.debian.org/tracker/nova</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3109.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3110.data b/english/lts/security/2022/dla-3110.data
deleted file mode 100644
index 6bb11dd4517..00000000000
--- a/english/lts/security/2022/dla-3110.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3110-1 glib2.0</define-tag>
-<define-tag report_date>2022-09-15</define-tag>
-<define-tag secrefs>CVE-2021-3800</define-tag>
-<define-tag packages>glib2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3110.wml b/english/lts/security/2022/dla-3110.wml
deleted file mode 100644
index d31b9db5e1a..00000000000
--- a/english/lts/security/2022/dla-3110.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that GLib, a general-purpose portable utility library,
-could be used to print partial contents from arbitrary files. This
-could be exploited from setuid binaries linking to GLib for information
-disclosure of files with a specific format.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.58.3-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your glib2.0 packages.</p>
-
-<p>For the detailed security status of glib2.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/glib2.0">https://security-tracker.debian.org/tracker/glib2.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3110.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3111.data b/english/lts/security/2022/dla-3111.data
deleted file mode 100644
index 50300fdd4fc..00000000000
--- a/english/lts/security/2022/dla-3111.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3111-1 mod-wsgi</define-tag>
-<define-tag report_date>2022-9-15</define-tag>
-<define-tag secrefs>CVE-2022-2255</define-tag>
-<define-tag packages>mod-wsgi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3111.wml b/english/lts/security/2022/dla-3111.wml
deleted file mode 100644
index 5aa794973c5..00000000000
--- a/english/lts/security/2022/dla-3111.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in mod-wsgi, a Python WSGI adapter module for
-Apache. A request from an untrusted proxy does not remove the X-Client-IP
-header and thus allowing this header to be passed to the target WSGI application.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.6.5-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your mod-wsgi packages.</p>
-
-<p>For the detailed security status of mod-wsgi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mod-wsgi">https://security-tracker.debian.org/tracker/mod-wsgi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3111.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3112.data b/english/lts/security/2022/dla-3112.data
deleted file mode 100644
index 278ae510bdb..00000000000
--- a/english/lts/security/2022/dla-3112.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3112-1 bzip2</define-tag>
-<define-tag report_date>2022-09-16</define-tag>
-<define-tag secrefs>Bug#944557 Bug#965309</define-tag>
-<define-tag packages>bzip2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3112.wml b/english/lts/security/2022/dla-3112.wml
deleted file mode 100644
index ce2a583deec..00000000000
--- a/english/lts/security/2022/dla-3112.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes bzdiff when using it with two compressed files. It also
-includes a fix to support large files on 32 bit systems.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.6-9.2~deb10u2.</p>
-
-<p>We recommend that you upgrade your bzip2 packages.</p>
-
-<p>For the detailed security status of bzip2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bzip2">https://security-tracker.debian.org/tracker/bzip2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3112.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3113.data b/english/lts/security/2022/dla-3113.data
deleted file mode 100644
index 47896d5480a..00000000000
--- a/english/lts/security/2022/dla-3113.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3113-1 libraw</define-tag>
-<define-tag report_date>2022-9-16</define-tag>
-<define-tag secrefs>CVE-2020-35530 CVE-2020-35531 CVE-2020-35532 CVE-2020-35533</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3113.wml b/english/lts/security/2022/dla-3113.wml
deleted file mode 100644
index bb6623e54ac..00000000000
--- a/english/lts/security/2022/dla-3113.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple file parsing vulnerabilities have been fixed in libraw. They are
-concerned with the dng and x3f formats. </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35530">CVE-2020-35530</a>
-
- <p>There is an out-of-bounds write vulnerability within the "<code>new_node()</code>"
- function (<code>src/x3f/x3f_utils_patched.cpp</code>) that can be triggered via a
- crafted X3F file. Reported by github user 0xfoxone.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35531">CVE-2020-35531</a>
-
- <p>An out-of-bounds read vulnerability exists within the
- <code>get_huffman_diff()</code> function (<code>src/x3f/x3f_utils_patched.cpp</code>) when
- reading data from an image file. Reported by github user GirlElecta.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35532">CVE-2020-35532</a>
-
- <p>An out-of-bounds read vulnerability exists within the
- "<code>simple_decode_row()</code>" function (<code>src/x3f/x3f_utils_patched.cpp</code>) which
- can be triggered via an image with a large <code>row_stride</code> field.
- Reported by github user GirlElecta.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35533">CVE-2020-35533</a>
-
- <p>An out-of-bounds read vulnerability exists within the
- "<code>LibRaw::adobe_copy_pixel()</code>" function (<code>src/decoders/dng.cpp</code>) when
- reading data from the image file. Reported by github user GirlElecta.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.19.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>For the detailed security status of libraw please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libraw">https://security-tracker.debian.org/tracker/libraw</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3113.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3114-2.data b/english/lts/security/2022/dla-3114-2.data
deleted file mode 100644
index 04dce56e99a..00000000000
--- a/english/lts/security/2022/dla-3114-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3114-2 mariadb-10.3</define-tag>
-<define-tag report_date>2022-09-30</define-tag>
-<define-tag secrefs>Bug#1020301</define-tag>
-<define-tag packages>mariadb-10.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3114-2.wml b/english/lts/security/2022/dla-3114-2.wml
deleted file mode 100644
index f6e2c43e666..00000000000
--- a/english/lts/security/2022/dla-3114-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The update for mariadb-10.3 released as DLA-3114 introduced a bug in the
-mariadb-server-10.3 package, that could cause installation failures when
-installing or updating plugin packages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:10.3.36-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your mariadb-10.3 packages.</p>
-
-<p>For the detailed security status of mariadb-10.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.3">https://security-tracker.debian.org/tracker/mariadb-10.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3114-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3114.data b/english/lts/security/2022/dla-3114.data
deleted file mode 100644
index 8c4a963806f..00000000000
--- a/english/lts/security/2022/dla-3114.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3114-1 mariadb-10.3</define-tag>
-<define-tag report_date>2022-09-16</define-tag>
-<define-tag secrefs>CVE-2018-25032 CVE-2021-46669 CVE-2022-21427 CVE-2022-27376 CVE-2022-27377 CVE-2022-27378 CVE-2022-27379 CVE-2022-27380 CVE-2022-27381 CVE-2022-27383 CVE-2022-27384 CVE-2022-27386 CVE-2022-27387 CVE-2022-27445 CVE-2022-27447 CVE-2022-27448 CVE-2022-27449 CVE-2022-27452 CVE-2022-27456 CVE-2022-27458 CVE-2022-32083 CVE-2022-32084 CVE-2022-32085 CVE-2022-32087 CVE-2022-32088 CVE-2022-32091</define-tag>
-<define-tag packages>mariadb-10.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3114.wml b/english/lts/security/2022/dla-3114.wml
deleted file mode 100644
index a227975f77a..00000000000
--- a/english/lts/security/2022/dla-3114.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues have been discovered in the MariaDB database server. The
-vulnerabilities are addressed by upgrading MariaDB to the new upstream
-version 10.3.36. Please see the MariaDB 10.3 Release Notes for further
-details:</p>
-
-<p>https://mariadb.com/kb/en/mariadb-10335-release-notes/
-<a href="https://mariadb.com/kb/en/mariadb-10336-release-notes/">https://mariadb.com/kb/en/mariadb-10336-release-notes/</a></p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:10.3.36-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.3 packages.</p>
-
-<p>For the detailed security status of mariadb-10.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.3">https://security-tracker.debian.org/tracker/mariadb-10.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3114.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3115.data b/english/lts/security/2022/dla-3115.data
deleted file mode 100644
index f772bd8b6ba..00000000000
--- a/english/lts/security/2022/dla-3115.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3115-1 e17</define-tag>
-<define-tag report_date>2022-09-19</define-tag>
-<define-tag secrefs>CVE-2022-37706</define-tag>
-<define-tag packages>e17</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3115.wml b/english/lts/security/2022/dla-3115.wml
deleted file mode 100644
index 22b7de0b276..00000000000
--- a/english/lts/security/2022/dla-3115.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Maher Azzouzi found a local root escalation vulnerability in
-Enlightenment, an X11 window manager.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.22.4-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your e17 packages.</p>
-
-<p>For the detailed security status of e17 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/e17">https://security-tracker.debian.org/tracker/e17</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3115.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3116.data b/english/lts/security/2022/dla-3116.data
deleted file mode 100644
index eda4a902b70..00000000000
--- a/english/lts/security/2022/dla-3116.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3116-1 mako</define-tag>
-<define-tag report_date>2022-09-21</define-tag>
-<define-tag secrefs>CVE-2022-40023</define-tag>
-<define-tag packages>mako</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3116.wml b/english/lts/security/2022/dla-3116.wml
deleted file mode 100644
index cbc0266fb11..00000000000
--- a/english/lts/security/2022/dla-3116.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Mako, a Python template library, was vulnerable to a
-denial of service attack via crafted regular expressions.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.7+ds1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your mako packages.</p>
-
-<p>For the detailed security status of mako please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mako">https://security-tracker.debian.org/tracker/mako</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3116.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3117.data b/english/lts/security/2022/dla-3117.data
deleted file mode 100644
index e8ea061e714..00000000000
--- a/english/lts/security/2022/dla-3117.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3117-1 mediawiki</define-tag>
-<define-tag report_date>2022-9-22</define-tag>
-<define-tag secrefs>CVE-2021-44856 CVE-2022-28201 CVE-2022-28202 CVE-2022-28203 CVE-2022-34911 CVE-2022-34912</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3117.wml b/english/lts/security/2022/dla-3117.wml
deleted file mode 100644
index e5500b460bd..00000000000
--- a/english/lts/security/2022/dla-3117.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in mediawiki, a website engine
-for collaborative work. Insufficiently escaped input text may allow a malicious
-user to perform cross-site-scripting (XSS) attacks.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:1.31.16-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3117.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3118.data b/english/lts/security/2022/dla-3118.data
deleted file mode 100644
index 824ce27c0cf..00000000000
--- a/english/lts/security/2022/dla-3118.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3118-1 unzip</define-tag>
-<define-tag report_date>2022-09-22</define-tag>
-<define-tag secrefs>CVE-2022-0529 CVE-2022-0530 Bug#1010355</define-tag>
-<define-tag packages>unzip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3118.wml b/english/lts/security/2022/dla-3118.wml
deleted file mode 100644
index d9b3a1f1630..00000000000
--- a/english/lts/security/2022/dla-3118.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sandipan Roy discovered two vulnerabilities in InfoZIP's unzip program,
-a de-archiver for .zip files, which could result in denial of service
-or potentially the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-6.0-23+deb10u3.</p>
-
-<p>We recommend that you upgrade your unzip packages.</p>
-
-<p>For the detailed security status of unzip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/unzip">https://security-tracker.debian.org/tracker/unzip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3118.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3119.data b/english/lts/security/2022/dla-3119.data
deleted file mode 100644
index 77c172b37e0..00000000000
--- a/english/lts/security/2022/dla-3119.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3119-1 expat</define-tag>
-<define-tag report_date>2022-9-25</define-tag>
-<define-tag secrefs>CVE-2022-40674</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3119.wml b/english/lts/security/2022/dla-3119.wml
deleted file mode 100644
index eb40935aa81..00000000000
--- a/english/lts/security/2022/dla-3119.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Rhodri James discovered a heap use-after-free vulnerability in the
-doContent function in Expat, an XML parsing C library, which could result
-in denial of service or potentially the execution of arbitrary code, if a
-malformed XML file is processed.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.2.6-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>For the detailed security status of expat please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/expat">https://security-tracker.debian.org/tracker/expat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3119.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3120.data b/english/lts/security/2022/dla-3120.data
deleted file mode 100644
index 1e11480684b..00000000000
--- a/english/lts/security/2022/dla-3120.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3120-1 poppler</define-tag>
-<define-tag report_date>2022-9-26</define-tag>
-<define-tag secrefs>CVE-2018-18897 CVE-2018-19058 CVE-2018-20650 CVE-2019-9903 CVE-2019-9959 CVE-2019-14494 CVE-2020-27778 CVE-2022-27337 CVE-2022-38784 Bug#913164 Bug#913177 Bug#917974 Bug#925264 Bug#941776 Bug#933812 Bug#1010695 Bug#1018971</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3120.wml b/english/lts/security/2022/dla-3120.wml
deleted file mode 100644
index b9abdf9f7b6..00000000000
--- a/english/lts/security/2022/dla-3120.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in Poppler, a PDF
-rendering library, that could lead to denial of service or possibly other
-unspecified impact when processing maliciously crafted documents.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.71.0-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>For the detailed security status of poppler please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/poppler">https://security-tracker.debian.org/tracker/poppler</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3120.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3121.data b/english/lts/security/2022/dla-3121.data
deleted file mode 100644
index 58b8b19114d..00000000000
--- a/english/lts/security/2022/dla-3121.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3121-1 firefox-esr</define-tag>
-<define-tag report_date>2022-09-26</define-tag>
-<define-tag secrefs>CVE-2022-40956 CVE-2022-40957 CVE-2022-40958 CVE-2022-40959 CVE-2022-40960 CVE-2022-40962</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3121.wml b/english/lts/security/2022/dla-3121.wml
deleted file mode 100644
index 6cdb03ff61c..00000000000
--- a/english/lts/security/2022/dla-3121.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, CSP bypass or session fixation.</p>
-
-<p>This update brings back support for the i386 and arm64 architectures.
-Support for the armhf architecture is still missing, pending some changes
-to the buildd network.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.3.0esr-1~deb10u2.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3121.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3122.data b/english/lts/security/2022/dla-3122.data
deleted file mode 100644
index 6e545214a15..00000000000
--- a/english/lts/security/2022/dla-3122.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3122-1 dovecot</define-tag>
-<define-tag report_date>2022-09-27</define-tag>
-<define-tag secrefs>CVE-2021-33515 CVE-2022-30550</define-tag>
-<define-tag packages>dovecot</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3122.wml b/english/lts/security/2022/dla-3122.wml
deleted file mode 100644
index b3b142d8e27..00000000000
--- a/english/lts/security/2022/dla-3122.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were discovered in dovecot: IMAP and POP3 email server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33515">CVE-2021-33515</a>
-
- <p>The submission service in Dovecot before 2.3.15 allows STARTTLS command
- injection in lib-smtp. Sensitive information can be redirected to an
- attacker-controlled address.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30550">CVE-2022-30550</a>
-
- <p>When two passdb configuration entries exist with the same driver and args
- settings, incorrectly applied settings can lead to an unintended security
- configuration and can permit privilege escalation in certain configurations.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:2.3.4.1-5+deb10u7.</p>
-
-<p>We recommend that you upgrade your dovecot packages.</p>
-
-<p>For the detailed security status of dovecot please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dovecot">https://security-tracker.debian.org/tracker/dovecot</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3122.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3123.data b/english/lts/security/2022/dla-3123.data
deleted file mode 100644
index bed4b8c416f..00000000000
--- a/english/lts/security/2022/dla-3123.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3123-1 thunderbird</define-tag>
-<define-tag report_date>2022-09-27</define-tag>
-<define-tag secrefs>CVE-2022-40956 CVE-2022-40957 CVE-2022-40958 CVE-2022-40959 CVE-2022-40960 CVE-2022-40962</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3123.wml b/english/lts/security/2022/dla-3123.wml
deleted file mode 100644
index 169fdf2abca..00000000000
--- a/english/lts/security/2022/dla-3123.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>Debian follows the Thunderbird upstream releases. Support for the 91.x
-series has ended, so starting with this update we're now following the
-102.x series.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.3.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3123.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3124.data b/english/lts/security/2022/dla-3124.data
deleted file mode 100644
index e00628ea432..00000000000
--- a/english/lts/security/2022/dla-3124.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3124-1 webkit2gtk</define-tag>
-<define-tag report_date>2022-09-29</define-tag>
-<define-tag secrefs>CVE-2022-32886</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3124.wml b/english/lts/security/2022/dla-3124.wml
deleted file mode 100644
index c4d19c04556..00000000000
--- a/english/lts/security/2022/dla-3124.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32886">CVE-2022-32886</a>
-
- <p>P1umer, afang5472 and xmzyshypnc discovered that processing
- maliciously crafted web content may lead to arbitrary code
- execution</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.38.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3124.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3125.data b/english/lts/security/2022/dla-3125.data
deleted file mode 100644
index ccff55e5104..00000000000
--- a/english/lts/security/2022/dla-3125.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3125-1 libvncserver</define-tag>
-<define-tag report_date>2022-9-29</define-tag>
-<define-tag secrefs>CVE-2020-25708 CVE-2020-29260</define-tag>
-<define-tag packages>libvncserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3125.wml b/english/lts/security/2022/dla-3125.wml
deleted file mode 100644
index 864b319d374..00000000000
--- a/english/lts/security/2022/dla-3125.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two issues have been found in libvncserver, a library to write one's own
-VNC server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25708">CVE-2020-25708</a>
-
- <p>Due to some missing checks, a divide by zero could happen, which could
- result in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29260">CVE-2020-29260</a>
-
- <p>Due to a memory leak in function rfbClientCleanup() a remote attacker
- might be able to cause a denial of service.</p>
-
-
-<p>
-<p>For Debian 10 buster, these problems have been fixed in version
-0.9.11+dfsg-1.3+deb10u5.</p>
-
-<p>We recommend that you upgrade your libvncserver packages.</p>
-
-<p>For the detailed security status of libvncserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvncserver">https://security-tracker.debian.org/tracker/libvncserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3125.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3126.data b/english/lts/security/2022/dla-3126.data
deleted file mode 100644
index ce42eb3ec72..00000000000
--- a/english/lts/security/2022/dla-3126.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3126-1 libsndfile</define-tag>
-<define-tag report_date>2022-9-29</define-tag>
-<define-tag secrefs>CVE-2021-4156</define-tag>
-<define-tag packages>libsndfile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3126.wml b/english/lts/security/2022/dla-3126.wml
deleted file mode 100644
index 6ab9b332a39..00000000000
--- a/english/lts/security/2022/dla-3126.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libsndfile, a library for reading/writing audio
-files.</p>
-
-<p>Using a crafted FLAC file, an attacker could trigger an out-of-bounds read
-that would most likely cause a crash but could potentially leak memory
-information.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.28-6+deb10u2.</p>
-
-<p>We recommend that you upgrade your libsndfile packages.</p>
-
-<p>For the detailed security status of libsndfile please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libsndfile">https://security-tracker.debian.org/tracker/libsndfile</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3126.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3127.data b/english/lts/security/2022/dla-3127.data
deleted file mode 100644
index cbbdb0e55d5..00000000000
--- a/english/lts/security/2022/dla-3127.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3127-1 libhttp-daemon-perl</define-tag>
-<define-tag report_date>2022-9-30</define-tag>
-<define-tag secrefs>CVE-2022-31081</define-tag>
-<define-tag packages>libhttp-daemon-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3127.wml b/english/lts/security/2022/dla-3127.wml
deleted file mode 100644
index 699feb71531..00000000000
--- a/english/lts/security/2022/dla-3127.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libhttp-daemon-perl, a simple http server
-class.
-Due to insufficient Content-Length: handling in HTTP-header an attacker
-could gain privileged access to APIs or poison intermediate caches.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-6.01-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your libhttp-daemon-perl packages.</p>
-
-<p>For the detailed security status of libhttp-daemon-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libhttp-daemon-perl">https://security-tracker.debian.org/tracker/libhttp-daemon-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3127.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3128.data b/english/lts/security/2022/dla-3128.data
deleted file mode 100644
index 5ecea12590a..00000000000
--- a/english/lts/security/2022/dla-3128.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3128-1 node-thenify</define-tag>
-<define-tag report_date>2022-10-01</define-tag>
-<define-tag secrefs>CVE-2020-7677</define-tag>
-<define-tag packages>node-thenify</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3128.wml b/english/lts/security/2022/dla-3128.wml
deleted file mode 100644
index c9f8b5970f2..00000000000
--- a/english/lts/security/2022/dla-3128.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>thenify is a Promisify a callback-based function using any-promise.
-Affected versions of this package are vulnerable to Arbitrary Code
-Execution. The name argument provided to the package can be controlled
-by users without any sanitization, and this is provided to the eval
-function without any sanitization.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.3.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-thenify packages.</p>
-
-<p>For the detailed security status of node-thenify please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-thenify">https://security-tracker.debian.org/tracker/node-thenify</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3128.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3129.data b/english/lts/security/2022/dla-3129.data
deleted file mode 100644
index c9bd3a6bc3a..00000000000
--- a/english/lts/security/2022/dla-3129.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3129-1 gdal</define-tag>
-<define-tag report_date>2022-10-01</define-tag>
-<define-tag secrefs>CVE-2019-17545 CVE-2021-45943</define-tag>
-<define-tag packages>gdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3129.wml b/english/lts/security/2022/dla-3129.wml
deleted file mode 100644
index 551b55c555f..00000000000
--- a/english/lts/security/2022/dla-3129.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues were found in GDAL, a geospatial library, that could lead
-to denial of service via application crash or possibly the execution
-of arbitrary code if maliciously crafted data was parsed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.4.0+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your gdal packages.</p>
-
-<p>For the detailed security status of gdal please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gdal">https://security-tracker.debian.org/tracker/gdal</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3129.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3130.data b/english/lts/security/2022/dla-3130.data
deleted file mode 100644
index 7b3ad947c45..00000000000
--- a/english/lts/security/2022/dla-3130.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3130-1 tinyxml</define-tag>
-<define-tag report_date>2022-9-30</define-tag>
-<define-tag secrefs>CVE-2021-42260</define-tag>
-<define-tag packages>tinyxml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3130.wml b/english/lts/security/2022/dla-3130.wml
deleted file mode 100644
index d17fc92ec24..00000000000
--- a/english/lts/security/2022/dla-3130.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in tinyxml, a C++ XML parsing library.
-Crafted XML messages could lead to an infinite loop in
-TiXmlParsingData::Stamp(), which results in a denial of service.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.6.2-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your tinyxml packages.</p>
-
-<p>For the detailed security status of tinyxml please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tinyxml">https://security-tracker.debian.org/tracker/tinyxml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3130.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3131.data b/english/lts/security/2022/dla-3131.data
deleted file mode 100644
index cc049de5a5e..00000000000
--- a/english/lts/security/2022/dla-3131.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3131-1 linux</define-tag>
-<define-tag report_date>2022-10-02</define-tag>
-<define-tag secrefs>CVE-2021-4159 CVE-2021-33655 CVE-2021-33656 CVE-2022-1462 CVE-2022-1679 CVE-2022-2153 CVE-2022-2318 CVE-2022-2586 CVE-2022-2588 CVE-2022-2663 CVE-2022-3028 CVE-2022-26365 CVE-2022-26373 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 CVE-2022-33744 CVE-2022-36879 CVE-2022-36946 CVE-2022-39188 CVE-2022-39842 CVE-2022-40307 Bug#1018752</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3131.wml b/english/lts/security/2022/dla-3131.wml
deleted file mode 100644
index 7d485555018..00000000000
--- a/english/lts/security/2022/dla-3131.wml
+++ /dev/null
@@ -1,164 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4159">CVE-2021-4159</a>
-
- <p>A flaw was found in the eBPF verifier which could lead to an
- out-of-bounds read. If unprivileged use of eBPF is enabled, this
- could leak sensitive information. This was already disabled by
- default, which would fully mitigate the vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33655">CVE-2021-33655</a>
-
- <p>A user with access to a framebuffer console device could cause a
- memory out-of-bounds write via the FBIOPUT_VSCREENINFO ioctl.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33656">CVE-2021-33656</a>
-
- <p>A user with access to a framebuffer console device could cause a
- memory out-of-bounds write via some font setting ioctls. These
- obsolete ioctls have been removed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1462">CVE-2022-1462</a>
-
- <p>一åªç‹— reported a race condition in the pty (pseudo-terminal)
- subsystem that can lead to a slab out-of-bounds write. A local
- user could exploit this to cause a denial of service (crash or
- memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1679">CVE-2022-1679</a>
-
- <p>The syzbot tool found a race condition in the ath9k_htc driver
- which can lead to a use-after-free. This might be exploitable to
- cause a denial service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2153">CVE-2022-2153</a>
-
- <p><q>kangel</q> reported a flaw in the KVM implementation for x86
- processors which could lead to a null pointer dereference. A local
- user permitted to access /dev/kvm could exploit this to cause a
- denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2318">CVE-2022-2318</a>
-
- <p>A use-after-free in the Amateur Radio X.25 PLP (Rose) support may
- result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2586">CVE-2022-2586</a>
-
- <p>A use-after-free in the Netfilter subsystem may result in local
- privilege escalation for a user with the CAP_NET_ADMIN capability
- in any user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2588">CVE-2022-2588</a>
-
- <p>Zhenpeng Lin discovered a use-after-free flaw in the cls_route
- filter implementation which may result in local privilege
- escalation for a user with the CAP_NET_ADMIN capability in any
- user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2663">CVE-2022-2663</a>
-
- <p>David Leadbeater reported flaws in the nf_conntrack_irc
- connection-tracking protocol module. When this module is enabled
- on a firewall, an external user on the same IRC network as an
- internal user could exploit its lax parsing to open arbitrary TCP
- ports in the firewall, to reveal their public IP address, or to
- block their IRC connection at the firewall.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3028">CVE-2022-3028</a>
-
- <p>Abhishek Shah reported a race condition in the AF_KEY subsystem,
- which could lead to an out-of-bounds write or read. A local user
- could exploit this to cause a denial of service (crash or memory
- corruption), to obtain sensitive information, or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-33742">CVE-2022-33742</a>
-
- <p>Roger Pau Monne discovered that Xen block and network PV device
- frontends don't zero out memory regions before sharing them with
- the backend, which may result in information disclosure.
- Additionally it was discovered that the granularity of the grant
- table doesn't permit sharing less than a 4k page, which may also
- result in information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26373">CVE-2022-26373</a>
-
- <p>It was discovered that on certain processors with Intel's Enhanced
- Indirect Branch Restricted Speculation (eIBRS) capabilities there
- are exceptions to the documented properties in some situations,
- which may result in information disclosure.</p>
-
- <p>Intel's explanation of the issue can be found at
- <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-33744">CVE-2022-33744</a>
-
- <p>Oleksandr Tyshchenko discovered that ARM Xen guests can cause a
- denial of service to the Dom0 via paravirtual devices.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36879">CVE-2022-36879</a>
-
- <p>A flaw was discovered in xfrm_expand_policies in the xfrm
- subsystem which can cause a reference count to be dropped twice.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36946">CVE-2022-36946</a>
-
- <p>Domingo Dirutigliano and Nicola Guerrera reported a memory
- corruption flaw in the Netfilter subsystem which may result in
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39188">CVE-2022-39188</a>
-
- <p>Jann Horn reported a race condition in the kernel's handling of
- unmapping of certain memory ranges. When a driver created a
- memory mapping with the VM_PFNMAP flag, which many GPU drivers do,
- the memory mapping could be removed and freed before it was
- flushed from the CPU TLBs. This could result in a page
- use—after-free. A local user with access to such a device could
- exploit this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39842">CVE-2022-39842</a>
-
- <p>An integer overflow was discovered in the pxa3xx-gcu video driver
- which could lead to a heap out-of-bounds write.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40307">CVE-2022-40307</a>
-
- <p>A race condition was discovered in the EFI capsule-loader driver,
- which could lead to use-after-free. A local user permitted to
- access this device (/dev/efi_capsule_loader) could exploit this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation. However, this device is normally only
- accessible by the root user.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.19.260-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3131.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3132.data b/english/lts/security/2022/dla-3132.data
deleted file mode 100644
index a2be807d1dc..00000000000
--- a/english/lts/security/2022/dla-3132.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3132-1 snakeyaml</define-tag>
-<define-tag report_date>2022-10-03</define-tag>
-<define-tag secrefs>CVE-2022-25857 CVE-2022-38749 CVE-2022-38750 CVE-2022-38751 Bug#1019218</define-tag>
-<define-tag packages>snakeyaml</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3132.wml b/english/lts/security/2022/dla-3132.wml
deleted file mode 100644
index d6a8d5d4449..00000000000
--- a/english/lts/security/2022/dla-3132.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in SnakeYaml, a YAML
-parser for Java, which could facilitate a denial of service attack whenever
-maliciously crafted input files are processed by SnakeYaml.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.23-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your snakeyaml packages.</p>
-
-<p>For the detailed security status of snakeyaml please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/snakeyaml">https://security-tracker.debian.org/tracker/snakeyaml</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3132.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3133.data b/english/lts/security/2022/dla-3133.data
deleted file mode 100644
index 9e4ca3684dc..00000000000
--- a/english/lts/security/2022/dla-3133.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3133-1 lighttpd</define-tag>
-<define-tag report_date>2022-10-3</define-tag>
-<define-tag secrefs>CVE-2022-37797</define-tag>
-<define-tag packages>lighttpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3133.wml b/english/lts/security/2022/dla-3133.wml
deleted file mode 100644
index b5d228d8eb4..00000000000
--- a/english/lts/security/2022/dla-3133.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An invalid HTTP request (websocket handshake) may cause a <code>NULL</code>
-pointer dereference in the wstunnel module.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4.53-4+deb10u3.</p>
-
-<p>We recommend that you upgrade your lighttpd packages.</p>
-
-<p>For the detailed security status of lighttpd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lighttpd">https://security-tracker.debian.org/tracker/lighttpd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3133.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3134.data b/english/lts/security/2022/dla-3134.data
deleted file mode 100644
index 4b5f4c1bf83..00000000000
--- a/english/lts/security/2022/dla-3134.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3134-1 tzdata</define-tag>
-<define-tag report_date>2022-10-03</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3134.wml b/english/lts/security/2022/dla-3134.wml
deleted file mode 100644
index 9f4fdf895f9..00000000000
--- a/english/lts/security/2022/dla-3134.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2022d. Notable
-changes are:</p>
-
-<p>- Palestine now switches back to standard time on October 29.
-- Updated leap second list, which was set to expire by the end of
- December.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2021a-0+deb10u7.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3134.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3135.data b/english/lts/security/2022/dla-3135.data
deleted file mode 100644
index 48304e838fe..00000000000
--- a/english/lts/security/2022/dla-3135.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3135-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2022-10-03</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3135.wml b/english/lts/security/2022/dla-3135.wml
deleted file mode 100644
index 7a742c50841..00000000000
--- a/english/lts/security/2022/dla-3135.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2022d for the
-Perl bindings. For the list of changes, see DLA-3134-1.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:2.23-1+2022d.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3135.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3136.data b/english/lts/security/2022/dla-3136.data
deleted file mode 100644
index 3b014cfa814..00000000000
--- a/english/lts/security/2022/dla-3136.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3136-1 barbican</define-tag>
-<define-tag report_date>2022-10-04</define-tag>
-<define-tag secrefs>CVE-2022-3100</define-tag>
-<define-tag packages>barbican</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3136.wml b/english/lts/security/2022/dla-3136.wml
deleted file mode 100644
index 8a8e48ce107..00000000000
--- a/english/lts/security/2022/dla-3136.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that Barbican, a service for secret management and storage,
-was vulnerable to access bypass via query string injection.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:7.0.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your barbican packages.</p>
-
-<p>For the detailed security status of barbican please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/barbican">https://security-tracker.debian.org/tracker/barbican</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3136.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3137.data b/english/lts/security/2022/dla-3137.data
deleted file mode 100644
index 7ef37fff2e5..00000000000
--- a/english/lts/security/2022/dla-3137.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3137-1 nodejs</define-tag>
-<define-tag report_date>2022-10-05</define-tag>
-<define-tag secrefs>CVE-2021-22930 CVE-2021-22939 CVE-2021-22940 CVE-2022-21824 CVE-2022-32212 Bug#1004177</define-tag>
-<define-tag packages>nodejs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3137.wml b/english/lts/security/2022/dla-3137.wml
deleted file mode 100644
index e6b2bab4737..00000000000
--- a/english/lts/security/2022/dla-3137.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Node.js, a JavaScript
-runtime environment, which could result in memory corruption, invalid
-certificate validation, prototype pollution or command injection.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22930">CVE-2021-22930</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2021-22940">CVE-2021-22940</a></p>
-
- <p>Use after free attack where an attacker might be able to exploit
- the memory corruption, to change process behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22939">CVE-2021-22939</a>
-
- <p>If the Node.js https API was used incorrectly and <q>undefined</q> was
- in passed for the <q>rejectUnauthorized</q> parameter, no error was
- returned and connections to servers with an expired certificate
- would have been accepted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21824">CVE-2022-21824</a>
-
- <p>Due to the formatting logic of the "console.table()" function it
- was not safe to allow user controlled input to be passed to the
- <q>properties</q> parameter while simultaneously passing a plain object
- with at least one property as the first parameter, which could be
- <q>__proto__</q>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32212">CVE-2022-32212</a>
-
- <p>OS Command Injection vulnerability due to an insufficient
- IsAllowedHost check that can easily be bypassed because
- IsIPAddress does not properly check if an IP address is invalid
- before making DBS requests allowing rebinding attacks.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-10.24.0~dfsg-1~deb10u2.</p>
-
-<p>We recommend that you upgrade your nodejs packages.</p>
-
-<p>For the detailed security status of nodejs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nodejs">https://security-tracker.debian.org/tracker/nodejs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3137.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3138.data b/english/lts/security/2022/dla-3138.data
deleted file mode 100644
index 11730fce72e..00000000000
--- a/english/lts/security/2022/dla-3138.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3138-1 bind9</define-tag>
-<define-tag report_date>2022-10-05</define-tag>
-<define-tag secrefs>CVE-2022-2795 CVE-2022-38177 CVE-2022-38178</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3138.wml b/english/lts/security/2022/dla-3138.wml
deleted file mode 100644
index 229f5475b8f..00000000000
--- a/english/lts/security/2022/dla-3138.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in BIND, a DNS server
-implementation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2795">CVE-2022-2795</a>
-
- <p>Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a
- flaw in the resolver code can cause named to spend excessive amounts
- of time on processing large delegations, significantly degrade
- resolver performance and result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-38177">CVE-2022-38177</a>
-
- <p>It was discovered that the DNSSEC verification code for the ECDSA
- algorithm is susceptible to a memory leak flaw. A remote attacker
- can take advantage of this flaw to cause BIND to consume resources,
- resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-38178">CVE-2022-38178</a>
-
- <p>It was discovered that the DNSSEC verification code for the EdDSA
- algorithm is susceptible to a memory leak flaw. A remote attacker
- can take advantage of this flaw to cause BIND to consume resources,
- resulting in a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:9.11.5.P4+dfsg-5.1+deb10u8.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>For the detailed security status of bind9 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3138.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3139.data b/english/lts/security/2022/dla-3139.data
deleted file mode 100644
index 1a5148bf271..00000000000
--- a/english/lts/security/2022/dla-3139.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3139-1 knot-resolver</define-tag>
-<define-tag report_date>2022-10-07</define-tag>
-<define-tag secrefs>CVE-2022-40188</define-tag>
-<define-tag packages>knot-resolver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3139.wml b/english/lts/security/2022/dla-3139.wml
deleted file mode 100644
index 823a124381a..00000000000
--- a/english/lts/security/2022/dla-3139.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote denial-of-service
-vulnerability in the knot-resolver DNSSEC-validating DNS resolver.</p>
-
-<p>Remote attackers could have caused a denial of service via CPU consumption
-by exploiting algorithmic complexity: during an attack, an authoritative server
-would return large nameserver or address sets.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40188">CVE-2022-40188</a>
-
- <p>Knot Resolver before 5.5.3 allows remote attackers to cause a denial of
- service (CPU consumption) because of algorithmic complexity. During an
- attack, an authoritative server must return large NS sets or address
- sets.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-3.2.1-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your knot-resolver packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3139.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3140.data b/english/lts/security/2022/dla-3140.data
deleted file mode 100644
index 2c8a2d2b324..00000000000
--- a/english/lts/security/2022/dla-3140.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3140-1 libpgjava</define-tag>
-<define-tag report_date>2022-10-07</define-tag>
-<define-tag secrefs>CVE-2022-31197</define-tag>
-<define-tag packages>libpgjava</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3140.wml b/english/lts/security/2022/dla-3140.wml
deleted file mode 100644
index 4961fb63d7b..00000000000
--- a/english/lts/security/2022/dla-3140.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential SQL injection vulnerability
-in libpgjava, a Java library for connecting to PostgreSQL databases.</p>
-
-<p>A malicious user could have crafted a schema that caused an application to
-execute commands as a privileged user due to the lack of escaping of column
-names in some operations.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31197">CVE-2022-31197</a>
-
- <p>PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to
- connect to a PostgreSQL database using standard, database independent Java
- code. The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()`
- method is not performing escaping of column names so a malicious column
- name that contains a statement terminator, e.g. `;`, could lead to SQL
- injection. This could lead to executing additional SQL commands as the
- application's JDBC user. User applications that do not invoke the
- `ResultSet.refreshRow()` method are not impacted. User application that do
- invoke that method are impacted if the underlying database that they are
- querying via their JDBC application may be under the control of an
- attacker. The attack requires the attacker to trick the user into executing
- SQL against a table name who's column names would contain the malicious SQL
- and subsequently invoke the `refreshRow()` method on the ResultSet. Note
- that the application's JDBC user and the schema owner need not be the same.
- A JDBC application that executes as a privileged user querying database
- schemas owned by potentially malicious less-privileged users would be
- vulnerable. In that situation it may be possible for the malicious user to
- craft a schema that causes the application to execute commands as the
- privileged user. Patched versions will be released as `42.2.26` and
- `42.4.1`. Users are advised to upgrade. There are no known workarounds for
- this issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-42.2.5-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your libpgjava packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3140.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3141.data b/english/lts/security/2022/dla-3141.data
deleted file mode 100644
index 1f9e25e53f7..00000000000
--- a/english/lts/security/2022/dla-3141.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3141-1 wordpress</define-tag>
-<define-tag report_date>2022-10-10</define-tag>
-<define-tag secrefs>CVE-2019-17670 Bug#942459</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3141.wml b/english/lts/security/2022/dla-3141.wml
deleted file mode 100644
index 7e4841c4110..00000000000
--- a/english/lts/security/2022/dla-3141.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in Wordpress, a popular
-content management framework. Server Side Request Forgery and cross-site
-scripting (XSS) attacks may facilitate the bypass of access controls or the
-injection of client-side scripts.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.0.17+dfsg1-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3141.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3142.data b/english/lts/security/2022/dla-3142.data
deleted file mode 100644
index 0e9e4767479..00000000000
--- a/english/lts/security/2022/dla-3142.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3142-1 dbus</define-tag>
-<define-tag report_date>2022-10-10</define-tag>
-<define-tag secrefs>CVE-2022-42010 CVE-2022-42011 CVE-2022-42012</define-tag>
-<define-tag packages>dbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3142.wml b/english/lts/security/2022/dla-3142.wml
deleted file mode 100644
index 8f0fd1bcc97..00000000000
--- a/english/lts/security/2022/dla-3142.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Evgeny Vereshchagin discovered multiple vulnerabilities in D-Bus, a
-simple interprocess messaging system, which may result in denial of
-service by an authenticated user.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.12.24-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your dbus packages.</p>
-
-<p>For the detailed security status of dbus please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dbus">https://security-tracker.debian.org/tracker/dbus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3142.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3143.data b/english/lts/security/2022/dla-3143.data
deleted file mode 100644
index 184d16f4509..00000000000
--- a/english/lts/security/2022/dla-3143.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3143-1 strongswan</define-tag>
-<define-tag report_date>2022-10-10</define-tag>
-<define-tag secrefs>CVE-2022-40617</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3143.wml b/english/lts/security/2022/dla-3143.wml
deleted file mode 100644
index a9093fc7247..00000000000
--- a/english/lts/security/2022/dla-3143.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial of service vulnerability
-in strongswan, an IPsec VPN solution.</p>
-
-<p>Strongswan could have queried URLs with untrusted certificates, and this
-could potentially lead to a DoS attack by blocking the fetcher thread.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40617">CVE-2022-40617</a>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5.7.2-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3143.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3144.data b/english/lts/security/2022/dla-3144.data
deleted file mode 100644
index e1b66ba5e06..00000000000
--- a/english/lts/security/2022/dla-3144.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3144-1 connman</define-tag>
-<define-tag report_date>2022-10-10</define-tag>
-<define-tag secrefs>CVE-2022-23096 CVE-2022-23097 CVE-2022-23098 CVE-2022-32293 Bug#1004935 Bug#1016976</define-tag>
-<define-tag packages>connman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3144.wml b/english/lts/security/2022/dla-3144.wml
deleted file mode 100644
index 89c57f96dcf..00000000000
--- a/english/lts/security/2022/dla-3144.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in ConnMan, a network manager
-for embedded devices, which could result in denial of service or the
-execution of arbitrary code.</p>
-
-<p>This update also fixes an issue with reference counting in the
-<a href="https://security-tracker.debian.org/tracker/CVE-2022-32293">CVE-2022-32293</a> fix introduced in DLA-3105-1.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.36-2.1~deb10u4.</p>
-
-<p>We recommend that you upgrade your connman packages.</p>
-
-<p>For the detailed security status of connman please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/connman">https://security-tracker.debian.org/tracker/connman</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3144.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3145.data b/english/lts/security/2022/dla-3145.data
deleted file mode 100644
index fb4c2ab0264..00000000000
--- a/english/lts/security/2022/dla-3145.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3145-1 git</define-tag>
-<define-tag report_date>2022-10-11</define-tag>
-<define-tag secrefs>CVE-2021-21300 CVE-2021-40330 Bug#985120</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3145.wml b/english/lts/security/2022/dla-3145.wml
deleted file mode 100644
index 21c6cf4b9fe..00000000000
--- a/english/lts/security/2022/dla-3145.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in Git, a fast, scalable,
-distributed revision control system, which may affect multi-user systems.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21300">CVE-2021-21300</a>
-
- <p>A specially crafted repository that contains symbolic links as well as
- files using a clean/smudge filter such as Git LFS, may cause just-checked
- out script to be executed while cloning onto a case-insensitive file system
- such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and
- macOS).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40330">CVE-2021-40330</a>
-
- <p>git_connect_git in connect.c allows a repository path to contain a newline
- character, which may result in unexpected cross-protocol requests, as
- demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1
- substring.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:2.20.1-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>For the detailed security status of git please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3145.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3146.data b/english/lts/security/2022/dla-3146.data
deleted file mode 100644
index 2970fd2dbb1..00000000000
--- a/english/lts/security/2022/dla-3146.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3146-1 isc-dhcp</define-tag>
-<define-tag report_date>2022-10-11</define-tag>
-<define-tag secrefs>CVE-2022-2928 CVE-2022-2929 Bug#1021320</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3146.wml b/english/lts/security/2022/dla-3146.wml
deleted file mode 100644
index cce948df69e..00000000000
--- a/english/lts/security/2022/dla-3146.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the ISC DHCP client,
-relay and server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2928">CVE-2022-2928</a>
-
- <p>It was discovered that the DHCP server does not correctly perform
- option reference counting when configured with "allow leasequery;".
- A remote attacker can take advantage of this flaw to cause a denial
- of service (daemon crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2929">CVE-2022-2929</a>
-
- <p>It was discovered that the DHCP server is prone to a memory leak
- flaw when handling contents of option 81 (fqdn) data received in
- a DHCP packet. A remote attacker can take advantage of this flaw
- to cause DHCP servers to consume resources, resulting in denial
- of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.4.1-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your isc-dhcp packages.</p>
-
-<p>For the detailed security status of isc-dhcp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/isc-dhcp">https://security-tracker.debian.org/tracker/isc-dhcp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3146.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3147.data b/english/lts/security/2022/dla-3147.data
deleted file mode 100644
index 43bfea31191..00000000000
--- a/english/lts/security/2022/dla-3147.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3147-1 twig</define-tag>
-<define-tag report_date>2022-10-11</define-tag>
-<define-tag secrefs>CVE-2022-39261</define-tag>
-<define-tag packages>twig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3147.wml b/english/lts/security/2022/dla-3147.wml
deleted file mode 100644
index 17c631a0d6b..00000000000
--- a/english/lts/security/2022/dla-3147.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential arbitrary file read
-vulnerability in twig, a PHP templating library. It was caused by insufficient
-validation of template names in 'source' and 'include' statements.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39261">CVE-2022-39261</a>
-
- <p>Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x
- prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the
- filesystem loader loads templates for which the name is a user input. It is
- possible to use the `source` or `include` statement to read arbitrary files
- from outside the templates' directory when using a namespace like
- `@somewhere/../some.file`. In such a case, validation is bypassed. Versions
- 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template
- names. There are no known workarounds aside from upgrading.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-2.6.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your twig packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3147.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3148.data b/english/lts/security/2022/dla-3148.data
deleted file mode 100644
index 69ffe3607a8..00000000000
--- a/english/lts/security/2022/dla-3148.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3148-1 mediawiki</define-tag>
-<define-tag report_date>2022-10-12</define-tag>
-<define-tag secrefs>CVE-2022-41765 CVE-2022-41767</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3148.wml b/english/lts/security/2022/dla-3148.wml
deleted file mode 100644
index c795a8c3688..00000000000
--- a/english/lts/security/2022/dla-3148.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in mediawiki, a website engine
-for collaborative work.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41765">CVE-2022-41765</a>
-
- <p>The HTMLUserTextField exposes existence of hidden users</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41767">CVE-2022-41767</a>
-
- <p>The reassignEdits maintenance script does not update results in an IP
- range check on Special:Contributions</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:1.31.16-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3148.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3149.data b/english/lts/security/2022/dla-3149.data
deleted file mode 100644
index 9d5586be770..00000000000
--- a/english/lts/security/2022/dla-3149.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3149-1 ruby-nokogiri</define-tag>
-<define-tag report_date>2022-10-12</define-tag>
-<define-tag secrefs>CVE-2019-5477 CVE-2020-26247 CVE-2022-24836 Bug#934802 Bug#978967 Bug#1009787</define-tag>
-<define-tag packages>ruby-nokogiri</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3149.wml b/english/lts/security/2022/dla-3149.wml
deleted file mode 100644
index aafb72b2d86..00000000000
--- a/english/lts/security/2022/dla-3149.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Nokogiri, an
-HTML/XML/SAX/Reader parser for the Ruby programming language, leading
-to command injection, XML external entity injection (XXE), and
-denial-of-service (DoS).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-5477">CVE-2019-5477</a>
-
- <p>A command injection vulnerability allows commands to be executed
- in a subprocess via Ruby's `Kernel.open` method. Processes are
- vulnerable only if the undocumented method
- `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe
- user input as the filename. This vulnerability appears in code
- generated by the Rexical gem versions v1.0.6 and earlier. Rexical
- is used by Nokogiri to generate lexical scanner code for parsing
- CSS queries.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26247">CVE-2020-26247</a>
-
- <p>XXE vulnerability: XML Schemas parsed by Nokogiri::XML::Schema are
- trusted by default, allowing external resources to be accessed
- over the network, potentially enabling XXE or SSRF attacks. This
- behavior is counter to the security policy followed by Nokogiri
- maintainers, which is to treat all input as untrusted by default
- whenever possible.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24836">CVE-2022-24836</a>
-
- <p>Nokogiri contains an inefficient regular expression that is
- susceptible to excessive backtracking when attempting to detect
- encoding in HTML documents.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.10.0+dfsg1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-nokogiri packages.</p>
-
-<p>For the detailed security status of ruby-nokogiri please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-nokogiri">https://security-tracker.debian.org/tracker/ruby-nokogiri</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3149.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3150.data b/english/lts/security/2022/dla-3150.data
deleted file mode 100644
index 7fbca22bcf9..00000000000
--- a/english/lts/security/2022/dla-3150.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3150-1 rexical</define-tag>
-<define-tag report_date>2022-10-12</define-tag>
-<define-tag secrefs>CVE-2019-5477 Bug#940905</define-tag>
-<define-tag packages>rexical</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3150.wml b/english/lts/security/2022/dla-3150.wml
deleted file mode 100644
index 98f6ca03cb8..00000000000
--- a/english/lts/security/2022/dla-3150.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A command injection vulnerability was found in Rexical, a lexical
-scanner generator for the Ruby programming language. Processes are
-vulnerable only if the undocumented method
-`Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user
-input as the filename. This vulnerability appears in code generated by
-the Rexical gem.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.5-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your rexical packages.</p>
-
-<p>For the detailed security status of rexical please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rexical">https://security-tracker.debian.org/tracker/rexical</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3150.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3151.data b/english/lts/security/2022/dla-3151.data
deleted file mode 100644
index aeb50dea701..00000000000
--- a/english/lts/security/2022/dla-3151.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3151-1 squid</define-tag>
-<define-tag report_date>2022-10-13</define-tag>
-<define-tag secrefs>CVE-2022-41317 CVE-2022-41318</define-tag>
-<define-tag packages>squid</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3151.wml b/english/lts/security/2022/dla-3151.wml
deleted file mode 100644
index 39cd03cd071..00000000000
--- a/english/lts/security/2022/dla-3151.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in squid, a Web Proxy cache</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41317">CVE-2022-41317</a>
-
- <p>Due to inconsistent handling of internal URIs Squid is
- vulnerable to Exposure of Sensitive Information about clients
- using the proxy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41318">CVE-2022-41318</a>
-
- <p>Due to an incorrect integer overflow protection Squid SSPI and
- SMB authentication helpers are vulnerable to a Buffer Overflow
- attack.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.6-1+deb10u8.</p>
-
-<p>We recommend that you upgrade your squid packages.</p>
-
-<p>For the detailed security status of squid please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/squid">https://security-tracker.debian.org/tracker/squid</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3151.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3152.data b/english/lts/security/2022/dla-3152.data
deleted file mode 100644
index 1403e951f9b..00000000000
--- a/english/lts/security/2022/dla-3152.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3152-1 glibc</define-tag>
-<define-tag report_date>2022-10-20</define-tag>
-<define-tag secrefs>CVE-2016-10228 CVE-2019-19126 CVE-2019-25013 CVE-2020-1752 CVE-2020-6096 CVE-2020-10029 CVE-2020-27618 CVE-2021-3326 CVE-2021-3999 CVE-2021-27645 CVE-2021-33574 CVE-2021-35942 CVE-2022-23218 CVE-2022-23219 Bug#856503 Bug#945250 Bug#953108 Bug#953788 Bug#961452 Bug#973914 Bug#979273 Bug#981198</define-tag>
-<define-tag packages>glibc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3152.wml b/english/lts/security/2022/dla-3152.wml
deleted file mode 100644
index 3a1f3f30cb5..00000000000
--- a/english/lts/security/2022/dla-3152.wml
+++ /dev/null
@@ -1,142 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a wide range of vulnerabilities. A significant portion
-affects character set conversion.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10228">CVE-2016-10228</a>
-
- <p>The iconv program in the GNU C Library when invoked with multiple
- suffixes in the destination encoding (TRANSLATE or IGNORE) along with
- the -c option, enters an infinite loop when processing invalid
- multi-byte input sequences, leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19126">CVE-2019-19126</a>
-
- <p>On the x86-64 architecture, the GNU C Library fails to ignore the
- LD_PREFER_MAP_32BIT_EXEC environment variable during program
- execution after a security transition, allowing local attackers to
- restrict the possible mapping addresses for loaded libraries and
- thus bypass ASLR for a setuid program.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-25013">CVE-2019-25013</a>
-
- <p>The iconv feature in the GNU C Library, when processing invalid
- multi-byte input sequences in the EUC-KR encoding, may have a buffer
- over-read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10029">CVE-2020-10029</a>
-
- <p>The GNU C Library could overflow an on-stack buffer during range
- reduction if an input to an 80-bit long double function contains a
- non-canonical bit pattern, a seen when passing a
- 0x5d414141414141410000 value to sinl on x86 targets. This is related
- to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1752">CVE-2020-1752</a>
-
- <p>A use-after-free vulnerability introduced in glibc was found in the
- way the tilde expansion was carried out. Directory paths containing
- an initial tilde followed by a valid username were affected by this
- issue. A local attacker could exploit this flaw by creating a
- specially crafted path that, when processed by the glob function,
- would potentially lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27618">CVE-2020-27618</a>
-
- <p>The iconv function in the GNU C Library, when processing invalid
- multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390,
- and IBM1399 encodings, fails to advance the input state, which could
- lead to an infinite loop in applications, resulting in a denial of
- service, a different vulnerability from <a href="https://security-tracker.debian.org/tracker/CVE-2016-10228">CVE-2016-10228</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6096">CVE-2020-6096</a>
-
- <p>An exploitable signed comparison vulnerability exists in the ARMv7
- memcpy() implementation of GNU glibc. Calling memcpy() (on ARMv7
- targets that utilize the GNU glibc implementation) with a negative
- value for the <q>num</q> parameter results in a signed comparison
- vulnerability. If an attacker underflows the <q>num</q> parameter to
- memcpy(), this vulnerability could lead to undefined behavior such as
- writing to out-of-bounds memory and potentially remote code
- execution. Furthermore, this memcpy() implementation allows for
- program execution to continue in scenarios where a segmentation fault
- or crash should have occurred. The dangers occur in that subsequent
- execution and iterations of this code will be executed with this
- corrupted data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27645">CVE-2021-27645</a>
-
- <p>The nameserver caching daemon (nscd) in the GNU C Library, when
- processing a request for netgroup lookup, may crash due to a
- double-free, potentially resulting in degraded service or Denial of
- Service on the local system. This is related to netgroupcache.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3326">CVE-2021-3326</a>
-
- <p>The iconv function in the GNU C Library, when processing invalid
- input sequences in the ISO-2022-JP-3 encoding, fails an assertion in
- the code path and aborts the program, potentially resulting in a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33574">CVE-2021-33574</a>
-
- <p>The mq_notify function in the GNU C Library has a use-after-free. It
- may use the notification thread attributes object (passed through
- its struct sigevent parameter) after it has been freed by the caller,
- leading to a denial of service (application crash) or possibly
- unspecified other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-35942">CVE-2021-35942</a>
-
- <p>The wordexp function in the GNU C Library may crash or read arbitrary
- memory in parse_param (in posix/wordexp.c) when called with an
- untrusted, crafted pattern, potentially resulting in a denial of
- service or disclosure of information. This occurs because atoi was
- used but strtoul should have been used to ensure correct calculations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3999">CVE-2021-3999</a>
-
- <p>An off-by-one buffer overflow and underflow in getcwd() may lead to
- memory corruption when the size of the buffer is exactly 1. A local
- attacker who can control the input buffer and size passed to getcwd()
- in a setuid program could use this flaw to potentially execute
- arbitrary code and escalate their privileges on the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23218">CVE-2022-23218</a>
-
- <p>The deprecated compatibility function svcunix_create in the sunrpc
- module of the GNU C Library copies its path argument on the stack
- without validating its length, which may result in a buffer overflow,
- potentially resulting in a denial of service or (if an application
- is not built with a stack protector enabled) arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23219">CVE-2022-23219</a>
-
- <p>The deprecated compatibility function clnt_create in the sunrpc module
- of the GNU C Library copies its hostname argument on the stack without
- validating its length, which may result in a buffer overflow,
- potentially resulting in a denial of service or (if an application is
- not built with a stack protector enabled) arbitrary code execution.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.28-10+deb10u2.</p>
-
-<p>We recommend that you upgrade your glibc packages.</p>
-
-<p>For the detailed security status of glibc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/glibc">https://security-tracker.debian.org/tracker/glibc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3152.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3153.data b/english/lts/security/2022/dla-3153.data
deleted file mode 100644
index 61d125cbc9e..00000000000
--- a/english/lts/security/2022/dla-3153.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3153-1 libksba</define-tag>
-<define-tag report_date>2022-10-17</define-tag>
-<define-tag secrefs>CVE-2022-3515 Bug#1021928</define-tag>
-<define-tag packages>libksba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3153.wml b/english/lts/security/2022/dla-3153.wml
deleted file mode 100644
index 0d998b2097d..00000000000
--- a/english/lts/security/2022/dla-3153.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An integer overflow flaw was discovered in the CRL parser in libksba, an
-X.509 and CMS support library, which could result in denial of service or
-the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.5-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your libksba packages.</p>
-
-<p>For the detailed security status of libksba please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libksba">https://security-tracker.debian.org/tracker/libksba</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3153.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3154.data b/english/lts/security/2022/dla-3154.data
deleted file mode 100644
index 40db29372af..00000000000
--- a/english/lts/security/2022/dla-3154.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3154-1 node-xmldom</define-tag>
-<define-tag report_date>2022-10-18</define-tag>
-<define-tag secrefs>CVE-2022-37616 Bug#1021618</define-tag>
-<define-tag packages>node-xmldom</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3154.wml b/english/lts/security/2022/dla-3154.wml
deleted file mode 100644
index cceaf59d286..00000000000
--- a/english/lts/security/2022/dla-3154.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that the Node XML DOM library was vulnerable to prototype
-pollution.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.1.27+ds-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-xmldom packages.</p>
-
-<p>For the detailed security status of node-xmldom please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-xmldom">https://security-tracker.debian.org/tracker/node-xmldom</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3154.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3155.data b/english/lts/security/2022/dla-3155.data
deleted file mode 100644
index 214be799861..00000000000
--- a/english/lts/security/2022/dla-3155.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3155-1 bcel</define-tag>
-<define-tag report_date>2022-10-18</define-tag>
-<define-tag secrefs>CVE-2022-34169 Bug#1015860</define-tag>
-<define-tag packages>bcel</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3155.wml b/english/lts/security/2022/dla-3155.wml
deleted file mode 100644
index 6eb50387027..00000000000
--- a/english/lts/security/2022/dla-3155.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue
-when processing malicious XSLT stylesheets. This can be used to corrupt Java
-class files generated by the internal XSLTC compiler and execute arbitrary Java
-bytecode. In Debian the vulnerable code is in the bcel source package.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-6.2-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your bcel packages.</p>
-
-<p>For the detailed security status of bcel please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/bcel">https://security-tracker.debian.org/tracker/bcel</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3155.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3156.data b/english/lts/security/2022/dla-3156.data
deleted file mode 100644
index 77fa519cac3..00000000000
--- a/english/lts/security/2022/dla-3156.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3156-1 firefox-esr</define-tag>
-<define-tag report_date>2022-10-20</define-tag>
-<define-tag secrefs>CVE-2022-42927 CVE-2022-42928 CVE-2022-42929 CVE-2022-42932</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3156.wml b/english/lts/security/2022/dla-3156.wml
deleted file mode 100644
index 9dee3e6eda7..00000000000
--- a/english/lts/security/2022/dla-3156.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code or information disclosure.</p>
-
-<p>In addition, this update brings back support for the armhf architecture.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.4.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3156.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3157.data b/english/lts/security/2022/dla-3157.data
deleted file mode 100644
index 21e46952663..00000000000
--- a/english/lts/security/2022/dla-3157.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3157-1 bluez</define-tag>
-<define-tag report_date>2022-10-24</define-tag>
-<define-tag secrefs>CVE-2019-8921 CVE-2019-8922 CVE-2021-41229 CVE-2021-43400 CVE-2022-0204 CVE-2022-39176 CVE-2022-39177 Bug#998626 Bug#1000262 Bug#1003712</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3157.wml b/english/lts/security/2022/dla-3157.wml
deleted file mode 100644
index 6152c9a6c08..00000000000
--- a/english/lts/security/2022/dla-3157.wml
+++ /dev/null
@@ -1,74 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in BlueZ, the Linux Bluetooth
-protocol stack. An attacker could cause a denial-of-service (DoS) or
-leak information.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8921">CVE-2019-8921</a>
-
- <p>SDP infoleak, the vulnerability lies in the handling of a
- SVC_ATTR_REQ by the SDP implementation of BlueZ. By crafting a
- malicious CSTATE, it is possible to trick the server into
- returning more bytes than the buffer actually holds, resulting in
- leaking arbitrary heap data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8922">CVE-2019-8922</a>
-
- <p>SDP Heap Overflow; this vulnerability lies in the SDP protocol
- handling of attribute requests as well. By requesting a huge
- number of attributes at the same time, an attacker can overflow
- the static buffer provided to hold the response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41229">CVE-2021-41229</a>
-
- <p>sdp_cstate_alloc_buf allocates memory which will always be hung in
- the singly linked list of cstates and will not be freed. This will
- cause a memory leak over time. The data can be a very large
- object, which can be caused by an attacker continuously sending
- sdp packets and this may cause the service of the target device to
- crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43400">CVE-2021-43400</a>
-
- <p>A use-after-free in gatt-database.c can occur when a client
- disconnects during D-Bus processing of a WriteValue call.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0204">CVE-2022-0204</a>
-
- <p>A heap overflow vulnerability was found in bluez. An attacker with
- local network access could pass specially crafted files causing an
- application to halt or crash, leading to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39176">CVE-2022-39176</a>
-
- <p>BlueZ allows physically proximate attackers to obtain sensitive
- information because profiles/audio/avrcp.c does not validate
- params_len.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39177">CVE-2022-39177</a>
-
- <p>BlueZ allows physically proximate attackers to cause a denial of
- service because malformed and invalid capabilities can be
- processed in profiles/audio/avdtp.c.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.50-1.2~deb10u3.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>For the detailed security status of bluez please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/bluez">https://security-tracker.debian.org/tracker/bluez</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3157.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3158.data b/english/lts/security/2022/dla-3158.data
deleted file mode 100644
index 684d17bde85..00000000000
--- a/english/lts/security/2022/dla-3158.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3158-1 wkhtmltopdf</define-tag>
-<define-tag report_date>2022-10-24</define-tag>
-<define-tag secrefs>CVE-2020-21365</define-tag>
-<define-tag packages>wkhtmltopdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3158.wml b/english/lts/security/2022/dla-3158.wml
deleted file mode 100644
index b58757ebd0b..00000000000
--- a/english/lts/security/2022/dla-3158.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that wkhtmltopdf, a command line utility to render HTML
-files into PDF, allowed local filesystem access by default. This update
-disables local filesystem access, but it can be enabled if necessary
-with the --enable-local-file-access or the --allow <path> options.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.12.5-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your wkhtmltopdf packages.</p>
-
-<p>For the detailed security status of wkhtmltopdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wkhtmltopdf">https://security-tracker.debian.org/tracker/wkhtmltopdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3158.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3159.data b/english/lts/security/2022/dla-3159.data
deleted file mode 100644
index e86072ece8d..00000000000
--- a/english/lts/security/2022/dla-3159.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3159-1 libbluray</define-tag>
-<define-tag report_date>2022-10-25</define-tag>
-<define-tag secrefs>Bug#1011716</define-tag>
-<define-tag packages>libbluray</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3159.wml b/english/lts/security/2022/dla-3159.wml
deleted file mode 100644
index 5c4ec0bf117..00000000000
--- a/english/lts/security/2022/dla-3159.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The last Java security update introduced a change that broke libbluray's
-interactive BD-J support. This update adds compatibility with those Java
-changes.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:1.1.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libbluray packages.</p>
-
-<p>For the detailed security status of libbluray please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libbluray">https://security-tracker.debian.org/tracker/libbluray</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3159.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3160.data b/english/lts/security/2022/dla-3160.data
deleted file mode 100644
index 83d933691f0..00000000000
--- a/english/lts/security/2022/dla-3160.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3160-1 tomcat9</define-tag>
-<define-tag report_date>2022-10-26</define-tag>
-<define-tag secrefs>CVE-2021-43980 CVE-2022-23181 CVE-2022-29885</define-tag>
-<define-tag packages>tomcat9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3160.wml b/english/lts/security/2022/dla-3160.wml
deleted file mode 100644
index 92a6d38fc48..00000000000
--- a/english/lts/security/2022/dla-3160.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43980">CVE-2021-43980</a>
-
- <p>The simplified implementation of blocking reads and writes introduced in
- Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing
- (but extremely hard to trigger) concurrency bug that could cause client
- connections to share an Http11Processor instance resulting in responses, or
- part responses, to be received by the wrong client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23181">CVE-2022-23181</a>
-
- <p>The fix for bug <a href="https://security-tracker.debian.org/tracker/CVE-2020-9484">CVE-2020-9484</a> introduced a time of check, time of use
- vulnerability into Apache Tomcat that allowed a local attacker to perform
- actions with the privileges of the user that the Tomcat process is using.
- This issue is only exploitable when Tomcat is configured to persist
- sessions using the FileStore.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29885">CVE-2022-29885</a>
-
- <p>The documentation of Apache Tomcat for the EncryptInterceptor incorrectly
- stated it enabled Tomcat clustering to run over an untrusted network. This
- was not correct. While the EncryptInterceptor does provide confidentiality
- and integrity protection, it does not protect against all risks associated
- with running over any untrusted network, particularly DoS risks.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.0.31-1~deb10u7.</p>
-
-<p>We recommend that you upgrade your tomcat9 packages.</p>
-
-<p>For the detailed security status of tomcat9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat9">https://security-tracker.debian.org/tracker/tomcat9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3160.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3161.data b/english/lts/security/2022/dla-3161.data
deleted file mode 100644
index e2e2a0a6071..00000000000
--- a/english/lts/security/2022/dla-3161.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3161-1 tzdata</define-tag>
-<define-tag report_date>2022-10-26</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3161.wml b/english/lts/security/2022/dla-3161.wml
deleted file mode 100644
index 743c308f837..00000000000
--- a/english/lts/security/2022/dla-3161.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2022e. Notable
-changes are:</p>
-
-<p>- Syria and Jordan are abandoning the DST regime and are changing to
- permanent +03, so they will not fall back from +03 to +02 on
- 2022-10-28.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2021a-0+deb10u8.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3161.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3162.data b/english/lts/security/2022/dla-3162.data
deleted file mode 100644
index ef0580cc362..00000000000
--- a/english/lts/security/2022/dla-3162.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3162-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2022-10-26</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3162.wml b/english/lts/security/2022/dla-3162.wml
deleted file mode 100644
index 27969da106c..00000000000
--- a/english/lts/security/2022/dla-3162.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2022e for the
-Perl bindings. For the list of changes, see DLA-3161-1.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:2.23-1+2022e.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3162.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3163.data b/english/lts/security/2022/dla-3163.data
deleted file mode 100644
index 1c73b5bcb31..00000000000
--- a/english/lts/security/2022/dla-3163.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3163-1 wordpress</define-tag>
-<define-tag report_date>2022-10-26</define-tag>
-<define-tag secrefs>not yet available</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3163.wml b/english/lts/security/2022/dla-3163.wml
deleted file mode 100644
index e852a24ad0a..00000000000
--- a/english/lts/security/2022/dla-3163.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in Wordpress, a
-popular content management framework. Possible SQL injection and cross-site
-scripting (XSS) flaws may allow a remote attacker to execute arbitrary code
-or facilitate the injection of client-side scripts.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.0.18+dfsg1-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3163.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3164.data b/english/lts/security/2022/dla-3164.data
deleted file mode 100644
index 5b61c75ed39..00000000000
--- a/english/lts/security/2022/dla-3164.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3164-1 python-django</define-tag>
-<define-tag report_date>2022-10-28</define-tag>
-<define-tag secrefs>CVE-2020-24583 CVE-2020-24584 CVE-2021-3281 CVE-2021-23336 CVE-2022-34265</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3164.wml b/english/lts/security/2022/dla-3164.wml
deleted file mode 100644
index 7bb5217cd2f..00000000000
--- a/english/lts/security/2022/dla-3164.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were discovered in Django, a popular Python-based
-web development framework:</p>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24583">CVE-2020-24583</a>:
- Fix incorrect permissions on intermediate-level directories on Python 3.7+.
- FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level
- directories created in the process of uploading files and to
- intermediate-level collected static directories when using the collectstatic
- management command. You should review and manually fix permissions on
- existing intermediate-level directories.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24584">CVE-2020-24584</a>:
- Correct permission escalation vulnerability in intermediate-level directories
- of the file system cache. On Python 3.7 and above, the intermediate-level
- directories of the file system cache had the system's standard umask rather
- than 0o077 (no group or others permissions).</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3281">CVE-2021-3281</a>:
- Fix a potential directory-traversal exploit via archive.extract(). The
- django.utils.archive.extract() function, used by startapp --template and
- startproject --template, allowed directory traversal via an archive with
- absolute paths or relative paths with dot segments.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23336">CVE-2021-23336</a>:
- Prevent a web cache poisoning attack via "parameter cloaking". Django
- contains a copy of urllib.parse.parse_qsl() which was added to backport some
- security fixes. A further security fix has been issued recently such that
- parse_qsl() no longer allows using ";" as a query parameter separator by
- default.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34265">CVE-2022-34265</a>:
- The Trunc() and Extract() database functions were subject to a potential SQL
- injection attack if untrusted data was used as a value for the "kind" or
- "lookup_name" parameters. Applications that constrain the choice to a known
- safe list were unaffected.</li>
-</ul>
-
-<ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1:1.11.29-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3164.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3165.data b/english/lts/security/2022/dla-3165.data
deleted file mode 100644
index 6c19235893d..00000000000
--- a/english/lts/security/2022/dla-3165.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3165-1 expat</define-tag>
-<define-tag report_date>2022-10-28</define-tag>
-<define-tag secrefs>CVE-2022-43680 Bug#1022743</define-tag>
-<define-tag packages>expat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3165.wml b/english/lts/security/2022/dla-3165.wml
deleted file mode 100644
index 84ae7f9821b..00000000000
--- a/english/lts/security/2022/dla-3165.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In src:expat, an XML parsing C library, there is a use-after free
-caused by overeager destruction of a shared DTD in
-XML_ExternalEntityParserCreate in out-of-memory situations.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.2.6-2+deb10u6.</p>
-
-<p>We recommend that you upgrade your expat packages.</p>
-
-<p>For the detailed security status of expat please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/expat">https://security-tracker.debian.org/tracker/expat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3165.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3166.data b/english/lts/security/2022/dla-3166.data
deleted file mode 100644
index e2be776bed5..00000000000
--- a/english/lts/security/2022/dla-3166.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3166-1 ruby-sinatra</define-tag>
-<define-tag report_date>2022-10-28</define-tag>
-<define-tag secrefs>CVE-2022-29970 Bug#1014717</define-tag>
-<define-tag packages>ruby-sinatra</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3166.wml b/english/lts/security/2022/dla-3166.wml
deleted file mode 100644
index f5a176c536c..00000000000
--- a/english/lts/security/2022/dla-3166.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A file traversal vulnerability was discovered in src:ruby-sinatra, a
-popular web server often used with Ruby on Rails. We now validate that
-any expanded paths match the allowed `public_dir` when serving static
-files.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.0.5-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-sinatra packages.</p>
-
-<p>For the detailed security status of ruby-sinatra please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-sinatra">https://security-tracker.debian.org/tracker/ruby-sinatra</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3166.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3167.data b/english/lts/security/2022/dla-3167.data
deleted file mode 100644
index 4dc86eaee4b..00000000000
--- a/english/lts/security/2022/dla-3167.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3167-1 ncurses</define-tag>
-<define-tag report_date>2022-10-29</define-tag>
-<define-tag secrefs>CVE-2022-29458</define-tag>
-<define-tag packages>ncurses</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3167.wml b/english/lts/security/2022/dla-3167.wml
deleted file mode 100644
index 0dec0dd075b..00000000000
--- a/english/lts/security/2022/dla-3167.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in ncurses, a collection of shared libraries for
-terminal handling.
-This issue is about an out-of-bounds read in convert_strings in the
-terminfo library.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-6.1+20181013-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your ncurses packages.</p>
-
-<p>For the detailed security status of ncurses please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ncurses">https://security-tracker.debian.org/tracker/ncurses</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LT">https://wiki.debian.org/LT</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3167.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3168.data b/english/lts/security/2022/dla-3168.data
deleted file mode 100644
index 148fee8623a..00000000000
--- a/english/lts/security/2022/dla-3168.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3168-1 openvswitch</define-tag>
-<define-tag report_date>2022-10-29</define-tag>
-<define-tag secrefs>CVE-2022-32166</define-tag>
-<define-tag packages>openvswitch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3168.wml b/english/lts/security/2022/dla-3168.wml
deleted file mode 100644
index 6b2e0f3d3ce..00000000000
--- a/english/lts/security/2022/dla-3168.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in openvswitch, a software-based, Ethernet
-virtual switch.</p>
-
-<p>This issue is about a heap buffer over-read in flow.c, which could lead
-to access to an unmapped region of memory. This could result in crashing
-the software, memory modification, or possible remote execution.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.10.7+ds1-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your openvswitch packages.</p>
-
-<p>For the detailed security status of openvswitch please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openvswitch">https://security-tracker.debian.org/tracker/openvswitch</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3168.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3169.data b/english/lts/security/2022/dla-3169.data
deleted file mode 100644
index cf3fe0954f5..00000000000
--- a/english/lts/security/2022/dla-3169.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3169-1 batik</define-tag>
-<define-tag report_date>2022-10-29</define-tag>
-<define-tag secrefs>CVE-2022-41704 CVE-2022-42890</define-tag>
-<define-tag packages>batik</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3169.wml b/english/lts/security/2022/dla-3169.wml
deleted file mode 100644
index 86f41d7c29b..00000000000
--- a/english/lts/security/2022/dla-3169.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Apache Batik, a SVG library for Java, allowed
-attackers to run arbitrary Java code by processing a malicious SVG file.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.10-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your batik packages.</p>
-
-<p>For the detailed security status of batik please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/batik">https://security-tracker.debian.org/tracker/batik</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3169.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3170.data b/english/lts/security/2022/dla-3170.data
deleted file mode 100644
index 3ac56007b88..00000000000
--- a/english/lts/security/2022/dla-3170.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3170-1 thunderbird</define-tag>
-<define-tag report_date>2022-10-30</define-tag>
-<define-tag secrefs>CVE-2022-42927 CVE-2022-42928 CVE-2022-42929 CVE-2022-42932</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3170.wml b/english/lts/security/2022/dla-3170.wml
deleted file mode 100644
index a3aa47afa78..00000000000
--- a/english/lts/security/2022/dla-3170.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.4.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3170.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3171.data b/english/lts/security/2022/dla-3171.data
deleted file mode 100644
index f08ccb6ffcb..00000000000
--- a/english/lts/security/2022/dla-3171.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3171-1 distro-info-data</define-tag>
-<define-tag report_date>2022-10-30</define-tag>
-<define-tag packages>distro-info-data</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3171.wml b/english/lts/security/2022/dla-3171.wml
deleted file mode 100644
index 007dc64ea92..00000000000
--- a/english/lts/security/2022/dla-3171.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS database update</define-tag>
-<define-tag moreinfo>
-<p>This is a routine update of the distro-info-data database for Debian LTS users.</p>
-
-<p>It includes a correction to some historical data, and adds Ubuntu 23.04, Lunar Lobster.</p>
-
-<p>For Debian 10 buster, these issues have been fixed in version 0.41+deb10u6.</p>
-
-<p>We recommend that you upgrade your distro-info-data packages.</p>
-
-<p>For the detailed security status of distro-info-data please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/distro-info-data">https://security-tracker.debian.org/tracker/distro-info-data</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3171.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3172.data b/english/lts/security/2022/dla-3172.data
deleted file mode 100644
index 3b45c7a4d61..00000000000
--- a/english/lts/security/2022/dla-3172.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3172-1 libxml2</define-tag>
-<define-tag report_date>2022-10-30</define-tag>
-<define-tag secrefs>CVE-2022-40303 CVE-2022-40304 Bug#1022224 Bug#1022225</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3172.wml b/english/lts/security/2022/dla-3172.wml
deleted file mode 100644
index 147cad45157..00000000000
--- a/english/lts/security/2022/dla-3172.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libxml2, the GNOME XML library, was vulnerable to
-integer overflows and memory corruption.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40303">CVE-2022-40303</a>
-
- <p>Parsing a XML document with the XML_PARSE_HUGE option enabled can result
- in an integer overflow because safety checks were missing in some
- functions. Also, the xmlParseEntityValue function did not have any length
- limitation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40304">CVE-2022-40304</a>
-
- <p>When a reference cycle is detected in the XML entity cleanup function the
- XML entity data can be stored in a dictionary. In this case, the
- dictionary becomes corrupted resulting in logic errors, including memory
- errors like double free.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.9.4+dfsg1-7+deb10u5.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3172.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3173.data b/english/lts/security/2022/dla-3173.data
deleted file mode 100644
index f83330e8451..00000000000
--- a/english/lts/security/2022/dla-3173.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3173-1 linux-5.10</define-tag>
-<define-tag report_date>2022-11-01</define-tag>
-<define-tag secrefs>CVE-2021-4037 CVE-2022-0171 CVE-2022-1184 CVE-2022-1679 CVE-2022-2153 CVE-2022-2602 CVE-2022-2663 CVE-2022-2905 CVE-2022-3028 CVE-2022-3061 CVE-2022-3176 CVE-2022-3303 CVE-2022-3586 CVE-2022-3621 CVE-2022-3625 CVE-2022-3629 CVE-2022-3633 CVE-2022-3635 CVE-2022-3646 CVE-2022-3649 CVE-2022-20421 CVE-2022-20422 CVE-2022-39188 CVE-2022-39190 CVE-2022-39842 CVE-2022-40307 CVE-2022-41222 CVE-2022-41674 CVE-2022-42719 CVE-2022-42720 CVE-2022-42721 CVE-2022-42722 CVE-2022-43750 Bug#1017425 Bug#1019248</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3173.wml b/english/lts/security/2022/dla-3173.wml
deleted file mode 100644
index c6dabd0b60a..00000000000
--- a/english/lts/security/2022/dla-3173.wml
+++ /dev/null
@@ -1,224 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4037">CVE-2021-4037</a>
-
- <p>Christian Brauner reported that the inode_init_owner function for
- the XFS filesystem in the Linux kernel allows local users to
- create files with an unintended group ownership allowing attackers
- to escalate privileges by making a plain file executable and SGID.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0171">CVE-2022-0171</a>
-
- <p>Mingwei Zhang reported that a cache incoherence issue in the SEV
- API in the KVM subsystem may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1184">CVE-2022-1184</a>
-
- <p>A flaw was discovered in the ext4 filesystem driver which can lead
- to a use-after-free. A local user permitted to mount arbitrary
- filesystems could exploit this to cause a denial of service (crash
- or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1679">CVE-2022-1679</a>
-
- <p>The syzbot tool found a race condition in the ath9k_htc driver
- which can lead to a use-after-free. This might be exploitable to
- cause a denial service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2153">CVE-2022-2153</a>
-
- <p><q>kangel</q> reported a flaw in the KVM implementation for x86
- processors which could lead to a null pointer dereference. A local
- user permitted to access /dev/kvm could exploit this to cause a
- denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2602">CVE-2022-2602</a>
-
- <p>A race between handling an io_uring request and the Unix socket
- garbage collector was discovered. An attacker can take advantage
- of this flaw for local privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2663">CVE-2022-2663</a>
-
- <p>David Leadbeater reported flaws in the nf_conntrack_irc
- connection-tracking protocol module. When this module is enabled
- on a firewall, an external user on the same IRC network as an
- internal user could exploit its lax parsing to open arbitrary TCP
- ports in the firewall, to reveal their public IP address, or to
- block their IRC connection at the firewall.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2905">CVE-2022-2905</a>
-
- <p>Hsin-Wei Hung reported a flaw in the eBPF verifier which can lead
- to an out-of-bounds read. If unprivileged use of eBPF is enabled,
- this could leak sensitive information. This was already disabled
- by default, which would fully mitigate the vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3028">CVE-2022-3028</a>
-
- <p>Abhishek Shah reported a race condition in the AF_KEY subsystem,
- which could lead to an out-of-bounds write or read. A local user
- could exploit this to cause a denial of service (crash or memory
- corruption), to obtain sensitive information, or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3061">CVE-2022-3061</a>
-
- <p>A flaw was discovered in the i740 driver which may result in
- denial of service.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3176">CVE-2022-3176</a>
-
- <p>A use-after-free flaw was discovered in the io_uring subsystem
- which may result in local privilege escalation to root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3303">CVE-2022-3303</a>
-
- <p>A race condition in the snd_pcm_oss_sync function in the sound
- subsystem in the Linux kernel due to improper locking may result
- in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3586">CVE-2022-3586</a> (ZDI-22-1452)
-
- <p>The Zero Day Initiative reported a flaw in the sch_sfb network
- scheduler, which may lead to a use-after-free and leak of
- sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3621">CVE-2022-3621</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-3646">CVE-2022-3646</a>
-
- <p>The syzbot tool found flaws in the nilfs2 filesystem driver which
- can lead to a null pointer dereference or memory leak. A user
- permitted to mount arbitrary filesystem images could use these to
- cause a denial of service (crash or resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3625">CVE-2022-3625</a>
-
- <p>A flaw was discovered in the devlink subsystem which can lead to
- a use-after-free. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3629">CVE-2022-3629</a>
-
- <p>The syzbot tool found a memory leak in the Virtual Socket Protocol
- implementation. A local user could exploit this to cause a denial
- of service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3633">CVE-2022-3633</a>
-
- <p>The Linux Verification Center found a memory leak in the SAE J1939
- protocol implementation. A local user could exploit this to cause
- a denial of service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3635">CVE-2022-3635</a>
-
- <p>Several race conditions were discovered in the idt77252 ATM
- driver, which can lead to a use-after-free if the module is
- removed. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3649">CVE-2022-3649</a>
-
- <p>The syzbot tool found flaws in the nilfs2 filesystem driver which
- can lead to a use-after-free. A user permitted to mount arbitrary
- filesystem images could use these to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-20421">CVE-2022-20421</a>
-
- <p>A use-after-free vulnerability was discovered in the
- binder_inc_ref_for_node function in the Android binder driver. On
- systems where the binder driver is loaded, a local user could
- exploit this for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-20422">CVE-2022-20422</a>
-
- <p>A race condition was discovered in the instruction emulator for
- 64-bit Arm systems. Concurrent changes to the sysctls that
- control the emulator could result in a null pointer dereference.
- The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39188">CVE-2022-39188</a>
-
- <p>Jann Horn reported a race condition in the kernel's handling of
- unmapping of certain memory ranges. When a driver created a memory
- mapping with the VM_PFNMAP flag, which many GPU drivers do, the
- memory mapping could be removed and freed before it was flushed
- from the CPU TLBs. This could result in a page use-after-free. A
- local user with access to such a device could exploit this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39190">CVE-2022-39190</a>
-
- <p>Gwangun Jung reported a flaw in the nf_tables subsystem. A local
- user could exploit this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39842">CVE-2022-39842</a>
-
- <p>An integer overflow was discovered in the pxa3xx-gcu video driver
- which could lead to a heap out-of-bounds write.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40307">CVE-2022-40307</a>
-
- <p>A race condition was discovered in the EFI capsule-loader driver,
- which could lead to use-after-free. A local user permitted to
- access this device (/dev/efi_capsule_loader) could exploit this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation. However, this device is normally only
- accessible by the root user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41222">CVE-2022-41222</a>
-
- <p>A race condition was discovered in the memory management subsystem
- that can lead to stale TLB entries. A local user could exploit
- this to cause a denial of service (memory corruption or crash),
- information leak, or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41674">CVE-2022-41674</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-42719">CVE-2022-42719</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-42720">CVE-2022-42720</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-42721">CVE-2022-42721</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-42722">CVE-2022-42722</a>
-
- <p>Soenke Huster discovered several vulnerabilities in the mac80211
- subsystem triggered by WLAN frames which may result in denial of
- service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43750">CVE-2022-43750</a>
-
- <p>The syzbot tool found that the USB monitor (usbmon) driver allowed
- user-space programs to overwrite the driver's data structures. A
- local user permitted to access a USB monitor device could exploit
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation. However, by default only the
- root user can access such devices.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.149-2~deb10u1. This update also fixes a regression for some
-older 32-bit PCs (bug <a href="https://bugs.debian.org/1017425">#1017425</a>), and enables the i10nm_edac driver
-(bug <a href="https://bug.debian.org/1019248">#1019248</a>). It additionally includes many more bug fixes from
-stable updates 5.10.137-5.10.149 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3173.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3174.data b/english/lts/security/2022/dla-3174.data
deleted file mode 100644
index ef159eb89c2..00000000000
--- a/english/lts/security/2022/dla-3174.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3174-1 pysha3</define-tag>
-<define-tag report_date>2022-10-31</define-tag>
-<define-tag secrefs>CVE-2022-37454 Bug#1023030</define-tag>
-<define-tag packages>pysha3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3174.wml b/english/lts/security/2022/dla-3174.wml
deleted file mode 100644
index ae1142066c9..00000000000
--- a/english/lts/security/2022/dla-3174.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nicky Mouha discovered a buffer overflow in <q>sha3</q>, a Python library for
-the SHA-3 hashing functions.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your pysha3 packages.</p>
-
-<p>For the detailed security status of pysha3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pysha3">https://security-tracker.debian.org/tracker/pysha3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3174.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3175.data b/english/lts/security/2022/dla-3175.data
deleted file mode 100644
index 1f033b131eb..00000000000
--- a/english/lts/security/2022/dla-3175.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3175-1 python3.7</define-tag>
-<define-tag report_date>2022-11-01</define-tag>
-<define-tag secrefs>CVE-2022-37454</define-tag>
-<define-tag packages>python3.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3175.wml b/english/lts/security/2022/dla-3175.wml
deleted file mode 100644
index aee7bb65b61..00000000000
--- a/english/lts/security/2022/dla-3175.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nicky Mouha discovered a buffer overflow in <q>_sha3</q>, the SHA-3 hashing function
-module used by <q>hashlib</q> in Python 3.7.</p>
-
-<p>While the attacks require a large volume of data, they could potentially result
-in remote code execution.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.7.3-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your python3.7 packages.</p>
-
-<p>For the detailed security status of python3.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.7">https://security-tracker.debian.org/tracker/python3.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3175.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3176.data b/english/lts/security/2022/dla-3176.data
deleted file mode 100644
index 136232a4f76..00000000000
--- a/english/lts/security/2022/dla-3176.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3176-1 clickhouse</define-tag>
-<define-tag report_date>2022-11-07</define-tag>
-<define-tag secrefs>CVE-2021-42387 CVE-2021-42388 CVE-2021-43304 CVE-2021-43305 Bug#1008216</define-tag>
-<define-tag packages>clickhouse</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3176.wml b/english/lts/security/2022/dla-3176.wml
deleted file mode 100644
index 0fde0e85685..00000000000
--- a/english/lts/security/2022/dla-3176.wml
+++ /dev/null
@@ -1,76 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in clickhouse, a
-column-oriented database system.</p>
-
-
-<p>The vulnerabilities require authentication, but can be triggered by any user
-with read permissions. This means the attacker must perform reconnaissance on
-the specific ClickHouse server target to obtain valid credentials. Any set of
-credentials would do, since even a user with the lowest privileges can trigger
-all of the vulnerabilities. By triggering the vulnerabilities, an attacker can
-crash the ClickHouse server, leak memory contents or even cause remote code
-execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42387">CVE-2021-42387</a>:
-
- <p>Heap out-of-bounds read in Clickhouse's LZ4 compression codec when
- parsing a malicious query. As part of the LZ4::decompressImpl() loop,
- a 16-bit unsigned user-supplied value ('offset') is read from the
- compressed data. The offset is later used in the length of a copy
- operation, without checking the upper bounds of the source of the copy
- operation.</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42388">CVE-2021-42388</a>:
-
- <p>Heap out-of-bounds read in Clickhouse's LZ4 compression codec when
- parsing a malicious query. As part of the LZ4::decompressImpl() loop,
- a 16-bit unsigned user-supplied value ('offset') is read from the
- compressed data. The offset is later used in the length of a copy
- operation, without checking the lower bounds of the source of the copy
- operation.</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43304">CVE-2021-43304</a>:
-
- <p>Heap buffer overflow in Clickhouse's LZ4 compression codec when
- parsing a malicious query. There is no verification that the copy
- operations in the LZ4::decompressImpl loop and especially the
- arbitrary copy operation wildCopy&lt;copy_amount&gt;(op, ip,
- copy_end), don&amp;#8217;t exceed the destination buffer&amp;#8217;s
- limits.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43305">CVE-2021-43305</a>:
-
- <p>Heap buffer overflow in Clickhouse's LZ4 compression codec when
- parsing a malicious query. There is no verification that the copy
- operations in the LZ4::decompressImpl loop and especially the
- arbitrary copy operation wildCopy&lt;copy_amount&gt;(op, ip,
- copy_end), don&amp;#8217;t exceed the destination buffer&amp;#8217;s
- limits. This issue is very similar to <a href="https://security-tracker.debian.org/tracker/CVE-2021-43304">CVE-2021-43304</a>, but the
- vulnerable copy operation is in a different wildCopy call.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-18.16.1+ds-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your clickhouse packages.</p>
-
-<p>For the detailed security status of clickhouse please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clickhouse">https://security-tracker.debian.org/tracker/clickhouse</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3176.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3177.data b/english/lts/security/2022/dla-3177.data
deleted file mode 100644
index 5da9acd2008..00000000000
--- a/english/lts/security/2022/dla-3177.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3177-1 python-django</define-tag>
-<define-tag report_date>2022-11-04</define-tag>
-<define-tag secrefs>CVE-2022-28346 CVE-2021-45115 CVE-2021-45116</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3177.wml b/english/lts/security/2022/dla-3177.wml
deleted file mode 100644
index 844d1c76752..00000000000
--- a/english/lts/security/2022/dla-3177.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were multiple vulnerabilies in Django, a
-popular Python-based development framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28346">CVE-2022-28346</a>:
-An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0
-before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject
-to SQL injection in column aliases via a crafted dictionary (with dictionary
-expansion) as the passed **kwargs.</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45115">CVE-2021-45115</a>:
-An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0
-before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in
-evaluating a submitted password that was artificially large in relation to the
-comparison values. In a situation where access to user registration was
-unrestricted, this provided a potential vector for a denial-of-service
-attack.</li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45116">CVE-2021-45116</a>:
-An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0
-before 4.0.1. Due to leveraging the Django Template Language's variable
-resolution logic, the dictsort template filter was potentially vulnerable to
-information disclosure, or an unintended method call, if passed a suitably
-crafted key.</li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1:1.11.29-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3177.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3178.data b/english/lts/security/2022/dla-3178.data
deleted file mode 100644
index 5ae99e3d9dd..00000000000
--- a/english/lts/security/2022/dla-3178.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3178-1 ffmpeg</define-tag>
-<define-tag report_date>2022-11-04</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3178.wml b/english/lts/security/2022/dla-3178.wml
deleted file mode 100644
index ec2d8aee06e..00000000000
--- a/english/lts/security/2022/dla-3178.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the FFmpeg multimedia
-framework, which could result in denial of service or potentially the
-execution of arbitrary code if malformed files/streams are processed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-7:4.1.10-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3178.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3179.data b/english/lts/security/2022/dla-3179.data
deleted file mode 100644
index d601c3cfed5..00000000000
--- a/english/lts/security/2022/dla-3179.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3179-1 pixman</define-tag>
-<define-tag report_date>2022-11-07</define-tag>
-<define-tag secrefs>CVE-2022-44638</define-tag>
-<define-tag packages>pixman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3179.wml b/english/lts/security/2022/dla-3179.wml
deleted file mode 100644
index 9c23bd6021d..00000000000
--- a/english/lts/security/2022/dla-3179.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential out-of-bounds write
-vulnerability in pixman, a pixel-manipulation library used in many Linux
-graphical applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44638">CVE-2022-44638</a>
-
- <p>In libpixman in Pixman before 0.42.2, there is an out-of-bounds write
- (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer
- overflow in pixman_sample_floor_y.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-0.36.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your pixman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3179.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3180.data b/english/lts/security/2022/dla-3180.data
deleted file mode 100644
index 50c1dafdcd9..00000000000
--- a/english/lts/security/2022/dla-3180.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3180-1 python-scciclient</define-tag>
-<define-tag report_date>2022-11-07</define-tag>
-<define-tag secrefs>CVE-2022-2996 Bug#1018213</define-tag>
-<define-tag packages>python-scciclient</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3180.wml b/english/lts/security/2022/dla-3180.wml
deleted file mode 100644
index 9bc795f4ac9..00000000000
--- a/english/lts/security/2022/dla-3180.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that scciclient did not verify server TLS certificates
-when making requests.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.7.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your python-scciclient packages.</p>
-
-<p>For the detailed security status of python-scciclient please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-scciclient">https://security-tracker.debian.org/tracker/python-scciclient</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3180.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3181.data b/english/lts/security/2022/dla-3181.data
deleted file mode 100644
index dd08c4228b5..00000000000
--- a/english/lts/security/2022/dla-3181.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3181-1 sudo</define-tag>
-<define-tag report_date>2022-11-07</define-tag>
-<define-tag secrefs>CVE-2021-23239</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3181.wml b/english/lts/security/2022/dla-3181.wml
deleted file mode 100644
index 1ef3a2ea961..00000000000
--- a/english/lts/security/2022/dla-3181.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a information disclosure utility in sudo, a
-tool used to provide limited superuser privileges to specific users. A local
-unprivileged user may have been able to perform arbitrary directory-existence
-tests by exploiting a race condition in sudoedit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23239">CVE-2021-23239</a>
-
- <p>The sudoedit personality of Sudo before 1.9.5 may allow a local
- unprivileged user to perform arbitrary directory-existence tests by winning
- a sudo_edit.c race condition in replacing a user-controlled directory by a
- symlink to an arbitrary path.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.8.27-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3181.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3182.data b/english/lts/security/2022/dla-3182.data
deleted file mode 100644
index dad0c86539d..00000000000
--- a/english/lts/security/2022/dla-3182.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3182-1 vim</define-tag>
-<define-tag report_date>2022-11-08</define-tag>
-<define-tag secrefs>CVE-2021-3927 CVE-2021-3928 CVE-2021-3974 CVE-2021-3984 CVE-2021-4019 CVE-2021-4069 CVE-2021-4192 CVE-2021-4193 CVE-2022-0213 CVE-2022-0261 CVE-2022-0319 CVE-2022-0351 CVE-2022-0359 CVE-2022-0361 CVE-2022-0368 CVE-2022-0408 CVE-2022-0413 CVE-2022-0417 CVE-2022-0443 CVE-2022-0554 CVE-2022-0572 CVE-2022-0685 CVE-2022-0714 CVE-2022-0729 CVE-2022-0943 CVE-2022-1154 CVE-2022-1616 CVE-2022-1720 CVE-2022-1851 CVE-2022-1898 CVE-2022-1968 CVE-2022-2285 CVE-2022-2304 CVE-2022-2598 CVE-2022-2946 CVE-2022-3099 CVE-2022-3134 CVE-2022-3234 CVE-2022-3324 CVE-2022-3705</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3182.wml b/english/lts/security/2022/dla-3182.wml
deleted file mode 100644
index a084bcef5e4..00000000000
--- a/english/lts/security/2022/dla-3182.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in vim, an enhanced
-vi editor. Buffer overflows, out-of-bounds reads and use-after-free may lead to
-a denial-of-service (application crash) or other unspecified impact.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:8.1.0875-5+deb10u3.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3182.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3183.data b/english/lts/security/2022/dla-3183.data
deleted file mode 100644
index e951f5d2490..00000000000
--- a/english/lts/security/2022/dla-3183.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3183-1 webkit2gtk</define-tag>
-<define-tag report_date>2022-11-09</define-tag>
-<define-tag secrefs>CVE-2022-42799 CVE-2022-42823 CVE-2022-42824</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3183.wml b/english/lts/security/2022/dla-3183.wml
deleted file mode 100644
index d470d94b873..00000000000
--- a/english/lts/security/2022/dla-3183.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42799">CVE-2022-42799</a>
-
- <p>Jihwan Kim and Dohyun Lee discovered that visiting a malicious
- website may lead to user interface spoofing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42823">CVE-2022-42823</a>
-
- <p>Dohyun Lee discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42824">CVE-2022-42824</a>
-
- <p>Abdulrahman Alqabandi, Ryan Shin and Dohyun Lee discovered that
- processing maliciously crafted web content may disclose sensitive
- user information.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.38.2-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3183.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3184.data b/english/lts/security/2022/dla-3184.data
deleted file mode 100644
index 577324e583b..00000000000
--- a/english/lts/security/2022/dla-3184.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3184-1 libjettison-java</define-tag>
-<define-tag report_date>2022-11-10</define-tag>
-<define-tag secrefs>CVE-2022-40149 Bug#1022554</define-tag>
-<define-tag packages>libjettison-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3184.wml b/english/lts/security/2022/dla-3184.wml
deleted file mode 100644
index 93b79d7d6dd..00000000000
--- a/english/lts/security/2022/dla-3184.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that libjettison-java, a collection of StAX parsers and
-writers for JSON, was vulnerable to a denial-of-service attack, if the
-attacker provided untrusted XML or JSON data.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libjettison-java packages.</p>
-
-<p>For the detailed security status of libjettison-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libjettison-java">https://security-tracker.debian.org/tracker/libjettison-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3184.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3185.data b/english/lts/security/2022/dla-3185.data
deleted file mode 100644
index b22bdb26b60..00000000000
--- a/english/lts/security/2022/dla-3185.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3185-1 xorg-server</define-tag>
-<define-tag report_date>2022-11-10</define-tag>
-<define-tag secrefs>CVE-2022-3550 CVE-2022-3551</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3185.wml b/english/lts/security/2022/dla-3185.wml
deleted file mode 100644
index a9caada7d5b..00000000000
--- a/english/lts/security/2022/dla-3185.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in the Xkb extension of the X.org X server,
-which could result in denial of service or possibly privilege escalation
-if the X server is running privileged.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.20.4-1+deb10u6.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3185.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3186.data b/english/lts/security/2022/dla-3186.data
deleted file mode 100644
index a3fb46e5bb7..00000000000
--- a/english/lts/security/2022/dla-3186.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3186-1 exiv2</define-tag>
-<define-tag report_date>2022-11-10</define-tag>
-<define-tag secrefs>CVE-2017-11683 CVE-2020-19716 Bug#876893</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3186.wml b/english/lts/security/2022/dla-3186.wml
deleted file mode 100644
index 490fec465c5..00000000000
--- a/english/lts/security/2022/dla-3186.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three vulnerabilities have been fixed that could, under rare circumstances, lead to
-remotely exploitable DoS vulnerabilities in software using exiv2 for meta-data
-extraction.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11683">CVE-2017-11683</a>
-
- <p>Crash due to a reachable assertion on crafted input</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19716">CVE-2020-19716</a>
-
- <p>Buffer overflow when handling crafted meta-data of CRW images</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.25-4+deb10u3.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>For the detailed security status of exiv2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/exiv2">https://security-tracker.debian.org/tracker/exiv2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3186.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3187.data b/english/lts/security/2022/dla-3187.data
deleted file mode 100644
index c20a0aa99d9..00000000000
--- a/english/lts/security/2022/dla-3187.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3187-1 dropbear</define-tag>
-<define-tag report_date>2022-11-14</define-tag>
-<define-tag secrefs>CVE-2021-36369</define-tag>
-<define-tag packages>dropbear</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3187.wml b/english/lts/security/2022/dla-3187.wml
deleted file mode 100644
index 1a160775904..00000000000
--- a/english/lts/security/2022/dla-3187.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was discovered in Dropbear, a relatively small SSH server and
-client. Due to a non-RFC-compliant check of the available authentication
-methods in the client-side SSH code, it was possible for an SSH server
-to change the login process in its favor. This attack can bypass
-additional security measures such as FIDO2 tokens or SSH-Askpass. Thus,
-it allows an attacker to abuse a forwarded agent for logging on to
-another server unnoticed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2018.76-5+deb10u2.</p>
-
-<p>We recommend that you upgrade your dropbear packages.</p>
-
-<p>For the detailed security status of dropbear please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dropbear">https://security-tracker.debian.org/tracker/dropbear</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3187.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3188.data b/english/lts/security/2022/dla-3188.data
deleted file mode 100644
index 39606a95602..00000000000
--- a/english/lts/security/2022/dla-3188.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3188-1 sysstat</define-tag>
-<define-tag report_date>2022-11-14</define-tag>
-<define-tag secrefs>CVE-2019-16167 CVE-2019-19725 CVE-2022-39377 Bug#939914 Bug#946657 Bug#1023832</define-tag>
-<define-tag packages>sysstat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3188.wml b/english/lts/security/2022/dla-3188.wml
deleted file mode 100644
index c9b65315592..00000000000
--- a/english/lts/security/2022/dla-3188.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There were a couple of secuity issues found in sysstat, system
-performance tools for Linux, which are as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16167">CVE-2019-16167</a>
-
- <p>sysstat before 12.1.6 has memory corruption due to an Integer
- Overflow in remap_struct() in sa_common.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19725">CVE-2019-19725</a>
-
- <p>sysstat through 12.2.0 has a double free in check_file_actlst
- in sa_common.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39377">CVE-2022-39377</a>
-
- <p>On 32 bit systems, allocate_structures contains a size_t overflow
- in sa_common.c. The allocate_structures function insufficiently
- checks bounds before arithmetic multiplication, allowing for an
- overflow in the size allocated for the buffer representing system
- activities. This issue may lead to Remote Code Execution (RCE).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-12.0.3-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your sysstat packages.</p>
-
-<p>For the detailed security status of sysstat please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sysstat">https://security-tracker.debian.org/tracker/sysstat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3188.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3189.data b/english/lts/security/2022/dla-3189.data
deleted file mode 100644
index 35a53514713..00000000000
--- a/english/lts/security/2022/dla-3189.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3189-1 postgresql-11</define-tag>
-<define-tag report_date>2022-11-15</define-tag>
-<define-tag packages>postgresql-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3189.wml b/english/lts/security/2022/dla-3189.wml
deleted file mode 100644
index 9d7a7f88dc5..00000000000
--- a/english/lts/security/2022/dla-3189.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several bugs were discovered in PostgreSQL, a relational database server
-system. This new LTS minor version update fixes over 25 bugs that were
-reported in the last several months. The complete and detailed list of
-issues could be found at: <a href="https://www.postgresql.org/docs/release/11.18.">https://www.postgresql.org/docs/release/11.18.</a></p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-11.18-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your postgresql-11 packages.</p>
-
-<p>For the detailed security status of postgresql-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3189.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3190-2.data b/english/lts/security/2022/dla-3190-2.data
deleted file mode 100644
index 132354e092e..00000000000
--- a/english/lts/security/2022/dla-3190-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3190-2 grub2</define-tag>
-<define-tag report_date>2022-12-10</define-tag>
-<define-tag secrefs>CVE-2022-2601 CVE-2022-3775 Bug#1024617</define-tag>
-<define-tag packages>grub2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3190-2.wml b/english/lts/security/2022/dla-3190-2.wml
deleted file mode 100644
index 5562c0914d1..00000000000
--- a/english/lts/security/2022/dla-3190-2.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Zhang Boyang reported that the grub2 update released as DLA 3190-1 did
-not correctly apply fixes for <a href="https://security-tracker.debian.org/tracker/CVE-2022-2601">CVE-2022-2601</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2022-3775">CVE-2022-3775</a>. Updated
-packages are now available to address this issue. For reference the
-original advisory text follows.</p>
-
-<p>Several issues were found in GRUB2's font handling code, which could
-result in crashes and potentially execution of arbitrary code. These
-could lead to by-pass of UEFI Secure Boot on affected systems.</p>
-
-<p>Further, issues were found in image loading that could potentially
-lead to memory overflows.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.06-3~deb10u3.</p>
-
-<p>We recommend that you upgrade your grub2 packages.</p>
-
-<p>For the detailed security status of grub2 please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/grub2">https://security-tracker.debian.org/tracker/grub2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3190-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3190.data b/english/lts/security/2022/dla-3190.data
deleted file mode 100644
index 5d382c09486..00000000000
--- a/english/lts/security/2022/dla-3190.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3190-1 grub2</define-tag>
-<define-tag report_date>2022-11-16</define-tag>
-<define-tag secrefs>CVE-2022-2601 CVE-2022-3775</define-tag>
-<define-tag packages>grub2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3190.wml b/english/lts/security/2022/dla-3190.wml
deleted file mode 100644
index 325e544da25..00000000000
--- a/english/lts/security/2022/dla-3190.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in GRUB2's font handling code, which could
-result in crashes and potentially execution of arbitrary code. These
-could lead to by-pass of UEFI Secure Boot on affected systems.</p>
-
-<p>Further, issues were found in image loading that could potentially
-lead to memory overflows.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.06-3~deb10u2.</p>
-
-<p>We recommend that you upgrade your grub2 packages.</p>
-
-<p>For the detailed security status of grub2 please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/grub2">https://security-tracker.debian.org/tracker/grub2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3190.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3191.data b/english/lts/security/2022/dla-3191.data
deleted file mode 100644
index 2330af35124..00000000000
--- a/english/lts/security/2022/dla-3191.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3191-1 python-django</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2021-45452 CVE-2022-22818 CVE-2022-23833</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3191.wml b/english/lts/security/2022/dla-3191.wml
deleted file mode 100644
index 657e72c83f2..00000000000
--- a/english/lts/security/2022/dla-3191.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple issues were discovered in Django, a Python-based web
-development framework:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45452">CVE-2021-45452</a>
-
- <p>Storage.save allowed directory traversal if
- crafted filenames were passed directlyto it.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-22818">CVE-2022-22818</a>
-
- <p>The {% debug %} template tag did not properly
- encode the current context. This may lead to a cross-site
- scripting (XSS) vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23833">CVE-2022-23833</a>
-
- <p>The HTTP MultiPartParser had a issue whereby certain inputs to multipart
- forms could result in an infinite loop when parsing uploaded
- files.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1:1.11.29-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3191.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3192.data b/english/lts/security/2022/dla-3192.data
deleted file mode 100644
index 4e2aadce26a..00000000000
--- a/english/lts/security/2022/dla-3192.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3192-1 lava</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2022-42902 Bug#1021737</define-tag>
-<define-tag packages>lava</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3192.wml b/english/lts/security/2022/dla-3192.wml
deleted file mode 100644
index 8a3050e0d58..00000000000
--- a/english/lts/security/2022/dla-3192.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that lava_server allowed remote code execution in the
-lavatable code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2019.01-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your lava packages.</p>
-
-<p>For the detailed security status of lava please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lava">https://security-tracker.debian.org/tracker/lava</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3192.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3193.data b/english/lts/security/2022/dla-3193.data
deleted file mode 100644
index a02ac79b9ff..00000000000
--- a/english/lts/security/2022/dla-3193.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3193-1 joblib</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2022-21797 Bug#1020820</define-tag>
-<define-tag packages>joblib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3193.wml b/english/lts/security/2022/dla-3193.wml
deleted file mode 100644
index bbad5e74619..00000000000
--- a/english/lts/security/2022/dla-3193.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that joblib did not properly sanitize arguments
-to pre_dispatch, allowing arbitrary code execution.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.13.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your joblib packages.</p>
-
-<p>For the detailed security status of joblib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/joblib">https://security-tracker.debian.org/tracker/joblib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3193.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3194.data b/english/lts/security/2022/dla-3194.data
deleted file mode 100644
index bf23e87105f..00000000000
--- a/english/lts/security/2022/dla-3194.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3194-1 asterisk</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608 CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792 CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651 Bug#1014998 Bug#1018073 Bug#1014976</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3194.wml b/english/lts/security/2022/dla-3194.wml
deleted file mode 100644
index c0a59dc48ed..00000000000
--- a/english/lts/security/2022/dla-3194.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been found in Asterisk, an Open Source
-Private Branch Exchange. Buffer overflows and other programming errors could be
-exploited for information disclosure or the execution of arbitrary code.</p>
-
-<p>Special care should be taken when upgrading to this new upstream release.
-Some configuration files and options have changed in order to remedy
-certain security vulnerabilities. Most notably the pjsip TLS listener only
-accepts TLSv1.3 connections in the default configuration now. This can be
-reverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also
-<a rel="nofollow" href="https://issues.asterisk.org/jira/browse/ASTERISK-29017">https://issues.asterisk.org/jira/browse/ASTERISK-29017</a>.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:16.28.0~dfsg-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>For the detailed security status of asterisk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/asterisk">https://security-tracker.debian.org/tracker/asterisk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3194.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3195.data b/english/lts/security/2022/dla-3195.data
deleted file mode 100644
index 451fc08cb17..00000000000
--- a/english/lts/security/2022/dla-3195.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3195-1 jupyter-core</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2022-39286 Bug#1023361</define-tag>
-<define-tag packages>jupyter-core</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3195.wml b/english/lts/security/2022/dla-3195.wml
deleted file mode 100644
index 4c137a5ec8b..00000000000
--- a/english/lts/security/2022/dla-3195.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that jupyter-core, the base framework for Jupyter projects
-like Jupyter Notebooks, could execute arbitrary code when loading
-configuration files.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.4.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your jupyter-core packages.</p>
-
-<p>For the detailed security status of jupyter-core please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jupyter-core">https://security-tracker.debian.org/tracker/jupyter-core</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3195.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3196.data b/english/lts/security/2022/dla-3196.data
deleted file mode 100644
index 7c022c35c65..00000000000
--- a/english/lts/security/2022/dla-3196.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3196-1 thunderbird</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2022-45403 CVE-2022-45404 CVE-2022-45405 CVE-2022-45406 CVE-2022-45408 CVE-2022-45409 CVE-2022-45410 CVE-2022-45411 CVE-2022-45412 CVE-2022-45416 CVE-2022-45418 CVE-2022-45420 CVE-2022-45421</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3196.wml b/english/lts/security/2022/dla-3196.wml
deleted file mode 100644
index 3ed2b0f90d7..00000000000
--- a/english/lts/security/2022/dla-3196.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-potentially result in the execution of arbitrary code, information
-disclosure, spoofing or bypass of the SameSite cookie policy.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.5.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3196.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3197.data b/english/lts/security/2022/dla-3197.data
deleted file mode 100644
index e2ea52ffbb7..00000000000
--- a/english/lts/security/2022/dla-3197.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3197-1 phpseclib</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2021-30130</define-tag>
-<define-tag packages>phpseclib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3197.wml b/english/lts/security/2022/dla-3197.wml
deleted file mode 100644
index 5c4cb8f00e9..00000000000
--- a/english/lts/security/2022/dla-3197.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that phpseclib, a pure-PHP implementation of various
-cryptographic and arithmetic algorithms (v1), mishandles RSA PKCS#1
-v1.5 signature verification. An attacker may get invalid signatures
-accepted, bypassing authorization control in specific situations.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.19-3~deb10u1.</p>
-
-<p>We recommend that you upgrade your phpseclib packages.</p>
-
-<p>For the detailed security status of phpseclib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/phpseclib">https://security-tracker.debian.org/tracker/phpseclib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3197.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3198.data b/english/lts/security/2022/dla-3198.data
deleted file mode 100644
index 37c79f53ea6..00000000000
--- a/english/lts/security/2022/dla-3198.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3198-1 php-phpseclib</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2021-30130</define-tag>
-<define-tag packages>php-phpseclib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3198.wml b/english/lts/security/2022/dla-3198.wml
deleted file mode 100644
index bae6a7b9742..00000000000
--- a/english/lts/security/2022/dla-3198.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that php-phpseclib, a pure-PHP implementation of
-various cryptographic and arithmetic algorithms (v2), mishandles RSA
-PKCS#1 v1.5 signature verification. An attacker may get invalid
-signatures accepted, bypassing authorization control in specific
-situations.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.0.30-2~deb10u1.</p>
-
-<p>We recommend that you upgrade your php-phpseclib packages.</p>
-
-<p>For the detailed security status of php-phpseclib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-phpseclib">https://security-tracker.debian.org/tracker/php-phpseclib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3198.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3199.data b/english/lts/security/2022/dla-3199.data
deleted file mode 100644
index 7eefab557da..00000000000
--- a/english/lts/security/2022/dla-3199.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3199-1 firefox-esr</define-tag>
-<define-tag report_date>2022-11-17</define-tag>
-<define-tag secrefs>CVE-2022-45403 CVE-2022-45404 CVE-2022-45405 CVE-2022-45406 CVE-2022-45408 CVE-2022-45409 CVE-2022-45410 CVE-2022-45411 CVE-2022-45412 CVE-2022-45416 CVE-2022-45418 CVE-2022-45420 CVE-2022-45421</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3199.wml b/english/lts/security/2022/dla-3199.wml
deleted file mode 100644
index f351fe9df5c..00000000000
--- a/english/lts/security/2022/dla-3199.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure, spoofing or bypass of the SameSite cookie
-policy.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.5.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3199.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3200.data b/english/lts/security/2022/dla-3200.data
deleted file mode 100644
index 7f0a3932e86..00000000000
--- a/english/lts/security/2022/dla-3200.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3200-1 graphicsmagick</define-tag>
-<define-tag report_date>2022-11-21</define-tag>
-<define-tag secrefs>CVE-2022-1270</define-tag>
-<define-tag packages>graphicsmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3200.wml b/english/lts/security/2022/dla-3200.wml
deleted file mode 100644
index 433cde2b317..00000000000
--- a/english/lts/security/2022/dla-3200.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in graphicsmagick, a collection of image
-processing tools.
-Due to missing checks, a crafted MIFF file could result in a heap buffer
-overflow when parsing it.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4+really1.3.35-1~deb10u3.</p>
-
-<p>We recommend that you upgrade your graphicsmagick packages.</p>
-
-<p>For the detailed security status of graphicsmagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/graphicsmagick">https://security-tracker.debian.org/tracker/graphicsmagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3200.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3201.data b/english/lts/security/2022/dla-3201.data
deleted file mode 100644
index 87dec998c22..00000000000
--- a/english/lts/security/2022/dla-3201.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3201-1 ntfs-3g</define-tag>
-<define-tag report_date>2022-11-21</define-tag>
-<define-tag secrefs>CVE-2022-40284</define-tag>
-<define-tag packages>ntfs-3g</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3201.wml b/english/lts/security/2022/dla-3201.wml
deleted file mode 100644
index fe93d74293a..00000000000
--- a/english/lts/security/2022/dla-3201.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G, a
-read-write NTFS driver for FUSE, due to incorrect validation of some of
-the NTFS metadata. A local user can take advantage of this flaw for local
-root privilege escalation.</p>
-
-
-<p>For Debian 10 Buster, this problem has been fixed in version
-1:2017.3.23AR.3-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your ntfs-3g packages.</p>
-
-<p>For the detailed security status of ntfs-3g please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ntfs-3g">https://security-tracker.debian.org/tracker/ntfs-3g</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3201.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3202.data b/english/lts/security/2022/dla-3202.data
deleted file mode 100644
index fc9b3fd06fb..00000000000
--- a/english/lts/security/2022/dla-3202.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3202-1 libarchive</define-tag>
-<define-tag report_date>2022-11-22</define-tag>
-<define-tag secrefs>CVE-2019-19221 CVE-2021-23177 CVE-2021-31566 Bug#945287 Bug#1001986 Bug#1001990</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3202.wml b/english/lts/security/2022/dla-3202.wml
deleted file mode 100644
index 554364aefae..00000000000
--- a/english/lts/security/2022/dla-3202.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Three issues have been found in libarchive, a multi-format archive and
-compression library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19221">CVE-2019-19221</a>
-
- <p>out-of-bounds read because of an incorrect mbrtowc or mbtowc call</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23177">CVE-2021-23177</a>
-
- <p>extracting a symlink with ACLs modifies ACLs of target</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31566">CVE-2021-31566</a>
-
- <p>symbolic links incorrectly followed when changing modes, times,
- ACL and flags of a file while extracting an archive</p>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.3.3-4+deb10u2.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>For the detailed security status of libarchive please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libarchive">https://security-tracker.debian.org/tracker/libarchive</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3202.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3203.data b/english/lts/security/2022/dla-3203.data
deleted file mode 100644
index 26ce3a8e6d0..00000000000
--- a/english/lts/security/2022/dla-3203.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3203-1 nginx</define-tag>
-<define-tag report_date>2022-11-23</define-tag>
-<define-tag secrefs>CVE-2021-3618 CVE-2022-41741 CVE-2022-41742 Bug#991328</define-tag>
-<define-tag packages>nginx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3203.wml b/english/lts/security/2022/dla-3203.wml
deleted file mode 100644
index 53da8a952d9..00000000000
--- a/english/lts/security/2022/dla-3203.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that parsing errors in the mp4 module of Nginx, a
-high-performance web and reverse proxy server, could result in denial
-of service, memory disclosure or potentially the execution of arbitrary
-code when processing a malformed mp4 file.</p>
-
-<p>This module is only enabled in the nginx-extras binary package.</p>
-
-<p>In addition the following vulnerability has been fixed.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3618">CVE-2021-3618</a>
-
- <p>ALPACA is an application layer protocol content confusion attack,
- exploiting TLS servers implementing different protocols but using
- compatible certificates, such as multi-domain or wildcard certificates.
- A MiTM attacker having access to victim's traffic at the TCP/IP layer can
- redirect traffic from one subdomain to another, resulting in a valid TLS
- session. This breaks the authentication of TLS and cross-protocol attacks
- may be possible where the behavior of one protocol service may compromise</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.14.2-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your nginx packages.</p>
-
-<p>For the detailed security status of nginx please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/nginx">https://security-tracker.debian.org/tracker/nginx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3203.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3204.data b/english/lts/security/2022/dla-3204.data
deleted file mode 100644
index dfec6434ecc..00000000000
--- a/english/lts/security/2022/dla-3204.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3204-1 vim</define-tag>
-<define-tag report_date>2022-11-24</define-tag>
-<define-tag secrefs>CVE-2022-0318 CVE-2022-0392 CVE-2022-0629 CVE-2022-0696 CVE-2022-1619 CVE-2022-1621 CVE-2022-1785 CVE-2022-1897 CVE-2022-1942 CVE-2022-2000 CVE-2022-2129 CVE-2022-3235 CVE-2022-3256 CVE-2022-3352</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3204.wml b/english/lts/security/2022/dla-3204.wml
deleted file mode 100644
index b571c5b680a..00000000000
--- a/english/lts/security/2022/dla-3204.wml
+++ /dev/null
@@ -1,85 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes multiple memory access violations in vim.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0318">CVE-2022-0318</a>
-
- <p>Heap-based Buffer Overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0392">CVE-2022-0392</a>
-
- <p>Heap-based Buffer Overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0629">CVE-2022-0629</a>
-
- <p>Stack-based Buffer Overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0696">CVE-2022-0696</a>
-
- <p><code>NULL</code> Pointer Dereference</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1619">CVE-2022-1619</a>
-
- <p>Heap-based Buffer Overflow in function <code>cmdline_erase_chars</code>. This
- vulnerabilities are capable of crashing software, modify memory, and
- possible remote execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1621">CVE-2022-1621</a>
-
- <p>Heap buffer overflow in <code>vim_strncpy find_word</code>. This vulnerability is
- capable of crashing software, Bypass Protection Mechanism, Modify
- Memory, and possible remote execution</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1785">CVE-2022-1785</a>
-
- <p>Out-of-bounds Write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1897">CVE-2022-1897</a>
-
- <p>Out-of-bounds Write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1942">CVE-2022-1942</a>
-
- <p>Heap-based Buffer Overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2000">CVE-2022-2000</a>
-
- <p>Out-of-bounds Write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2129">CVE-2022-2129</a>
-
- <p>Out-of-bounds Write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3235">CVE-2022-3235</a>
-
- <p>Use After Free</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3256">CVE-2022-3256</a>
-
- <p>Use After Free</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3352">CVE-2022-3352</a>
-
- <p>Use After Free</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:8.1.0875-5+deb10u4.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3204.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3205.data b/english/lts/security/2022/dla-3205.data
deleted file mode 100644
index 364f0f74f75..00000000000
--- a/english/lts/security/2022/dla-3205.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3205-1 inetutils</define-tag>
-<define-tag report_date>2022-11-25</define-tag>
-<define-tag secrefs>CVE-2019-0053 CVE-2021-40491 CVE-2022-39028 Bug#945861 Bug#956084 Bug#993476</define-tag>
-<define-tag packages>inetutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3205.wml b/english/lts/security/2022/dla-3205.wml
deleted file mode 100644
index 9aeb688eb98..00000000000
--- a/english/lts/security/2022/dla-3205.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in inetutils, a
-collection of common network programs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0053">CVE-2019-0053</a>
-
- <p>inetutils' telnet client doesn't sufficiently validate environment
- variables, which can lead to stack-based buffer overflows. This
- issue is limited to local exploitation from restricted shells.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40491">CVE-2021-40491</a>
-
- <p>inetutils' ftp client before 2.2 does not validate addresses
- returned by PASV/LSPV responses to make sure they match the server
- address. A malicious server can exploit this flaw to reach services
- in the client's private network. (This is similar to curl's
- <a href="https://security-tracker.debian.org/tracker/CVE-2020-8284">CVE-2020-8284</a>.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39028">CVE-2022-39028</a>
-
- <p>inetutils's telnet server through 2.3 has a NULL pointer dereference
- which a client can trigger by sending 0xff 0xf7 or 0xff 0xf8. In a
- typical installation, the telnetd application would crash but the
- telnet service would remain available through inetd. However, if the
- telnetd application has many crashes within a short time interval,
- the telnet service would become unavailable after inetd logs a
- "telnet/tcp server failing (looping), service terminated" error.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.9.4-7+deb10u2.</p>
-
-<p>We recommend that you upgrade your inetutils packages.</p>
-
-<p>For the detailed security status of inetutils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/inetutils">https://security-tracker.debian.org/tracker/inetutils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3205.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3206.data b/english/lts/security/2022/dla-3206.data
deleted file mode 100644
index 8548d77f6a1..00000000000
--- a/english/lts/security/2022/dla-3206.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3206-1 heimdal</define-tag>
-<define-tag report_date>2022-11-26</define-tag>
-<define-tag secrefs>CVE-2019-14870 CVE-2021-3671 CVE-2021-44758 CVE-2022-3437 CVE-2022-41916 CVE-2022-42898 CVE-2022-44640 Bug#946786 Bug#996586 Bug#1024187</define-tag>
-<define-tag packages>heimdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3206.wml b/english/lts/security/2022/dla-3206.wml
deleted file mode 100644
index 9234410c936..00000000000
--- a/english/lts/security/2022/dla-3206.wml
+++ /dev/null
@@ -1,83 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in heimdal, an
-implementation of the Kerberos 5 authentication protocol, which may
-result in denial of service, information disclosure, or remote code
-execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14870">CVE-2019-14870</a>
-
- <p>Isaac Boukris reported that the Heimdal KDC before 7.7.1 does not
- apply delegation_not_allowed (aka not-delegated) user attributes for
- S4U2Self. Instead the forwardable flag is set even if the
- impersonated client has the not-delegated flag set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3671">CVE-2021-3671</a>
-
- <p>Joseph Sutton discovered that the Heimdal KDC before 7.7.1 does not
- check for missing missing sname in TGS-REQ (Ticket Granting Server Request) before before dereferencing. An authenticated user could
- use this flaw to crash the KDC.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44758">CVE-2021-44758</a>
-
- <p>It was discovered that Heimdal is prone to a NULL dereference in
- acceptors when the initial SPNEGO token has no acceptable
- mechanisms, which may result in denial of service for a server
- application that uses the Simple and Protected GSSAPI Negotiation
- Mechanism (SPNEGO).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3437">CVE-2022-3437</a>
-
- <p>Evgeny Legerov reported that the DES and Triple-DES decryption
- routines in the Heimdal GSSAPI library before 7.7.1 were prone to
- buffer overflow on malloc() allocated memory when presented with a
- maliciously small packet. In addition, the Triple-DES and RC4
- (arcfour) decryption routine were prone to non-constant time leaks,
- which could potentially yield to a leak of secret key material when
- using these ciphers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41916">CVE-2022-41916</a>
-
- <p>It was discovered that Heimdal's PKI certificate validation library
- before 7.7.1 can under some circumstances perform an out-of-bounds
- memory access when normalizing Unicode, which may result in denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42898">CVE-2022-42898</a>
-
- <p>Greg Hudson discovered an integer multiplication overflow in the
- Privilege Attribute Certificate (PAC) parsing routine, which may
- result in denial of service for Heimdal KDCs and possibly Heimdal
- servers (e.g., via GSS-API) on 32-bit systems.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44640">CVE-2022-44640</a>
-
- <p>Douglas Bagnall and the Heimdal maintainers independently discovered
- that Heimdal's ASN.1 compiler before 7.7.1 generates code that
- allows specially crafted DER encodings of CHOICEs to invoke the
- wrong free() function on the decoded structure upon decode error,
- which may result in remote code execution in the Heimdal KDC and
- possibly the Kerberos client, the X.509 library, and other
- components as well.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.5.0+dfsg-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your heimdal packages.</p>
-
-<p>For the detailed security status of heimdal please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/heimdal">https://security-tracker.debian.org/tracker/heimdal</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3206.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3207.data b/english/lts/security/2022/dla-3207.data
deleted file mode 100644
index 073aa8fa706..00000000000
--- a/english/lts/security/2022/dla-3207.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3207-1 jackson-databind</define-tag>
-<define-tag report_date>2022-11-27</define-tag>
-<define-tag secrefs>CVE-2020-36518 CVE-2022-42003 CVE-2022-42004 Bug#1007109</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3207.wml b/english/lts/security/2022/dla-3207.wml
deleted file mode 100644
index b73a2f63678..00000000000
--- a/english/lts/security/2022/dla-3207.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several flaws were discovered in jackson-databind, a fast and powerful JSON
-library for Java.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36518">CVE-2020-36518</a>
-
- <p>Java StackOverflow exception and denial of service via a large depth of
- nested objects.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42003">CVE-2022-42003</a>
-
- <p>In FasterXML jackson-databind resource exhaustion can occur because of a
- lack of a check in primitive value deserializers to avoid deep wrapper
- array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42004">CVE-2022-42004</a>
-
- <p>In FasterXML jackson-databind resource exhaustion can occur because of a
- lack of a check in BeanDeserializerBase.deserializeFromArray to prevent use
- of deeply nested arrays. An application is vulnerable only with certain
- customized choices for deserialization.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.9.8-3+deb10u4.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>For the detailed security status of jackson-databind please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/jackson-databind">https://security-tracker.debian.org/tracker/jackson-databind</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3207.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3208.data b/english/lts/security/2022/dla-3208.data
deleted file mode 100644
index 53b4a28716f..00000000000
--- a/english/lts/security/2022/dla-3208.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3208-1 varnish</define-tag>
-<define-tag report_date>2022-11-27</define-tag>
-<define-tag secrefs>CVE-2020-11653 CVE-2022-45060 Bug#956307 Bug#1023751</define-tag>
-<define-tag packages>varnish</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3208.wml b/english/lts/security/2022/dla-3208.wml
deleted file mode 100644
index 9525eb030a1..00000000000
--- a/english/lts/security/2022/dla-3208.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Martin van Kervel Smedshammer discovered a request forgery attack can be
-performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An
-attacker may introduce characters through the HTTP/2 pseudo-headers that are
-invalid in the context of an HTTP/1 request line, causing the Varnish server to
-produce invalid HTTP/1 requests to the backend. This may in turn be used to
-successfully exploit vulnerabilities in a server behind the Varnish server.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-6.1.1-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your varnish packages.</p>
-
-<p>For the detailed security status of varnish please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/varnish">https://security-tracker.debian.org/tracker/varnish</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3208.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3209.data b/english/lts/security/2022/dla-3209.data
deleted file mode 100644
index 517d64fed89..00000000000
--- a/english/lts/security/2022/dla-3209.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3209-1 ini4j</define-tag>
-<define-tag report_date>2022-11-28</define-tag>
-<define-tag secrefs>CVE-2022-41404</define-tag>
-<define-tag packages>ini4j</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3209.wml b/english/lts/security/2022/dla-3209.wml
deleted file mode 100644
index e231a1affd3..00000000000
--- a/english/lts/security/2022/dla-3209.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that ini4j, a Java library for handling the Windows ini file
-format, was vulnerable to a denial of service attack via the fetch() method in
-BasicProfile class, if an attacker provided a manipulated ini file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.5.4-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your ini4j packages.</p>
-
-<p>For the detailed security status of ini4j please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/ini4j">https://security-tracker.debian.org/tracker/ini4j</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3209.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3210.data b/english/lts/security/2022/dla-3210.data
deleted file mode 100644
index 55479da6998..00000000000
--- a/english/lts/security/2022/dla-3210.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3210-1 gerbv</define-tag>
-<define-tag report_date>2022-11-28</define-tag>
-<define-tag secrefs>CVE-2021-40401 CVE-2021-40403</define-tag>
-<define-tag packages>gerbv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3210.wml b/english/lts/security/2022/dla-3210.wml
deleted file mode 100644
index 2f115293af1..00000000000
--- a/english/lts/security/2022/dla-3210.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two vulnerabilities were discovered in gerbv, a Gerber file viewer. Most
-Printed Circuit Board (PCB) design programs can export data to a Gerber
-file.</p>
-
-<ul>
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40401">CVE-2021-40401</a>:
- A use-after-free vulnerability existed in the RS-274X aperture definition
- tokenization functionality. A specially-crafted gerber file could have led to
- code execution.</li>
-
- <li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40403">CVE-2021-40403</a>:
- An information disclosure vulnerability existed in the pick-and-place
- rotation parsing functionality. A specially-crafted pick-and-place file could
- have exploited the missing initialization of a structure in order to leak
- memory contents.</li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-2.7.0-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your gerbv packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3210.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3211.data b/english/lts/security/2022/dla-3211.data
deleted file mode 100644
index 7d322583b23..00000000000
--- a/english/lts/security/2022/dla-3211.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3211-1 frr</define-tag>
-<define-tag report_date>2022-11-28</define-tag>
-<define-tag secrefs>CVE-2022-37032</define-tag>
-<define-tag packages>frr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3211.wml b/english/lts/security/2022/dla-3211.wml
deleted file mode 100644
index eddaf2838f5..00000000000
--- a/english/lts/security/2022/dla-3211.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential out-of-bounds read in the BGP
-daemon of frr, a set of tools to route internet traffic.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37032">CVE-2022-37032</a>
-
- <p>An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may
- lead to a segmentation fault and denial of service. This occurs in
- bgp_capability_msg_parse in bgpd/bgp_packet.c.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-6.0.2-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your frr packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3211.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3212.data b/english/lts/security/2022/dla-3212.data
deleted file mode 100644
index 1c1d025a488..00000000000
--- a/english/lts/security/2022/dla-3212.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3212-1 twisted</define-tag>
-<define-tag report_date>2022-11-28</define-tag>
-<define-tag secrefs>CVE-2022-39348</define-tag>
-<define-tag packages>twisted</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3212.wml b/english/lts/security/2022/dla-3212.wml
deleted file mode 100644
index 4832fa08120..00000000000
--- a/english/lts/security/2022/dla-3212.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that twisted, a framework for internet applications
-written in Python, was prone to an HTML injection when displaying the
-HTTP Host header in an error page.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-18.9.0-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your twisted packages.</p>
-
-<p>For the detailed security status of twisted please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/twisted">https://security-tracker.debian.org/tracker/twisted</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3212.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3213.data b/english/lts/security/2022/dla-3213.data
deleted file mode 100644
index c0ea64218ca..00000000000
--- a/english/lts/security/2022/dla-3213.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3213-1 krb5</define-tag>
-<define-tag report_date>2022-11-29</define-tag>
-<define-tag secrefs>CVE-2022-42898</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3213.wml b/english/lts/security/2022/dla-3213.wml
deleted file mode 100644
index 96797e803f7..00000000000
--- a/english/lts/security/2022/dla-3213.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential Denial of Service (DoS) attack
-against krb5, a suite of tools implementing the Kerberos authentication system.
-An integer overflow in PAC parsing could have been exploited if a cross-realm
-entity acted maliciously.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42898">CVE-2022-42898</a>
-
- <p>krb5_pac_parse() buffer parsing vulnerability</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.17-3+deb10u5.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3213.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3214.data b/english/lts/security/2022/dla-3214.data
deleted file mode 100644
index 4b207b15a7e..00000000000
--- a/english/lts/security/2022/dla-3214.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3214-1 libraw</define-tag>
-<define-tag report_date>2022-11-30</define-tag>
-<define-tag secrefs>CVE-2020-15503</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3214.wml b/english/lts/security/2022/dla-3214.wml
deleted file mode 100644
index cd2383016d7..00000000000
--- a/english/lts/security/2022/dla-3214.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update adds size checks to thumbnail extraction. Prior to these checks, it
-was possible to overflow arguments to e.g. malloc and thus cause out-of-bounds
-memory accesses.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.19.2-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>For the detailed security status of libraw please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libraw">https://security-tracker.debian.org/tracker/libraw</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3214.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3215.data b/english/lts/security/2022/dla-3215.data
deleted file mode 100644
index 1808e762a76..00000000000
--- a/english/lts/security/2022/dla-3215.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3215-1 snapd</define-tag>
-<define-tag report_date>2022-12-02</define-tag>
-<define-tag secrefs>CVE-2022-3328</define-tag>
-<define-tag packages>snapd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3215.wml b/english/lts/security/2022/dla-3215.wml
deleted file mode 100644
index caf5ec25e8c..00000000000
--- a/english/lts/security/2022/dla-3215.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The Qualys Research Team discovered a race condition in the snapd-confine
-binary which could result in local privilege escalation.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.37.4-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your snapd packages.</p>
-
-<p>For the detailed security status of snapd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/snapd">https://security-tracker.debian.org/tracker/snapd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3215.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3216.data b/english/lts/security/2022/dla-3216.data
deleted file mode 100644
index 9d55dba3c75..00000000000
--- a/english/lts/security/2022/dla-3216.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3216-1 vlc</define-tag>
-<define-tag report_date>2022-12-03</define-tag>
-<define-tag secrefs>CVE-2022-41325</define-tag>
-<define-tag packages>vlc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3216.wml b/english/lts/security/2022/dla-3216.wml
deleted file mode 100644
index f76e240232d..00000000000
--- a/english/lts/security/2022/dla-3216.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Mitsurugi Heishiro found out that in VLC, multimedia player and streamer,
-a potential buffer overflow in the vnc module could trigger remote code
-execution if a malicious vnc URL is deliberately played.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.0.17.4-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your vlc packages.</p>
-
-<p>For the detailed security status of vlc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vlc">https://security-tracker.debian.org/tracker/vlc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3216.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3217.data b/english/lts/security/2022/dla-3217.data
deleted file mode 100644
index 0f7f84ac4b4..00000000000
--- a/english/lts/security/2022/dla-3217.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3217-1 g810-led</define-tag>
-<define-tag report_date>2022-12-03</define-tag>
-<define-tag secrefs>CVE-2022-46338 Bug#1024998</define-tag>
-<define-tag packages>g810-led</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3217.wml b/english/lts/security/2022/dla-3217.wml
deleted file mode 100644
index a07da97cdb2..00000000000
--- a/english/lts/security/2022/dla-3217.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>g810-led, a LED configuration tool for Logitech Gx10 keyboards,
-contained a udev rule to make supported device nodes world-readable
-and writable, allowing any process on the system to read traffic
-from keyboards, including sensitive data.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.3.3-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your g810-led packages.</p>
-
-<p>For the detailed security status of g810-led please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/g810-led">https://security-tracker.debian.org/tracker/g810-led</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3217.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3218.data b/english/lts/security/2022/dla-3218.data
deleted file mode 100644
index 6c4300eb8ea..00000000000
--- a/english/lts/security/2022/dla-3218.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3218-1 libpgjava</define-tag>
-<define-tag report_date>2022-12-03</define-tag>
-<define-tag secrefs>CVE-2022-41946</define-tag>
-<define-tag packages>libpgjava</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3218.wml b/english/lts/security/2022/dla-3218.wml
deleted file mode 100644
index 5e667100574..00000000000
--- a/english/lts/security/2022/dla-3218.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>pgjdbc is an open source postgresql JDBC Driver. In affected versions
-a prepared statement using either `PreparedStatement.setText(int,
-InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will
-create a temporary file if the InputStream is larger than 2k. This
-will create a temporary file which is readable by other users on
-Unix like systems, but not MacOS. On Unix like systems, the system's
-temporary directory is shared between all users on that system. Because
-of this, when files and directories are written into this directory
-they are, by default, readable by other users on that same system.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-42.2.5-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your libpgjava packages.</p>
-
-<p>For the detailed security status of libpgjava please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libpgjava">https://security-tracker.debian.org/tracker/libpgjava</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3218.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3219.data b/english/lts/security/2022/dla-3219.data
deleted file mode 100644
index 8ec6b2e6d61..00000000000
--- a/english/lts/security/2022/dla-3219.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3219-1 jhead</define-tag>
-<define-tag report_date>2022-12-04</define-tag>
-<define-tag secrefs>CVE-2021-34055 CVE-2022-41751 Bug#1024272 Bug#1022028</define-tag>
-<define-tag packages>jhead</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3219.wml b/english/lts/security/2022/dla-3219.wml
deleted file mode 100644
index 1402c1f90e4..00000000000
--- a/english/lts/security/2022/dla-3219.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed
-attackers to execute arbitrary OS commands by placing them in a JPEG filename
-and then using the regeneration -rgt50, -autorot or -ce option. In addition a
-buffer overflow error in exif.c has been addressed which could lead to a denial
-of service (application crash).</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.00-8+deb10u1.</p>
-
-<p>We recommend that you upgrade your jhead packages.</p>
-
-<p>For the detailed security status of jhead please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/jhead">https://security-tracker.debian.org/tracker/jhead</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3219.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3220.data b/english/lts/security/2022/dla-3220.data
deleted file mode 100644
index ca8cc2a0eb4..00000000000
--- a/english/lts/security/2022/dla-3220.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3220-1 clamav</define-tag>
-<define-tag report_date>2022-12-04</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3220.wml b/english/lts/security/2022/dla-3220.wml
deleted file mode 100644
index e0871b0e001..00000000000
--- a/english/lts/security/2022/dla-3220.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ClamAV, an anti-virus utility for Unix, v0.103.7 is a critical patch
-release with the following fixes:</p>
-
-<p>* Fix logical signature <q>Intermediates</q> feature.
-* Relax constraints on slightly malformed zip archives that contain
- overlapping file entries.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.103.7+dfsg-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3220.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3221.data b/english/lts/security/2022/dla-3221.data
deleted file mode 100644
index 499b4cf3cf4..00000000000
--- a/english/lts/security/2022/dla-3221.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3221-1 node-cached-path-relative</define-tag>
-<define-tag report_date>2022-12-05</define-tag>
-<define-tag secrefs>CVE-2018-16472 CVE-2021-23518 Bug#1004338</define-tag>
-<define-tag packages>node-cached-path-relative</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3221.wml b/english/lts/security/2022/dla-3221.wml
deleted file mode 100644
index 84e9f983c2c..00000000000
--- a/english/lts/security/2022/dla-3221.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cristian-Alexandru Staicu discovered a prototype pollution vulnerability
-in inode-cached-path-relative, a Node.js module used to cache (memoize)
-the result of path.relative.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16472">CVE-2018-16472</a>
-
- <p>An attacker controlling both the path and the cached value, can
- mount a prototype pollution attack and thus overwrite arbitrary
- properties on Object.prototype, which may result in denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23518">CVE-2021-23518</a>
-
- <p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-16472">CVE-2018-16472</a> was incomplete and other prototype
- pollution vulnerabilities were found in the meantime, resulting in a
- new CVE.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-cached-path-relative packages.</p>
-
-<p>For the detailed security status of node-cached-path-relative please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-cached-path-relative">https://security-tracker.debian.org/tracker/node-cached-path-relative</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3221.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3222.data b/english/lts/security/2022/dla-3222.data
deleted file mode 100644
index b2c0c467470..00000000000
--- a/english/lts/security/2022/dla-3222.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3222-1 node-fetch</define-tag>
-<define-tag report_date>2022-12-05</define-tag>
-<define-tag secrefs>CVE-2022-0235</define-tag>
-<define-tag packages>node-fetch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3222.wml b/english/lts/security/2022/dla-3222.wml
deleted file mode 100644
index 6466622eac8..00000000000
--- a/english/lts/security/2022/dla-3222.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ranjit-git discovered an information leak vulnerability in node-fetch, a
-Node.js module exposing a window.fetch compatible API on Node.js
-runtime: the module was not honoring the same-origin-policy and upon
-following a redirect would leak cookies to the the target URL.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.7.3-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-fetch packages.</p>
-
-<p>For the detailed security status of node-fetch please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-fetch">https://security-tracker.debian.org/tracker/node-fetch</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3222.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3223.data b/english/lts/security/2022/dla-3223.data
deleted file mode 100644
index fc56c47b385..00000000000
--- a/english/lts/security/2022/dla-3223.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3223-1 giflib</define-tag>
-<define-tag report_date>2022-12-05</define-tag>
-<define-tag secrefs>CVE-2018-11490 CVE-2019-15133 Bug#904114</define-tag>
-<define-tag packages>giflib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3223.wml b/english/lts/security/2022/dla-3223.wml
deleted file mode 100644
index 912b7c9ae87..00000000000
--- a/english/lts/security/2022/dla-3223.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes two file format vulnerabilities in giflib.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-11490">CVE-2018-11490</a>
-
- <p>The <pre>DGifDecompressLine</pre> function in <pre>dgif_lib.c</pre>, as later shipped in
- <pre>cgif.c</pre> in sam2p 0.49.4, has a heap-based buffer overflow because a
- certain "<pre>Private-&gt;RunningCode - 2</pre>" array index is not checked. This
- will lead to a denial of service or possibly unspecified other
- impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15133">CVE-2019-15133</a>
-
- <p>A malformed GIF file triggers a divide-by-zero exception in the
- decoder function <pre>DGifSlurp</pre> in <pre>dgif_lib.c</pre> if the <pre>height</pre> field of the
- <pre>ImageSize</pre> data structure is equal to zero.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.1.4-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your giflib packages.</p>
-
-<p>For the detailed security status of giflib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/giflib">https://security-tracker.debian.org/tracker/giflib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3223.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3224.data b/english/lts/security/2022/dla-3224.data
deleted file mode 100644
index 9a51b26e86d..00000000000
--- a/english/lts/security/2022/dla-3224.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3224-1 http-parser</define-tag>
-<define-tag report_date>2022-12-05</define-tag>
-<define-tag secrefs>CVE-2020-8287 Bug#1016690</define-tag>
-<define-tag packages>http-parser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3224.wml b/english/lts/security/2022/dla-3224.wml
deleted file mode 100644
index d1c4a5c176e..00000000000
--- a/english/lts/security/2022/dla-3224.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>There was a potential HTTP request smuggling vulnerability in
-http-parser, a popular library for parsing HTTP messages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.8.1-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your http-parser packages.</p>
-
-<p>For the detailed security status of http-parser please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/http-parser">https://security-tracker.debian.org/tracker/http-parser</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3224.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3225.data b/english/lts/security/2022/dla-3225.data
deleted file mode 100644
index 9893a71ff79..00000000000
--- a/english/lts/security/2022/dla-3225.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3225-1 awstats</define-tag>
-<define-tag report_date>2022-12-05</define-tag>
-<define-tag secrefs>CVE-2022-46391 Bug#1025410</define-tag>
-<define-tag packages>awstats</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3225.wml b/english/lts/security/2022/dla-3225.wml
deleted file mode 100644
index 73962938960..00000000000
--- a/english/lts/security/2022/dla-3225.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>AWStats, a powerful and featureful web server log analyzer, allowed
-XSS in the hostinfo plugin due to printing a response from
-Net::XWhois without proper checks.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-7.6+dfsg-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your awstats packages.</p>
-
-<p>For the detailed security status of awstats please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/awstats">https://security-tracker.debian.org/tracker/awstats</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3225.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3226.data b/english/lts/security/2022/dla-3226.data
deleted file mode 100644
index 6ac74c4ee6a..00000000000
--- a/english/lts/security/2022/dla-3226.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3226-1 cgal</define-tag>
-<define-tag report_date>2022-12-06</define-tag>
-<define-tag secrefs>CVE-2020-28601 CVE-2020-28602 CVE-2020-28603 CVE-2020-28604 CVE-2020-28605 CVE-2020-28606 CVE-2020-28607 CVE-2020-28608 CVE-2020-28609 CVE-2020-28610 CVE-2020-28611 CVE-2020-28612 CVE-2020-28613 CVE-2020-28614 CVE-2020-28615 CVE-2020-28616 CVE-2020-28617 CVE-2020-28618 CVE-2020-28619 CVE-2020-28620 CVE-2020-28621 CVE-2020-28622 CVE-2020-28623 CVE-2020-28624 CVE-2020-28625 CVE-2020-28626 CVE-2020-28627 CVE-2020-28628 CVE-2020-28629 CVE-2020-28630 CVE-2020-28631 CVE-2020-28632 CVE-2020-28633 CVE-2020-28634 CVE-2020-28635 CVE-2020-28636 CVE-2020-35628 CVE-2020-35629 CVE-2020-35630 CVE-2020-35631 CVE-2020-35632 CVE-2020-35633 CVE-2020-35634 CVE-2020-35635 CVE-2020-35636 Bug#985671</define-tag>
-<define-tag packages>cgal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3226.wml b/english/lts/security/2022/dla-3226.wml
deleted file mode 100644
index de405b0e4e5..00000000000
--- a/english/lts/security/2022/dla-3226.wml
+++ /dev/null
@@ -1,413 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>When parsing files containing Nef polygon data, several memory access
-violations may happen. Many of these allow code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28601">CVE-2020-28601</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionality of CGAL. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser::read_vertex()</code> <code>Face_of[]</code> OOB read.
- An attacker can provide malicious input to trigger this
- vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28602">CVE-2020-28602</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionality of CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_vertex()</code>
- <code>Halfedge_of[]</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28603">CVE-2020-28603</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionality of CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_hedge()</code> <code>e-&gt;set_prev()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28604">CVE-2020-28604</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionality of CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_hedge()</code> <code>e-&gt;set_next()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28605">CVE-2020-28605</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionality of CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_hedge()</code>
- <code>e-&gt;set_vertex()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28606">CVE-2020-28606</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_hedge()</code> <code>e-&gt;set_face()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28607">CVE-2020-28607</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_face()</code> set_halfedge().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28608">CVE-2020-28608</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_face()</code> store_fc().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28609">CVE-2020-28609</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_2/PM_io_parser.h</code> <code>PM_io_parser&lt;PMDEC&gt;::read_face()</code> store_iv().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28610">CVE-2020-28610</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SM_io_parser.h</code> <code>SM_io_parser&lt;Decorator_&gt;::read_vertex()</code>
- set_face().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28611">CVE-2020-28611</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SM_io_parser.h</code> <code>SM_io_parser&lt;Decorator_&gt;::read_vertex()</code>
- set_first_out_edge().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28612">CVE-2020-28612</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;svertices_begin()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28613">CVE-2020-28613</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;svertices_last()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28614">CVE-2020-28614</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;shalfedges_begin()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28615">CVE-2020-28615</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;shalfedges_last()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28616">CVE-2020-28616</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;sfaces_begin()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28617">CVE-2020-28617</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;sfaces_last()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28618">CVE-2020-28618</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_vertex()</code>
- <code>vh-&gt;shalfloop()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28619">CVE-2020-28619</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_edge()</code> <code>eh-&gt;twin()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28620">CVE-2020-28620</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_edge()</code>
- <code>eh-&gt;center_vertex()</code>:.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28621">CVE-2020-28621</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_edge()</code>
- <code>eh-&gt;out_sedge()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28622">CVE-2020-28622</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_edge()</code>
- <code>eh-&gt;incident_sface()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28623">CVE-2020-28623</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_facet()</code> <code>fh-&gt;twin()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28624">CVE-2020-28624</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_facet()</code>
- <code>fh-&gt;boundary_entry_objects</code> SEdge_of.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28625">CVE-2020-28625</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_facet()</code>
- <code>fh-&gt;boundary_entry_objects</code> SLoop_of.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28626">CVE-2020-28626</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_facet()</code>
- <code>fh-&gt;incident_volume()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28627">CVE-2020-28627</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_volume()</code>
- <code>ch-&gt;shell_entry_objects()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28628">CVE-2020-28628</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_volume()</code> <code>seh-&gt;twin()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28629">CVE-2020-28629</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code> <code>seh-&gt;sprev()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28630">CVE-2020-28630</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code> <code>seh-&gt;snext()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28631">CVE-2020-28631</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code> <code>seh-&gt;source()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28632">CVE-2020-28632</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code>
- <code>seh-&gt;incident_sface()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28633">CVE-2020-28633</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code> <code>seh-&gt;prev()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28634">CVE-2020-28634</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code> <code>seh-&gt;next()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28635">CVE-2020-28635</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sedge()</code> <code>seh-&gt;facet()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28636">CVE-2020-28636</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionalityof CGAL. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser::read_sloop()</code> <code>slh-&gt;twin()</code> An
- attacker can provide malicious input to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35628">CVE-2020-35628</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionalityof CGAL. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser::read_sloop()</code>
- <code>slh-&gt;incident_sface</code>. An attacker can provide malicious input to
- trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35629">CVE-2020-35629</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sloop()</code> <code>slh-&gt;facet()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35630">CVE-2020-35630</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sface()</code>
- <code>sfh-&gt;center_vertex()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35631">CVE-2020-35631</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sface()</code>
- <code>SD.link_as_face_cycle()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35632">CVE-2020-35632</a>
-
- <p>Multiple code execution vulnerabilities exists in the Nef polygon parsing functionalityof CGAL. A specially crafted malformed file can
- lead to an out-of-bounds read and type confusion, which could lead to
- code execution. An attacker can provide malicious input to trigger
- any of these vulnerabilities. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sface()</code>
- <code>sfh-&gt;boundary_entry_objects</code> <code>Edge_of</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35633">CVE-2020-35633</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionalityof CGAL. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sface()</code>
- <code>store_sm_boundary_item()</code> <code>Edge_of</code>. A specially crafted malformed file
- can lead to an out-of-bounds read and type confusion, which could
- lead to code execution. An attacker can provide malicious input to
- trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35634">CVE-2020-35634</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionalityof CGAL. An oob read vulnerability exists in
- <code>Nef_S2/SNC_io_parser.h</code> <code>SNC_io_parser&lt;EW&gt;::read_sface()</code>
- <code>sfh-&gt;boundary_entry_objects</code> <code>Sloop_of</code>. A specially crafted malformed
- file can lead to an out-of-bounds read and type confusion, which
- could lead to code execution. An attacker can provide malicious input
- to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35635">CVE-2020-35635</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionality of CGAL libcgal CGAL-5.1.1 in <code>Nef_S2/SNC_io_parser.h</code>
- <code>SNC_io_parser::read_sface()</code> <code>store_sm_boundary_item()</code> <code>Sloop_of</code> OOB
- read. A specially crafted malformed file can lead to an out-of-bounds
- read and type confusion, which could lead to code execution. An
- attacker can provide malicious input to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35636">CVE-2020-35636</a>
-
- <p>A code execution vulnerability exists in the Nef polygon-parsing
- functionality of CGAL libcgal CGAL-5.1.1 in <code>Nef_S2/SNC_io_parser.h</code>
- <code>SNC_io_parser::read_sface()</code> <code>sfh-&gt;volume()</code> OOB read. A specially
- crafted malformed file can lead to an out-of-bounds read and type
- confusion, which could lead to code execution. An attacker can
- provide malicious input to trigger this vulnerability.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.13-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your cgal packages.</p>
-
-<p>For the detailed security status of cgal please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cgal">https://security-tracker.debian.org/tracker/cgal</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3226.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3227.data b/english/lts/security/2022/dla-3227.data
deleted file mode 100644
index 9cf224824e7..00000000000
--- a/english/lts/security/2022/dla-3227.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3227-1 ruby-rails-html-sanitizer</define-tag>
-<define-tag report_date>2022-12-07</define-tag>
-<define-tag secrefs>CVE-2022-32209 Bug#1013806</define-tag>
-<define-tag packages>ruby-rails-html-sanitizer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3227.wml b/english/lts/security/2022/dla-3227.wml
deleted file mode 100644
index 41aceeb2029..00000000000
--- a/english/lts/security/2022/dla-3227.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A potential cross-site scripting (XSS) vulnerability was discovered
-in ruby-rails-html-sanitizer, a library to clean (or <q>sanitize</q>) HTML
-for rendering within Ruby on Rails web applications.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.4-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-rails-html-sanitizer packages.</p>
-
-<p>For the detailed security status of ruby-rails-html-sanitizer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rails-html-sanitizer">https://security-tracker.debian.org/tracker/ruby-rails-html-sanitizer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3227.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3228.data b/english/lts/security/2022/dla-3228.data
deleted file mode 100644
index c2ca5b3c2e7..00000000000
--- a/english/lts/security/2022/dla-3228.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3228-1 node-json-schema</define-tag>
-<define-tag report_date>2022-12-07</define-tag>
-<define-tag secrefs>CVE-2021-3918 Bug#999765</define-tag>
-<define-tag packages>node-json-schema</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3228.wml b/english/lts/security/2022/dla-3228.wml
deleted file mode 100644
index 0d2a833ebee..00000000000
--- a/english/lts/security/2022/dla-3228.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>node-json-schema, JSON Schema validation and specifications, was
-vulnerable to Improperly Controlled Modification of Object Prototype
-Attributes.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.2.3-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-json-schema packages.</p>
-
-<p>For the detailed security status of node-json-schema please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-json-schema">https://security-tracker.debian.org/tracker/node-json-schema</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3228.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3229.data b/english/lts/security/2022/dla-3229.data
deleted file mode 100644
index 30f98ef7042..00000000000
--- a/english/lts/security/2022/dla-3229.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3229-1 node-log4js</define-tag>
-<define-tag report_date>2022-12-07</define-tag>
-<define-tag secrefs>CVE-2022-21704</define-tag>
-<define-tag packages>node-log4js</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3229.wml b/english/lts/security/2022/dla-3229.wml
deleted file mode 100644
index 3b7a29b8a32..00000000000
--- a/english/lts/security/2022/dla-3229.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In node-log4js, a port of log4js in Node.js, default file permissions
-for log files created by the file, fileSync, and dateFile appenders are
-world-readable. This could cause problems if log files contain sensitive
-information. This would affect any users that have not supplied their
-own permissions for the files via the mode parameter in the config.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.0.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-log4js packages.</p>
-
-<p>For the detailed security status of node-log4js please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-log4js">https://security-tracker.debian.org/tracker/node-log4js</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3229.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3230.data b/english/lts/security/2022/dla-3230.data
deleted file mode 100644
index 03e60bcb9a7..00000000000
--- a/english/lts/security/2022/dla-3230.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3230-1 jqueryui</define-tag>
-<define-tag report_date>2022-12-07</define-tag>
-<define-tag secrefs>CVE-2021-41182 CVE-2021-41183 CVE-2021-41184 CVE-2022-31160 Bug#1015982</define-tag>
-<define-tag packages>jqueryui</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3230.wml b/english/lts/security/2022/dla-3230.wml
deleted file mode 100644
index af4316a5d81..00000000000
--- a/english/lts/security/2022/dla-3230.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>jQuery-UI, the official jQuery user interface library, is a curated set
-of user interface interactions, effects, widgets, and themes built on top
-of jQuery were reported to have the following vulnerabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41182">CVE-2021-41182</a>
-
- <p>jQuery-UI was accepting the value of the `altField` option of the
- Datepicker widget from untrusted sources may execute untrusted code.
- This has been fixed and now any string value passed to the `altField`
- option is now treated as a CSS selector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41183">CVE-2021-41183</a>
-
- <p>jQuery-UI was accepting the value of various `*Text` options of the
- Datepicker widget from untrusted sources may execute untrusted code.
- This has been fixed and now the values passed to various `*Text`
- options are now always treated as pure text, not HTML.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41184">CVE-2021-41184</a>
-
- <p>jQuery-UI was accepting the value of the `of` option of the
- `.position()` util from untrusted sources may execute untrusted code.
- This has been fixed and now any string value passed to the `of`
- option is now treated as a CSS selector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31160">CVE-2022-31160</a>
-
- <p>jQuery-UI was potentially vulnerable to cross-site scripting.
- Initializing a checkboxradio widget on an input enclosed within a
- label makes that parent label contents considered as the input label.
- Calling `.checkboxradio( <q>refresh</q> )` on such a widget and the initial
- HTML contained encoded HTML entities will make them erroneously get
- decoded. This can lead to potentially executing JavaScript code.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.12.1+dfsg-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your jqueryui packages.</p>
-
-<p>For the detailed security status of jqueryui please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jqueryui">https://security-tracker.debian.org/tracker/jqueryui</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3230.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3231.data b/english/lts/security/2022/dla-3231.data
deleted file mode 100644
index c76cd676d45..00000000000
--- a/english/lts/security/2022/dla-3231.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3231-1 dlt-daemon</define-tag>
-<define-tag report_date>2022-12-07</define-tag>
-<define-tag secrefs>CVE-2020-29394 CVE-2020-36244 CVE-2022-31291 Bug#976228 Bug#1014534</define-tag>
-<define-tag packages>dlt-daemon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3231.wml b/english/lts/security/2022/dla-3231.wml
deleted file mode 100644
index cfff3aa0d8a..00000000000
--- a/english/lts/security/2022/dla-3231.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>dlt-daemon, a Diagnostic Log and Trace logging daemon, had the following
-vulnerabilities reported:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29394">CVE-2020-29394</a>
-
- <p>A buffer overflow in the dlt_filter_load function in dlt_common.c
- from dlt-daemon allows arbitrary code execution because fscanf is
- misused (no limit on the number of characters to be read in the
- format argument).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36244">CVE-2020-36244</a>
-
- <p>dlt-daemon was vulnerable to a heap-based buffer overflow that
- could allow an attacker to remotely execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31291">CVE-2022-31291</a>
-
- <p>An issue in dlt_config_file_parser.c of dlt-daemon allows attackers
- to cause a double free via crafted TCP packets.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.18.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your dlt-daemon packages.</p>
-
-<p>For the detailed security status of dlt-daemon please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dlt-daemon">https://security-tracker.debian.org/tracker/dlt-daemon</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3231.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3232.data b/english/lts/security/2022/dla-3232.data
deleted file mode 100644
index 81cb894859c..00000000000
--- a/english/lts/security/2022/dla-3232.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3232-1 virglrenderer</define-tag>
-<define-tag report_date>2022-12-07</define-tag>
-<define-tag secrefs>CVE-2019-18388 CVE-2019-18389 CVE-2019-18390 CVE-2019-18391 CVE-2020-8002 CVE-2020-8003 CVE-2022-0135 Bug#946942 Bug#949954 Bug#1009073</define-tag>
-<define-tag packages>virglrenderer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3232.wml b/english/lts/security/2022/dla-3232.wml
deleted file mode 100644
index 554a22c7c78..00000000000
--- a/english/lts/security/2022/dla-3232.wml
+++ /dev/null
@@ -1,73 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were discovered in virglrenderer, a
-virtual GPU for KVM virtualization.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18388">CVE-2019-18388</a>
-
- <p>A NULL pointer dereference in vrend_renderer.c in virglrenderer through
- 0.8.0 allows guest OS users to cause a denial of service via malformed
- commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18389">CVE-2019-18389</a>
-
- <p>A heap-based buffer overflow in the vrend_renderer_transfer_write_iov
- function in vrend_renderer.c in virglrenderer through 0.8.0 allows
- guest OS users to cause a denial of service, or QEMU guest-to-host
- escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE
- commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18390">CVE-2019-18390</a>
-
- <p>An out-of-bounds read in the vrend_blit_need_swizzle function in
- vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS
- users to cause a denial of service via VIRGL_CCMD_BLIT commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18391">CVE-2019-18391</a>
-
- <p>A heap-based buffer overflow in the vrend_renderer_transfer_write_iov
- function in vrend_renderer.c in virglrenderer through 0.8.0 allows
- guest OS users to cause a denial of service via
- VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8002">CVE-2020-8002</a>
-
- <p>A NULL pointer dereference in vrend_renderer.c in virglrenderer through
- 0.8.1 allows attackers to cause a denial of service via commands that attempt
- to launch a grid without previously providing a Compute Shader (CS).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8003">CVE-2020-8003</a>
-
- <p>A double-free vulnerability in vrend_renderer.c in virglrenderer through
- 0.8.1 allows attackers to cause a denial of service by triggering texture
- allocation failure, because vrend_renderer_resource_allocated_texture is not an
- appropriate place for a free.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0135">CVE-2022-0135</a>
-
- <p>An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer
- (virglrenderer). This flaw allows a malicious guest to create a specially
- crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a
- denial of service or possible code execution.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.7.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your virglrenderer packages.</p>
-
-<p>For the detailed security status of virglrenderer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/virglrenderer">https://security-tracker.debian.org/tracker/virglrenderer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3232.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3233.data b/english/lts/security/2022/dla-3233.data
deleted file mode 100644
index 242a05a8e05..00000000000
--- a/english/lts/security/2022/dla-3233.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3233-1 leptonlib</define-tag>
-<define-tag report_date>2022-12-08</define-tag>
-<define-tag secrefs>CVE-2022-38266</define-tag>
-<define-tag packages>leptonlib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3233.wml b/english/lts/security/2022/dla-3233.wml
deleted file mode 100644
index e232adedec9..00000000000
--- a/english/lts/security/2022/dla-3233.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a denial of service vulnerability in leptonlib. It can be
-made to crash with an arithmetic exception on specially crafted JPEG files.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.76.0-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your leptonlib packages.</p>
-
-<p>For the detailed security status of leptonlib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/leptonlib">https://security-tracker.debian.org/tracker/leptonlib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3233.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3234.data b/english/lts/security/2022/dla-3234.data
deleted file mode 100644
index edfe489e71a..00000000000
--- a/english/lts/security/2022/dla-3234.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3234-1 hsqldb</define-tag>
-<define-tag report_date>2022-12-10</define-tag>
-<define-tag secrefs>CVE-2022-41853 Bug#1023573</define-tag>
-<define-tag packages>hsqldb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3234.wml b/english/lts/security/2022/dla-3234.wml
deleted file mode 100644
index 54be610304e..00000000000
--- a/english/lts/security/2022/dla-3234.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that those using java.sql.Statement or java.sql.PreparedStatement
-in hsqldb, a Java SQL database, to process untrusted input may be vulnerable to
-a remote code execution attack. By default it is allowed to call any static
-method of any Java class in the classpath resulting in code execution. The
-issue can be prevented by updating to 2.4.1-2+deb10u1 or by setting the
-system property <q>hsqldb.method_class_names</q> to classes which are allowed to
-be called. For example, System.setProperty("hsqldb.method_class_names","abc")
-or Java argument -Dhsqldb.method_class_names="abc" can be used. From
-version 2.4.1-2+deb10u1 all classes by default are not accessible except
-those in java.lang.Math and need to be manually enabled.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.4.1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your hsqldb packages.</p>
-
-<p>For the detailed security status of hsqldb please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/hsqldb">https://security-tracker.debian.org/tracker/hsqldb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3234.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3235.data b/english/lts/security/2022/dla-3235.data
deleted file mode 100644
index 7769b2d1c31..00000000000
--- a/english/lts/security/2022/dla-3235.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3235-1 node-eventsource</define-tag>
-<define-tag report_date>2022-12-11</define-tag>
-<define-tag secrefs>CVE-2022-1650</define-tag>
-<define-tag packages>node-eventsource</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3235.wml b/english/lts/security/2022/dla-3235.wml
deleted file mode 100644
index 97d961512da..00000000000
--- a/english/lts/security/2022/dla-3235.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Timothee Desurmont discovered an information leak vulnerability in
-node-eventsource, a W3C compliant EventSource client for Node.js: the
-module was not honoring the same-origin-policy and upon following a
-redirect would leak cookies to the the target URL.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.2.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-eventsource packages.</p>
-
-<p>For the detailed security status of node-eventsource please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-eventsource">https://security-tracker.debian.org/tracker/node-eventsource</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3235.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3236.data b/english/lts/security/2022/dla-3236.data
deleted file mode 100644
index dfbb39b1cb4..00000000000
--- a/english/lts/security/2022/dla-3236.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3236-1 openexr</define-tag>
-<define-tag report_date>2022-12-12</define-tag>
-<define-tag secrefs>CVE-2020-16587 CVE-2020-16588 CVE-2020-16589 CVE-2021-3474 CVE-2021-3475 CVE-2021-3476 CVE-2021-3477 CVE-2021-3478 CVE-2021-3479 CVE-2021-3598 CVE-2021-3605 CVE-2021-3933 CVE-2021-3941 CVE-2021-20296 CVE-2021-20298 CVE-2021-20299 CVE-2021-20300 CVE-2021-20302 CVE-2021-20303 CVE-2021-23215 CVE-2021-26260 CVE-2021-45942 Bug#986796 Bug#992703 Bug#990450 Bug#990899 Bug#1014828</define-tag>
-<define-tag packages>openexr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3236.wml b/english/lts/security/2022/dla-3236.wml
deleted file mode 100644
index 6a23578347e..00000000000
--- a/english/lts/security/2022/dla-3236.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been found in OpenEXR, command-line
-tools and a library for the OpenEXR image format. Buffer overflows or
-out-of-bound reads could lead to a denial of service (application crash) if
-a malformed image file is processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.2.1-4.1+deb10u2.</p>
-
-<p>We recommend that you upgrade your openexr packages.</p>
-
-<p>For the detailed security status of openexr please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/openexr">https://security-tracker.debian.org/tracker/openexr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3236.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3237.data b/english/lts/security/2022/dla-3237.data
deleted file mode 100644
index ef54cf33286..00000000000
--- a/english/lts/security/2022/dla-3237.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3237-1 node-tar</define-tag>
-<define-tag report_date>2022-12-12</define-tag>
-<define-tag secrefs>CVE-2021-37701 CVE-2021-37712 Bug#993981</define-tag>
-<define-tag packages>node-tar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3237.wml b/english/lts/security/2022/dla-3237.wml
deleted file mode 100644
index 70289f867bf..00000000000
--- a/english/lts/security/2022/dla-3237.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cache poisoning vulnerabilities were found in node-tar, a Node.js module
-used to read and write portable tar archives, which may result in
-arbitrary file creation or overwrite.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37701">CVE-2021-37701</a>
-
- <p>It was discovered that node-tar performed insufficient symlink
- protection, thereby making directory cache vulnerable to poisoning
- using symbolic links.</p>
-
- <p>Upon extracting an archive containing a directory `foo/bar` followed
- with a symbolic link `foo\\bar` to an arbitrary location, node-tar
- would extract arbitrary files into the symlink target, thus allowing
- arbitrary file creation and overwrite.</p>
-
- <p>Moreover, on case-insensitive filesystems, a similar issue occurred
- with a directory `FOO` followed with a symbolic link `foo`.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37712">CVE-2021-37712</a>
-
- <p>Similar to <a href="https://security-tracker.debian.org/tracker/CVE-2021-37701">CVE-2021-37701</a>, a specially crafted tar archive
- containing two directories and a symlink with names containing
- unicode values that normalized to the same value, would bypass
- node-tar's symlink checks on directories, thus allowing arbitrary
- file creation and overwrite.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.4.6+ds1-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your node-tar packages.</p>
-
-<p>For the detailed security status of node-tar please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-tar">https://security-tracker.debian.org/tracker/node-tar</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3237.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3238.data b/english/lts/security/2022/dla-3238.data
deleted file mode 100644
index 1ffe22171bc..00000000000
--- a/english/lts/security/2022/dla-3238.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3238-1 pngcheck</define-tag>
-<define-tag report_date>2022-12-13</define-tag>
-<define-tag secrefs>CVE-2020-35511 Bug#1021278</define-tag>
-<define-tag packages>pngcheck</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3238.wml b/english/lts/security/2022/dla-3238.wml
deleted file mode 100644
index ad86e37e9d0..00000000000
--- a/english/lts/security/2022/dla-3238.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in pngcheck, a tool to verify the
-integrity of PNG, JNG and MNG files, which could potentially result
-in the execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-35511">CVE-2020-35511</a>
-
- <p>A global buffer overflow was discovered in pngcheck function in
- pngcheck-2.4.0 (5 patches applied) via a crafted png file.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.0.3-1~deb10u2.</p>
-
-<p>We recommend that you upgrade your pngcheck packages.</p>
-
-<p>For the detailed security status of pngcheck please refer to its security
-tracker page at: <a href="https://security-tracker.debian.org/tracker/pngcheck">https://security-tracker.debian.org/tracker/pngcheck</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3238.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3239-2.data b/english/lts/security/2022/dla-3239-2.data
deleted file mode 100644
index 130755df182..00000000000
--- a/english/lts/security/2022/dla-3239-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3239-2 git</define-tag>
-<define-tag report_date>2022-12-14</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3239-2.wml b/english/lts/security/2022/dla-3239-2.wml
deleted file mode 100644
index 665af9693ae..00000000000
--- a/english/lts/security/2022/dla-3239-2.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-<p>In rare conditions, the previous git update released as DLA-3239-1
-could generate a segmentation fault, which prevented its availability
-on armhf architecture. This update addresses this issue. For reference
-the original advisory text follows.</p>
-
-<p>Multiple issues were found in Git, a distributed revision control
-system. An attacker may cause other local users into executing
-arbitrary commands, leak information from the local filesystem, and
-bypass restricted shell.
-<p><b>Note</b>: Due to new security checks, access to repositories owned and
-accessed by different local users may now be rejected by Git; in case
-changing ownership is not practical, git displays a way to bypass
-these checks using the new <q>safe.directory</q> configuration entry.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24765">CVE-2022-24765</a>
-
- <p>Git is not checking the ownership of directories in a local
- multi-user system when running commands specified in the local
- repository configuration. This allows the owner of the repository
- to cause arbitrary commands to be executed by other users who
- access the repository.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29187">CVE-2022-29187</a>
-
- <p>An unsuspecting user could still be affected by the issue reported
- in <a href="https://security-tracker.debian.org/tracker/CVE-2022-24765">CVE-2022-24765</a>, for example when navigating as root into a
- shared tmp directory that is owned by them, but where an attacker
- could create a git repository.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39253">CVE-2022-39253</a>
-
- <p>Exposure of sensitive information to a malicious actor. When
- performing a local clone (where the source and target of the clone
- are on the same volume), Git copies the contents of the source's
- `$GIT_DIR/objects` directory into the destination by either
- creating hardlinks to the source contents, or copying them (if
- hardlinks are disabled via `--no-hardlinks`). A malicious actor
- could convince a victim to clone a repository with a symbolic link
- pointing at sensitive information on the victim's machine.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39260">CVE-2022-39260</a>
-
- <p>`git shell` improperly uses an `int` to represent the number of
- entries in the array, allowing a malicious actor to intentionally
- overflow the return value, leading to arbitrary heap
- writes. Because the resulting array is then passed to `execv()`,
- it is possible to leverage this attack to gain remote code
- execution on a victim machine.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:2.20.1-2+deb10u6.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>For the detailed security status of git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3239-2.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3239.data b/english/lts/security/2022/dla-3239.data
deleted file mode 100644
index bd1a1827f00..00000000000
--- a/english/lts/security/2022/dla-3239.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3239-1 git</define-tag>
-<define-tag report_date>2022-12-14</define-tag>
-<define-tag secrefs>CVE-2022-24765 CVE-2022-29187 CVE-2022-39253 CVE-2022-39260 Bug#1014848 Bug#1022046</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3239.wml b/english/lts/security/2022/dla-3239.wml
deleted file mode 100644
index c7372c5d5ce..00000000000
--- a/english/lts/security/2022/dla-3239.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in Git, a distributed revision control
-system. An attacker may cause other local users into executing
-arbitrary commands, leak information from the local filesystem, and
-bypass restricted shell.
-<p><b>Note</b>: Due to new security checks, access to repositories owned and
-accessed by different local users may now be rejected by Git; in case
-changing ownership is not practical, git displays a way to bypass
-these checks using the new <q>safe.directory</q> configuration entry.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24765">CVE-2022-24765</a>
-
- <p>Git is not checking the ownership of directories in a local
- multi-user system when running commands specified in the local
- repository configuration. This allows the owner of the repository
- to cause arbitrary commands to be executed by other users who
- access the repository.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29187">CVE-2022-29187</a>
-
- <p>An unsuspecting user could still be affected by the issue reported
- in <a href="https://security-tracker.debian.org/tracker/CVE-2022-24765">CVE-2022-24765</a>, for example when navigating as root into a
- shared tmp directory that is owned by them, but where an attacker
- could create a git repository.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39253">CVE-2022-39253</a>
-
- <p>Exposure of sensitive information to a malicious actor. When
- performing a local clone (where the source and target of the clone
- are on the same volume), Git copies the contents of the source's
- `$GIT_DIR/objects` directory into the destination by either
- creating hardlinks to the source contents, or copying them (if
- hardlinks are disabled via `--no-hardlinks`). A malicious actor
- could convince a victim to clone a repository with a symbolic link
- pointing at sensitive information on the victim's machine.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39260">CVE-2022-39260</a>
-
- <p>`git shell` improperly uses an `int` to represent the number of
- entries in the array, allowing a malicious actor to intentionally
- overflow the return value, leading to arbitrary heap
- writes. Because the resulting array is then passed to `execv()`,
- it is possible to leverage this attack to gain remote code
- execution on a victim machine.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:2.20.1-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>For the detailed security status of git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3239.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3240.data b/english/lts/security/2022/dla-3240.data
deleted file mode 100644
index 93dc55d1d48..00000000000
--- a/english/lts/security/2022/dla-3240.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3240-1 libde265</define-tag>
-<define-tag report_date>2022-12-15</define-tag>
-<define-tag secrefs>CVE-2020-21599 CVE-2021-35452 CVE-2021-36408 CVE-2021-36409 CVE-2021-36410 CVE-2021-36411 Bug#1014977</define-tag>
-<define-tag packages>libde265</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3240.wml b/english/lts/security/2022/dla-3240.wml
deleted file mode 100644
index 58f21624ca2..00000000000
--- a/english/lts/security/2022/dla-3240.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in libde265, an open source implementation of the
-h.265 video codec, which may result in denial of or have unspecified other
-impact.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21599">CVE-2020-21599</a>
-
- <p>libde265 v1.0.4 contains a heap buffer overflow in the
- de265_image::available_zscan function, which can be exploited via a crafted
- a file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-35452">CVE-2021-35452</a>
-
- <p>An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to
- a SEGV in slice.cc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36408">CVE-2021-36408</a>
-
- <p>libde265 v1.0.8 contains a Heap-use-after-free in intrapred.h when decoding
- file using dec265.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36409">CVE-2021-36409</a>
-
- <p>There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at
- sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to
- cause a Denial of Service (DoS) by running the application with a crafted
- file or possibly have unspecified other impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36410">CVE-2021-36410</a>
-
- <p>A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in
- function put_epel_hv_fallback when running program dec265.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36411">CVE-2021-36411</a>
-
- <p>An issue has been found in libde265 v1.0.8 due to incorrect access control.
- A SEGV caused by a READ memory access in function derive_boundaryStrength of
- deblock.cc has occurred. The vulnerability causes a segmentation fault and
- application crash, which leads to remote denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.3-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libde265 packages.</p>
-
-<p>For the detailed security status of libde265 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libde265">https://security-tracker.debian.org/tracker/libde265</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3240.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3241.data b/english/lts/security/2022/dla-3241.data
deleted file mode 100644
index be56a976787..00000000000
--- a/english/lts/security/2022/dla-3241.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3241-1 firefox-esr</define-tag>
-<define-tag report_date>2022-12-15</define-tag>
-<define-tag secrefs>CVE-2022-46872 CVE-2022-46874 CVE-2022-46878 CVE-2022-46880 CVE-2022-46881 CVE-2022-46882</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3241.wml b/english/lts/security/2022/dla-3241.wml
deleted file mode 100644
index a1b2ce0cbc2..00000000000
--- a/english/lts/security/2022/dla-3241.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or information disclosure.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.6.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3241.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3242.data b/english/lts/security/2022/dla-3242.data
deleted file mode 100644
index 1aecb44485c..00000000000
--- a/english/lts/security/2022/dla-3242.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3242-1 thunderbird</define-tag>
-<define-tag report_date>2022-12-15</define-tag>
-<define-tag secrefs>CVE-2022-46872 CVE-2022-46874 CVE-2022-46878 CVE-2022-46880 CVE-2022-46881 CVE-2022-46882</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3242.wml b/english/lts/security/2022/dla-3242.wml
deleted file mode 100644
index 94048e52a7a..00000000000
--- a/english/lts/security/2022/dla-3242.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in Thunderbird, which could
-potentially result in the execution of arbitrary code or information
-disclosure.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.6.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3242.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3243.data b/english/lts/security/2022/dla-3243.data
deleted file mode 100644
index daeab672591..00000000000
--- a/english/lts/security/2022/dla-3243.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3243-1 php7.3</define-tag>
-<define-tag report_date>2022-12-15</define-tag>
-<define-tag secrefs>CVE-2021-21707 CVE-2022-31625 CVE-2022-31626 CVE-2022-31628 CVE-2022-31629 CVE-2022-37454</define-tag>
-<define-tag packages>php7.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3243.wml b/english/lts/security/2022/dla-3243.wml
deleted file mode 100644
index 5d37229718c..00000000000
--- a/english/lts/security/2022/dla-3243.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in PHP, a widely-used open
-source general purpose scripting language which could result in denial
-of service, information disclosure, insecure cooking handling or
-potentially the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.3.31-1~deb10u2.</p>
-
-<p>We recommend that you upgrade your php7.3 packages.</p>
-
-<p>For the detailed security status of php7.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.3">https://security-tracker.debian.org/tracker/php7.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3243.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3244.data b/english/lts/security/2022/dla-3244.data
deleted file mode 100644
index 9f178f3933c..00000000000
--- a/english/lts/security/2022/dla-3244.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3244-1 linux-5.10</define-tag>
-<define-tag report_date>2022-12-22</define-tag>
-<define-tag secrefs>CVE-2021-3759 CVE-2022-3169 CVE-2022-3435 CVE-2022-3521 CVE-2022-3524 CVE-2022-3564 CVE-2022-3565 CVE-2022-3594 CVE-2022-3628 CVE-2022-3640 CVE-2022-3643 CVE-2022-4139 CVE-2022-4378 CVE-2022-41849 CVE-2022-41850 CVE-2022-42328 CVE-2022-42329 CVE-2022-42895 CVE-2022-42896 CVE-2022-47518 CVE-2022-47519 CVE-2022-47520 CVE-2022-47521 Bug#1022806 Bug#1024697</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3244.wml b/english/lts/security/2022/dla-3244.wml
deleted file mode 100644
index a8b7331a5ee..00000000000
--- a/english/lts/security/2022/dla-3244.wml
+++ /dev/null
@@ -1,173 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3759">CVE-2021-3759</a>
-
- <p>It was discovered that the memory cgroup controller did not
- account for kernel memory allocated for IPC objects. A local user
- could use this for denial of service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3169">CVE-2022-3169</a>
-
- <p>It was discovered that the NVMe host driver did not prevent a
- concurrent reset and subsystem reset. A local user with access to
- an NVMe device could use this to cause a denial of service (device
- disconnect or crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3435">CVE-2022-3435</a>
-
- <p>Gwangun Jung reported a flaw in the IPv4 forwarding subsystem
- which would lead to an out-of-bounds read. A local user with
- CAP_NET_ADMIN capability in any user namespace could possibly
- exploit this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3521">CVE-2022-3521</a>
-
- <p>The syzbot tool found a race condition in the KCM subsystem
- which could lead to a crash.</p>
-
- <p>This subsystem is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3524">CVE-2022-3524</a>
-
- <p>The syzbot tool found a race condition in the IPv6 stack which
- could lead to a memory leak. A local user could exploit this to
- cause a denial of service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3564">CVE-2022-3564</a>
-
- <p>A flaw was discovered in the Bluetooh L2CAP subsystem which
- would lead to a use-after-free. This might be exploitable
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3565">CVE-2022-3565</a>
-
- <p>A flaw was discovered in the mISDN driver which would lead to a
- use-after-free. This might be exploitable to cause a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3594">CVE-2022-3594</a>
-
- <p>Andrew Gaul reported that the r8152 Ethernet driver would log
- excessive numbers of messages in response to network errors. A
- remote attacker could possibly exploit this to cause a denial of
- service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3628">CVE-2022-3628</a>
-
- <p>Dokyung Song, Jisoo Jang, and Minsuk Kang reported a potential
- heap-based buffer overflow in the brcmfmac Wi-Fi driver. A user
- able to connect a malicious USB device could exploit this to cause
- a denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3640">CVE-2022-3640</a>
-
- <p>A flaw was discovered in the Bluetooh L2CAP subsystem which
- would lead to a use-after-free. This might be exploitable
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3643">CVE-2022-3643</a> (XSA-423)
-
- <p>A flaw was discovered in the Xen network backend driver that would
- result in it generating malformed packet buffers. If these
- packets were forwarded to certain other network devices, a Xen
- guest could exploit this to cause a denial of service (crash or
- device reset).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4139">CVE-2022-4139</a>
-
- <p>A flaw was discovered in the i915 graphics driver. On gen12 <q>Xe</q>
- GPUs it failed to flush TLBs when necessary, resulting in GPU
- programs retaining access to freed memory. A local user with
- access to the GPU could exploit this to leak sensitive
- information, cause a denial of service (crash or memory
- corruption) or likely for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4378">CVE-2022-4378</a>
-
- <p>Kyle Zeng found a flaw in procfs that would cause a stack-based
- buffer overflow. A local user permitted to write to a sysctl
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41849">CVE-2022-41849</a>
-
- <p>A race condition was discovered in the smscufx graphics driver,
- which could lead to a use-after-free. A user able to remove the
- physical device while also accessing its device node could exploit
- this to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41850">CVE-2022-41850</a>
-
- <p>A race condition was discovered in the hid-roccat input driver,
- which could lead to a use-after-free. A local user able to access
- such a device could exploit this to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42328">CVE-2022-42328</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-42329">CVE-2022-42329</a> (XSA-424)
-
- <p>Yang Yingliang reported that the Xen network backend driver did
- not use the proper function to free packet buffers in one case,
- which could lead to a deadlock. A Xen guest could exploit this to
- cause a denial of service (hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42895">CVE-2022-42895</a>
-
- <p>Tamás Koczka reported a flaw in the Bluetooh L2CAP subsystem
- that would result in reading uninitialised memory. A nearby
- attacker able to make a Bluetooth connection could exploit
- this to leak sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42896">CVE-2022-42896</a>
-
- <p>Tamás Koczka reported flaws in the Bluetooh L2CAP subsystem that
- can lead to a use-after-free. A nearby attacker able to make a
- Bluetooth SMP connection could exploit this to cause a denial of
- service (crash or memory corruption) or possibly for remote code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47518">CVE-2022-47518</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-47519">CVE-2022-47519</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-47521">CVE-2022-47521</a>
-
- <p>Several flaws were discovered in the wilc1000 Wi-Fi driver which
- could lead to a heap-based buffer overflow. A nearby attacker
- could exploit these for denial of service (crash or memory
- corruption) or possibly for remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47520">CVE-2022-47520</a>
-
- <p>A flaw was discovered in the wilc1000 Wi-Fi driver which could
- lead to a heap-based buffer overflow. A local user with
- CAP_NET_ADMIN capability over such a Wi-Fi device could exploit
- this for denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.158-2~deb10u1.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3244.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3245.data b/english/lts/security/2022/dla-3245.data
deleted file mode 100644
index 1857c9efd4f..00000000000
--- a/english/lts/security/2022/dla-3245.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3245-1 linux</define-tag>
-<define-tag report_date>2022-12-23</define-tag>
-<define-tag secrefs>CVE-2022-2978 CVE-2022-3521 CVE-2022-3524 CVE-2022-3564 CVE-2022-3565 CVE-2022-3594 CVE-2022-3621 CVE-2022-3628 CVE-2022-3640 CVE-2022-3643 CVE-2022-3646 CVE-2022-3649 CVE-2022-4378 CVE-2022-20369 CVE-2022-29901 CVE-2022-40768 CVE-2022-41849 CVE-2022-41850 CVE-2022-42328 CVE-2022-42329 CVE-2022-42895 CVE-2022-42896 CVE-2022-43750</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3245.wml b/english/lts/security/2022/dla-3245.wml
deleted file mode 100644
index a6f8c9e5c0a..00000000000
--- a/english/lts/security/2022/dla-3245.wml
+++ /dev/null
@@ -1,184 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2978">CVE-2022-2978</a>
-
- <p><q>butt3rflyh4ck</q>, Hao Sun, and Jiacheng Xu reported a flaw in the
- nilfs2 filesystem driver which can lead to a use-after-free. A
- local use might be able to exploit this to cause a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3521">CVE-2022-3521</a>
-
- <p>The syzbot tool found a race condition in the KCM subsystem
- which could lead to a crash.</p>
-
- <p>This subsystem is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3524">CVE-2022-3524</a>
-
- <p>The syzbot tool found a race condition in the IPv6 stack which
- could lead to a memory leak. A local user could exploit this to
- cause a denial of service (memory exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3564">CVE-2022-3564</a>
-
- <p>A flaw was discovered in the Bluetooh L2CAP subsystem which
- would lead to a use-after-free. This might be exploitable
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3565">CVE-2022-3565</a>
-
- <p>A flaw was discovered in the mISDN driver which would lead to a
- use-after-free. This might be exploitable to cause a denial of
- service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3594">CVE-2022-3594</a>
-
- <p>Andrew Gaul reported that the r8152 Ethernet driver would log
- excessive numbers of messages in response to network errors. A
- remote attacker could possibly exploit this to cause a denial of
- service (resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3621">CVE-2022-3621</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-3646">CVE-2022-3646</a>
-
- <p>The syzbot tool found flaws in the nilfs2 filesystem driver which
- can lead to a null pointer dereference or memory leak. A user
- permitted to mount arbitrary filesystem images could use these to
- cause a denial of service (crash or resource exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3628">CVE-2022-3628</a>
-
- <p>Dokyung Song, Jisoo Jang, and Minsuk Kang reported a potential
- heap-based buffer overflow in the brcmfmac Wi-Fi driver. A user
- able to connect a malicious USB device could exploit this to cause
- a denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3640">CVE-2022-3640</a>
-
- <p>A flaw was discovered in the Bluetooh L2CAP subsystem which
- would lead to a use-after-free. This might be exploitable
- to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3643">CVE-2022-3643</a> (XSA-423)
-
- <p>A flaw was discovered in the Xen network backend driver that would
- result in it generating malformed packet buffers. If these
- packets were forwarded to certain other network devices, a Xen
- guest could exploit this to cause a denial of service (crash or
- device reset).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3649">CVE-2022-3649</a>
-
- <p>The syzbot tool found flaws in the nilfs2 filesystem driver which
- can lead to a use-after-free. A user permitted to mount arbitrary
- filesystem images could use these to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4378">CVE-2022-4378</a>
-
- <p>Kyle Zeng found a flaw in procfs that would cause a stack-based
- buffer overflow. A local user permitted to write to a sysctl
- could use this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-20369">CVE-2022-20369</a>
-
- <p>A flaw was found in the v4l2-mem2mem media driver that would lead
- to an out-of-bounds write. A local user with access to such a
- device could exploit this for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29901">CVE-2022-29901</a>
-
- <p>Johannes Wikner and Kaveh Razavi reported that for Intel
- processors (Intel Core generation 6, 7 and 8), protections against
- speculative branch target injection attacks were insufficient in
- some circumstances, which may allow arbitrary speculative code
- execution under certain microarchitecture-dependent conditions.</p>
-
- <p>More information can be found at
- <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40768">CVE-2022-40768</a>
-
- <p><q>hdthky</q> reported that the stex SCSI adapter driver did not fully
- initialise a structure that is copied to user-space. A local user
- with access to such a device could exploit this to leak sensitive
- information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41849">CVE-2022-41849</a>
-
- <p>A race condition was discovered in the smscufx graphics driver,
- which could lead to a use-after-free. A user able to remove the
- physical device while also accessing its device node could exploit
- this to cause a denial of service (crash or memory corruption) or
- possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41850">CVE-2022-41850</a>
-
- <p>A race condition was discovered in the hid-roccat input driver,
- which could lead to a use-after-free. A local user able to access
- such a device could exploit this to cause a denial of service
- (crash or memory corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42328">CVE-2022-42328</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-42329">CVE-2022-42329</a> (XSA-424)
-
- <p>Yang Yingliang reported that the Xen network backend driver did
- not use the proper function to free packet buffers in one case,
- which could lead to a deadlock. A Xen guest could exploit this to
- cause a denial of service (hang).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42895">CVE-2022-42895</a>
-
- <p>Tamás Koczka reported a flaw in the Bluetooh L2CAP subsystem
- that would result in reading uninitialised memory. A nearby
- attacker able to make a Bluetooth connection could exploit
- this to leak sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42896">CVE-2022-42896</a>
-
- <p>Tamás Koczka reported flaws in the Bluetooh L2CAP subsystem that
- can lead to a use-after-free. A nearby attacker able to make a
- Bluetooth SMP connection could exploit this to cause a denial of
- service (crash or memory corruption) or possibly for remote code
- execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43750">CVE-2022-43750</a>
-
- <p>The syzbot tool found that the USB monitor (usbmon) driver allowed
- user-space programs to overwrite the driver's data structures. A
- local user permitted to access a USB monitor device could exploit
- this to cause a denial of service (memory corruption or crash) or
- possibly for privilege escalation. However, by default only the
- root user can access such devices.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.19.269-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3245.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3246.data b/english/lts/security/2022/dla-3246.data
deleted file mode 100644
index aa783048a74..00000000000
--- a/english/lts/security/2022/dla-3246.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3246-1 node-hawk</define-tag>
-<define-tag report_date>2022-12-23</define-tag>
-<define-tag secrefs>CVE-2022-29167</define-tag>
-<define-tag packages>node-hawk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3246.wml b/english/lts/security/2022/dla-3246.wml
deleted file mode 100644
index a453598213d..00000000000
--- a/english/lts/security/2022/dla-3246.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in Hawk, an HTTP authentication
-scheme. Hawk used a regular expression to parse `Host` HTTP headers which was
-subject to regular expression DoS attack. Each added character in the
-attacker's input increased the computation time exponentially.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29167">CVE-2022-29167</a>
-
- <p>Hawk is an HTTP authentication scheme providing mechanisms for making
- authenticated HTTP requests with partial cryptographic verification of the
- request and response, covering the HTTP method, request URI, host, and
- optionally the request payload. Hawk used a regular expression to parse
- `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular
- expression DoS attack - meaning each added character in the attacker's
- input increases the computation time exponentially. `parseHost()` was
- patched in `9.0.1` to use built-in `URL` class to parse hostname instead.
- `Hawk.authenticate()` accepts `options` argument. If that contains `host`
- and `port`, those would be used instead of a call to
- `utils.parseHost()`.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-6.0.1+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-hawk packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3246.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3247.data b/english/lts/security/2022/dla-3247.data
deleted file mode 100644
index e073c986df3..00000000000
--- a/english/lts/security/2022/dla-3247.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3247-1 node-trim-newlines</define-tag>
-<define-tag report_date>2022-12-23</define-tag>
-<define-tag secrefs>CVE-2021-33623</define-tag>
-<define-tag packages>node-trim-newlines</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3247.wml b/english/lts/security/2022/dla-3247.wml
deleted file mode 100644
index db25b247b11..00000000000
--- a/english/lts/security/2022/dla-3247.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote denial of service
-vulnerability in node-trim-newlines, a Javascript module to strip newlines from
-the start and/or end of a string.</p>
-
-<p>This regular expression Denial of Service (ReDoS) attack exploited the fact
-that most Regular Expression implementations can reach extreme situations that
-cause them to work very slowly in a way that is exponentially related to the
-input size. An attacker can then cause a program using node-trim-newlines (and
-thus the offending regex) to enter one of these extreme situations and then
-hang for a very long time.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33623">CVE-2021-33623</a>
-
- <p>The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js
- has an issue related to regular expression denial-of-service (ReDoS) for
- the .end() method.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1.0.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-trim-newlines packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3247.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3248.data b/english/lts/security/2022/dla-3248.data
deleted file mode 100644
index 3cce49fb192..00000000000
--- a/english/lts/security/2022/dla-3248.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3248-1 libksba</define-tag>
-<define-tag report_date>2022-12-24</define-tag>
-<define-tag secrefs>CVE-2022-47629</define-tag>
-<define-tag packages>libksba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3248.wml b/english/lts/security/2022/dla-3248.wml
deleted file mode 100644
index 645994c1182..00000000000
--- a/english/lts/security/2022/dla-3248.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An integer overflow flaw was discovered in the CRL signature parser in
-libksba, an X.509 and CMS support library, which could result in denial
-of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.5-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your libksba packages.</p>
-
-<p>For the detailed security status of libksba please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libksba">https://security-tracker.debian.org/tracker/libksba</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3248.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3249.data b/english/lts/security/2022/dla-3249.data
deleted file mode 100644
index e58bc900a7d..00000000000
--- a/english/lts/security/2022/dla-3249.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3249-1 mbedtls</define-tag>
-<define-tag report_date>2022-12-26</define-tag>
-<define-tag secrefs>CVE-2019-16910 CVE-2019-18222 CVE-2020-10932 CVE-2020-10941 CVE-2020-16150 CVE-2020-36421 CVE-2020-36422 CVE-2020-36423 CVE-2020-36424 CVE-2020-36425 CVE-2020-36426 CVE-2020-36475 CVE-2020-36476 CVE-2020-36478 CVE-2021-24119 CVE-2021-43666 CVE-2021-44732 CVE-2022-35409 Bug#941265 Bug#963159 Bug#972806 Bug#1002631</define-tag>
-<define-tag packages>mbedtls</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3249.wml b/english/lts/security/2022/dla-3249.wml
deleted file mode 100644
index 6dbcdb76ba4..00000000000
--- a/english/lts/security/2022/dla-3249.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in mbedtls, a
-lightweight crypto and SSL/TLS library, which may allow attackers to obtain
-sensitive information like the RSA private key or cause a denial of service
-(application or server crash).</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.16.9-0~deb10u1.</p>
-
-<p>We recommend that you upgrade your mbedtls packages.</p>
-
-<p>For the detailed security status of mbedtls please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/mbedtls">https://security-tracker.debian.org/tracker/mbedtls</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3249.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3250.data b/english/lts/security/2022/dla-3250.data
deleted file mode 100644
index ef7b2de6cf6..00000000000
--- a/english/lts/security/2022/dla-3250.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3250-1 multipath-tools</define-tag>
-<define-tag report_date>2022-12-29</define-tag>
-<define-tag secrefs>CVE-2022-41973 CVE-2022-41974 Bug#1022742</define-tag>
-<define-tag packages>multipath-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3250.wml b/english/lts/security/2022/dla-3250.wml
deleted file mode 100644
index a27291305f7..00000000000
--- a/english/lts/security/2022/dla-3250.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in multipath-tools, a tool-chain to manage disk
-multipath device maps, which may be used by local attackers to obtain root
-privileges or create a directories or overwrite files via symlink attacks.</p>
-
-<p>Please note that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2022-41973">CVE-2022-41973</a> involves switching from
-/dev/shm to systemd-tmpfiles (/run/multipath-tools).
-If you have previously accesssed /dev/shm directly, please update your
-setup to the new path to facilitate this change.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41973">CVE-2022-41973</a>
-
- <p>multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to
- obtain root access, as exploited in conjunction with <a href="https://security-tracker.debian.org/tracker/CVE-2022-41974">CVE-2022-41974</a>.
- Local users able to access /dev/shm can change symlinks in multipathd
- due to incorrect symlink handling, which could lead to controlled file
- writes outside of the /dev/shm directory. This could be used indirectly
- for local privilege escalation to root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41974">CVE-2022-41974</a>
-
- <p>multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to
- obtain root access, as exploited alone or in conjunction with
- <a href="https://security-tracker.debian.org/tracker/CVE-2022-41973">CVE-2022-41973</a>. Local users able to write to UNIX domain sockets can
- bypass access controls and manipulate the multipath setup. This can lead
- to local privilege escalation to root. This occurs because an attacker
- can repeat a keyword, which is mishandled because arithmetic ADD is used
- instead of bitwise OR.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.7.9-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your multipath-tools packages.</p>
-
-<p>For the detailed security status of multipath-tools please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/multipath-tools">https://security-tracker.debian.org/tracker/multipath-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3250.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3251.data b/english/lts/security/2022/dla-3251.data
deleted file mode 100644
index b1a22039988..00000000000
--- a/english/lts/security/2022/dla-3251.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3251-1 libcommons-net-java</define-tag>
-<define-tag report_date>2022-12-29</define-tag>
-<define-tag secrefs>CVE-2021-37533 Bug#1025910</define-tag>
-<define-tag packages>libcommons-net-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3251.wml b/english/lts/security/2022/dla-3251.wml
deleted file mode 100644
index 0850c997a5a..00000000000
--- a/english/lts/security/2022/dla-3251.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ZeddYu Lu discovered that the FTP client of Apache Commons Net, a Java
-client API for basic Internet protocols, trusts the host from PASV response
-by default. A malicious server can redirect the Commons Net code to use a
-different host, but the user has to connect to the malicious server in the
-first place. This may lead to leakage of information about services running
-on the private network of the client.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.6-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libcommons-net-java packages.</p>
-
-<p>For the detailed security status of libcommons-net-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libcommons-net-java">https://security-tracker.debian.org/tracker/libcommons-net-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3251.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3252.data b/english/lts/security/2022/dla-3252.data
deleted file mode 100644
index 09f229d5f16..00000000000
--- a/english/lts/security/2022/dla-3252.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3252-1 cacti</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2020-8813 CVE-2020-23226 CVE-2020-25706 CVE-2022-0730 CVE-2022-46169 Bug#951832 Bug#1008693 Bug#1025648</define-tag>
-<define-tag packages>cacti</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3252.wml b/english/lts/security/2022/dla-3252.wml
deleted file mode 100644
index 4f68a33cb0b..00000000000
--- a/english/lts/security/2022/dla-3252.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in cacti, a web
-interface for graphing of monitoring systems, which may result in
-information disclosure, authentication bypass, or remote code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8813">CVE-2020-8813</a>
-
- <p>Askar discovered that an authenticated guest user with the graph
- real-time privilege could execute arbitrary code on a server running
- Cacti, via shell meta-characters in a cookie.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-23226">CVE-2020-23226</a>
-
- <p>Jing Chen discovered multiple Cross Site Scripting (XSS)
- vulnerabilities in several pages, which can lead to information
- disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25706">CVE-2020-25706</a>
-
- <p>joelister discovered an Cross Site Scripting (XSS) vulnerability in
- templates_import.php, which can lead to information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0730">CVE-2022-0730</a>
-
- <p>It has been discovered that Cacti authentication can be bypassed
- when LDAP anonymous binding is enabled.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46169">CVE-2022-46169</a>
-
- <p>Stefan Schiller discovered a command injection vulnerability,
- allowing an unauthenticated user to execute arbitrary code on a
- server running Cacti, if a specific data source was selected (which
- is likely the case on a production instance) for any monitored
- device.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.2.2+ds1-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your cacti packages.</p>
-
-<p>For the detailed security status of cacti please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cacti">https://security-tracker.debian.org/tracker/cacti</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3252.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3253.data b/english/lts/security/2022/dla-3253.data
deleted file mode 100644
index 3ca8295a415..00000000000
--- a/english/lts/security/2022/dla-3253.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3253-1 openvswitch</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-4337 CVE-2022-4338</define-tag>
-<define-tag packages>openvswitch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3253.wml b/english/lts/security/2022/dla-3253.wml
deleted file mode 100644
index 007f481f219..00000000000
--- a/english/lts/security/2022/dla-3253.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an out-of-bounds read and integer
-underflow vulnerability in open vSwitch, a software-based Ethernet
-virtual switch</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4337">CVE-2022-4337</a>
-
- <p>Out-of-Bounds Read in Organization Specific TLV</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4338">CVE-2022-4338</a>
-
- <p>Integer Underflow in Organization Specific TLV</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-2.10.7+ds1-0+deb10u3.</p>
-
-<p>We recommend that you upgrade your openvswitch packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3253.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3254.data b/english/lts/security/2022/dla-3254.data
deleted file mode 100644
index abc0bcde4aa..00000000000
--- a/english/lts/security/2022/dla-3254.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3254-1 exuberant-ctags</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-4515</define-tag>
-<define-tag packages>exuberant-ctags</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3254.wml b/english/lts/security/2022/dla-3254.wml
deleted file mode 100644
index 31a2e7cb4de..00000000000
--- a/english/lts/security/2022/dla-3254.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A flaw was found in the way the exubertant-ctags source code parser handled
-the "-o" command-line option which specifies the tag filename. A crafted tag
-filename specified in the command line or in the configuration file could have
-resulted in arbitrary command execution because the externalSortTags() in
-sort.c calls the system(3) function in an unsafe way.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4515">CVE-2022-4515</a>
-
- <p>A flaw was found in Exuberant Ctags in the way it handles the "-o"
- option. This option specifies the tag filename. A crafted tag filename
- specified in the command line or in the configuration file results in
- arbitrary command execution because the externalSortTags() in sort.c calls
- the system(3) function in an unsafe way.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:5.9~svn20110310-12+deb10u1.</p>
-
-<p>We recommend that you upgrade your exuberant-ctags packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3254.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3255.data b/english/lts/security/2022/dla-3255.data
deleted file mode 100644
index 29d4b56e9dc..00000000000
--- a/english/lts/security/2022/dla-3255.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3255-1 mplayer</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-38850 CVE-2022-38851 CVE-2022-38855 CVE-2022-38858 CVE-2022-38860 CVE-2022-38861 CVE-2022-38863 CVE-2022-38864 CVE-2022-38865 CVE-2022-38866</define-tag>
-<define-tag packages>mplayer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3255.wml b/english/lts/security/2022/dla-3255.wml
deleted file mode 100644
index 0d4f7cfec8a..00000000000
--- a/english/lts/security/2022/dla-3255.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in mplayer, a movie player for Unix-like
-systems.
-They are basically related to buffer overflows, divide by zero or out of
-bounds read in different parts of the code.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.3.0-8+deb10u1.</p>
-
-<p>We recommend that you upgrade your mplayer packages.</p>
-
-<p>For the detailed security status of mplayer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mplayer">https://security-tracker.debian.org/tracker/mplayer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3255.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3256.data b/english/lts/security/2022/dla-3256.data
deleted file mode 100644
index bd968b0e879..00000000000
--- a/english/lts/security/2022/dla-3256.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3256-1 xorg-server</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-4283 CVE-2022-46340 CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3256.wml b/english/lts/security/2022/dla-3256.wml
deleted file mode 100644
index c555d762db6..00000000000
--- a/english/lts/security/2022/dla-3256.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn discovered several vulnerabilities in X server extensions
-in the X.Org X server, which may result in privilege escalation if the X
-server is running privileged.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.20.4-1+deb10u7.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3256.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3257.data b/english/lts/security/2022/dla-3257.data
deleted file mode 100644
index 5556b729080..00000000000
--- a/english/lts/security/2022/dla-3257.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3257-1 emacs</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-45939</define-tag>
-<define-tag packages>emacs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2022/dla-3257.wml b/english/lts/security/2022/dla-3257.wml
deleted file mode 100644
index f034ab6ea42..00000000000
--- a/english/lts/security/2022/dla-3257.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in Emacs where where attackers
-could have executed arbitrary commands via shell metacharacters in the name of
-a source-code file.</p>
-
-<p>This was because lib-src/etags.c used the system(3) library function when
-calling the (external) ctags(1) binary.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-45939">CVE-2022-45939</a>
-
- <p>GNU Emacs through 28.2 allows attackers to execute commands via shell
- metacharacters in the name of a source-code file, because lib-src/etags.c
- uses the system C library function in its implementation of the ctags
- program. For example, a victim may use the "ctags *" command (suggested in
- the ctags documentation) in a situation where the current working directory
- has contents that depend on untrusted input.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:26.1+1-3.2+deb10u3.</p>
-
-<p>We recommend that you upgrade your emacs packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3257.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3258.data b/english/lts/security/2022/dla-3258.data
deleted file mode 100644
index f2c978bb508..00000000000
--- a/english/lts/security/2022/dla-3258.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3258-1 node-loader-utils</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-37601</define-tag>
-<define-tag packages>node-loader-utils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3258.wml b/english/lts/security/2022/dla-3258.wml
deleted file mode 100644
index c15d82bf02e..00000000000
--- a/english/lts/security/2022/dla-3258.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Supraja Baskar discovered prototype pollution vulnerability in
-node-loader-utils, a Node.js module for webpack loaders.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.1.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-loader-utils packages.</p>
-
-<p>For the detailed security status of node-loader-utils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-loader-utils">https://security-tracker.debian.org/tracker/node-loader-utils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3258.data"
-# $Id: $
diff --git a/english/lts/security/2022/dla-3259.data b/english/lts/security/2022/dla-3259.data
deleted file mode 100644
index 70f43d8865c..00000000000
--- a/english/lts/security/2022/dla-3259.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3259-1 libjettison-java</define-tag>
-<define-tag report_date>2022-12-31</define-tag>
-<define-tag secrefs>CVE-2022-40150 CVE-2022-45685 CVE-2022-45693 Bug#1022553</define-tag>
-<define-tag packages>libjettison-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2022/dla-3259.wml b/english/lts/security/2022/dla-3259.wml
deleted file mode 100644
index 8ab007fcd18..00000000000
--- a/english/lts/security/2022/dla-3259.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several flaws have been discovered in libjettison-java, a
-collection of StAX parsers and writers for JSON. Specially crafted user input
-may cause a denial of service via out-of-memory or stack overflow errors.</p>
-
-<p>In addition a build failure related to the update was fixed in jersey1.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.5.3-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your libjettison-java packages.</p>
-
-<p>For the detailed security status of libjettison-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libjettison-java">https://security-tracker.debian.org/tracker/libjettison-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2022/dla-3259.data"
-# $Id: $
diff --git a/english/lts/security/2022/index.wml b/english/lts/security/2022/index.wml
deleted file mode 100644
index 5b7dc518f41..00000000000
--- a/english/lts/security/2022/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2022</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2022' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>
diff --git a/english/lts/security/2023/Makefile b/english/lts/security/2023/Makefile
deleted file mode 100644
index 47f4e959372..00000000000
--- a/english/lts/security/2023/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-# If this makefile is not generic enough to support a translation,
-# please contact debian-www.
-
-WMLBASE=../../..
-CUR_DIR=lts/security/2023
-SUBS=
-
-GETTEXTFILES += security.mo
-
-NOGENERICDEP := true
-include $(WMLBASE)/Make.lang
-
-
-ifndef SUBLANG
-INDEXPAGE = index.$(LANGUAGE).html
-else
-INDEXPAGE = $(sort $(foreach i,$(SUBLANG),$(subst index,index.$(LANGUAGE)-$(i),index.html)))
-endif
-
-# The "| $(VCSREVCACHE)" here is an order-only prerequisite - always
-# check that the prerequisite exists and is up to date, but don't
-# rebuild everything whenever it's updated - see
-# https://www.gnu.org/software/make/manual/html_node/Prerequisite-Types.html
-$(INDEXPAGE): index.wml \
- $(sort $(wildcard dla-[0-9]*.wml)) $(sort $(wildcard $(ENGLISHSRCDIR)/$(CUR_DIR)/dla-[0-9]*.data)) \
- $(TEMPLDIR)/template.wml $(TEMPLDIR)/recent_list_security.wml $(GETTEXTDEP) | $(VCSREVCACHE)
-ifeq "$(LANGUAGE)" "zh"
- @echo -n "Processing $(<F): "
- $(shell echo $(WML) | perl -pe 's,:.zh-(..)\.html,:index.zh-$$1.html,g') \
- $(shell egrep '^-D (CUR_|CHAR)' ../../.wmlrc) \
- $(<F)
- @$(GENERATE_ZH_VARIANTS) index html
-else
- $(WML) $(<F)
-endif
-
-%.$(LANGUAGE).html: %.wml $(TEMPLDIR)/security.wml \
- $(ENGLISHSRCDIR)/$(CUR_DIR)/%.data $(GETTEXTDEP) | $(VCSREVCACHE)
- $(WML) $(<F)
-ifeq "$(LANGUAGE)" "zh"
- @$(GENERATE_ZH_VARIANTS) $* html
-endif
diff --git a/english/lts/security/2023/dla-3193-2.data b/english/lts/security/2023/dla-3193-2.data
deleted file mode 100644
index ea79b67fa06..00000000000
--- a/english/lts/security/2023/dla-3193-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3193-2 joblib</define-tag>
-<define-tag report_date>2023-03-30</define-tag>
-<define-tag secrefs>CVE-2022-21797 Bug#1020820</define-tag>
-<define-tag packages>joblib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3193-2.wml b/english/lts/security/2023/dla-3193-2.wml
deleted file mode 100644
index 8c8a499597e..00000000000
--- a/english/lts/security/2023/dla-3193-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that joblib did not completely sanitize arguments to
-pre_dispatch, allowing arbitrary code execution. The earlier attempt via
-DLA-3193-1 was incomplete.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.13.0-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your joblib packages.</p>
-
-<p>For the detailed security status of joblib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/joblib">https://security-tracker.debian.org/tracker/joblib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3193-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3260.data b/english/lts/security/2023/dla-3260.data
deleted file mode 100644
index 73dde435414..00000000000
--- a/english/lts/security/2023/dla-3260.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3260-1 node-xmldom</define-tag>
-<define-tag report_date>2023-01-01</define-tag>
-<define-tag secrefs>CVE-2021-21366 CVE-2022-39353 Bug#1024736</define-tag>
-<define-tag packages>node-xmldom</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3260.wml b/english/lts/security/2023/dla-3260.wml
deleted file mode 100644
index 5471f7f4dd4..00000000000
--- a/english/lts/security/2023/dla-3260.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that node-xmldom, a standard XML DOM (Level2 CORE)
-implementation in pure javascript, processed ill-formed XML, which may
-result in bugs and security holes in downstream applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21366">CVE-2021-21366</a>
-
- <p>xmldom versions 0.4.0 and older do not correctly preserve system
- identifiers, FPIs or namespaces when repeatedly parsing and serializing
- maliciously crafted documents. This may lead to unexpected syntactic
- changes during XML processing in some downstream applications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39353">CVE-2022-39353</a>
-
- <p>Mark Gollnick discovered that xmldom parses XML that is not well-formed
- because it contains multiple top level elements, and adds all root nodes to
- the <code>childNodes</code> collection of the <code>Document</code>, without reporting or throwing
- any error. This breaks the assumption that there is only a single root node
- in the tree, and may open security holes such as <a href="https://security-tracker.debian.org/tracker/CVE-2022-39299">CVE-2022-39299</a> in
- downstream applications.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.1.27+ds-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your node-xmldom packages.</p>
-
-<p>For the detailed security status of node-xmldom please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-xmldom">https://security-tracker.debian.org/tracker/node-xmldom</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3260.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3261.data b/english/lts/security/2023/dla-3261.data
deleted file mode 100644
index 08a20533a21..00000000000
--- a/english/lts/security/2023/dla-3261.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3261-1 libetpan</define-tag>
-<define-tag report_date>2023-01-05</define-tag>
-<define-tag secrefs>CVE-2022-4121</define-tag>
-<define-tag packages>libetpan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3261.wml b/english/lts/security/2023/dla-3261.wml
deleted file mode 100644
index ac703e2caa9..00000000000
--- a/english/lts/security/2023/dla-3261.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential null pointer dereference
-vulnerability in libetpan, an low-level library for handling email.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4121">CVE-2022-4121</a>
-
- <p>Null pointer dereference in mailimap_mailbox_data_status_free in low-level/imap/mailimap_types.c</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.9.3-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your libetpan packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3261.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3262.data b/english/lts/security/2023/dla-3262.data
deleted file mode 100644
index 661ab4a00da..00000000000
--- a/english/lts/security/2023/dla-3262.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3262-1 smarty3</define-tag>
-<define-tag report_date>2023-01-05</define-tag>
-<define-tag secrefs>CVE-2018-25047</define-tag>
-<define-tag packages>smarty3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3262.wml b/english/lts/security/2023/dla-3262.wml
deleted file mode 100644
index e85f3794434..00000000000
--- a/english/lts/security/2023/dla-3262.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential cross-site scripting
-vulnerability in smarty3, a widely-used PHP templating engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25047">CVE-2018-25047</a>
-
- <p>In Smarty before 3.1.47 and 4.x before 4.2.1,
- libs/plugins/function.mailto.php allows XSS. A web page that uses
- smarty_function_mailto, and that could be parameterized using GET or POST
- input parameters, could allow injection of JavaScript code by a
- user.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your smarty3 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3262.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3263.data b/english/lts/security/2023/dla-3263.data
deleted file mode 100644
index e123cdb8216..00000000000
--- a/english/lts/security/2023/dla-3263.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3263-1 libtasn1-6</define-tag>
-<define-tag report_date>2023-01-09</define-tag>
-<define-tag secrefs>CVE-2021-46848</define-tag>
-<define-tag packages>libtasn1-6</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3263.wml b/english/lts/security/2023/dla-3263.wml
deleted file mode 100644
index f3bede2c3e9..00000000000
--- a/english/lts/security/2023/dla-3263.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an off-by-one array size issue in
-libtasn1-6, a library to manage the generic ASN.1 data structure.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-46848">CVE-2021-46848</a>
-
- <p>GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-4.13-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your libtasn1-6 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3263.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3264.data b/english/lts/security/2023/dla-3264.data
deleted file mode 100644
index cd8dd40b85c..00000000000
--- a/english/lts/security/2023/dla-3264.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3264-1 ruby-sinatra</define-tag>
-<define-tag report_date>2023-01-10</define-tag>
-<define-tag secrefs>CVE-2022-45442</define-tag>
-<define-tag packages>ruby-sinatra</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3264.wml b/english/lts/security/2023/dla-3264.wml
deleted file mode 100644
index 22f20cb56db..00000000000
--- a/english/lts/security/2023/dla-3264.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential reflected file download (RFD)
-vulnerability in ruby-sinatra, a Ruby library for writing HTTP applications. A
-Content-Disposition HTTP header was being incorrectly derived from a
-potentially user-supplied filename.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-45442">CVE-2022-45442</a>
-
- <p>Sinatra is a domain-specific language for creating web applications in
- Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before
- 3.0.4. An application is vulnerable to a reflected file download (RFD)
- attack that sets the Content-Disposition header of a response when the
- filename is derived from user-supplied input. Version 2.2.3 and 3.0.4
- contain patches for this issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-2.0.5-4+deb10u2.</p>
-
-<p>We recommend that you upgrade your ruby-sinatra packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3264.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3265.data b/english/lts/security/2023/dla-3265.data
deleted file mode 100644
index 70b155d5037..00000000000
--- a/english/lts/security/2023/dla-3265.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3265-1 exiv2</define-tag>
-<define-tag report_date>2023-01-11</define-tag>
-<define-tag secrefs>CVE-2017-11591 CVE-2017-14859 CVE-2017-14862 CVE-2017-14864 CVE-2017-17669 CVE-2017-18005 CVE-2018-8976 CVE-2018-17581 CVE-2018-19107 CVE-2018-19108 CVE-2018-19535 CVE-2018-20097 CVE-2019-13110 CVE-2019-13112 CVE-2019-13114 CVE-2019-13504 CVE-2019-14369 CVE-2019-14370 CVE-2019-17402 CVE-2020-18771 CVE-2021-29458 CVE-2021-32815 CVE-2021-34334 CVE-2021-37620 CVE-2021-37621 CVE-2021-37622 Bug#876893 Bug#885981 Bug#886006 Bug#903813 Bug#910060 Bug#913272 Bug#913273 Bug#915135</define-tag>
-<define-tag packages>exiv2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3265.wml b/english/lts/security/2023/dla-3265.wml
deleted file mode 100644
index 7c33a1baef5..00000000000
--- a/english/lts/security/2023/dla-3265.wml
+++ /dev/null
@@ -1,198 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a number of memory access violations and other input
-validation failures that can be triggered by passing specially crafted files to
-exiv2.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11591">CVE-2017-11591</a>
-
- <p>There is a Floating point exception in the <code>Exiv2::ValueType</code> function that
- will lead to a remote denial of service attack via crafted input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14859">CVE-2017-14859</a>
-
- <p>An Invalid memory address dereference was discovered in
- <code>Exiv2::StringValueBase::read</code> in <code>value.cpp</code>. The vulnerability causes a
- segmentation fault and application crash, which leads to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14862">CVE-2017-14862</a>
-
- <p>An Invalid memory address dereference was discovered in
- <code>Exiv2::DataValue::read</code> in <code>value.cpp</code>. The vulnerability causes a
- segmentation fault and application crash, which leads to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14864">CVE-2017-14864</a>
-
- <p>An Invalid memory address dereference was discovered in <code>Exiv2::getULong</code> in
- <code>types.cpp</code>. The vulnerability causes a segmentation fault and application
- crash, which leads to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17669">CVE-2017-17669</a>
-
- <p>There is a heap-based buffer over-read in the
- <code>Exiv2::Internal::PngChunk::keyTXTChunk</code> function of <code>pngchunk_int.cpp</code>. A
- crafted PNG file will lead to a remote denial of service attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18005">CVE-2017-18005</a>
-
- <p>Exiv2 has a Null Pointer Dereference in the <code>Exiv2::DataValue::toLong</code>
- function in <code>value.cpp</code>, related to crafted metadata in a TIFF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8976">CVE-2018-8976</a>
-
- <p><code>jpgimage.cpp</code> allows remote attackers to cause a denial of service
- (<code>image.cpp</code> <code>Exiv2::Internal::stringFormat</code> out-of-bounds read) via a crafted
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-17581">CVE-2018-17581</a>
-
- <p><code>CiffDirectory::readDirectory()</code> at <code>crwimage_int.cpp</code> has excessive stack
- consumption due to a recursive function, leading to Denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19107">CVE-2018-19107</a>
-
- <p><code>Exiv2::IptcParser::decode</code> in <code>iptc.cpp</code> (called from <code>psdimage.cpp</code> in the PSD
- image reader) may suffer from a denial of service (heap-based buffer
- over-read) caused by an integer overflow via a crafted PSD image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19108">CVE-2018-19108</a>
-
- <p><code>Exiv2::PsdImage::readMetadata</code> in <code>psdimage.cpp</code> in the PSD image reader may
- suffer from a denial of service (infinite loop) caused by an integer
- overflow via a crafted PSD image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-19535">CVE-2018-19535</a>
-
- <p><code>PngChunk::readRawProfile</code> in <code>pngchunk_int.cpp</code> may cause a denial of service
- (application crash due to a heap-based buffer over-read) via a crafted PNG
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20097">CVE-2018-20097</a>
-
- <p>There is a SEGV in <code>Exiv2::Internal::TiffParserWorker::findPrimaryGroups</code> of
- <code>tiffimage_int.cpp</code>. A crafted input will lead to a remote denial of service
- attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13110">CVE-2019-13110</a>
-
- <p>A <code>CiffDirectory::readDirectory</code> integer overflow and out-of-bounds read
- allows an attacker to cause a denial of service (<code>SIGSEGV</code>) via a crafted CRW
- image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13112">CVE-2019-13112</a>
-
- <p>A <code>PngChunk::parseChunkContent</code> uncontrolled memory allocation allows an
- attacker to cause a denial of service (crash due to an <code>std::bad_alloc</code>
- exception) via a crafted PNG image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13114">CVE-2019-13114</a>
-
- <p><code>http.c</code> allows a malicious http server to cause a denial of service (crash
- due to a <code>NULL</code> pointer dereference) by returning a crafted response that
- lacks a space character.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13504">CVE-2019-13504</a>
-
- <p>There is an out-of-bounds read in <code>Exiv2::MrwImage::readMetadata</code> in
- <code>mrwimage.cpp</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14369">CVE-2019-14369</a>
-
- <p><code>Exiv2::PngImage::readMetadata()</code> in <code>pngimage.cpp</code> allows attackers to cause a
- denial of service (heap-based buffer over- read) via a crafted image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14370">CVE-2019-14370</a>
-
- <p>There is an out-of-bounds read in <code>Exiv2::MrwImage::readMetadata()</code> in
- <code>mrwimage.cpp</code>. It could result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17402">CVE-2019-17402</a>
-
- <p>Exiv2 allows attackers to trigger a crash in <code>Exiv2::getULong</code> in <code>types.cpp</code>
- when called from <code>Exiv2::Internal::CiffDirectory::readDirectory</code> in
- <code>crwimage_int.cpp</code>, because there is no validation of the relationship of the
- total size to the offset and size.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-18771">CVE-2020-18771</a>
-
- <p>Exiv2 has a global buffer over-read in
- <code>Exiv2::Internal::Nikon1MakerNote::print0x0088</code> in <code>nikonmn_int.cpp</code> which can
- result in an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-29458">CVE-2021-29458</a>
-
- <p>An out-of-bounds read was found in Exiv2. The out-of- bounds read is
- triggered when Exiv2 is used to write metadata into a crafted image file.
- An attacker could potentially exploit the vulnerability to cause a denial
- of service by crashing Exiv2, if they can trick the victim into running
- Exiv2 on a crafted image file. Note that this bug is only triggered when
- writing the metadata, which is a less frequently used Exiv2 operation than
- reading the metadata. For example, to trigger the bug in the Exiv2
- command-line application, you need to add an extra command-line argument
- such as insert.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32815">CVE-2021-32815</a>
-
- <p>The assertion
- failure is triggered when Exiv2 is used to modify the metadata of a
- crafted image file. An attacker could potentially exploit the
- vulnerability to cause a denial of service, if they can trick the
- victim into running Exiv2 on a crafted image file. Note that this bug
- is only triggered when modifying the metadata, which is a less
- frequently used Exiv2 operation than reading the metadata. For
- example, to trigger the bug in the Exiv2 command-line application, you
- need to add an extra command-line argument such as <code>fi</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-34334">CVE-2021-34334</a>
-
- <p>An infinite loop is triggered when Exiv2 is used to read the metadata of a
- crafted image file. An attacker could potentially exploit the vulnerability
- to cause a denial of service, if they can trick the victim into running
- Exiv2 on a crafted image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37620">CVE-2021-37620</a>
-
- <p>An out-of-bounds read is triggered when Exiv2 is used to read the metadata
- of a crafted image file. An attacker could potentially exploit the
- vulnerability to cause a denial of service, if they can trick the victim
- into running Exiv2 on a crafted image file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37621">CVE-2021-37621</a>
-
- <p>An infinite loop is triggered when Exiv2 is used to print the metadata of a
- crafted image file. An attacker could potentially exploit the vulnerability
- to cause a denial of service, if they can trick the victim into running
- Exiv2 on a crafted image file. Note that this bug is only triggered when
- printing the image ICC profile, which is a less frequently used Exiv2
- operation that requires an extra command line option (<code>-p C</code>).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37622">CVE-2021-37622</a>
-
- <p>An infinite loop is triggered when Exiv2 is used to modify the metadata of
- a crafted image file. An attacker could potentially exploit the
- vulnerability to cause a denial of service, if they can trick the victim
- into running Exiv2 on a crafted image file. Note that this bug is only
- triggered when deleting the IPTC data, which is a less frequently used
- Exiv2 operation that requires an extra command line option (<code>-d I rm</code>).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.25-4+deb10u4.</p>
-
-<p>We recommend that you upgrade your exiv2 packages.</p>
-
-<p>For the detailed security status of exiv2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/exiv2">https://security-tracker.debian.org/tracker/exiv2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3265.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3266.data b/english/lts/security/2023/dla-3266.data
deleted file mode 100644
index ef7fd7b9018..00000000000
--- a/english/lts/security/2023/dla-3266.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3266-1 viewvc</define-tag>
-<define-tag report_date>2023-01-11</define-tag>
-<define-tag secrefs>CVE-2023-22456 CVE-2023-22464</define-tag>
-<define-tag packages>viewvc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3266.wml b/english/lts/security/2023/dla-3266.wml
deleted file mode 100644
index 98e2f3b07db..00000000000
--- a/english/lts/security/2023/dla-3266.wml
+++ /dev/null
@@ -1,68 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two issues in viewvc, a web-based
-interface for browsing Subversion and CVS repositories. The attack vectors
-involved files with unsafe names; names that, when embedded into an HTML
-stream, could cause the browser to run unwanted code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-22456">CVE-2023-22456</a>
-
- <p>ViewVC, a browser interface for CVS and Subversion version control
- repositories, as a cross-site scripting vulnerability that affects versions
- prior to 1.2.2 and 1.1.29. The impact of this vulnerability is mitigated by
- the need for an attacker to have commit privileges to a Subversion
- repository exposed by an otherwise trusted ViewVC instance. The attack
- vector involves files with unsafe names (names that, when embedded into an
- HTML stream, would cause the browser to run unwanted code), which
- themselves can be challenging to create. Users should update to at least
- version 1.2.2 (if they are using a 1.2.x version of ViewVC) or 1.1.29 (if
- they are using a 1.1.x version). ViewVC 1.0.x is no longer supported, so
- users of that release lineage should implement a workaround. Users can edit
- their ViewVC EZT view templates to manually HTML-escape changed paths
- during rendering. Locate in your template set's `revision.ezt` file
- references to those changed paths, and wrap them with `[format "html"]` and
- `[end]`. For most users, that means that references to `[changes.path]`
- will become `[format "html"][changes.path][end]`. (This workaround should
- be reverted after upgrading to a patched version of ViewVC, else changed
- path names will be doubly escaped.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-22464">CVE-2023-22464</a>
-
- <p>ViewVC is a browser interface for CVS and Subversion version control
- repositories. Versions prior to 1.2.3 and 1.1.30 are vulnerable to
- cross-site scripting. The impact of this vulnerability is mitigated by the
- need for an attacker to have commit privileges to a Subversion repository
- exposed by an otherwise trusted ViewVC instance. The attack vector involves
- files with unsafe names (names that, when embedded into an HTML stream,
- would cause the browser to run unwanted code), which themselves can be
- challenging to create. Users should update to at least version 1.2.3 (if
- they are using a 1.2.x version of ViewVC) or 1.1.30 (if they are using a
- 1.1.x version). ViewVC 1.0.x is no longer supported, so users of that
- release lineage should implement one of the following workarounds. Users
- can edit their ViewVC EZT view templates to manually HTML-escape changed
- path "copyfrom paths" during rendering. Locate in your template set's
- `revision.ezt` file references to those changed paths, and wrap them with
- `[format "html"]` and `[end]`. For most users, that means that references
- to `[changes.copy_path]` will become `[format
- "html"][changes.copy_path][end]`. (This workaround should be reverted after
- upgrading to a patched version of ViewVC, else "copyfrom path" names will
- be doubly escaped.)</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1.1.26-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your viewvc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3266.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3267.data b/english/lts/security/2023/dla-3267.data
deleted file mode 100644
index e66848e6a13..00000000000
--- a/english/lts/security/2023/dla-3267.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3267-1 libxstream-java</define-tag>
-<define-tag report_date>2023-1-11</define-tag>
-<define-tag secrefs>CVE-2022-41966 Bug#1027754</define-tag>
-<define-tag packages>libxstream-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3267.wml b/english/lts/security/2023/dla-3267.wml
deleted file mode 100644
index e0db362471f..00000000000
--- a/english/lts/security/2023/dla-3267.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>XStream serializes Java objects to XML and back again. Versions prior to
-1.4.11.1-1+deb10u4 may allow a remote attacker to terminate the application
-with a stack overflow error, resulting in a denial of service only via
-manipulation of the processed input stream. The attack uses the hash code
-implementation for collections and maps to force recursive hash calculation
-causing a stack overflow. This update handles the stack overflow and raises an
-InputManipulationException instead.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4.11.1-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your libxstream-java packages.</p>
-
-<p>For the detailed security status of libxstream-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libxstream-java">https://security-tracker.debian.org/tracker/libxstream-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3267.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3268.data b/english/lts/security/2023/dla-3268.data
deleted file mode 100644
index c0e8889ceff..00000000000
--- a/english/lts/security/2023/dla-3268.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3268-1 netty</define-tag>
-<define-tag report_date>2023-1-11</define-tag>
-<define-tag secrefs>CVE-2021-37136 CVE-2021-37137 CVE-2021-43797 CVE-2022-41881 CVE-2022-41915 Bug#1027180 Bug#1014769 Bug#1001437</define-tag>
-<define-tag packages>netty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3268.wml b/english/lts/security/2023/dla-3268.wml
deleted file mode 100644
index c6f203e80ba..00000000000
--- a/english/lts/security/2023/dla-3268.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several out-of-memory, stack overflow or HTTP request smuggling vulnerabilities
-have been discovered in Netty, a Java NIO client/server socket framework, which
-may allow attackers to cause a denial of service or bypass restrictions when
-used as a proxy.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:4.1.33-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your netty packages.</p>
-
-<p>For the detailed security status of netty please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/netty">https://security-tracker.debian.org/tracker/netty</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3268.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3269.data b/english/lts/security/2023/dla-3269.data
deleted file mode 100644
index 1fad9ad6725..00000000000
--- a/english/lts/security/2023/dla-3269.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3269-1 libapreq2</define-tag>
-<define-tag report_date>2023-01-14</define-tag>
-<define-tag secrefs>CVE-2022-22728 Bug#1018191</define-tag>
-<define-tag packages>libapreq2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3269.wml b/english/lts/security/2023/dla-3269.wml
deleted file mode 100644
index d3a48518025..00000000000
--- a/english/lts/security/2023/dla-3269.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
-buffer overflow while processing multipart form uploads. A remote
-attacker could send a request causing a process crash which could lead
-to a denial of service attack.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.13-7~deb10u2.</p>
-
-<p>We recommend that you upgrade your libapreq2 packages.</p>
-
-<p>For the detailed security status of libapreq2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapreq2">https://security-tracker.debian.org/tracker/libapreq2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3269.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3270.data b/english/lts/security/2023/dla-3270.data
deleted file mode 100644
index 2fb42069561..00000000000
--- a/english/lts/security/2023/dla-3270.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3270-1 net-snmp</define-tag>
-<define-tag report_date>2023-01-15</define-tag>
-<define-tag secrefs>CVE-2022-44792 CVE-2022-44793 Bug#1024020</define-tag>
-<define-tag packages>net-snmp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3270.wml b/english/lts/security/2023/dla-3270.wml
deleted file mode 100644
index 86f53d8f13a..00000000000
--- a/english/lts/security/2023/dla-3270.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>menglong2234 discovered NULL pointer exceptions in net-snmp, a suite of
-Simple Network Management Protocol applications, which could could
-result in debian of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44792">CVE-2022-44792</a>
-
- <p>A remote attacker (with write access) could trigger a NULL
- dereference while handling ipDefaultTTL via a crafted UDP packet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44793">CVE-2022-44793</a>
-
- <p>A remote attacker (with write access) could trigger a NULL
- dereference while handling ipv6IpForwarding via a crafted UDP
- packet.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.7.3+dfsg-5+deb10u4.</p>
-
-<p>We recommend that you upgrade your net-snmp packages.</p>
-
-<p>For the detailed security status of net-snmp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/net-snmp">https://security-tracker.debian.org/tracker/net-snmp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3270.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3271.data b/english/lts/security/2023/dla-3271.data
deleted file mode 100644
index 7e75ee96954..00000000000
--- a/english/lts/security/2023/dla-3271.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3271-1 node-minimatch</define-tag>
-<define-tag report_date>2023-01-15</define-tag>
-<define-tag secrefs>CVE-2022-3517</define-tag>
-<define-tag packages>node-minimatch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3271.wml b/english/lts/security/2023/dla-3271.wml
deleted file mode 100644
index 9795b7a4212..00000000000
--- a/english/lts/security/2023/dla-3271.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A Regular Expression Denial of Service (ReDoS) vulnerability was found
-in node-minimatch, a Node.js module used to convert glob expressions
-into RegExp objects, which could result in Denial of Service when
-calling the <code>braceExpand()</code> function with specific arguments.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.0.4-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-minimatch packages.</p>
-
-<p>For the detailed security status of node-minimatch please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-minimatch">https://security-tracker.debian.org/tracker/node-minimatch</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3271.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3272.data b/english/lts/security/2023/dla-3272.data
deleted file mode 100644
index 7c5beae1b15..00000000000
--- a/english/lts/security/2023/dla-3272.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3272-1 sudo</define-tag>
-<define-tag report_date>2023-1-18</define-tag>
-<define-tag secrefs>CVE-2023-22809</define-tag>
-<define-tag packages>sudo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3272.wml b/english/lts/security/2023/dla-3272.wml
deleted file mode 100644
index 51d00dfc485..00000000000
--- a/english/lts/security/2023/dla-3272.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Matthieu Barjole and Victor Cutillas discovered that sudoedit in sudo, a
-program designed to provide limited super user privileges to specific
-users, does not properly handle '--' to separate the editor and arguments
-from files to edit. A local user permitted to edit certain files can take
-advantage of this flaw to edit a file not permitted by the security
-policy, resulting in privilege escalation.</p>
-
-<p>More information can be found at:
-<a href="https://www.sudo.ws/security/advisories/sudoedit_any/">https://www.sudo.ws/security/advisories/sudoedit_any/</a></p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.8.27-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your sudo packages.</p>
-
-<p>For the detailed security status of sudo please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sudo">https://security-tracker.debian.org/tracker/sudo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3272.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3273.data b/english/lts/security/2023/dla-3273.data
deleted file mode 100644
index ea6ae09c15e..00000000000
--- a/english/lts/security/2023/dla-3273.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3273-1 libitext5-java</define-tag>
-<define-tag report_date>2023-1-18</define-tag>
-<define-tag secrefs>CVE-2021-43113 Bug#1014597</define-tag>
-<define-tag packages>libitext5-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3273.wml b/english/lts/security/2023/dla-3273.wml
deleted file mode 100644
index 03f09db7f49..00000000000
--- a/english/lts/security/2023/dla-3273.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the CompareTool of iText, a Java PDF library which
-uses the external ghostscript software to compare PDFs at a pixel level,
-allowed command injection when parsing a specially crafted filename.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.5.13-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libitext5-java packages.</p>
-
-<p>For the detailed security status of libitext5-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libitext5-java">https://security-tracker.debian.org/tracker/libitext5-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3273.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3274.data b/english/lts/security/2023/dla-3274.data
deleted file mode 100644
index 87798780944..00000000000
--- a/english/lts/security/2023/dla-3274.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3274-1 webkit2gtk</define-tag>
-<define-tag report_date>2023-01-19</define-tag>
-<define-tag secrefs>CVE-2022-42852 CVE-2022-42856 CVE-2022-42867 CVE-2022-46692 CVE-2022-46698 CVE-2022-46699 CVE-2022-46700</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3274.wml b/english/lts/security/2023/dla-3274.wml
deleted file mode 100644
index add3b1af2cc..00000000000
--- a/english/lts/security/2023/dla-3274.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42852">CVE-2022-42852</a>
-
- <p>hazbinhotel discovered that processing maliciously crafted web
- content may result in the disclosure of process memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42856">CVE-2022-42856</a>
-
- <p>Clement Lecigne discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42867">CVE-2022-42867</a>
-
- <p>Maddie Stone discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46692">CVE-2022-46692</a>
-
- <p>KirtiKumar Anandrao Ramchandani discovered that processing
- maliciously crafted web content may bypass Same Origin Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46698">CVE-2022-46698</a>
-
- <p>Dohyun Lee and Ryan Shin discovered that processing maliciously
- crafted web content may disclose sensitive user information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46699">CVE-2022-46699</a>
-
- <p>Samuel Gross discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46700">CVE-2022-46700</a>
-
- <p>Samuel Gross discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.38.3-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3274.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3275.data b/english/lts/security/2023/dla-3275.data
deleted file mode 100644
index f0fa5319fe5..00000000000
--- a/english/lts/security/2023/dla-3275.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3275-1 firefox-esr</define-tag>
-<define-tag report_date>2023-01-19</define-tag>
-<define-tag secrefs>CVE-2022-46871 CVE-2022-46877 CVE-2023-23598 CVE-2023-23601 CVE-2023-23602 CVE-2023-23603 CVE-2023-23605</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3275.wml b/english/lts/security/2023/dla-3275.wml
deleted file mode 100644
index e9f928ecb04..00000000000
--- a/english/lts/security/2023/dla-3275.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.7.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3275.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3276.data b/english/lts/security/2023/dla-3276.data
deleted file mode 100644
index eec0bb6b79c..00000000000
--- a/english/lts/security/2023/dla-3276.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3276-1 lava</define-tag>
-<define-tag report_date>2023-1-19</define-tag>
-<define-tag secrefs>CVE-2022-44641 Bug#1024429</define-tag>
-<define-tag packages>lava</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3276.wml b/english/lts/security/2023/dla-3276.wml
deleted file mode 100644
index c5ab0fbe846..00000000000
--- a/english/lts/security/2023/dla-3276.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Igor Ponomarev discovered that LAVA, a continuous integration system for
-deploying operating systems onto physical and virtual hardware for
-running tests, was susceptible to denial of service via recursive XML
-entity expansion.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2019.01-5+deb10u2.</p>
-
-<p>We recommend that you upgrade your lava packages.</p>
-
-<p>For the detailed security status of lava please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/lava">https://security-tracker.debian.org/tracker/lava</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3276.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3277.data b/english/lts/security/2023/dla-3277.data
deleted file mode 100644
index 26bc411511f..00000000000
--- a/english/lts/security/2023/dla-3277.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3277-1 powerline-gitstatus</define-tag>
-<define-tag report_date>2023-1-20</define-tag>
-<define-tag secrefs>CVE-2022-42906</define-tag>
-<define-tag packages>powerline-gitstatus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3277.wml b/english/lts/security/2023/dla-3277.wml
deleted file mode 100644
index a08e0c951e2..00000000000
--- a/english/lts/security/2023/dla-3277.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Powerline Gitstatus, a status line plugin for the VIM editor, allows
-arbitrary code execution. Git repositories can contain per-repository
-configuration that changes the behavior of git, including running arbitrary
-commands. When using powerline-gitstatus, changing to a directory
-automatically runs git commands in order to display information about the
-current repository in the prompt. If an attacker can convince a user to
-change their current directory to one controlled by the attacker, such as
-in a shared filesystem or extracted archive, powerline-gitstatus will run
-arbitrary commands under the attacker's control.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.2-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your powerline-gitstatus packages.</p>
-
-<p>For the detailed security status of powerline-gitstatus please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/powerline-gitstatus">https://security-tracker.debian.org/tracker/powerline-gitstatus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3277.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3278.data b/english/lts/security/2023/dla-3278.data
deleted file mode 100644
index b36bfc5afe2..00000000000
--- a/english/lts/security/2023/dla-3278.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3278-1 tiff</define-tag>
-<define-tag report_date>2023-01-20</define-tag>
-<define-tag secrefs>CVE-2022-1354 CVE-2022-1355 CVE-2022-2056 CVE-2022-2057 CVE-2022-2058 CVE-2022-2867 CVE-2022-2868 CVE-2022-2869 CVE-2022-3570 CVE-2022-3597 CVE-2022-3598 CVE-2022-3599 CVE-2022-3626 CVE-2022-3627 CVE-2022-3970 CVE-2022-34526 Bug#1011160 Bug#1014494 Bug#1022555 Bug#1024737</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3278.wml b/english/lts/security/2023/dla-3278.wml
deleted file mode 100644
index f5e956bf622..00000000000
--- a/english/lts/security/2023/dla-3278.wml
+++ /dev/null
@@ -1,88 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in tiff, a library and tools
-providing support for the Tag Image File Format (TIFF), leading to
-denial of service (DoS) and possibly local code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1354">CVE-2022-1354</a>
-
- <p>A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in
- TIFFReadRawDataStriped() function. This flaw allows an attacker to
- pass a crafted TIFF file to the tiffinfo tool, triggering a heap
- buffer overflow issue and causing a crash that leads to a denial
- of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1355">CVE-2022-1355</a>
-
- <p>A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in
- main() function. This flaw allows an attacker to pass a crafted
- TIFF file to the tiffcp tool, triggering a stack buffer overflow
- issue, possibly corrupting the memory, and causing a crash that
- leads to a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2056">CVE-2022-2056</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-2057">CVE-2022-2057</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-2058">CVE-2022-2058</a>
-
- <p>Divide By Zero error in tiffcrop allows attackers to cause a
- denial-of-service via a crafted tiff file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2867">CVE-2022-2867</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-2868">CVE-2022-2868</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-2869">CVE-2022-2869</a>
-
- <p>libtiff's tiffcrop utility has underflow and input validation flaw
- that can lead to out of bounds read and write. An attacker who
- supplies a crafted file to tiffcrop (likely via tricking a user to
- run tiffcrop on it with certain parameters) could cause a crash or
- in some cases, further exploitation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3570">CVE-2022-3570</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-3598">CVE-2022-3598</a>
-
- <p>Multiple heap buffer overflows in tiffcrop.c utility in libtiff
- allows attacker to trigger unsafe or out of bounds memory access
- via crafted TIFF image file which could result into application
- crash, potential information disclosure or any other
- context-dependent impact.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3597">CVE-2022-3597</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-3626">CVE-2022-3626</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2022-3627">CVE-2022-3627</a>
-
- <p>Out-of-bounds write, allowing attackers to cause a
- denial-of-service via a crafted tiff file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3599">CVE-2022-3599</a>
-
- <p>Out-of-bounds read in writeSingleSection in tools/tiffcrop.c,
- allowing attackers to cause a denial-of-service via a crafted tiff
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3970">CVE-2022-3970</a>
-
- <p>Affects the function TIFFReadRGBATileExt of the file
- libtiff/tif_getimage.c. The manipulation leads to integer
- overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34526">CVE-2022-34526</a>
-
- <p>A stack overflow was discovered in the _TIFFVGetField function of
- Tiffsplit. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted TIFF file parsed by the <q>tiffsplit</q>
- or <q>tiffcrop</q> utilities.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.1.0+git191117-2~deb10u5.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3278.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3279.data b/english/lts/security/2023/dla-3279.data
deleted file mode 100644
index 642af26e934..00000000000
--- a/english/lts/security/2023/dla-3279.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3279-1 trafficserver</define-tag>
-<define-tag report_date>2023-01-23</define-tag>
-<define-tag secrefs>CVE-2021-37150 CVE-2022-25763 CVE-2022-28129 CVE-2022-31780</define-tag>
-<define-tag packages>trafficserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3279.wml b/english/lts/security/2023/dla-3279.wml
deleted file mode 100644
index 16b3aa79ac6..00000000000
--- a/english/lts/security/2023/dla-3279.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in trafficserver, a caching proxy
-server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37150">CVE-2021-37150</a>
-
- <p>Improper Input Validation vulnerability in header parsing of
- Apache Traffic Server allows an attacker to request secure
- resources</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25763">CVE-2022-25763</a>
-
- <p>Improper Input Validation vulnerability in HTTP/2 request
- validation of Apache Traffic Server allows an attacker to create
- smuggle or cache poison attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28129">CVE-2022-28129</a>
-
- <p>Improper Input Validation vulnerability in HTTP/1.1 header parsing
- of Apache Traffic Server allows an attacker to send invalid
- headers</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31780">CVE-2022-31780</a>
-
- <p>Improper Input Validation vulnerability in HTTP/2 frame handling
- of Apache Traffic Server allows an attacker to smuggle requests.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.0.2+ds-1+deb10u7.</p>
-
-<p>We recommend that you upgrade your trafficserver packages.</p>
-
-<p>For the detailed security status of trafficserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/trafficserver">https://security-tracker.debian.org/tracker/trafficserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3279.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3280.data b/english/lts/security/2023/dla-3280.data
deleted file mode 100644
index 3a8eaa0c2b3..00000000000
--- a/english/lts/security/2023/dla-3280.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3280-1 libde265</define-tag>
-<define-tag report_date>2023-01-24</define-tag>
-<define-tag secrefs>CVE-2020-21596 CVE-2020-21597 CVE-2020-21598 CVE-2022-43235 CVE-2022-43236 CVE-2022-43237 CVE-2022-43238 CVE-2022-43239 CVE-2022-43240 CVE-2022-43241 CVE-2022-43242 CVE-2022-43243 CVE-2022-43244 CVE-2022-43245 CVE-2022-43248 CVE-2022-43249 CVE-2022-43250 CVE-2022-43252 CVE-2022-43253 CVE-2022-47655 Bug#1025816 Bug#1027179 Bug#1029357 Bug#1029397</define-tag>
-<define-tag packages>libde265</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3280.wml b/english/lts/security/2023/dla-3280.wml
deleted file mode 100644
index 8b082499949..00000000000
--- a/english/lts/security/2023/dla-3280.wml
+++ /dev/null
@@ -1,163 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in libde265, an open source implementation
-of the H.265 video codec, which may result in denial of or have unspecified other
-impact.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21596">CVE-2020-21596</a>
-
- <p>libde265 v1.0.4 contains a global buffer overflow in the
- decode_CABAC_bit function, which can be exploited via a crafted a
- file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21597">CVE-2020-21597</a>
-
- <p>libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma
- function, which can be exploited via a crafted a file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21598">CVE-2020-21598</a>
-
- <p>libde265 v1.0.4 contains a heap buffer overflow in the
- ff_hevc_put_unweighted_pred_8_sse function, which can be exploited
- via a crafted a file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43235">CVE-2022-43235</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43236">CVE-2022-43236</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow
- vulnerability via put_qpel_fallback<unsigned short> in
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43237">CVE-2022-43237</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow
- vulnerability via void put_epel_hv_fallback<unsigned short> in
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43238">CVE-2022-43238</a>
-
- <p>Libde265 v1.0.8 was discovered to contain an unknown crash via
- ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This
- vulnerability allows attackers to cause a Denial of Service (DoS)
- via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43239">CVE-2022-43239</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via mc_chroma<unsigned short> in motion.cc. This
- vulnerability allows attackers to cause a Denial of Service (DoS)
- via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43240">CVE-2022-43240</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via ff_hevc_put_hevc_qpel_h_2_v_1_sse in
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43241">CVE-2022-43241</a>
-
- <p>Libde265 v1.0.8 was discovered to contain an unknown crash via
- ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability
- allows attackers to cause a Denial of Service (DoS) via a crafted
- video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43242">CVE-2022-43242</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via mc_luma<unsigned char> in motion.cc. This
- vulnerability allows attackers to cause a Denial of Service (DoS)
- via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43243">CVE-2022-43243</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43244">CVE-2022-43244</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via put_qpel_fallback<unsigned short> in
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43245">CVE-2022-43245</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a segmentation violation
- via apply_sao_internal<unsigned short> in sao.cc. This vulnerability
- allows attackers to cause a Denial of Service (DoS) via a crafted
- video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43248">CVE-2022-43248</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via put_weighted_pred_avg_16_fallback in
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43249">CVE-2022-43249</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via put_epel_hv_fallback<unsigned short> in
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43250">CVE-2022-43250</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc.
- This vulnerability allows attackers to cause a Denial of Service
- (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43252">CVE-2022-43252</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via put_epel_16_fallback in fallback-motion.cc. This
- vulnerability allows attackers to cause a Denial of Service (DoS)
- via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43253">CVE-2022-43253</a>
-
- <p>Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
- vulnerability via put_unweighted_pred_16_fallback in
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted video file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47655">CVE-2022-47655</a>
-
- <p>Libde265 1.0.9 is vulnerable to Buffer Overflow in function void
- put_qpel_fallback<unsigned short></p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.3-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your libde265 packages.</p>
-
-<p>For the detailed security status of libde265 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libde265">https://security-tracker.debian.org/tracker/libde265</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3280.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3281.data b/english/lts/security/2023/dla-3281.data
deleted file mode 100644
index 3691b292f56..00000000000
--- a/english/lts/security/2023/dla-3281.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3281-1 swift</define-tag>
-<define-tag report_date>2023-01-25</define-tag>
-<define-tag secrefs>CVE-2022-47950 Bug#1029200</define-tag>
-<define-tag packages>swift</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3281.wml b/english/lts/security/2023/dla-3281.wml
deleted file mode 100644
index c069bcdbaeb..00000000000
--- a/english/lts/security/2023/dla-3281.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sebastien Meriot discovered that the S3 API of Swift, a distributed
-virtual object store, was susceptible to information disclosure.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.19.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your swift packages.</p>
-
-<p>For the detailed security status of swift please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/swift">https://security-tracker.debian.org/tracker/swift</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3281.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3282.data b/english/lts/security/2023/dla-3282.data
deleted file mode 100644
index 24fb5cec7fe..00000000000
--- a/english/lts/security/2023/dla-3282.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3282-1 git</define-tag>
-<define-tag report_date>2023-01-26</define-tag>
-<define-tag secrefs>CVE-2022-23521 CVE-2022-41903 Bug#1029114</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3282.wml b/english/lts/security/2023/dla-3282.wml
deleted file mode 100644
index ae5b9eb2a34..00000000000
--- a/english/lts/security/2023/dla-3282.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in Git, a distributed revision
-control system. An attacker may trigger code execution in specific
-situations.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23521">CVE-2022-23521</a>
-
- <p>gitattributes are a mechanism to allow defining attributes for
- paths. These attributes can be defined by adding a
- `.gitattributes` file to the repository, which contains a set of
- file patterns and the attributes that should be set for paths
- matching this pattern. When parsing gitattributes, multiple
- integer overflows can occur when there is a huge number of path
- patterns, a huge number of attributes for a single pattern, or
- when the declared attribute names are huge. These overflows can be
- triggered via a crafted `.gitattributes` file that may be part of
- the commit history. Git silently splits lines longer than 2KB when
- parsing gitattributes from a file, but not when parsing them from
- the index. Consequentially, the failure mode depends on whether
- the file exists in the working tree, the index or both. This
- integer overflow can result in arbitrary heap reads and writes,
- which may result in remote code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41903">CVE-2022-41903</a>
-
- <p>`git log` can display commits in an arbitrary format using its
- `--format` specifiers. This functionality is also exposed to `git
- archive` via the `export-subst` gitattribute. When processing the
- padding operators, there is a integer overflow in
- `pretty.c::format_and_pad_commit()` where a `size_t` is stored
- improperly as an `int`, and then added as an offset to a
- `memcpy()`. This overflow can be triggered directly by a user
- running a command which invokes the commit formatting machinery
- (e.g., `git log --format=...`). It may also be triggered
- indirectly through git archive via the export-subst mechanism,
- which expands format specifiers inside of files within the
- repository during a git archive. This integer overflow can result
- in arbitrary heap writes, which may result in arbitrary code
- execution.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:2.20.1-2+deb10u7.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>For the detailed security status of git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3282.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3283.data b/english/lts/security/2023/dla-3283.data
deleted file mode 100644
index f3dd13b744a..00000000000
--- a/english/lts/security/2023/dla-3283.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3283-1 modsecurity-apache</define-tag>
-<define-tag report_date>2023-01-26</define-tag>
-<define-tag secrefs>CVE-2022-48279 CVE-2023-24021 Bug#1029329</define-tag>
-<define-tag packages>modsecurity-apache</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3283.wml b/english/lts/security/2023/dla-3283.wml
deleted file mode 100644
index 6dd3e167100..00000000000
--- a/english/lts/security/2023/dla-3283.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in modsecurity-apache, open source, cross
-platform web application firewall (WAF) engine for Apache which allows
-remote attackers to bypass the applications firewall and other
-unspecified impact.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48279">CVE-2022-48279</a>
-
- <p>In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart
- requests were incorrectly parsed and could bypass the Web
- Application Firewall.
- NOTE: this is related to <a href="https://security-tracker.debian.org/tracker/CVE-2022-39956">CVE-2022-39956</a>
- but can be considered independent changes to the ModSecurity
- (C language) codebase.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24021">CVE-2023-24021</a>
-
- <p>Incorrect handling of null-bytes in file uploads in ModSecurity
- before 2.9.7 may allow for Web Application Firewall bypasses
- and buffer overflows on the Web Application Firewall
- when executing rules reading the FILES_TMP_CONTENT collection.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.9.3-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your modsecurity-apache packages.</p>
-
-<p>For the detailed security status of modsecurity-apache please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/modsecurity-apache">https://security-tracker.debian.org/tracker/modsecurity-apache</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3283.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3284.data b/english/lts/security/2023/dla-3284.data
deleted file mode 100644
index 2a70cfa7433..00000000000
--- a/english/lts/security/2023/dla-3284.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3284-1 libapache-session-ldap-perl</define-tag>
-<define-tag report_date>2023-01-28</define-tag>
-<define-tag secrefs>CVE-2020-36658</define-tag>
-<define-tag packages>libapache-session-ldap-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3284.wml b/english/lts/security/2023/dla-3284.wml
deleted file mode 100644
index b161218a921..00000000000
--- a/english/lts/security/2023/dla-3284.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Apache::Session::LDAP before 0.5, validity of the X.509 certificate
-is not checked by default when connecting to remote LDAP backends,
-because the default configuration of the Net::LDAPS module for Perl is
-used.</p>
-
-<p>This update changes the default behavior to require X.509 validation
-against the distribution bundle <code>/etc/ssl/certs/ca-certificates.crt</code>.
-Previous behavior can reverted by setting <code>ldapVerify =&gt; "none"</code> when
-initializing the Apache::Session::LDAP object.
-<p><b>Note</b>: this update is a prerequisite for LemonLDAP::NG's <a href="https://security-tracker.debian.org/tracker/CVE-2020-16093">CVE-2020-16093</a>
-fix when its session backend is set to Apache::Session::LDAP.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.4-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libapache-session-ldap-perl packages.</p>
-
-<p>For the detailed security status of libapache-session-ldap-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapache-session-ldap-perl">https://security-tracker.debian.org/tracker/libapache-session-ldap-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3284.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3285.data b/english/lts/security/2023/dla-3285.data
deleted file mode 100644
index 9b3ed1c8ff6..00000000000
--- a/english/lts/security/2023/dla-3285.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3285-1 libapache-session-browseable-perl</define-tag>
-<define-tag report_date>2023-01-28</define-tag>
-<define-tag secrefs>CVE-2020-36659</define-tag>
-<define-tag packages>libapache-session-browseable-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3285.wml b/english/lts/security/2023/dla-3285.wml
deleted file mode 100644
index 5e6ef90ec50..00000000000
--- a/english/lts/security/2023/dla-3285.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In Apache::Session::Browseable before 1.3.6, validity of the X.509
-certificate is not checked by default when connecting to remote LDAP
-backends, because the default configuration of the Net::LDAPS module for
-Perl is used.</p>
-
-<p>This update changes the default behavior to require X.509 validation
-against the distribution bundle <code>/etc/ssl/certs/ca-certificates.crt</code>.
-Previous behavior can reverted by setting <code>ldapVerify =&gt; "none"</code> when
-initializing the Apache::Session::Browseable::LDAP object.
-<p><b>Note</b>: this update is a prerequisite for LemonLDAP::NG's <a href="https://security-tracker.debian.org/tracker/CVE-2020-16093">CVE-2020-16093</a>
-fix when its session backend is set to Apache::Session::Browseable::LDAP.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libapache-session-browseable-perl packages.</p>
-
-<p>For the detailed security status of libapache-session-browseable-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapache-session-browseable-perl">https://security-tracker.debian.org/tracker/libapache-session-browseable-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3285.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3286.data b/english/lts/security/2023/dla-3286.data
deleted file mode 100644
index b8fe4f3c057..00000000000
--- a/english/lts/security/2023/dla-3286.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3286-1 tor</define-tag>
-<define-tag report_date>2023-1-28</define-tag>
-<define-tag secrefs>CVE-2023-23589</define-tag>
-<define-tag packages>tor</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3286.wml b/english/lts/security/2023/dla-3286.wml
deleted file mode 100644
index f6e3cfa6d11..00000000000
--- a/english/lts/security/2023/dla-3286.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A logic error was discovered in the implementation of the <q>SafeSocks</q>
-option of Tor, a connection-based low-latency anonymous communication
-system, which did result in allowing unsafe SOCKS4 traffic to pass.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.3.5.16-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your tor packages.</p>
-
-<p>For the detailed security status of tor please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tor">https://security-tracker.debian.org/tracker/tor</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3286.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3287.data b/english/lts/security/2023/dla-3287.data
deleted file mode 100644
index 954477917af..00000000000
--- a/english/lts/security/2023/dla-3287.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3287-1 lemonldap-ng</define-tag>
-<define-tag report_date>2023-01-28</define-tag>
-<define-tag secrefs>CVE-2020-16093 CVE-2022-37186</define-tag>
-<define-tag packages>lemonldap-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3287.wml b/english/lts/security/2023/dla-3287.wml
deleted file mode 100644
index 5090cc8bcce..00000000000
--- a/english/lts/security/2023/dla-3287.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in lemonldap-ng, an OpenID-Connect, CAS
-and SAML compatible Web-SSO system, that could result in information
-disclosure or impersonation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16093">CVE-2020-16093</a>
-
- <p>Maxime Besson discovered that LemonLDAP::NG before 2.0.9 did not
- check validity of the X.509 certificate by default when connecting
- to remote LDAP backends, because the default configuration of the
- Net::LDAPS module for Perl is used.</p>
-
- <p>This update changes the default behavior to require X.509 validation
- against the distribution bundle <code>/etc/ssl/certs/ca-certificates.crt</code>.
- Previous behavior can reverted by running
- <code>/usr/share/lemonldap-ng/bin/lemonldap-ng-cli set ldapVerify none</code>.</p>
-
- <p>If a session backend is set to Apache::Session::LDAP or
- Apache::Session::Browseable::LDAP, then the complete fix involves
- upgrading the corresponding Apache::Session module
- (libapache-session-ldap-perl resp. libapache-session-browseable-perl)
- to 0.4-1+deb10u1 (or ≥0.5) resp. 1.3.0-1+deb10u1 (or ≥1.3.8). See
- related advisories <a href="dla-3284">DLA-3284-1</a> and
- <a href="dla-3285">DLA-3285-1</a> for details.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37186">CVE-2022-37186</a>
-
- <p>Mickael Bride discovered that under certain conditions the session
- remained valid on handlers after being destroyed on portal.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.2+ds-7+deb10u8.</p>
-
-<p>We recommend that you upgrade your lemonldap-ng packages.</p>
-
-<p>For the detailed security status of lemonldap-ng please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lemonldap-ng">https://security-tracker.debian.org/tracker/lemonldap-ng</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3287.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3288.data b/english/lts/security/2023/dla-3288.data
deleted file mode 100644
index a58fc6763fa..00000000000
--- a/english/lts/security/2023/dla-3288.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3288-1 curl</define-tag>
-<define-tag report_date>2023-01-28</define-tag>
-<define-tag secrefs>CVE-2022-27774 CVE-2022-32221 CVE-2022-35252 CVE-2022-43552</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3288.wml b/english/lts/security/2023/dla-3288.wml
deleted file mode 100644
index 5c844907e24..00000000000
--- a/english/lts/security/2023/dla-3288.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Curl, an easy-to-use client-side
-URL transfer library, which could result in denial of service or
-information disclosure.</p>
-
-<p>This update also revises the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2022-27782">CVE-2022-27782</a> released in DLA-3085-1.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.64.0-4+deb10u4.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3288.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3289.data b/english/lts/security/2023/dla-3289.data
deleted file mode 100644
index 25796de3747..00000000000
--- a/english/lts/security/2023/dla-3289.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3289-1 dojo</define-tag>
-<define-tag report_date>2023-01-29</define-tag>
-<define-tag secrefs>CVE-2020-4051 CVE-2021-23450 Bug#970000 Bug#1014785</define-tag>
-<define-tag packages>dojo</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3289.wml b/english/lts/security/2023/dla-3289.wml
deleted file mode 100644
index 7f07f89d792..00000000000
--- a/english/lts/security/2023/dla-3289.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were found in dojo, a modular JavaScript toolkit,
-that could result in information disclosure.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4051">CVE-2020-4051</a>
-
- <p>The Dijit Editor's LinkDialog plugin of dojo 1.14.0 to 1.14.7 is
- vulnerable to cross-site scripting (XSS) attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23450">CVE-2021-23450</a>
-
- <p>Prototype pollution vulnerability via the <code>setObject()</code> function.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.14.2+dfsg1-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your dojo packages.</p>
-
-<p>For the detailed security status of dojo please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dojo">https://security-tracker.debian.org/tracker/dojo</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3289.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3290.data b/english/lts/security/2023/dla-3290.data
deleted file mode 100644
index a16a4184df6..00000000000
--- a/english/lts/security/2023/dla-3290.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3290-1 libzen</define-tag>
-<define-tag report_date>2023-1-29</define-tag>
-<define-tag secrefs>CVE-2020-36646</define-tag>
-<define-tag packages>libzen</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3290.wml b/english/lts/security/2023/dla-3290.wml
deleted file mode 100644
index 3a39e864bd0..00000000000
--- a/english/lts/security/2023/dla-3290.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Crafted arguments to a function could lead to an unchecked return value
-and a null pointer dereference.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.4.37-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libzen packages.</p>
-
-<p>For the detailed security status of libzen please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libzen">https://security-tracker.debian.org/tracker/libzen</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3290.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3291.data b/english/lts/security/2023/dla-3291.data
deleted file mode 100644
index 97082e76242..00000000000
--- a/english/lts/security/2023/dla-3291.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3291-1 node-object-path</define-tag>
-<define-tag report_date>2023-01-29</define-tag>
-<define-tag secrefs>CVE-2021-3805 CVE-2021-23434</define-tag>
-<define-tag packages>node-object-path</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3291.wml b/english/lts/security/2023/dla-3291.wml
deleted file mode 100644
index 3a3e55d2468..00000000000
--- a/english/lts/security/2023/dla-3291.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that node-object-path, a Node.js module to access deep
-object properties using dot-separated paths, was vulnerable to prototype
-pollution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3805">CVE-2021-3805</a>
-
- <p>Prototype pollution vulnerability in the <code>del()</code>, <code>empty()</code>,
- <code>push()</code> and <code>insert()</code> functions when using the <q>inherited props</q>
- mode (e.g. when a new <code>object-path</code> instance is created with the
- <code>includeInheritedProps</code> option set to <code>true</code> or when using the
- <code>withInheritedProps</code> default instance).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23434">CVE-2021-23434</a>
-
- <p>A type confusion vulnerability can lead to a bypass of the
- <a href="https://security-tracker.debian.org/tracker/CVE-2020-15256">CVE-2020-15256</a> fix when the path components used in the path
- parameter are arrays, because the <code>===</code> operator returns always <code>false</code>
- when the type of the operands is different.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.11.4-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your node-object-path packages.</p>
-
-<p>For the detailed security status of node-object-path please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-object-path">https://security-tracker.debian.org/tracker/node-object-path</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3291.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3292.data b/english/lts/security/2023/dla-3292.data
deleted file mode 100644
index 50199bd79b8..00000000000
--- a/english/lts/security/2023/dla-3292.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3292-1 sofia-sip</define-tag>
-<define-tag report_date>2023-01-29</define-tag>
-<define-tag secrefs>CVE-2023-22741 Bug#1029654</define-tag>
-<define-tag packages>sofia-sip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3292.wml b/english/lts/security/2023/dla-3292.wml
deleted file mode 100644
index d07a1a37b25..00000000000
--- a/english/lts/security/2023/dla-3292.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Missing message length and attributes length checks when handling STUN
-packages have been fixed in sofia-sip, a SIP (Session Initiation Protocol)
-User-Agent library.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.12.11+20110422.1-2.1+deb10u2.</p>
-
-<p>We recommend that you upgrade your sofia-sip packages.</p>
-
-<p>For the detailed security status of sofia-sip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sofia-sip">https://security-tracker.debian.org/tracker/sofia-sip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3292.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3293.data b/english/lts/security/2023/dla-3293.data
deleted file mode 100644
index 6947a7a3caa..00000000000
--- a/english/lts/security/2023/dla-3293.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3293-1 modsecurity-crs</define-tag>
-<define-tag report_date>2023-01-30</define-tag>
-<define-tag secrefs>CVE-2018-16384 CVE-2020-22669 CVE-2021-35368 CVE-2022-39955 CVE-2022-39956 CVE-2022-39957 CVE-2022-39958 Bug#924352 Bug#992000 Bug#1021137</define-tag>
-<define-tag packages>modsecurity-crs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3293.wml b/english/lts/security/2023/dla-3293.wml
deleted file mode 100644
index 1110c518c00..00000000000
--- a/english/lts/security/2023/dla-3293.wml
+++ /dev/null
@@ -1,118 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in modsecurity-crs, a set of generic attack
-detection rules for use with ModSecurity or compatible web application
-firewalls, which allows remote attackers to bypass the web applications
-firewall.</p>
-
-<p>If you are using modsecurity-crs with apache2 / libapache2-modsecurity, please
-make sure to review your modsecurity configuration, usually
-/etc/modsecurity/modsecurity.conf, against the updated recommended
-configration, available in /etc/modsecurity/modsecurity.conf-recommended:
-Some of the changes to the recommended rules are required to avoid WAF bypasses
-in certain circumstances.</p>
-
-<p>Please note that <a href="https://security-tracker.debian.org/tracker/CVE-2022-39956">CVE-2022-39956</a> requires an updated modsecurity-apache packge,
-which has been previously uploaded to buster-security, see Debian LTS Advisory
-DLA-3283-1 for details.</p>
-
-<p>If you are using some other solution in connection with the
-modsecurity-ruleset, for example one that it is using libmodsecurity3, your
-solution might error out with an error message like "Error creating rule:
-Unknown variable: MULTIPART_PART_HEADERS". In this case you can disable the
-mitigation for <a href="https://security-tracker.debian.org/tracker/CVE-2022-29956">CVE-2022-29956</a> by removing the rule file
-REQUEST-922-MULTIPART-ATTACK.conf. However, be aware that this will disable
-the protection and could allow attackers to bypass your Web Application
-Firewall.</p>
-
-<p>There is no package in Debian which depends on libmodsecurity3, so if you are
-only using software which is available from Debian, you are not affected by
-this limitation.</p>
-
-<p>Kudos to @airween for the support and help while perparing the update.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16384">CVE-2018-16384</a>
-
- <p>A SQL injection bypass (aka PL1 bypass) exists in OWASP ModSecurity Core Rule
- Set (owasp-modsecurity-crs) through v3.1.0-rc3 via {`a`b} where a is a special
- function name (such as <q>if</q>) and b is the SQL statement to be executed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22669">CVE-2020-22669</a>
-
- <p>Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL
- injection bypass vulnerability. Attackers can use the comment characters and
- variable assignments in the SQL syntax to bypass Modsecurity WAF protection and
- implement SQL injection attacks on Web applications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39955">CVE-2022-39955</a>
-
- <p>The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set
- bypass by submitting a specially crafted HTTP Content-Type header field that
- indicates multiple character encoding schemes. A vulnerable back-end can
- potentially be exploited by declaring multiple Content-Type <q>charset</q> names and
- therefore bypassing the configurable CRS Content-Type header <q>charset</q> allow
- list. An encoded payload can bypass CRS detection this way and may then be
- decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected,
- as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and
- users are advised to upgrade to 3.2.2 and 3.3.3 respectively.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39956">CVE-2022-39956</a>
-
- <p>The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set
- bypass for HTTP multipart requests by submitting a payload that uses a
- character encoding scheme via the Content-Type or the deprecated
- Content-Transfer-Encoding multipart MIME header fields that will not be decoded
- and inspected by the web application firewall engine and the rule set. The
- multipart payload will therefore bypass detection. A vulnerable backend that
- supports these encoding schemes can potentially be exploited. The legacy CRS
- versions 3.0.x and 3.1.x are affected, as well as the currently supported
- versions 3.2.1 and 3.3.2. Integrators and users are advised upgrade to 3.2.2
- and 3.3.3 respectively. The mitigation against these vulnerabilities depends on
- the installation of the latest ModSecurity version (v2.9.6 / v3.0.8).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39957">CVE-2022-39957</a>
-
- <p>The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body
- bypass. A client can issue an HTTP Accept header field containing an optional
- <q>charset</q> parameter in order to receive the response in an encoded form.
- Depending on the <q>charset</q>, this response can not be decoded by the web
- application firewall. A restricted resource, access to which would ordinarily
- be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and
- 3.1.x are affected, as well as the currently supported versions 3.2.1 and
- 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3
- respectively.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39958">CVE-2022-39958</a>
-
- <p>The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass
- to sequentially exfiltrate small and undetectable sections of data by
- repeatedly submitting an HTTP Range header field with a small byte range. A
- restricted resource, access to which would ordinarily be detected, may be
- exfiltrated from the backend, despite being protected by a web application
- firewall that uses CRS. Short subsections of a restricted resource may bypass
- pattern matching techniques and allow undetected access. The legacy CRS
- versions 3.0.x and 3.1.x are affected, as well as the currently supported
- versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2
- and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.2.3-0+deb10u3.</p>
-
-<p>We recommend that you upgrade your modsecurity-crs packages.</p>
-
-<p>For the detailed security status of modsecurity-crs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/modsecurity-crs">https://security-tracker.debian.org/tracker/modsecurity-crs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3293.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3294.data b/english/lts/security/2023/dla-3294.data
deleted file mode 100644
index 72e24dfa877..00000000000
--- a/english/lts/security/2023/dla-3294.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3294-1 libarchive</define-tag>
-<define-tag report_date>2023-1-30</define-tag>
-<define-tag secrefs>CVE-2022-36227</define-tag>
-<define-tag packages>libarchive</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3294.wml b/english/lts/security/2023/dla-3294.wml
deleted file mode 100644
index b64fef528b8..00000000000
--- a/english/lts/security/2023/dla-3294.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libarchive, a multi-format archive and
-compression library.
-Due to missing checks after calloc, null pointer dereferences might
-happen.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.3.3-4+deb10u3.</p>
-
-<p>We recommend that you upgrade your libarchive packages.</p>
-
-<p>For the detailed security status of libarchive please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libarchive">https://security-tracker.debian.org/tracker/libarchive</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3294.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3295.data b/english/lts/security/2023/dla-3295.data
deleted file mode 100644
index d46c535f766..00000000000
--- a/english/lts/security/2023/dla-3295.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3295-1 node-moment</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2022-24785 CVE-2022-31129 Bug#1009327 Bug#1014845</define-tag>
-<define-tag packages>node-moment</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3295.wml b/english/lts/security/2023/dla-3295.wml
deleted file mode 100644
index 9195725ec40..00000000000
--- a/english/lts/security/2023/dla-3295.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Moment.js is a JavaScript date library for parsing, validating,
-manipulating, and formatting dates. A couple of vulnerabilities
-were reported as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24785">CVE-2022-24785</a>
-
- <p>A path traversal vulnerability impacts npm (server) users of
- Moment.js, especially if a user-provided locale string is directly
- used to switch moment locale.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31129">CVE-2022-31129</a>
-
- <p>Affected versions of moment were found to use an inefficient
- parsing algorithm. Specifically using string-to-date parsing in
- moment (more specifically rfc2822 parsing, which is tried by
- default) has quadratic (N^2) complexity on specific inputs. Users
- may notice a noticeable slowdown is observed with inputs above 10k
- characters. Users who pass user-provided strings without sanity
- length checks to moment constructor are vulnerable to (Re)DoS
- attacks.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.24.0+ds-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-moment packages.</p>
-
-<p>For the detailed security status of node-moment please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-moment">https://security-tracker.debian.org/tracker/node-moment</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3295.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3296.data b/english/lts/security/2023/dla-3296.data
deleted file mode 100644
index 63d19533edf..00000000000
--- a/english/lts/security/2023/dla-3296.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3296-1 libhtml-stripscripts-perl</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2023-24038 Bug#1029400</define-tag>
-<define-tag packages>libhtml-stripscripts-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3296.wml b/english/lts/security/2023/dla-3296.wml
deleted file mode 100644
index e1fd032fcd9..00000000000
--- a/english/lts/security/2023/dla-3296.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>HTML::StripScripts, a module for removing scripts from HTML, allows
-_hss_attval_style ReDoS because of catastrophic backtracking for HTML
-content with certain style attributes.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.06-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libhtml-stripscripts-perl packages.</p>
-
-<p>For the detailed security status of libhtml-stripscripts-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libhtml-stripscripts-perl">https://security-tracker.debian.org/tracker/libhtml-stripscripts-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3296.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3297.data b/english/lts/security/2023/dla-3297.data
deleted file mode 100644
index 4998cacb232..00000000000
--- a/english/lts/security/2023/dla-3297.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3297-1 tiff</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2022-48281 Bug#1029653</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3297.wml b/english/lts/security/2023/dla-3297.wml
deleted file mode 100644
index d0a7caa2775..00000000000
--- a/english/lts/security/2023/dla-3297.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>processCropSelections in tools/tiffcrop.c in LibTIFF, the Tag Image
-File Format (TIFF) library and tools, has a heap-based buffer overflow
-(e.g., <q>WRITE of size 307203</q>) via a crafted TIFF image.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.1.0+git191117-2~deb10u6.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3297.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3298.data b/english/lts/security/2023/dla-3298.data
deleted file mode 100644
index ff6cc6276c1..00000000000
--- a/english/lts/security/2023/dla-3298.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3298-1 ruby-rack</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2020-8161 CVE-2020-8184 CVE-2022-44570 CVE-2022-44571 CVE-2022-44572 Bug#963477 Bug#1029832</define-tag>
-<define-tag packages>ruby-rack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3298.wml b/english/lts/security/2023/dla-3298.wml
deleted file mode 100644
index e8fa57359a6..00000000000
--- a/english/lts/security/2023/dla-3298.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities, like directory traversal vulnerability,
-ReDoS vulnerability, et al, were found in ruby-rack, a modular Ruby
-webserver interface.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.6-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your ruby-rack packages.</p>
-
-<p>For the detailed security status of ruby-rack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rack">https://security-tracker.debian.org/tracker/ruby-rack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3298.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3299.data b/english/lts/security/2023/dla-3299.data
deleted file mode 100644
index 255e2e414be..00000000000
--- a/english/lts/security/2023/dla-3299.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3299-1 node-qs</define-tag>
-<define-tag report_date>2023-01-30</define-tag>
-<define-tag secrefs>CVE-2022-24999</define-tag>
-<define-tag packages>node-qs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3299.wml b/english/lts/security/2023/dla-3299.wml
deleted file mode 100644
index 490edd6b289..00000000000
--- a/english/lts/security/2023/dla-3299.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Nathanael Braun and Johan Brissaud discovered a prototype poisoning
-vulnerability in node-qs, a Node.js module to parse and stringify query
-strings. node-qs 6.5.x before 6.5.3 allows for instance the creation of
-array-like objects by setting an Array in the <code>__ proto__</code>
-property; the resulting Objects inherit the <code>Array</code> prototype,
-thereby exposing native Array functions.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-6.5.2-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-qs packages.</p>
-
-<p>For the detailed security status of node-qs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-qs">https://security-tracker.debian.org/tracker/node-qs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3299.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3300.data b/english/lts/security/2023/dla-3300.data
deleted file mode 100644
index 858f7c011a0..00000000000
--- a/english/lts/security/2023/dla-3300.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3300-1 glance</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2022-47951 Bug#1029563</define-tag>
-<define-tag packages>glance</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3300.wml b/english/lts/security/2023/dla-3300.wml
deleted file mode 100644
index 190793d17de..00000000000
--- a/english/lts/security/2023/dla-3300.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was discovered in Glance, OpenStack Image Registry and Delivery
-Service - Daemons. By supplying a specially created VMDK flat image that
-references a specific backing file path, an authenticated user may
-convince systems to return a copy of that file's contents from the
-server, resulting in unauthorized access to potentially sensitive data.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:17.0.0-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your glance packages.</p>
-
-<p>For the detailed security status of glance please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/glance">https://security-tracker.debian.org/tracker/glance</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3300.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3301.data b/english/lts/security/2023/dla-3301.data
deleted file mode 100644
index a2f53c886ee..00000000000
--- a/english/lts/security/2023/dla-3301.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3301-1 cinder</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2022-47951 Bug#1029562</define-tag>
-<define-tag packages>cinder</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3301.wml b/english/lts/security/2023/dla-3301.wml
deleted file mode 100644
index 4d8660261d1..00000000000
--- a/english/lts/security/2023/dla-3301.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was discovered in OpenStack Cinder, a Block Storage service
-for OpenStack. By supplying a specially created VMDK flat image that
-references a specific backing file path, an authenticated user may
-convince systems to return a copy of that file's contents from the
-server, resulting in unauthorized access to potentially sensitive data.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:13.0.7-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your cinder packages.</p>
-
-<p>For the detailed security status of cinder please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cinder">https://security-tracker.debian.org/tracker/cinder</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3301.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3302.data b/english/lts/security/2023/dla-3302.data
deleted file mode 100644
index 91f74c0cc84..00000000000
--- a/english/lts/security/2023/dla-3302.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3302-1 nova</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2022-47951 Bug#1029561</define-tag>
-<define-tag packages>nova</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3302.wml b/english/lts/security/2023/dla-3302.wml
deleted file mode 100644
index af072df4eb5..00000000000
--- a/english/lts/security/2023/dla-3302.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue was discovered in Nova, an OpenStack project that provides a
-way to provision compute instances (aka virtual servers). By supplying
-a specially created VMDK flat image that references a specific backing
-file path, an authenticated user may convince systems to return a copy
-of that file's contents from the server, resulting in unauthorized
-access to potentially sensitive data.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:18.1.0-6+deb10u2.</p>
-
-<p>We recommend that you upgrade your nova packages.</p>
-
-<p>For the detailed security status of nova please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nova">https://security-tracker.debian.org/tracker/nova</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3302.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3303.data b/english/lts/security/2023/dla-3303.data
deleted file mode 100644
index 79881f2625d..00000000000
--- a/english/lts/security/2023/dla-3303.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3303-1 ruby-git</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2022-25648 CVE-2022-46648 CVE-2022-47318 Bug#1009926</define-tag>
-<define-tag packages>ruby-git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3303.wml b/english/lts/security/2023/dla-3303.wml
deleted file mode 100644
index fedce10ffe8..00000000000
--- a/english/lts/security/2023/dla-3303.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A couple of vulnerabilities were reported against ruby-git, a Ruby
-interface to the Git revision control system, that could lead to a
-command injection and execution of an arbitrary ruby code by having
-a user to load a repository containing a specially crafted filename
-to the product.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.2.8-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-git packages.</p>
-
-<p>For the detailed security status of ruby-git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-git">https://security-tracker.debian.org/tracker/ruby-git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3303.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3304.data b/english/lts/security/2023/dla-3304.data
deleted file mode 100644
index 0b744fa7b47..00000000000
--- a/english/lts/security/2023/dla-3304.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3304-1 fig2dev</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2020-21529 CVE-2020-21531 CVE-2020-21532 CVE-2020-21676 CVE-2021-32280 Bug#960736</define-tag>
-<define-tag packages>fig2dev</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3304.wml b/english/lts/security/2023/dla-3304.wml
deleted file mode 100644
index e6102e0cc68..00000000000
--- a/english/lts/security/2023/dla-3304.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the fig2dev utilities for converting XFig figure files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21529">CVE-2020-21529</a>
-
- <p>Stack buffer overflow in bezier_spline().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21531">CVE-2020-21531</a>
-
- <p>Global buffer overflow in conv_pattern_index().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21532">CVE-2020-21532</a>
-
- <p>Global buffer overflow in setfigfont().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21676">CVE-2020-21676</a>
-
- <p>Stack-based buffer overflow in genpstrx_text().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32280">CVE-2021-32280</a>
-
- <p>NULL pointer dereference in compute_closed_spline().</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.2.7a-5+deb10u5.</p>
-
-<p>We recommend that you upgrade your fig2dev packages.</p>
-
-<p>For the detailed security status of fig2dev please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/fig2dev">https://security-tracker.debian.org/tracker/fig2dev</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3304.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3305.data b/english/lts/security/2023/dla-3305.data
deleted file mode 100644
index 9ef380325c6..00000000000
--- a/english/lts/security/2023/dla-3305.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3305-1 libstb</define-tag>
-<define-tag report_date>2023-01-31</define-tag>
-<define-tag secrefs>CVE-2018-16981 CVE-2019-13217 CVE-2019-13218 CVE-2019-13219 CVE-2019-13220 CVE-2019-13221 CVE-2019-13222 CVE-2019-13223 CVE-2021-28021 CVE-2021-37789 CVE-2021-42715 CVE-2022-28041 CVE-2022-28042 Bug#934966 Bug#1014530 Bug#1023693 Bug#1014531 Bug#1014532</define-tag>
-<define-tag packages>libstb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3305.wml b/english/lts/security/2023/dla-3305.wml
deleted file mode 100644
index 25202943af1..00000000000
--- a/english/lts/security/2023/dla-3305.wml
+++ /dev/null
@@ -1,78 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in the libstb library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16981">CVE-2018-16981</a>
-
- <p>Heap-based buffer overflow in stbi__out_gif_code().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13217">CVE-2019-13217</a>
-
- <p>Heap buffer overflow in the Vorbis start_decoder().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13218">CVE-2019-13218</a>
-
- <p>Division by zero in the Vorbis predict_point().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13219">CVE-2019-13219</a>
-
- <p>NULL pointer dereference in the Vorbis get_window().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13220">CVE-2019-13220</a>
-
- <p>Uninitialized stack variables in the Vorbis start_decoder().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13221">CVE-2019-13221</a>
-
- <p>Buffer overflow in the Vorbis compute_codewords().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13222">CVE-2019-13222</a>
-
- <p>Out-of-bounds read of a global buffer in the Vorbis draw_line().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13223">CVE-2019-13223</a>
-
- <p>Reachable assertion in the Vorbis lookup1_values().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-28021">CVE-2021-28021</a>
-
- <p>Buffer overflow in stbi__extend_receive().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37789">CVE-2021-37789</a>
-
- <p>Heap-based buffer overflow in stbi__jpeg_load().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42715">CVE-2021-42715</a>
-
- <p>The HDR loader parsed truncated end-of-file RLE scanlines as an
- infinite sequence of zero-length runs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28041">CVE-2022-28041</a>
-
- <p>Integer overflow in stbi__jpeg_decode_block_prog_dc().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28042">CVE-2022-28042</a>
-
- <p>Heap-based use-after-free in stbi__jpeg_huff_decode().</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.0~git20180212.15.e6afb9c-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libstb packages.</p>
-
-<p>For the detailed security status of libstb please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libstb">https://security-tracker.debian.org/tracker/libstb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3305.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3306.data b/english/lts/security/2023/dla-3306.data
deleted file mode 100644
index 3a786406c66..00000000000
--- a/english/lts/security/2023/dla-3306.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3306-1 python-django</define-tag>
-<define-tag report_date>2023-02-01</define-tag>
-<define-tag secrefs>CVE-2023-23969</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3306.wml b/english/lts/security/2023/dla-3306.wml
deleted file mode 100644
index 65b3d2a6571..00000000000
--- a/english/lts/security/2023/dla-3306.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential Denial of Service (DoS)
-vulnerability in Django, a popular Python-based web development framework.</p>
-
-<p>Parsed values of the <code>Accept-Language</code> HTTP headers are cached by
-Django order to avoid repetitive parsing. This could have led to a potential
-denial-of-service attack via excessive memory usage if the raw value of
-<code>Accept-Language</code> headers was very large.</p>
-
-<p><code>Accept-Language</code> headers are now limited to a maximum length
-specifically in order to avoid this issue.</p>
-
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23969">CVE-2023-23969</a></li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:1.11.29-1+deb10u6.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3306.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3307.data b/english/lts/security/2023/dla-3307.data
deleted file mode 100644
index 1b9f978eda3..00000000000
--- a/english/lts/security/2023/dla-3307.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3307-1 openjdk-11</define-tag>
-<define-tag report_date>2023-02-06</define-tag>
-<define-tag secrefs>CVE-2022-21619 CVE-2022-21624 CVE-2022-21626 CVE-2022-21628 CVE-2022-39399 CVE-2023-21835 CVE-2023-21843</define-tag>
-<define-tag packages>openjdk-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3307.wml b/english/lts/security/2023/dla-3307.wml
deleted file mode 100644
index e9eab63bc2b..00000000000
--- a/english/lts/security/2023/dla-3307.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-which may result in denial of service or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-11.0.18+10-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your openjdk-11 packages.</p>
-
-<p>For the detailed security status of openjdk-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-11">https://security-tracker.debian.org/tracker/openjdk-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3307.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3308.data b/english/lts/security/2023/dla-3308.data
deleted file mode 100644
index fd4fd747090..00000000000
--- a/english/lts/security/2023/dla-3308.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3308-1 webkit2gtk</define-tag>
-<define-tag report_date>2023-02-06</define-tag>
-<define-tag secrefs>CVE-2022-42826 CVE-2023-23517 CVE-2023-23518</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3308.wml b/english/lts/security/2023/dla-3308.wml
deleted file mode 100644
index 3fafa916118..00000000000
--- a/english/lts/security/2023/dla-3308.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42826">CVE-2022-42826</a>
-
- <p>Francisco Alonso discovered that processing maliciously crafted
- web content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23517">CVE-2023-23517</a>
-
- <p>YeongHyeon Choi, Hyeon Park, SeOk JEON, YoungSung Ahn, JunSeo Bae
- and Dohyun Lee discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23518">CVE-2023-23518</a>
-
- <p>YeongHyeon Choi, Hyeon Park, SeOk JEON, YoungSung Ahn, JunSeo Bae
- and Dohyun Lee discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.38.4-2~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3308.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3309.data b/english/lts/security/2023/dla-3309.data
deleted file mode 100644
index b85ca4de246..00000000000
--- a/english/lts/security/2023/dla-3309.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3309-1 graphite-web</define-tag>
-<define-tag report_date>2023-02-06</define-tag>
-<define-tag secrefs>CVE-2022-4728 CVE-2022-4729 CVE-2022-4730</define-tag>
-<define-tag packages>graphite-web</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3309.wml b/english/lts/security/2023/dla-3309.wml
deleted file mode 100644
index 71ce4bff577..00000000000
--- a/english/lts/security/2023/dla-3309.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of issues in graphite-web, a
-tool provide realtime graphing of system statistics etc.</p>
-
-<p>A series of cross-site scripting (XSS) vulnerabilties existed that could
-have been exploited remotely. Issues existed in the Cookie Handler, Template
-Name Handler and Absolute Time Range Handler components:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4728">CVE-2022-4728</a>
-
- <p>A vulnerability has been found in Graphite Web and classified
- as problematic. This vulnerability affects unknown code of the
- component Cookie Handler. The manipulation leads to cross site
- scripting. VDB-216742 is the identifier assigned to this
- vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4729">CVE-2022-4729</a>
-
- <p>A vulnerability was found in Graphite Web and classified as
- problematic. This issue affects some unknown processing of the
- component Template Name Handler. The manipulation leads to cross
- site scripting. The associated identifier of this vulnerability is
- VDB-216743.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4730">CVE-2022-4730</a>
-
- <p>A vulnerability was found in Graphite Web. It has been
- classified as problematic. Affected is an unknown function of the
- component Absolute Time Range Handler. The manipulation leads to
- cross site scripting. The identifier of this vulnerability is
- VDB-216744.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1.1.4-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your graphite-web packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3309.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3310.data b/english/lts/security/2023/dla-3310.data
deleted file mode 100644
index d88af2d3fa9..00000000000
--- a/english/lts/security/2023/dla-3310.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3310-1 xorg-server</define-tag>
-<define-tag report_date>2023-2-7</define-tag>
-<define-tag secrefs>CVE-2023-0494</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3310.wml b/english/lts/security/2023/dla-3310.wml
deleted file mode 100644
index 7dd941979fc..00000000000
--- a/english/lts/security/2023/dla-3310.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn, working with Trend Micro Zero Day Initiative, discovered
-a vulnerability in the X.Org X server.
-A potential use after free mighty result in local privilege escalation if
-the X server is running privileged or remote code execution during ssh X
-forwarding sessions.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:1.20.4-1+deb10u8.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3310.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3311.data b/english/lts/security/2023/dla-3311.data
deleted file mode 100644
index cc97b0f416c..00000000000
--- a/english/lts/security/2023/dla-3311.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3311-1 heimdal</define-tag>
-<define-tag report_date>2023-02-08</define-tag>
-<define-tag secrefs>CVE-2022-45142 Bug#1030849</define-tag>
-<define-tag packages>heimdal</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3311.wml b/english/lts/security/2023/dla-3311.wml
deleted file mode 100644
index 4bdd1af4976..00000000000
--- a/english/lts/security/2023/dla-3311.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Helmut Grohne discovered a flaw in Heimdal, an implementation of Kerberos 5 that
-aims to be compatible with MIT Kerberos. The backports of fixes for
-<a href="https://security-tracker.debian.org/tracker/CVE-2022-3437">CVE-2022-3437</a> accidentally inverted important memory comparisons in the
-<code>arcfour-hmac-md5</code> and <code>rc4-hmac</code> integrity check handlers for gssapi,
-resulting in incorrect validation of message integrity codes.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-7.5.0+dfsg-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your heimdal packages.</p>
-
-<p>For the detailed security status of heimdal please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/heimdal">https://security-tracker.debian.org/tracker/heimdal</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3311.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3312.data b/english/lts/security/2023/dla-3312.data
deleted file mode 100644
index 75e62d4c1f0..00000000000
--- a/english/lts/security/2023/dla-3312.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3312-1 shim</define-tag>
-<define-tag report_date>2023-02-08</define-tag>
-<define-tag packages>shim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3312.wml b/english/lts/security/2023/dla-3312.wml
deleted file mode 100644
index 5e80f25ae61..00000000000
--- a/english/lts/security/2023/dla-3312.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This release fixes various issues in shim bootloader and updates it to
-a supported version. Older versions of the shim may eventually be blocked
-by Secure Boot, so it is strongly advised for Secure Boot enabled systems
-to upgrade to this newer version to keep the system bootable.</p>
-
-<p>Additionally, this update blocks old, insecure versions of GRUB. Thus an
-update to a signed GRUB 2.06-3~deb10u3 package as released in DLA 3190-2
-must be in place prior to updating the shim packages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-15.7-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your shim packages.</p>
-
-<p>For the detailed security status of shim please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/shim">https://security-tracker.debian.org/tracker/shim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3312.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3313.data b/english/lts/security/2023/dla-3313.data
deleted file mode 100644
index b1425083af2..00000000000
--- a/english/lts/security/2023/dla-3313.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3313-1 wireshark</define-tag>
-<define-tag report_date>2023-02-13</define-tag>
-<define-tag secrefs>CVE-2022-4345 CVE-2023-0411 CVE-2023-0412 CVE-2023-0413 CVE-2023-0415 CVE-2023-0417</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3313.wml b/english/lts/security/2023/dla-3313.wml
deleted file mode 100644
index 81274305f79..00000000000
--- a/english/lts/security/2023/dla-3313.wml
+++ /dev/null
@@ -1,63 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Wireshark, a
-network traffic analyzer. An attacker could cause a denial of service
-(infinite loop or application crash) via packet injection or a crafted
-capture file.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4345">CVE-2022-4345</a>
-
- <p>Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in
- Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via
- packet injection or crafted capture file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0411">CVE-2023-0411</a>
-
- <p>Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and
- 3.6.0 to 3.6.10 and allows denial of service via packet injection or
- crafted capture file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0412">CVE-2023-0412</a>
-
- <p>TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and
- allows denial of service via packet injection or crafted capture file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0413">CVE-2023-0413</a>
-
- <p>Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10
- and allows denial of service via packet injection or crafted capture
- file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0415">CVE-2023-0415</a>
-
- <p>iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10
- and allows denial of service via packet injection or crafted capture
- file</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0417">CVE-2023-0417</a>
-
- <p>Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0
- to 3.6.10 and allows denial of service via packet injection or crafted
- capture file</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.6.20-0+deb10u5.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3313.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3314.data b/english/lts/security/2023/dla-3314.data
deleted file mode 100644
index ea7fabf3a2b..00000000000
--- a/english/lts/security/2023/dla-3314.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3314-1 libsdl2</define-tag>
-<define-tag report_date>2023-2-09</define-tag>
-<define-tag secrefs>CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 CVE-2019-7636 CVE-2019-7638 CVE-2019-13616 CVE-2019-13626 CVE-2020-14409 CVE-2020-14410 CVE-2021-33657 CVE-2022-4743 Bug#924610 Bug#1014577</define-tag>
-<define-tag packages>libsdl2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3314.wml b/english/lts/security/2023/dla-3314.wml
deleted file mode 100644
index 9872602070b..00000000000
--- a/english/lts/security/2023/dla-3314.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in SDL2, the Simple
-DirectMedia Layer library. These vulnerabilities may allow an attacker to
-cause a denial of service or result in the execution of arbitrary code if
-malformed images or sound files are processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.9+dfsg1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libsdl2 packages.</p>
-
-<p>For the detailed security status of libsdl2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libsdl2">https://security-tracker.debian.org/tracker/libsdl2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3314.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3315-2.data b/english/lts/security/2023/dla-3315-2.data
deleted file mode 100644
index 264641c7767..00000000000
--- a/english/lts/security/2023/dla-3315-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3315-2 sox</define-tag>
-<define-tag report_date>2023-03-20</define-tag>
-<define-tag secrefs>Bug#1032082</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3315-2.wml b/english/lts/security/2023/dla-3315-2.wml
deleted file mode 100644
index c6e6b4622a2..00000000000
--- a/english/lts/security/2023/dla-3315-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One of the security fixes released as DLA 3315 introduced a regression in the
-processing of WAV files with variable bitrate encoding. Updated sox packages are
-available to correct this issue.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-14.4.2+git20190427-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>For the detailed security status of sox please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sox">https://security-tracker.debian.org/tracker/sox</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3315-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3315.data b/english/lts/security/2023/dla-3315.data
deleted file mode 100644
index 44ea574c794..00000000000
--- a/english/lts/security/2023/dla-3315.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3315-1 sox</define-tag>
-<define-tag report_date>2023-02-10</define-tag>
-<define-tag secrefs>CVE-2019-13590 CVE-2021-3643 CVE-2021-23159 CVE-2021-23172 CVE-2021-23210 CVE-2021-33844 CVE-2021-40426 CVE-2022-31650 CVE-2022-31651 Bug#933372 Bug#1010374 Bug#1012138 Bug#1012516 Bug#1021133 Bug#1021134 Bug#1021135</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3315.wml b/english/lts/security/2023/dla-3315.wml
deleted file mode 100644
index 801eddc44c1..00000000000
--- a/english/lts/security/2023/dla-3315.wml
+++ /dev/null
@@ -1,83 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes multiple file format validation vulnerabilities that could
-result in memory access violations such as buffer overflows and floating point
-exceptions. It also fixes a regression in hcom parsing introduced when fixing
-<a href="https://security-tracker.debian.org/tracker/CVE-2017-11358">CVE-2017-11358</a>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13590">CVE-2019-13590</a>
-
- <p>In <code>sox-fmt.h</code> (startread function), there is an integer overflow on the
- result of integer addition (wraparound to 0) fed into the <code>lsx_calloc</code> macro
- that wraps <code>malloc</code>. When a <code>NULL</code> pointer is returned, it is used without a
- prior check that it is a valid pointer, leading to a <code>NULL</code> pointer
- dereference on <code>lsx_readbuf</code> in <code>formats_i.c</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3643">CVE-2021-3643</a>
-
- <p>The <code>lsx_adpcm_init</code> function within libsox leads to a
- global-buffer-overflow. This flaw allows an attacker to input a malicious
- file, leading to the disclosure of sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23159">CVE-2021-23159</a>
-
- <p>A vulnerability was found in SoX, where a heap-buffer-overflow occurs
- in function <code>lsx_read_w_buf()</code> in <code>formats_i.c</code> file. The vulnerability is
- exploitable with a crafted file, that could cause an application to
- crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23172">CVE-2021-23172</a>
-
- <p>A vulnerability was found in SoX, where a heap-buffer-overflow occurs
- in function <code>startread()</code> in <code>hcom.c</code> file. The vulnerability is
- exploitable with a crafted hcomn file, that could cause an application
- to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23210">CVE-2021-23210</a>
-
- <p>A floating point exception (divide-by-zero) issue was discovered in
- SoX in functon <code>read_samples()</code> of <code>voc.c</code> file. An attacker with a
- crafted file, could cause an application to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33844">CVE-2021-33844</a>
-
- <p>A floating point exception (divide-by-zero) issue was discovered in
- SoX in functon <code>startread()</code> of <code>wav.c</code> file. An attacker with a crafted
- wav file, could cause an application to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40426">CVE-2021-40426</a>
-
- <p>A heap-based buffer overflow vulnerability exists in the <code>sphere.c</code>
- <code>start_read()</code> functionality of Sound Exchange libsox. A specially-crafted
- file can lead to a heap buffer overflow. An attacker can provide a
- malicious file to trigger this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31650">CVE-2022-31650</a>
-
- <p>There is a floating-point exception in <code>lsx_aiffstartwrite</code> in <code>aiff.c</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31651">CVE-2022-31651</a>
-
- <p>There is an assertion failure in <code>rate_init</code> in <code>rate.c</code>.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-14.4.2+git20190427-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>For the detailed security status of sox please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sox">https://security-tracker.debian.org/tracker/sox</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3315.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3316.data b/english/lts/security/2023/dla-3316.data
deleted file mode 100644
index 16165b90c77..00000000000
--- a/english/lts/security/2023/dla-3316.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3316-1 postgresql-11</define-tag>
-<define-tag report_date>2023-02-10</define-tag>
-<define-tag secrefs>CVE-2022-41862</define-tag>
-<define-tag packages>postgresql-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3316.wml b/english/lts/security/2023/dla-3316.wml
deleted file mode 100644
index 83fb276e421..00000000000
--- a/english/lts/security/2023/dla-3316.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jacob Champion discovered that libpq can leak memory contents after
-GSSAPI transport encryption initiation fails.</p>
-
-<p>A modified server, or an unauthenticated man-in-the-middle, can send a
-not-zero-terminated error message during setup of GSSAPI (Kerberos)
-transport encryption. libpq will then copy that string, as well as
-following bytes in application memory up to the next zero byte, to its
-error report. Depending on what the calling application does with the
-error report, this could result in disclosure of application memory
-contents. There is also a small probability of a crash due to reading
-beyond the end of memory. Fix by properly zero-terminating the server
-message. (<a href="https://security-tracker.debian.org/tracker/CVE-2022-41862">CVE-2022-41862</a>)</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-11.19-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your postgresql-11 packages.</p>
-
-<p>For the detailed security status of postgresql-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3316.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3317.data b/english/lts/security/2023/dla-3317.data
deleted file mode 100644
index 9b0e46cc668..00000000000
--- a/english/lts/security/2023/dla-3317.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3317-1 snort</define-tag>
-<define-tag report_date>2023-2-11</define-tag>
-<define-tag secrefs>CVE-2020-3299 CVE-2020-3315 CVE-2021-1223 CVE-2021-1224 CVE-2021-1236 CVE-2021-1494 CVE-2021-1495 CVE-2021-34749 CVE-2021-40114 Bug#1021276</define-tag>
-<define-tag packages>snort</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3317.wml b/english/lts/security/2023/dla-3317.wml
deleted file mode 100644
index 203788fd8eb..00000000000
--- a/english/lts/security/2023/dla-3317.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in snort, a flexible Network
-Intrusion Detection System, which could allow an unauthenticated, remote
-attacker to cause a denial of service (DoS) condition or bypass filtering
-technology on an affected device and ex-filtrate data from a compromised host.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.9.20-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your snort packages.</p>
-
-<p>For the detailed security status of snort please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/snort">https://security-tracker.debian.org/tracker/snort</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3317.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3318.data b/english/lts/security/2023/dla-3318.data
deleted file mode 100644
index 9ad9434ca81..00000000000
--- a/english/lts/security/2023/dla-3318.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3318-1 haproxy</define-tag>
-<define-tag report_date>2023-2-14</define-tag>
-<define-tag secrefs>CVE-2023-25725</define-tag>
-<define-tag packages>haproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3318.wml b/english/lts/security/2023/dla-3318.wml
deleted file mode 100644
index 03f428b455a..00000000000
--- a/english/lts/security/2023/dla-3318.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was discovered in HAProxy, a fast and reliable
-load balancing reverse proxy, which may result in denial of service, or
-bypass of access controls and routing rules via specially crafted requests.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.8.19-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your haproxy packages.</p>
-
-<p>For the detailed security status of haproxy please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/haproxy">https://security-tracker.debian.org/tracker/haproxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3318.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3319.data b/english/lts/security/2023/dla-3319.data
deleted file mode 100644
index d4f3276630a..00000000000
--- a/english/lts/security/2023/dla-3319.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3319-1 firefox-esr</define-tag>
-<define-tag report_date>2023-02-16</define-tag>
-<define-tag secrefs>CVE-2023-0767 CVE-2023-25728 CVE-2023-25729 CVE-2023-25730 CVE-2023-25732 CVE-2023-25735 CVE-2023-25737 CVE-2023-25739 CVE-2023-25742 CVE-2023-25744 CVE-2023-25746</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3319.wml b/english/lts/security/2023/dla-3319.wml
deleted file mode 100644
index 5c0273973e1..00000000000
--- a/english/lts/security/2023/dla-3319.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information disclosure or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.8.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3319.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3320.data b/english/lts/security/2023/dla-3320.data
deleted file mode 100644
index 5abaa1ee790..00000000000
--- a/english/lts/security/2023/dla-3320.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3320-1 webkit2gtk</define-tag>
-<define-tag report_date>2023-02-17</define-tag>
-<define-tag secrefs>CVE-2023-23529</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3320.wml b/english/lts/security/2023/dla-3320.wml
deleted file mode 100644
index 01f277bc4d0..00000000000
--- a/english/lts/security/2023/dla-3320.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23529">CVE-2023-23529</a>
-
- <p>An anonymous researcher discovered that processing maliciously
- crafted web content may lead to arbitrary code execution. Apple is
- aware of a report that this issue may have been actively
- exploited.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.38.5-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3320.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3321.data b/english/lts/security/2023/dla-3321.data
deleted file mode 100644
index a8b8bc1ca3b..00000000000
--- a/english/lts/security/2023/dla-3321.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3321-1 gnutls28</define-tag>
-<define-tag report_date>2023-2-18</define-tag>
-<define-tag secrefs>CVE-2023-0361</define-tag>
-<define-tag packages>gnutls28</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3321.wml b/english/lts/security/2023/dla-3321.wml
deleted file mode 100644
index 0fa07b18d7c..00000000000
--- a/english/lts/security/2023/dla-3321.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Hubert Kario discovered a timing side channel in the RSA decryption
-implementation of the GNU TLS library.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.6.7-4+deb10u10.</p>
-
-<p>We recommend that you upgrade your gnutls28 packages.</p>
-
-<p>For the detailed security status of gnutls28 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/gnutls28">https://security-tracker.debian.org/tracker/gnutls28</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3321.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3322.data b/english/lts/security/2023/dla-3322.data
deleted file mode 100644
index 27365d877db..00000000000
--- a/english/lts/security/2023/dla-3322.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3322-1 golang-github-opencontainers-selinux</define-tag>
-<define-tag report_date>2023-02-18</define-tag>
-<define-tag secrefs>CVE-2019-16884 Bug#942027</define-tag>
-<define-tag packages>golang-github-opencontainers-selinux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3322.wml b/english/lts/security/2023/dla-3322.wml
deleted file mode 100644
index 7e6aaaa9334..00000000000
--- a/english/lts/security/2023/dla-3322.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>runc, as used in Docker and other products, allows AppArmor and
-SELinux restriction bypass, and thus a malicious Docker image could
-breach isolation.</p>
-
-<p>This update carries SELinux-related fixes in the
-golang-github-opencontainers-selinux library, that will be leveraged
-in the upcoming runc security update.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.0~rc1+git20170621.5.4a2974b-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your golang-github-opencontainers-selinux packages.</p>
-
-<p>For the detailed security status of golang-github-opencontainers-selinux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-github-opencontainers-selinux">https://security-tracker.debian.org/tracker/golang-github-opencontainers-selinux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3322.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3323.data b/english/lts/security/2023/dla-3323.data
deleted file mode 100644
index a7f150ae437..00000000000
--- a/english/lts/security/2023/dla-3323.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3323-1 c-ares</define-tag>
-<define-tag report_date>2023-2-18</define-tag>
-<define-tag secrefs>CVE-2022-4904 Bug#1031525</define-tag>
-<define-tag packages>c-ares</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3323.wml b/english/lts/security/2023/dla-3323.wml
deleted file mode 100644
index a9981a8d7fd..00000000000
--- a/english/lts/security/2023/dla-3323.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that in c-ares, an asynchronous name resolver library,
-the config_sortlist function is missing checks about the validity of the
-input string, which allows a possible arbitrary length stack overflow and
-thus may cause a denial of service.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.0-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your c-ares packages.</p>
-
-<p>For the detailed security status of c-ares please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/c-ares">https://security-tracker.debian.org/tracker/c-ares</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3323.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3324.data b/english/lts/security/2023/dla-3324.data
deleted file mode 100644
index 1e7fa1a8c22..00000000000
--- a/english/lts/security/2023/dla-3324.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3324-1 thunderbird</define-tag>
-<define-tag report_date>2023-02-20</define-tag>
-<define-tag secrefs>CVE-2022-46871 CVE-2022-46877 CVE-2023-0430 CVE-2023-0616 CVE-2023-0767 CVE-2023-23598 CVE-2023-23601 CVE-2023-23602 CVE-2023-23603 CVE-2023-23605 CVE-2023-25728 CVE-2023-25729 CVE-2023-25730 CVE-2023-25732 CVE-2023-25735 CVE-2023-25737 CVE-2023-25739 CVE-2023-25742 CVE-2023-25744 CVE-2023-25746</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3324.wml b/english/lts/security/2023/dla-3324.wml
deleted file mode 100644
index c8485e3543d..00000000000
--- a/english/lts/security/2023/dla-3324.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.8.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3324.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3325.data b/english/lts/security/2023/dla-3325.data
deleted file mode 100644
index 75a969d6b94..00000000000
--- a/english/lts/security/2023/dla-3325.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3325-1 openssl</define-tag>
-<define-tag report_date>2023-02-20</define-tag>
-<define-tag secrefs>CVE-2022-2097 CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3325.wml b/english/lts/security/2023/dla-3325.wml
deleted file mode 100644
index 7788d008a16..00000000000
--- a/english/lts/security/2023/dla-3325.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in OpenSSL, a Secure
-Sockets Layer toolkit, which may result in incomplete encryption, side
-channel attacks, denial of service or information disclosure.</p>
-
-<p>Additional details can be found in the upstream advisories at
-<a href="https://www.openssl.org/news/secadv/20220705.txt">https://www.openssl.org/news/secadv/20220705.txt</a> and
-<a href="https://www.openssl.org/news/secadv/20230207.txt">https://www.openssl.org/news/secadv/20230207.txt</a></p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.1.1n-0+deb10u4.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3325.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3326.data b/english/lts/security/2023/dla-3326.data
deleted file mode 100644
index daede891beb..00000000000
--- a/english/lts/security/2023/dla-3326.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3326-1 isc-dhcp</define-tag>
-<define-tag report_date>2023-2-20</define-tag>
-<define-tag secrefs>Bug#1022969</define-tag>
-<define-tag packages>isc-dhcp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3326.wml b/english/lts/security/2023/dla-3326.wml
deleted file mode 100644
index cc9217dbc18..00000000000
--- a/english/lts/security/2023/dla-3326.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Under not completely understood conditions, dhclient completely removes
-IPv6 addresses from use and is unable to restore them.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.4.1-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your isc-dhcp packages.</p>
-
-<p>For the detailed security status of isc-dhcp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/isc-dhcp">https://security-tracker.debian.org/tracker/isc-dhcp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3326.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3327.data b/english/lts/security/2023/dla-3327.data
deleted file mode 100644
index 6b84b822b43..00000000000
--- a/english/lts/security/2023/dla-3327.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3327-1 nss</define-tag>
-<define-tag report_date>2023-2-20</define-tag>
-<define-tag secrefs>CVE-2020-6829 CVE-2020-12400 CVE-2020-12401 CVE-2020-12403 CVE-2023-0767</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3327.wml b/english/lts/security/2023/dla-3327.wml
deleted file mode 100644
index 22af2b1982f..00000000000
--- a/english/lts/security/2023/dla-3327.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in nss, the Network
-Security Service libraries.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-6829">CVE-2020-6829</a>
-
- <p>When performing EC scalar point multiplication, the wNAF point
- multiplication algorithm was used; which leaked partial information about
- the nonce used during signature generation. Given an electro-magnetic trace
- of a few signature generations, the private key could have been computed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12400">CVE-2020-12400</a>
-
- <p>When converting coordinates from projective to affine, the modular
- inversion was not performed in constant time, resulting in a possible
- timing-based side channel attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12401">CVE-2020-12401</a>
-
- <p>During ECDSA signature generation, padding applied in the nonce designed to
- ensure constant-time scalar multiplication was removed, resulting in
- variable-time execution dependent on secret data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12403">CVE-2020-12403</a>
-
- <p>A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS.
- When using multi-part Chacha20, it could cause out-of-bounds reads.
- This issue was fixed by explicitly disabling multi-part ChaCha20&nbsp;
- (which was not functioning correctly) and strictly enforcing tag length.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0767">CVE-2023-0767</a>
-
- <p>Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
- attributes may result in execution of arbitrary code if a specially crafted
- PKCS 12 certificate bundle is processed.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:3.42.1-1+deb10u6.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>For the detailed security status of nss please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/nss">https://security-tracker.debian.org/tracker/nss</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3327.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3328.data b/english/lts/security/2023/dla-3328.data
deleted file mode 100644
index e436ec47bed..00000000000
--- a/english/lts/security/2023/dla-3328.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3328-1 clamav</define-tag>
-<define-tag report_date>2023-02-20</define-tag>
-<define-tag secrefs>CVE-2023-20032 CVE-2023-20052</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3328.wml b/english/lts/security/2023/dla-3328.wml
deleted file mode 100644
index 6cb4271e5e4..00000000000
--- a/english/lts/security/2023/dla-3328.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been found in the ClamAV antivirus toolkit,
-which could result in arbitrary code execution or information disclosure
-when parsing maliciously crafted HFS+ or DMG files.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.103.8+dfsg-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3328.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3329.data b/english/lts/security/2023/dla-3329.data
deleted file mode 100644
index bebf50117ae..00000000000
--- a/english/lts/security/2023/dla-3329.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3329-1 python-django</define-tag>
-<define-tag report_date>2023-02-20</define-tag>
-<define-tag secrefs>CVE-2023-24580</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3329.wml b/english/lts/security/2023/dla-3329.wml
deleted file mode 100644
index 31cd20b9628..00000000000
--- a/english/lts/security/2023/dla-3329.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a denial-of-service vulnerability in
-Django, a Python-based web development framework.</p>
-
-<p>Passing certain inputs to multipart forms could have resulted in too
-many open files or memory exhaustion, and provided a potential vector for a
-denial-of-service attack.</p>
-
-<p>The number of files parts parsed is now limited via a new
-DATA_UPLOAD_MAX_NUMBER_FILES setting.</p>
-
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24580">CVE-2023-24580</a>
-
- <p>An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:1.11.29-1+deb10u7.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3329.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3330.data b/english/lts/security/2023/dla-3330.data
deleted file mode 100644
index 04755dfd0be..00000000000
--- a/english/lts/security/2023/dla-3330.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3330-1 amanda</define-tag>
-<define-tag report_date>2023-02-21</define-tag>
-<define-tag secrefs>CVE-2022-37704</define-tag>
-<define-tag packages>amanda</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3330.wml b/english/lts/security/2023/dla-3330.wml
deleted file mode 100644
index a6db91ae895..00000000000
--- a/english/lts/security/2023/dla-3330.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential privilege escalation
-vulnerability in the "amanda" backup utility.</p>
-
-<p>The SUID binary located at <code>/lib/amanda/rundump</code> executed
-<code>/usr/sbin/dump</code> as root with arguments controlled by the
-attacker, which may have led to an escalation of privileges, denial of
-service (DoS) or information disclosure.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37704">CVE-2022-37704</a></li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:3.5.1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your amanda packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3330.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3331-2.data b/english/lts/security/2023/dla-3331-2.data
deleted file mode 100644
index 63e663159ad..00000000000
--- a/english/lts/security/2023/dla-3331-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3331-2 python-cryptography</define-tag>
-<define-tag report_date>2023-02-21</define-tag>
-<define-tag secrefs>CVE-2023-23931</define-tag>
-<define-tag packages>python-cryptography</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3331-2.wml b/english/lts/security/2023/dla-3331-2.wml
deleted file mode 100644
index 05426d84d56..00000000000
--- a/english/lts/security/2023/dla-3331-2.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a regression in the previous fix for
-python-cryptography, a Python library offering a number of encryption
-and cryptography primitives.</p>
-
-<p>The original issue was that there was a potential memory corrution
-vulnerability. However, the change introduced a regression due to
-incorrectly backporting upstream's patch to the (older) version in
-Debian LTS.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23931">CVE-2023-23931</a>
-
- <p>cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-2.6.1-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your python-cryptography packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3331.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3331.data b/english/lts/security/2023/dla-3331.data
deleted file mode 100644
index 6cd9c13061c..00000000000
--- a/english/lts/security/2023/dla-3331.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3331-1 python-cryptography</define-tag>
-<define-tag report_date>2023-02-21</define-tag>
-<define-tag secrefs>CVE-2023-23931</define-tag>
-<define-tag packages>python-cryptography</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3331.wml b/english/lts/security/2023/dla-3331.wml
deleted file mode 100644
index afe575a5abb..00000000000
--- a/english/lts/security/2023/dla-3331.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential memory corrution vulnerability
-in python-cryptography, a Python library offering a number of encryption and
-cryptography primitives.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23931">CVE-2023-23931</a>
-
- <p>cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-2.6.1-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your python-cryptography packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3331.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3332.data b/english/lts/security/2023/dla-3332.data
deleted file mode 100644
index bcdec796b9e..00000000000
--- a/english/lts/security/2023/dla-3332.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3332-1 apr-util</define-tag>
-<define-tag report_date>2023-02-21</define-tag>
-<define-tag secrefs>CVE-2022-25147</define-tag>
-<define-tag packages>apr-util</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3332.wml b/english/lts/security/2023/dla-3332.wml
deleted file mode 100644
index 01c2b8f7c33..00000000000
--- a/english/lts/security/2023/dla-3332.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An Integer Overflow or Wraparound vulnerability was fixed in
-apr_base64() in the Apache Portable Runtime Utility Library.
-</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.6.1-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your apr-util packages.</p>
-
-<p>For the detailed security status of apr-util please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apr-util">https://security-tracker.debian.org/tracker/apr-util</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3332.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3333.data b/english/lts/security/2023/dla-3333.data
deleted file mode 100644
index b68ca6ae936..00000000000
--- a/english/lts/security/2023/dla-3333.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3333-1 tiff</define-tag>
-<define-tag report_date>2023-2-21</define-tag>
-<define-tag secrefs>CVE-2023-0795 CVE-2023-0796 CVE-2023-0797 CVE-2023-0798 CVE-2023-0799 CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804 Bug#1031632</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3333.wml b/english/lts/security/2023/dla-3333.wml
deleted file mode 100644
index 096b9d29660..00000000000
--- a/english/lts/security/2023/dla-3333.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several flaws were found in tiffcrop, a program distributed by tiff, a library
-and tools providing support for the Tag Image File Format (TIFF).
-A specially crafted tiff file can lead to an out-of-bounds write or read
-resulting in a denial of service.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.1.0+git191117-2~deb10u7.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3333.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3334.data b/english/lts/security/2023/dla-3334.data
deleted file mode 100644
index e205d7b5cb4..00000000000
--- a/english/lts/security/2023/dla-3334.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3334-1 sofia-sip</define-tag>
-<define-tag report_date>2023-02-22</define-tag>
-<define-tag secrefs>CVE-2022-47516 Bug#1031792</define-tag>
-<define-tag packages>sofia-sip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3334.wml b/english/lts/security/2023/dla-3334.wml
deleted file mode 100644
index fb5de3b131d..00000000000
--- a/english/lts/security/2023/dla-3334.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Denial of service (crash) via a crafted UDP message that leads to
-internal assert was fixed in sofia-sip, a SIP (Session Initiation
-Protocol) User-Agent library.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.12.11+20110422.1-2.1+deb10u3.</p>
-
-<p>We recommend that you upgrade your sofia-sip packages.</p>
-
-<p>For the detailed security status of sofia-sip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sofia-sip">https://security-tracker.debian.org/tracker/sofia-sip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3334.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3335.data b/english/lts/security/2023/dla-3335.data
deleted file mode 100644
index 4247db86d8c..00000000000
--- a/english/lts/security/2023/dla-3335.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3335-1 asterisk</define-tag>
-<define-tag report_date>2023-2-22</define-tag>
-<define-tag secrefs>CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325 CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3335.wml b/english/lts/security/2023/dla-3335.wml
deleted file mode 100644
index 54f41085fa7..00000000000
--- a/english/lts/security/2023/dla-3335.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Asterisk, an Open
-Source Private Branch Exchange. Buffer overflows and other programming errors
-could be exploited for launching a denial of service attack or the execution of
-arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:16.28.0~dfsg-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>For the detailed security status of asterisk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/asterisk">https://security-tracker.debian.org/tracker/asterisk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3335.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3336.data b/english/lts/security/2023/dla-3336.data
deleted file mode 100644
index 5d2b31045a4..00000000000
--- a/english/lts/security/2023/dla-3336.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3336-1 node-url-parse</define-tag>
-<define-tag report_date>2023-02-23</define-tag>
-<define-tag secrefs>CVE-2021-3664 CVE-2021-27515 CVE-2022-0512 CVE-2022-0639 CVE-2022-0686 CVE-2022-0691 Bug#985110 Bug#991577</define-tag>
-<define-tag packages>node-url-parse</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3336.wml b/english/lts/security/2023/dla-3336.wml
deleted file mode 100644
index ade6055f1c2..00000000000
--- a/english/lts/security/2023/dla-3336.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in node-types-url-parse, a Node.js
-module used to parse URLs, which may result in authorization bypass or
-redirection to untrusted sites.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3664">CVE-2021-3664</a>
-
- <p>url-parse mishandles certain uses of a single (back)slash such as
- <code>https:&bsol;</code> and <code>https:/</code>, and interprets
- the URI as a relative path. Browsers accept a single backslash
- after the protocol, and treat it as a normal slash, while url-parse
- sees it as a relative path. Depending on library usage, this may
- result in allow/block list bypasses, SSRF attacks, open redirects,
- or other undesired behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27515">CVE-2021-27515</a>
-
- <p>Using backslash in the protocol is valid in the browser, while
- url-parse thinks it's a relative path. An application that
- validates a URL using url-parse might pass a malicious link.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0512">CVE-2022-0512</a>
-
- <p>Incorrect handling of username and password can lead to failure to
- properly identify the hostname, which in turn could result in
- authorization bypass.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0639">CVE-2022-0639</a>
-
- <p>Incorrect conversion of <code>@</code> characters in protocol in
- the <code>href</code> field can lead to lead to failure to properly
- identify the hostname, which in turn could result in authorization
- bypass.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0686">CVE-2022-0686</a>
-
- <p>Rohan Sharma reported that url-parse is unable to find the correct
- hostname when no port number is provided in the URL, such as in
- <code>http://example.com:</code>. This could in turn result in SSRF
- attacks, open redirects or any other vulnerability which depends on
- the <code>hostname</code> field of the parsed URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0691">CVE-2022-0691</a>
-
- <p>url-parse is unable to find the correct hostname when the URL
- contains a backspace <code>&bsol;b</code> character. This tricks
- the parser into interpreting the URL as a relative path, bypassing
- all hostname checks. It can also lead to false positive in
- <code>extractProtocol()</code>.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.2.0-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your node-url-parse packages.</p>
-
-<p>For the detailed security status of node-url-parse please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-url-parse">https://security-tracker.debian.org/tracker/node-url-parse</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3336.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3337.data b/english/lts/security/2023/dla-3337.data
deleted file mode 100644
index 6f63cfd7816..00000000000
--- a/english/lts/security/2023/dla-3337.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3337-1 mariadb-10.3</define-tag>
-<define-tag report_date>2023-02-23</define-tag>
-<define-tag secrefs>Bug#1008629</define-tag>
-<define-tag packages>mariadb-10.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3337.wml b/english/lts/security/2023/dla-3337.wml
deleted file mode 100644
index 57ad2efe3f3..00000000000
--- a/english/lts/security/2023/dla-3337.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A new MariaDB minor maintenance release 10.3.38 has been released. It
-includes fix for a major performance/memory consumption issue (MDEV-29988).</p>
-
-<p>For further details, see the MariaDB 10.3 release notes:</p>
-
- <p>https://mariadb.com/kb/en/mariadb-10-3-37-release-notes/
- <a href="https://mariadb.com/kb/en/mariadb-10-3-38-release-notes/">https://mariadb.com/kb/en/mariadb-10-3-38-release-notes/</a></p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:10.3.38-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your mariadb-10.3 packages.</p>
-
-<p>For the detailed security status of mariadb-10.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.3">https://security-tracker.debian.org/tracker/mariadb-10.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3337.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3338.data b/english/lts/security/2023/dla-3338.data
deleted file mode 100644
index 7b8ce3d0ad1..00000000000
--- a/english/lts/security/2023/dla-3338.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3338-1 git</define-tag>
-<define-tag report_date>2023-02-23</define-tag>
-<define-tag secrefs>CVE-2023-22490 CVE-2023-23946</define-tag>
-<define-tag packages>git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3338.wml b/english/lts/security/2023/dla-3338.wml
deleted file mode 100644
index 7ea5b9b0c63..00000000000
--- a/english/lts/security/2023/dla-3338.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in git, a fast, scalable
-and distributed revision control system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-22490">CVE-2023-22490</a>
-
- <p>yvvdwf found a data exfiltration vulnerability while performing a local
- clone from a malicious repository even using a non-local transport.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23946">CVE-2023-23946</a>
-
- <p>Joern Schneeweisz found a path traversal vulnerbility in git-apply
- that a path outside the working tree can be overwritten as the acting
- user.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:2.20.1-2+deb10u8.</p>
-
-<p>We recommend that you upgrade your git packages.</p>
-
-<p>For the detailed security status of git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3338.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3339.data b/english/lts/security/2023/dla-3339.data
deleted file mode 100644
index 2d452ae87a9..00000000000
--- a/english/lts/security/2023/dla-3339.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3339-1 binwalk</define-tag>
-<define-tag report_date>2023-02-23</define-tag>
-<define-tag secrefs>CVE-2022-4510</define-tag>
-<define-tag packages>binwalk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3339.wml b/english/lts/security/2023/dla-3339.wml
deleted file mode 100644
index d4e8dfa6e7f..00000000000
--- a/english/lts/security/2023/dla-3339.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Code execution through crafted PFS filesystems was fixed in binwalk,
-a tool and Python module for analyzing binary blobs and executable code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.1.2~git20180830+dfsg1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your binwalk packages.</p>
-
-<p>For the detailed security status of binwalk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/binwalk">https://security-tracker.debian.org/tracker/binwalk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3339.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3340.data b/english/lts/security/2023/dla-3340.data
deleted file mode 100644
index 96fb5bf11f7..00000000000
--- a/english/lts/security/2023/dla-3340.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3340-1 libgit2</define-tag>
-<define-tag report_date>2023-02-23</define-tag>
-<define-tag secrefs>CVE-2020-12278 CVE-2020-12279 CVE-2023-22742 Bug#1029368</define-tag>
-<define-tag packages>libgit2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3340.wml b/english/lts/security/2023/dla-3340.wml
deleted file mode 100644
index f7af8384525..00000000000
--- a/english/lts/security/2023/dla-3340.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability have been found in libgit2, a cross-platform, linkable
-library implementation of Git, which may result in remote code execution
-when cloning a repository on a NTFS-like filesystem or man-in-the-middle
-attacks due to improper verification of cryptographic Signature.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12278">CVE-2020-12278</a>
-
- <p>An issue was discovered in libgit2 before 0.28.4 and 0.9x before
- 0.99.0. path.c mishandles equivalent filenames that exist because of
- NTFS Alternate Data Streams. This may allow remote code execution when
- cloning a repository.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12279">CVE-2020-12279</a>
-
- <p>An issue was discovered in libgit2 before 0.28.4 and 0.9x before
- 0.99.0. checkout.c mishandles equivalent filenames that exist because
- of NTFS short names. This may allow remote code execution when cloning a
- repository</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-22742">CVE-2023-22742</a>
-
- <p>libgit2 is a cross-platform, linkable library implementation of Git.
- When using an SSH remote with the optional libssh2 backend, libgit2 does
- not perform certificate checking by default. Prior versions of libgit2
- require the caller to set the `certificate_check` field of libgit2's
- `git_remote_callbacks` structure - if a certificate check callback is
- not set, libgit2 does not perform any certificate checking. This means
- that by default - without configuring a certificate check callback,
- clients will not perform validation on the server SSH keys and may be
- subject to a man-in-the-middle attack.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.27.7+dfsg.1-0.2+deb10u1.</p>
-
-<p>We recommend that you upgrade your libgit2 packages.</p>
-
-<p>For the detailed security status of libgit2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libgit2">https://security-tracker.debian.org/tracker/libgit2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3340.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3341.data b/english/lts/security/2023/dla-3341.data
deleted file mode 100644
index 191ef4adaff..00000000000
--- a/english/lts/security/2023/dla-3341.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3341-1 curl</define-tag>
-<define-tag report_date>2023-02-24</define-tag>
-<define-tag secrefs>CVE-2023-23916 Bug#1031371</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3341.wml b/english/lts/security/2023/dla-3341.wml
deleted file mode 100644
index 19c57c833be..00000000000
--- a/english/lts/security/2023/dla-3341.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>HTTP multi-header compression denial of service has been fixed in curl,
-a command line tool and library for transferring data with URLs.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-7.64.0-4+deb10u5.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3341.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3342.data b/english/lts/security/2023/dla-3342.data
deleted file mode 100644
index 3705860a350..00000000000
--- a/english/lts/security/2023/dla-3342.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3342-1 freeradius</define-tag>
-<define-tag report_date>2023-2-24</define-tag>
-<define-tag secrefs>CVE-2022-41859 CVE-2022-41860 CVE-2022-41861</define-tag>
-<define-tag packages>freeradius</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3342.wml b/english/lts/security/2023/dla-3342.wml
deleted file mode 100644
index 4bfa6373bdb..00000000000
--- a/english/lts/security/2023/dla-3342.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several flaws were found in freeradius, a high-performance and highly
-configurable RADIUS server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41859">CVE-2022-41859</a>
-
- <p>In freeradius, the EAP-PWD function compute_password_element() leaks
- information about the password which allows an attacker to substantially
- reduce the size of an offline dictionary attack.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41860">CVE-2022-41860</a>
-
- <p>In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the
- server will try to look that option up in the internal dictionaries. This
- lookup will fail, but the SIM code will not check for that failure.
- Instead, it will dereference a NULL pointer, and cause the server to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41861">CVE-2022-41861</a>
-
- <p>A malicious RADIUS client or home server can send a malformed attribute
- which can cause the server to crash.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.0.17+dfsg-1.1+deb10u2.</p>
-
-<p>We recommend that you upgrade your freeradius packages.</p>
-
-<p>For the detailed security status of freeradius please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/freeradius">https://security-tracker.debian.org/tracker/freeradius</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3342.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3343.data b/english/lts/security/2023/dla-3343.data
deleted file mode 100644
index e925e7eff9b..00000000000
--- a/english/lts/security/2023/dla-3343.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3343-1 mono</define-tag>
-<define-tag report_date>2023-02-25</define-tag>
-<define-tag secrefs>CVE-2023-26314 Bug#972146</define-tag>
-<define-tag packages>mono</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3343.wml b/english/lts/security/2023/dla-3343.wml
deleted file mode 100644
index 708a4d3eebe..00000000000
--- a/english/lts/security/2023/dla-3343.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Triggering arbitrary code execution was possible due to .desktop files
-registered as application/x-ms-dos-executable MIME handlers in the open
-source .NET framework Mono.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.18.0.240+dfsg-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your mono packages.</p>
-
-<p>For the detailed security status of mono please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mono">https://security-tracker.debian.org/tracker/mono</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3343.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3344.data b/english/lts/security/2023/dla-3344.data
deleted file mode 100644
index dea5d22d318..00000000000
--- a/english/lts/security/2023/dla-3344.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3344-1 nodejs</define-tag>
-<define-tag report_date>2023-02-26</define-tag>
-<define-tag secrefs>CVE-2022-43548 CVE-2023-23920 Bug#1023518 Bug#1031834</define-tag>
-<define-tag packages>nodejs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3344.wml b/english/lts/security/2023/dla-3344.wml
deleted file mode 100644
index bc0225f6363..00000000000
--- a/english/lts/security/2023/dla-3344.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Vulnerabilities have been found in Node.js, which could result in DNS
-rebinding or arbitrary code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43548">CVE-2022-43548</a>
-
- <p>The Node.js rebinding protector for <code>--inspect</code> still allows invalid
- IP addresses, specifically in octal format, which browsers such as
- Firefox attempt to resolve via DNS. When combined with an active
- <code>--inspect</code> session, such as when using VSCode, an attacker can
- perform DNS rebinding and execute arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23920">CVE-2023-23920</a>
-
- <p>Ben Noordhuis reported that Node.js would search and potentially
- load ICU data when running with elevated privileges. Node.js now
- builds with <code>ICU_NO_USER_DATA_OVERRIDE</code> to avoid this.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-10.24.0~dfsg-1~deb10u3.</p>
-
-<p>We recommend that you upgrade your nodejs packages.</p>
-
-<p>For the detailed security status of nodejs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nodejs">https://security-tracker.debian.org/tracker/nodejs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3344.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3345.data b/english/lts/security/2023/dla-3345.data
deleted file mode 100644
index 45226d03e40..00000000000
--- a/english/lts/security/2023/dla-3345.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3345-1 php7.3</define-tag>
-<define-tag report_date>2023-02-26</define-tag>
-<define-tag secrefs>CVE-2022-31631 CVE-2023-0567 CVE-2023-0568 CVE-2023-0662 Bug#1031368</define-tag>
-<define-tag packages>php7.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3345.wml b/english/lts/security/2023/dla-3345.wml
deleted file mode 100644
index f02b0aa8bdf..00000000000
--- a/english/lts/security/2023/dla-3345.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were found in PHP, a widely-used open source
-general purpose scripting language, which could result in denial of
-service or incorrect validation of BCrypt hashes.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-31631">CVE-2022-31631</a>
-
- <p>Due to an uncaught integer overflow, <code>PDO::quote()</code> of
- <code>PDO_SQLite</code> may return an improperly quoted string.
- The exact details likely depend on the implementation of
- <code>sqlite3_snprintf()</code>, but with some versions it is possible to
- force the function to return a single apostrophe, if the function is
- called on user supplied input without any length restrictions in
- place.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0567">CVE-2023-0567</a>
-
- <p>Tim Düsterhus discovered that malformed BCrypt hashes that include a
- <code>&dollar;</code> character within their salt part trigger a buffer
- overread and may erroneously validate any password as valid.
- (<code>Password_verify()</code> always returns <code>true</code> with such
- inputs.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0568">CVE-2023-0568</a>
-
- <p>1-byte array overrun when appending slash to paths during path
- resolution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0662">CVE-2023-0662</a>
-
- <p>Jakob Ackermann discovered a Denial of Service vulnerability when
- parsing multipart request body: the request body parsing in PHP
- allows any unauthenticated attacker to consume a large amount of CPU
- time and trigger excessive logging.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.3.31-1~deb10u3.</p>
-
-<p>We recommend that you upgrade your php7.3 packages.</p>
-
-<p>For the detailed security status of php7.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.3">https://security-tracker.debian.org/tracker/php7.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3345.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3346.data b/english/lts/security/2023/dla-3346.data
deleted file mode 100644
index 3b358ca4e1b..00000000000
--- a/english/lts/security/2023/dla-3346.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3346-1 python-werkzeug</define-tag>
-<define-tag report_date>2023-02-27</define-tag>
-<define-tag secrefs>CVE-2023-23934 CVE-2023-25577 Bug#1031370</define-tag>
-<define-tag packages>python-werkzeug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3346.wml b/english/lts/security/2023/dla-3346.wml
deleted file mode 100644
index 9c0fa1cce53..00000000000
--- a/english/lts/security/2023/dla-3346.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in Werkzeug, a collection of
-utilities for WSGI (web) applications. An attacker may inject cookies
-in specific situations, and cause a denial of service (DoS).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23934">CVE-2023-23934</a>
-
- <p>Werkzeug will parse the cookie `=__Host-test=bad` as
- __Host-test=bad`. If a Werkzeug application is running next to a
- vulnerable or malicious subdomain which sets such a cookie using a
- vulnerable browser, the Werkzeug application will see the bad
- cookie value but the valid cookie key. Browsers may allow
- <q>nameless</q> cookies that look like `=value` instead of
- `key=value`. A vulnerable browser may allow a compromised
- application on an adjacent subdomain to exploit this to set a
- cookie like `=__Host-test=bad` for another subdomain.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-25577">CVE-2023-25577</a>
-
- <p>Werkzeug's multipart form data parser will parse an unlimited
- number of parts, including file parts. Parts can be a small amount
- of bytes, but each requires CPU time to parse and may use more
- memory as Python data. If a request can be made to an endpoint
- that accesses `request.data`, `request.form`, `request.files`, or
- `request.get_data(parse_form_data=False)`, it can cause
- unexpectedly high resource usage. This allows an attacker to cause
- a denial of service by sending crafted multipart data to an
- endpoint that will parse it.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.14.1+dfsg1-4+deb10u2.</p>
-
-<p>We recommend that you upgrade your python-werkzeug packages.</p>
-
-<p>For the detailed security status of python-werkzeug please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-werkzeug">https://security-tracker.debian.org/tracker/python-werkzeug</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3346.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3347-2.data b/english/lts/security/2023/dla-3347-2.data
deleted file mode 100644
index e5e6efa339b..00000000000
--- a/english/lts/security/2023/dla-3347-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3347-2 spip</define-tag>
-<define-tag report_date>2023-03-04</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3347-2.wml b/english/lts/security/2023/dla-3347-2.wml
deleted file mode 100644
index d0e6c829439..00000000000
--- a/english/lts/security/2023/dla-3347-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2023-27372">CVE-2023-27372</a> broke (de)activation
-of plugins with dependencies.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.2.4-1+deb10u11.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3347-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3347.data b/english/lts/security/2023/dla-3347.data
deleted file mode 100644
index f5a369aaa40..00000000000
--- a/english/lts/security/2023/dla-3347.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3347-1 spip</define-tag>
-<define-tag report_date>2023-02-27</define-tag>
-<define-tag secrefs>CVE-2023-24258 CVE-2023-27372</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3347.wml b/english/lts/security/2023/dla-3347.wml
deleted file mode 100644
index 626e63fcf47..00000000000
--- a/english/lts/security/2023/dla-3347.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that SPIP, a content management system, was vulnerable
-to SQL injection, remote code execution, and authorization bypass
-vulnerabilities.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.2.4-1+deb10u10.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3347.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3348.data b/english/lts/security/2023/dla-3348.data
deleted file mode 100644
index 02666d0e5a0..00000000000
--- a/english/lts/security/2023/dla-3348.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3348-1 syslog-ng</define-tag>
-<define-tag report_date>2023-03-01</define-tag>
-<define-tag secrefs>CVE-2022-38725</define-tag>
-<define-tag packages>syslog-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3348.wml b/english/lts/security/2023/dla-3348.wml
deleted file mode 100644
index bcaeb79fe0f..00000000000
--- a/english/lts/security/2023/dla-3348.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that syslog-ng, a system logging daemon, had integer
-overflow and buffer out-of-bounds issues, which could allow a remote
-attacker to cause Denial of Service via crafted syslog input.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.19.1-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your syslog-ng packages.</p>
-
-<p>For the detailed security status of syslog-ng please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/syslog-ng">https://security-tracker.debian.org/tracker/syslog-ng</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3348.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3349.data b/english/lts/security/2023/dla-3349.data
deleted file mode 100644
index 163a4ac0aa3..00000000000
--- a/english/lts/security/2023/dla-3349.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3349-1 linux-5.10</define-tag>
-<define-tag report_date>2023-3-2</define-tag>
-<define-tag secrefs>CVE-2022-2873 CVE-2022-3545 CVE-2022-3623 CVE-2022-4696 CVE-2022-36280 CVE-2022-41218 CVE-2022-45934 CVE-2022-47929 CVE-2023-0179 CVE-2023-0240 CVE-2023-0266 CVE-2023-0394 CVE-2023-23454 CVE-2023-23455 CVE-2023-23586 Bug#825141 Bug#1008501 Bug#1027430 Bug#1027483</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3349.wml b/english/lts/security/2023/dla-3349.wml
deleted file mode 100644
index 2a355542d19..00000000000
--- a/english/lts/security/2023/dla-3349.wml
+++ /dev/null
@@ -1,126 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2873">CVE-2022-2873</a>
-
- <p>Zheyu Ma discovered that an out-of-bounds memory access flaw in
- the Intel iSMT SMBus 2.0 host controller driver may result in
- denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3545">CVE-2022-3545</a>
-
- <p>It was discovered that the Netronome Flow Processor (NFP) driver
- contained a use-after-free flaw in area_cache_get(), which may
- result in denial of service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3623">CVE-2022-3623</a>
-
- <p>A race condition when looking up a CONT-PTE/PMD size hugetlb page
- may result in denial of service or an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4696">CVE-2022-4696</a>
-
- <p>A use-after-free vulnerability was discovered in the io_uring
- subsystem.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36280">CVE-2022-36280</a>
-
- <p>An out-of-bounds memory write vulnerability was discovered in the
- vmwgfx driver, which may allow a local unprivileged user to cause
- a denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41218">CVE-2022-41218</a>
-
- <p>Hyunwoo Kim reported a use-after-free flaw in the Media DVB core
- subsystem caused by refcount races, which may allow a local user
- to cause a denial of service or escalate privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-45934">CVE-2022-45934</a>
-
- <p>An integer overflow in l2cap_config_req() in the Bluetooth
- subsystem was discovered, which may allow a physically proximate
- attacker to cause a denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47929">CVE-2022-47929</a>
-
- <p>Frederick Lawler reported a NULL pointer dereference in the
- traffic control subsystem allowing an unprivileged user to cause a
- denial of service by setting up a specially crafted traffic
- control configuration.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0179">CVE-2023-0179</a>
-
- <p>Davide Ornaghi discovered incorrect arithmetics when fetching VLAN
- header bits in the netfilter subsystem, allowing a local user to
- leak stack and heap addresses or potentially local privilege
- escalation to root.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0240">CVE-2023-0240</a>
-
- <p>A flaw was discovered in the io_uring subsystem that could lead
- to a use-after-free. A local user could exploit this to cause
- a denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0266">CVE-2023-0266</a>
-
- <p>A use-after-free flaw in the sound subsystem due to missing
- locking may result in denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0394">CVE-2023-0394</a>
-
- <p>Kyle Zeng discovered a NULL pointer dereference flaw in
- rawv6_push_pending_frames() in the network subsystem allowing a
- local user to cause a denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23454">CVE-2023-23454</a>
-
- <p>Kyle Zeng reported that the Class Based Queueing (CBQ) network
- scheduler was prone to denial of service due to interpreting
- classification results before checking the classification return
- code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23455">CVE-2023-23455</a>
-
- <p>Kyle Zeng reported that the ATM Virtual Circuits (ATM) network
- scheduler was prone to a denial of service due to interpreting
- classification results before checking the classification return
- code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23586">CVE-2023-23586</a>
-
- <p>A flaw was discovered in the io_uring subsystem that could lead to
- an information leak. A local user could exploit this to obtain
- sensitive information from the kernel or other users.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.162-1~deb10u1.</p>
-
-<p>This update also fixes Debian bugs <a
-href="https://bugs.debian.org/825141">#825141</a>, <a
-href="https://bugs.debian.org/1008501">#1008501</a>, <a
-href="https://bugs.debian.org/1027430">#1027430</a>, and <a
-href="https://bugs.debian.org/1027483">#1027483</a>, and includes many
-more bug fixes from stable updates 5.10.159-5.10.162 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3349.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3350.data b/english/lts/security/2023/dla-3350.data
deleted file mode 100644
index 8fa9ed6efc6..00000000000
--- a/english/lts/security/2023/dla-3350.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3350-1 node-css-what</define-tag>
-<define-tag report_date>2023-03-03</define-tag>
-<define-tag secrefs>CVE-2022-21222 CVE-2021-33587 Bug##1032188</define-tag>
-<define-tag packages>node-css-what</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3350.wml b/english/lts/security/2023/dla-3350.wml
deleted file mode 100644
index 623043481b8..00000000000
--- a/english/lts/security/2023/dla-3350.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>node-css-what was vulnerable to Regular Expression Denial of Service
-(ReDoS) due to the usage of insecure regular expression in the
-re_attr variable.
-The exploitation of this vulnerability could be triggered
-via the parse function.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.1.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-css-what packages.</p>
-
-<p>For the detailed security status of node-css-what please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-css-what">https://security-tracker.debian.org/tracker/node-css-what</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3350.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3351.data b/english/lts/security/2023/dla-3351.data
deleted file mode 100644
index a3b42ba2e80..00000000000
--- a/english/lts/security/2023/dla-3351.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3351-1 apache2</define-tag>
-<define-tag report_date>2023-03-07</define-tag>
-<define-tag secrefs>CVE-2006-20001 CVE-2021-33193 CVE-2022-36760 CVE-2022-37436</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3351.wml b/english/lts/security/2023/dla-3351.wml
deleted file mode 100644
index 235d073a2f0..00000000000
--- a/english/lts/security/2023/dla-3351.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in Apache HTTP
-server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-20001">CVE-2006-20001</a>
-
-<p>A carefully crafted If: request header can cause a memory read, or write
-of a single zero byte, in a pool (heap) memory location beyond the header
-value sent. This could cause the process to crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33193">CVE-2021-33193</a>
-
-<p>A crafted method sent through HTTP/2 will bypass validation and be
-forwarded by mod_proxy, which can lead to request splitting or cache
-poisoning.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36760">CVE-2022-36760</a>
-
-<p>Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
-vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to
-smuggle requests to the AJP server it forwards requests to.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37436">CVE-2022-37436</a>
-
-<p>A malicious backend can cause the response headers to be truncated early,
-resulting in some headers being incorporated into the response body. If
-the later headers have any security purpose, they will not be interpreted
-by the client.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.4.38-3+deb10u9.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>For the detailed security status of apache2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3351.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3352.data b/english/lts/security/2023/dla-3352.data
deleted file mode 100644
index 97ffe7cddc0..00000000000
--- a/english/lts/security/2023/dla-3352.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3352-1 libde265</define-tag>
-<define-tag report_date>2023-03-05</define-tag>
-<define-tag secrefs>CVE-2022-47664 CVE-2022-47665 CVE-2023-24751 CVE-2023-24752 CVE-2023-24754 CVE-2023-24755 CVE-2023-24756 CVE-2023-24757 CVE-2023-24758 CVE-2023-25221</define-tag>
-<define-tag packages>libde265</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3352.wml b/english/lts/security/2023/dla-3352.wml
deleted file mode 100644
index a69d7c278c3..00000000000
--- a/english/lts/security/2023/dla-3352.wml
+++ /dev/null
@@ -1,89 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in libde265, an open source implementation of the
-h.265 video codec, which may result in denial of service, have unspecified
-other impact, possibly code execution due to a heap-based buffer overflow.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47664">CVE-2022-47664</a>
-
- <p> Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47665">CVE-2022-47665</a>
-
- <p> Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24751">CVE-2023-24751</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the mc_chroma function at motion.cc. This
- vulnerability allows attackers to cause a Denial of Service (DoS)
- via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24752">CVE-2023-24752</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24754">CVE-2023-24754</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24755">CVE-2023-24755</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the put_weighted_pred_8_fallback function at
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24756">CVE-2023-24756</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the ff_hevc_put_unweighted_pred_8_sse function at
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24757">CVE-2023-24757</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the put_unweighted_pred_16_fallback function at
- fallback-motion.cc. This vulnerability allows attackers to cause a
- Denial of Service (DoS) via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24758">CVE-2023-24758</a>
-
- <p>libde265 v1.0.10 was discovered to contain a NULL pointer
- dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at
- sse-motion.cc. This vulnerability allows attackers to cause a Denial
- of Service (DoS) via a crafted input file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-25221">CVE-2023-25221</a>
-
- <p>Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow
- vulnerability in the derive_spatial_luma_vector_prediction function
- in motion.cc.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.11-0+deb10u4.</p>
-
-<p>We recommend that you upgrade your libde265 packages.</p>
-
-<p>For the detailed security status of libde265 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libde265">https://security-tracker.debian.org/tracker/libde265</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3352.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3353.data b/english/lts/security/2023/dla-3353.data
deleted file mode 100644
index 353e292a454..00000000000
--- a/english/lts/security/2023/dla-3353.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3353-1 xfig</define-tag>
-<define-tag report_date>2023-03-05</define-tag>
-<define-tag secrefs>CVE-2021-40241 Bug#992395</define-tag>
-<define-tag packages>xfig</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3353.wml b/english/lts/security/2023/dla-3353.wml
deleted file mode 100644
index 3cb05be0683..00000000000
--- a/english/lts/security/2023/dla-3353.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue has been discovered in xfig, a diagramming tool for the
-interactive generation of figures under X11.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40241">CVE-2021-40241</a>:
-
- <p>A potential buffer overflow exists in the file src/w_help.c at line 55.
- Specifically, the length of the string returned by getenv("LANG") may become
- very long and cause a buffer overflow while executing the sprintf() function.
- This vulnerability could potentially allow an attacker to execute arbitrary
- code or cause a denial-of-service condition.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:3.2.7a-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your xfig packages.</p>
-
-<p>For the detailed security status of xfig please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xfig">https://security-tracker.debian.org/tracker/xfig</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3353.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3354.data b/english/lts/security/2023/dla-3354.data
deleted file mode 100644
index 7a0e0e9171f..00000000000
--- a/english/lts/security/2023/dla-3354.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3354-1 kopanocore</define-tag>
-<define-tag report_date>2023-03-06</define-tag>
-<define-tag secrefs>CVE-2019-19907 CVE-2022-26562 Bug#1016973</define-tag>
-<define-tag packages>kopanocore</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3354.wml b/english/lts/security/2023/dla-3354.wml
deleted file mode 100644
index 019c71e2b0e..00000000000
--- a/english/lts/security/2023/dla-3354.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several issues were found in Kopano Collaboration Platform, a groupware
-solution, which could cause denial of service or unauthorized access.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.7.0-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your kopanocore packages.</p>
-
-<p>For the detailed security status of kopanocore please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/kopanocore">https://security-tracker.debian.org/tracker/kopanocore</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3354.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3355.data b/english/lts/security/2023/dla-3355.data
deleted file mode 100644
index 108de2ad97d..00000000000
--- a/english/lts/security/2023/dla-3355.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3355-1 xapian-core</define-tag>
-<define-tag report_date>2023-03-18</define-tag>
-<define-tag secrefs>Bug#1032398</define-tag>
-<define-tag packages>xapian-core</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3355.wml b/english/lts/security/2023/dla-3355.wml
deleted file mode 100644
index df2195c81d4..00000000000
--- a/english/lts/security/2023/dla-3355.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two important bugs were discovered in xapian-core, a search engine
-library, that led to potential database corruption on disk full, and
-incorrectly reporting corruption for a database with replication
-changesets.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4.11-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your xapian-core packages.</p>
-
-<p>For the detailed security status of xapian-core please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xapian-core">https://security-tracker.debian.org/tracker/xapian-core</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3355.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3356.data b/english/lts/security/2023/dla-3356.data
deleted file mode 100644
index dab03ba10d2..00000000000
--- a/english/lts/security/2023/dla-3356.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3356-1 wireless-regdb</define-tag>
-<define-tag report_date>2023-03-09</define-tag>
-<define-tag secrefs>n/a</define-tag>
-<define-tag packages>wireless-regdb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3356.wml b/english/lts/security/2023/dla-3356.wml
deleted file mode 100644
index e9ed2ad0f40..00000000000
--- a/english/lts/security/2023/dla-3356.wml
+++ /dev/null
@@ -1,15 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update the wireless regulatory database to version 2022.04.08.
-In addition, it allows the Linux 5.10 kernel to verify and autoload it.</p>
-
-<p>We recommend that you upgrade your wireless-regdb package.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3356.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3357-2.data b/english/lts/security/2023/dla-3357-2.data
deleted file mode 100644
index 123a9969c53..00000000000
--- a/english/lts/security/2023/dla-3357-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3357-2 imagemagick</define-tag>
-<define-tag report_date>2023-03-18</define-tag>
-<define-tag secrefs>Bug##1032998</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3357-2.wml b/english/lts/security/2023/dla-3357-2.wml
deleted file mode 100644
index 27259783f05..00000000000
--- a/english/lts/security/2023/dla-3357-2.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The previous Imagemagick security update caused a regression in some
-perl packages due to overly restrictive hardening in a policy update
-(reading from /etc/ was forbidden). This hardening patch has been
-removed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-8:6.9.10.23+dfsg-2.1+deb10u4.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3357-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3357.data b/english/lts/security/2023/dla-3357.data
deleted file mode 100644
index 56127364cbf..00000000000
--- a/english/lts/security/2023/dla-3357.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3357-1 imagemagick</define-tag>
-<define-tag report_date>2023-03-11</define-tag>
-<define-tag secrefs>CVE-2020-19667 CVE-2020-25665 CVE-2020-25666 CVE-2020-25674 CVE-2020-25675 CVE-2020-25676 CVE-2020-27560 CVE-2020-27750 CVE-2020-27751 CVE-2020-27754 CVE-2020-27756 CVE-2020-27757 CVE-2020-27758 CVE-2020-27759 CVE-2020-27760 CVE-2020-27761 CVE-2020-27762 CVE-2020-27763 CVE-2020-27764 CVE-2020-27765 CVE-2020-27766 CVE-2020-27767 CVE-2020-27768 CVE-2020-27769 CVE-2020-27770 CVE-2020-27771 CVE-2020-27772 CVE-2020-27773 CVE-2020-27774 CVE-2020-27775 CVE-2020-27776 CVE-2020-29599 CVE-2021-3574 CVE-2021-3596 CVE-2021-20224 CVE-2022-44267 CVE-2022-44268 Bug#1027164 Bug#1030767</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3357.wml b/english/lts/security/2023/dla-3357.wml
deleted file mode 100644
index 8f37bccc0a7..00000000000
--- a/english/lts/security/2023/dla-3357.wml
+++ /dev/null
@@ -1,239 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in imagemagick that may lead
-to a privilege escalation, denial of service or information leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-19667">CVE-2020-19667</a>
-
- <p>A stack-based buffer overflow and unconditional jump was found in
- ReadXPMImage in coders/xpm.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25665">CVE-2020-25665</a>
-
- <p>An out-of-bounds read in the PALM image coder was found in
- WritePALMImage in coders/palm.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25666">CVE-2020-25666</a>
-
- <p>An integer overflow was possible during simple math
- calculations in HistogramCompare() in MagickCore/histogram.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25674">CVE-2020-25674</a>
-
- <p>A for loop with an improper exit condition was found that can
- allow an out-of-bounds READ via heap-buffer-overflow in
- WriteOnePNGImage from coders/png.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25675">CVE-2020-25675</a>
-
- <p>A undefined behavior was found in the form of integer overflow
- and out-of-range values as a result of rounding calculations
- performed on unconstrained pixel offsets in the CropImage()
- and CropImageToTiles() routines of MagickCore/transform.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25676">CVE-2020-25676</a>
-
- <p>A undefined behavior was found in the form of integer overflow
- and out-of-range values as a result of rounding calculations
- performed on unconstrained pixel offsets in CatromWeights(),
- MeshInterpolate(), InterpolatePixelChannel(),
- InterpolatePixelChannels(), and InterpolatePixelInfo(),
- which are all functions in /MagickCore/pixel.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27560">CVE-2020-27560</a>
-
- <p>A division by Zero was found in OptimizeLayerFrames in
- MagickCore/layer.c, which may cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27750">CVE-2020-27750</a>
-
- <p>A division by Zero was found in MagickCore/colorspace-private.h
- and MagickCore/quantum.h, which may cause a denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27751">CVE-2020-27751</a>
-
- <p>A undefined behavior was found in the form of values outside the
- range of type `unsigned long long` as well as a shift exponent
- that is too large for 64-bit type in MagickCore/quantum-export.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27754">CVE-2020-27754</a>
-
- <p>A integer overflow was found in IntensityCompare() of
- /magick/quantize.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27756">CVE-2020-27756</a>
-
- <p>A division by zero was found in ParseMetaGeometry() of
- MagickCore/geometry.c.
- Image height and width calculations can lead to
- divide-by-zero conditions which also lead to undefined behavior.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27757">CVE-2020-27757</a>
-
- <p>A undefined behavior was found in MagickCore/quantum-private.h
- A floating point math calculation in
- ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to
- undefined behavior in the form of a value outside the range of type
- unsigned long long.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27758">CVE-2020-27758</a>
-
- <p>Undefined behavior was found in the form of values outside the
- range of type `unsigned long long` in coders/txt.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27759">CVE-2020-27759</a>
-
- <p>In IntensityCompare() of /MagickCore/quantize.c, a
- double value was being casted to int and returned, which in some cases
- caused a value outside the range of type `int` to be returned.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27760">CVE-2020-27760</a>
-
- <p>In `GammaImage()` of /MagickCore/enhance.c, depending
- on the `gamma` value, it's possible to trigger a
- divide-by-zero condition when a crafted input file
- is processed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27761">CVE-2020-27761</a>
-
- <p>WritePALMImage() in /coders/palm.c used size_t casts
- in several areas of a calculation which could lead to values outside the
- range of representable type `unsigned long` undefined behavior when a
- crafted input file was processed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27762">CVE-2020-27762</a>
-
- <p>Undefined behavior was found in the form of values outside the
- range of type `unsigned char` in coders/hdr.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27763">CVE-2020-27763</a>
-
- <p>Undefined behavior was found in the form of math division by
- zero in MagickCore/resize.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27764">CVE-2020-27764</a>
-
- <p>Out-of-range values was found under some
- circumstances when a crafted input file is processed in
- /MagickCore/statistic.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27765">CVE-2020-27765</a>
-
- <p>Undefined behavior was found in the form of math division by
- zero in MagickCore/segment.c when a crafted file is processed</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27766">CVE-2020-27766</a>
-
- <p>A crafted file that is processed by ImageMagick could trigger
- undefined behavior in the form of values outside the range of
- type `unsigned long`</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27767">CVE-2020-27767</a>
-
- <p>Undefined behavior was found in the form of values outside the
- range of types `float` and `unsigned char` in MagickCore/quantum.h</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27768">CVE-2020-27768</a>
-
- <p>An outside the range of representable values of type
- `unsigned int` was found in MagickCore/quantum-private.h</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27769">CVE-2020-27769</a>
-
- <p>An outside the range of representable values of type
- `float` was found in MagickCore/quantize.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27770">CVE-2020-27770</a>
-
- <p>Due to a missing check for 0 value of
- `replace_extent`, it is possible for offset `p` to overflow in
- SubstituteString()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27771">CVE-2020-27771</a>
-
- <p>In RestoreMSCWarning() of /coders/pdf.c there are
- several areas where calls to GetPixelIndex() could result in values
- outside the range of representable for the `unsigned char` type</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27772">CVE-2020-27772</a>
-
- <p>Undefined behavior was found in the form of values outside the
- range of type `unsigned int` in coders/bmp.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27773">CVE-2020-27773</a>
-
- <p>Undefined behavior was found in the form of values outside the
- range of type `unsigned char` or division by zero</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27774">CVE-2020-27774</a>
-
- <p>A crafted file that is processed by ImageMagick could trigger
- undefined behavior in the form of a too large shift for
- 64-bit type `ssize_t`.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27775">CVE-2020-27775</a>
-
- <p>Undefined behavior was found in the form of values outside the
- range of type `unsigned char` in MagickCore/quantum.h</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27776">CVE-2020-27776</a>
-
- <p>A crafted file that is processed by ImageMagick could trigger
- undefined behavior in the form of values outside the range of
- type unsigned long.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29599">CVE-2020-29599</a>
-
- <p>ImageMagick mishandles the -authenticate option, which
- allows setting a password for password-protected PDF files. The
- user-controlled password was not properly escaped/sanitized and it was
- therefore possible to inject additional shell commands via
- coders/pdf.c. On debian system, by default the imagemagick policy
- mitigate this CVE.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3574">CVE-2021-3574</a>
-
- <p>A memory leak was found converting a crafted TIFF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3596">CVE-2021-3596</a>
-
- <p>A NULL pointer dereference was found in ReadSVGImage() in
- coders/svg.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20224">CVE-2021-20224</a>
-
- <p>An integer overflow issue was discovered in ImageMagick's
- ExportIndexQuantum() function in MagickCore/quantum-export.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44267">CVE-2022-44267</a>
-
- <p>A Denial of Service was found. When it parses a PNG image,
- the convert process could be left waiting for stdin input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44268">CVE-2022-44268</a>
-
- <p>An Information Disclosure was found. When it parses a PNG image,
- (e.g., for resize), the resulting image could have embedded
- the content of an arbitrary. file.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8:6.9.10.23+dfsg-2.1+deb10u2.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3357.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3358.data b/english/lts/security/2023/dla-3358.data
deleted file mode 100644
index e7b8e734eba..00000000000
--- a/english/lts/security/2023/dla-3358.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3358-1 mpv</define-tag>
-<define-tag report_date>2023-3-12</define-tag>
-<define-tag secrefs>CVE-2020-19824</define-tag>
-<define-tag packages>mpv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3358.wml b/english/lts/security/2023/dla-3358.wml
deleted file mode 100644
index 96db9654250..00000000000
--- a/english/lts/security/2023/dla-3358.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in mpv, a video player based on MPlayer/mplayer2.
-Due to a use after free an attacker coudl execute arbitrary code or crash
-the program via the ao_c parameter.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.29.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your mpv packages.</p>
-
-<p>For the detailed security status of mpv please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mpv">https://security-tracker.debian.org/tracker/mpv</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3358.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3359.data b/english/lts/security/2023/dla-3359.data
deleted file mode 100644
index d97f3804d32..00000000000
--- a/english/lts/security/2023/dla-3359.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3359-1 libapache2-mod-auth-mellon</define-tag>
-<define-tag report_date>2023-03-13</define-tag>
-<define-tag secrefs>CVE-2019-13038 CVE-2021-3639 Bug#931265 Bug#991730</define-tag>
-<define-tag packages>libapache2-mod-auth-mellon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3359.wml b/english/lts/security/2023/dla-3359.wml
deleted file mode 100644
index c811a531dd2..00000000000
--- a/english/lts/security/2023/dla-3359.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libapache2-mod-auth-mellon, a SAML 2.0 authentication module for Apache,
-were reported to have the following vulnerabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13038">CVE-2019-13038</a>
-
- <p>mod_auth_mellon had an Open Redirect via the login?ReturnTo= substring,
- as demonstrated by omitting the // after http: in the target URL.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3639">CVE-2021-3639</a>
-
- <p>mod_auth_mellon did not sanitize logout URLs properly. This issue could
- be used by an attacker to facilitate phishing attacks by tricking users
- into visiting a trusted web application URL that redirects to an external
- and potentially malicious server.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.14.2-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-mellon packages.</p>
-
-<p>For the detailed security status of libapache2-mod-auth-mellon please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapache2-mod-auth-mellon">https://security-tracker.debian.org/tracker/libapache2-mod-auth-mellon</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3359.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3360.data b/english/lts/security/2023/dla-3360.data
deleted file mode 100644
index e08af34197e..00000000000
--- a/english/lts/security/2023/dla-3360.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3360-1 ruby-sidekiq</define-tag>
-<define-tag report_date>2023-03-13</define-tag>
-<define-tag secrefs>CVE-2021-30151 CVE-2022-23837 Bug#987354 Bug#1004193</define-tag>
-<define-tag packages>ruby-sidekiq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3360.wml b/english/lts/security/2023/dla-3360.wml
deleted file mode 100644
index 5cba5171adb..00000000000
--- a/english/lts/security/2023/dla-3360.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>ruby-sidekiq, a simple, efficient background processing for Ruby,
-had a couple of vulnerabilities as follows:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30151">CVE-2021-30151</a>
-
- <p>Sidekiq allows XSS via the queue name of the live-poll feature
- when Internet Explorer is used.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23837">CVE-2022-23837</a>
-
- <p>In api.rb in Sidekiq, there is no limit on the number of days
- when requesting stats for the graph. This overloads the system,
- affecting the Web UI, and makes it unavailable to users.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.2.3+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-sidekiq packages.</p>
-
-<p>For the detailed security status of ruby-sidekiq please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-sidekiq">https://security-tracker.debian.org/tracker/ruby-sidekiq</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3360.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3361.data b/english/lts/security/2023/dla-3361.data
deleted file mode 100644
index a188b903fa4..00000000000
--- a/english/lts/security/2023/dla-3361.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3361-1 redis</define-tag>
-<define-tag report_date>2023-03-13</define-tag>
-<define-tag secrefs>CVE-2022-36021</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3361.wml b/english/lts/security/2023/dla-3361.wml
deleted file mode 100644
index cecb0b1c5c4..00000000000
--- a/english/lts/security/2023/dla-3361.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote denial of service
-vulnerability in Redis, a popular key-value database.</p>
-
-<p>Authenticated users could have used string matching commands (like
-<code>SCAN</code> or <code>KEYS</code>) with a specially crafted pattern to
-trigger a denial-of-service attack, causing it to hang and consume 100% CPU
-time.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36021">CVE-2022-36021</a>
-
- <p>Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5:5.0.14-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3361.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3362.data b/english/lts/security/2023/dla-3362.data
deleted file mode 100644
index 2d6899da3ff..00000000000
--- a/english/lts/security/2023/dla-3362.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3362-1 qemu</define-tag>
-<define-tag report_date>2023-03-14</define-tag>
-<define-tag secrefs>CVE-2020-14394 CVE-2020-29130 CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595 CVE-2022-0216 CVE-2022-1050 Bug#970937 Bug#979677 Bug#986795 Bug#989993 Bug#989994 Bug#989995 Bug#989996 Bug#1014589 Bug#1014590</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3362.wml b/english/lts/security/2023/dla-3362.wml
deleted file mode 100644
index c73d9373fe4..00000000000
--- a/english/lts/security/2023/dla-3362.wml
+++ /dev/null
@@ -1,105 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in QEMU, a fast processor
-emulator, which could result in denial of service, information leak,
-or potentially the execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-14394">CVE-2020-14394</a>
-
- <p>An infinite loop flaw was found in the USB xHCI controller
- emulation of QEMU while computing the length of the Transfer
- Request Block (TRB) Ring. This flaw allows a privileged guest user
- to hang the QEMU process on the host, resulting in a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-17380">CVE-2020-17380</a>/<a href="https://security-tracker.debian.org/tracker/CVE-2021-3409">CVE-2021-3409</a>
-
- <p>A heap-based buffer overflow was found in QEMU in the SDHCI device
- emulation support. It could occur while doing a multi block SDMA
- transfer via the sdhci_sdma_transfer_multi_blocks() routine in
- hw/sd/sdhci.c. A guest user or process could use this flaw to
- crash the QEMU process on the host, resulting in a denial of
- service condition, or potentially execute arbitrary code with
- privileges of the QEMU process on the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29130">CVE-2020-29130</a>
-
- <p>slirp.c has a buffer over-read because it tries to read a certain
- amount of header data even if that exceeds the total packet
- length.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3592">CVE-2021-3592</a>
-
- <p>An invalid pointer initialization issue was found in the SLiRP
- networking implementation of QEMU. The flaw exists in the
- bootp_input() function and could occur while processing a udp
- packet that is smaller than the size of the <q>bootp_t</q> structure. A
- malicious guest could use this flaw to leak 10 bytes of
- uninitialized heap memory from the host.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3593">CVE-2021-3593</a>
-
- <p>An invalid pointer initialization issue was found in the SLiRP
- networking implementation of QEMU. The flaw exists in the
- udp6_input() function and could occur while processing a udp
- packet that is smaller than the size of the <q>udphdr</q>
- structure. This issue may lead to out-of-bounds read access or
- indirect host memory disclosure to the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3594">CVE-2021-3594</a>
-
- <p>An invalid pointer initialization issue was found
- in the SLiRP networking implementation of QEMU. The flaw exists in
- the udp_input() function and could occur while processing a udp
- packet that is smaller than the size of the <q>udphdr</q>
- structure. This issue may lead to out-of-bounds read access or
- indirect host memory disclosure to the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3595">CVE-2021-3595</a>
-
- <p>An invalid pointer initialization issue was found in the SLiRP
- networking implementation of QEMU. The flaw exists in the
- tftp_input() function and could occur while processing a udp
- packet that is smaller than the size of the <q>tftp_t</q>
- structure. This issue may lead to out-of-bounds read access or
- indirect host memory disclosure to the guest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0216">CVE-2022-0216</a>
-
- <p>A use-after-free vulnerability was found in the LSI53C895A SCSI
- Host Bus Adapter emulation of QEMU. The flaw occurs while
- processing repeated messages to cancel the current SCSI request
- via the lsi_do_msgout function. This flaw allows a malicious
- privileged user within the guest to crash the QEMU process on the
- host, resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1050">CVE-2022-1050</a>
-
- <p>A flaw was found in the QEMU implementation of VMWare's
- paravirtual RDMA device. This flaw allows a crafted guest driver
- to execute HW commands when shared buffers are not yet allocated,
- potentially leading to a use-after-free condition.
- Note: PVRDMA is disabled in buster, but this was fixed
- preventively in case this changes in the future.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.1+dfsg-8+deb10u10.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3362.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3363.data b/english/lts/security/2023/dla-3363.data
deleted file mode 100644
index 970dcec9fa7..00000000000
--- a/english/lts/security/2023/dla-3363.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3363-1 pcre2</define-tag>
-<define-tag report_date>2023-03-16</define-tag>
-<define-tag secrefs>CVE-2019-20454 CVE-2022-1586 CVE-2022-1587 Bug#1011954</define-tag>
-<define-tag packages>pcre2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3363.wml b/english/lts/security/2023/dla-3363.wml
deleted file mode 100644
index 4a4e40f956d..00000000000
--- a/english/lts/security/2023/dla-3363.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple out-of-bounds read vulnerabilities were found in pcre2, a Perl
-Compatible Regular Expression library, which could result in information
-disclosure or denial or service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20454">CVE-2019-20454</a>
-
- <p>Out-of-bounds read when the pattern <code>&bsol;X</code> is JIT
- compiled and used to match specially crafted subjects in non-UTF
- mode.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1586">CVE-2022-1586</a>
-
- <p>Out-of-bounds read involving unicode property matching in
- JIT-compiled regular expressions. The issue occurs because the
- character was not fully read in case-less matching within JIT.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1587">CVE-2022-1587</a>
-
- <p>Out-of-bounds read affecting recursions in JIT-compiled regular
- expressions caused by duplicate data transfers.</p>
-
-<p>This upload also fixes a subject buffer overread in JIT when UTF is
-disabled and <code>&bsol;X</code> or <code>&bsol;R</code> has a greater
-than 1 fixed quantifier. This issue was found by Yunho Kim.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-10.32-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your pcre2 packages.</p>
-
-<p>For the detailed security status of pcre2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pcre2">https://security-tracker.debian.org/tracker/pcre2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3363.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3364.data b/english/lts/security/2023/dla-3364.data
deleted file mode 100644
index ddc65dae7d1..00000000000
--- a/english/lts/security/2023/dla-3364.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3364-1 firefox-esr</define-tag>
-<define-tag report_date>2023-03-17</define-tag>
-<define-tag secrefs>CVE-2023-25751 CVE-2023-25752 CVE-2023-28162 CVE-2023-28164 CVE-2023-28176</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3364.wml b/english/lts/security/2023/dla-3364.wml
deleted file mode 100644
index f414539c608..00000000000
--- a/english/lts/security/2023/dla-3364.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.9.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3364.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3365.data b/english/lts/security/2023/dla-3365.data
deleted file mode 100644
index 7e6ed1ff3e7..00000000000
--- a/english/lts/security/2023/dla-3365.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3365-1 thunderbird</define-tag>
-<define-tag report_date>2023-03-20</define-tag>
-<define-tag secrefs>CVE-2023-25751 CVE-2023-25752 CVE-2023-28162 CVE-2023-28164 CVE-2023-28176</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3365.wml b/english/lts/security/2023/dla-3365.wml
deleted file mode 100644
index ac961127c19..00000000000
--- a/english/lts/security/2023/dla-3365.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service, the execution of arbitrary code or
-spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.9.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3365.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3366.data b/english/lts/security/2023/dla-3366.data
deleted file mode 100644
index 1057046fd66..00000000000
--- a/english/lts/security/2023/dla-3366.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3366-1 tzdata</define-tag>
-<define-tag report_date>2023-03-24</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3366.wml b/english/lts/security/2023/dla-3366.wml
deleted file mode 100644
index 4b0f69d0c2b..00000000000
--- a/english/lts/security/2023/dla-3366.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2023b. Notable
-changes are:</p>
-
-<p>- Egypt uses DST again, starting on April.
-- Palestine and Lebanon delay the start of DST this year.
-- Morocco DST will happen a week earlier on April 23.
-- Adjustments to Greenland's timezones and DST rules.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2021a-0+deb10u10.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3366.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3367.data b/english/lts/security/2023/dla-3367.data
deleted file mode 100644
index 07e4fa66dfb..00000000000
--- a/english/lts/security/2023/dla-3367.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3367-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2023-03-24</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3367.wml b/english/lts/security/2023/dla-3367.wml
deleted file mode 100644
index 77bc4142633..00000000000
--- a/english/lts/security/2023/dla-3367.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2023b for the
-Perl bindings. For the list of changes, see DLA-3366-1.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:2.23-1+2023b.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3367.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3368.data b/english/lts/security/2023/dla-3368.data
deleted file mode 100644
index de5be0abafd..00000000000
--- a/english/lts/security/2023/dla-3368.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3368-1 libreoffice</define-tag>
-<define-tag report_date>2023-03-26</define-tag>
-<define-tag secrefs>CVE-2021-25636 CVE-2022-3140 CVE-2022-26305 CVE-2022-26306 CVE-2022-26307</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3368.wml b/english/lts/security/2023/dla-3368.wml
deleted file mode 100644
index b8a982c4f7f..00000000000
--- a/english/lts/security/2023/dla-3368.wml
+++ /dev/null
@@ -1,88 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in LibreOffice an
-office productivity software suite, leading to arbitrary script
-execution, improper certificate validation, and weak encryption
-of password storage in the user’s configuration database.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-25636">CVE-2021-25636</a>
-
- <p>Only use X509Data
- LibreOffice supports digital signatures of ODF documents and macros
- within documents, presenting visual aids that no alteration of the
- document occurred since the last signing and that the signature is
- valid. An Improper Certificate Validation vulnerability in LibreOffice
- allowed an attacker to create a digitally signed ODF document, by
- manipulating the documentsignatures.xml or macrosignatures.xml stream
- within the document to contain both <q>X509Data</q> and <q>KeyValue</q> children
- of the <q>KeyInfo</q> tag, which when opened caused LibreOffice to verify
- using the <q>KeyValue</q> but to report verification with the unrelated
- <q>X509Data</q> value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3140">CVE-2022-3140</a>
-
- <p>Insufficient validation of <q>vnd.libreoffice.command</q>
- URI schemes. LibreOffice supports Office URI Schemes to enable browser
- integration of LibreOffice with MS SharePoint server. An additional
- scheme <q>vnd.libreoffice.command</q> specific to LibreOffice was added. In
- the affected versions of LibreOffice links using that scheme could be
- constructed to call internal macros with arbitrary arguments. Which
- when clicked on, or activated by document events, could result in
- arbitrary script execution without warning.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26305">CVE-2022-26305</a>
-
- <p>Compare authors using Thumbprint
- An Improper Certificate Validation vulnerability in LibreOffice
- existed where determining if a macro was signed by a trusted author
- was done by only matching the serial number and issuer string of the
- used certificate with that of a trusted certificate. This is not
- sufficient to verify that the macro was actually signed with the
- certificate. An adversary could therefore create an arbitrary
- certificate with a serial number and an issuer string identical to a
- trusted certificate which LibreOffice would present as belonging to
- the trusted author, potentially leading to the user to execute
- arbitrary code contained in macros improperly trusted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26306">CVE-2022-26306</a>
-
- <p>LibreOffice supports the storage of passwords for
- web connections in the user’s configuration database. The stored
- passwords are encrypted with a single master key provided by the
- user. A flaw in LibreOffice existed where the required initialization
- vector for encryption was always the same which weakens the security
- of the encryption making them vulnerable if an attacker has access to
- the user's configuration data</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-26307">CVE-2022-26307</a>
-
- <p>Add Initialization Vectors to password storage.
- LibreOffice supports the storage of passwords for web connections in
- the user’s configuration database. The stored passwords are encrypted
- with a single master key provided by the user. A flaw in LibreOffice
- existed where master key was poorly encoded resulting in weakening its
- entropy from 128 to 43 bits making the stored passwords vulerable to a
- brute force attack if an attacker has access to the users stored
- config.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:6.1.5-3+deb10u8.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>For the detailed security status of libreoffice please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libreoffice">https://security-tracker.debian.org/tracker/libreoffice</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3368.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3369.data b/english/lts/security/2023/dla-3369.data
deleted file mode 100644
index 44e2346464e..00000000000
--- a/english/lts/security/2023/dla-3369.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3369-1 runc</define-tag>
-<define-tag report_date>2023-03-27</define-tag>
-<define-tag secrefs>CVE-2019-16884 CVE-2019-19921 CVE-2021-30465 CVE-2022-29162 CVE-2023-27561 Bug#942026 Bug#988768</define-tag>
-<define-tag packages>runc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3369.wml b/english/lts/security/2023/dla-3369.wml
deleted file mode 100644
index 8f4dea77554..00000000000
--- a/english/lts/security/2023/dla-3369.wml
+++ /dev/null
@@ -1,66 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in runc, the Open Container
-Project runtime, which is often used with virtualization environments
-such as Docker. Malicious Docker images or OCI bundles could breach
-isolation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16884">CVE-2019-16884</a>
-
- <p>runc, as used in Docker and other products, allows AppArmor and
- SELinux restriction bypass because libcontainer/rootfs_linux.go
- incorrectly checks mount targets, and thus a malicious Docker
- image can mount over a /proc directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19921">CVE-2019-19921</a>
-
- <p>runc has Incorrect Access Control leading to Escalation of
- Privileges, related to libcontainer/rootfs_linux.go. To exploit
- this, an attacker must be able to spawn two containers with custom
- volume-mount configurations, and be able to run custom
- images. (This vulnerability does not affect Docker due to an
- implementation detail that happens to block the attack.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-30465">CVE-2021-30465</a>
-
- <p>runc allows a Container Filesystem Breakout via Directory
- Traversal. To exploit the vulnerability, an attacker must be able
- to create multiple containers with a fairly specific mount
- configuration. The problem occurs via a symlink-exchange attack
- that relies on a race condition.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29162">CVE-2022-29162</a>
-
- <p>`runc exec --cap` created processes with non-empty inheritable
- Linux process capabilities, creating an atypical Linux environment
- and enabling programs with inheritable file capabilities to
- elevate those capabilities to the permitted set during
- execve(2). This bug did not affect the container security sandbox
- as the inheritable set never contained more capabilities than were
- included in the container's bounding set.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27561">CVE-2023-27561</a>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2019-19921">CVE-2019-19921</a> was re-introduced by the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2021-30465">CVE-2021-30465</a>.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.0~rc6+dfsg1-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your runc packages.</p>
-
-<p>For the detailed security status of runc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/runc">https://security-tracker.debian.org/tracker/runc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3369.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3370.data b/english/lts/security/2023/dla-3370.data
deleted file mode 100644
index 7645dd3774b..00000000000
--- a/english/lts/security/2023/dla-3370.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3370-1 xrdp</define-tag>
-<define-tag report_date>2023-03-30</define-tag>
-<define-tag secrefs>CVE-2022-23468 CVE-2022-23478 CVE-2022-23479 CVE-2022-23483 CVE-2022-23484 CVE-2022-23493</define-tag>
-<define-tag packages>xrdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3370.wml b/english/lts/security/2023/dla-3370.wml
deleted file mode 100644
index fb06f74a7f8..00000000000
--- a/english/lts/security/2023/dla-3370.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several out of bounds memory access and buffer overflows were fixed in xrdp,
-an open source project which provides a graphical login to remote machines
-using Microsoft Remote Desktop Protocol (RDP)</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23468">CVE-2022-23468</a>
-
- <p>xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function.
- There are no known workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23478">CVE-2022-23478</a>
-
- <p>xrdp < v0.9.21 contain a Out of Bound Write in
- xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known
- workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23479">CVE-2022-23479</a>
-
- <p>xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function.
- There are no known workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23483">CVE-2022-23483</a>
-
- <p>xrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function.
- There are no known workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23484">CVE-2022-23484</a>
-
- <p>xrdp < v0.9.21 contain a Integer Overflow in xrdp_mm_process_rail_update_window_text()
- function. There are no known workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23493">CVE-2022-23493</a>
-
- <p>xrdp < v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close()
- function. There are no known workarounds for this issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.9.9-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your xrdp packages.</p>
-
-<p>For the detailed security status of xrdp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xrdp">https://security-tracker.debian.org/tracker/xrdp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3370.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3371.data b/english/lts/security/2023/dla-3371.data
deleted file mode 100644
index 72d0a33f6d2..00000000000
--- a/english/lts/security/2023/dla-3371.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3371-1 unbound</define-tag>
-<define-tag report_date>2023-3-29</define-tag>
-<define-tag secrefs>CVE-2020-28935 CVE-2022-3204 CVE-2022-30698 CVE-2022-30699 Bug#1016493 Bug#977165</define-tag>
-<define-tag packages>unbound</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3371.wml b/english/lts/security/2023/dla-3371.wml
deleted file mode 100644
index 0036c9e3b3e..00000000000
--- a/english/lts/security/2023/dla-3371.wml
+++ /dev/null
@@ -1,69 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in unbound, a validating,
-recursive, caching DNS resolver.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3204">CVE-2022-3204</a>
-
- <p>A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation
- Attack) has been discovered in various DNS resolving software. The
- NRDelegation Attack works by having a malicious delegation with a
- considerable number of non responsive nameservers. The attack starts by
- querying a resolver for a record that relies on those unresponsive
- nameservers. The attack can cause a resolver to spend a lot of
- time/resources resolving records under a malicious delegation point where a
- considerable number of unresponsive NS records reside. It can trigger high
- CPU usage in some resolver implementations that continually look in the
- cache for resolved NS records in that delegation. This can lead to degraded
- performance and eventually denial of service in orchestrated attacks.
- Unbound does not suffer from high CPU usage, but resources are still needed
- for resolving the malicious delegation. Unbound will keep trying to resolve
- the record until hard limits are reached. Based on the nature of the attack
- and the replies, different limits could be reached. From now on Unbound
- introduces fixes for better performance when under load, by cutting
- opportunistic queries for nameserver discovery and DNSKEY prefetching and
- limiting the number of times a delegation point can issue a cache lookup
- for missing records.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30698">CVE-2022-30698</a>
-
-<p>and <a href="https://security-tracker.debian.org/tracker/CVE-2022-30699">CVE-2022-30699</a></p>
-
- <p>Unbound is vulnerable to a novel type of the <q>ghost domain names</q> attack.
- The vulnerability works by targeting an Unbound instance.
- Unbound is queried for a rogue domain name when the cached delegation
- information is about to expire. The rogue nameserver delays the response so
- that the cached delegation information is expired. Upon receiving the
- delayed answer containing the delegation information, Unbound overwrites
- the now expired entries. This action can be repeated when the delegation
- information is about to expire making the rogue delegation information
- ever-updating. From now on Unbound stores the start time for a query and
- uses that to decide if the cached delegation information can be
- overwritten.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28935">CVE-2020-28935</a>
-
- <p>Unbound contains a local vulnerability that would allow for a local symlink
- attack.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.9.0-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your unbound packages.</p>
-
-<p>For the detailed security status of unbound please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/unbound">https://security-tracker.debian.org/tracker/unbound</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3371.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3372.data b/english/lts/security/2023/dla-3372.data
deleted file mode 100644
index 4bf8d8335e4..00000000000
--- a/english/lts/security/2023/dla-3372.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3372-1 xorg-server</define-tag>
-<define-tag report_date>2023-3-29</define-tag>
-<define-tag secrefs>CVE-2023-1393</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3372.wml b/english/lts/security/2023/dla-3372.wml
deleted file mode 100644
index d1a1ed00539..00000000000
--- a/english/lts/security/2023/dla-3372.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn discovered that a use-after-free flaw in the Composite
-extension of the X.org X server may result in privilege escalation if
-the X server is running under the root user.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:1.20.4-1+deb10u9.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3372.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3373.data b/english/lts/security/2023/dla-3373.data
deleted file mode 100644
index 48dc83e8b53..00000000000
--- a/english/lts/security/2023/dla-3373.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3373-1 json-smart</define-tag>
-<define-tag report_date>2023-03-30</define-tag>
-<define-tag secrefs>CVE-2021-31684 CVE-2023-1370 Bug#1033474</define-tag>
-<define-tag packages>json-smart</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3373.wml b/english/lts/security/2023/dla-3373.wml
deleted file mode 100644
index 80ed523952f..00000000000
--- a/english/lts/security/2023/dla-3373.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in Json-smart library.
-Json-smart is a performance focused, JSON processor lib written in Java.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31684">CVE-2021-31684</a>
-
- <p>A vulnerability was discovered in the indexOf function of
- JSONParserByteArray in JSON Smart versions 1.3 and 2.4
- which causes a denial of service (DOS)
- via for instance a crafted web request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1370">CVE-2023-1370</a>
-
- <p>A stack overflow was found due to excessive recursion.
- When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code
- parses an array or an object respectively. It was discovered that the
- code does not have any limit to the nesting of such arrays or
- objects. Since the parsing of nested arrays and objects is done
- recursively, nesting too many of them can cause a stack exhaustion
- (stack overflow) and crash the software</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your json-smart packages.</p>
-
-<p>For the detailed security status of json-smart please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/json-smart">https://security-tracker.debian.org/tracker/json-smart</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3373.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3374.data b/english/lts/security/2023/dla-3374.data
deleted file mode 100644
index 0d9ab305266..00000000000
--- a/english/lts/security/2023/dla-3374.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3374-1 libmicrohttpd</define-tag>
-<define-tag report_date>2023-3-30</define-tag>
-<define-tag secrefs>CVE-2023-27371</define-tag>
-<define-tag packages>libmicrohttpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3374.wml b/english/lts/security/2023/dla-3374.wml
deleted file mode 100644
index c4376a60741..00000000000
--- a/english/lts/security/2023/dla-3374.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in linmicrohttpd, a library embedding HTTP server
-functionality. Parsing crafted POST requests result in an out of bounds
-read, which might cause a DoS (Denial of Service).</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.9.62-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libmicrohttpd packages.</p>
-
-<p>For the detailed security status of libmicrohttpd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libmicrohttpd">https://security-tracker.debian.org/tracker/libmicrohttpd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3374.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3375.data b/english/lts/security/2023/dla-3375.data
deleted file mode 100644
index 10e10c3e433..00000000000
--- a/english/lts/security/2023/dla-3375.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3375-1 xrdp</define-tag>
-<define-tag report_date>2023-03-31</define-tag>
-<define-tag secrefs>CVE-2022-23480 CVE-2022-23481 CVE-2022-23482</define-tag>
-<define-tag packages>xrdp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3375.wml b/english/lts/security/2023/dla-3375.wml
deleted file mode 100644
index 0e51b667fbc..00000000000
--- a/english/lts/security/2023/dla-3375.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were a number of vulnerabilies in the xrdp
-Remote Desktop Protocol (RDP) server:</p>
-
-<ul>
-
-<li>
-<a href="https://security-tracker.debian.org/tracker/CVE-2022-23480">CVE-2022-23480</a>:
-Prevent a series of potential buffer overflow vulnerabilities in the
-devredir_proc_client_devlist_announce_req() function.</li>
-
-<li>
-<a href="https://security-tracker.debian.org/tracker/CVE-2022-23481">CVE-2022-23481</a>:
-Fix an out-of-bounds read vulnerability in the
-xrdp_caps_process_confirm_active() function.</li>
-
-<li>
-<a href="https://security-tracker.debian.org/tracker/CVE-2022-23480">CVE-2022-23480</a>:
-Fix an out-of-bounds read vulnerability in the
-xrdp_sec_process_mcs_data_CS_CORE() function.</li>
-</ul>
-<p>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-0.9.9-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your xrdp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3375.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3376.data b/english/lts/security/2023/dla-3376.data
deleted file mode 100644
index f357b943dcf..00000000000
--- a/english/lts/security/2023/dla-3376.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3376-1 svgpp</define-tag>
-<define-tag report_date>2023-04-02</define-tag>
-<define-tag secrefs>CVE-2019-6245 CVE-2019-6247 CVE-2021-44960</define-tag>
-<define-tag packages>svgpp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3376.wml b/english/lts/security/2023/dla-3376.wml
deleted file mode 100644
index b3c79516f8b..00000000000
--- a/english/lts/security/2023/dla-3376.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in svgpp: a C++ library for parsing and
-rendering Scalable Vector Graphics (SVG) files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44960">CVE-2021-44960</a>
-
- <p>The XMLDocument::getRoot function in the renderDocument function handled the
- XMLDocument object improperly. Specifically, it returned a null pointer
- prematurely at the second if statement, resulting in a null pointer
- reference behind the renderDocument function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6245">CVE-2019-6245</a>
-
-<p>and <a href="https://security-tracker.debian.org/tracker/CVE-2019-6247">CVE-2019-6247</a>:
- issues were discovered in Anti-Grain Geometry (AGG) within the function
- agg::cell_aa::not_equal. Since svgpp is a header-only library, the issue is
- only transitive in theory. As a result, only a dependency version hardening
- has been added to the control file.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.2.3+dfsg1-6+deb10u1.</p>
-
-<p>We recommend that you upgrade your svgpp packages.</p>
-
-<p>For the detailed security status of svgpp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/svgpp">https://security-tracker.debian.org/tracker/svgpp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3376.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3377.data b/english/lts/security/2023/dla-3377.data
deleted file mode 100644
index 73b4b5fb413..00000000000
--- a/english/lts/security/2023/dla-3377.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3377-1 systemd</define-tag>
-<define-tag report_date>2023-03-31</define-tag>
-<define-tag secrefs>CVE-2023-26604</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3377.wml b/english/lts/security/2023/dla-3377.wml
deleted file mode 100644
index b5664b7273f..00000000000
--- a/english/lts/security/2023/dla-3377.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Local privilege escalation for some sudo configurations has been fixed
-in systemd, the default init system in Debian.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-241-7~deb10u9.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>For the detailed security status of systemd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/systemd">https://security-tracker.debian.org/tracker/systemd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3377.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3378.data b/english/lts/security/2023/dla-3378.data
deleted file mode 100644
index 0129a1bbfd4..00000000000
--- a/english/lts/security/2023/dla-3378.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3378-1 duktape</define-tag>
-<define-tag report_date>2023-3-31</define-tag>
-<define-tag secrefs>CVE-2021-46322</define-tag>
-<define-tag packages>duktape</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3378.wml b/english/lts/security/2023/dla-3378.wml
deleted file mode 100644
index 42254758db1..00000000000
--- a/english/lts/security/2023/dla-3378.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in duktape, an embeddable Javascript engine.
-It was discovered that a special crafted js file could result in a SEGV
-due to reaching some stack limits.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.3.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your duktape packages.</p>
-
-<p>For the detailed security status of duktape please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/duktape">https://security-tracker.debian.org/tracker/duktape</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3378.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3379.data b/english/lts/security/2023/dla-3379.data
deleted file mode 100644
index 8c6e99a1e57..00000000000
--- a/english/lts/security/2023/dla-3379.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3379-1 intel-microcode</define-tag>
-<define-tag report_date>2023-04-01</define-tag>
-<define-tag secrefs>CVE-2022-21216 CVE-2022-21233 CVE-2022-33196 CVE-2022-33972 CVE-2022-38090 Bug#1031334</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3379.wml b/english/lts/security/2023/dla-3379.wml
deleted file mode 100644
index 5407761ffc6..00000000000
--- a/english/lts/security/2023/dla-3379.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple potential security vulnerabilities in some Intel® Processors
-have been found which may allow information disclosure or may allow
-escalation of privilege. Intel is releasing firmware updates to mitigate
-this potential vulnerabilities.</p>
-
-<p>Please pay attention that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2022-33196">CVE-2022-33196</a> might require a
-firmware update.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21216">CVE-2022-21216</a>
-
-<p>(INTEL-SA-00700)
- Insufficient granularity of access control in out-of-band
- management in some Intel(R) Atom and Intel Xeon Scalable Processors
- may allow a privileged user to potentially enable escalation of
- privilege via adjacent network access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-33196">CVE-2022-33196</a>
-
-<p>(INTEL-SA-00738)
- Incorrect default permissions in some memory controller
- configurations for some Intel(R) Xeon(R) Processors when using
- Intel(R) Software Guard Extensions which may allow a privileged user
- to potentially enable escalation of privilege via local access.</p>
-
- <p>This fix may require a firmware update to be effective on some
- processors.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-33972">CVE-2022-33972</a>
-
-<p>(INTEL-SA-00730)
- Incorrect calculation in microcode keying mechanism for some 3rd
- Generation Intel(R) Xeon(R) Scalable Processors may allow a
- privileged user to potentially enable information disclosure via
- local acces</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-38090">CVE-2022-38090</a>
-
-<p>(INTEL-SA-00767)
- Improper isolation of shared resources in some Intel(R) Processors
- when using Intel(R) Software Guard Extensions may allow a privileged
- user to potentially enable information disclosure via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21233">CVE-2022-21233</a>
-
-<p>(INTEL-SA-00657)
- Improper isolation of shared resources in some Intel(R) Processors
- may allow a privileged user to potentially enable information
- disclosure via local access.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.20230214.1~deb10u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>For the detailed security status of intel-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3379.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3380.data b/english/lts/security/2023/dla-3380.data
deleted file mode 100644
index 3d417929f73..00000000000
--- a/english/lts/security/2023/dla-3380.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3380-1 firmware-nonfree</define-tag>
-<define-tag report_date>2023-04-01</define-tag>
-<define-tag secrefs>CVE-2020-12362 CVE-2020-12363 CVE-2020-12364 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2021-23168 CVE-2021-23223 CVE-2021-37409 CVE-2021-44545 CVE-2022-21181 Bug#844056 Bug#877667 Bug#903437 Bug#919452 Bug#919632 Bug#927286 Bug#927917 Bug#928510 Bug#928631 Bug#928672 Bug#931930 Bug#935969 Bug#947356 Bug#956224 Bug#962972 Bug#963025 Bug#963558 Bug#964028 Bug#966025 Bug#968272 Bug#969000 Bug#971791 Bug#975726 Bug#977042 Bug#980101 Bug#982579 Bug#982757 Bug#983255 Bug#983561 Bug#984489 Bug#984852 Bug#984874 Bug#985740 Bug#985743 Bug#991500 Bug#992551 Bug#999825 Bug#1006500 Bug#1006638 Bug#1009316 Bug#1009618 Bug#1014651 Bug#1015728 Bug#1016058 Bug#1019847 Bug#1020962</define-tag>
-<define-tag packages>firmware-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3380.wml b/english/lts/security/2023/dla-3380.wml
deleted file mode 100644
index 899cc1bdcdd..00000000000
--- a/english/lts/security/2023/dla-3380.wml
+++ /dev/null
@@ -1,134 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The firmware-nonfree package has been updated to include addtional firmware
-that may be requested by some drivers in Linux 5.10, availble for Debian LTS as
-backported kernel.</p>
-
-<p>Some of the updated firmware files adresses security vulnerabilities, which may
-allow Escalation of Privileges, Denial of Services and Information Disclosures.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24586">CVE-2020-24586</a>
-
-<p>(INTEL-SA-00473)</p>
-
- <p>The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
- WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require
- that received fragments be cleared from memory after (re)connecting
- to a network. Under the right circumstances, when another device
- sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can
- be abused to inject arbitrary network packets and/or exfiltrate user
- data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24587">CVE-2020-24587</a>
-
- <p>(INTEL-SA-00473)</p>
-
- <p>The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
- WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require
- that all fragments of a frame are encrypted under the same key. An
- adversary can abuse this to decrypt selected fragments when another
- device sends fragmented frames and the WEP, CCMP, or GCMP encryption
- key is periodically renewed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24588">CVE-2020-24588</a>
-
- <p>(INTEL-SA-00473)</p>
-
- <p>The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
- WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require
- that the A-MSDU flag in the plaintext QoS header field is
- authenticated. Against devices that support receiving non-SSP A-MSDU
- frames (which is mandatory as part of 802.11n), an adversary can
- abuse this to inject arbitrary network packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23168">CVE-2021-23168</a>
-
- <p>(INTEL-SA-00621)</p>
-
- <p>Out of bounds read for some Intel(R) PROSet/Wireless WiFi and
- Killer(TM) WiFi products may allow an unauthenticated user to
- potentially enable denial of service via adjacent access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23223">CVE-2021-23223</a>
-
-<p>(INTEL-SA-00621)</p>
-
- <p>Improper initialization for some Intel(R) PROSet/Wireless WiFi and
- Killer(TM) WiFi products may allow a privileged user to potentially
- enable escalation of privilege via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-37409">CVE-2021-37409</a>
-
-<p>(INTEL-SA-00621)</p>
-
- <p>Improper access control for some Intel(R) PROSet/Wireless WiFi and
- Killer(TM) WiFi products may allow a privileged user to potentially
- enable escalation of privilege via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44545">CVE-2021-44545</a>
-
-<p>(INTEL-SA-00621)</p>
-
- <p>Improper input validation for some Intel(R) PROSet/Wireless WiFi and
- Killer(TM) WiFi products may allow an unauthenticated user to
- potentially enable denial of service via adjacent access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21181">CVE-2022-21181</a>
-
-<p>(INTEL-SA-00621)</p>
-
- <p>Improper input validation for some Intel(R) PROSet/Wireless WiFi and
- Killer(TM) WiFi products may allow a privileged user to potentially
- enable escalation of privilege via local access.</p>
-
-<p>The following advisories are also fixed by this upload, but needs an
-updated Linux kernel to load the updated firmware:</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12362">CVE-2020-12362</a>
-
-<p>(INTEL-SA-00438)</p>
-
- <p>Integer overflow in the firmware for some Intel(R) Graphics Drivers
- for Windows * before version 26.20.100.7212 and before Linux kernel
- version 5.5 may allow a privileged user to potentially enable an
- escalation of privilege via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12363">CVE-2020-12363</a>
-
-<p>(INTEL-SA-00438)</p>
-
- <p>Improper input validation in some Intel(R) Graphics Drivers for
- Windows* before version 26.20.100.7212 and before Linux kernel
- version 5.5 may allow a privileged user to potentially enable a
- denial of service via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12364">CVE-2020-12364</a>
-
-<p>(INTEL-SA-00438)</p>
-
- <p>Null pointer reference in some Intel(R) Graphics Drivers for
- Windows* before version 26.20.100.7212 and before version Linux
- kernel version 5.5 may allow a privileged user to potentially enable
- a denial of service via local access.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-20190114+really20220913-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your firmware-nonfree packages.</p>
-
-<p>For the detailed security status of firmware-nonfree please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firmware-nonfree">https://security-tracker.debian.org/tracker/firmware-nonfree</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3380.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3381.data b/english/lts/security/2023/dla-3381.data
deleted file mode 100644
index 89b46ea3557..00000000000
--- a/english/lts/security/2023/dla-3381.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3381-1 ghostscript</define-tag>
-<define-tag report_date>2023-04-04</define-tag>
-<define-tag secrefs>CVE-2023-28879</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3381.wml b/english/lts/security/2023/dla-3381.wml
deleted file mode 100644
index e2de2aae0f6..00000000000
--- a/english/lts/security/2023/dla-3381.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential buffer-overflow
-vulnerability in ghostscript, a popular interpreter for the
-PostScript language used, for example, to generate PDF files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28879">CVE-2023-28879</a>
-
- <p>In Artifex Ghostscript through 10.01.0, there is a buffer overflow
- leading to potential corruption of data internal to the PostScript
- interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode,
- and TBCPDecode. If the write buffer is filled to one byte less than full,
- and one then tries to write an escaped character, two bytes are
- written.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-9.27~dfsg-2+deb10u7.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3381.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3382.data b/english/lts/security/2023/dla-3382.data
deleted file mode 100644
index 281e05a447d..00000000000
--- a/english/lts/security/2023/dla-3382.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3382-1 openimageio</define-tag>
-<define-tag report_date>2023-4-05</define-tag>
-<define-tag secrefs>CVE-2022-36354 CVE-2022-41639 CVE-2022-41838 CVE-2022-41977 CVE-2022-41981 CVE-2022-41988 CVE-2022-41999 CVE-2022-43592 CVE-2022-43593 CVE-2022-43594 CVE-2022-43595 CVE-2022-43596 CVE-2022-43597 CVE-2022-43598 CVE-2022-43599 CVE-2022-43600 CVE-2022-43601 CVE-2022-43602 CVE-2022-43603 Bug#1027143 Bug#1027808</define-tag>
-<define-tag packages>openimageio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3382.wml b/english/lts/security/2023/dla-3382.wml
deleted file mode 100644
index f51dd28b564..00000000000
--- a/english/lts/security/2023/dla-3382.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in OpenImageIO, a
-library for reading and writing images. Buffer overflows and out-of-bounds
-read and write programming errors may lead to a denial of service
-(application crash) or the execution of arbitrary code if a malformed image
-file is processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.5~dfsg0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your openimageio packages.</p>
-
-<p>For the detailed security status of openimageio please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/openimageio">https://security-tracker.debian.org/tracker/openimageio</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3382.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3383.data b/english/lts/security/2023/dla-3383.data
deleted file mode 100644
index 8ecca0b830d..00000000000
--- a/english/lts/security/2023/dla-3383.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3383-1 grunt</define-tag>
-<define-tag report_date>2023-04-05</define-tag>
-<define-tag secrefs>CVE-2022-1537</define-tag>
-<define-tag packages>grunt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3383.wml b/english/lts/security/2023/dla-3383.wml
deleted file mode 100644
index 3d8d0e4b2eb..00000000000
--- a/english/lts/security/2023/dla-3383.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential local privilege escalation in
-GruntJS, a multipurpose task runner and build system tool.</p>
-
-<p><code>file.copy</code> operations in GruntJS were vulnerable to a TOCTOU
-("time-of-check vs. time-of-use") race condition that could have led to
-arbitrary file writes in GitHub repositories. This could have then led to local
-privilege escalation if a lower-privileged user had write access to both source
-and destination directories, as the lower-privileged user could have created a
-symlink to the GruntJS user's <code>~/.bashrc</code> configuration file
-(etc).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1537">CVE-2022-1537</a>
-
- <p>file.copy operations in GruntJS are vulnerable to a TOCTOU race
- condition leading to arbitrary file write in GitHub repository
- gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary
- file writes which can lead to local privilege escalation to the GruntJS
- user if a lower-privileged user has write access to both source and
- destination directories as the lower-privileged user can create a symlink
- to the GruntJS user's .bashrc file or replace /etc/shadow file if the
- GruntJS user is root.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.0.1-8+deb10u2.</p>
-
-<p>We recommend that you upgrade your grunt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3383.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3384.data b/english/lts/security/2023/dla-3384.data
deleted file mode 100644
index 65b55d0e99f..00000000000
--- a/english/lts/security/2023/dla-3384.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3384-1 tomcat9</define-tag>
-<define-tag report_date>2023-4-05</define-tag>
-<define-tag secrefs>CVE-2022-42252 CVE-2023-28708 Bug#1033475</define-tag>
-<define-tag packages>tomcat9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3384.wml b/english/lts/security/2023/dla-3384.wml
deleted file mode 100644
index 9dc67954d91..00000000000
--- a/english/lts/security/2023/dla-3384.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42252">CVE-2022-42252</a>
-
- <p>Apache Tomcat was configured to ignore invalid HTTP headers via setting
- rejectIllegalHeader to false. Tomcat did not reject a request containing an
- invalid Content-Length header making a request smuggling attack possible if
- Tomcat was located behind a reverse proxy that also failed to reject the
- request with the invalid header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28708">CVE-2023-28708</a>
-
- <p>When using the RemoteIpFilter with requests received from a reverse proxy
- via HTTP that include the X-Forwarded-Proto header set to https, session
- cookies created by Apache Tomcat did not include the secure attribute. This
- could result in the user agent transmitting the session cookie over an
- insecure channel.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.0.31-1~deb10u8.</p>
-
-<p>We recommend that you upgrade your tomcat9 packages.</p>
-
-<p>For the detailed security status of tomcat9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat9">https://security-tracker.debian.org/tracker/tomcat9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3384.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3385.data b/english/lts/security/2023/dla-3385.data
deleted file mode 100644
index a0f27902ce3..00000000000
--- a/english/lts/security/2023/dla-3385.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3385-1 trafficserver</define-tag>
-<define-tag report_date>2023-4-06</define-tag>
-<define-tag secrefs>CVE-2022-31778 CVE-2022-31779 CVE-2022-32749 CVE-2022-37392</define-tag>
-<define-tag packages>trafficserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3385.wml b/english/lts/security/2023/dla-3385.wml
deleted file mode 100644
index 0a8bb7ef968..00000000000
--- a/english/lts/security/2023/dla-3385.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Apache Traffic Server, a reverse
-and forward proxy server, which could result in HTTP request smuggling, cache
-poisoning or information disclosure.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.1.6+ds-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your trafficserver packages.</p>
-
-<p>For the detailed security status of trafficserver please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/trafficserver">https://security-tracker.debian.org/tracker/trafficserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3385.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3386.data b/english/lts/security/2023/dla-3386.data
deleted file mode 100644
index af24cd5bd52..00000000000
--- a/english/lts/security/2023/dla-3386.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3386-1 grunt</define-tag>
-<define-tag report_date>2023-04-06</define-tag>
-<define-tag secrefs>CVE-2022-0436</define-tag>
-<define-tag packages>grunt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3386.wml b/english/lts/security/2023/dla-3386.wml
deleted file mode 100644
index 2c6f576d322..00000000000
--- a/english/lts/security/2023/dla-3386.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential path-traversal
-vulnerability in GruntJS, a multipurpose task runner and build
-system tool. This could have been exploited via malicious symlinks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0436">CVE-2022-0436</a>
-
- <p>Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.0.1-8+deb10u3.</p>
-
-<p>We recommend that you upgrade your grunt packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3386.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3387-2.data b/english/lts/security/2023/dla-3387-2.data
deleted file mode 100644
index cedd4a83f45..00000000000
--- a/english/lts/security/2023/dla-3387-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3387-2 udisks2</define-tag>
-<define-tag report_date>2023-04-10</define-tag>
-<define-tag secrefs>Bug#1034124</define-tag>
-<define-tag packages>udisks2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3387-2.wml b/english/lts/security/2023/dla-3387-2.wml
deleted file mode 100644
index 30445667614..00000000000
--- a/english/lts/security/2023/dla-3387-2.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was reported that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2021-3802">CVE-2021-3802</a> broken mounting
-allow-listed mount option/value pairs, for example errors=remount-ro.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.8.1-4+deb10u2.</p>
-
-<p>We recommend that you upgrade your udisks2 packages.</p>
-
-<p>For the detailed security status of udisks2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/udisks2">https://security-tracker.debian.org/tracker/udisks2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3387-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3387.data b/english/lts/security/2023/dla-3387.data
deleted file mode 100644
index c5ebab91d45..00000000000
--- a/english/lts/security/2023/dla-3387.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3387-1 udisks2</define-tag>
-<define-tag report_date>2023-04-07</define-tag>
-<define-tag secrefs>CVE-2021-3802</define-tag>
-<define-tag packages>udisks2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3387.wml b/english/lts/security/2023/dla-3387.wml
deleted file mode 100644
index d6ed0af85cf..00000000000
--- a/english/lts/security/2023/dla-3387.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Stefan Walter found that udisks2, a service to access and manipulate storage
-devices, could cause denial of service via system crash if a corrupted or
-specially crafted ext2/3/4 device or image was mounted, which could happen
-automatically on certain environments.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.8.1-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your udisks2 packages.</p>
-
-<p>For the detailed security status of udisks2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/udisks2">https://security-tracker.debian.org/tracker/udisks2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3387.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3388.data b/english/lts/security/2023/dla-3388.data
deleted file mode 100644
index 6743bc0b325..00000000000
--- a/english/lts/security/2023/dla-3388.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3388-1 keepalived</define-tag>
-<define-tag report_date>2023-4-10</define-tag>
-<define-tag secrefs>CVE-2021-44225</define-tag>
-<define-tag packages>keepalived</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3388.wml b/english/lts/security/2023/dla-3388.wml
deleted file mode 100644
index 3a70fa8b2b6..00000000000
--- a/english/lts/security/2023/dla-3388.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in keepalived, a failover and monitoring daemon for LVS
-clusters, where an improper authentication vulnerability allows an
-unprivileged&nbsp;user to change properties that could lead to an access-control
-bypass.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:2.0.10-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your keepalived packages.</p>
-
-<p>For the detailed security status of keepalived please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/keepalived">https://security-tracker.debian.org/tracker/keepalived</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3388.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3389.data b/english/lts/security/2023/dla-3389.data
deleted file mode 100644
index e5cc974b84d..00000000000
--- a/english/lts/security/2023/dla-3389.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3389-1 lldpd</define-tag>
-<define-tag report_date>2023-04-10</define-tag>
-<define-tag secrefs>CVE-2020-27827 CVE-2021-43612</define-tag>
-<define-tag packages>lldpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3389.wml b/english/lts/security/2023/dla-3389.wml
deleted file mode 100644
index 6e630be3d86..00000000000
--- a/english/lts/security/2023/dla-3389.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there were two potential denial of service (DoS)
-attacks in lldpd, a implementation of the IEEE 802.1ab (LLDP) protocol used to
-administer and monitor networking devices.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27827">CVE-2020-27827</a>
-
- <p>A flaw was found in multiple versions of OpenvSwitch. Specially crafted
- LLDP packets can cause memory to be lost when allocating data to handle
- specific optional TLVs, potentially causing a denial of service. The
- highest threat from this vulnerability is to system availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-43612">CVE-2021-43612</a>
-
- <p>crash in SONMP decoder</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-1.0.3-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your lldpd packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3389.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3390.data b/english/lts/security/2023/dla-3390.data
deleted file mode 100644
index 0e3eba07a4c..00000000000
--- a/english/lts/security/2023/dla-3390.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3390-1 zabbix</define-tag>
-<define-tag report_date>2023-04-12</define-tag>
-<define-tag secrefs>CVE-2019-15132 CVE-2020-15803 CVE-2021-27927 CVE-2022-24349 CVE-2022-24917 CVE-2022-24919 CVE-2022-35229 CVE-2022-35230 Bug#935027 Bug#966146 Bug#1014992 Bug#1014994</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3390.wml b/english/lts/security/2023/dla-3390.wml
deleted file mode 100644
index 54d7f6a0b0a..00000000000
--- a/english/lts/security/2023/dla-3390.wml
+++ /dev/null
@@ -1,98 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in zabbix,
-a network monitoring solution, potentially allowing User Enumeration,
-Cross-Site-Scripting or Cross-Site Request Forgery.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-15132">CVE-2019-15132</a>
-
-<p>Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is
-possible to enumerate application usernames based on the variability of server
-responses (e.g., the <q>Login name or password is incorrect</q> and <q>No permissions
-for system access</q> messages, or just blocking for a number of seconds). This
-affects both api_jsonrpc.php and index.php.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15803">CVE-2020-15803</a>
-
-<p>Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x
-before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL
-Widget.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-27927">CVE-2021-27927</a>
-
-<p>In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1,
-5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the
-CControllerAuthenticationUpdate controller lacks a CSRF protection
-mechanism. The code inside this controller calls diableSIDValidation
-inside the init() method. An attacker doesn't have to know Zabbix user
-login credentials, but has to know the correct Zabbix URL and contact
-information of an existing user with sufficient privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24349">CVE-2022-24349</a>
-
-<p>An authenticated user can create a link with reflected XSS payload for
-actions’ pages, and send it to other users. Malicious code has access to
-all the same objects as the rest of the web page and can make arbitrary
-modifications to the contents of the page being displayed to a victim.
-This attack can be implemented with the help of social engineering and
-expiration of a number of factors - an attacker should have authorized
-access to the Zabbix Frontend and allowed network connection between a
-malicious server and victim’s computer, understand attacked
-infrastructure, be recognized by the victim as a trustee and use trusted
-communication channel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24917">CVE-2022-24917</a>
-
-<p>An authenticated user can create a link with reflected Javascript code
-inside it for services’ page and send it to other users. The payload can
-be executed only with a known CSRF token value of the victim, which is
-changed periodically and is difficult to predict. Malicious code has
-access to all the same objects as the rest of the web page and can make
-arbitrary modifications to the contents of the page being displayed to a
-victim during social engineering attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24919">CVE-2022-24919</a>
-
-<p>An authenticated user can create a link with reflected Javascript code
-inside it for graphs’ page and send it to other users. The payload can
-be executed only with a known CSRF token value of the victim, which is
-changed periodically and is difficult to predict. Malicious code has
-access to all the same objects as the rest of the web page and can make
-arbitrary modifications to the contents of the page being displayed to a
-victim during social engineering attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-35229">CVE-2022-35229</a>
-
-<p>An authenticated user can create a link with reflected Javascript code
-inside it for the discovery page and send it to other users. The payload
-can be executed only with a known CSRF token value of the victim, which
-is changed periodically and is difficult to predict.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-35230">CVE-2022-35230</a>
-
-<p>An authenticated user can create a link with reflected Javascript code
-inside it for the graphs page and send it to other users. The payload
-can be executed only with a known CSRF token value of the victim, which
-is changed periodically and is difficult to predict.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:4.0.4+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3390.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3391.data b/english/lts/security/2023/dla-3391.data
deleted file mode 100644
index cf6534a6f35..00000000000
--- a/english/lts/security/2023/dla-3391.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3391-1 firefox-esr</define-tag>
-<define-tag report_date>2023-04-12</define-tag>
-<define-tag secrefs>CVE-2023-1945 CVE-2023-29533 CVE-2023-29535 CVE-2023-29536 CVE-2023-29539 CVE-2023-29541 CVE-2023-29548 CVE-2023-29550 Bug#982794</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3391.wml b/english/lts/security/2023/dla-3391.wml
deleted file mode 100644
index c5b0bf06f31..00000000000
--- a/english/lts/security/2023/dla-3391.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.10.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3391.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3392.data b/english/lts/security/2023/dla-3392.data
deleted file mode 100644
index ecaa17ee006..00000000000
--- a/english/lts/security/2023/dla-3392.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3392-1 ruby-rack</define-tag>
-<define-tag report_date>2023-04-17</define-tag>
-<define-tag secrefs>CVE-2023-27530 CVE-2023-27539</define-tag>
-<define-tag packages>ruby-rack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3392.wml b/english/lts/security/2023/dla-3392.wml
deleted file mode 100644
index be5f539dc7c..00000000000
--- a/english/lts/security/2023/dla-3392.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two ruby-rack issues have been addressed:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27530">CVE-2023-27530</a>
-
- <p>Description: Limit all multipart parts, not just files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27539">CVE-2023-27539</a>
-
- <p>Description: Split headers on commas, then strip the strings in
- order to avoid ReDoS issues.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.6-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your ruby-rack packages.</p>
-
-<p>For the detailed security status of ruby-rack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rack">https://security-tracker.debian.org/tracker/ruby-rack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3392.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3393.data b/english/lts/security/2023/dla-3393.data
deleted file mode 100644
index 24f1b32635b..00000000000
--- a/english/lts/security/2023/dla-3393.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3393-1 protobuf</define-tag>
-<define-tag report_date>2023-04-18</define-tag>
-<define-tag secrefs>CVE-2021-22569 CVE-2021-22570 CVE-2022-1941</define-tag>
-<define-tag packages>protobuf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3393.wml b/english/lts/security/2023/dla-3393.wml
deleted file mode 100644
index e5f52a82cad..00000000000
--- a/english/lts/security/2023/dla-3393.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes a NULL pointer derference and two denial of service
-conditions in in protobuf.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22569">CVE-2021-22569</a>
-
- <p>An issue in protobuf-java allowed the interleaving of
- <code>com.google.protobuf.UnknownFieldSet</code> fields in such a way that would be
- processed out of order. A small malicious payload can occupy the parser for
- several minutes by creating large numbers of short-lived objects that cause
- frequent, repeated pauses.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-22570">CVE-2021-22570</a>
-
- <p>Nullptr dereference when a null char is present in a proto symbol. The
- symbol is parsed incorrectly, leading to an unchecked call into the proto
- file's name during generation of the resulting error message. Since the
- symbol is incorrectly parsed, the file is nullptr.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-1941">CVE-2022-1941</a>
-
- <p>A parsing vulnerability for the <code>MessageSet</code> type in the ProtocolBuffers can
- lead to out of memory failures. A specially crafted message with multiple
- key-value per elements creates parsing issues, and can lead to a Denial of
- Service against services receiving unsanitized input.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.6.1.3-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your protobuf packages.</p>
-
-<p>For the detailed security status of protobuf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/protobuf">https://security-tracker.debian.org/tracker/protobuf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3393.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3394.data b/english/lts/security/2023/dla-3394.data
deleted file mode 100644
index e2070601522..00000000000
--- a/english/lts/security/2023/dla-3394.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3394-1 asterisk</define-tag>
-<define-tag report_date>2023-4-19</define-tag>
-<define-tag secrefs>CVE-2023-27585</define-tag>
-<define-tag packages>asterisk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3394.wml b/english/lts/security/2023/dla-3394.wml
deleted file mode 100644
index 797a8af8f08..00000000000
--- a/english/lts/security/2023/dla-3394.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in Asterisk, an Open Source Private Branch Exchange. A
-buffer overflow vulnerability affects users that use PJSIP DNS resolver.
-This vulnerability is related to <a href="https://security-tracker.debian.org/tracker/CVE-2022-24793">CVE-2022-24793</a>. The difference is that
-this issue is in parsing the query record `parse_query()`, while the issue
-in <a href="https://security-tracker.debian.org/tracker/CVE-2022-24793">CVE-2022-24793</a> is in `parse_rr()`. A workaround is to disable DNS
-resolution in PJSIP config (by setting `nameserver_count` to zero) or use
-an external resolver implementation instead.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:16.28.0~dfsg-0+deb10u3.</p>
-
-<p>We recommend that you upgrade your asterisk packages.</p>
-
-<p>For the detailed security status of asterisk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/asterisk">https://security-tracker.debian.org/tracker/asterisk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3394.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3395-2.data b/english/lts/security/2023/dla-3395-2.data
deleted file mode 100644
index 3cd7ba1266b..00000000000
--- a/english/lts/security/2023/dla-3395-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3395-2 golang-1.11</define-tag>
-<define-tag report_date>2023-04-20</define-tag>
-<define-tag packages>golang-1.11</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3395-2.wml b/english/lts/security/2023/dla-3395-2.wml
deleted file mode 100644
index a341b39a02a..00000000000
--- a/english/lts/security/2023/dla-3395-2.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-<p>The previous golang-1.11 update released as DLA-3395-1 failed to build
-reliably on the armhf architecture, due to intermittent ("flaky") test
-cases in the test suite, which is run on package build as part of
-Debian quality assurance. This update disables a few such tests and
-has otherwise no impact on the published golang-1.11 package.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.11.6-1+deb10u7.</p>
-
-<p>We recommend that you upgrade your golang-1.11 packages.</p>
-
-<p>For the detailed security status of golang-1.11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.11">https://security-tracker.debian.org/tracker/golang-1.11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3395-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3395.data b/english/lts/security/2023/dla-3395.data
deleted file mode 100644
index f92e52c0aed..00000000000
--- a/english/lts/security/2023/dla-3395.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3395-1 golang-1.11</define-tag>
-<define-tag report_date>2023-04-19</define-tag>
-<define-tag secrefs>CVE-2020-28367 CVE-2021-33196 CVE-2021-36221 CVE-2021-38297 CVE-2021-39293 CVE-2021-41771 CVE-2021-44716 CVE-2021-44717 CVE-2022-23806 CVE-2022-24921 Bug#989492 Bug#991961</define-tag>
-<define-tag packages>golang-1.11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3395.wml b/english/lts/security/2023/dla-3395.wml
deleted file mode 100644
index 8f7d2ccf4ab..00000000000
--- a/english/lts/security/2023/dla-3395.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in the Go programming
-language. An attacker could trigger a denial-of-service (DoS), invalid
-cryptographic computation, information leak, or arbitrary code
-execution on the developer's computer in specific situations.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28367">CVE-2020-28367</a>
-
- <p>Code injection in the go command with cgo allows arbitrary code
- execution at build time via malicious gcc flags specified via a
- #cgo directive.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33196">CVE-2021-33196</a>
-
- <p>In archive/zip, a crafted file count (in an archive's header) can
- cause a NewReader or OpenReader panic.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36221">CVE-2021-36221</a>
-
- <p>Go has a race condition that can lead to a net/http/httputil
- ReverseProxy panic upon an ErrAbortHandler abort.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38297">CVE-2021-38297</a>
-
- <p>Go has a Buffer Overflow via large arguments in a function
- invocation from a WASM module, when GOARCH=wasm GOOS=js is used.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39293">CVE-2021-39293</a>
-
- <p>This issue exists because of an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2021-33196">CVE-2021-33196</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41771">CVE-2021-41771</a>
-
- <p>ImportedSymbols in debug/macho (for Open or OpenFat) Accesses a
- Memory Location After the End of a Buffer, aka an out-of-bounds
- slice situation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44716">CVE-2021-44716</a>
-
- <p>net/http allows uncontrolled memory consumption in the header
- canonicalization cache via HTTP/2 requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44717">CVE-2021-44717</a>
-
- <p>Go on UNIX allows write operations to an unintended file or
- unintended network connection as a consequence of erroneous
- closing of file descriptor 0 after file-descriptor exhaustion.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23806">CVE-2022-23806</a>
-
- <p>Curve.IsOnCurve in crypto/elliptic can incorrectly return true in
- situations with a big.Int value that is not a valid field element.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24921">CVE-2022-24921</a>
-
- <p>regexp.Compile allows stack exhaustion via a deeply nested
- expression.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.11.6-1+deb10u6.</p>
-
-<p>We recommend that you upgrade your golang-1.11 packages.</p>
-
-<p>For the detailed security status of golang-1.11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-1.11">https://security-tracker.debian.org/tracker/golang-1.11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3395.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3396.data b/english/lts/security/2023/dla-3396.data
deleted file mode 100644
index 196f01d29da..00000000000
--- a/english/lts/security/2023/dla-3396.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3396-1 redis</define-tag>
-<define-tag report_date>2023-04-21</define-tag>
-<define-tag secrefs>CVE-2023-28856</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3396.wml b/english/lts/security/2023/dla-3396.wml
deleted file mode 100644
index e3023602e0b..00000000000
--- a/english/lts/security/2023/dla-3396.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential remote denial of service
-vulnerability in Redis, a popular 'NoSQL' key-value database.</p>
-
-<p>Authenticated users could have used the <code>HINCRBYFLOAT</code> command to
-create an invalid hash field that would have crashed the Redis server on
-access.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28856">CVE-2023-28856</a>
-
- <p>Redis is an open source, in-memory database that persists on disk.
- Authenticated users can use the `HINCRBYFLOAT` command to create an invalid
- hash field that will crash Redis on access in affected versions. This issue
- has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are
- advised to upgrade. There are no known workarounds for this issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5:5.0.14-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3396.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3397.data b/english/lts/security/2023/dla-3397.data
deleted file mode 100644
index bd42869635b..00000000000
--- a/english/lts/security/2023/dla-3397.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3397-1 connman</define-tag>
-<define-tag report_date>2023-04-21</define-tag>
-<define-tag secrefs>CVE-2023-28488</define-tag>
-<define-tag packages>connman</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3397.wml b/english/lts/security/2023/dla-3397.wml
deleted file mode 100644
index be750fa1b71..00000000000
--- a/english/lts/security/2023/dla-3397.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial of service vulnerabilty
-in connman, a command-line network manager designed for use on embedded
-devices.</p>
-
-<p>Network-adjacent attackers operating a crafted DHCP server could have caused
-a stack-based buffer overflow, resulting in a denial of service through
-terminating the connman process.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28488">CVE-2023-28488</a>
-
- <p>client.c in gdhcp in ConnMan through 1.41 could be used by
- network-adjacent attackers (operating a crafted DHCP server) to cause a
- stack-based buffer overflow and denial of service, terminating the connman
- process.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.36-2.1~deb10u4.</p>
-
-<p>We recommend that you upgrade your connman packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3397.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3398.data b/english/lts/security/2023/dla-3398.data
deleted file mode 100644
index 358f9e52d6a..00000000000
--- a/english/lts/security/2023/dla-3398.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3398-1 curl</define-tag>
-<define-tag report_date>2023-4-21</define-tag>
-<define-tag secrefs>CVE-2023-27533 CVE-2023-27535 CVE-2023-27536 CVE-2023-27538</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3398.wml b/english/lts/security/2023/dla-3398.wml
deleted file mode 100644
index e111dfe4180..00000000000
--- a/english/lts/security/2023/dla-3398.wml
+++ /dev/null
@@ -1,68 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been found in cURL, an easy-to-use
-client-side URL transfer library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27533">CVE-2023-27533</a>
-
- <p>A vulnerability in input validation exists in curl during
- communication using the TELNET protocol may allow an attacker to pass on
- maliciously crafted user name and <q>telnet options</q> during server
- negotiation. The lack of proper input scrubbing allows an attacker to send
- content or perform option negotiation without the application's intent.
- This vulnerability could be exploited if an application allows user input,
- thereby enabling attackers to execute arbitrary code on the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27535">CVE-2023-27535</a>
-
- <p>An authentication bypass vulnerability exists in libcurl in the FTP
- connection reuse feature that can result in wrong credentials being used
- during subsequent transfers. Previously created connections are kept in a
- connection pool for reuse if they match the current setup. However, certain
- FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER,
- CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the
- configuration match checks, causing them to match too easily. This could
- lead to libcurl using the wrong credentials when performing a transfer,
- potentially allowing unauthorized access to sensitive information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27536">CVE-2023-27536</a>
-
- <p>An authentication bypass vulnerability exists in libcurl in the
- connection reuse feature which can reuse previously established connections
- with incorrect user permissions due to a failure to check for changes in
- the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects
- krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in
- unauthorized access to sensitive information. The safest option is to not
- reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27538">CVE-2023-27538</a>
-
- <p>An authentication bypass vulnerability exists in libcurl where it
- reuses a previously established SSH connection despite the fact that an SSH
- option was modified, which should have prevented reuse. libcurl maintains a
- pool of previously used connections to reuse them for subsequent transfers
- if the configurations match. However, two SSH settings were omitted from
- the configuration check, allowing them to match easily, potentially leading
- to the reuse of an inappropriate connection.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.64.0-4+deb10u6.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3398.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3399.data b/english/lts/security/2023/dla-3399.data
deleted file mode 100644
index e59573170e1..00000000000
--- a/english/lts/security/2023/dla-3399.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3399-1 389-ds-base</define-tag>
-<define-tag report_date>2023-04-25</define-tag>
-<define-tag secrefs>CVE-2019-3883 CVE-2019-10224 CVE-2019-14824 CVE-2021-3514 CVE-2021-3652 CVE-2021-4091 CVE-2022-0918 CVE-2022-0996 CVE-2022-2850</define-tag>
-<define-tag packages>389-ds-base</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3399.wml b/english/lts/security/2023/dla-3399.wml
deleted file mode 100644
index 3a6dd190f2a..00000000000
--- a/english/lts/security/2023/dla-3399.wml
+++ /dev/null
@@ -1,83 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in 389-ds-base: an open source LDAP
-server for Linux.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3883">CVE-2019-3883</a>
-
- <p>SSL/TLS requests do not enforce ioblocktimeout limit, leading to DoS
- vulnerability by hanging all workers with hanging LDAP requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10224">CVE-2019-10224</a>
-
- <p>The vulnerability may disclose sensitive information, such as the Directory
- Manager password, when the dscreate and dsconf commands are executed in
- verbose mode. An attacker who can view the screen or capture the terminal
- standard error output can exploit thisvulnerability to obtain confidential information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14824">CVE-2019-14824</a>
-
- <p>The <q>deref</q> plugin of 389-ds-base has a vulnerability that enables it to
- disclose attribute values using the <q>search</q> permission. In certain setups,
- an authenticated attacker can exploit this flaw to access confidential
- attributes, including password hashes.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3514">CVE-2021-3514</a>
-
- <p>If a sync_repl client is used, an authenticated attacker can trigger a crash
- by exploiting a specially crafted query that leads to a NULL pointer
- dereference.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3652">CVE-2021-3652</a>
-
- <p>Importing an asterisk as password hashes enables successful authentication
- with any password, allowing attackers to access accounts with disabled
- passwords.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4091">CVE-2021-4091</a>
-
- <p>A double free was found in the way 389-ds-base handles virtual attributes
- context in persistent searches. An attacker could send a series of search
- requests, forcing the server to behave unexpectedly, and crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0918">CVE-2022-0918</a>
-
- <p>An unauthenticated attacker with network access to the LDAP port can cause a
- denial of service. The denial of service is triggered by a single message
- sent over a TCP connection, no bind or other authentication is required. The
- message triggers a segmentation fault that results in slapd crashing.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0996">CVE-2022-0996</a>
-
- <p>Expired password was still allowed to access the database. A user whose
- password was expired was still allowed to access the database as if the
- password was not expired. Once a password is expired, and <q>grace logins</q>
- have been used up, the account is basically supposed to be locked out and
- should not be allowed to perform any privileged action.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2850">CVE-2022-2850</a>
-
- <p>The vulnerability in content synchronization plugin enables an authenticated attacker to trigger a denial of service via a crafted query through a NULL
- pointer dereference.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.4.0.21-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your 389-ds-base packages.</p>
-
-<p>For the detailed security status of 389-ds-base please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/389-ds-base">https://security-tracker.debian.org/tracker/389-ds-base</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3399.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3400.data b/english/lts/security/2023/dla-3400.data
deleted file mode 100644
index 3e25f87ea89..00000000000
--- a/english/lts/security/2023/dla-3400.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3400-1 thunderbird</define-tag>
-<define-tag report_date>2023-04-24</define-tag>
-<define-tag secrefs>CVE-2023-0547 CVE-2023-1945 CVE-2023-28427 CVE-2023-29479 CVE-2023-29533 CVE-2023-29535 CVE-2023-29536 CVE-2023-29539 CVE-2023-29541 CVE-2023-29548 CVE-2023-29550</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3400.wml b/english/lts/security/2023/dla-3400.wml
deleted file mode 100644
index 7ef6b50bf5f..00000000000
--- a/english/lts/security/2023/dla-3400.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.10.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3400.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3401.data b/english/lts/security/2023/dla-3401.data
deleted file mode 100644
index 1ca1524d795..00000000000
--- a/english/lts/security/2023/dla-3401.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3401-1 apache2</define-tag>
-<define-tag report_date>2023-04-24</define-tag>
-<define-tag secrefs>CVE-2023-25690 CVE-2023-27522 Bug#1032476</define-tag>
-<define-tag packages>apache2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3401.wml b/english/lts/security/2023/dla-3401.wml
deleted file mode 100644
index ad8a98b536c..00000000000
--- a/english/lts/security/2023/dla-3401.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in apache2,
-a webserver that may be used as front-end proxy for other applications.
-These vulnerabilities may lead to HTTP request smuggling, and thus
-to front-end security controls being bypassed.</p>
-
-<p>Unfortunately, fixing these security vulnerabilities may require
-changes to configuration files. Some out-of-specification
-RewriteRule directives that were previously silently accepted,
-are now rejected with error AH10409. For instance, some RewriteRules
-that included a back-reference and the flags "[L,NC]" will need to
-be written with extra escaping flags such as "[B= ?,BNP,QSA]".</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-25690">CVE-2023-25690</a>
-
- <p>Some mod_proxy configurations allow an HTTP request Smuggling
- attack. Configurations are affected when mod_proxy is
- enabled along with some form of RewriteRule
- or ProxyPassMatch in which a non-specific pattern matches
- some portion of the user-supplied request-target (URL)
- data and is then re-inserted into the proxied request-target
- using variable substitution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27522">CVE-2023-27522</a>
-
- <p>HTTP Response Smuggling in mod_proxy_uwsgi</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.4.38-3+deb10u10.</p>
-
-<p>We recommend that you upgrade your apache2 packages.</p>
-
-<p>For the detailed security status of apache2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/apache2">https://security-tracker.debian.org/tracker/apache2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3401.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3402.data b/english/lts/security/2023/dla-3402.data
deleted file mode 100644
index 3570134724f..00000000000
--- a/english/lts/security/2023/dla-3402.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3402-1 wireshark</define-tag>
-<define-tag report_date>2023-04-29</define-tag>
-<define-tag secrefs>CVE-2023-1161 CVE-2023-1992 CVE-2023-1993 CVE-2023-1994 Bug#1033756 Bug#1034721</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3402.wml b/english/lts/security/2023/dla-3402.wml
deleted file mode 100644
index 57086eaf355..00000000000
--- a/english/lts/security/2023/dla-3402.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the network traffic analyzer Wireshark.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1161">CVE-2023-1161</a>
-
- <p>ISO 15765 dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1992">CVE-2023-1992</a>
-
- <p>RPCoRDMA dissector crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1993">CVE-2023-1993</a>
-
- <p>LISP dissector large loop vulnerability</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1994">CVE-2023-1994</a>
-
- <p>GQUIC dissector crash</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.6.20-0+deb10u6.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3402.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3403.data b/english/lts/security/2023/dla-3403.data
deleted file mode 100644
index 987926076cb..00000000000
--- a/english/lts/security/2023/dla-3403.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3403-1 linux</define-tag>
-<define-tag report_date>2023-05-03</define-tag>
-<define-tag secrefs>CVE-2022-2873 CVE-2022-3424 CVE-2022-3545 CVE-2022-3707 CVE-2022-4744 CVE-2022-36280 CVE-2022-41218 CVE-2022-45934 CVE-2022-47929 CVE-2023-0045 CVE-2023-0266 CVE-2023-0394 CVE-2023-0458 CVE-2023-0459 CVE-2023-0461 CVE-2023-1073 CVE-2023-1074 CVE-2023-1078 CVE-2023-1079 CVE-2023-1118 CVE-2023-1281 CVE-2023-1513 CVE-2023-1670 CVE-2023-1829 CVE-2023-1855 CVE-2023-1859 CVE-2023-1989 CVE-2023-1990 CVE-2023-1998 CVE-2023-2162 CVE-2023-2194 CVE-2023-23454 CVE-2023-23455 CVE-2023-23559 CVE-2023-26545 CVE-2023-28328 CVE-2023-30456 CVE-2023-30772 Bug#825141</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3403.wml b/english/lts/security/2023/dla-3403.wml
deleted file mode 100644
index ad994057178..00000000000
--- a/english/lts/security/2023/dla-3403.wml
+++ /dev/null
@@ -1,304 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2873">CVE-2022-2873</a>
-
- <p>Zheyu Ma discovered that an out-of-bounds memory access flaw in
- the Intel iSMT SMBus 2.0 host controller driver may result in
- denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3424">CVE-2022-3424</a>
-
- <p>Zheng Wang and Zhuorao Yang reported a flaw in the SGI GRU driver
- which could lead to a use-after-free. On systems where this driver
- is used, a local user can explit this for denial of service (crash
- or memory corruption) or possibly for privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3545">CVE-2022-3545</a>
-
- <p>It was discovered that the Netronome Flow Processor (NFP) driver
- contained a use-after-free flaw in area_cache_get(), which may
- result in denial of service or the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3707">CVE-2022-3707</a>
-
- <p>Zheng Wang reported a flaw in the i915 graphics driver's
- virtualisation (GVT-g) support that could lead to a double-free.
- On systems where this feature is used, a guest can exploit this
- for denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4744">CVE-2022-4744</a>
-
- <p>The syzkaller tool found a flaw in the TUN/TAP network driver,
- which can lead to a double-free. A local user can exploit this
- for denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36280">CVE-2022-36280</a>
-
- <p>An out-of-bounds memory write vulnerability was discovered in the
- vmwgfx driver, which may allow a local unprivileged user to cause
- a denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41218">CVE-2022-41218</a>
-
- <p>Hyunwoo Kim reported a use-after-free flaw in the Media DVB core
- subsystem caused by refcount races, which may allow a local user
- to cause a denial of service or escalate privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-45934">CVE-2022-45934</a>
-
- <p>An integer overflow in l2cap_config_req() in the Bluetooth
- subsystem was discovered, which may allow a physically proximate
- attacker to cause a denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47929">CVE-2022-47929</a>
-
- <p>Frederick Lawler reported a NULL pointer dereference in the
- traffic control subsystem allowing an unprivileged user to cause a
- denial of service by setting up a specially crafted traffic
- control configuration.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0045">CVE-2023-0045</a>
-
- <p>Rodrigo Branco and Rafael Correa De Ysasi reported that when a
- user-space task told the kernel to enable Spectre v2 mitigation
- for it, the mitigation was not enabled until the task was next
- rescheduled. This might be exploitable by a local or remote
- attacker to leak sensitive information from such an application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0266">CVE-2023-0266</a>
-
- <p>A use-after-free flaw in the sound subsystem due to missing
- locking may result in denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0394">CVE-2023-0394</a>
-
- <p>Kyle Zeng discovered a NULL pointer dereference flaw in
- rawv6_push_pending_frames() in the network subsystem allowing a
- local user to cause a denial of service (system crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0458">CVE-2023-0458</a>
-
- <p>Jordy Zimmer and Alexandra Sandulescu found that getrlimit() and
- related system calls were vulnerable to speculative execution
- attacks such as Spectre v1. A local user could explot this to
- leak sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0459">CVE-2023-0459</a>
-
- <p>Jordy Zimmer and Alexandra Sandulescu found a regression in
- Spectre v1 mitigation in the user-copy functions for the amd64
- (64-bit PC) architecture. Where the CPUs do not implement SMAP or
- it is disabled, a local user could exploit this to leak sensitive
- information from the kernel. Other architectures may also be
- affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0461">CVE-2023-0461</a>
-
- <p><q>slipper</q> reported a flaw in the kernel's support for ULPs (Upper
- Layer Protocols) on top of TCP that can lead to a double-free when
- using kernel TLS sockets. A local user can exploit this for
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p>
-
- <p>Kernel TLS is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1073">CVE-2023-1073</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the HID (Human
- Interface Device) subsystem. An attacker able to insert and
- remove USB devices might be able to use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1074">CVE-2023-1074</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the SCTP
- protocol implementation which can lead to a memory leak. A local
- user could exploit this to cause a denial of service (resource
- exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1078">CVE-2023-1078</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the RDS protocol
- implementation. A local user could exploit this to cause a denial
- of service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1079">CVE-2023-1079</a>
-
- <p>Pietro Borrello reported a race condition in the hid-asus HID
- driver which could lead to a use-after-free. An attacker able to
- insert and remove USB devices can use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1118">CVE-2023-1118</a>
-
- <p>Duoming Zhou reported a race condition in the ene_ir remote
- control driver that can lead to a use-after-free if the driver
- is unbound. It is not clear what the security impact of this is.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1281">CVE-2023-1281</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2023-1829">CVE-2023-1829</a>
-
- <p><q>valis</q> reported two flaws in the cls_tcindex network traffic
- classifier which could lead to a use-after-free. A local user can
- exploit these for privilege escalation. This update removes
- cls_tcindex entirely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1513">CVE-2023-1513</a>
-
- <p>Xingyuan Mo reported an information leak in the KVM implementation
- for the i386 (32-bit PC) architecture. A local user could exploit
- this to leak sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1670">CVE-2023-1670</a>
-
- <p>Zheng Wang reported a race condition in the xirc2ps_cs network
- driver which can lead to a use-after-free. An attacker able to
- insert and remove PCMCIA devices can use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1855">CVE-2023-1855</a>
-
- <p>Zheng Wang reported a race condition in the xgene-hwmon hardware
- monitoring driver that may lead to a use-after-free. It is not
- clear what the security impact of this is.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1859">CVE-2023-1859</a>
-
- <p>Zheng Wang reported a race condition in the 9pnet_xen transport
- for the 9P filesystem on Xen, which can lead to a use-after-free.
- On systems where this feature is used, a backend driver in another
- domain can use this to cause a denial of service (crash or memory
- corruption) or possibly to run arbitrary code in the vulnerable
- domain.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1989">CVE-2023-1989</a>
-
- <p>Zheng Wang reported a race condition in the btsdio Bluetooth
- adapter driver that can lead to a use-after-free. An attacker
- able to insert and remove SDIO devices can use this to cause a
- denial of service (crash or memory corruption) or possibly to run
- arbitrary code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1990">CVE-2023-1990</a>
-
- <p>Zheng Wang reported a race condition in the st-nci NFC adapter
- driver that can lead to a use-after-free. It is not clear what
- the security impact of this is.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1998">CVE-2023-1998</a>
-
- <p>José Oliveira and Rodrigo Branco reported a regression in Spectre
- v2 mitigation for user-space on x86 CPUs supporting IBRS but not
- eIBRS. This might be exploitable by a local or remote attacker to
- leak sensitive information from a user-space application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2162">CVE-2023-2162</a>
-
- <p>Mike Christie reported a race condition in the iSCSI TCP transport
- that can lead to a use-after-free. On systems where this feature
- is used, a local user might be able to use this to cause a denial
- of service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2194">CVE-2023-2194</a>
-
- <p>Wei Chen reported a potential heap buffer overflow in the
- i2c-xgene-slimpro I²C adapter driver. A local user with
- permission to access such a device can use this to cause a denial
- of service (crash or memory corruption) and probably for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23454">CVE-2023-23454</a>
-
- <p>Kyle Zeng reported that the Class Based Queueing (CBQ) network
- scheduler was prone to denial of service due to interpreting
- classification results before checking the classification return
- code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23455">CVE-2023-23455</a>
-
- <p>Kyle Zeng reported that the ATM Virtual Circuits (ATM) network
- scheduler was prone to a denial of service due to interpreting
- classification results before checking the classification return
- code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23559">CVE-2023-23559</a>
-
- <p>Szymon Heidrich reported incorrect bounds checks in the rndis_wlan
- Wi-Fi driver which may lead to a heap buffer overflow or overread.
- An attacker able to insert and remove USB devices can use this to
- cause a denial of service (crash or memory corruption) or
- information leak, or possibly to run arbitrary code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26545">CVE-2023-26545</a>
-
- <p>Lianhui Tang reported a flaw in the MPLS protocol implementation
- that could lead to a double-free. A local user might be able to
- exploit this to cause a denial of service (crash or memory
- corruption) or possibl for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28328">CVE-2023-28328</a>
-
- <p>Wei Chen reported a flaw in the az6927 DVB driver that can lead to
- a null pointer dereference. A local user permitted to access an
- I²C adapter device that this driver creates can use this to cause
- a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-30456">CVE-2023-30456</a>
-
- <p>Reima ISHII reported a flaw in the KVM implementation for Intel
- CPUs affecting nested virtualisation. When KVM was used as the L0
- hypervisor, and EPT and/or unrestricted guest mode was disabled,
- it did not prevent an L2 guest from being configured with an
- architecturally invalid protection/paging mode. A malicious guest
- could exploit this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-30772">CVE-2023-30772</a>
-
- <p>Zheng Wang reported a race condition in the da9150 charger driver
- which could lead to a use-after-free. It is not clear what the
- security impact of this is.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.19.282-1. This update additionally fixes Debian bug
-<a href="https://bugs.debian.org/825141">#825141</a>, and
-includes many more bug fixes from stable updates 4.19.270-4.19.282
-inclusive.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3403.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3404.data b/english/lts/security/2023/dla-3404.data
deleted file mode 100644
index d969c9fcfcd..00000000000
--- a/english/lts/security/2023/dla-3404.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3404-1 linux-5.10</define-tag>
-<define-tag report_date>2023-05-03</define-tag>
-<define-tag secrefs>CVE-2022-2196 CVE-2022-3424 CVE-2022-3707 CVE-2022-4129 CVE-2022-4379 CVE-2023-0045 CVE-2023-0458 CVE-2023-0459 CVE-2023-0461 CVE-2023-1073 CVE-2023-1074 CVE-2023-1076 CVE-2023-1077 CVE-2023-1078 CVE-2023-1079 CVE-2023-1118 CVE-2023-1281 CVE-2023-1513 CVE-2023-1611 CVE-2023-1670 CVE-2023-1829 CVE-2023-1855 CVE-2023-1859 CVE-2023-1872 CVE-2023-1989 CVE-2023-1990 CVE-2023-1998 CVE-2023-2162 CVE-2023-2194 CVE-2023-22998 CVE-2023-23004 CVE-2023-23559 CVE-2023-25012 CVE-2023-26545 CVE-2023-28328 CVE-2023-28466 CVE-2023-30456 Bug#989705 Bug#993612 Bug#1022126 Bug#1031753</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3404.wml b/english/lts/security/2023/dla-3404.wml
deleted file mode 100644
index 60db5c7b49a..00000000000
--- a/english/lts/security/2023/dla-3404.wml
+++ /dev/null
@@ -1,308 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service, or information
-leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2196">CVE-2022-2196</a>
-
- <p>A regression was discovered the KVM implementation for Intel CPUs,
- affecting Spectre v2 mitigation for nested virtualisation. When
- KVM was used as the L0 hypervisor, an L2 guest could exploit this
- to leak sensitive information from its L1 hypervisor.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3424">CVE-2022-3424</a>
-
- <p>Zheng Wang and Zhuorao Yang reported a flaw in the SGI GRU driver
- which could lead to a use-after-free. On systems where this driver
- is used, a local user can explit this for denial of service (crash
- or memory corruption) or possibly for privilege escalation.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3707">CVE-2022-3707</a>
-
- <p>Zheng Wang reported a flaw in the i915 graphics driver's
- virtualisation (GVT-g) support that could lead to a double-free.
- On systems where this feature is used, a guest can exploit this
- for denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4129">CVE-2022-4129</a>
-
- <p>Haowei Yan reported a race condition in the L2TP protocol
- implementation which could lead to a null pointer dereference. A
- local user could exploit this for denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4379">CVE-2022-4379</a>
-
- <p>Xingyuan Mo reported a flaw in the NFSv4.2 inter server to
- server copy implementation which could lead to a use-after-free.</p>
-
- <p>This feature is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0045">CVE-2023-0045</a>
-
- <p>Rodrigo Branco and Rafael Correa De Ysasi reported that when a
- user-space task told the kernel to enable Spectre v2 mitigation
- for it, the mitigation was not enabled until the task was next
- rescheduled. This might be exploitable by a local or remote
- attacker to leak sensitive information from such an application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0458">CVE-2023-0458</a>
-
- <p>Jordy Zimmer and Alexandra Sandulescu found that getrlimit() and
- related system calls were vulnerable to speculative execution
- attacks such as Spectre v1. A local user could explot this to
- leak sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0459">CVE-2023-0459</a>
-
- <p>Jordy Zimmer and Alexandra Sandulescu found a regression in
- Spectre v1 mitigation in the user-copy functions for the amd64
- (64-bit PC) architecture. Where the CPUs do not implement SMAP or
- it is disabled, a local user could exploit this to leak sensitive
- information from the kernel. Other architectures may also be
- affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0461">CVE-2023-0461</a>
-
- <p><q>slipper</q> reported a flaw in the kernel's support for ULPs (Upper
- Layer Protocols) on top of TCP that can lead to a double-free when
- using kernel TLS sockets. A local user can exploit this for
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p>
-
- <p>Kernel TLS is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1073">CVE-2023-1073</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the HID (Human
- Interface Device) subsystem. An attacker able to insert and
- remove USB devices might be able to use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1074">CVE-2023-1074</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the SCTP
- protocol implementation which can lead to a memory leak. A local
- user could exploit this to cause a denial of service (resource
- exhaustion).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1076">CVE-2023-1076</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the TUN/TAP
- network driver, which results in all TUN/TAP sockets being marked
- as belonging to user ID 0 (root). This may allow local users to
- evade local firewall rules based on user ID.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1077">CVE-2023-1077</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the task
- scheduler. A local user might be able to exploit this to cause a
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1078">CVE-2023-1078</a>
-
- <p>Pietro Borrello reported a type confusion flaw in the RDS protocol
- implementation. A local user could exploit this to cause a denial
- of service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1079">CVE-2023-1079</a>
-
- <p>Pietro Borrello reported a race condition in the hid-asus HID
- driver which could lead to a use-after-free. An attacker able to
- insert and remove USB devices can use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1118">CVE-2023-1118</a>
-
- <p>Duoming Zhou reported a race condition in the ene_ir remote
- control driver that can lead to a use-after-free if the driver
- is unbound. It is not clear what the security impact of this is.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1281">CVE-2023-1281</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2023-1829">CVE-2023-1829</a>
-
- <p><q>valis</q> reported two flaws in the cls_tcindex network traffic
- classifier which could lead to a use-after-free. A local user can
- exploit these for privilege escalation. This update removes
- cls_tcindex entirely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1513">CVE-2023-1513</a>
-
- <p>Xingyuan Mo reported an information leak in the KVM implementation
- for the i386 (32-bit PC) architecture. A local user could exploit
- this to leak sensitive information from the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1611">CVE-2023-1611</a>
-
- <p><q>butt3rflyh4ck</q> reported a race condition in the btrfs filesystem
- driver which can lead to a use-after-free. A local user could
- exploit this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1670">CVE-2023-1670</a>
-
- <p>Zheng Wang reported a race condition in the xirc2ps_cs network
- driver which can lead to a use-after-free. An attacker able to
- insert and remove PCMCIA devices can use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1855">CVE-2023-1855</a>
-
- <p>Zheng Wang reported a race condition in the xgene-hwmon hardware
- monitoring driver that may lead to a use-after-free. It is not
- clear what the security impact of this is.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1859">CVE-2023-1859</a>
-
- <p>Zheng Wang reported a race condition in the 9pnet_xen transport
- for the 9P filesystem on Xen, which can lead to a use-after-free.
- On systems where this feature is used, a backend driver in another
- domain can use this to cause a denial of service (crash or memory
- corruption) or possibly to run arbitrary code in the vulnerable
- domain.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1872">CVE-2023-1872</a>
-
- <p>Bing-Jhong Billy Jheng reported a race condition in the io_uring
- subsystem that can lead to a use-after-free. A local user could
- exploit this to cause a denial of service (crash or memory
- corruption) or possibly for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1989">CVE-2023-1989</a>
-
- <p>Zheng Wang reported a race condition in the btsdio Bluetooth
- adapter driver that can lead to a use-after-free. An attacker
- able to insert and remove SDIO devices can use this to cause a
- denial of service (crash or memory corruption) or possibly to run
- arbitrary code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1990">CVE-2023-1990</a>
-
- <p>Zheng Wang reported a race condition in the st-nci NFC adapter
- driver that can lead to a use-after-free. It is not clear what
- the security impact of this is.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1998">CVE-2023-1998</a>
-
- <p>José Oliveira and Rodrigo Branco reported a regression in Spectre
- v2 mitigation for user-space on x86 CPUs supporting IBRS but not
- eIBRS. This might be exploitable by a local or remote attacker to
- leak sensitive information from a user-space application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2162">CVE-2023-2162</a>
-
- <p>Mike Christie reported a race condition in the iSCSI TCP transport
- that can lead to a use-after-free. On systems where this feature
- is used, a local user might be able to use this to cause a denial
- of service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2194">CVE-2023-2194</a>
-
- <p>Wei Chen reported a potential heap buffer overflow in the
- i2c-xgene-slimpro I²C adapter driver. A local user with
- permission to access such a device can use this to cause a denial
- of service (crash or memory corruption) and probably for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-22998">CVE-2023-22998</a>
-
- <p>Miaoqian Lin reported an incorrect error check in the virtio-gpu
- GPU driver. A local user with access to such a device might be
- able to use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23004">CVE-2023-23004</a>
-
- <p>Miaoqian Lin reported an incorrect error check in the mali-dp GPU
- driver. A local user with access to such a device might be able
- to use this to cause a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23559">CVE-2023-23559</a>
-
- <p>Szymon Heidrich reported incorrect bounds checks in the rndis_wlan
- Wi-Fi driver which may lead to a heap buffer overflow or overread.
- An attacker able to insert and remove USB devices can use this to
- cause a denial of service (crash or memory corruption) or
- information leak, or possibly to run arbitrary code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-25012">CVE-2023-25012</a>
-
- <p>Pietro Borrello reported a race condition in the hid-bigbenff HID
- driver which could lead to a use-after-free. An attacker able to
- insert and remove USB devices can use this to cause a denial of
- service (crash or memory corruption) or possibly to run arbitrary
- code in the kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26545">CVE-2023-26545</a>
-
- <p>Lianhui Tang reported a flaw in the MPLS protocol implementation
- that could lead to a double-free. A local user might be able to
- exploit this to cause a denial of service (crash or memory
- corruption) or possibl for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28328">CVE-2023-28328</a>
-
- <p>Wei Chen reported a flaw in the az6927 DVB driver that can lead to
- a null pointer dereference. A local user permitted to access an
- I²C adapter device that this driver creates can use this to cause
- a denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28466">CVE-2023-28466</a>
-
- <p>Hangyu Hua reported a race condition in the kernel TLS socket
- implementation which can lead to a use-after-free or null
- pointer dereference. A local user can exploit this for
- denial of service (crash or memory corruption) or possibly for
- privilege escalation.</p>
-
- <p>This feature is not enabled in Debian's official kernel
- configurations.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-30456">CVE-2023-30456</a>
-
- <p>Reima ISHII reported a flaw in the KVM implementation for Intel
- CPUs affecting nested virtualisation. When KVM was used as the L0
- hypervisor, and EPT and/or unrestricted guest mode was disabled,
- it did not prevent an L2 guest from being configured with an
- architecturally invalid protection/paging mode. A malicious guest
- could exploit this to cause a denial of service (crash).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.178-3~deb10u1. This update additionally fixes Debian bugs
-<a href="https://bugs.debian.org/989705">#989705</a>,
-<a href="https://bugs.debian.org/993612">#993612</a>,
-<a href="https://bugs.debian.org/1022126">#1022126</a>, and
-<a href="https://bugs.debian.org/1031753">#1031753</a>; and includes
-many more bug fixes from stable updates 5.10.163-5.10.178 inclusive.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3404.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3405.data b/english/lts/security/2023/dla-3405.data
deleted file mode 100644
index e15c0ab61f6..00000000000
--- a/english/lts/security/2023/dla-3405.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3405-1 libxml2</define-tag>
-<define-tag report_date>2023-4-30</define-tag>
-<define-tag secrefs>CVE-2023-28484 CVE-2023-29469</define-tag>
-<define-tag packages>libxml2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3405.wml b/english/lts/security/2023/dla-3405.wml
deleted file mode 100644
index f0d8314e7a3..00000000000
--- a/english/lts/security/2023/dla-3405.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several vulnerabilities were discovered in libxml2, a library providing
-support to read, modify and write XML and HTML files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28484">CVE-2023-28484</a>
-
- <p>A NULL pointer dereference flaw when parsing invalid XML schemas may
- result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29469">CVE-2023-29469</a>
-
- <p>It was reported that when hashing empty strings which aren't
- null-terminated, xmlDictComputeFastKey could produce inconsistent
- results, which may lead to various logic or memory errors.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.9.4+dfsg1-7+deb10u6.</p>
-
-<p>We recommend that you upgrade your libxml2 packages.</p>
-
-<p>For the detailed security status of libxml2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxml2">https://security-tracker.debian.org/tracker/libxml2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3405.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3406.data b/english/lts/security/2023/dla-3406.data
deleted file mode 100644
index 4e8c765ed2b..00000000000
--- a/english/lts/security/2023/dla-3406.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3406-1 sniproxy</define-tag>
-<define-tag report_date>2023-4-30</define-tag>
-<define-tag secrefs>CVE-2023-25076</define-tag>
-<define-tag packages>sniproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3406.wml b/english/lts/security/2023/dla-3406.wml
deleted file mode 100644
index 3a23a651f98..00000000000
--- a/english/lts/security/2023/dla-3406.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in sniproxy, a transparent TLS and HTTP layer 4
-proxy with SNI support.
-Due to bad handling of wildcard backend hosts, a crafted HTTP or TLS
-packet might lead to remote arbitrary code execution.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.6.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your sniproxy packages.</p>
-
-<p>For the detailed security status of sniproxy please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sniproxy">https://security-tracker.debian.org/tracker/sniproxy</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3406.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3407.data b/english/lts/security/2023/dla-3407.data
deleted file mode 100644
index f4df68abf16..00000000000
--- a/english/lts/security/2023/dla-3407.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3407-1 jackson-databind</define-tag>
-<define-tag report_date>2023-04-30</define-tag>
-<define-tag secrefs>CVE-2020-10650</define-tag>
-<define-tag packages>jackson-databind</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3407.wml b/english/lts/security/2023/dla-3407.wml
deleted file mode 100644
index f97e1d9aef1..00000000000
--- a/english/lts/security/2023/dla-3407.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>One more gadget type (ignite-jta) is being blocked in the Jackson Data
-Processor library for processing JSON and other data formats in Java.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.9.8-3+deb10u5.</p>
-
-<p>We recommend that you upgrade your jackson-databind packages.</p>
-
-<p>For the detailed security status of jackson-databind please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jackson-databind">https://security-tracker.debian.org/tracker/jackson-databind</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3407.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3408.data b/english/lts/security/2023/dla-3408.data
deleted file mode 100644
index 0193e4f347e..00000000000
--- a/english/lts/security/2023/dla-3408.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3408-1 jruby</define-tag>
-<define-tag report_date>2023-04-30</define-tag>
-<define-tag secrefs>CVE-2017-17742 CVE-2019-16201 CVE-2019-16254 CVE-2019-16255 CVE-2020-25613 CVE-2021-31810 CVE-2021-32066 CVE-2023-28755 CVE-2023-28756 Bug#972230i Bug#1014818</define-tag>
-<define-tag packages>jruby</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3408.wml b/english/lts/security/2023/dla-3408.wml
deleted file mode 100644
index 5965c98e9db..00000000000
--- a/english/lts/security/2023/dla-3408.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in JRuby, a Java implementation of
-the Ruby programming language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17742">CVE-2017-17742</a>
-<a href="https://security-tracker.debian.org/tracker/CVE-2019-16254">CVE-2019-16254</a>
-
- <p>HTTP Response Splitting attacks in the HTTP server of WEBrick.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16201">CVE-2019-16201</a>
-
- <p>Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication.
-</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16255">CVE-2019-16255</a>
-
- <p>Code injection vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25613">CVE-2020-25613</a>
-
- <p>HTTP Request Smuggling attack in WEBrick.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-31810">CVE-2021-31810</a>
-
- <p>Trusting FTP PASV responses vulnerability in Net::FTP.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32066">CVE-2021-32066</a>
-
- <p>Net::IMAP did not raise an exception when StartTLS fails with an an unknown response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28755">CVE-2023-28755</a>
-
- <p>Quadratic backtracking on invalid URI.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28756">CVE-2023-28756</a>
-
- <p>The Time parser mishandled invalid strings that have specific characters.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.1.17.0-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your jruby packages.</p>
-
-<p>For the detailed security status of jruby please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/jruby">https://security-tracker.debian.org/tracker/jruby</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3408.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3409.data b/english/lts/security/2023/dla-3409.data
deleted file mode 100644
index cb95dc581f5..00000000000
--- a/english/lts/security/2023/dla-3409.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3409-1 libapache2-mod-auth-openidc</define-tag>
-<define-tag report_date>2023-04-30</define-tag>
-<define-tag secrefs>CVE-2019-20479 CVE-2021-32785 CVE-2021-32786 CVE-2021-32791 CVE-2021-32792 CVE-2023-28625 Bug#991580 Bug#991581 Bug#991582 Bug#991583 Bug#1033916</define-tag>
-<define-tag packages>libapache2-mod-auth-openidc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3409.wml b/english/lts/security/2023/dla-3409.wml
deleted file mode 100644
index c68772e6675..00000000000
--- a/english/lts/security/2023/dla-3409.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in libapache2-mod-auth-openidc,
-an OpenID Connect Relying Party implementation for Apache.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20479">CVE-2019-20479</a>
-
- <p>Insufficient validatation of URLs beginning with a slash and backslash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32785">CVE-2021-32785</a>
-
- <p>Crash when using an unencrypted Redis cache.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32786">CVE-2021-32786</a>
-
- <p>Open Redirect vulnerability in the logout functionality.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32791">CVE-2021-32791</a>
-
- <p>AES GCM encryption in used static IV and AAD.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32792">CVE-2021-32792</a>
-
- <p>XSS vulnerability when using OIDCPreservePost.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28625">CVE-2023-28625</a>
-
- <p>NULL pointer dereference with OIDCStripCookies.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.3.10.2-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-openidc packages.</p>
-
-<p>For the detailed security status of libapache2-mod-auth-openidc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc">https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3409.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3410.data b/english/lts/security/2023/dla-3410.data
deleted file mode 100644
index 90c3c3532c9..00000000000
--- a/english/lts/security/2023/dla-3410.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3410-1 openvswitch</define-tag>
-<define-tag report_date>2023-05-01</define-tag>
-<define-tag secrefs>CVE-2023-1668 Bug#1034042</define-tag>
-<define-tag packages>openvswitch</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3410.wml b/english/lts/security/2023/dla-3410.wml
deleted file mode 100644
index ae24cbe9da4..00000000000
--- a/english/lts/security/2023/dla-3410.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>David Marchand discovered that Open vSwitch, a multilayer, software-based,
-Ethernet virtual switch, was vulnerable to crafted IP packets with ip proto
-set to 0, potentially causing a denial of service.</p>
-
-<p>Triggering the vulnerability requires an attacker to send a crafted
-IP packet with protocol field set to <code>0</code> and the flow rules
-to contain <code>set</code> actions on other fields in the IP protocol
-header. The resulting flows will omit required actions, and fail to
-mask the IP protocol field, resulting in a large bucket which captures
-all IP packets.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.10.7+ds1-0+deb10u4.</p>
-
-<p>We recommend that you upgrade your openvswitch packages.</p>
-
-<p>For the detailed security status of openvswitch please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openvswitch">https://security-tracker.debian.org/tracker/openvswitch</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3410.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3411.data b/english/lts/security/2023/dla-3411.data
deleted file mode 100644
index 3da16d9cc07..00000000000
--- a/english/lts/security/2023/dla-3411.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3411-1 distro-info-data</define-tag>
-<define-tag report_date>2023-04-30</define-tag>
-<define-tag packages>distro-info-data</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3411.wml b/english/lts/security/2023/dla-3411.wml
deleted file mode 100644
index b4bfd238f66..00000000000
--- a/english/lts/security/2023/dla-3411.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS database update</define-tag>
-<define-tag moreinfo>
-<p>This is a routine update of the distro-info-data database for Debian LTS users.</p>
-
-<p>It includes the expected release date for Debian 12, adds Debian 14, adds
-Ubuntu 23.10, and some minor updates to EoL dates for Ubuntu releases.</p>
-
-<p>For Debian 10 buster, these issues have been fixed in version 0.41+deb10u6.</p>
-
-<p>We recommend that you upgrade your distro-info-data packages.</p>
-
-<p>For the detailed security status of distro-info-data please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/distro-info-data">https://security-tracker.debian.org/tracker/distro-info-data</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3411.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3412.data b/english/lts/security/2023/dla-3412.data
deleted file mode 100644
index af35ce3a217..00000000000
--- a/english/lts/security/2023/dla-3412.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3412-1 tzdata</define-tag>
-<define-tag report_date>2023-05-02</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3412.wml b/english/lts/security/2023/dla-3412.wml
deleted file mode 100644
index 1e1cd0fcfb3..00000000000
--- a/english/lts/security/2023/dla-3412.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2023c. Notable
-changes are:</p>
-
-<p>- Revert Lebanon DST changes.
-- Updated leap second list.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2021a-0+deb10u11.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3412.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3413.data b/english/lts/security/2023/dla-3413.data
deleted file mode 100644
index 4cc4e15a039..00000000000
--- a/english/lts/security/2023/dla-3413.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3413-1 libdatetime-timezone-perl</define-tag>
-<define-tag report_date>2023-05-02</define-tag>
-<define-tag packages>libdatetime-timezone-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3413.wml b/english/lts/security/2023/dla-3413.wml
deleted file mode 100644
index 89c0155e447..00000000000
--- a/english/lts/security/2023/dla-3413.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the changes in tzdata 2023c for the
-Perl bindings. For the list of changes, see DLA-3412-1.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:2.23-1+2023c.</p>
-
-<p>We recommend that you upgrade your libdatetime-timezone-perl packages.</p>
-
-<p>For the detailed security status of libdatetime-timezone-perl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libdatetime-timezone-perl">https://security-tracker.debian.org/tracker/libdatetime-timezone-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3413.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3414.data b/english/lts/security/2023/dla-3414.data
deleted file mode 100644
index 9d5c39f1682..00000000000
--- a/english/lts/security/2023/dla-3414.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3414-1 avahi</define-tag>
-<define-tag report_date>2023-05-02</define-tag>
-<define-tag secrefs>CVE-2023-1981</define-tag>
-<define-tag packages>avahi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3414.wml b/english/lts/security/2023/dla-3414.wml
deleted file mode 100644
index 55e6acca106..00000000000
--- a/english/lts/security/2023/dla-3414.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a local Denial of Service (DoS)
-vulnerability in Avahi, a system that facilitates service discovery on a local
-network. The avahi-daemon process could have been crashed over the DBus message
-bus.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1981">CVE-2023-1981</a>
-
- <p>avahi-daemon can be crashed via DBus</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-0.7-4+deb10u2.</p>
-
-<p>We recommend that you upgrade your avahi packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3414.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3415.data b/english/lts/security/2023/dla-3415.data
deleted file mode 100644
index ca138a31b2b..00000000000
--- a/english/lts/security/2023/dla-3415.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3415-1 python-django</define-tag>
-<define-tag report_date>2023-05-05</define-tag>
-<define-tag secrefs>CVE-2023-31047</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3415.wml b/english/lts/security/2023/dla-3415.wml
deleted file mode 100644
index f3d67f54023..00000000000
--- a/english/lts/security/2023/dla-3415.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>t was discovered that there was a potential validation bypass in
-<a href="https://djangoproject.com">Djang</a>, a popular Python-based web
-development framework.</p>
-
-<p>Uploading multiple files using one form field has never been supported by
-<code>forms.FileField</code> or <code>forms.ImageField</code>, as only the last
-uploaded file was ever validated. Unfortunately, the uploading multiple files
-topic in the documentation suggested otherwise.</p>
-
-<p>In order to avoid a vulnerability, <code>ClearableFileInput</code> and
-<code>FileInput</code> form widgets now raise <code>ValueError</code> when the
-multiple HTML attribute is set on them. To prevent the exception and keep the
-old behavior, set <code>allow_multiple_selected</code> to
-<code>True</code>.</p>
-
-<p>For more details on using the new attribute and handling of multiple
-files through a single field, please see
-<a href="https://www.djangoproject.com/weblog/2023/may/03/security-releases/">upstream's website<a></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31047">CVE-2023-31047</a>
-
- <p>Potential bypass of validation when uploading multiple files using one form field</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:1.11.29-1+deb10u8.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3415.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3416.data b/english/lts/security/2023/dla-3416.data
deleted file mode 100644
index d7399e0bf57..00000000000
--- a/english/lts/security/2023/dla-3416.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3416-1 emacs</define-tag>
-<define-tag report_date>2023-5-10</define-tag>
-<define-tag secrefs>CVE-2022-48337 CVE-2022-48339 CVE-2023-28617 Bug#1031730 Bug#1033342</define-tag>
-<define-tag packages>emacs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3416.wml b/english/lts/security/2023/dla-3416.wml
deleted file mode 100644
index 4338c38386e..00000000000
--- a/english/lts/security/2023/dla-3416.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Xi Lu discovered that missing input sanitizing in Emacs could result in the
-execution of arbitrary shell commands.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:26.1+1-3.2+deb10u4.</p>
-
-<p>We recommend that you upgrade your emacs packages.</p>
-
-<p>For the detailed security status of emacs please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/emacs">https://security-tracker.debian.org/tracker/emacs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3416.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3417.data b/english/lts/security/2023/dla-3417.data
deleted file mode 100644
index af77c9d92e9..00000000000
--- a/english/lts/security/2023/dla-3417.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3417-1 firefox-esr</define-tag>
-<define-tag report_date>2023-05-11</define-tag>
-<define-tag secrefs>CVE-2023-32205 CVE-2023-32206 CVE-2023-32207 CVE-2023-32211 CVE-2023-32212 CVE-2023-32213 CVE-2023-32215</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3417.wml b/english/lts/security/2023/dla-3417.wml
deleted file mode 100644
index 7e37942ff0e..00000000000
--- a/english/lts/security/2023/dla-3417.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, spoofing or permission request bypass.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.11.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3417.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3418.data b/english/lts/security/2023/dla-3418.data
deleted file mode 100644
index 95710b4e2d3..00000000000
--- a/english/lts/security/2023/dla-3418.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3418-1 nvidia-graphics-drivers-legacy-390xx</define-tag>
-<define-tag report_date>2023-05-11</define-tag>
-<define-tag secrefs>CVE-2022-34670 CVE-2022-34674 CVE-2022-34675 CVE-2022-34677 CVE-2022-34680 CVE-2022-42257 CVE-2022-42258 CVE-2022-42259 Bug#1025281</define-tag>
-<define-tag packages>nvidia-graphics-drivers-legacy-390xx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3418.wml b/english/lts/security/2023/dla-3418.wml
deleted file mode 100644
index c909f5825c9..00000000000
--- a/english/lts/security/2023/dla-3418.wml
+++ /dev/null
@@ -1,83 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>NVIDIA has released a software security update for the NVIDIA GPU Display
-Driver R390 linux driver branch. This update addresses issues that may lead to
-denial of service, escalation of privileges, information disclosure, data
-tampering or undefined behavior.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34670">CVE-2022-34670</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer handler, where an unprivileged regular user can
- cause truncation errors when casting a primitive to a primitive of
- smaller size causes data to be lost in the conversion, which may
- lead to denial of service or information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34674">CVE-2022-34674</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer handler, where a helper function maps more
- physical pages than were requested, which may lead to undefined
- behavior or an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34675">CVE-2022-34675</a>
-
- <p>NVIDIA Display Driver for Linux contains a vulnerability in the
- Virtual GPU Manager, where it does not check the return value from a
- null-pointer dereference, which may lead to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34677">CVE-2022-34677</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer handler, where an unprivileged regular user can
- cause an integer to be truncated, which may lead to denial of
- service or data tampering.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-34680">CVE-2022-34680</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer handler, where an integer truncation can lead to
- an out-of-bounds read, which may lead to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42257">CVE-2022-42257</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer (nvidia.ko), where an integer overflow may lead to
- information disclosure, data tampering or denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42258">CVE-2022-42258</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer (nvidia.ko), where an integer overflow may lead to
- denial of service, data tampering, or information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-42259">CVE-2022-42259</a>
-
- <p>NVIDIA GPU Display Driver for Linux contains a vulnerability in the
- kernel mode layer (nvidia.ko), where an integer overflow may lead to
- denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-390.157-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your nvidia-graphics-drivers-legacy-390xx packages.</p>
-
-<p>For the detailed security status of
-nvidia-graphics-drivers-legacy-390xx please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nvidia-graphics-drivers-legacy-390xx">https://security-tracker.debian.org/tracker/nvidia-graphics-drivers-legacy-390xx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3418.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3419.data b/english/lts/security/2023/dla-3419.data
deleted file mode 100644
index 931a25580c9..00000000000
--- a/english/lts/security/2023/dla-3419.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3419-1 webkit2gtk</define-tag>
-<define-tag report_date>2023-05-12</define-tag>
-<define-tag secrefs>CVE-2022-0108 CVE-2022-32885 CVE-2023-27932 CVE-2023-27954 CVE-2023-28205</define-tag>
-<define-tag packages>webkit2gtk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3419.wml b/english/lts/security/2023/dla-3419.wml
deleted file mode 100644
index 5f95b04cb81..00000000000
--- a/english/lts/security/2023/dla-3419.wml
+++ /dev/null
@@ -1,53 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The following vulnerabilities have been discovered in the WebKitGTK
-web engine:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0108">CVE-2022-0108</a>
-
- <p>Luan Herrera discovered that an HTML document may be able to
- render iframes with sensitive user information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32885">CVE-2022-32885</a>
-
- <p>P1umer and Q1IQ discovered that processing maliciously crafted web
- content may lead to arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27932">CVE-2023-27932</a>
-
- <p>An anonymous researcher discovered that processing maliciously
- crafted web content may bypass Same Origin Policy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27954">CVE-2023-27954</a>
-
- <p>An anonymous researcher discovered that a website may be able to
- track sensitive user information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28205">CVE-2023-28205</a>
-
- <p>Clement Lecigne and Donncha O Cearbhaill discovered that
- processing maliciously crafted web content may lead to arbitrary
- code execution. Apple is aware of a report that this issue may
- have been actively exploited.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.38.6-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your webkit2gtk packages.</p>
-
-<p>For the detailed security status of webkit2gtk please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">https://security-tracker.debian.org/tracker/webkit2gtk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3419.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3420.data b/english/lts/security/2023/dla-3420.data
deleted file mode 100644
index 83554eb2dce..00000000000
--- a/english/lts/security/2023/dla-3420.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3420-1 golang-websocket</define-tag>
-<define-tag report_date>2023-5-14</define-tag>
-<define-tag secrefs>CVE-2020-27813</define-tag>
-<define-tag packages>golang-websocket</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3420.wml b/english/lts/security/2023/dla-3420.wml
deleted file mode 100644
index e530400389f..00000000000
--- a/english/lts/security/2023/dla-3420.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An integer overflow vulnerability exists in golang-websocket, a Go package
-implementing the WebSocket protocol connection. An attacker would use this flaw
-to cause a denial of service attack on an HTTP Server allowing websocket
-connections.</p>
-
-<p>The following reverse-dependencies have been rebuilt against the new golangwebsocket version: hugo and gitlab-workhorse</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your golang-websocket packages.</p>
-
-<p>For the detailed security status of golang-websocket please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/golang-websocket">https://security-tracker.debian.org/tracker/golang-websocket</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3420.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3421.data b/english/lts/security/2023/dla-3421.data
deleted file mode 100644
index 4788d2ec51d..00000000000
--- a/english/lts/security/2023/dla-3421.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3421-1 thunderbird</define-tag>
-<define-tag report_date>2023-05-15</define-tag>
-<define-tag secrefs>CVE-2023-32205 CVE-2023-32206 CVE-2023-32207 CVE-2023-32211 CVE-2023-32212 CVE-2023-32213 CVE-2023-32215</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3421.wml b/english/lts/security/2023/dla-3421.wml
deleted file mode 100644
index e120c82fde5..00000000000
--- a/english/lts/security/2023/dla-3421.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.11.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3421.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3422.data b/english/lts/security/2023/dla-3422.data
deleted file mode 100644
index 2b7c277ede7..00000000000
--- a/english/lts/security/2023/dla-3422.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3422-1 postgresql-11</define-tag>
-<define-tag report_date>2023-05-15</define-tag>
-<define-tag secrefs>CVE-2023-2454 CVE-2023-2455</define-tag>
-<define-tag packages>postgresql-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3422.wml b/english/lts/security/2023/dla-3422.wml
deleted file mode 100644
index 619814f6a72..00000000000
--- a/english/lts/security/2023/dla-3422.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were found in PostgreSQL, which may result in
-privilege escalation or incorrect policy enforcement.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-11.20-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your postgresql-11 packages.</p>
-
-<p>For the detailed security status of postgresql-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3422.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3423.data b/english/lts/security/2023/dla-3423.data
deleted file mode 100644
index 9ba82e05e99..00000000000
--- a/english/lts/security/2023/dla-3423.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3423-1 epiphany-browser</define-tag>
-<define-tag report_date>2023-05-15</define-tag>
-<define-tag secrefs>CVE-2023-26081</define-tag>
-<define-tag packages>epiphany-browser</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3423.wml b/english/lts/security/2023/dla-3423.wml
deleted file mode 100644
index cb763040f30..00000000000
--- a/english/lts/security/2023/dla-3423.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential credential stealing attack in
-<code>epiphany-browser</code>, the default GNOME web browser.</p>
-
-<p>When using a sandboxed Content Security Policy (CSP) or the HTML
-<code>iframe</code> tag, the sandboxed web content was trusted by the
-main/surrounding resource. After this change, however, the password manager is
-disabled entirely in this situations, so that the untrusted web content cannot
-exfiltrate passwords.</p>
-
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26081">CVE-2023-26081</a>
-
- <p>In Epiphany (aka GNOME Web) through 43.0, untrusted web content can
- trick users into exfiltrating passwords, because autofill occurs in
- sandboxed contexts.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-3.32.1.2-3~deb10u3.</p>
-
-<p>We recommend that you upgrade your epiphany-browser packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3423.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3424.data b/english/lts/security/2023/dla-3424.data
deleted file mode 100644
index 72cff5754c0..00000000000
--- a/english/lts/security/2023/dla-3424.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3424-1 python-ipaddress</define-tag>
-<define-tag report_date>2023-05-16</define-tag>
-<define-tag secrefs>CVE-2020-14422</define-tag>
-<define-tag packages>python-ipaddress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3424.wml b/english/lts/security/2023/dla-3424.wml
deleted file mode 100644
index d6eaaa83fac..00000000000
--- a/english/lts/security/2023/dla-3424.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Martin Wennberg discovered that python-ipaddress, a Backport of Python 3's
-ipaddress module, improperly computed hash values in the
-<code>IPv4Interface</code> and <code>IPv6Interface</code> classes, which might
-allow a remote attacker to cause a denial of service if an application is
-affected by the performance of a dictionary containing
-<code>IPv4Interface</code> or </code>IPv6Interface objects</code>. The
-attacker can use this flaw to cause many dictionary entries to be created.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.17-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your python-ipaddress packages.</p>
-
-<p>For the detailed security status of python-ipaddress please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-ipaddress">https://security-tracker.debian.org/tracker/python-ipaddress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3424.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3425.data b/english/lts/security/2023/dla-3425.data
deleted file mode 100644
index 69f1bf93a39..00000000000
--- a/english/lts/security/2023/dla-3425.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3425-1 sqlparse</define-tag>
-<define-tag report_date>2023-05-16</define-tag>
-<define-tag secrefs>CVE-2023-30608 Bug#1034615</define-tag>
-<define-tag packages>sqlparse</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3425.wml b/english/lts/security/2023/dla-3425.wml
deleted file mode 100644
index 39ecd1bb679..00000000000
--- a/english/lts/security/2023/dla-3425.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Erik Krogh Kristensen discovered that sqlparse, a non-validating SQL
-parser, contained a regular expression that is vulnerable to ReDoS
-(Regular Expression Denial of Service).</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.2.4-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your sqlparse packages.</p>
-
-<p>For the detailed security status of sqlparse please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sqlparse">https://security-tracker.debian.org/tracker/sqlparse</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3425.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3426-2.data b/english/lts/security/2023/dla-3426-2.data
deleted file mode 100644
index d347eebc2a2..00000000000
--- a/english/lts/security/2023/dla-3426-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3426-2 netatalk</define-tag>
-<define-tag report_date>2023-6-01</define-tag>
-<define-tag secrefs>CVE-2022-23121 Bug#1036740</define-tag>
-<define-tag packages>netatalk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3426-2.wml b/english/lts/security/2023/dla-3426-2.wml
deleted file mode 100644
index 73f0aa27210..00000000000
--- a/english/lts/security/2023/dla-3426-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The security update of netatalk,&nbsp;the Apple Filing Protocol service, announced
-as DLA-3426-1 caused a regression when the netatalk server was configured to
-use the AppleDouble v2 file system format.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.1.12~ds-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your netatalk packages.</p>
-
-<p>For the detailed security status of netatalk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/netatalk">https://security-tracker.debian.org/tracker/netatalk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3426-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3426-3.data b/english/lts/security/2023/dla-3426-3.data
deleted file mode 100644
index 16675c52c31..00000000000
--- a/english/lts/security/2023/dla-3426-3.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3426-3 netatalk</define-tag>
-<define-tag report_date>2023-8-13</define-tag>
-<define-tag secrefs>CVE-2022-23123 Bug#1043504</define-tag>
-<define-tag packages>netatalk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3426-3.wml b/english/lts/security/2023/dla-3426-3.wml
deleted file mode 100644
index 7d4e9238b25..00000000000
--- a/english/lts/security/2023/dla-3426-3.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Another regression was identified in Netatalk, the Apple Filing Protocol
-service, introduced with the patch for <a href="https://security-tracker.debian.org/tracker/CVE-2022-23123">CVE-2022-23123</a>. It is impacting a
-subset of users that have certain metadata in their shared files. The issue
-leads to an unavoidable crash and renders netatalk useless with their shared
-volumes.</p>
-
-<p>Separately, it also contains a fix for saving MS Office files onto an
-otherwise functioning shared volume.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.1.12~ds-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your netatalk packages.</p>
-
-<p>For the detailed security status of netatalk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/netatalk">https://security-tracker.debian.org/tracker/netatalk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3426-3.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3426.data b/english/lts/security/2023/dla-3426.data
deleted file mode 100644
index da831642e06..00000000000
--- a/english/lts/security/2023/dla-3426.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3426-1 netatalk</define-tag>
-<define-tag report_date>2023-5-17</define-tag>
-<define-tag secrefs>CVE-2021-31439 CVE-2022-0194 CVE-2022-23121 CVE-2022-23122 CVE-2022-23123 CVE-2022-23124 CVE-2022-23125 CVE-2022-43634 CVE-2022-45188 Bug#1034170 Bug#1024021</define-tag>
-<define-tag packages>netatalk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3426.wml b/english/lts/security/2023/dla-3426.wml
deleted file mode 100644
index 884ec22e495..00000000000
--- a/english/lts/security/2023/dla-3426.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in netatalk, the
-Apple Filing Protocol service, which allow remote attackers to disclose
-sensitive information, cause a denial of service or execute arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.1.12~ds-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your netatalk packages.</p>
-
-<p>For the detailed security status of netatalk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/netatalk">https://security-tracker.debian.org/tracker/netatalk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3426.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3427-2.data b/english/lts/security/2023/dla-3427-2.data
deleted file mode 100644
index 9af93d66642..00000000000
--- a/english/lts/security/2023/dla-3427-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3427-2 texlive-bin</define-tag>
-<define-tag report_date>2023-5-31</define-tag>
-<define-tag secrefs>CVE-2019-18604 Bug#1036891</define-tag>
-<define-tag packages>texlive-bin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3427-2.wml b/english/lts/security/2023/dla-3427-2.wml
deleted file mode 100644
index e97d54f848e..00000000000
--- a/english/lts/security/2023/dla-3427-2.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the patch to fix <a href="https://security-tracker.debian.org/tracker/CVE-2023-32700">CVE-2023-32700</a> in texlive-bin, released
-as DLA-3427-1, was incomplete and caused an error when running the lualatex
-command.</p>
-
-<p>The following security vulnerability has been addressed as well.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18604">CVE-2019-18604</a>
-
- <p>A flaw was found in axohelp in axodraw2. The sprintf function is
- mishandled which may cause a stack overflow error.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2018.20181218.49446-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your texlive-bin packages.</p>
-
-<p>For the detailed security status of texlive-bin please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/texlive-bin">https://security-tracker.debian.org/tracker/texlive-bin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3427-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3427.data b/english/lts/security/2023/dla-3427.data
deleted file mode 100644
index 0aaf3069c6d..00000000000
--- a/english/lts/security/2023/dla-3427.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3427-1 texlive-bin</define-tag>
-<define-tag report_date>2023-5-20</define-tag>
-<define-tag secrefs>CVE-2023-32700</define-tag>
-<define-tag packages>texlive-bin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3427.wml b/english/lts/security/2023/dla-3427.wml
deleted file mode 100644
index 9bbf1dc3a06..00000000000
--- a/english/lts/security/2023/dla-3427.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Max Chernoff discovered that improperly secured shell-escape in LuaTeX may
-result in arbitrary shell command execution, even with shell escape disabled,
-if specially crafted tex files are processed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2018.20181218.49446-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your texlive-bin packages.</p>
-
-<p>For the detailed security status of texlive-bin please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/texlive-bin">https://security-tracker.debian.org/tracker/texlive-bin</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3427.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3428.data b/english/lts/security/2023/dla-3428.data
deleted file mode 100644
index 0499f78c2d5..00000000000
--- a/english/lts/security/2023/dla-3428.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3428-1 node-nth-check</define-tag>
-<define-tag report_date>2023-05-20</define-tag>
-<define-tag secrefs>CVE-2021-3803</define-tag>
-<define-tag packages>node-nth-check</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3428.wml b/english/lts/security/2023/dla-3428.wml
deleted file mode 100644
index c8c6953f338..00000000000
--- a/english/lts/security/2023/dla-3428.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>node-nth-check, is a NodeJS module module used to parse and compile
-nth-checks, as they are found in CSS 3's nth-child() and
-nth-last-of-type() functions.</p>
-
-<p>This module was vulnerable to a regular expression denial of service
-used for parsing.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-nth-check packages.</p>
-
-<p>For the detailed security status of node-nth-check please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-nth-check">https://security-tracker.debian.org/tracker/node-nth-check</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3428.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3429.data b/english/lts/security/2023/dla-3429.data
deleted file mode 100644
index 6eebd27cbfa..00000000000
--- a/english/lts/security/2023/dla-3429.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3429-1 imagemagick</define-tag>
-<define-tag report_date>2023-05-21</define-tag>
-<define-tag secrefs>CVE-2021-20176 CVE-2021-20241 CVE-2021-20243 CVE-2021-20244 CVE-2021-20245 CVE-2021-20246 CVE-2021-20309 CVE-2021-20312 CVE-2021-20313 CVE-2021-39212 CVE-2022-28463 CVE-2022-32545 CVE-2022-32546 CVE-2022-32547 Bug#996588 Bug#1013282 Bug#1016442</define-tag>
-<define-tag packages>imagemagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3429.wml b/english/lts/security/2023/dla-3429.wml
deleted file mode 100644
index d3f6b4d5141..00000000000
--- a/english/lts/security/2023/dla-3429.wml
+++ /dev/null
@@ -1,88 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were fixed in imagemagick, a software suite,
-used for editing and manipulating digital images.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20176">CVE-2021-20176</a>
-
- <p>A divide by zero was found in gem.c file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20241">CVE-2021-20241</a>
-
- <p>A divide by zero was found in jp2 coder.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20243">CVE-2021-20243</a>
-
- <p>A divide by zero was found in dcm coder.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20244">CVE-2021-20244</a>
-
- <p>A divide by zero was found in fx.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20245">CVE-2021-20245</a>
-
- <p>A divide by zero was found in webp coder.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20246">CVE-2021-20246</a>
-
- <p>A divide by zero was found in resample.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20309">CVE-2021-20309</a>
-
- <p>A divide by zero was found in WaveImage.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20312">CVE-2021-20312</a>
-
- <p>An integer overflow was found in WriteTHUMBNAILImage()
- of coders/thumbnail.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20313">CVE-2021-20313</a>
-
- <p>A potential cipher leak was found when the calculate
- signatures in TransformSignature().</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39212">CVE-2021-39212</a>
-
- <p>A policy bypass was found for postscript files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28463">CVE-2022-28463</a>
-
- <p>A bufer overflow was found in buffer overflow in cin coder.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32545">CVE-2022-32545</a>
-
- <p>A undefined behavior (conversion outside the range of
- representable values of type <q>unsigned char</q>) was found in psd
- file handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32546">CVE-2022-32546</a>
-
- <p>A undefined behavior (conversion outside the range of
- representable values of type <q>long</q>) was found in pcl
- file handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32547">CVE-2022-32547</a>
-
- <p>An unaligned access was found in property.c</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8:6.9.10.23+dfsg-2.1+deb10u5.</p>
-
-<p>We recommend that you upgrade your imagemagick packages.</p>
-
-<p>For the detailed security status of imagemagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/imagemagick">https://security-tracker.debian.org/tracker/imagemagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3429.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3430.data b/english/lts/security/2023/dla-3430.data
deleted file mode 100644
index 518786697e5..00000000000
--- a/english/lts/security/2023/dla-3430.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3430-1 cups-filters</define-tag>
-<define-tag report_date>2023-5-21</define-tag>
-<define-tag secrefs>CVE-2023-24805 Bug#1036224</define-tag>
-<define-tag packages>cups-filters</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3430.wml b/english/lts/security/2023/dla-3430.wml
deleted file mode 100644
index b5d920f711c..00000000000
--- a/english/lts/security/2023/dla-3430.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that missing input sanitising in cups-filters, when
-using the Backend Error Handler (beh) backend to create an accessible
-network printer, may result in the execution of arbitrary commands.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.21.6-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your cups-filters packages.</p>
-
-<p>For the detailed security status of cups-filters please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cups-filters">https://security-tracker.debian.org/tracker/cups-filters</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3430.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3431.data b/english/lts/security/2023/dla-3431.data
deleted file mode 100644
index 696f8a527ab..00000000000
--- a/english/lts/security/2023/dla-3431.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3431-1 sqlite</define-tag>
-<define-tag report_date>2023-05-22</define-tag>
-<define-tag secrefs>CVE-2016-6153 CVE-2018-8740</define-tag>
-<define-tag packages>sqlite</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3431.wml b/english/lts/security/2023/dla-3431.wml
deleted file mode 100644
index f9f5d6b5e7e..00000000000
--- a/english/lts/security/2023/dla-3431.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been fixed in sqlite (V2) which which might
-allow local users to obtain sensitive information, cause a denial of
-service (application crash), or have unspecified other impact.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6153">CVE-2016-6153</a>
-
-<p>sqlite improperly implemented the temporary directory search algorithm,
-which might allow local users to obtain sensitive information, cause a
-denial of service (application crash), or have unspecified other impact
-by leveraging use of the current working directory for temporary files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8740">CVE-2018-8740</a>
-
-<p>Databases whose schema is corrupted using a CREATE TABLE AS statement
-could cause a NULL pointer dereference,</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.8.17-15+deb10u1.</p>
-
-<p>We recommend that you upgrade your sqlite packages.</p>
-
-<p>For the detailed security status of sqlite please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sqlite">https://security-tracker.debian.org/tracker/sqlite</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3431.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3432.data b/english/lts/security/2023/dla-3432.data
deleted file mode 100644
index ff034ccef8e..00000000000
--- a/english/lts/security/2023/dla-3432.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3432-1 python2.7</define-tag>
-<define-tag report_date>2023-05-24</define-tag>
-<define-tag secrefs>CVE-2015-20107 CVE-2019-20907 CVE-2020-8492 CVE-2020-26116 CVE-2021-3177 CVE-2021-3733 CVE-2021-3737 CVE-2021-4189 CVE-2022-45061 Bug#970099</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3432.wml b/english/lts/security/2023/dla-3432.wml
deleted file mode 100644
index 40bcf9d8fb4..00000000000
--- a/english/lts/security/2023/dla-3432.wml
+++ /dev/null
@@ -1,97 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Python, an interactive
-high-level object-oriented language. An attacker may cause command
-injection, denial of service (DoS), request smuggling and port
-scanning.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-20107">CVE-2015-20107</a>
-
- <p>The mailcap module does not add escape characters into commands
- discovered in the system mailcap file. This may allow attackers to
- inject shell commands into applications that call
- mailcap.findmatch with untrusted input (if they lack validation of
- user-provided filenames or arguments).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-20907">CVE-2019-20907</a>
-
- <p>In Lib/tarfile.py, an attacker is able to craft a TAR archive
- leading to an infinite loop when opened by tarfile.open, because
- _proc_pax lacks header validation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8492">CVE-2020-8492</a>
-
- <p>Python allows an HTTP server to conduct Regular Expression Denial
- of Service (ReDoS) attacks against a client because of
- urllib.request.AbstractBasicAuthHandler catastrophic backtracking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26116">CVE-2020-26116</a>
-
- <p>http.client allows CRLF injection if the attacker controls the
- HTTP request method, as demonstrated by inserting CR and LF
- control characters in the first argument of
- HTTPConnection.request.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3177">CVE-2021-3177</a>
-
- <p>Python has a buffer overflow in PyCArg_repr in _ctypes/callproc.c,
- which may lead to remote code execution in certain Python
- applications that accept floating-point numbers as untrusted
- input, as demonstrated by a 1e300 argument to
- c_double.from_param. This occurs because sprintf is used unsafely.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3733">CVE-2021-3733</a>
-
- <p>There's a flaw in urllib's AbstractBasicAuthHandler class. An
- attacker who controls a malicious HTTP server that an HTTP client
- (such as web browser) connects to, could trigger a Regular
- Expression Denial of Service (ReDOS) during an authentication
- request with a specially crafted payload that is sent by the
- server to the client.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3737">CVE-2021-3737</a>
-
- <p>An improperly handled HTTP response in the HTTP client code of
- python may allow a remote attacker, who controls the HTTP server,
- to make the client script enter an infinite loop, consuming CPU
- time.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4189">CVE-2021-4189</a>
-
- <p>The FTP (File Transfer Protocol) client library in PASV (passive)
- mode trusts the host from the PASV response by default. This flaw
- allows an attacker to set up a malicious FTP server that can trick
- FTP clients into connecting back to a given IP address and
- port. This vulnerability could lead to FTP client scanning
- ports. For the rare user who wants the previous behavior, set a
- `trust_server_pasv_ipv4_address` attribute on your `ftplib.FTP`
- instance to True.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-45061">CVE-2022-45061</a>
-
- <p>An unnecessary quadratic algorithm exists in one path when
- processing some inputs to the IDNA (RFC 3490) decoder, such that a
- crafted, unreasonably long name being presented to the decoder
- could lead to a CPU denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.7.16-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>For the detailed security status of python2.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python2.7">https://security-tracker.debian.org/tracker/python2.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3432.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3433.data b/english/lts/security/2023/dla-3433.data
deleted file mode 100644
index d4d077cc5a8..00000000000
--- a/english/lts/security/2023/dla-3433.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3433-1 libraw</define-tag>
-<define-tag report_date>2023-05-27</define-tag>
-<define-tag secrefs>CVE-2021-32142 CVE-2023-1729 Bug#1031790 Bug#1036281</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3433.wml b/english/lts/security/2023/dla-3433.wml
deleted file mode 100644
index cf93a8c5b99..00000000000
--- a/english/lts/security/2023/dla-3433.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Buffer Overflow vulnerabilities were found in libraw, a raw image
-decoder library, which could lead to application crash or privilege
-escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32142">CVE-2021-32142</a>
-
- <p>A Buffer Overflow vulnerability was found in
- <code>LibRaw_buffer_datastream::gets(char*, int)</code>,
- which could lead to privilege escalation or application
- crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1729">CVE-2023-1729</a>
-
- <p>A heap-buffer-overflow was found in <code>LibRaw::raw2image_ex(int)</code>,
- which may lead to application crash by maliciously crafted input file.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.19.2-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>For the detailed security status of libraw please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libraw">https://security-tracker.debian.org/tracker/libraw</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3433.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3434.data b/english/lts/security/2023/dla-3434.data
deleted file mode 100644
index fd4aceabadb..00000000000
--- a/english/lts/security/2023/dla-3434.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3434-1 sysstat</define-tag>
-<define-tag report_date>2023-05-27</define-tag>
-<define-tag secrefs>CVE-2023-33204 Bug#1036294</define-tag>
-<define-tag packages>sysstat</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3434.wml b/english/lts/security/2023/dla-3434.wml
deleted file mode 100644
index ab8809e588f..00000000000
--- a/english/lts/security/2023/dla-3434.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that sysstat, a system performance tools for Linux,
-incompletely fixed <a href="https://security-tracker.debian.org/tracker/CVE-2022-39377">CVE-2022-39377</a> (as published in DLA-3188-1), which
-could lead to crashes and possibly remote code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33204">CVE-2023-33204</a>
-
- <p>sysstat allows a multiplication integer overflow in check_overflow
- in common.c. NOTE: this issue exists because of an incomplete fix
- for <a href="https://security-tracker.debian.org/tracker/CVE-2022-39377">CVE-2022-39377</a>.</p>
-
-<p>For reference, the initial vulnerability was:</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39377">CVE-2022-39377</a>
-
- <p>On 32 bit systems, allocate_structures contains a size_t overflow
- in sa_common.c. The allocate_structures function insufficiently
- checks bounds before arithmetic multiplication, allowing for an
- overflow in the size allocated for the buffer representing system
- activities. This issue may lead to Remote Code Execution (RCE).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-12.0.3-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your sysstat packages.</p>
-
-<p>For the detailed security status of sysstat please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sysstat">https://security-tracker.debian.org/tracker/sysstat</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3434.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3435.data b/english/lts/security/2023/dla-3435.data
deleted file mode 100644
index a27a85f4f49..00000000000
--- a/english/lts/security/2023/dla-3435.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3435-1 rainloop</define-tag>
-<define-tag report_date>2023-05-28</define-tag>
-<define-tag secrefs>CVE-2019-13389 CVE-2022-29360 Bug#1004548</define-tag>
-<define-tag packages>rainloop</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3435.wml b/english/lts/security/2023/dla-3435.wml
deleted file mode 100644
index 7d22a98497c..00000000000
--- a/english/lts/security/2023/dla-3435.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Cross-site scripting (XSS) vulnerabilities were found in rainloop, a
-web-based email client, which could lead to information disclosure
-including passphrase leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13389">CVE-2019-13389</a>
-
- <p>It was discovered that RainLoop Webmail lacked XSS protection
- mechanisms such as <code>xlink:href</code> validation, the
- X-XSS-Protection header, and the Content-Security-Policy
- header.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-29360">CVE-2022-29360</a>
-
- <p>Simon Scannell discovered that RainLoop's Email Viewer allows XSS
- via a crafted text/html email message.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.12.1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your rainloop packages.</p>
-
-<p>For the detailed security status of rainloop please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/rainloop">https://security-tracker.debian.org/tracker/rainloop</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3435.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3436-2.data b/english/lts/security/2023/dla-3436-2.data
deleted file mode 100644
index 12f76019c5b..00000000000
--- a/english/lts/security/2023/dla-3436-2.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3436-2 sssd</define-tag>
-<define-tag report_date>2023-05-31</define-tag>
-<define-tag packages>sssd</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3436-2.wml b/english/lts/security/2023/dla-3436-2.wml
deleted file mode 100644
index 5e6ab128794..00000000000
--- a/english/lts/security/2023/dla-3436-2.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS regression update</define-tag>
-<define-tag moreinfo>
-<p>sssd 1.16.3-3.2+deb10u1 (<a href="./dla-3436">DLA 3436-1</a>) had a broken upgrade path from
-version 1.16.3-3.2.</p>
-
-<p>One could upgrade sssd-common to 1.16.3-3.2+deb10u1 while leaving
-libsss-certmap0 at 1.16.3-3.2; the version mismatch broke SSSD as the
-the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2022-4254">CVE-2022-4254</a>
-introduces new symbols which are used in sssd-common's <code>sssd_pam</code>.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.16.3-3.2+deb10u2. This version differs from 1.16.3-3.2+deb10u1 only
-in package metadata. (Bumping the minimum version for libsss-certmap0
-in sssd-common's Depends: field ensures a safe upgrade path.)</p>
-
-<p>We recommend that you upgrade your sssd packages.</p>
-
-<p>For the detailed security status of sssd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sssd">https://security-tracker.debian.org/tracker/sssd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3436-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3436.data b/english/lts/security/2023/dla-3436.data
deleted file mode 100644
index 91306b7759a..00000000000
--- a/english/lts/security/2023/dla-3436.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3436-1 sssd</define-tag>
-<define-tag report_date>2023-05-29</define-tag>
-<define-tag secrefs>CVE-2018-16838 CVE-2019-3811 CVE-2021-3621 CVE-2022-4254 Bug#919051 Bug#931432 Bug#992710</define-tag>
-<define-tag packages>sssd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3436.wml b/english/lts/security/2023/dla-3436.wml
deleted file mode 100644
index 06807db87ff..00000000000
--- a/english/lts/security/2023/dla-3436.wml
+++ /dev/null
@@ -1,72 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in sssd, a set of daemons to manage
-access to remote directories and authentication mechanisms, which could
-lead to privilege escalation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16838">CVE-2018-16838</a>
-
- <p>It was discovered that when the Group Policy Objects (GPO) are not
- readable by SSSD due to a too strict permission settings on the
- server side, SSSD allows all authenticated users to login instead of
- denying access.</p>
-
- <p>A new boolean setting <code>ad_gpo_ignore_unreadable</code> (defaulting to
- <code>False</code>) is introduced for environments where attributes in the
- </code>groupPolicyContainer</code> are not readable and changing the permissions
- on the GPO objects is not possible or desirable. See <code>sssd-ad(5)</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-3811">CVE-2019-3811</a>
-
- <p>It was discovered that if a user was configured with no home
- directory set, then <code>sssd(8)</code> returns <code>/</code> (i.e., the root directory)
- instead of the empty string (meaning no home directory). This could
- impact services that restrict the user's filesystem access to within
- their home directory through <code>chroot()</code> or similar.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3621">CVE-2021-3621</a>
-
- <p>It was discovered that the <code>sssctl(8)</code> command was vulnerable to shell
- command injection via the <code>logs-fetch</code> and <code>cache-expire</code>
- subcommands.</p>
-
- <p>This flaw could allows an attacker to trick the root user into
- running a specially crafted <code>sssctl(8)</code> command, such as via sudo, in
- order to gain root privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4254">CVE-2022-4254</a>
-
- <p>It was discovered that <code>libsss_certmap</code> failed to sanitize certificate
- data used in LDAP filters.</p>
-
- <p>PKINIT enables a client to authenticate to the KDC using an X.509
- certificate and the corresponding private key, rather than a
- passphrase or keytab. Mapping rules are used in order to map the
- certificate presented during a PKINIT authentication request to the
- corresponding principal. However the mapping filter was found to be
- vulnerable to LDAP filter injection. As the search result is be
- influenced by values in the certificate, which may be attacker
- controlled, this flaw could allow an attacker to gain control of the
- admin account, leading to full domain takeover.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.16.3-3.2+deb10u1.</p>
-
-<p>We recommend that you upgrade your sssd packages.</p>
-
-<p>For the detailed security status of sssd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sssd">https://security-tracker.debian.org/tracker/sssd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3436.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3437.data b/english/lts/security/2023/dla-3437.data
deleted file mode 100644
index 879db34fae2..00000000000
--- a/english/lts/security/2023/dla-3437.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3437-1 libssh</define-tag>
-<define-tag report_date>2023-05-29</define-tag>
-<define-tag secrefs>CVE-2019-14889 CVE-2023-1667 Bug#946548 Bug#1035832</define-tag>
-<define-tag packages>libssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3437.wml b/english/lts/security/2023/dla-3437.wml
deleted file mode 100644
index dfc28fb1a03..00000000000
--- a/english/lts/security/2023/dla-3437.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues have been discovered in libssh, a tiny C SSH library, which
-may allows an remote authenticated user to cause a denial of service or inject
-arbitrary commands.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14889">CVE-2019-14889</a>
-
- <p>A flaw was found with the libssh API function ssh_scp_new() in
- versions before 0.9.3 and before 0.8.8. When the libssh SCP client
- connects to a server, the scp command, which includes a
- user-provided path, is executed on the server-side. In case the
- library is used in a way where users can influence the third
- parameter of the function, it would become possible for an attacker
- to inject arbitrary commands, leading to a compromise of the remote
- target.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1667">CVE-2023-1667</a>
-
- <p>A NULL pointer dereference was found In libssh during re-keying with
- algorithm guessing. This issue may allow an authenticated client to
- cause a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.8.7-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your libssh packages.</p>
-
-<p>For the detailed security status of libssh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libssh">https://security-tracker.debian.org/tracker/libssh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3437.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3438.data b/english/lts/security/2023/dla-3438.data
deleted file mode 100644
index e6cf963d1c2..00000000000
--- a/english/lts/security/2023/dla-3438.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3438-1 kamailio</define-tag>
-<define-tag report_date>2023-05-30</define-tag>
-<define-tag secrefs>CVE-2020-27507</define-tag>
-<define-tag packages>kamailio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3438.wml b/english/lts/security/2023/dla-3438.wml
deleted file mode 100644
index 8b5f07b0076..00000000000
--- a/english/lts/security/2023/dla-3438.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial-of-service (DoS) attack
-in the Kamailio SIP telephony server. This was caused by the Kamailio server
-mishandling <code>INVITE</code> requests with duplicated fields.</p>
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27507">CVE-2020-27507</a>
-
- <p>The Kamailio SIP before 5.5.0 server mishandles INVITE requests with duplicated fields and overlength tag, leading to a buffer overflow that crashes the server or possibly have unspecified other impact.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5.2.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your kamailio packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3438.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3439.data b/english/lts/security/2023/dla-3439.data
deleted file mode 100644
index 59f70dbd353..00000000000
--- a/english/lts/security/2023/dla-3439.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3439-1 libwebp</define-tag>
-<define-tag report_date>2023-05-31</define-tag>
-<define-tag secrefs>CVE-2023-1999</define-tag>
-<define-tag packages>libwebp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3439.wml b/english/lts/security/2023/dla-3439.wml
deleted file mode 100644
index 0382a6a8bb0..00000000000
--- a/english/lts/security/2023/dla-3439.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential arbitrary code execution
-vulnerability in <code>libwebp</code>, a library to support the WebP image
-compression format.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1999">CVE-2023-1999</a></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-0.6.1-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your libwebp packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3439.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3440.data b/english/lts/security/2023/dla-3440.data
deleted file mode 100644
index f6226261d42..00000000000
--- a/english/lts/security/2023/dla-3440.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3440-1 cups</define-tag>
-<define-tag report_date>2023-6-1</define-tag>
-<define-tag secrefs>CVE-2023-32324</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3440.wml b/english/lts/security/2023/dla-3440.wml
deleted file mode 100644
index 8746575eed0..00000000000
--- a/english/lts/security/2023/dla-3440.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in cups, the Common UNIX Printing System.
-Due to a buffer overflow vulnerability in the function format_log_line()
-a remote attackers could cause a denial-of-service(DoS). The vulnerability
-can be triggered when the configuration file cupsd.conf sets the value of
-<q>loglevel</q> to <q>DEBUG</q>.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.2.10-6+deb10u7.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>For the detailed security status of cups please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cups">https://security-tracker.debian.org/tracker/cups</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3440.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3441.data b/english/lts/security/2023/dla-3441.data
deleted file mode 100644
index 77da90cada4..00000000000
--- a/english/lts/security/2023/dla-3441.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3441-1 sofia-sip</define-tag>
-<define-tag report_date>2023-06-02</define-tag>
-<define-tag secrefs>CVE-2023-32307</define-tag>
-<define-tag packages>sofia-sip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3441.wml b/english/lts/security/2023/dla-3441.wml
deleted file mode 100644
index 9aa2d3a9411..00000000000
--- a/english/lts/security/2023/dla-3441.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a series of heap overflow and integer
-overflow vulnerabilities in Sofia-SIP, a building block for creating VoIP/SIP
-and instant messaging applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32307">CVE-2023-32307</a>
-
- <p>Sofia-SIP is an open-source SIP User-Agent library, compliant with the
- IETF RFC3261 specification. Referring to
- <a href="https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54">GHSA-8599-x7rq-fr54</a>
- several other potential heap-over-flow and integer-overflow in
- <code>stun_parse_attr_error_code</code> and
- <code>stun_parse_attr_uint32</code> were found because the lack of
- attributes length check when Sofia-SIP handles STUN packets. The previous
- patch of
- <a href="https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54">GHSA-8599-x7rq-fr54</a>
- fixed the vulnerability when attr_type did not match the enum value, but
- there are also vulnerabilities in the handling of other valid cases. The
- OOB read and integer-overflow made by attacker may lead to crash, high
- consumption of memory or even other more serious consequences. These issue
- have been addressed in version 1.13.15. Users are advised to upgrade.</li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.12.11+20110422.1-2.1+deb10u4.</p>
-
-<p>We recommend that you upgrade your sofia-sip packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3441.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3442.data b/english/lts/security/2023/dla-3442.data
deleted file mode 100644
index f5506606621..00000000000
--- a/english/lts/security/2023/dla-3442.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3442-1 nbconvert</define-tag>
-<define-tag report_date>2023-06-03</define-tag>
-<define-tag secrefs>CVE-2021-32862</define-tag>
-<define-tag packages>nbconvert</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3442.wml b/english/lts/security/2023/dla-3442.wml
deleted file mode 100644
index add5cb33c0e..00000000000
--- a/english/lts/security/2023/dla-3442.wml
+++ /dev/null
@@ -1,56 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Alvaro Muñoz from the GitHub Security Lab discovered sixteen ways to
-exploit a cross-site scripting vulnerability in nbconvert, a tool and
-library used to convert notebooks to various other formats via Jinja
-templates.</p>
-
-<p>When using nbconvert to generate an HTML version of a user-controllable
-notebook, it is possible to inject arbitrary HTML which may lead to
-cross-site scripting (XSS) vulnerabilities if these HTML notebooks are
-served by a web server without tight <code>Content-Security-Policy</code>
-(e.g., nbviewer).</p>
-
-<p><ol>
- <li> GHSL-2021-1013: XSS in <code>notebook.metadata.language_info.pygments_lexer</code>;</li>
- <li> GHSL-2021-1014: XSS in <code>notebook.metadata.title</code>;</li>
- <li> GHSL-2021-1015: XSS in <code>notebook.metadata.widgets</code>;</li>
- <li> GHSL-2021-1016: XSS in <code>notebook.cell.metadata.tags</code>;</li>
- <li> GHSL-2021-1017: XSS in output data <code>text/html</code> cells;</li>
- <li> GHSL-2021-1018: XSS in output data <code>image/svg+xml</code> cells;</li>
- <li> GHSL-2021-1019: XSS in <code>notebook.cell.output.svg_filename</code>;</li>
- <li> GHSL-2021-1020: XSS in output data <code>text/markdown</code> cells;</li>
- <li> GHSL-2021-1021: XSS in output data <code>application/javascript</code> cells;</li>
- <li> GHSL-2021-1022: XSS in output.metadata.filenames <code>image/png</code> and <code>image/jpeg</code>;</li>
- <li> GHSL-2021-1023: XSS in output data <code>image/png</code> and <code>image/jpeg</code> cells;</li>
- <li> GHSL-2021-1024: XSS in output.metadata.width/height <code>image/png</code> and <code>image/jpeg</code>;</li>
- <li> GHSL-2021-1025: XSS in output data <code>application/vnd.jupyter.widget-state+json</code> cells;</li>
- <li> GHSL-2021-1026: XSS in output data <code>application/vnd.jupyter.widget-view+json</code> cells;</li>
- <li> GHSL-2021-1027: XSS in raw cells; and</li>
- <li> GHSL-2021-1028: XSS in markdown cells.</li>
-</ol></p>
-
-<p>Some of these vulnerabilities, namely GHSL-2021-1017, -1020, -1021 and -1028,
-are actually design decisions where <code>text/html</code>, <code>text/markdown</code>,
-<code>application/javascript</code> and markdown cells should allow for arbitrary
-JavaScript code execution. These vulnerabilities are therefore left open
-by default, but users can now opt-out and strip down all JavaScript
-elements via a new <code>HTMLExporter</code> option <code>sanitize_html</code>.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.4-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your nbconvert packages.</p>
-
-<p>For the detailed security status of nbconvert please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nbconvert">https://security-tracker.debian.org/tracker/nbconvert</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3442.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3443.data b/english/lts/security/2023/dla-3443.data
deleted file mode 100644
index bbc5ed3cb99..00000000000
--- a/english/lts/security/2023/dla-3443.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3443-1 wireshark</define-tag>
-<define-tag report_date>2023-06-03</define-tag>
-<define-tag secrefs>CVE-2023-2856 CVE-2023-2858 CVE-2023-2879 CVE-2023-2952</define-tag>
-<define-tag packages>wireshark</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3443.wml b/english/lts/security/2023/dla-3443.wml
deleted file mode 100644
index bacb19fa5be..00000000000
--- a/english/lts/security/2023/dla-3443.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the network traffic analyzer Wireshark.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2856">CVE-2023-2856</a>
-
- <p>VMS TCPIPtrace file parser crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2858">CVE-2023-2858</a>
-
- <p>NetScaler file parser crash</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2879">CVE-2023-2879</a>
-
- <p>GDSDB infinite loop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2952">CVE-2023-2952</a>
-
- <p>XRA dissector infinite loop</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.6.20-0+deb10u7.</p>
-
-<p>We recommend that you upgrade your wireshark packages.</p>
-
-<p>For the detailed security status of wireshark please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/wireshark">https://security-tracker.debian.org/tracker/wireshark</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3443.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3444.data b/english/lts/security/2023/dla-3444.data
deleted file mode 100644
index e55af280abe..00000000000
--- a/english/lts/security/2023/dla-3444.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3444-1 mariadb-10.3</define-tag>
-<define-tag report_date>2023-06-03</define-tag>
-<define-tag secrefs>CVE-2022-47015 Bug#1031773</define-tag>
-<define-tag packages>mariadb-10.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3444.wml b/english/lts/security/2023/dla-3444.wml
deleted file mode 100644
index 16a0475a87d..00000000000
--- a/english/lts/security/2023/dla-3444.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Latest MariaDB minor maintenance release 10.3.39 included a fix for the
-following security vulnerability:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47015">CVE-2022-47015</a>
-
- <p>Spider storage engine vulnerable to Denial of Service</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:10.3.39-0+deb10u1.</p>
-
-<p>Additionally the backwards incompatible libmariadb API change has
-been reverted (Closes: #1031773).</p>
-
-<p>We recommend that you upgrade your mariadb-10.3 packages.</p>
-
-<p>For the detailed security status of mariadb-10.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mariadb-10.3">https://security-tracker.debian.org/tracker/mariadb-10.3</a></p>
-
-<p>Note! According to <a href="https://mariadb.org/about/#maintenance-policy">https://mariadb.org/about/#maintenance-policy</a> this
-was the last minor maintenance release for MariaDB 10.3 series.</p>
-
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3444.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3445.data b/english/lts/security/2023/dla-3445.data
deleted file mode 100644
index e421f817b68..00000000000
--- a/english/lts/security/2023/dla-3445.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3445-1 cpio</define-tag>
-<define-tag report_date>2023-06-04</define-tag>
-<define-tag secrefs>CVE-2019-14866 CVE-2021-38185 Bug#941412 Bug#992045</define-tag>
-<define-tag packages>cpio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3445.wml b/english/lts/security/2023/dla-3445.wml
deleted file mode 100644
index 94b6b05a541..00000000000
--- a/english/lts/security/2023/dla-3445.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were fixed in GNU cpio, a program to manage
-archives of files.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14866">CVE-2019-14866</a>
-
- <p>Improper validation of input files when generatingtar archives.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-38185">CVE-2021-38185</a>
-
- <p>Arbitrary code via crafted pattern file.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.12+dfsg-9+deb10u1.</p>
-
-<p>We recommend that you upgrade your cpio packages.</p>
-
-<p>For the detailed security status of cpio please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cpio">https://security-tracker.debian.org/tracker/cpio</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3445.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3446.data b/english/lts/security/2023/dla-3446.data
deleted file mode 100644
index e2884780188..00000000000
--- a/english/lts/security/2023/dla-3446.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3446-1 linux-5.10</define-tag>
-<define-tag report_date>2023-06-05</define-tag>
-<define-tag secrefs>CVE-2023-0386 CVE-2023-31436 CVE-2023-32233 Bug#1035779</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3446.wml b/english/lts/security/2023/dla-3446.wml
deleted file mode 100644
index 04e31eb0f4c..00000000000
--- a/english/lts/security/2023/dla-3446.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0386">CVE-2023-0386</a>
-
- <p>It was discovered that under certain conditions the overlayfs
- filesystem implementation did not properly handle copy up
- operations. A local user permitted to mount overlay mounts in user
- namespaces can take advantage of this flaw for local privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31436">CVE-2023-31436</a>
-
- <p>Gwangun Jung reported a a flaw causing heap out-of-bounds
- read/write errors in the traffic control subsystem for the Quick
- Fair Queueing scheduler (QFQ) which may result in information
- leak, denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32233">CVE-2023-32233</a>
-
- <p>Patryk Sondej and Piotr Krysiuk discovered a use-after-free flaw
- in the Netfilter nf_tables implementation when processing batch
- requests, which may result in local privilege escalation for a
- user with the CAP_NET_ADMIN capability in any user or network
- namespace.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.179-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3446.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3447.data b/english/lts/security/2023/dla-3447.data
deleted file mode 100644
index f2a916ca90d..00000000000
--- a/english/lts/security/2023/dla-3447.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3447-1 ruby2.5</define-tag>
-<define-tag report_date>2023-06-06</define-tag>
-<define-tag secrefs>CVE-2023-28755 CVE-2023-28756</define-tag>
-<define-tag packages>ruby2.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3447.wml b/english/lts/security/2023/dla-3447.wml
deleted file mode 100644
index fa87afc183c..00000000000
--- a/english/lts/security/2023/dla-3447.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Two regular expression Denial of Service (ReDoS) issues were discovered in
-Ruby: the first in the URI component, and the second in the Time module. Each
-of these issues could have resulted in a dramatic increase in execution time
-given malicious input.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28755">CVE-2023-28755</a>
-
- <p>A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby
- through 3.2.1. The URI parser mishandles invalid URLs that have specific
- characters. It causes an increase in execution time for parsing strings to
- URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and
- 0.10.0.1.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28756">CVE-2023-28756</a>
-
- <p>A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby
- through 3.2.1. The Time parser mishandles invalid URLs that have specific
- characters. It causes an increase in execution time for parsing strings to
- Time objects. The fixed versions are 0.1.1 and 0.2.2.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, these problems have been fixed in version
-2.5.5-3+deb10u5.</p>
-
-<p>We recommend that you upgrade your ruby2.5 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3447.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3448.data b/english/lts/security/2023/dla-3448.data
deleted file mode 100644
index 986a01ef43a..00000000000
--- a/english/lts/security/2023/dla-3448.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3448-1 firefox-esr</define-tag>
-<define-tag report_date>2023-06-08</define-tag>
-<define-tag secrefs>CVE-2023-34414 CVE-2023-34416</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3448.wml b/english/lts/security/2023/dla-3448.wml
deleted file mode 100644
index ccad4a8432e..00000000000
--- a/english/lts/security/2023/dla-3448.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.12.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3448.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3449.data b/english/lts/security/2023/dla-3449.data
deleted file mode 100644
index b92cf55b6fc..00000000000
--- a/english/lts/security/2023/dla-3449.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3449-1 openssl</define-tag>
-<define-tag report_date>2023-06-08</define-tag>
-<define-tag secrefs>CVE-2023-0464 CVE-2023-0465 CVE-2023-0466 CVE-2023-2650 Bug#1034720</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3449.wml b/english/lts/security/2023/dla-3449.wml
deleted file mode 100644
index acfb74e43a9..00000000000
--- a/english/lts/security/2023/dla-3449.wml
+++ /dev/null
@@ -1,52 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in OpenSSL, a Secure
-Sockets Layer toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0464">CVE-2023-0464</a>
-
- <p>David Benjamin reported a flaw related to the verification of
- X.509 certificate chains that include policy constraints, which
- may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0465">CVE-2023-0465</a>
-
- <p>David Benjamin reported that invalid certificate policies in leaf
- certificates are silently ignored. A malicious CA could take
- advantage of this flaw to deliberately assert invalid certificate
- policies in order to circumvent policy checking on the certificate
- altogether.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0466">CVE-2023-0466</a>
-
- <p>David Benjamin discovered that the implementation of the
- X509_VERIFY_PARAM_add0_policy() function does not enable the check
- which allows certificates with invalid or incorrect policies to
- pass the certificate verification (contrary to its documentation).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2650">CVE-2023-2650</a>
-
- <p>It was discovered that processing malformed ASN.1 object
- identifiers or data may result in denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.1.1n-0+deb10u5.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3449.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3450.data b/english/lts/security/2023/dla-3450.data
deleted file mode 100644
index 884aff51e13..00000000000
--- a/english/lts/security/2023/dla-3450.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3450-1 ruby2.5</define-tag>
-<define-tag report_date>2023-06-19</define-tag>
-<define-tag secrefs>CVE-2021-33621 CVE-2022-28739 Bug#1009957 Bug#1024800 Bug#1037178</define-tag>
-<define-tag packages>ruby2.5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3450.wml b/english/lts/security/2023/dla-3450.wml
deleted file mode 100644
index e2446c09b5b..00000000000
--- a/english/lts/security/2023/dla-3450.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A couple of security issues were discovered in ruby2.5, the Ruby
-interpreter, and are as follows </p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-33621">CVE-2021-33621</a>
-
- <p>Hiroshi Tokumaru discovered that Ruby did not properly handle
- certain user input for applications the generate HTTP responses
- using cgi gem. An attacker could possibly use this issue to
- maliciously modify the response a user would receive from a
- vulnerable application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-28739">CVE-2022-28739</a>
-
- <p>It was discovered that Ruby incorrectly handled certain inputs.
- An attacker could possibly use this issue to expose sensitive
- information.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed, along with the
-regressions caused by the last Ruby update, in version 2.5.5-3+deb10u6.</p>
-
-<p>We recommend that you upgrade your ruby2.5 packages.</p>
-
-<p>For the detailed security status of ruby2.5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby2.5">https://security-tracker.debian.org/tracker/ruby2.5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3450.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3451.data b/english/lts/security/2023/dla-3451.data
deleted file mode 100644
index c2581405d3a..00000000000
--- a/english/lts/security/2023/dla-3451.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3451-1 pypdf2</define-tag>
-<define-tag report_date>2023-6-09</define-tag>
-<define-tag secrefs>CVE-2022-24859 Bug#1009879</define-tag>
-<define-tag packages>pypdf2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3451.wml b/english/lts/security/2023/dla-3451.wml
deleted file mode 100644
index d328dfe63a6..00000000000
--- a/english/lts/security/2023/dla-3451.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sebastian Krause discovered that manipulated inline images can force PyPDF2,
-a pure Python PDF library, into an infinite loop, if a maliciously crafted PDF
-file is processed.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.26.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your pypdf2 packages.</p>
-
-<p>For the detailed security status of pypdf2 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/pypdf2">https://security-tracker.debian.org/tracker/pypdf2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3451.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3452.data b/english/lts/security/2023/dla-3452.data
deleted file mode 100644
index e74c42a98ab..00000000000
--- a/english/lts/security/2023/dla-3452.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3452-1 thunderbird</define-tag>
-<define-tag report_date>2023-06-12</define-tag>
-<define-tag secrefs>CVE-2023-34414 CVE-2023-34416</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3452.wml b/english/lts/security/2023/dla-3452.wml
deleted file mode 100644
index 62f22c130f7..00000000000
--- a/english/lts/security/2023/dla-3452.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.12.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3452.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3453.data b/english/lts/security/2023/dla-3453.data
deleted file mode 100644
index ec929355e1d..00000000000
--- a/english/lts/security/2023/dla-3453.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3453-1 vim</define-tag>
-<define-tag report_date>2023-6-12</define-tag>
-<define-tag secrefs>CVE-2022-4141 CVE-2023-0054 CVE-2023-1175 CVE-2023-2610 Bug#1027146 Bug#1031875 Bug#1035955</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3453.wml b/english/lts/security/2023/dla-3453.wml
deleted file mode 100644
index fb3a84f098a..00000000000
--- a/english/lts/security/2023/dla-3453.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in vim, an enhanced
-vi editor. Buffer overflows and out-of-bounds reads may lead to a
-denial-of-service (application crash) or other unspecified impact.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:8.1.0875-5+deb10u5.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3453.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3454.data b/english/lts/security/2023/dla-3454.data
deleted file mode 100644
index c90b57bb58b..00000000000
--- a/english/lts/security/2023/dla-3454.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3454-1 ffmpeg</define-tag>
-<define-tag report_date>2023-06-13</define-tag>
-<define-tag secrefs>CVE-2022-3109 CVE-2022-3341</define-tag>
-<define-tag packages>ffmpeg</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3454.wml b/english/lts/security/2023/dla-3454.wml
deleted file mode 100644
index 070679f73d0..00000000000
--- a/english/lts/security/2023/dla-3454.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the FFmpeg multimedia
-framework, which could result in denial of service or potentially the
-execution of arbitrary code if malformed files/streams are processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7:4.1.11-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your ffmpeg packages.</p>
-
-<p>For the detailed security status of ffmpeg please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ffmpeg">https://security-tracker.debian.org/tracker/ffmpeg</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3454.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3455.data b/english/lts/security/2023/dla-3455.data
deleted file mode 100644
index 9d2e161ee2e..00000000000
--- a/english/lts/security/2023/dla-3455.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3455-1 golang-go.crypto</define-tag>
-<define-tag report_date>2023-6-16</define-tag>
-<define-tag secrefs>CVE-2019-11840 CVE-2019-11841 CVE-2020-9283 Bug#952462</define-tag>
-<define-tag packages>golang-go.crypto</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3455.wml b/english/lts/security/2023/dla-3455.wml
deleted file mode 100644
index 0b5feaf035d..00000000000
--- a/english/lts/security/2023/dla-3455.wml
+++ /dev/null
@@ -1,70 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in golang-go.crypto, the
-supplementary Go cryptography libraries.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11840">CVE-2019-11840</a>
-
- <p>An issue was discovered in supplementary Go cryptography libraries, aka
- golang-googlecode-go-crypto. If more than 256 GiB of keystream is
- generated, or if the counter otherwise grows greater than 32 bits, the
- amd64 implementation will first generate incorrect output, and then cycle
- back to previously generated keystream. Repeated keystream bytes can lead
- to loss of confidentiality in encryption applications, or to predictability
- in CSPRNG applications.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11841">CVE-2019-11841</a>
-
- <p>A message-forgery issue was discovered in
- crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography
- libraries. The <q>Hash</q> Armor Header specifies the message digest
- algorithm(s) used for the signature. Since the library skips Armor Header
- parsing in general, an attacker can not only embed arbitrary Armor Headers,
- but also prepend arbitrary text to cleartext messages without invalidating
- the signatures.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-9283">CVE-2020-9283</a>
-
- <p>golang.org/x/crypto allows a panic during signature verification in the
- golang.org/x/crypto/ssh package. A client can attack an SSH server that
- accepts public keys. Also, a server can attack any SSH client.</p>
-
-<p>The following Go packages have been rebuilt in order to fix the aforementioned
-issues.</p>
-
-<p>rclone: 1.45-3+deb10u1<br />
-obfs4proxy: 0.0.7-4+deb10u1<br />
-gobuster: 2.0.1-1+deb10u1<br />
-restic: 0.9.4+ds-2+deb10u1<br />
-gopass: 1.2.0-2+deb10u1<br />
-aptly: 1.3.0+ds1-2.2~deb10u2<br />
-dnscrypt-proxy: 2.0.19+ds1-2+deb10u1<br />
-g10k: 0.5.7-1+deb10u1<br />
-hub: 2.7.0~ds1-1+deb10u1<br />
-acmetool: 0.0.62-3+deb10u1<br />
-syncthing: 1.0.0~ds1-1+deb10u1<br />
-packer: 1.3.4+dfsg-4+deb10u1<br />
-etcd: 3.2.26+dfsg-3+deb10u1<br />
-notary: 0.6.1~ds1-3+deb10u1</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:0.0~git20181203.505ab14-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your golang-go.crypto packages.</p>
-
-<p>For the detailed security status of golang-go.crypto please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/golang-go.crypto">https://security-tracker.debian.org/tracker/golang-go.crypto</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3455.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3456.data b/english/lts/security/2023/dla-3456.data
deleted file mode 100644
index 15bb2f6060e..00000000000
--- a/english/lts/security/2023/dla-3456.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3456-1 requests</define-tag>
-<define-tag report_date>2023-6-18</define-tag>
-<define-tag secrefs>CVE-2023-32681 Bug#1036693</define-tag>
-<define-tag packages>requests</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3456.wml b/english/lts/security/2023/dla-3456.wml
deleted file mode 100644
index b917f5477e0..00000000000
--- a/english/lts/security/2023/dla-3456.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Requests, a Python HTTP library, has been leaking Proxy-Authorization headers
-to destination servers when redirected to an HTTPS endpoint. For HTTP
-connections sent through the tunnel, the proxy will identify the header in the
-request itself and remove it prior to forwarding to the destination server.
-However when sent over HTTPS, the `Proxy-Authorization` header must be sent in
-the CONNECT request as the proxy has no visibility into the tunneled request.
-This results in Requests forwarding proxy credentials to the destination
-server unintentionally, allowing a malicious actor to potentially exfiltrate
-sensitive information.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.21.0-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your requests packages.</p>
-
-<p>For the detailed security status of requests please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/requests">https://security-tracker.debian.org/tracker/requests</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3456.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3457.data b/english/lts/security/2023/dla-3457.data
deleted file mode 100644
index 300ba2283a2..00000000000
--- a/english/lts/security/2023/dla-3457.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3457-1 maradns</define-tag>
-<define-tag report_date>2023-06-19</define-tag>
-<define-tag secrefs>CVE-2022-30256 CVE-2023-31137 Bug#1033252 Bug#1035936</define-tag>
-<define-tag packages>maradns</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3457.wml b/english/lts/security/2023/dla-3457.wml
deleted file mode 100644
index df15a831c41..00000000000
--- a/english/lts/security/2023/dla-3457.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>MaraDNS is a small and lightweight cross-platform open-source DNS server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30256">CVE-2022-30256</a>
-
- <p>A revoked domain name (so called <q>Ghost</q> domain name) can still be
- resolvable for a long time by staying in the cache longer than
- max_ttl allows. <q>Ghost</q> domain names includes expired domains
- and taken-down malicious domains.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31137">CVE-2023-31137</a>
-
- <p>The authoritative server in MaraDNS had an issue where it is
- possible to remotely terminate the MaraDNS process with a
- specialy crafted packet (so called <q>packet of death</q>).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.13-1.2+deb10u1.</p>
-
-<p>We recommend that you upgrade your maradns packages.</p>
-
-<p>For the detailed security status of maradns please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/maradns">https://security-tracker.debian.org/tracker/maradns</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3457.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3458.data b/english/lts/security/2023/dla-3458.data
deleted file mode 100644
index 976dca09ede..00000000000
--- a/english/lts/security/2023/dla-3458.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3458-1 php7.3</define-tag>
-<define-tag report_date>2023-06-20</define-tag>
-<define-tag secrefs>CVE-2023-3247</define-tag>
-<define-tag packages>php7.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3458.wml b/english/lts/security/2023/dla-3458.wml
deleted file mode 100644
index 35a7fcf846c..00000000000
--- a/english/lts/security/2023/dla-3458.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Niels Dossche and Tim Düsterhus discovered that PHP's implementation of
-the SOAP HTTP Digest authentication did not check for failures, which
-may result in a stack information leak. Furthermore, the code used an
-insufficient number of random bytes.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-7.3.31-1~deb10u4.</p>
-
-<p>We recommend that you upgrade your php7.3 packages.</p>
-
-<p>For the detailed security status of php7.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.3">https://security-tracker.debian.org/tracker/php7.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3458.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3459.data b/english/lts/security/2023/dla-3459.data
deleted file mode 100644
index 39b5983c556..00000000000
--- a/english/lts/security/2023/dla-3459.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3459-1 libxpm</define-tag>
-<define-tag report_date>2023-06-20</define-tag>
-<define-tag secrefs>CVE-2022-4883 CVE-2022-44617 CVE-2022-46285</define-tag>
-<define-tag packages>libxpm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3459.wml b/english/lts/security/2023/dla-3459.wml
deleted file mode 100644
index dfa1838d973..00000000000
--- a/english/lts/security/2023/dla-3459.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>libxpm is a library handling X PixMap image format (so called xpm files).
-xpm files are an extension of the monochrome X BitMap format specified
-in the X protocol, and are commonly used in traditional X applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4883">CVE-2022-4883</a>
-
- <p>When processing files with
- .Z or .gz extensions, the library calls external programs
- to compress and uncompress files, relying on the
- PATH environment variable to find these programs,
- which could allow a malicious user to execute other programs
- by manipulating the PATH environment variable.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44617">CVE-2022-44617</a>
-
- <p>When processing a file with width of 0
- and a very large height, some parser functions will be
- called repeatedly and can lead to an infinite loop,
- resulting in a Denial of Service in the application linked
- to the library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46285">CVE-2022-46285</a>
-
- <p>When parsing a file with a comment
- not closed, an end-of-file condition will not be detected,
- leading to an infinite loop and resulting in a
- Denial of Service in the application linked to the library.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.5.12-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libxpm packages.</p>
-
-<p>For the detailed security status of libxpm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxpm">https://security-tracker.debian.org/tracker/libxpm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3459.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3460.data b/english/lts/security/2023/dla-3460.data
deleted file mode 100644
index c2c09e56e47..00000000000
--- a/english/lts/security/2023/dla-3460.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3460-1 python-mechanize</define-tag>
-<define-tag report_date>2023-06-20</define-tag>
-<define-tag secrefs>CVE-2021-32837</define-tag>
-<define-tag packages>python-mechanize</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3460.wml b/english/lts/security/2023/dla-3460.wml
deleted file mode 100644
index 66e64f59b86..00000000000
--- a/english/lts/security/2023/dla-3460.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Erik Krogh Kristensen and Rasmus Petersen from the GitHub Security Lab
-discovered a ReDoS (Regular Expression Denial of Service) vulnerability
-in python-mechanize, a library to automate interaction with websites
-modeled after the Perl module <code>WWW::Mechanize</code>, which could lead to
-Denial of Service when parsing a malformed authentication header.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:0.2.5-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your python-mechanize packages.</p>
-
-<p>For the detailed security status of python-mechanize please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-mechanize">https://security-tracker.debian.org/tracker/python-mechanize</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3460.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3461.data b/english/lts/security/2023/dla-3461.data
deleted file mode 100644
index ed98dbe0cc7..00000000000
--- a/english/lts/security/2023/dla-3461.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3461-1 libfastjson</define-tag>
-<define-tag report_date>2023-6-20</define-tag>
-<define-tag secrefs>CVE-2020-12762</define-tag>
-<define-tag packages>libfastjson</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3461.wml b/english/lts/security/2023/dla-3461.wml
deleted file mode 100644
index cc5586a4f76..00000000000
--- a/english/lts/security/2023/dla-3461.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in libfastjson, a fast json library for C.
-Due to missing checks, out-of-bounds write might happen when parsing
-large JSON files.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.99.8-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your libfastjson packages.</p>
-
-<p>For the detailed security status of libfastjson please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libfastjson">https://security-tracker.debian.org/tracker/libfastjson</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3461.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3462.data b/english/lts/security/2023/dla-3462.data
deleted file mode 100644
index e488f515ee5..00000000000
--- a/english/lts/security/2023/dla-3462.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3462-1 wordpress</define-tag>
-<define-tag report_date>2023-6-21</define-tag>
-<define-tag secrefs>CVE-2023-2745 Bug#1036296</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3462.wml b/english/lts/security/2023/dla-3462.wml
deleted file mode 100644
index 9714573e0be..00000000000
--- a/english/lts/security/2023/dla-3462.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been addressed in Wordpress, a
-popular content management framework.</p>
-
-<p>WordPress Core is vulnerable to Directory Traversal via the ‘wp_lang’
-parameter. This allows unauthenticated attackers to access and load arbitrary
-translation files. In cases where an attacker is able to upload a crafted
-translation file onto the site, such as via an upload form, this could be also
-used to perform a Cross-Site Scripting attack.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.0.19+dfsg1-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3462.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3463.data b/english/lts/security/2023/dla-3463.data
deleted file mode 100644
index a249d0c5b46..00000000000
--- a/english/lts/security/2023/dla-3463.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3463-1 opensc</define-tag>
-<define-tag report_date>2023-06-21</define-tag>
-<define-tag secrefs>CVE-2019-6502 CVE-2021-42779 CVE-2021-42780 CVE-2021-42781 CVE-2021-42782 CVE-2023-2977 Bug#1037021</define-tag>
-<define-tag packages>opensc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3463.wml b/english/lts/security/2023/dla-3463.wml
deleted file mode 100644
index 60e7d799461..00000000000
--- a/english/lts/security/2023/dla-3463.wml
+++ /dev/null
@@ -1,61 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in opensc, a set of libraries and
-utilities to access smart cards, which could lead to application crash
-or information leak.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6502">CVE-2019-6502</a>
-
- <p>Dhiraj Mishra discovered a minor memory leak in the <code>eidenv(1)</code> CLI
- utility on an error-case.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42779">CVE-2021-42779</a>
-
- <p>A heap use after free vulnerability was discovered in
- <code>sc_file_valid()</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42780">CVE-2021-42780</a>
-
- <p>An use after return vulnerability was discovered in <code>insert_pin()</code>,
- which could potentially crash programs using the library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42781">CVE-2021-42781</a>
-
- <p>Multiple heap buffer overflow vulnerabilities were discovered in
- <code>pkcs15-oberthur.c</code>, which could potentially crash programs using the
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42782">CVE-2021-42782</a>
-
- <p>Multiple stack buffer overflow vulnerabilities were discovered in
- various places, which could potentially crash programs using the
- library.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2977">CVE-2023-2977</a>
-
- <p>A buffer overrun vulnerability was discovered in pkcs15
- <code>cardos_have_verifyrc_package()</code>, which could lead to crash or
- information leak via smart card package with a malicious ASN1
- context.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.19.0-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your opensc packages.</p>
-
-<p>For the detailed security status of opensc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/opensc">https://security-tracker.debian.org/tracker/opensc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3463.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3464.data b/english/lts/security/2023/dla-3464.data
deleted file mode 100644
index 04795234788..00000000000
--- a/english/lts/security/2023/dla-3464.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3464-1 xmltooling</define-tag>
-<define-tag report_date>2023-06-21</define-tag>
-<define-tag secrefs>Bug#1037948 not yet available</define-tag>
-<define-tag packages>xmltooling</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3464.wml b/english/lts/security/2023/dla-3464.wml
deleted file mode 100644
index 0d439663110..00000000000
--- a/english/lts/security/2023/dla-3464.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Jurien de Jong discovered that the parsing of KeyInfo elements within the
-XMLTooling library may result in server-side request forgery.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.0.4-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your xmltooling packages.</p>
-
-<p>For the detailed security status of xmltooling please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xmltooling">https://security-tracker.debian.org/tracker/xmltooling</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3464.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3465.data b/english/lts/security/2023/dla-3465.data
deleted file mode 100644
index ffdc6359b35..00000000000
--- a/english/lts/security/2023/dla-3465.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3465-1 minidlna</define-tag>
-<define-tag report_date>2023-6-21</define-tag>
-<define-tag secrefs>CVE-2023-33476</define-tag>
-<define-tag packages>minidlna</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3465.wml b/english/lts/security/2023/dla-3465.wml
deleted file mode 100644
index bf0036044b8..00000000000
--- a/english/lts/security/2023/dla-3465.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A heap-based buffer overflow vulnerability was found in the HTTP chunk
-parsing code of minidlna, a lightweight DLNA/UPnP-AV server, which may
-result in denial of service or the execution of arbitrary code.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.2.1+dfsg-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your minidlna packages.</p>
-
-<p>For the detailed security status of minidlna please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/minidlna">https://security-tracker.debian.org/tracker/minidlna</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3465.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3466.data b/english/lts/security/2023/dla-3466.data
deleted file mode 100644
index 4c5569c00fd..00000000000
--- a/english/lts/security/2023/dla-3466.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3466-1 avahi</define-tag>
-<define-tag report_date>2023-06-21</define-tag>
-<define-tag secrefs>CVE-2021-3468 Bug#984938</define-tag>
-<define-tag packages>avahi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3466.wml b/english/lts/security/2023/dla-3466.wml
deleted file mode 100644
index 030dadd62e8..00000000000
--- a/english/lts/security/2023/dla-3466.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Avahi a free zero-configuration networking (zeroconf) implementation,
-including a system for multicast DNS/DNS-SD service discovery, was
-affected by a Deny of Service. The event used to signal the termination of
-the client connection on the avahi Unix socket is not correctly handled
-in the client_work function, allowing a local attacker to trigger
-an infinite loop.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.7-4+deb10u3.</p>
-
-<p>We recommend that you upgrade your avahi packages.</p>
-
-<p>For the detailed security status of avahi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/avahi">https://security-tracker.debian.org/tracker/avahi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3466.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3467.data b/english/lts/security/2023/dla-3467.data
deleted file mode 100644
index f600ef2daa9..00000000000
--- a/english/lts/security/2023/dla-3467.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3467-1 hsqldb</define-tag>
-<define-tag report_date>2023-6-22</define-tag>
-<define-tag secrefs>CVE-2023-1183</define-tag>
-<define-tag packages>hsqldb</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3467.wml b/english/lts/security/2023/dla-3467.wml
deleted file mode 100644
index 2ae86b85179..00000000000
--- a/english/lts/security/2023/dla-3467.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gregor Kopf of Secfault Security GmbH discovered that HSQLDB, a Java SQL
-database engine, allowed the execution of spurious scripting commands in
-.script and .log files. Hsqldb supports a <q>SCRIPT</q> keyword which is
-normally used to record the commands input by the database admin to output
-such a script. In combination with LibreOffice, an attacker could craft an
-odb containing a "database/script" file which itself contained a SCRIPT
-command where the contents of the file could be written to a new file whose
-location was determined by the attacker.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.4.1-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your hsqldb packages.</p>
-
-<p>For the detailed security status of hsqldb please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/hsqldb">https://security-tracker.debian.org/tracker/hsqldb</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3467.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3468.data b/english/lts/security/2023/dla-3468.data
deleted file mode 100644
index 151a12e159a..00000000000
--- a/english/lts/security/2023/dla-3468.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3468-1 hsqldb1.8.0</define-tag>
-<define-tag report_date>2023-6-22</define-tag>
-<define-tag secrefs>CVE-2023-1183</define-tag>
-<define-tag packages>hsqldb1.8.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3468.wml b/english/lts/security/2023/dla-3468.wml
deleted file mode 100644
index 9860f1989ff..00000000000
--- a/english/lts/security/2023/dla-3468.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Gregor Kopf of Secfault Security GmbH discovered that HSQLDB, a Java SQL
-database engine, allowed the execution of spurious scripting commands in
-.script and .log files. Hsqldb supports a <q>SCRIPT</q> keyword which is
-normally used to record the commands input by the database admin to output
-such a script. In combination with LibreOffice, an attacker could craft an
-odb containing a "database/script" file which itself contained a SCRIPT
-command where the contents of the file could be written to a new file whose
-location was determined by the attacker.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.8.0.10+dfsg-10+deb10u1.</p>
-
-<p>We recommend that you upgrade your hsqldb1.8.0 packages.</p>
-
-<p>For the detailed security status of hsqldb1.8.0 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/hsqldb1.8.0">https://security-tracker.debian.org/tracker/hsqldb1.8.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3468.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3469.data b/english/lts/security/2023/dla-3469.data
deleted file mode 100644
index 91a0ad3df6c..00000000000
--- a/english/lts/security/2023/dla-3469.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3469-1 lua5.3</define-tag>
-<define-tag report_date>2023-06-23</define-tag>
-<define-tag secrefs>CVE-2019-6706 CVE-2020-24370 Bug#920321 Bug#988734</define-tag>
-<define-tag packages>lua5.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3469.wml b/english/lts/security/2023/dla-3469.wml
deleted file mode 100644
index 6124048279e..00000000000
--- a/english/lts/security/2023/dla-3469.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Issues were found in lua5.3, a powerful, light-weight programming
-language designed for extending applications, which may result in denial
-of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-6706">CVE-2019-6706</a>
-
- <p>Fady Osman discovered a heap-user-after-free vulnerability in
- <code>lua_upvaluejoin()</code> in <code>lapi.c</code>, which might
- result in denial of service or potentially arbitary code execution
- upon calling <code>debug.upvaluejoin()</code> with specific
- arguments.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24370">CVE-2020-24370</a>
-
- <p>Yongheng Chen discovered a negation overflow and segmentation fault
- issue in <code>getlocal()</code> and <code>setlocal()</code>, as
- demonstrated by <code>getlocal(3,2^31)</code>.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.3.3-1.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your lua5.3 packages.</p>
-
-<p>For the detailed security status of lua5.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lua5.3">https://security-tracker.debian.org/tracker/lua5.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3469.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3470.data b/english/lts/security/2023/dla-3470.data
deleted file mode 100644
index 0bacee9d72b..00000000000
--- a/english/lts/security/2023/dla-3470.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3470-1 owslib</define-tag>
-<define-tag report_date>2023-06-25</define-tag>
-<define-tag secrefs>CVE-2023-27476 bug#1034182</define-tag>
-<define-tag packages>owslib</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3470.wml b/english/lts/security/2023/dla-3470.wml
deleted file mode 100644
index 8317a750ce5..00000000000
--- a/english/lts/security/2023/dla-3470.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In OWSLib, a Python client library for Open Geospatial web services,
-the XML parser did not disable entity resolution which could lead to
-arbitrary file reads from an attacker-controlled XML payload.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.17.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your owslib packages.</p>
-
-<p>For the detailed security status of owslib please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/owslib">https://security-tracker.debian.org/tracker/owslib</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3470.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3471.data b/english/lts/security/2023/dla-3471.data
deleted file mode 100644
index 4148ad26e83..00000000000
--- a/english/lts/security/2023/dla-3471.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3471-1 c-ares</define-tag>
-<define-tag report_date>2023-06-26</define-tag>
-<define-tag secrefs>CVE-2023-31130 CVE-2023-32067</define-tag>
-<define-tag packages>c-ares</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3471.wml b/english/lts/security/2023/dla-3471.wml
deleted file mode 100644
index d918cb0b6a4..00000000000
--- a/english/lts/security/2023/dla-3471.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vunerabilities were discovered in c-ares, an asynchronous name
-resolver library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31130">CVE-2023-31130</a>
-
- <p>ares_inet_net_pton() is found to be vulnerable to a buffer underflow
- for certain ipv6 addresses, in particular "0::00:00:00/2" was found
- to cause an issue. c-ares only uses this function internally for
- configuration purposes, however external usage for other purposes may
- cause more severe issues.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32067">CVE-2023-32067</a>
-
- <p>Target resolver may erroneously interprets a malformed UDP packet
- with a length of 0 as a graceful shutdown of the connection, which
- could cause a denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.14.0-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your c-ares packages.</p>
-
-<p>For the detailed security status of c-ares please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/c-ares">https://security-tracker.debian.org/tracker/c-ares</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3471.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3472.data b/english/lts/security/2023/dla-3472.data
deleted file mode 100644
index 14a79be4ddd..00000000000
--- a/english/lts/security/2023/dla-3472.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3472-1 libx11</define-tag>
-<define-tag report_date>2023-06-26</define-tag>
-<define-tag secrefs>CVE-2023-3138 bug#1038133</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3472.wml b/english/lts/security/2023/dla-3472.wml
deleted file mode 100644
index 941bbb07c70..00000000000
--- a/english/lts/security/2023/dla-3472.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Missing input validation in various functions may have resulted in
-denial of service in various functions provided by libx11, the X11
-client-side library.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:1.6.7-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>For the detailed security status of libx11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libx11">https://security-tracker.debian.org/tracker/libx11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3472.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3473.data b/english/lts/security/2023/dla-3473.data
deleted file mode 100644
index 78e4aa11097..00000000000
--- a/english/lts/security/2023/dla-3473.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3473-1 docker-registry</define-tag>
-<define-tag report_date>2023-06-29</define-tag>
-<define-tag secrefs>CVE-2023-2253 Bug#1035956</define-tag>
-<define-tag packages>docker-registry</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3473.wml b/english/lts/security/2023/dla-3473.wml
deleted file mode 100644
index f4e37bc08cd..00000000000
--- a/english/lts/security/2023/dla-3473.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was found in the '/v2/_catalog' endpoint in
-'distribution/distribution', which accepts a parameter to control
-the maximum number of records returned (query string: 'n').
-This vulnerability allows a malicious user to
-submit an unreasonably large value for 'n',
-causing the allocation of a massive string array,
-possibly causing a denial of service through excessive use of memory.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.6.2~ds1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your docker-registry packages.</p>
-
-<p>For the detailed security status of docker-registry please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/docker-registry">https://security-tracker.debian.org/tracker/docker-registry</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3473.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3474.data b/english/lts/security/2023/dla-3474.data
deleted file mode 100644
index 57d4f63ed9a..00000000000
--- a/english/lts/security/2023/dla-3474.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3474-1 systemd</define-tag>
-<define-tag report_date>2023-06-29</define-tag>
-<define-tag secrefs>CVE-2022-3821 bug#1021644</define-tag>
-<define-tag packages>systemd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3474.wml b/english/lts/security/2023/dla-3474.wml
deleted file mode 100644
index 656396c54fd..00000000000
--- a/english/lts/security/2023/dla-3474.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overrun in format_timespan() has been fixed
-in systemd, the default init system in Debian.
-
-Additionally, fixes for getting property OnExternalPower via D-Bus
-and for a memory leak on daemon-reload are also included.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-241-7~deb10u10.</p>
-
-<p>We recommend that you upgrade your systemd packages.</p>
-
-<p>For the detailed security status of systemd please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/systemd">https://security-tracker.debian.org/tracker/systemd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3474.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3475.data b/english/lts/security/2023/dla-3475.data
deleted file mode 100644
index 286023c882f..00000000000
--- a/english/lts/security/2023/dla-3475.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3475-1 trafficserver</define-tag>
-<define-tag report_date>2023-06-30</define-tag>
-<define-tag secrefs>CVE-2022-47184 CVE-2023-30631 CVE-2023-33933 bug#1038248</define-tag>
-<define-tag packages>trafficserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3475.wml b/english/lts/security/2023/dla-3475.wml
deleted file mode 100644
index 9a0107179ef..00000000000
--- a/english/lts/security/2023/dla-3475.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Apache Traffic Server,
-a reverse and forward proxy server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-47184">CVE-2022-47184</a>
-
- <p>The TRACE method can be used to disclose network information.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-30631">CVE-2023-30631</a>
-
- <p>Configuration option to block the PUSH method in ATS didn't work.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33933">CVE-2023-33933</a>
-
- <p>s3_auth plugin problem with hash calculation.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.1.7-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your trafficserver packages.</p>
-
-<p>For the detailed security status of trafficserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/trafficserver">https://security-tracker.debian.org/tracker/trafficserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3475.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3476.data b/english/lts/security/2023/dla-3476.data
deleted file mode 100644
index c1f02eeae6a..00000000000
--- a/english/lts/security/2023/dla-3476.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3476-1 cups</define-tag>
-<define-tag report_date>2023-6-30</define-tag>
-<define-tag secrefs>CVE-2023-34241</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3476.wml b/english/lts/security/2023/dla-3476.wml
deleted file mode 100644
index 9c43dc1ddb9..00000000000
--- a/english/lts/security/2023/dla-3476.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in cups, the Common UNIX Printing System(tm).
-Due to a use-after-free bug an attacker could cause a denial-of-service.
-In case of having access to the log files, an attacker could also
-exfiltrate private keys or other sensitive information from the cups
-daemon.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.2.10-6+deb10u8.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>For the detailed security status of cups please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cups">https://security-tracker.debian.org/tracker/cups</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3476.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3477.data b/english/lts/security/2023/dla-3477.data
deleted file mode 100644
index cabd41564d0..00000000000
--- a/english/lts/security/2023/dla-3477.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3477-1 python3.7</define-tag>
-<define-tag report_date>2023-06-30</define-tag>
-<define-tag secrefs>CVE-2015-20107 CVE-2020-10735 CVE-2021-3426 CVE-2021-3733 CVE-2021-3737 CVE-2021-4189 CVE-2022-45061</define-tag>
-<define-tag packages>python3.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3477.wml b/english/lts/security/2023/dla-3477.wml
deleted file mode 100644
index 5a21ee52d9b..00000000000
--- a/english/lts/security/2023/dla-3477.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in the Python3 interpreter.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-20107">CVE-2015-20107</a>
-
- <p>The mailcap module did not add escape characters into commands
- discovered in the system mailcap file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10735">CVE-2020-10735</a>
-
- <p>Prevent DoS with very large int.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3426">CVE-2021-3426</a>
-
- <p>Remove the pydoc getfile feature which could be abused to read
- arbitrary files on the disk.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3733">CVE-2021-3733</a>
-
- <p>Regular Expression Denial of Service in urllib's AbstractBasicAuthHandler class.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3737">CVE-2021-3737</a>
-
- <p>Infinite loop in the HTTP client code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4189">CVE-2021-4189</a>
-
- <p>Make ftplib not trust the PASV response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-45061">CVE-2022-45061</a>
-
- <p>Quadratic time in the IDNA decoder.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.7.3-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your python3.7 packages.</p>
-
-<p>For the detailed security status of python3.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.7">https://security-tracker.debian.org/tracker/python3.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3477.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3478.data b/english/lts/security/2023/dla-3478.data
deleted file mode 100644
index a2fa3174d67..00000000000
--- a/english/lts/security/2023/dla-3478.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3478-1 yajl</define-tag>
-<define-tag report_date>2023-07-02</define-tag>
-<define-tag secrefs>CVE-2023-33460 Bug#1039984</define-tag>
-<define-tag packages>yajl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3478.wml b/english/lts/security/2023/dla-3478.wml
deleted file mode 100644
index b4e20264b5f..00000000000
--- a/english/lts/security/2023/dla-3478.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A memory leak has been found in yajl, a JSON parser / small validating
-JSON generator written in ANSI C, which might allow an attacker to cause
-an out of memory situation and potentially causing a crash.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.1.0-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your yajl packages.</p>
-
-<p>For the detailed security status of yajl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/yajl">https://security-tracker.debian.org/tracker/yajl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3478.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3479.data b/english/lts/security/2023/dla-3479.data
deleted file mode 100644
index 26ee495392e..00000000000
--- a/english/lts/security/2023/dla-3479.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3479-1 golang-yaml.v2</define-tag>
-<define-tag report_date>2023-07-05</define-tag>
-<define-tag secrefs>CVE-2021-4235 CVE-2022-3064</define-tag>
-<define-tag packages>golang-yaml.v2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3479.wml b/english/lts/security/2023/dla-3479.wml
deleted file mode 100644
index 797d30792cd..00000000000
--- a/english/lts/security/2023/dla-3479.wml
+++ /dev/null
@@ -1,40 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two denial of service vulnerabilities have been discovered in
-golang-yaml.v2, a library which provides YAML support for the Go
-language.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-4235">CVE-2021-4235</a>
-
- <p>Due to unbounded alias chasing, a maliciously crafted YAML file can
- cause the system to consume significant system resources. If parsing
- user input, this may be used as a denial of service vector.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3064">CVE-2022-3064</a>
-
- <p>Parsing malicious or large YAML documents can consume excessive
- amounts of CPU or memory.</p>
-
-<p>Thanks to Scarlett Moore for working on preparing this update.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.2.2-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your golang-yaml.v2 packages.</p>
-
-<p>For the detailed security status of golang-yaml.v2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/golang-yaml.v2">https://security-tracker.debian.org/tracker/golang-yaml.v2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3479.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3480.data b/english/lts/security/2023/dla-3480.data
deleted file mode 100644
index 84c79701bfb..00000000000
--- a/english/lts/security/2023/dla-3480.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3480-1 ruby-redcloth</define-tag>
-<define-tag report_date>2023-07-17</define-tag>
-<define-tag secrefs>CVE-2023-31606 Bug#1040488</define-tag>
-<define-tag packages>ruby-redcloth</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3480.wml b/english/lts/security/2023/dla-3480.wml
deleted file mode 100644
index 4a550d9a30f..00000000000
--- a/english/lts/security/2023/dla-3480.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A Regular Expression Denial of Service (ReDoS) issue
-was discovered in the sanitize_html function of redcloth gem.
-This vulnerability allows attackers to cause a Denial of Service (DoS)
-via supplying a crafted payload.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.3.2-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-redcloth packages.</p>
-
-<p>For the detailed security status of ruby-redcloth please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-redcloth">https://security-tracker.debian.org/tracker/ruby-redcloth</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3480.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3481.data b/english/lts/security/2023/dla-3481.data
deleted file mode 100644
index cc89bc10c69..00000000000
--- a/english/lts/security/2023/dla-3481.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3481-1 libusrsctp</define-tag>
-<define-tag report_date>2023-07-17</define-tag>
-<define-tag secrefs>CVE-2019-20503 Bug#953270</define-tag>
-<define-tag packages>libusrsctp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3481.wml b/english/lts/security/2023/dla-3481.wml
deleted file mode 100644
index 95efb117946..00000000000
--- a/english/lts/security/2023/dla-3481.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds read was found in sctp_load_addresses_from_init.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.9.3.0+20190127-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your libusrsctp packages.</p>
-
-<p>For the detailed security status of libusrsctp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libusrsctp">https://security-tracker.debian.org/tracker/libusrsctp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3481.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3482.data b/english/lts/security/2023/dla-3482.data
deleted file mode 100644
index 1d709b72358..00000000000
--- a/english/lts/security/2023/dla-3482.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3482-1 debian-archive-keyring</define-tag>
-<define-tag report_date>2023-07-07</define-tag>
-<define-tag packages>debian-archive-keyring</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3482.wml b/english/lts/security/2023/dla-3482.wml
deleted file mode 100644
index a73c6fff264..00000000000
--- a/english/lts/security/2023/dla-3482.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-archive-keyring is a package containing GnuPG archive keys of the Debian
-archive. New GPG-keys are being constantly added with every new Debian release.</p>
-
-<p>For Debian 10 buster, GPG-keys for 12/bullseye Debian release are added
-in the version 2019.1+deb10u2.</p>
-
-<p>We recommend that you upgrade your debian-archive-keyring packages only if you
-need to work with packages from 12/bullseye release.</p>
-
-<p>For the detailed security status of debian-archive-keyring please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/debian-archive-keyring">https://security-tracker.debian.org/tracker/debian-archive-keyring</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3482.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3483.data b/english/lts/security/2023/dla-3483.data
deleted file mode 100644
index 2b0817ee4a2..00000000000
--- a/english/lts/security/2023/dla-3483.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3483-1 nsis</define-tag>
-<define-tag report_date>2023-07-07</define-tag>
-<define-tag secrefs>CVE-2023-37378</define-tag>
-<define-tag packages>nsis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3483.wml b/english/lts/security/2023/dla-3483.wml
deleted file mode 100644
index 48bb914fee0..00000000000
--- a/english/lts/security/2023/dla-3483.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the Nullsoft Scriptable Install System (NSIS)
-before version 3.09 mishandles access control for the uninstaller
-directory.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.04-1+deb9u1.</p>
-
-<p>We recommend that you upgrade your nsis packages.</p>
-
-<p>For the detailed security status of nsis please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nsis">https://security-tracker.debian.org/tracker/nsis</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3483.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3484.data b/english/lts/security/2023/dla-3484.data
deleted file mode 100644
index 6048a8a674c..00000000000
--- a/english/lts/security/2023/dla-3484.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3484-1 firefox-esr</define-tag>
-<define-tag report_date>2023-07-08</define-tag>
-<define-tag secrefs>CVE-2023-37201 CVE-2023-37202 CVE-2023-37207 CVE-2023-37208 CVE-2023-37211</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3484.wml b/english/lts/security/2023/dla-3484.wml
deleted file mode 100644
index 27d84a97e50..00000000000
--- a/english/lts/security/2023/dla-3484.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code or spoofing.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.13.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3484.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3485.data b/english/lts/security/2023/dla-3485.data
deleted file mode 100644
index c6078acc2fc..00000000000
--- a/english/lts/security/2023/dla-3485.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3485-1 php-cas</define-tag>
-<define-tag report_date>2023-07-08</define-tag>
-<define-tag secrefs>CVE-2022-39369 Bug#1023571</define-tag>
-<define-tag packages>php-cas</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3485.wml b/english/lts/security/2023/dla-3485.wml
deleted file mode 100644
index 0132d1eb6ce..00000000000
--- a/english/lts/security/2023/dla-3485.wml
+++ /dev/null
@@ -1,80 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in phpCAS, a Central Authentication
-Service client library in php, which may allow an attacker to gain
-access to a victim's account on a vulnerable CASified service without
-victim's knowledge, when the victim visits attacker's website while
-being logged in to the same CAS server.</p>
-
-<p>The fix for this vulnerabilty requires an API breaking change in php-cas
-and will require that software using the library be updated.</p>
-
-<p>For buster, all packages in the Debian repositories which are using
-php-cas have been updated, though additional manual configuration is to
-be expected, as php-cas needs additional site information -- the service
-base URL -- for it to function. The DLAs for the respective packages
-will have additional information, as well as the package's NEWS files.</p>
-
-<p>For 3rd party software using php-cas, please be note that upstream
-provided following instructions how to update this software [1]:</p>
-
-<p>phpCAS now requires an additional service base URL argument when constructing
-the client class. It accepts any argument of:</p>
-
-<p>1. A service base URL string. The service URL discovery will always use this
- server name (protocol, hostname and port number) without using any external
- host names.
-2. An array of service base URL strings. The service URL discovery will check
- against this list before using the auto discovered base URL. If there is no
- match, the first base URL in the array will be used as the default. This
- option is helpful if your PHP website is accessible through multiple domains
- without a canonical name, or through both HTTP and HTTPS.
-3. A class that implements CAS_ServiceBaseUrl_Interface. If you need to
- customize the base URL discovery behavior, you can pass in a class that
- implements the interface.</p>
-
-<p>Constructing the client class is usually done with phpCAS::client().</p>
-
-<p>For example, using the first possiblity:
- phpCAS::client(CAS_VERSION_2_0, $cas_host, $cas_port, $cas_context);
-could become:
- phpCAS::client(CAS_VERSION_2_0, $cas_host, $cas_port, $cas_context, "https://casified-service.example.org:8080");</p>
-
-
-<p>Details of the vulnerability:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39369">CVE-2022-39369</a>
-
- <p>The phpCAS library uses HTTP headers to determine the service URL used
- to validate tickets. This allows an attacker to control the host header
- and use a valid ticket granted for any authorized service in the same
- SSO realm (CAS server) to authenticate to the service protected by
- phpCAS. Depending on the settings of the CAS server service registry in
- worst case this may be any other service URL (if the allowed URLs are
- configured to "^(https)://.*") or may be strictly limited to known and
- authorized services in the same SSO federation if proper URL service
- validation is applied.</p>
-
-<p>[1] <a href="https://github.com/apereo/phpCAS/blob/f3db27efd1f5020e71f2116f637a25cc9dbda1e3/docs/Upgrading#L1C1-L1C1">https://github.com/apereo/phpCAS/blob/f3db27efd1f5020e71f2116f637a25cc9dbda1e3/docs/Upgrading#L1C1-L1C1</a></p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.6-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your php-cas packages.</p>
-
-<p>For the detailed security status of php-cas please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-cas">https://security-tracker.debian.org/tracker/php-cas</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3485.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3486.data b/english/lts/security/2023/dla-3486.data
deleted file mode 100644
index 9da0a75a90d..00000000000
--- a/english/lts/security/2023/dla-3486.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3486-1 ocsinventory-server</define-tag>
-<define-tag report_date>2023-07-08</define-tag>
-<define-tag packages>ocsinventory-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3486.wml b/english/lts/security/2023/dla-3486.wml
deleted file mode 100644
index bb3b80adef9..00000000000
--- a/english/lts/security/2023/dla-3486.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The source package ocsinventory-server has been updated to address the
-API change in php-cas due to <a href="https://security-tracker.debian.org/tracker/CVE-2022-39369">CVE-2022-39369</a>, see DLA 3485-1 for details.</p>
-
-<p>CAS is an optional authentication mechanism in the binary package
-ocsinventory-reports, and if used, ocsinventory-reports will stop
-working until it has been reconfigured:</p>
-
-<p>It now requires the baseURL of to-be-authenticated service to be
-configured.</p>
-
-<p>For ocsinventory-reports, this is configured with the variable
-$cas_service_base_url in the file
-/usr/share/ocsinventory-reports/backend/require/cas.config.php</p>
-
-<p>Warning: regardless of this update, ocsreports-server should only be
-used in secure and trusted environments.</p>
-
-
-<p>For Debian 10 buster, this update is available through version
-2.5+dfsg1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ocsinventory-server packages.</p>
-
-<p>For the detailed security status of ocsinventory-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ocsinventory-server">https://security-tracker.debian.org/tracker/ocsinventory-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3486.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3487.data b/english/lts/security/2023/dla-3487.data
deleted file mode 100644
index 57a2ef83d8a..00000000000
--- a/english/lts/security/2023/dla-3487.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3487-1 fusiondirectory</define-tag>
-<define-tag report_date>2023-07-08</define-tag>
-<define-tag secrefs>CVE-2022-36179 CVE-2022-36180</define-tag>
-<define-tag packages>fusiondirectory</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3487.wml b/english/lts/security/2023/dla-3487.wml
deleted file mode 100644
index bc2c32bd999..00000000000
--- a/english/lts/security/2023/dla-3487.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A potential Cross Site Scripting (XSS) vulnerablity (<a href="https://security-tracker.debian.org/tracker/CVE-2022-36180">CVE-2022-36180</a>) and
-session handling vulnerability (<a href="https://security-tracker.debian.org/tracker/CVE-2022-36179">CVE-2022-36179</a> )have been found in
-fusiondirectory, a Web Based LDAP Administration Program.</p>
-
-<p>Additionally, fusiondirectory has been updated to address the API change
-in php-cas due to <a href="https://security-tracker.debian.org/tracker/CVE-2022-39369">CVE-2022-39369</a>. see DLA 3485-1Add for details.</p>
-
-<p>Due to this, if CAS authentication is used, fusiondirectory
-will stop working until those steps are done:</p>
-
-<p>- make sure to install the updated fusiondirectory-schema package for
- buster.</p>
-
-<p>- update the fusiondirectory core schema in LDAP by running
- fusiondirectory-insert-schema -m</p>
-
-<p>- switch to using the new php-cas API by running
- fusiondirectory-setup --set-config-CasLibraryBool=TRUE</p>
-
-<p>- set the CAS ClientServiceName to the base URL of the fusiondirectory
- installation, for example:
- fusiondirectory-setup --set-config-CasClientServiceName="https://fusiondirectory.example.org/"</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.2.3-4+deb10u2.</p>
-
-<p>We recommend that you upgrade your fusiondirectory packages.</p>
-
-<p>For the detailed security status of fusiondirectory please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/fusiondirectory">https://security-tracker.debian.org/tracker/fusiondirectory</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3487.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3488.data b/english/lts/security/2023/dla-3488.data
deleted file mode 100644
index 84ed266e169..00000000000
--- a/english/lts/security/2023/dla-3488.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3488-1 node-tough-cookie</define-tag>
-<define-tag report_date>2023-07-10</define-tag>
-<define-tag secrefs>CVE-2023-26136</define-tag>
-<define-tag packages>node-tough-cookie</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3488.wml b/english/lts/security/2023/dla-3488.wml
deleted file mode 100644
index 808eb5dbd99..00000000000
--- a/english/lts/security/2023/dla-3488.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Kokorin Vsevolod discovered a Prototype Pollution vulnerability in
-node-tough-cookie, a RFC6265 Cookies and Cookie Jar library for node.js.
-The issue is due to improper handling of Cookies when using CookieJar in
-<code>rejectPublicSuffixes=false</code> mode.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.3.4+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-tough-cookie packages.</p>
-
-<p>For the detailed security status of node-tough-cookie please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-tough-cookie">https://security-tracker.debian.org/tracker/node-tough-cookie</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3488.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3489.data b/english/lts/security/2023/dla-3489.data
deleted file mode 100644
index 57ce7f61777..00000000000
--- a/english/lts/security/2023/dla-3489.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3489-1 mediawiki</define-tag>
-<define-tag report_date>2023-7-10</define-tag>
-<define-tag secrefs>CVE-2022-47927</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3489.wml b/english/lts/security/2023/dla-3489.wml
deleted file mode 100644
index f8ef8da4b24..00000000000
--- a/english/lts/security/2023/dla-3489.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue was discovered in MediaWiki, a website engine for
-collaborative work, which could result in information disclosure when
-SQLite files are created within a data directory that has weak permissions.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:1.31.16-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3489.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3490.data b/english/lts/security/2023/dla-3490.data
deleted file mode 100644
index 6bf6c291747..00000000000
--- a/english/lts/security/2023/dla-3490.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3490-1 thunderbird</define-tag>
-<define-tag report_date>2023-07-11</define-tag>
-<define-tag secrefs>CVE-2023-37201 CVE-2023-37202 CVE-2023-37207 CVE-2023-37208 CVE-2023-37211</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3490.wml b/english/lts/security/2023/dla-3490.wml
deleted file mode 100644
index 8abaeaecd49..00000000000
--- a/english/lts/security/2023/dla-3490.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.13.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3490.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3491.data b/english/lts/security/2023/dla-3491.data
deleted file mode 100644
index f083390d63d..00000000000
--- a/english/lts/security/2023/dla-3491.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3491-1 erlang</define-tag>
-<define-tag report_date>2023-7-11</define-tag>
-<define-tag secrefs>CVE-2022-37026 Bug#1024632</define-tag>
-<define-tag packages>erlang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3491.wml b/english/lts/security/2023/dla-3491.wml
deleted file mode 100644
index dce33550d1d..00000000000
--- a/english/lts/security/2023/dla-3491.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A Client Authentication Bypass vulnerability has been discovered in the
-concurrent, real-time, distributed functional language Erlang. Impacted are
-those who are running an ssl/tls/dtls server using the ssl application
-either directly or indirectly via other applications. Note that the
-vulnerability only affects servers that request client certification, that
-is sets the option {verify, verify_peer}.</p>
-
-<p>Additionally the source package elixir-lang has been rebuilt against the new
-erlang version. The rabbitmq-server package was upgraded to version 3.8.2 to
-fix an incompatibility with Erlang 22.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:22.2.7+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your erlang packages.</p>
-
-<p>For the detailed security status of erlang please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/erlang">https://security-tracker.debian.org/tracker/erlang</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3491.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3492.data b/english/lts/security/2023/dla-3492.data
deleted file mode 100644
index 6c79c51682e..00000000000
--- a/english/lts/security/2023/dla-3492.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3492-1 yajl</define-tag>
-<define-tag report_date>2023-07-11</define-tag>
-<define-tag secrefs>CVE-2017-16516 CVE-2022-24795 CVE-2023-33460 Bug#1040036</define-tag>
-<define-tag packages>yajl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3492.wml b/english/lts/security/2023/dla-3492.wml
deleted file mode 100644
index 58c478e4461..00000000000
--- a/english/lts/security/2023/dla-3492.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilties have been found in yajl, a JSON parser / small
-validating JSON generator# written in ANSI C, which potentially can
-cause memory corruption or DoS.</p>
-
-<p>The <a href="https://security-tracker.debian.org/tracker/CVE-20117-16516">CVE-20117-16516</a> had been addressed already in DLA-3478, however the
-fix has been found to be incomplete as it missed an additional memory
-leak. This update fixes that problem.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16516">CVE-2017-16516</a>
-
- <p>When a crafted JSON file is supplied to yajl, the process might
- crash with a SIGABRT in the yajl_string_decode function in
- yajl_encode.c. This results potentially in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24795">CVE-2022-24795</a>
-
- <p>The 1.x branch and the 2.x branch of `yajl` contain an integer
- overflow which leads to subsequent heap memory corruption when dealing
- with large (~2GB) inputs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33460">CVE-2023-33460</a>
-
- <p>There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse
- function, which potentially cause out-of-memory in server and cause
- crash.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.1.0-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your yajl packages.</p>
-
-<p>For the detailed security status of yajl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/yajl">https://security-tracker.debian.org/tracker/yajl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3492.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3493.data b/english/lts/security/2023/dla-3493.data
deleted file mode 100644
index 025d8e79f00..00000000000
--- a/english/lts/security/2023/dla-3493.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3493-1 symfony</define-tag>
-<define-tag report_date>2023-07-12</define-tag>
-<define-tag secrefs>CVE-2021-21424 CVE-2022-24894 CVE-2022-24895</define-tag>
-<define-tag packages>symfony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3493.wml b/english/lts/security/2023/dla-3493.wml
deleted file mode 100644
index 9616cd481fb..00000000000
--- a/english/lts/security/2023/dla-3493.wml
+++ /dev/null
@@ -1,59 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were found in symfony, a PHP framework
-for web and console applications and a set of reusable PHP components,
-which could lead to information disclosure or impersonation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21424">CVE-2021-21424</a>
-
- <p>James Isaac, Mathias Brodala and Laurent Minguet discovered that it
- was possible to enumerate users without relevant permissions due to
- different exception messages depending on whether the user existed
- or not. It was also possible to enumerate users by using a timing
- attack, by comparing time elapsed when authenticating an existing
- user and authenticating a non-existing user.</p>
-
- <p>403s are now returned whether the user exists or not if a user
- cannot switch to a user or if the user does not exist.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24894">CVE-2022-24894</a>
-
- <p>Soner Sayakci discovered that when the Symfony HTTP cache system is
- enabled, the response header might be stored with a <code>Set-Cookie</code>
- header and returned to some other clients, thereby allowing an
- attacker to retrieve the victim's session.</p>
-
- <p>The <code>HttpStore</code> constructor now takes a parameter
- containing a list of private headers that are removed from the HTTP
- response headers. The default value for this parameter is
- <code>Set-Cookie</code>, but it can be overridden or extended by the
- application.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24895">CVE-2022-24895</a>
-
- <p>Marco Squarcina discovered that CSRF tokens weren't cleared upon
- login, which could enable same-site attackers to bypass the CSRF
- protection mechanism by performing an attack similar to a
- session-fixation.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.4.22+dfsg-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your symfony packages.</p>
-
-<p>For the detailed security status of symfony please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/symfony">https://security-tracker.debian.org/tracker/symfony</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3493.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3494.data b/english/lts/security/2023/dla-3494.data
deleted file mode 100644
index 4a241aaa479..00000000000
--- a/english/lts/security/2023/dla-3494.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3494-1 ruby-doorkeeper</define-tag>
-<define-tag report_date>2023-07-12</define-tag>
-<define-tag secrefs>CVE-2023-34246</define-tag>
-<define-tag packages>ruby-doorkeeper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3494.wml b/english/lts/security/2023/dla-3494.wml
deleted file mode 100644
index b9ff4416c44..00000000000
--- a/english/lts/security/2023/dla-3494.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in ruby-doorkeeper, an OAuth2
-provider for Ruby on Rails applications. Doorkeeper automatically processed
-authorization requests without user consent for public clients that have been
-previously approved, but public clients are inherently vulnerable to
-impersonation as their identity cannot be assured.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34246">CVE-2023-34246</a>
-
- <p>Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior to
- version 5.6.6, Doorkeeper automatically processes authorization requests
- without user consent for public clients that have been previous approved.
- Public clients are inherently vulnerable to impersonation, their identity
- cannot be assured. This issue is fixed in version 5.6.6.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-4.4.2-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-doorkeeper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3494.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3495-2.data b/english/lts/security/2023/dla-3495-2.data
deleted file mode 100644
index bd7bcd87f12..00000000000
--- a/english/lts/security/2023/dla-3495-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3495-2 php-dompdf</define-tag>
-<define-tag report_date>2023-08-11</define-tag>
-<define-tag secrefs>CVE-2021-3838</define-tag>
-<define-tag packages>php-dompdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3495-2.wml b/english/lts/security/2023/dla-3495-2.wml
deleted file mode 100644
index ab58d39f71e..00000000000
--- a/english/lts/security/2023/dla-3495-2.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Ubuntu security team noted after extensive testing that DLA-3495-1
-was incomplete as one PoC for <a href="https://security-tracker.debian.org/tracker/CVE-2022-2400">CVE-2022-2400</a> (particularly the
-chroot escape) was still working on the patched version of
-the package.</p>
-
-<p>Further analysis of the upstream patch and DLA-3495-1 version
-helped to identify that the vulnerability was still present due to
-DLA 3495-1 not including commit 7adf00f9, which added chroot checks
-to one of the code path.</p>
-
-<p>Special thanks to Camila Camargo de Matos of Ubuntu security team.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.6.2+dfsg-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your php-dompdf packages.</p>
-
-<p>For the detailed security status of php-dompdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-dompdf">https://security-tracker.debian.org/tracker/php-dompdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3495-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3495.data b/english/lts/security/2023/dla-3495.data
deleted file mode 100644
index c0ea00e3f28..00000000000
--- a/english/lts/security/2023/dla-3495.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3495-1 php-dompdf</define-tag>
-<define-tag report_date>2023-07-13</define-tag>
-<define-tag secrefs>CVE-2021-3838 CVE-2022-2400 Bug##1015874</define-tag>
-<define-tag packages>php-dompdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3495.wml b/english/lts/security/2023/dla-3495.wml
deleted file mode 100644
index b982fee6767..00000000000
--- a/english/lts/security/2023/dla-3495.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilies were fixed in php-dompdf a CSS 2.1 compliant HTML
-to PDF converter, written in PHP.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3838">CVE-2021-3838</a>
-
- <p>php-dompdf was vulnerable to deserialization of Untrusted Data using
- PHAR deserialization (phar://) as url for image.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-2400">CVE-2022-2400</a>
-
- <p>php-dompdf was vulnerable to External Control of File Name bypassing
- unallowed access verification.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.6.2+dfsg-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your php-dompdf packages.</p>
-
-<p>For the detailed security status of php-dompdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php-dompdf">https://security-tracker.debian.org/tracker/php-dompdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3495.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3496.data b/english/lts/security/2023/dla-3496.data
deleted file mode 100644
index 36891439496..00000000000
--- a/english/lts/security/2023/dla-3496.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3496-1 lemonldap-ng</define-tag>
-<define-tag report_date>2023-07-14</define-tag>
-<define-tag secrefs>CVE-2023-28862</define-tag>
-<define-tag packages>lemonldap-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3496.wml b/english/lts/security/2023/dla-3496.wml
deleted file mode 100644
index b670345f813..00000000000
--- a/english/lts/security/2023/dla-3496.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Issues were discovered in Lemonldap::NG, an OpenID-Connect, CAS and SAML
-compatible Web-SSO system, which could lead to impersonation of users
-with a second factor authentication.</p>
-
-<p>Weak session ID generation in the AuthBasic handler and incorrect
-failure handling during a password check allow attackers to bypass 2FA
-verification. Any plugin that tries to deny session creation after the
-store step does not deny an AuthBasic session.</p>
-
-<p>Using the AuthBasic handler is now refused for users with a second
-factor. Admins who are *absolutely sure* that such accounts should be
-able to use AuthBasic handlers (which are password only) can append
-<code>and not $ENV{AuthBasic}</code> to the 2FA activation rules.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.2+ds-7+deb10u9.</p>
-
-<p>We recommend that you upgrade your lemonldap-ng packages.</p>
-
-<p>For the detailed security status of lemonldap-ng please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lemonldap-ng">https://security-tracker.debian.org/tracker/lemonldap-ng</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3496.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3497.data b/english/lts/security/2023/dla-3497.data
deleted file mode 100644
index bef0f226f56..00000000000
--- a/english/lts/security/2023/dla-3497.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3497-1 pypdf2</define-tag>
-<define-tag report_date>2023-07-14</define-tag>
-<define-tag secrefs>CVE-2023-36810</define-tag>
-<define-tag packages>pypdf2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3497.wml b/english/lts/security/2023/dla-3497.wml
deleted file mode 100644
index b5aae3b861f..00000000000
--- a/english/lts/security/2023/dla-3497.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Quadratic runtime with malformed PDFs missing xref marker has been fixed
-in PyPDF2, a pure Python PDF library.
-</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.26.0-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your pypdf2 packages.</p>
-
-<p>For the detailed security status of pypdf2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pypdf2">https://security-tracker.debian.org/tracker/pypdf2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3497.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3498.data b/english/lts/security/2023/dla-3498.data
deleted file mode 100644
index 8ae25780f7e..00000000000
--- a/english/lts/security/2023/dla-3498.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3498-1 bind9</define-tag>
-<define-tag report_date>2023-07-19</define-tag>
-<define-tag secrefs>CVE-2023-2828</define-tag>
-<define-tag packages>bind9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3498.wml b/english/lts/security/2023/dla-3498.wml
deleted file mode 100644
index 0ed2e6cab7a..00000000000
--- a/english/lts/security/2023/dla-3498.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial of service (DoS)
-in bind9, the popular Domain Name Server (DNS) server. Shoham Danino, Anat
-Bremler-Barr, Yehuda Afek and Yuval Shavitt discovered that a flaw in the
-cache-cleaning algorithm used in named can cause that named's configured cache
-size limit can be significantly exceeded, potentially resulting in a denial of
-service attack.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2828">CVE-2023-2828</a></li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:9.11.5.P4+dfsg-5.1+deb10u9.</p>
-
-<p>We recommend that you upgrade your bind9 packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3498.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3499.data b/english/lts/security/2023/dla-3499.data
deleted file mode 100644
index 1fc62bc3d52..00000000000
--- a/english/lts/security/2023/dla-3499.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3499-1 libapache2-mod-auth-openidc</define-tag>
-<define-tag report_date>2023-07-19</define-tag>
-<define-tag secrefs>CVE-2021-39191 CVE-2022-23527 Bug#993648 Bug#1026444</define-tag>
-<define-tag packages>libapache2-mod-auth-openidc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3499.wml b/english/lts/security/2023/dla-3499.wml
deleted file mode 100644
index 9f18dc8dd9e..00000000000
--- a/english/lts/security/2023/dla-3499.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Open Redirect vulnerabilities were found in libapache2-mod-auth-openidc,
-OpenID Connect Relying Party implementation for Apache, which could lead
-to information disclosure via phishing attacks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39191">CVE-2021-39191</a>
-
- <p>The 3rd-party init SSO functionality of <code>mod_auth_openidc</code> was
- reported to be vulnerable to an open redirect attack by supplying a
- crafted URL in the <code>target_link_uri</code> parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23527">CVE-2022-23527</a>
-
- <p>When providing a logout parameter to the redirect URI,
- <code>mod_auth_openidc</code> failed to properly check for URLs starting with
- "<code>/&bsol;t</code>", leading to an open redirect.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.3.10.2-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your libapache2-mod-auth-openidc packages.</p>
-
-<p>For the detailed security status of libapache2-mod-auth-openidc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc">https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3499.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3500.data b/english/lts/security/2023/dla-3500.data
deleted file mode 100644
index 46e50a795e2..00000000000
--- a/english/lts/security/2023/dla-3500.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3500-1 python-django</define-tag>
-<define-tag report_date>2023-07-19</define-tag>
-<define-tag secrefs>CVE-2023-36053</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3500.wml b/english/lts/security/2023/dla-3500.wml
deleted file mode 100644
index b1c03872657..00000000000
--- a/english/lts/security/2023/dla-3500.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial of service attack in
-Django, the popular Python-based web development framework.</p>
-
-<p><code>EmailValidator</code> and <code>URLValidator</code> were subject to
-potential regular expression denial of service attack via a very large number
-of domain name labels of emails and URLs.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-36053">CVE-2023-36053</a>
-
- <p>In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3,
- EmailValidator and URLValidator are subject to a potential ReDoS (regular
- expression denial of service) attack via a very large number of domain name
- labels of emails and URLs.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:1.11.29-1+deb10u9.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3500.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3501.data b/english/lts/security/2023/dla-3501.data
deleted file mode 100644
index fc574142db2..00000000000
--- a/english/lts/security/2023/dla-3501.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3501-1 renderdoc</define-tag>
-<define-tag report_date>2023-07-25</define-tag>
-<define-tag secrefs>CVE-2023-33863 CVE-2023-33864 CVE-2023-33865 Bug#1037208</define-tag>
-<define-tag packages>renderdoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3501.wml b/english/lts/security/2023/dla-3501.wml
deleted file mode 100644
index 146f94ad5b2..00000000000
--- a/english/lts/security/2023/dla-3501.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in renderdoc a stand-alone
-graphics debugging tool, which potentially allows a remote attacker
-to execute arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33863">CVE-2023-33863</a>
-
- <p>an integer overflow that results in a heap-based buffer overflow
- that might be exploitable by a remote attacker to execute arbitrary
- code on the machine that runs RenderDoc</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33864">CVE-2023-33864</a>
-
- <p>an integer underflow that results in a heap-based buffer overflow
- that might be exploitable by a remote attacker to execute arbitrary
- code on the machine that runs RenderDoc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33865">CVE-2023-33865</a>
-
- <p>a symlink vulnerability that might be exploitable by a unprivileged
- local attacker to obtain the privileges of the user who runs
- RenderDoc.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.2+dfsg-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your renderdoc packages.</p>
-
-<p>For the detailed security status of renderdoc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/renderdoc">https://security-tracker.debian.org/tracker/renderdoc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3501.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3502.data b/english/lts/security/2023/dla-3502.data
deleted file mode 100644
index cb2e72bb692..00000000000
--- a/english/lts/security/2023/dla-3502.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3502-1 python-git</define-tag>
-<define-tag report_date>2023-07-25</define-tag>
-<define-tag secrefs>CVE-2022-24439 Bug#1027163</define-tag>
-<define-tag packages>python-git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3502.wml b/english/lts/security/2023/dla-3502.wml
deleted file mode 100644
index e5aef7a42ea..00000000000
--- a/english/lts/security/2023/dla-3502.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Sam Wheating discovered that python-git, a Python library to interact
-with Git repositories, is vulnerable to shell injection due to
-improper user input validation, which makes it possible to inject a
-maliciously crafted remote URL into the clone command.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.1.11-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your python-git packages.</p>
-
-<p>For the detailed security status of python-git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-git">https://security-tracker.debian.org/tracker/python-git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3502.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3503.data b/english/lts/security/2023/dla-3503.data
deleted file mode 100644
index 691ec92d54d..00000000000
--- a/english/lts/security/2023/dla-3503.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3503-1 gst-plugins-bad1.0</define-tag>
-<define-tag report_date>2023-7-25</define-tag>
-<define-tag secrefs>CVE-2023-37329</define-tag>
-<define-tag packages>gst-plugins-bad1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3503.wml b/english/lts/security/2023/dla-3503.wml
deleted file mode 100644
index 85a2b044296..00000000000
--- a/english/lts/security/2023/dla-3503.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple multiple vulnerabilities were discovered in plugins for the
-GStreamer media framework and its codecs and demuxers, which may result in
-denial of service or potentially the execution of arbitrary code if a
-malformed media file is opened.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.4-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-bad1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-bad1.0">https://security-tracker.debian.org/tracker/gst-plugins-bad1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3503.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3504.data b/english/lts/security/2023/dla-3504.data
deleted file mode 100644
index f4eb9240ece..00000000000
--- a/english/lts/security/2023/dla-3504.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3504-1 gst-plugins-base1.0</define-tag>
-<define-tag report_date>2023-7-25</define-tag>
-<define-tag secrefs>CVE-2023-37328</define-tag>
-<define-tag packages>gst-plugins-base1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3504.wml b/english/lts/security/2023/dla-3504.wml
deleted file mode 100644
index 1e75b16e951..00000000000
--- a/english/lts/security/2023/dla-3504.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple multiple vulnerabilities were discovered in plugins for the
-GStreamer media framework and its codecs and demuxers, which may result in
-denial of service or potentially the execution of arbitrary code if a
-malformed media file is opened.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.4-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-base1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-base1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-base1.0">https://security-tracker.debian.org/tracker/gst-plugins-base1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3504.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3505.data b/english/lts/security/2023/dla-3505.data
deleted file mode 100644
index 9da0b5be0ec..00000000000
--- a/english/lts/security/2023/dla-3505.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3505-1 gst-plugins-good1.0</define-tag>
-<define-tag report_date>2023-7-25</define-tag>
-<define-tag secrefs>CVE-2023-37327</define-tag>
-<define-tag packages>gst-plugins-good1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3505.wml b/english/lts/security/2023/dla-3505.wml
deleted file mode 100644
index 59933fd43da..00000000000
--- a/english/lts/security/2023/dla-3505.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple multiple vulnerabilities were discovered in plugins for the
-GStreamer media framework and its codecs and demuxers, which may result in
-denial of service or potentially the execution of arbitrary code if a
-malformed media file is opened.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.4-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your gst-plugins-good1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-good1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-good1.0">https://security-tracker.debian.org/tracker/gst-plugins-good1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3505.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3506.data b/english/lts/security/2023/dla-3506.data
deleted file mode 100644
index c65f524105f..00000000000
--- a/english/lts/security/2023/dla-3506.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3506-1 iperf3</define-tag>
-<define-tag report_date>2023-7-25</define-tag>
-<define-tag secrefs>CVE-2023-38403 Bug#1040830</define-tag>
-<define-tag packages>iperf3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3506.wml b/english/lts/security/2023/dla-3506.wml
deleted file mode 100644
index 875725e1ee5..00000000000
--- a/english/lts/security/2023/dla-3506.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A memory allocation issue was found in iperf3, the Internet Protocol
-bandwidth measuring tool, that may cause a denial of service when
-encountering a certain invalid length value in TCP packets.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.6-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your iperf3 packages.</p>
-
-<p>For the detailed security status of iperf3 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/iperf3">https://security-tracker.debian.org/tracker/iperf3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3506.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3507.data b/english/lts/security/2023/dla-3507.data
deleted file mode 100644
index 2f33673b749..00000000000
--- a/english/lts/security/2023/dla-3507.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3507-1 pandoc</define-tag>
-<define-tag report_date>2023-07-25</define-tag>
-<define-tag secrefs>CVE-2023-35936 CVE-2023-38745 Bug#1041976</define-tag>
-<define-tag packages>pandoc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3507.wml b/english/lts/security/2023/dla-3507.wml
deleted file mode 100644
index e2143ccfd98..00000000000
--- a/english/lts/security/2023/dla-3507.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Arbitrary file write vulnerabilities were discovered in pandoc, an
-Haskell library and CLI tool for converting from one markup format to
-another. These vulnerabilities can be triggered by providing a
-specially crafted image element in the input when generating files using
-the <code>--extract-media</code> option or outputting to PDF format, and allow an
-attacker to create or overwrite arbitrary files on the system (depending
-on the privileges of the process running pandoc).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35936">CVE-2023-35936</a>
-
- <p>Entroy C discovered that by appending percent-encoded directory
- components at the end of malicious <code>data:</code> URI, an attacker could
- trick pandoc into creating or overwriting arbitrary files on the
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-38745">CVE-2023-38745</a>
-
- <p>Guilhem Moulin discovered that the upstream fix for
- <a href="https://security-tracker.debian.org/tracker/CVE-2023-35936">CVE-2023-35936</a> was
- incomplete, namely that the vulnerability remained when encoding '<code>&percnt;</code>'
- characters as '<code>&percnt;25</code>'.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.2.1-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your pandoc packages.</p>
-
-<p>For the detailed security status of pandoc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pandoc">https://security-tracker.debian.org/tracker/pandoc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3507.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3508.data b/english/lts/security/2023/dla-3508.data
deleted file mode 100644
index fc245de0744..00000000000
--- a/english/lts/security/2023/dla-3508.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3508-1 linux</define-tag>
-<define-tag report_date>2023-7-27</define-tag>
-<define-tag secrefs>CVE-2023-1380 CVE-2023-2002 CVE-2023-2007 CVE-2023-2269 CVE-2023-3090 CVE-2023-3111 CVE-2023-3141 CVE-2023-3268 CVE-2023-3338 CVE-2023-20593 CVE-2023-31084 CVE-2023-32233 CVE-2023-34256 CVE-2023-35788 CVE-2023-35823 CVE-2023-35824 CVE-2023-35828</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3508.wml b/english/lts/security/2023/dla-3508.wml
deleted file mode 100644
index 309c4911fb3..00000000000
--- a/english/lts/security/2023/dla-3508.wml
+++ /dev/null
@@ -1,159 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1380">CVE-2023-1380</a>
-
- <p>Jisoo Jang reported a heap out-of-bounds read in the brcmfmac
- Wi-Fi driver. On systems using this driver, a local user could
- exploit this to read sensitive information or to cause a denial of
- service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2002">CVE-2023-2002</a>
-
- <p>Ruiahn Li reported an incorrect permissions check in the Bluetooth
- subsystem. A local user could exploit this to reconfigure local
- Bluetooth interfaces, resulting in information leaks, spoofing, or
- denial of service (loss of connection).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2007">CVE-2023-2007</a>
-
- <p>Lucas Leong (@_wmliang_) and Reno Robert of Trend Micro Zero Day
- Initiative discovered a time-of-check-to-time-of-use flaw in the
- dpt_i2o SCSI controller driver. A local user with access to a
- SCSI device using this driver could exploit this for privilege
- escalation.</p>
-
- <p>This flaw has been mitigated by removing support for the I2OUSRCMD
- operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2269">CVE-2023-2269</a>
-
- <p>Zheng Zhang reported that improper handling of locking in the
- device mapper implementation may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3090">CVE-2023-3090</a>
-
- <p>It was discovered that missing initialization in ipvlan networking
- may lead to an out-of-bounds write vulnerability, resulting in
- denial of service or potentially the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3111">CVE-2023-3111</a>
-
- <p>The TOTE Robot tool found a flaw in the Btrfs filesystem driver
- that can lead to a use-after-free. It's unclear whether an
- unprivileged user can exploit this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3141">CVE-2023-3141</a>
-
- <p>A flaw was discovered in the r592 memstick driver that could lead
- to a use-after-free after the driver is removed or unbound from a
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3268">CVE-2023-3268</a>
-
- <p>It was discovered that an out-of-bounds memory access in relayfs
- could result in denial of service or an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3338">CVE-2023-3338</a>
-
- <p>Ornaghi Davide discovered a flaw in the DECnet protocol
- implementation which could lead to a null pointer dereference or
- use-after-free. A local user can exploit this to cause a denial
- of service (crash or memory corruption) and probably for privilege
- escalation.</p>
-
- <p>This flaw has been mitigated by removing the DECnet protocol
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-20593">CVE-2023-20593</a>
-
- <p>Tavis Ormandy discovered that under specific microarchitectural
- circumstances, a vector register in AMD <q>Zen 2</q> CPUs may not be
- written to 0 correctly. This flaw allows an attacker to leak
- sensitive information across concurrent processes, hyper threads
- and virtualized guests.</p>
-
- <p>For details please refer to
- <a href="https://lock.cmpxchg8b.com/zenbleed.html">https://lock.cmpxchg8b.com/zenbleed.html</a> and
- <a href="https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8">
- https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8</a>.</p>
-
- <p>This issue can also be mitigated by a microcode update through the
- amd64-microcode package or a system firmware (BIOS/UEFI) update.
- However, the initial microcode release by AMD only provides
- updates for second generation EPYC CPUs. Various Ryzen CPUs are
- also affected, but no updates are available yet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31084">CVE-2023-31084</a>
-
- <p>It was discovered that the DVB Core driver does not properly
- handle locking of certain events, allowing a local user to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32233">CVE-2023-32233</a>
-
- <p>Patryk Sondej and Piotr Krysiuk discovered a use-after-free flaw
- in the Netfilter nf_tables implementation when processing batch
- requests, which may result in local privilege escalation for a
- user with the CAP_NET_ADMIN capability in any user or network
- namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34256">CVE-2023-34256</a>
-
- <p>The syzbot tool found a time-of-check-to-time-of-use flaw in the
- ext4 filesystem driver. An attacker able to mount a disk image or
- device that they can also write to directly could exploit this to
- cause an out-of-bounds read, possibly resulting in a leak of
- sensitive information or denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35788">CVE-2023-35788</a>
-
- <p>Hangyu Hua discovered an out-of-bounds write vulnerability in the
- Flower classifier which may result in denial of service or the
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35823">CVE-2023-35823</a>
-
- <p>A flaw was discovered in the saa7134 media driver that could lead
- to a use-after-free after the driver is removed or unbound from a
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35824">CVE-2023-35824</a>
-
- <p>A flaw was discovered in the dm1105 media driver that could lead
- to a use-after-free after the driver is removed or unbound from a
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35828">CVE-2023-35828</a>
-
- <p>A flaw was discovered in the renesas_udc USB device-mode driver
- that could lead to a use-after-free after the driver is removed or
- unbound from a device. The security impact of this is unclear.</p>
-
- <p>This driver is not enabled in Debian's official kernel
- configurations.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.19.289-1.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3508.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3509.data b/english/lts/security/2023/dla-3509.data
deleted file mode 100644
index d69b5f1b47a..00000000000
--- a/english/lts/security/2023/dla-3509.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3509-1 libmail-dkim-perl</define-tag>
-<define-tag report_date>2023-7-27</define-tag>
-<define-tag secrefs>Bug#1039489</define-tag>
-<define-tag packages>libmail-dkim-perl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3509.wml b/english/lts/security/2023/dla-3509.wml
deleted file mode 100644
index 984c33992e8..00000000000
--- a/english/lts/security/2023/dla-3509.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that the domain check in libmail-dkim-perl, a Perl module to
-cryptographically identify the sender of email, compares i and d tags case
-sensitive when t=s is set on the DKIM key which causes spurious fails of
-legitimate messages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.54-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libmail-dkim-perl packages.</p>
-
-<p>For the detailed security status of libmail-dkim-perl please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libmail-dkim-perl">https://security-tracker.debian.org/tracker/libmail-dkim-perl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3509.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3510.data b/english/lts/security/2023/dla-3510.data
deleted file mode 100644
index 58e94636c0b..00000000000
--- a/english/lts/security/2023/dla-3510.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3510-1 thunderbird</define-tag>
-<define-tag report_date>2023-07-31</define-tag>
-<define-tag secrefs>CVE-2023-3417</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3510.wml b/english/lts/security/2023/dla-3510.wml
deleted file mode 100644
index 43346c4ab43..00000000000
--- a/english/lts/security/2023/dla-3510.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security issue was discovered in Thunderbird, which could result in
-spoofing of filenames of email attachments.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:102.13.1-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3510.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3511.data b/english/lts/security/2023/dla-3511.data
deleted file mode 100644
index 000f9b5c417..00000000000
--- a/english/lts/security/2023/dla-3511.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3511-1 amd64-microcode</define-tag>
-<define-tag report_date>2023-07-31</define-tag>
-<define-tag secrefs>CVE-2023-20593 Bug#1041863</define-tag>
-<define-tag packages>amd64-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3511.wml b/english/lts/security/2023/dla-3511.wml
deleted file mode 100644
index f250a064ddf..00000000000
--- a/english/lts/security/2023/dla-3511.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy discovered that under specific microarchitectural
-circumstances, a vector register in <q>Zen 2</q> CPUs may not be written to 0
-correctly. This flaw allows an attacker to leak register contents across
-concurrent processes, hyper threads and virtualized guests.</p>
-
-<p>For details please refer to
-<a href="https://lock.cmpxchg8b.com/zenbleed.html">https://lock.cmpxchg8b.com/zenbleed.html</a>
-<a href="https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8">https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8</a></p>
-
-<p>The initial microcode release by AMD only provides updates for second
-generation EPYC CPUs: Various Ryzen CPUs are also affected, but no
-updates are available yet. Fixes will be provided in a later update once
-they are released.</p>
-
-<p>For more specific details and target dates please refer to the AMD
-advisory at
-<a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html">https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html</a></p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.20230719.1+deb10u1. Additionally the update contains a fix
-for <a href="https://security-tracker.debian.org/tracker/CVE-2019-9836">CVE-2019-9836</a>.</p>
-
-<p>We recommend that you upgrade your amd64-microcode packages.</p>
-
-<p>For the detailed security status of amd64-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/amd64-microcode">https://security-tracker.debian.org/tracker/amd64-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3511.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3512.data b/english/lts/security/2023/dla-3512.data
deleted file mode 100644
index b083581a2bc..00000000000
--- a/english/lts/security/2023/dla-3512.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3512-1 linux-5.10</define-tag>
-<define-tag report_date>2023-8-2</define-tag>
-<define-tag secrefs>CVE-2023-2156 CVE-2023-3390 CVE-2023-3610 CVE-2023-20593 CVE-2023-31248 CVE-2023-35001</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3512.wml b/english/lts/security/2023/dla-3512.wml
deleted file mode 100644
index d89a55ad430..00000000000
--- a/english/lts/security/2023/dla-3512.wml
+++ /dev/null
@@ -1,78 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2156">CVE-2023-2156</a>
-
- <p>It was discovered that a flaw in the handling of the RPL protocol
- may allow an unauthenticated remote attacker to cause a denial of
- service if RPL is enabled (not by default in Debian).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3390">CVE-2023-3390</a>
-
- <p>A use-after-free flaw in the netfilter subsystem caused by
- incorrect error path handling may result in denial of service or
- privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3610">CVE-2023-3610</a>
-
- <p>A use-after-free flaw in the netfilter subsystem caused by
- incorrect refcount handling on the table and chain destroy path
- may result in denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-20593">CVE-2023-20593</a>
-
- <p>Tavis Ormandy discovered that under specific microarchitectural
- circumstances, a vector register in AMD <q>Zen 2</q> CPUs may not be
- written to 0 correctly. This flaw allows an attacker to leak
- sensitive information across concurrent processes, hyper threads
- and virtualized guests.</p>
-
- <p>For details please refer to
- <a href="https://lock.cmpxchg8b.com/zenbleed.html">https://lock.cmpxchg8b.com/zenbleed.html</a> and
- <a href="https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8">https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8</a>.</p>
-
- <p>This issue can also be mitigated by a microcode update through the
- amd64-microcode package or a system firmware (BIOS/UEFI) update.
- However, the initial microcode release by AMD only provides
- updates for second generation EPYC CPUs. Various Ryzen CPUs are
- also affected, but no updates are available yet.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31248">CVE-2023-31248</a>
-
- <p>Mingi Cho discovered a use-after-free flaw in the Netfilter
- nf_tables implementation when using nft_chain_lookup_byid, which
- may result in local privilege escalation for a user with the
- CAP_NET_ADMIN capability in any user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35001">CVE-2023-35001</a>
-
- <p>Tanguy DUBROCA discovered an out-of-bounds reads and write flaw in
- the Netfilter nf_tables implementation when processing an
- nft_byteorder expression, which may result in local privilege
- escalation for a user with the CAP_NET_ADMIN capability in any
- user or network namespace.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.179-3~deb10u1.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3512.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3513.data b/english/lts/security/2023/dla-3513.data
deleted file mode 100644
index f90e46c267b..00000000000
--- a/english/lts/security/2023/dla-3513.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3513-1 tiff</define-tag>
-<define-tag report_date>2023-07-31</define-tag>
-<define-tag secrefs>CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-25433 CVE-2023-26965 CVE-2023-26966 CVE-2023-40745 CVE-2023-41175 Bug#1040945</define-tag>
-<define-tag packages>tiff</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3513.wml b/english/lts/security/2023/dla-3513.wml
deleted file mode 100644
index e2721f03df1..00000000000
--- a/english/lts/security/2023/dla-3513.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in tiff, a library and tools
-providing support for the Tag Image File Format (TIFF).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2908">CVE-2023-2908</a>
-
- <p>NULL pointer dereference in tif_dir.c</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3316">CVE-2023-3316</a>
-
- <p>NULL pointer dereference in TIFFClose()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3618">CVE-2023-3618</a>
-
- <p>Buffer overflow in tiffcrop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-25433">CVE-2023-25433</a>
-
- <p>Buffer overflow in tiffcrop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26965">CVE-2023-26965</a>
-
- <p>Use after free in tiffcrop</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26966">CVE-2023-26966</a>
-
- <p>Buffer overflow in uv_encode()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40745">CVE-2023-40745</a>
-
- <p>Integer overflow in tiffcp</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41175">CVE-2023-41175</a>
-
- <p>Integer overflow in raw2tiff</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.1.0+git191117-2~deb10u8.</p>
-
-<p>We recommend that you upgrade your tiff packages.</p>
-
-<p>For the detailed security status of tiff please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tiff">https://security-tracker.debian.org/tracker/tiff</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3513.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3514.data b/english/lts/security/2023/dla-3514.data
deleted file mode 100644
index 2e606ed8d2e..00000000000
--- a/english/lts/security/2023/dla-3514.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3514-1 bouncycastle</define-tag>
-<define-tag report_date>2023-08-02</define-tag>
-<define-tag secrefs>CVE-2023-33201</define-tag>
-<define-tag packages>bouncycastle</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3514.wml b/english/lts/security/2023/dla-3514.wml
deleted file mode 100644
index ee5013484a4..00000000000
--- a/english/lts/security/2023/dla-3514.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a protential LDAP injection vulnerability
-in Bouncy Castle, a cryptographic library for Java. During the certificate
-validation process, bouncycastle used the certificate's "Subject Name" into an
-LDAP search filter without any escaping.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33201">CVE-2023-33201</a>
-
- <p>Bouncy Castle For Java before 1.74 is affected by an LDAP injection
- vulnerability. The vulnerability only affects applications that use an LDAP
- CertStore from Bouncy Castle to validate X.509 certificates. During the
- certificate validation process, Bouncy Castle inserts the certificate's
- Subject Name into an LDAP search filter without any escaping, which leads
- to an LDAP injection vulnerability.</p></li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.60-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your bouncycastle packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3514.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3515.data b/english/lts/security/2023/dla-3515.data
deleted file mode 100644
index bc8fa932126..00000000000
--- a/english/lts/security/2023/dla-3515.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3515-1 cjose</define-tag>
-<define-tag report_date>2023-08-04</define-tag>
-<define-tag secrefs>CVE-2023-37464 Bug#1041423</define-tag>
-<define-tag packages>cjose</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3515.wml b/english/lts/security/2023/dla-3515.wml
deleted file mode 100644
index 3ee8bf9d080..00000000000
--- a/english/lts/security/2023/dla-3515.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An incorrect Authentication Tag length usage was discovered in cjose, a
-C library implementing the Javascript Object Signing and Encryption
-(JOSE) standard, which could lead to integrity compromise.</p>
-
-<p>The AES GCM decryption routine incorrectly uses the Tag length from the
-actual Authentication Tag as provided in the JSON Web Encryption (JWE)
-object, while the <a href="https://www.rfc-editor.org/rfc/rfc7518#section-4.7">specification</a>
-says that a fixed length of 16 octets
-must be applied. This could allows an attacker to provide a truncated
-Authentication Tag and to modify the JWE accordingly.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.6.1+dfsg1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your cjose packages.</p>
-
-<p>For the detailed security status of cjose please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cjose">https://security-tracker.debian.org/tracker/cjose</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3515.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3516.data b/english/lts/security/2023/dla-3516.data
deleted file mode 100644
index de5d74bb52e..00000000000
--- a/english/lts/security/2023/dla-3516.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3516-1 burp</define-tag>
-<define-tag report_date>2023-08-05</define-tag>
-<define-tag secrefs>CVE-2017-16516 CVE-2022-24795 CVE-2023-33460 Bug#1040036</define-tag>
-<define-tag packages>burp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3516.wml b/english/lts/security/2023/dla-3516.wml
deleted file mode 100644
index eedd5ab16df..00000000000
--- a/english/lts/security/2023/dla-3516.wml
+++ /dev/null
@@ -1,45 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been found in the version of yajl bundled
-with burp, a simple cross-platform network BackUp and Restore Program.
-yajl is a JSON parser and small validating JSON generator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16516">CVE-2017-16516</a>
-
- <p>When a crafted JSON file is supplied to yajl, the process might
- crash with a SIGABRT in the yajl_string_decode function in
- yajl_encode.c. This potentially results in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24795">CVE-2022-24795</a>
-
- <p>The 1.x branch and the 2.x branch of `yajl` contain an integer
- overflow which leads to subsequent heap memory corruption when dealing
- with large (~2GB) inputs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33460">CVE-2023-33460</a>
-
- <p>There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse
- function, which potentially cause the server to run out of memory and
- crash.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.1.32-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your burp packages.</p>
-
-<p>For the detailed security status of burp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/burp">https://security-tracker.debian.org/tracker/burp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3516.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3517.data b/english/lts/security/2023/dla-3517.data
deleted file mode 100644
index b8195b1ca3a..00000000000
--- a/english/lts/security/2023/dla-3517.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3517-1 pdfcrack</define-tag>
-<define-tag report_date>2023-08-06</define-tag>
-<define-tag secrefs>CVE-2020-22336</define-tag>
-<define-tag packages>pdfcrack</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3517.wml b/english/lts/security/2023/dla-3517.wml
deleted file mode 100644
index f61bdba6c26..00000000000
--- a/english/lts/security/2023/dla-3517.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A stack overflow in the MD5 function has been fixed in pdfcrack,
-a tool for recovering passwords and content from PDF files.
-</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.16-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your pdfcrack packages.</p>
-
-<p>For the detailed security status of pdfcrack please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/pdfcrack">https://security-tracker.debian.org/tracker/pdfcrack</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3517.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3518.data b/english/lts/security/2023/dla-3518.data
deleted file mode 100644
index 8382ecc2d97..00000000000
--- a/english/lts/security/2023/dla-3518.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3518-1 openimageio</define-tag>
-<define-tag report_date>2023-8-07</define-tag>
-<define-tag secrefs>CVE-2022-41649 CVE-2022-41684 CVE-2022-41794 CVE-2022-41837 CVE-2023-24472 CVE-2023-36183 Bug#1027143 Bug#1034151</define-tag>
-<define-tag packages>openimageio</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3518.wml b/english/lts/security/2023/dla-3518.wml
deleted file mode 100644
index 25d96f5a410..00000000000
--- a/english/lts/security/2023/dla-3518.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in OpenImageIO, a
-library for reading and writing images. Buffer overflows and out-of-bounds
-read and write programming errors may lead to a denial of service
-(application crash) or the execution of arbitrary code if a malformed image
-file is processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.0.5~dfsg0-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your openimageio packages.</p>
-
-<p>For the detailed security status of openimageio please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/openimageio">https://security-tracker.debian.org/tracker/openimageio</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3518.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3519.data b/english/lts/security/2023/dla-3519.data
deleted file mode 100644
index 44548a59521..00000000000
--- a/english/lts/security/2023/dla-3519.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3519-1 ghostscript</define-tag>
-<define-tag report_date>2023-08-07</define-tag>
-<define-tag secrefs>CVE-2023-38559 bug#1043033</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3519.wml b/english/lts/security/2023/dla-3519.wml
deleted file mode 100644
index 1db308e3862..00000000000
--- a/english/lts/security/2023/dla-3519.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow in devn_pcx_write_rle() has been fixed in Ghostsciprt,
-an interpreter for the PostScript language and PDF files.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-9.27~dfsg-2+deb10u8.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>For the detailed security status of ghostscript please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3519.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3520.data b/english/lts/security/2023/dla-3520.data
deleted file mode 100644
index 8ca7084117a..00000000000
--- a/english/lts/security/2023/dla-3520.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3520-1 libhtmlcleaner-java</define-tag>
-<define-tag report_date>2023-8-07</define-tag>
-<define-tag secrefs>CVE-2023-34624</define-tag>
-<define-tag packages>libhtmlcleaner-java</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3520.wml b/english/lts/security/2023/dla-3520.wml
deleted file mode 100644
index 66d5f2a9aec..00000000000
--- a/english/lts/security/2023/dla-3520.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability has been discovered in libhtmlcleaner-java, a Java
-HTML parser library. An attacker was able to cause a denial of service
-(StackOverflowError) if the parser runs on user supplied input with deeply
-nested HTML elements. This update introduces a new nesting depth limit
-which can be overridden in cleaner properties.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.21-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your libhtmlcleaner-java packages.</p>
-
-<p>For the detailed security status of libhtmlcleaner-java please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libhtmlcleaner-java">https://security-tracker.debian.org/tracker/libhtmlcleaner-java</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3520.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3521.data b/english/lts/security/2023/dla-3521.data
deleted file mode 100644
index 526e39de710..00000000000
--- a/english/lts/security/2023/dla-3521.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3521-1 thunderbird</define-tag>
-<define-tag report_date>2023-08-08</define-tag>
-<define-tag secrefs>CVE-2023-4045 CVE-2023-4046 CVE-2023-4047 CVE-2023-4048 CVE-2023-4049 CVE-2023-4050 CVE-2023-4055 CVE-2023-4056</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3521.wml b/english/lts/security/2023/dla-3521.wml
deleted file mode 100644
index 507e662446c..00000000000
--- a/english/lts/security/2023/dla-3521.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.14.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3521.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3522.data b/english/lts/security/2023/dla-3522.data
deleted file mode 100644
index fb4e4d53fdb..00000000000
--- a/english/lts/security/2023/dla-3522.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3522-1 hdf5</define-tag>
-<define-tag report_date>2023-8-09</define-tag>
-<define-tag secrefs>CVE-2018-11206 CVE-2018-17233 CVE-2018-17234 CVE-2018-17237 CVE-2018-17434 CVE-2018-17437</define-tag>
-<define-tag packages>hdf5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3522.wml b/english/lts/security/2023/dla-3522.wml
deleted file mode 100644
index 56f02930dd3..00000000000
--- a/english/lts/security/2023/dla-3522.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were discovered in HDF5, a Hierarchical
-Data Format and a library for scientific data. Memory leaks, out-of-bound
-reads and division by zero errors may lead to a denial of service when
-processing a malformed HDF file.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.10.4+repack-10+deb10u1.</p>
-
-<p>We recommend that you upgrade your hdf5 packages.</p>
-
-<p>For the detailed security status of hdf5 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/hdf5">https://security-tracker.debian.org/tracker/hdf5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3522.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3523.data b/english/lts/security/2023/dla-3523.data
deleted file mode 100644
index 2b26e9e89a2..00000000000
--- a/english/lts/security/2023/dla-3523.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3523-1 firefox-esr</define-tag>
-<define-tag report_date>2023-08-09</define-tag>
-<define-tag secrefs>CVE-2023-4045 CVE-2023-4046 CVE-2023-4047 CVE-2023-4048 CVE-2023-4049 CVE-2023-4050 CVE-2023-4055 CVE-2023-4056</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3523.wml b/english/lts/security/2023/dla-3523.wml
deleted file mode 100644
index 78879871990..00000000000
--- a/english/lts/security/2023/dla-3523.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, bypass of the same-origin policy, spoofing or sandbox bypass.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.14.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3523.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3524.data b/english/lts/security/2023/dla-3524.data
deleted file mode 100644
index 400e1bcfc09..00000000000
--- a/english/lts/security/2023/dla-3524.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3524-1 linux</define-tag>
-<define-tag report_date>2023-08-10</define-tag>
-<define-tag secrefs>CVE-2022-40982</define-tag>
-<define-tag packages>linux</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3524.wml b/english/lts/security/2023/dla-3524.wml
deleted file mode 100644
index c2d4755fc19..00000000000
--- a/english/lts/security/2023/dla-3524.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware
-vulnerability for Intel CPUs which allows unprivileged speculative
-access to data which was previously stored in vector registers.</p>
-
-<p>This mitigation requires updated CPU microcode provided in the
-intel-microcode package.</p>
-
-<p>For details please refer to <a href="https://downfall.page/">https://downfall.page/</a> and
-<a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html</a>.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.19.289-2.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3524.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3525.data b/english/lts/security/2023/dla-3525.data
deleted file mode 100644
index 59a2c33bcae..00000000000
--- a/english/lts/security/2023/dla-3525.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3525-1 linux-5.10</define-tag>
-<define-tag report_date>2023-08-11</define-tag>
-<define-tag secrefs>CVE-2022-40982 CVE-2023-20569</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3525.wml b/english/lts/security/2023/dla-3525.wml
deleted file mode 100644
index 7009f016afc..00000000000
--- a/english/lts/security/2023/dla-3525.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40982">CVE-2022-40982</a>
-
- <p>Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware
- vulnerability for Intel CPUs which allows unprivileged speculative
- access to data which was previously stored in vector registers.</p>
-
- <p>This mitigation requires updated CPU microcode provided in the
- intel-microcode package.</p>
-
- <p>For details please refer to <a href="https://downfall.page/">https://downfall.page/</a> and
- <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-20569">CVE-2023-20569</a>
-
- <p>Daniel Trujillo, Johannes Wikner and Kaveh Razavi discovered
- INCEPTION, also known as Speculative Return Stack Overflow (SRSO),
- a transient execution attack that leaks arbitrary data on all AMD
- Zen CPUs. An attacker can mis-train the CPU BTB to predict non-architectural CALL instructions in kernel space and use this to
- control the speculative target of a subsequent kernel RET,
- potentially leading to information disclosure via a speculative
- side-channel.</p>
-
- <p>For details please refer to
- <a href="https://comsec.ethz.ch/research/microarch/inception/">https://comsec.ethz.ch/research/microarch/inception/</a> and
- <a href="https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-7005">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-7005</a>.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.179-5~deb10u1.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3525.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3526.data b/english/lts/security/2023/dla-3526.data
deleted file mode 100644
index 6afda408b75..00000000000
--- a/english/lts/security/2023/dla-3526.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3526-1 libreoffice</define-tag>
-<define-tag report_date>2023-08-13</define-tag>
-<define-tag secrefs>CVE-2022-38745 CVE-2023-0950 CVE-2023-2255</define-tag>
-<define-tag packages>libreoffice</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3526.wml b/english/lts/security/2023/dla-3526.wml
deleted file mode 100644
index 14ee72e5e8d..00000000000
--- a/english/lts/security/2023/dla-3526.wml
+++ /dev/null
@@ -1,58 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>LibreOffice an office productivity suite was affected by multiple
-vulnerabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-3874">CVE-2022-38745</a>
-
- <p>Libreoffice may be configured to add an empty
- entry to the Java class path.
- This may lead to run arbitrary Java code from the
- current directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0950">CVE-2023-0950</a>
-
- <p>Improper Validation of Array Index vulnerability in the
- spreadsheet component allows an attacker to craft a
- spreadsheet document that will cause an array index
- underflow when loaded. In the affected versions of LibreOffice
- certain malformed spreadsheet formulas, such as AGGREGATE,
- could be created with less parameters passed to the formula
- interpreter than it expected, leading to an array index
- underflow, in which case there is a risk that arbitrary
- code could be executed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2255">CVE-2023-2255</a>
-
- <p>Improper access control in editor components of
- LibreOffice allowed an attacker to craft
- a document that would cause external links to be loaded without prompt.
- In the affected versions of LibreOffice documents
- that used <q>floating frames</q>
- linked to external files, would load the contents of those frames
- without prompting the user for permission to do so.
- This was inconsistent with the treatment of other linked
- content in LibreOffice.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:6.1.5-3+deb10u10.</p>
-
-<p>We recommend that you upgrade your libreoffice packages.</p>
-
-<p>For the detailed security status of libreoffice please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libreoffice">https://security-tracker.debian.org/tracker/libreoffice</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3526.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3527.data b/english/lts/security/2023/dla-3527.data
deleted file mode 100644
index 636b82a3c0b..00000000000
--- a/english/lts/security/2023/dla-3527.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3527-1 sox</define-tag>
-<define-tag report_date>2023-08-13</define-tag>
-<define-tag secrefs>CVE-2023-32627 Bug#1041112</define-tag>
-<define-tag packages>sox</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3527.wml b/english/lts/security/2023/dla-3527.wml
deleted file mode 100644
index 022435df276..00000000000
--- a/english/lts/security/2023/dla-3527.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>SoX is a command line utility that can convert various formats
-of computer audio files in to other formats. It can also apply
-various effects to these sound files during the conversion.</p>
-
-<p>Sox was vulnerable to divide by zero vulnerability by reading an
-specialy crafted Creative Voice File (.voc) file, in the read_samples
-function. This flaw can lead to a denial of service.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-14.4.2+git20190427-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your sox packages.</p>
-
-<p>For the detailed security status of sox please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/sox">https://security-tracker.debian.org/tracker/sox</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3527.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3528.data b/english/lts/security/2023/dla-3528.data
deleted file mode 100644
index fb9b3da5108..00000000000
--- a/english/lts/security/2023/dla-3528.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3528-1 poppler</define-tag>
-<define-tag report_date>2023-08-14</define-tag>
-<define-tag secrefs>CVE-2020-36023 CVE-2020-36024</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3528.wml b/english/lts/security/2023/dla-3528.wml
deleted file mode 100644
index b64737c98bd..00000000000
--- a/english/lts/security/2023/dla-3528.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities have been fixed in poppler,
-a PDF rendering library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36023">CVE-2020-36023</a>
-
- <p>Infinite loop in FoFiType1C::cvtGlyph()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36024">CVE-2020-36024</a>
-
- <p>NULL dereference in FoFiType1C::convertToType1()</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.71.0-5+deb10u2.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>For the detailed security status of poppler please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/poppler">https://security-tracker.debian.org/tracker/poppler</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3528.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3529.data b/english/lts/security/2023/dla-3529.data
deleted file mode 100644
index e0fed335319..00000000000
--- a/english/lts/security/2023/dla-3529.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3529-1 datatables.js</define-tag>
-<define-tag report_date>2023-08-15</define-tag>
-<define-tag secrefs>CVE-2021-23445 Bug#995229</define-tag>
-<define-tag packages>datatables.js</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3529.wml b/english/lts/security/2023/dla-3529.wml
deleted file mode 100644
index 1ac7d2c82f2..00000000000
--- a/english/lts/security/2023/dla-3529.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>datatables.js is a jQuery plug-in that makes nice tables from different
-data sources.</p>
-
-<p>It was discovered that if an array is passed to the HTML escape entities
-function, it would not have its contents escaped.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.10.19+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your datatables.js packages.</p>
-
-<p>For the detailed security status of datatables.js please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/datatables.js">https://security-tracker.debian.org/tracker/datatables.js</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3529.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3530.data b/english/lts/security/2023/dla-3530.data
deleted file mode 100644
index 2c0dae21965..00000000000
--- a/english/lts/security/2023/dla-3530.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3530-1 openssl</define-tag>
-<define-tag report_date>2023-08-16</define-tag>
-<define-tag secrefs>CVE-2023-3446 CVE-2023-3817</define-tag>
-<define-tag packages>openssl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3530.wml b/english/lts/security/2023/dla-3530.wml
deleted file mode 100644
index 48d453bbc06..00000000000
--- a/english/lts/security/2023/dla-3530.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vunerabilities were discovered in openssl, a Secure Sockets Layer toolkit:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3446">CVE-2023-3446</a>
-
-<p>, <a href="https://security-tracker.debian.org/tracker/CVE-2023-3817">CVE-2023-3817</a></p>
-
- <p>Excessively long DH key or parameter checks can cause significant delays
- in applications using DH_check(), DH_check_ex(), or EVP_PKEY_param_check()
- functions, potentially leading to Denial of Service attacks when keys or
- parameters are obtained from untrusted sources.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.1.1n-0+deb10u6.</p>
-
-<p>We recommend that you upgrade your openssl packages.</p>
-
-<p>For the detailed security status of openssl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3530.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3531.data b/english/lts/security/2023/dla-3531.data
deleted file mode 100644
index b1280f33639..00000000000
--- a/english/lts/security/2023/dla-3531.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3531-1 open-vm-tools</define-tag>
-<define-tag report_date>2023-08-16</define-tag>
-<define-tag secrefs>CVE-2023-20867 Bug#1037546</define-tag>
-<define-tag packages>open-vm-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3531.wml b/english/lts/security/2023/dla-3531.wml
deleted file mode 100644
index 1907e94d47a..00000000000
--- a/english/lts/security/2023/dla-3531.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>open-vm-tools is a package that provides Open VMware Tools for virtual
-machines hosted on VMware.</p>
-
-<p>It was discovered that Open VM Tools incorrectly handled certain
-authentication requests. A fully compromised ESXi host can force Open
-VM Tools to fail to authenticate host-to-guest operations, impacting
-the confidentiality and integrity of the guest virtual machine.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:10.3.10-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your open-vm-tools packages.</p>
-
-<p>For the detailed security status of open-vm-tools please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/open-vm-tools">https://security-tracker.debian.org/tracker/open-vm-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3531.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3532.data b/english/lts/security/2023/dla-3532.data
deleted file mode 100644
index 8c996540f99..00000000000
--- a/english/lts/security/2023/dla-3532.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3532-1 openssh</define-tag>
-<define-tag report_date>2023-08-17</define-tag>
-<define-tag secrefs>CVE-2023-38408 Bug#1042460</define-tag>
-<define-tag packages>openssh</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3532.wml b/english/lts/security/2023/dla-3532.wml
deleted file mode 100644
index 9c978baf963..00000000000
--- a/english/lts/security/2023/dla-3532.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that OpenSSH incorrectly handled loading certain
-PKCS#11 providers. If a user forwarded their ssh-agent to an untrusted
-system, a remote attacker could possibly use this issue to load
-arbitrary libraries from the user’s system and execute arbitrary code.</p>
-
-<p>In addition to the above security issue, this update also fixed
-another bug - bad interaction between the ssh_config ConnectTimeout
-and ConnectionAttempts directives - connection attempts after the
-first attempt were ignoring the requested timeout. More details about
-this can be found at <a href="https://bugzilla.mindrot.org/show_bug.cgi?id)18.">https://bugzilla.mindrot.org/show_bug.cgi?id)18.</a></p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:7.9p1-10+deb10u3.</p>
-
-<p>We recommend that you upgrade your openssh packages.</p>
-
-<p>For the detailed security status of openssh please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openssh">https://security-tracker.debian.org/tracker/openssh</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3532.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3533.data b/english/lts/security/2023/dla-3533.data
deleted file mode 100644
index 4cff6d0b435..00000000000
--- a/english/lts/security/2023/dla-3533.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3533-1 lxc</define-tag>
-<define-tag report_date>2023-08-17</define-tag>
-<define-tag secrefs>CVE-2022-47952</define-tag>
-<define-tag packages>lxc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3533.wml b/english/lts/security/2023/dla-3533.wml
deleted file mode 100644
index c48896623cc..00000000000
--- a/english/lts/security/2023/dla-3533.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>LXC is a Linux Containers userspace tool set. Maher Azzouzi reported that the
-lxc-user-nic command, included in LXC, allowed unprivileged users to infer
-whether any file exists, even in protected directory trees.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:3.1.0+really3.0.3-8+deb10u1.</p>
-
-<p>We recommend that you upgrade your lxc packages.</p>
-
-<p>For the detailed security status of lxc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lxc">https://security-tracker.debian.org/tracker/lxc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3533.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3534.data b/english/lts/security/2023/dla-3534.data
deleted file mode 100644
index d38336453b1..00000000000
--- a/english/lts/security/2023/dla-3534.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3534-1 rar</define-tag>
-<define-tag report_date>2023-8-17</define-tag>
-<define-tag secrefs>CVE-2022-30333 Bug#1012228</define-tag>
-<define-tag packages>rar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3534.wml b/english/lts/security/2023/dla-3534.wml
deleted file mode 100644
index 0ac843313bc..00000000000
--- a/english/lts/security/2023/dla-3534.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The RAR archiver allows directory traversal to write to files during an
-extract (aka unpack) operation, as demonstrated by creating a
-~/.ssh/authorized_keys file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:6.20-0.1~deb10u1.</p>
-
-<p>We recommend that you upgrade your rar packages.</p>
-
-<p>For the detailed security status of rar please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/rar">https://security-tracker.debian.org/tracker/rar</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3534.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3535.data b/english/lts/security/2023/dla-3535.data
deleted file mode 100644
index 408fc83a919..00000000000
--- a/english/lts/security/2023/dla-3535.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3535-1 unrar-nonfree</define-tag>
-<define-tag report_date>2023-8-17</define-tag>
-<define-tag secrefs>CVE-2022-48579</define-tag>
-<define-tag packages>unrar-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3535.wml b/english/lts/security/2023/dla-3535.wml
deleted file mode 100644
index 7fb7b269467..00000000000
--- a/english/lts/security/2023/dla-3535.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that UnRAR, an unarchiver for rar files, allows extraction of
-files outside of the destination folder via symlink chains.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:5.6.6-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your unrar-nonfree packages.</p>
-
-<p>For the detailed security status of unrar-nonfree please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/unrar-nonfree">https://security-tracker.debian.org/tracker/unrar-nonfree</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3535.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3536.data b/english/lts/security/2023/dla-3536.data
deleted file mode 100644
index fbafebcd391..00000000000
--- a/english/lts/security/2023/dla-3536.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3536-1 flask</define-tag>
-<define-tag report_date>2023-08-20</define-tag>
-<define-tag secrefs>CVE-2023-30861 Bug##1035670</define-tag>
-<define-tag packages>flask</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3536.wml b/english/lts/security/2023/dla-3536.wml
deleted file mode 100644
index 30442c304aa..00000000000
--- a/english/lts/security/2023/dla-3536.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that Flask, a lightweight WSGI web application
-framework, will under certain conditions cache a response containing
-data intended for one client and subsequently may send the response to
-other clients.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.2-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your flask packages.</p>
-
-<p>For the detailed security status of flask please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/flask">https://security-tracker.debian.org/tracker/flask</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3536.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3537.data b/english/lts/security/2023/dla-3537.data
deleted file mode 100644
index 5eb112c66c5..00000000000
--- a/english/lts/security/2023/dla-3537.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3537-1 intel-microcode</define-tag>
-<define-tag report_date>2023-08-22</define-tag>
-<define-tag secrefs>CVE-2022-40982 CVE-2022-41804 CVE-2023-23908 Bug#1043305</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3537.wml b/english/lts/security/2023/dla-3537.wml
deleted file mode 100644
index 5b9c318ae04..00000000000
--- a/english/lts/security/2023/dla-3537.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update ships updated CPU microcode for some types of Intel CPUs
-and provides mitigations for security vulnerabilities.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40982">CVE-2022-40982</a>
-
- <p>Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware
- vulnerability which allows unprivileged speculative access to data
- which was previously stored in vector registers.</p>
-
- <p>For details please refer to <a href="https://downfall.page/">https://downfall.page/</a> and
- <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html.">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html.</a></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41804">CVE-2022-41804</a>
-
- <p>Unauthorized error injection in Intel SGX or Intel TDX for some
- Intel Xeon Processors which may allow a local user to potentially
- escalate privileges.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-23908">CVE-2023-23908</a>
-
- <p>Improper access control in some 3rd Generation Intel Xeon Scalable
- processors may result in an information leak.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.20230808.1~deb10u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>For the detailed security status of intel-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3537.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3538-2.data b/english/lts/security/2023/dla-3538-2.data
deleted file mode 100644
index a9b4f0ab76a..00000000000
--- a/english/lts/security/2023/dla-3538-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3538-2 zabbix</define-tag>
-<define-tag report_date>2023-10-21</define-tag>
-<define-tag secrefs>Bug#1051300</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3538-2.wml b/english/lts/security/2023/dla-3538-2.wml
deleted file mode 100644
index dcca70c9bb9..00000000000
--- a/english/lts/security/2023/dla-3538-2.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The last update required an update to the database scheme, but as
-zabbix does not support upgrading the database scheme if SQlite3 is used,
-using zabbix-proxy-sqlite3 requires the user to drop the database and recreate
-it with a supplied sql template file.</p>
-
-<p>However, this template file has not been updated in the previous upload,
-making this recreation difficult when not knowing the details.</p>
-
-<p>Please read /usr/share/doc/zabbix-proxy-sqlite3/README.Debian for instructions
-how to create the database file.
-<p><b>Note</b>: All other database backends will automatically update the schema.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:4.0.4+dfsg-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3538-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3538.data b/english/lts/security/2023/dla-3538.data
deleted file mode 100644
index 3ad1982f028..00000000000
--- a/english/lts/security/2023/dla-3538.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3538-1 zabbix</define-tag>
-<define-tag report_date>2023-08-22</define-tag>
-<define-tag secrefs>CVE-2013-7484 CVE-2019-17382 CVE-2022-35229 CVE-2022-43515 CVE-2023-29450 CVE-2023-29451 CVE-2023-29454 CVE-2023-29455 CVE-2023-29456 CVE-2023-29457 Bug#1026847</define-tag>
-<define-tag packages>zabbix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3538.wml b/english/lts/security/2023/dla-3538.wml
deleted file mode 100644
index d81404c7906..00000000000
--- a/english/lts/security/2023/dla-3538.wml
+++ /dev/null
@@ -1,115 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in zabbix, a network
-monitoring solution, potentially allowing to crash the server, information
-disclosure or Cross-Site-Scripting attacks.</p>
-
-<p>Important Notices:
-To mitigate <a href="https://security-tracker.debian.org/tracker/CVE-2019-17382">CVE-2019-17382</a>, on existing installations, the guest account
-needs to be manually disabled, for example by disabling the the <q>Guest
-group</q> in the UI:
- Administration -> User groups -> Guests -> Untick Enabled</p>
-
-<p>This update also fixes a regression with <a href="https://security-tracker.debian.org/tracker/CVE-2022-35229">CVE-2022-35229</a>, which broke the
-possiblity to edit and add discovery rules in the UI.</p>
-
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-7484">CVE-2013-7484</a>
-
- <p>Zabbix before version 4.4.0alpha2 stores credentials in the <q>users</q>
- table with the password hash stored as a MD5 hash, which is a known
- insecure hashing method. Furthermore, no salt is used with the hash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17382">CVE-2019-17382</a>
-
-<p>(Disputed, not seen by upstream as not a security issue)</p>
-
- <p>An issue was discovered in
- zabbix.php?actionÚshboard.view&dashboardid=1 in Zabbix through
- 4.4. An attacker can bypass the login page and access the dashboard
- page, and then create a Dashboard, Report, Screen, or Map without
- any Username/Password (i.e., anonymously). All created elements
- (Dashboard/Report/Screen/Map) are accessible by other users and by
- an admin.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-35229">CVE-2022-35229</a>
-
- <p>An authenticated user can create a link with reflected
- Javascript code inside it for the discovery page and send it to
- other users. The payload can be executed only with a known CSRF
- token value of the victim, which is changed periodically and is
- difficult to predict.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-43515">CVE-2022-43515</a>
-
- <p>Zabbix Frontend provides a feature that allows admins to
- maintain the installation and ensure that only certain IP addresses
- can access it. In this way, any user will not be able to access the
- Zabbix Frontend while it is being maintained and possible sensitive
- data will be prevented from being disclosed. An attacker can bypass
- this protection and access the instance using IP address not listed
- in the defined range.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29450">CVE-2023-29450</a>
-
- <p>JavaScript pre-processing can be used by the attacker to gain
- access to the file system (read-only access on behalf of user
- <q>zabbix</q>) on the Zabbix Server or Zabbix Proxy, potentially leading
- to unauthorized access to sensitive data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29451">CVE-2023-29451</a>
-
- <p>Specially crafted string can cause a buffer overrun in the JSON
- parser library leading to a crash of the Zabbix Server or a Zabbix
- Proxy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29454">CVE-2023-29454</a>
-
- <p>A Stored or persistent cross-site scripting (XSS) vulnerability
- was found on “Users†section in “Media†tab in “Send to†form field.
- When new media is created with malicious code included into field
- “Send to†then it will execute when editing the same media.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29455">CVE-2023-29455</a>
-
- <p>A Reflected XSS attacks, also known as non-persistent attacks, was
- found where an attacker can pass malicious code as GET request to
- graph.php and system will save it and will execute when current
- graph page is opened.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29456">CVE-2023-29456</a>
-
- <p>URL validation scheme receives input from a user and then parses
- it to identify its various components. The validation scheme can
- ensure that all URL components comply with internet standards.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29457">CVE-2023-29457</a>
-
- <p>A Reflected XSS attacks, also known as non-persistent attacks, was
- found where XSS session cookies could be revealed, enabling a
- perpetrator to impersonate valid users and abuse their private
- accounts.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:4.0.4+dfsg-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your zabbix packages.</p>
-
-<p>For the detailed security status of zabbix please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zabbix">https://security-tracker.debian.org/tracker/zabbix</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3538.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3539.data b/english/lts/security/2023/dla-3539.data
deleted file mode 100644
index c934bb7bffc..00000000000
--- a/english/lts/security/2023/dla-3539.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3539-1 qt4-x11</define-tag>
-<define-tag report_date>2023-08-22</define-tag>
-<define-tag secrefs>CVE-2021-3481 CVE-2021-45930 CVE-2023-32573 CVE-2023-32763 CVE-2023-34410 CVE-2023-37369 CVE-2023-38197</define-tag>
-<define-tag packages>qt4-x11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3539.wml b/english/lts/security/2023/dla-3539.wml
deleted file mode 100644
index 20eda03c9b1..00000000000
--- a/english/lts/security/2023/dla-3539.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been found in qt4-x11, a graphical
-windowing toolkit.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3481">CVE-2021-3481</a>
-
- <p>While rendering and displaying a crafted Scalable Vector Graphics
- (SVG) file this flaw may lead to an unauthorized memory access. The
- highest threat from this vulnerability is to data confidentiality
- and the application availability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-45930">CVE-2021-45930</a>
-
- <p>An out-of-bounds write in
- QtPrivate::QCommonArrayOps<QPainterPath::Element>::growAppend
- (called from QPainterPath::addPath and QPathClipper::intersect).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32573">CVE-2023-32573</a>
-
- <p>Uninitialized variable usage in m_unitsPerEm.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32763">CVE-2023-32763</a>
-
- <p>An application crash in QXmlStreamReader via a crafted XML string
- that triggers a situation in which a prefix is greater than a
- length.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34410">CVE-2023-34410</a>
-
- <p>Certificate validation for TLS does not always consider whether the
- root of a chain is a configured CA certificate.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-37369">CVE-2023-37369</a>
-
- <p>There can be an application crash in QXmlStreamReader via a crafted
- XML string that triggers a situation in which a prefix is greater
- than a length.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-38197">CVE-2023-38197</a>
-
- <p>There are infinite loops in recursive entity expansion.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4:4.8.7+dfsg-18+deb10u2.</p>
-
-<p>We recommend that you upgrade your qt4-x11 packages.</p>
-
-<p>For the detailed security status of qt4-x11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qt4-x11">https://security-tracker.debian.org/tracker/qt4-x11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3539.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3540.data b/english/lts/security/2023/dla-3540.data
deleted file mode 100644
index 9588e3819aa..00000000000
--- a/english/lts/security/2023/dla-3540.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3540-1 mediawiki</define-tag>
-<define-tag report_date>2023-8-23</define-tag>
-<define-tag secrefs>CVE-2023-29141</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3540.wml b/english/lts/security/2023/dla-3540.wml
deleted file mode 100644
index a0c8c5e17da..00000000000
--- a/english/lts/security/2023/dla-3540.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An auto-block can occur for an untrusted X-Forwarded-For header in
-MediaWiki, a website engine for collaborative work.</p>
-
-<p>X-Forwarded-For is not necessarily trustworthy and can specify multiple IP
-addresses in a single header, all of which are checked for blocks. When a user
-is autoblocked, the wiki will create an IP block behind-the-scenes for that
-user without exposing the user's IP on-wiki. However, spoofing XFF would let an
-attacker guess at the IPs of users who have active autoblocks, since the
-block message includes the username of the original block target.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:1.31.16-1+deb10u6.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3540.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3541.data b/english/lts/security/2023/dla-3541.data
deleted file mode 100644
index d91910ec77b..00000000000
--- a/english/lts/security/2023/dla-3541.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3541-1 w3m</define-tag>
-<define-tag report_date>2023-08-24</define-tag>
-<define-tag secrefs>CVE-2022-38223 Bug#1019599</define-tag>
-<define-tag packages>w3m</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3541.wml b/english/lts/security/2023/dla-3541.wml
deleted file mode 100644
index 9c0c9de0970..00000000000
--- a/english/lts/security/2023/dla-3541.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Han Zheng discovered an out-of-bounds write in w3m, a text based web
-browser and pager. It can be triggered by sending a crafted HTML file
-to the w3m binary. It allows an attacker to cause Denial of Service
-(DoS) or possibly have unspecified other impact.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.5.3-37+deb10u1.</p>
-
-<p>We recommend that you upgrade your w3m packages.</p>
-
-<p>For the detailed security status of w3m please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/w3m">https://security-tracker.debian.org/tracker/w3m</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3541.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3542.data b/english/lts/security/2023/dla-3542.data
deleted file mode 100644
index 2d4583299f9..00000000000
--- a/english/lts/security/2023/dla-3542.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3542-1 unrar-nonfree</define-tag>
-<define-tag report_date>2023-8-26</define-tag>
-<define-tag secrefs>CVE-2023-40477</define-tag>
-<define-tag packages>unrar-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3542.wml b/english/lts/security/2023/dla-3542.wml
deleted file mode 100644
index 9fa980ac2e0..00000000000
--- a/english/lts/security/2023/dla-3542.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A specific flaw within the processing of recovery volumes exists in UnRAR,
-an unarchiver for rar files. It allows remote attackers to execute arbitrary
-code on affected installations. User interaction is required to exploit this
-vulnerability. The target must visit a malicious page or open a malicious rar
-file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:5.6.6-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your unrar-nonfree packages.</p>
-
-<p>For the detailed security status of unrar-nonfree please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/unrar-nonfree">https://security-tracker.debian.org/tracker/unrar-nonfree</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3542.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3543.data b/english/lts/security/2023/dla-3543.data
deleted file mode 100644
index a5dfe93b3e8..00000000000
--- a/english/lts/security/2023/dla-3543.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3543-1 rar</define-tag>
-<define-tag report_date>2023-8-27</define-tag>
-<define-tag secrefs>CVE-2023-40477</define-tag>
-<define-tag packages>rar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3543.wml b/english/lts/security/2023/dla-3543.wml
deleted file mode 100644
index 41fe45a0ab3..00000000000
--- a/english/lts/security/2023/dla-3543.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A specific flaw within the processing of recovery volumes exists in RAR,
-an archive program for rar files. It allows remote attackers to execute
-arbitrary code on affected installations. User interaction is required to
-exploit this vulnerability. The target must visit a malicious page or open a
-malicious rar file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:6.23-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your rar packages.</p>
-
-<p>For the detailed security status of rar please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/rar">https://security-tracker.debian.org/tracker/rar</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3543.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3544.data b/english/lts/security/2023/dla-3544.data
deleted file mode 100644
index e76ee95d590..00000000000
--- a/english/lts/security/2023/dla-3544.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3544-1 clamav</define-tag>
-<define-tag report_date>2023-08-28</define-tag>
-<define-tag secrefs>CVE-2023-20197 Bug#1050057</define-tag>
-<define-tag packages>clamav</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3544.wml b/english/lts/security/2023/dla-3544.wml
deleted file mode 100644
index 40ff9a9a500..00000000000
--- a/english/lts/security/2023/dla-3544.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability in the filesystem image parser for Hierarchical File
-System Plus (HFS+) of ClamAV, an anti-virus utility for Unix, could
-allow an unauthenticated, remote attacker to cause a denial of service
-(DoS) condition on an affected device.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in new upstream
-version 0.103.9+dfsg-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your clamav packages.</p>
-
-<p>For the detailed security status of clamav please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/clamav">https://security-tracker.debian.org/tracker/clamav</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3544.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3545.data b/english/lts/security/2023/dla-3545.data
deleted file mode 100644
index 479b7714bfb..00000000000
--- a/english/lts/security/2023/dla-3545.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3545-1 flask-security</define-tag>
-<define-tag report_date>2023-08-28</define-tag>
-<define-tag secrefs>CVE-2021-23385 Bug#1021279</define-tag>
-<define-tag packages>flask-security</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3545.wml b/english/lts/security/2023/dla-3545.wml
deleted file mode 100644
index 91e27159111..00000000000
--- a/english/lts/security/2023/dla-3545.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that when using the get_post_logout_redirect and
-get_post_login_redirect functions in flask-security, an implementation of
-simple security for Flask apps, it is possible to bypass URL validation and
-redirect a user to an arbitrary URL by providing multiple back slashes such as
-\\\evil.com/path.</p>
-
-<p>This vulnerability is exploitable only if an alternative WSGI server other
-than Werkzeug is used, or the default behaviour of Werkzeug is modified using
-'autocorrect_location_headerúlse.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.7.5-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your flask-security packages.</p>
-
-<p>For the detailed security status of flask-security please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/flask-security">https://security-tracker.debian.org/tracker/flask-security</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3545.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3546.data b/english/lts/security/2023/dla-3546.data
deleted file mode 100644
index 418cee46357..00000000000
--- a/english/lts/security/2023/dla-3546.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3546-1 opendmarc</define-tag>
-<define-tag report_date>2023-08-28</define-tag>
-<define-tag secrefs>CVE-2020-12272</define-tag>
-<define-tag packages>opendmarc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3546.wml b/english/lts/security/2023/dla-3546.wml
deleted file mode 100644
index 932763e736f..00000000000
--- a/english/lts/security/2023/dla-3546.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the <tt>opendmarc</tt> DMARC
-email filter system. A vulnerability allowed attackers to inject authentication
-results to provide false information about the domain that originated an email
-message. This was caused by incorrect parsing and interpretation of SPF/DKIM
-authentication results.</p>
-
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12272">CVE-2020-12272</a>
-
- <p>OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject
- authentication results to provide false information about the domain that
- originated an e-mail message. This is caused by incorrect parsing and
- interpretation of SPF/DKIM authentication results, as demonstrated by the
- example.net(.example.com substring.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.3.2-6+deb10u3.</p>
-
-<p>We recommend that you upgrade your opendmarc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3546.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3547.data b/english/lts/security/2023/dla-3547.data
deleted file mode 100644
index db1b61bedf2..00000000000
--- a/english/lts/security/2023/dla-3547.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3547-1 tryton-server</define-tag>
-<define-tag report_date>2023-08-29</define-tag>
-<define-tag packages>tryton-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3547.wml b/english/lts/security/2023/dla-3547.wml
deleted file mode 100644
index 18c1b851992..00000000000
--- a/english/lts/security/2023/dla-3547.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-tryton-server lack of record validation<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>"Edbo" and Cedric Krier discovered that the Tryton application server does
-enforce record rules when only reading fields without an SQL type (like
-Function fields).</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-5.0.4-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your tryton-server packages.</p>
-
-<p>For the detailed security status of tryton-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tryton-server">https://security-tracker.debian.org/tracker/tryton-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3547.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3548.data b/english/lts/security/2023/dla-3548.data
deleted file mode 100644
index 742a7bb0235..00000000000
--- a/english/lts/security/2023/dla-3548.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3548-1 qpdf</define-tag>
-<define-tag report_date>2023-8-29</define-tag>
-<define-tag secrefs>CVE-2018-18020 CVE-2021-25786 CVE-2021-36978</define-tag>
-<define-tag packages>qpdf</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3548.wml b/english/lts/security/2023/dla-3548.wml
deleted file mode 100644
index 9f7c08611b3..00000000000
--- a/english/lts/security/2023/dla-3548.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issues have been found in qpdf, a package with tools for
-transforming and inspecting PDF files.
-Crafted files may enable remote attackers to execute arbitrary code or
-create recursive calls for a long time, which causes a denial of service.
-Further a heap-based buffer overflow might occur when a certain downstream
-write fails.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.4.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your qpdf packages.</p>
-
-<p>For the detailed security status of qpdf please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qpdf">https://security-tracker.debian.org/tracker/qpdf</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3548.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3549.data b/english/lts/security/2023/dla-3549.data
deleted file mode 100644
index 79cb0186009..00000000000
--- a/english/lts/security/2023/dla-3549.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3549-1 ring</define-tag>
-<define-tag report_date>2023-8-29</define-tag>
-<define-tag secrefs>CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722 CVE-2022-21723 CVE-2022-23537 CVE-2022-23547 CVE-2022-23608 CVE-2022-24754 CVE-2022-24763 CVE-2022-24764 CVE-2022-24793 CVE-2022-31031 CVE-2022-39244 CVE-2023-27585</define-tag>
-<define-tag packages>ring</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3549.wml b/english/lts/security/2023/dla-3549.wml
deleted file mode 100644
index d82d000c4bb..00000000000
--- a/english/lts/security/2023/dla-3549.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Several issue have been found in ring/jami, a secure and distributed
-voice, video and chat platform.
-The issues are about missing boundary checks, resulting in out-of-bound
-read access, buffer overflow or denial-of-service.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-20190215.1.f152c98~ds1-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your ring/jami packages.</p>
-
-<p>For the detailed security status of ring please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ring">https://security-tracker.debian.org/tracker/ring</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3549.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3550.data b/english/lts/security/2023/dla-3550.data
deleted file mode 100644
index 74a27549ade..00000000000
--- a/english/lts/security/2023/dla-3550.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3550-1 opendmarc</define-tag>
-<define-tag report_date>2023-09-05</define-tag>
-<define-tag secrefs></define-tag>
-<define-tag packages>opendmarc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3550.wml b/english/lts/security/2023/dla-3550.wml
deleted file mode 100644
index b8988a5d833..00000000000
--- a/english/lts/security/2023/dla-3550.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an issue in the opendmarc DMARC email
-filter system. A call to <tt>db_stop</tt> was missing from the
-post-installation script which meant that, under some configurations, the
-script would hang indefinitely.</p>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.3.2-6+deb10u4.</p>
-
-<p>We recommend that you upgrade your opendmarc packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3550.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3551.data b/english/lts/security/2023/dla-3551.data
deleted file mode 100644
index 840178fcc06..00000000000
--- a/english/lts/security/2023/dla-3551.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3551-1 otrs2</define-tag>
-<define-tag report_date>2023-08-31</define-tag>
-<define-tag secrefs>CVE-2019-11358 CVE-2019-12248 CVE-2019-12497 CVE-2019-12746 CVE-2019-13458 CVE-2019-16375 CVE-2019-18179 CVE-2019-18180 CVE-2020-1765 CVE-2020-1766 CVE-2020-1767 CVE-2020-1769 CVE-2020-1770 CVE-2020-1771 CVE-2020-1772 CVE-2020-1773 CVE-2020-1774 CVE-2020-1776 CVE-2020-11022 CVE-2020-11023 CVE-2021-21252 CVE-2021-21439 CVE-2021-21440 CVE-2021-21441 CVE-2021-21443 CVE-2021-36091 CVE-2021-36100 CVE-2021-41182 CVE-2021-41183 CVE-2021-41184 CVE-2022-4427 CVE-2023-38060 Bug#945251 Bug#959448 Bug#980891 Bug#989992 Bug#991593</define-tag>
-<define-tag packages>otrs2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3551.wml b/english/lts/security/2023/dla-3551.wml
deleted file mode 100644
index eb498b6b548..00000000000
--- a/english/lts/security/2023/dla-3551.wml
+++ /dev/null
@@ -1,325 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in otrs2, the Open-Source Ticket
-Request System, which could lead to impersonation, denial of service,
-information disclosure, or execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11358">CVE-2019-11358</a>
-
- <p>A Prototype Pollution vulnerability was discovered in OTRS' embedded
- jQuery 3.2.1 copy, which could allow sending drafted messages as
- wrong agent.</p>
-
- <p>This vulnerability is also known as OSA-2020-05.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12248">CVE-2019-12248</a>
-
- <p>Matthias Terlinde discovered that when an attacker sends a malicious
- email to an OTRS system and a logged in agent user later quotes it,
- the email could cause the browser to load external image resources.</p>
-
- <p>A new configuration setting <code>Ticket::Frontend::BlockLoadingRemoteContent</code>
- has been added as part of the fix. It controls whether external
- content should be loaded, and it is disabled by default.</p>
-
- <p>This vulnerability is also known as OSA-2019-08.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12497">CVE-2019-12497</a>
-
- <p>Jens Meister discovered that in the customer or external frontend,
- personal information of agents, like Name and mail address in
- external notes, could be disclosed.</p>
-
- <p>New configuration settings <code>Ticket::Frontend::CustomerTicketZoom###DisplayNoteFrom</code>
- has been added as part of the fix. It controls if agent information
- should be displayed in external note sender field, or be substituted
- with a different generic name. Another option named
- <code>Ticket::Frontend::CustomerTicketZoom###DefaultAgentName</code> can then
- be used to define the generic agent name used in the latter case.
- By default, previous behavior is preserved, in which agent
- information is divulged in the external note From field, for the
- sake of backwards compatibility.</p>
-
- <p>This vulnerability is also known as OSA-2019-09.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-12746">CVE-2019-12746</a>
-
- <p>A user logged into OTRS as an agent might unknowingly disclose their
- session ID by sharing the link of an embedded ticket article with
- third parties. This identifier can be then potentially abused in
- order to impersonate the agent user.</p>
-
- <p>This vulnerability is also known as OSA-2019-10.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13458">CVE-2019-13458</a>
-
- <p>An attacker who is logged into OTRS as an agent user with
- appropriate permissions can leverage OTRS tags in templates in order
- to disclose hashed user passwords.</p>
-
- <p>This vulnerability is also known as OSA-2019-12.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-16375">CVE-2019-16375</a>
-
- <p>An attacker who is logged into OTRS as an agent or customer user
- with appropriate permissions can create a carefully crafted string
- containing malicious JavaScript code as an article body. This
- malicious code is executed when an agent compose an answer to the
- original article.</p>
-
- <p>This vulnerability is also known as OSA-2019-13.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18179">CVE-2019-18179</a>
-
- <p>An attacker who is logged into OTRS as an agent is able to list
- tickets assigned to other agents, which are in the queue where
- attacker doesn't have permissions.</p>
-
- <p>This vulnerability is also known as OSA-2019-14.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-18180">CVE-2019-18180</a>
-
- <p>OTRS can be put into an endless loop by providing filenames with
- overly long extensions. This applies to the PostMaster (sending in
- email) and also upload (attaching files to mails, for example).</p>
-
- <p>This vulnerability is also known as OSA-2019-15.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1765">CVE-2020-1765</a>
-
- <p>Sebastian Renker and Jonas Becker discovered an improper control of
- parameters, which allows the spoofing of the From fields in several
- screens, namely AgentTicketCompose, AgentTicketForward,
- AgentTicketBounce and AgentTicketEmailOutbound.</p>
-
- <p>This vulnerability is also known as OSA-2020-01.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1766">CVE-2020-1766</a>
-
- <p>Anton Astaf'ev discovered that due to improper handling of uploaded
- images, it is possible — in very unlikely and rare conditions — to
- force the agents browser to execute malicious JavaScript from a
- special crafted SVG file rendered as inline jpg file.</p>
-
- <p>This vulnerability is also known as OSA-2020-02.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1767">CVE-2020-1767</a>
-
- <p>Agent A is able to save a draft (i.e., for customer reply). Then
- Agent B can open the draft, change the text completely and send it
- in the name of Agent A. For the customer it will not be visible
- that the message was sent by another agent.</p>
-
- <p>This vulnerability is also known as OSA-2020-03.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1769">CVE-2020-1769</a>
-
- <p>Martin Møller discovered that in the login screens (in agent and
- customer interface), Username and Password fields use autocomplete,
- which might be considered as security issue.</p>
-
- <p>A new configuration setting <code>DisableLoginAutocomplete</code> has been
- added as part of the fix. It controls whether to disable
- autocompletion in the login forms, by setting the
- <code>autocomplete="off"</code> attribute to the login input fields. Note that
- some browsers ignore it by default (usually it can be changed in the
- browser configuration).</p>
-
- <p>This vulnerability is also known as OSA-2020-06.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1770">CVE-2020-1770</a>
-
- <p>Matthias Terlinde discovered that the support bundle generated files
- could contain sensitive information, such as user credentials.</p>
-
- <p>This vulnerability is also known as OSA-2020-07.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1771">CVE-2020-1771</a>
-
- <p>Christoph Wuetschne discovered that an attacker is able craft an
- article with a link to the customer address book with malicious
- content (JavaScript). When agent opens the link, JavaScript code is
- executed due to the missing parameter encoding.</p>
-
- <p>This vulnerability is also known as OSA-2020-08.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1772">CVE-2020-1772</a>
-
- <p>Fabian Henneke discovered that it is possible to craft Lost Password
- requests with wildcards in the Token value, which allows an attacker
- to retrieve valid Token(s), generated by users which already
- requested new passwords.</p>
-
- <p>This vulnerability is also known as OSA-2020-09.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1773">CVE-2020-1773</a>
-
- <p>Fabian Henneke discovered that an attacker with the ability to
- generate session IDs or password reset tokens, either by being able
- to authenticate or by exploiting <a href="https://security-tracker.debian.org/tracker/CVE-2020-1772">CVE-2020-1772</a>, may be able to
- predict other users session IDs, password reset tokens and
- automatically generated passwords.</p>
-
- <p>The fix adds <code>libmath-random-secure-perl</code> to otrs2's
- Depends: field.</p>
-
- <p>This vulnerability is also known as OSA-2020-10.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1774">CVE-2020-1774</a>
-
- <p>When a user downloads PGP or S/MIME keys/certificates, exported file
- has same name for private and public keys. It is therefore possible
- to mix them and to send private key to the third-party instead of
- public key.</p>
-
- <p>This vulnerability is also known as OSA-2020-11.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1776">CVE-2020-1776</a>
-
- <p>When an agent user is renamed or set to invalid the session
- belonging to the user is keept active. The session can not be used
- to access ticket data in the case the agent is invalid.</p>
-
- <p>This vulnerability is also known as OSA-2020-13.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11022">CVE-2020-11022</a>
-
- <p>Masato Kinugawa discovered a Potential XSS vulnerability in OTRS'
- embedded jQuery 3.2.1's htmlPrefilter and related methods.</p>
-
- <p>The fix requires patching embedded copies of fullcalendar (3.4.0),
- fullcalendar-scheduler (1.6.2) and spectrum (1.8.0).</p>
-
- <p>This vulnerability is also known as OSA-2020-14.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11023">CVE-2020-11023</a>
-
- <p>Masato Kinugawa discovered a Potential XSS vulnerability in OTRS'
- embedded jQuery 3.2.1 copy when appending HTML containing option
- elements.</p>
-
- <p>This vulnerability is also known as OSA-2020-14.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21252">CVE-2021-21252</a>
-
- <p>Erik Krogh Kristensen and Alvaro Muñoz from the GitHub Security Lab
- team discovered a Regular Expression Denial of Service (ReDoS)
- vulnerability in OTRS' embedded jQuery-validate 1.16.0 copy.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21439">CVE-2021-21439</a>
-
- <p>A Denial of Service (DoS) attack can be performed when an email
- contains specially designed URL in the body. It can lead to the
- high CPU usage and cause low quality of service, or in extreme case
- bring the system to a halt.</p>
-
- <p>This vulnerability is also known as OSA-2021-09 or ZSA-2021-03.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21440">CVE-2021-21440</a>
-
- <p>Julian Droste and Mathias Terlinde discovered that the Generated
- Support Bundles contains private S/MIME and PGP keys when the parent
- directory is not hidden. Furthermore, secrets and PIN for the keys
- are not masked properly.</p>
-
- <p>This vulnerability is also known as OSA-2021-10 or ZSA-2021-08.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21441">CVE-2021-21441</a>
-
- <p>There is a Cross-Site Scripting (XSS) vulnerability in the ticket
- overview screens. It is possible to collect various information by
- having an e-mail shown in the overview screen. An attack can be
- performed by sending specially crafted e-mail to the system, which
- does not require any user interaction.</p>
-
- <p>This vulnerability is also known as OSA-2021-11 or ZSA-2021-06.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21443">CVE-2021-21443</a>
-
- <p>Agents are able to list customer user emails without required
- permissions in the bulk action screen.</p>
-
- <p>This vulnerability is also known as OSA-2021-13 or ZSA-2021-09.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36091">CVE-2021-36091</a>
-
- <p>Agents are able to list appointments in the calendars without
- required permissions.</p>
-
- <p>This vulnerability is also known as OSA-2021-14 or ZSA-2021-10.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36100">CVE-2021-36100</a>
-
- <p>Rayhan Ahmed and Maxime Brigaudeau discovered that a specially
- crafted string in the system configuration allows execution of
- arbitrary system command.</p>
-
- <p>The fix 1/ removes configurable system commands from generic agents;
- 2/ removes the <code>MIME-Viewer###…</code> settings (the system command in
- SysConfig option <code>MIME-Viewer</code> is now only configurable via
- Kernel/Config.pm); 3/ removes dashboard widget support for execution
- of system commands; and 4/ deactivates support for execution of
- configurable system commands from Sendmail and PostMaster pre-filter
- configurations.</p>
-
- <p>This vulnerability is also known as OSA-2022-03 or ZSA-2022-02.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41182">CVE-2021-41182</a>
-
- <p>Esben Sparre Andreasen discovered an XSS vulnerability in the
- <code>altField</code> option of the Datepicker widget in OTRS' embedded
- jQuery-UI 1.12.1 copy.</p>
-
- <p>This vulnerability is also known as ZSA-2022-01.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41183">CVE-2021-41183</a>
-
- <p>Esben Sparre Andreasen discovered an XSS vulnerability in the
- <code>*Text</code> options of the Datepicker widget in OTRS' embedded jQuery-UI
- 1.12.1 copy.</p>
-
- <p>This vulnerability is also known as ZSA-2022-01.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41184">CVE-2021-41184</a>
-
- <p>Esben Sparre Andreasen discovered an XSS vulnerability in the <code>of</code>
- option of the <code>.position()</code> util in OTRS' embedded jQuery-UI 1.12.1
- copy.</p>
-
- <p>This vulnerability is also known as ZSA-2022-01.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4427">CVE-2022-4427</a>
-
- <p>Tim Püttmanns discovered an SQL injection vulnerability in
- <code>Kernel::System::Ticket::TicketSearch</code>, which can be exploited using
- the web service operation <q>TicketSearch</q>.</p>
-
- <p>This vulnerability is also known as ZSA-2022-07.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-38060">CVE-2023-38060</a>
-
- <p>Tim Püttmanns discovered an Improper Input Validation vulnerability
- in the ContentType parameter for attachments on TicketCreate or
- TicketUpdate operations.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-6.0.16-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your otrs2 packages.</p>
-
-<p>For the detailed security status of otrs2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/otrs2">https://security-tracker.debian.org/tracker/otrs2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3551.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3552.data b/english/lts/security/2023/dla-3552.data
deleted file mode 100644
index b4765ebf962..00000000000
--- a/english/lts/security/2023/dla-3552.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3552-1 gst-plugins-ugly1.0</define-tag>
-<define-tag report_date>2023-08-31</define-tag>
-<define-tag secrefs>CVE-2023-38103 CVE-2023-38104 bug#1043501</define-tag>
-<define-tag packages>gst-plugins-ugly1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3552.wml b/english/lts/security/2023/dla-3552.wml
deleted file mode 100644
index 3093b242900..00000000000
--- a/english/lts/security/2023/dla-3552.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Demuxer vulnerabilities have been fixed in the RealMedia demuxers for
-the GStreamer media framework.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.4-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your gst-plugins-ugly1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-ugly1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0">https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3552.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3553.data b/english/lts/security/2023/dla-3553.data
deleted file mode 100644
index f671d3f593c..00000000000
--- a/english/lts/security/2023/dla-3553.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3553-1 firefox-esr</define-tag>
-<define-tag report_date>2023-09-01</define-tag>
-<define-tag secrefs>CVE-2023-4573 CVE-2023-4574 CVE-2023-4575 CVE-2023-4581 CVE-2023-4584</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3553.wml b/english/lts/security/2023/dla-3553.wml
deleted file mode 100644
index 5795d470922..00000000000
--- a/english/lts/security/2023/dla-3553.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox
-web browser, which could potentially result in the execution
-of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-102.15.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3553.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3554.data b/english/lts/security/2023/dla-3554.data
deleted file mode 100644
index e901d582f3d..00000000000
--- a/english/lts/security/2023/dla-3554.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3554-1 thunderbird</define-tag>
-<define-tag report_date>2023-09-05</define-tag>
-<define-tag secrefs>CVE-2023-4573 CVE-2023-4574 CVE-2023-4575 CVE-2023-4581 CVE-2023-4584</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3554.wml b/english/lts/security/2023/dla-3554.wml
deleted file mode 100644
index 5a76cb0fcc4..00000000000
--- a/english/lts/security/2023/dla-3554.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:102.15.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3554.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3555.data b/english/lts/security/2023/dla-3555.data
deleted file mode 100644
index d399bccab93..00000000000
--- a/english/lts/security/2023/dla-3555.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3555-1 php7.3</define-tag>
-<define-tag report_date>2023-09-05</define-tag>
-<define-tag secrefs>CVE-2023-3823 CVE-2023-3824</define-tag>
-<define-tag packages>php7.3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3555.wml b/english/lts/security/2023/dla-3555.wml
deleted file mode 100644
index 5c697609b00..00000000000
--- a/english/lts/security/2023/dla-3555.wml
+++ /dev/null
@@ -1,50 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security issues were found in PHP, a widely-used open source general
-purpose scripting language, which could result in information
-disclosure, denial of service or potentially remote code execution.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3823">CVE-2023-3823</a>
-
- <p>Various XML functions rely on libxml global state to track
- configuration variables, like whether external entities are loaded.
- This state is assumed to be unchanged unless the user explicitly
- changes it by calling appropriate function. Joas Schilling and
- Baptista Katapi discovered that, since the state is process-global,
- other modules — such as ImageMagick — may also use this library
- within the same process and change that global state for their
- internal purposes, and leave it in a state where external entities
- loading is enabled. This can lead to the situation where external
- XML is parsed with external entities loaded, which can lead to
- disclosure of any local files accessible to PHP. This vulnerable
- state may persist in the same process across many requests, until
- the process is shut down.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3824">CVE-2023-3824</a>
-
- <p>Niels Dossche discovered that when loading a Phar file, while
- reading PHAR directory entries, insufficient length checking may
- lead to a stack buffer overflow, leading potentially to memory
- corruption or RCE.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.3.31-1~deb10u5.</p>
-
-<p>We recommend that you upgrade your php7.3 packages.</p>
-
-<p>For the detailed security status of php7.3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/php7.3">https://security-tracker.debian.org/tracker/php7.3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3555.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3556.data b/english/lts/security/2023/dla-3556.data
deleted file mode 100644
index c997d245512..00000000000
--- a/english/lts/security/2023/dla-3556.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3556-1 aom</define-tag>
-<define-tag report_date>2023-9-06</define-tag>
-<define-tag secrefs>CVE-2020-36130 CVE-2020-36131 CVE-2020-36133 CVE-2020-36135 CVE-2021-30473 CVE-2021-30474 CVE-2021-30475</define-tag>
-<define-tag packages>aom</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3556.wml b/english/lts/security/2023/dla-3556.wml
deleted file mode 100644
index 3c5a4452723..00000000000
--- a/english/lts/security/2023/dla-3556.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities have been discovered in aom, the AV1
-Video Codec Library. Buffer overflows, use-after-free and NULL pointer
-dereferences may cause a denial of service or other unspecified impact if a
-malformed multimedia file is processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.0-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your aom packages.</p>
-
-<p>For the detailed security status of aom please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/aom">https://security-tracker.debian.org/tracker/aom</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3556.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3557.data b/english/lts/security/2023/dla-3557.data
deleted file mode 100644
index e193a25608b..00000000000
--- a/english/lts/security/2023/dla-3557.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3557-1 memcached</define-tag>
-<define-tag report_date>2023-09-07</define-tag>
-<define-tag secrefs>CVE-2022-48571</define-tag>
-<define-tag packages>memcached</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3557.wml b/english/lts/security/2023/dla-3557.wml
deleted file mode 100644
index d75370eb6b2..00000000000
--- a/english/lts/security/2023/dla-3557.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential Denial of Service (DoS)
-vulnerability in memcached, a high-performance in-memory object caching
-system.</p>
-
-<p>A crash could have occured when handling "multi-packet" uploads in UDP mode.
-Deployments of memcached that only use TCP are likely unaffected by this
-issue.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48571">CVE-2022-48571</a>
-
- <p>memcached 1.6.7 allows a Denial of Service via multi-packet uploads in UDP.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.5.6-1.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your memcached packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3557.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3558.data b/english/lts/security/2023/dla-3558.data
deleted file mode 100644
index 18cca49f6a7..00000000000
--- a/english/lts/security/2023/dla-3558.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3558-1 python-django</define-tag>
-<define-tag report_date>2023-09-07</define-tag>
-<define-tag secrefs>CVE-2023-41164</define-tag>
-<define-tag packages>python-django</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3558.wml b/english/lts/security/2023/dla-3558.wml
deleted file mode 100644
index ee6a150df96..00000000000
--- a/english/lts/security/2023/dla-3558.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential denial of service vulnerability
-in Django, a popular Python-based web development framework.</p>
-
-<p>Upstream reported that there was a potential vulnerability in
-<code>django.utils.encoding.uri_to_iri()</code>. This method was subject to
-potential DoS attack via certain inputs with a very large number of Unicode
-characters.</p>
-
-<ul>
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41164">CVE-2023-41164</a></li>
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1:1.11.29-1+deb10u10.</p>
-
-<p>We recommend that you upgrade your python-django packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3558.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3559.data b/english/lts/security/2023/dla-3559.data
deleted file mode 100644
index ec12abd356c..00000000000
--- a/english/lts/security/2023/dla-3559.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3559-1 libssh2</define-tag>
-<define-tag report_date>2023-09-08</define-tag>
-<define-tag secrefs>CVE-2019-13115 CVE-2019-17498 CVE-2020-22218 Bug#932329 Bug#943562</define-tag>
-<define-tag packages>libssh2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3559.wml b/english/lts/security/2023/dla-3559.wml
deleted file mode 100644
index 1e3e6645520..00000000000
--- a/english/lts/security/2023/dla-3559.wml
+++ /dev/null
@@ -1,51 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Vulnerabilities were found in libssh2, a client-side C library
-implementing the SSH2 protocol, which could lead to denial of service or
-remote information disclosure.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13115">CVE-2019-13115</a>
-
- <p>Kevin Backhouse discovered an integer overflow vulnerability in
- <code>kex.c</code>'s <code>kex_method_diffie_hellman_group_exchange_sha256_key_exchange()</code>
- function, which could lead to an out-of-bounds read in the way
- packets are read from the server. A remote attacker who compromises
- an SSH server may be able to disclose sensitive information or cause
- a denial of service condition on the client system when a user
- connects to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-17498">CVE-2019-17498</a>
-
- <p>Kevin Backhouse discovered that the <code>SSH_MSG_DISCONNECT</code> logic in
- packet.c has an integer overflow in a bounds check, thereby enabling
- an attacker to specify an arbitrary (out-of-bounds) offset for a
- subsequent memory read. A malicious SSH server may be able to
- disclose sensitive information or cause a denial of service
- condition on the client system when a user connects to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22218">CVE-2020-22218</a>
-
- <p>An issue was discovered in <code>function _libssh2_packet_add()</code>, which
- could allow attackers to access out of bounds memory.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.8.0-2.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your libssh2 packages.</p>
-
-<p>For the detailed security status of libssh2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libssh2">https://security-tracker.debian.org/tracker/libssh2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3559.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3560.data b/english/lts/security/2023/dla-3560.data
deleted file mode 100644
index 199035b2d79..00000000000
--- a/english/lts/security/2023/dla-3560.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3560-1 libraw</define-tag>
-<define-tag report_date>2023-09-10</define-tag>
-<define-tag secrefs>CVE-2020-22628</define-tag>
-<define-tag packages>libraw</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3560.wml b/english/lts/security/2023/dla-3560.wml
deleted file mode 100644
index 0103a417703..00000000000
--- a/english/lts/security/2023/dla-3560.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A Buffer Overflow vulnerability was found in the <code>LibRaw::stretch()</code>
-function, which could lead to denial of service when parsing a malicious CRW file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.19.2-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your libraw packages.</p>
-
-<p>For the detailed security status of libraw please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libraw">https://security-tracker.debian.org/tracker/libraw</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3560.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3561.data b/english/lts/security/2023/dla-3561.data
deleted file mode 100644
index 43e95202d84..00000000000
--- a/english/lts/security/2023/dla-3561.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3561-1 node-cookiejar</define-tag>
-<define-tag report_date>2023-09-11</define-tag>
-<define-tag secrefs>CVE-2022-25901</define-tag>
-<define-tag packages>node-cookiejar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3561.wml b/english/lts/security/2023/dla-3561.wml
deleted file mode 100644
index 8c9ce165ffe..00000000000
--- a/english/lts/security/2023/dla-3561.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential Regular Expression Denial of
-Service (ReDoS) attack in node-cookiejar, a Node.js library for parsing and
-manipulating HTTP cookies. An attack was possible via passing a large value to
-the <code>Cookie.parse</code> function.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-25901">CVE-2022-25901</a>
-
- <p>Versions of the package cookiejar before 2.1.4 are vulnerable to Regular
- Expression Denial of Service (ReDoS) via the Cookie.parse function, which
- uses an insecure regular expression.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-2.0.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-cookiejar packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3561.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3562.data b/english/lts/security/2023/dla-3562.data
deleted file mode 100644
index 11a333f8518..00000000000
--- a/english/lts/security/2023/dla-3562.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3562-1 orthanc</define-tag>
-<define-tag report_date>2023-09-12</define-tag>
-<define-tag secrefs>CVE-2023-33466 Bug#1040597</define-tag>
-<define-tag packages>orthanc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3562.wml b/english/lts/security/2023/dla-3562.wml
deleted file mode 100644
index a7ff5b13420..00000000000
--- a/english/lts/security/2023/dla-3562.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was identified in Orthanc, a DICOM server used for
-medical imaging, whereby authenticated API users had the capability to overwrite
-arbitrary files and, in certain configurations, execute unauthorized code.</p>
-
-<p>This update addresses the issue by backporting a safeguard mechanism: the
-RestApiWriteToFileSystemEnabled option is now included, and it is set to <q>true</q>
-by default in the /etc/orthanc/orthanc.json configuration file. Should users
-wish to revert to the previous behavior, they can manually set this option
-to <q>true</q> themselves.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.5.6+dfsg-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your orthanc packages.</p>
-
-<p>For the detailed security status of orthanc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/orthanc">https://security-tracker.debian.org/tracker/orthanc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3562.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3563.data b/english/lts/security/2023/dla-3563.data
deleted file mode 100644
index c82b1b33adc..00000000000
--- a/english/lts/security/2023/dla-3563.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3563-1 samba</define-tag>
-<define-tag report_date>2023-09-14</define-tag>
-<define-tag secrefs>CVE-2016-2124 CVE-2019-10218 CVE-2019-14833 CVE-2019-14847 CVE-2019-14902 CVE-2019-14907 CVE-2019-19344</define-tag>
-<define-tag packages>samba</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3563.wml b/english/lts/security/2023/dla-3563.wml
deleted file mode 100644
index 3448b05ba2c..00000000000
--- a/english/lts/security/2023/dla-3563.wml
+++ /dev/null
@@ -1,87 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Samba, the SMB/CIFS file, print, and
-login server for Unix.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2124">CVE-2016-2124</a>
-
- <p>A flaw was found in the way samba implemented SMB1 authentication. An
- attacker could use this flaw to retrieve the plaintext password sent over
- the wire even if Kerberos authentication was required.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10218">CVE-2019-10218</a>
-
- <p>A flaw was found in the samba client, all samba versions before samba
- 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname
- to the client with separators. This could allow the client to access files
- and folders outside of the SMB network pathnames. An attacker could use this
- vulnerability to create files outside of the current working directory using
- the privileges of the client user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14833">CVE-2019-14833</a>
-
- <p>A flaw was found in Samba, all versions starting samba 4.5.0 before samba
- 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password
- change or a new password for a samba user. The Samba Active Directory Domain
- Controller can be configured to use a custom script to check for password
- complexity. This configuration can fail to verify password complexity when
- non-ASCII characters are used in the password, which could lead to weak
- passwords being set for samba users, making it vulnerable to dictionary
- attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14847">CVE-2019-14847</a>
-
- <p>A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before
- 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in
- denial of service. Privilege escalation is not possible with this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14902">CVE-2019-14902</a>
-
- <p>There is an issue in all samba 4.11.x versions before 4.11.5, all samba
- 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18,
- where the removal of the right to create or modify a subtree would not
- automatically be taken away on all domain controllers.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-14907">CVE-2019-14907</a>
-
- <p>All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x
- before 4.11.5 have an issue where if it is set with "log level = 3" (or
- above) then the string obtained from the client, after a failed character
- conversion, is printed. Such strings can be provided during the NTLMSSP
- authentication exchange. In the Samba AD DC in particular, this may cause a
- long-lived process(such as the RPC server) to terminate. (In the file server
- case, the most likely target, smbd, operates as process-per-client and so a
- crash there is harmless).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19344">CVE-2019-19344</a>
-
- <p>There is a use-after-free issue in all samba 4.9.x versions before 4.9.18,
- all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions
- before 4.11.5, essentially due to a call to realloc() while other local
- variables still point at the original buffer.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:4.9.5+dfsg-5+deb10u4.</p>
-
-<p>We recommend that you upgrade your samba packages.</p>
-
-<p>Admins of AD DC setups are reminded and strongly encouraged to upgrade to
-bullseye and then bookworm, as AD DC setups are unsupported in buster since <a href="https://www.debian.org/security/2021/dsa-5015">DSA
-5015-1</a>, and in bullseye since <a href="https://www.debian.org/security/2023/dsa-5477">DSA 5477-1</a>.</p>
-
-<p>For the detailed security status of samba please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/samba">https://security-tracker.debian.org/tracker/samba</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3563.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3564.data b/english/lts/security/2023/dla-3564.data
deleted file mode 100644
index e2f749c123b..00000000000
--- a/english/lts/security/2023/dla-3564.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3564-1 e2guardian</define-tag>
-<define-tag report_date>2023-09-12</define-tag>
-<define-tag secrefs>CVE-2021-44273</define-tag>
-<define-tag packages>e2guardian</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3564.wml b/english/lts/security/2023/dla-3564.wml
deleted file mode 100644
index ac23bca2320..00000000000
--- a/english/lts/security/2023/dla-3564.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential Man In the Middle (MITM)
-vulnerability in e2guardian, a web content filtering engine.</p>
-
-<p>Validation of SSL certificates was missing in e2guardian's own MITM
-prevention engine. In standalone mode (ie. acting as a proxy or a transparent
-proxy) with SSL MITM enabled, e2guardian did not validate hostnames in
-certificates of the web servers that it connected to, and thus was itself
-vulnerable to MITM attacks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-44273">CVE-2021-44273</a>
-
- <p>e2guardian v5.4.x &lt;= v5.4.3r is affected by missing SSL certificate
- validation in the SSL MITM engine. In standalone mode (i.e., acting as a
- proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built
- with OpenSSL v1.1.x, did not validate hostnames in certificates of the web
- servers that it connected to, and thus was itself vulnerable to MITM
- attacks.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5.3.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your e2guardian packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3564.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3565.data b/english/lts/security/2023/dla-3565.data
deleted file mode 100644
index 749e5203b1a..00000000000
--- a/english/lts/security/2023/dla-3565.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3565-1 ruby-loofah</define-tag>
-<define-tag report_date>2023-09-13</define-tag>
-<define-tag secrefs>CVE-2022-23514 CVE-2022-23515 CVE-2022-23516 Bug#1026083</define-tag>
-<define-tag packages>ruby-loofah</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3565.wml b/english/lts/security/2023/dla-3565.wml
deleted file mode 100644
index 0a6f7559b4c..00000000000
--- a/english/lts/security/2023/dla-3565.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Loofah, a Ruby library for
-HTML/XML transformation and sanitization. An attacker could launch
-cross-site scripting (XSS) and denial-of-service (DoS) attacks through
-crafted HTML/XML documents.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23514">CVE-2022-23514</a>
-
- <p>Inefficient regular expression that is susceptible to excessive
- backtracking when attempting to sanitize certain SVG
- attributes. This may lead to a denial of service through CPU
- resource consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23515">CVE-2022-23515</a>
-
- <p>Cross-site scripting via the image/svg+xml media type in data
- URIs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23516">CVE-2022-23516</a>
-
- <p>Loofah uses recursion for sanitizing CDATA sections, making it
- susceptible to stack exhaustion and raising a SystemStackError
- exception. This may lead to a denial of service through CPU
- resource consumption.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.2.3-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your ruby-loofah packages.</p>
-
-<p>For the detailed security status of ruby-loofah please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-loofah">https://security-tracker.debian.org/tracker/ruby-loofah</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3565.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3566.data b/english/lts/security/2023/dla-3566.data
deleted file mode 100644
index 10ea19feb95..00000000000
--- a/english/lts/security/2023/dla-3566.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3566-1 ruby-rails-html-sanitizer</define-tag>
-<define-tag report_date>2023-09-13</define-tag>
-<define-tag secrefs>CVE-2022-23517 CVE-2022-23518 CVE-2022-23519 CVE-2022-23520 Bug#1027153</define-tag>
-<define-tag packages>ruby-rails-html-sanitizer</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3566.wml b/english/lts/security/2023/dla-3566.wml
deleted file mode 100644
index 79dd2925be8..00000000000
--- a/english/lts/security/2023/dla-3566.wml
+++ /dev/null
@@ -1,57 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in Rails HTML Sanitizers, an
-HTML sanitization library for Ruby on Rails applications. An attacker
-could launch cross-site scripting (XSS) and denial-of-service (DoS)
-attacks through crafted HTML/XML documents.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23517">CVE-2022-23517</a>
-
- <p>Certain configurations use an inefficient regular expression that
- is susceptible to excessive backtracking when attempting to
- sanitize certain SVG attributes. This may lead to a denial of
- service through CPU resource consumption.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23518">CVE-2022-23518</a>
-
- <p>Cross-site scripting via data URIs when used in combination with
- Loofah >= 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23519">CVE-2022-23519</a>
-
- <p>XSS vulnerability with certain configurations of
- Rails::Html::Sanitizer may allow an attacker to inject content if
- the application developer has overridden the sanitizer's allowed
- tags in either of the following ways: allow both <q>math</q> and
- <q>style</q> elements, or allow both <q>svg</q> and <q>style</q> elements.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-23520">CVE-2022-23520</a>
-
- <p>XSS vulnerability with certain configurations of
- Rails::Html::Sanitizer due to an incomplete fix of
- <a href="https://security-tracker.debian.org/tracker/CVE-2022-32209">CVE-2022-32209</a>. Rails::Html::Sanitizer may allow an attacker to
- inject content if the application developer has overridden the
- sanitizer's allowed tags to allow both <q>select</q> and <q>style</q>
- elements.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.4-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your ruby-rails-html-sanitizer packages.</p>
-
-<p>For the detailed security status of ruby-rails-html-sanitizer please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rails-html-sanitizer">https://security-tracker.debian.org/tracker/ruby-rails-html-sanitizer</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3566.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3567.data b/english/lts/security/2023/dla-3567.data
deleted file mode 100644
index 3dc470fae4c..00000000000
--- a/english/lts/security/2023/dla-3567.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3567-1 c-ares</define-tag>
-<define-tag report_date>2023-09-15</define-tag>
-<define-tag secrefs>CVE-2020-22217</define-tag>
-<define-tag packages>c-ares</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3567.wml b/english/lts/security/2023/dla-3567.wml
deleted file mode 100644
index 9344d48c14a..00000000000
--- a/english/lts/security/2023/dla-3567.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been identified in c-ares, an asynchronous name
-resolver library:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-22217">CVE-2020-22217</a>:
-
- <p>A buffer overflow vulnerability has been found in c-ares before
- via the function ares_parse_soa_reply in ares_parse_soa_reply.c.
- This vulnerability was discovered through fuzzing. Exploitation
- of this vulnerability may allow an attacker to execute arbitrary
- code or cause a denial of service condition.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.0-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your c-ares packages.</p>
-
-<p>For the detailed security status of c-ares please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/c-ares">https://security-tracker.debian.org/tracker/c-ares</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3567.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3568.data b/english/lts/security/2023/dla-3568.data
deleted file mode 100644
index 355435b1f06..00000000000
--- a/english/lts/security/2023/dla-3568.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3568-1 firefox-esr</define-tag>
-<define-tag report_date>2023-09-16</define-tag>
-<define-tag secrefs>CVE-2023-4863</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3568.wml b/english/lts/security/2023/dla-3568.wml
deleted file mode 100644
index 99ad6404cad..00000000000
--- a/english/lts/security/2023/dla-3568.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow in parsing WebP images may result in the execution of
-arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-102.15.1esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3568.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3569.data b/english/lts/security/2023/dla-3569.data
deleted file mode 100644
index 79aae0a002c..00000000000
--- a/english/lts/security/2023/dla-3569.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3569-1 thunderbird</define-tag>
-<define-tag report_date>2023-09-17</define-tag>
-<define-tag secrefs>CVE-2023-4863</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3569.wml b/english/lts/security/2023/dla-3569.wml
deleted file mode 100644
index 2553327644d..00000000000
--- a/english/lts/security/2023/dla-3569.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow in parsing WebP images may result in the execution of
-arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:102.15.1-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3569.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3570.data b/english/lts/security/2023/dla-3570.data
deleted file mode 100644
index c87dcbd31df..00000000000
--- a/english/lts/security/2023/dla-3570.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3570-1 libwebp</define-tag>
-<define-tag report_date>2023-09-18</define-tag>
-<define-tag secrefs>CVE-2023-4863</define-tag>
-<define-tag packages>libwebp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3570.wml b/english/lts/security/2023/dla-3570.wml
deleted file mode 100644
index f350167b71f..00000000000
--- a/english/lts/security/2023/dla-3570.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow in parsing WebP images may result in the execution of
-arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.6.1-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your libwebp packages.</p>
-
-<p>For the detailed security status of libwebp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libwebp">https://security-tracker.debian.org/tracker/libwebp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3570.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3571.data b/english/lts/security/2023/dla-3571.data
deleted file mode 100644
index 25fc0f1e3b0..00000000000
--- a/english/lts/security/2023/dla-3571.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3571-1 openjdk-11</define-tag>
-<define-tag report_date>2023-09-19</define-tag>
-<define-tag secrefs>CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968 CVE-2023-22006 CVE-2023-22036 CVE-2023-22041 CVE-2023-22045 CVE-2023-22049</define-tag>
-<define-tag packages>openjdk-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3571.wml b/english/lts/security/2023/dla-3571.wml
deleted file mode 100644
index acc55c88c66..00000000000
--- a/english/lts/security/2023/dla-3571.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the OpenJDK Java runtime,
-which may result in bypass of sandbox restrictions, information
-disclosure, reduced cryptographic strength of the AES implementation,
-directory traversal or denial of service.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-11.0.20+8-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your openjdk-11 packages.</p>
-
-<p>For the detailed security status of openjdk-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-11">https://security-tracker.debian.org/tracker/openjdk-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3571.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3572.data b/english/lts/security/2023/dla-3572.data
deleted file mode 100644
index 02d452ee8b1..00000000000
--- a/english/lts/security/2023/dla-3572.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3572-1 libyang</define-tag>
-<define-tag report_date>2023-9-19</define-tag>
-<define-tag secrefs>CVE-2019-20391 CVE-2019-20392 CVE-2019-20393 CVE-2019-20394 CVE-2019-20395 CVE-2019-20396 CVE-2019-20397 CVE-2019-20398</define-tag>
-<define-tag packages>libyang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3572.wml b/english/lts/security/2023/dla-3572.wml
deleted file mode 100644
index e41133e8d49..00000000000
--- a/english/lts/security/2023/dla-3572.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple flaws were found in libyang, a parser toolkit for IETF YANG data
-modeling. Double frees, invalid memory access and Null pointer dereferences
-may cause a denial of service or potentially code execution.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.16.105+really1.0-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your libyang packages.</p>
-
-<p>For the detailed security status of libyang please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libyang">https://security-tracker.debian.org/tracker/libyang</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3572.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3573.data b/english/lts/security/2023/dla-3573.data
deleted file mode 100644
index f7d4af086cb..00000000000
--- a/english/lts/security/2023/dla-3573.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3573-1 frr</define-tag>
-<define-tag report_date>2023-9-19</define-tag>
-<define-tag secrefs>CVE-2022-36440 CVE-2022-40302 CVE-2022-40318 CVE-2022-43681 CVE-2023-31490 CVE-2023-38802 CVE-2023-41358 CVE-2023-41360 CVE-2023-41361 CVE-2023-41909 Bug#1035829 Bug#1036062</define-tag>
-<define-tag packages>frr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3573.wml b/english/lts/security/2023/dla-3573.wml
deleted file mode 100644
index dcd5b99e7ad..00000000000
--- a/english/lts/security/2023/dla-3573.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were found in frr, the FRRouting suite
-of internet protocols. Maliciously constructed Border Gateway Protocol
-(BGP) packages or corrupted tunnel attributes may cause a denial of service
-(application crash) which could be exploited by a remote attacker.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.5.1-1.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your frr packages.</p>
-
-<p>For the detailed security status of frr please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/frr">https://security-tracker.debian.org/tracker/frr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3573.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3574.data b/english/lts/security/2023/dla-3574.data
deleted file mode 100644
index 504dfeea38a..00000000000
--- a/english/lts/security/2023/dla-3574.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3574-1 mutt</define-tag>
-<define-tag report_date>2023-09-20</define-tag>
-<define-tag secrefs>CVE-2023-4874 CVE-2023-4875 Bug#1051563</define-tag>
-<define-tag packages>mutt</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3574.wml b/english/lts/security/2023/dla-3574.wml
deleted file mode 100644
index 4e082b0503f..00000000000
--- a/english/lts/security/2023/dla-3574.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two NULL pointer dereference flaws were discovered in Mutt, a text-based
-mailreader supporting MIME, GPG, PGP and threading, which may result in denial
-of service (application crash) when viewing a specially crafted email or when
-composing from a specially crafted draft message.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.10.1-2.1+deb10u7.</p>
-
-<p>We recommend that you upgrade your mutt packages.</p>
-
-<p>For the detailed security status of mutt please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mutt">https://security-tracker.debian.org/tracker/mutt</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3574.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3575.data b/english/lts/security/2023/dla-3575.data
deleted file mode 100644
index f5242bff3c2..00000000000
--- a/english/lts/security/2023/dla-3575.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3575-1 python2.7</define-tag>
-<define-tag report_date>2023-09-20</define-tag>
-<define-tag secrefs>CVE-2021-23336 CVE-2022-0391 CVE-2022-48560 CVE-2022-48565 CVE-2022-48566 CVE-2023-24329 CVE-2023-40217</define-tag>
-<define-tag packages>python2.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3575.wml b/english/lts/security/2023/dla-3575.wml
deleted file mode 100644
index adb63860f66..00000000000
--- a/english/lts/security/2023/dla-3575.wml
+++ /dev/null
@@ -1,81 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update fixes multiple vulnerabilities concerning the <code>urlparse</code> module as
-well as vulnerabilities concerning the <code>heapq</code>, <code>hmac</code>, <code>plistlib</code> and <code>ssl</code> modules.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-23336">CVE-2021-23336</a>
-
- <p>Python was vulnerable to Web Cache Poisoning via <code>urlparse.parse_qsl</code> and
- <code>urlparse.parse_qs</code> by using a vector called parameter cloaking. When the
- attacker can separate query parameters using a semicolon (<code>;</code>), they can
- cause a difference in the interpretation of the request between the proxy
- (running with default configuration) and the server. This can result in
- malicious requests being cached as completely safe ones, as the proxy would
- usually not see the semicolon as a separator, and therefore would not
- include it in a cache key of an unkeyed parameter.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-0391">CVE-2022-0391</a>
-
- <p>The <code>urlparse</code> module helps break Uniform Resource Locator (URL) strings into
- components. The issue involves how the urlparse method does not sanitize
- input and allows characters like <code>'\r'</code> and <code>'\n'</code> in the URL path. This flaw
- allows an attacker to input a crafted URL, leading to injection attacks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48560">CVE-2022-48560</a>
-
- <p>A use-after-free exists in Python via <code>heappushpop</code> in <code>heapq</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48565">CVE-2022-48565</a>
-
- <p>An XML External Entity (XXE) issue was discovered in Python. The <code>plistlib</code>
- module no longer accepts entity declarations in XML plist files to avoid
- XML vulnerabilities.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48566">CVE-2022-48566</a>
-
- <p>An issue was discovered in <code>compare_digest</code> in <code>Lib/hmac.py</code> in Python.
- Constant-time-defeating optimisations were possible in the accumulator
- variable in <code>hmac.compare_digest</code>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24329">CVE-2023-24329</a>
-
- <p>An issue in the <code>urlparse</code> component of Python allows attackers to bypass
- blocklisting methods by supplying a URL that starts with blank characters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40217">CVE-2023-40217</a>
-
- <p>The issue primarily affects servers written in Python (such as HTTP
- servers) that use TLS client authentication. If a TLS server-side socket is
- created, receives data into the socket buffer, and then is closed quickly,
- there is a brief window where the <code>SSLSocket</code> instance will detect the socket
- as <q>not connected</q> and won't initiate a handshake, but buffered data will
- still be readable from the socket buffer. This data will not be
- authenticated if the server-side TLS peer is expecting client certificate
- authentication, and is indistinguishable from valid TLS stream data. Data
- is limited in size to the amount that will fit in the buffer. (The TLS
- connection cannot directly be used for data exfiltration because the
- vulnerable code path requires that the connection be closed on
- initialization of the <code>SSLSocket</code>.)</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.7.16-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your python2.7 packages.</p>
-
-<p>For the detailed security status of python2.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python2.7">https://security-tracker.debian.org/tracker/python2.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3575.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3576.data b/english/lts/security/2023/dla-3576.data
deleted file mode 100644
index 011da31fc5c..00000000000
--- a/english/lts/security/2023/dla-3576.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3576-1 gsl</define-tag>
-<define-tag report_date>2023-9-21</define-tag>
-<define-tag secrefs>CVE-2020-35357</define-tag>
-<define-tag packages>gsl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3576.wml b/english/lts/security/2023/dla-3576.wml
deleted file mode 100644
index b338903263f..00000000000
--- a/english/lts/security/2023/dla-3576.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow can occur when calculating the quantile value using the
-Statistics Library of GSL (GNU Scientific Library). Processing a
-maliciously crafted input data for gsl_stats_quantile_from_sorted_data of
-the library may lead to unexpected application termination or arbitrary
-code execution.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.5+dfsg-6+deb10u1.</p>
-
-<p>We recommend that you upgrade your gsl packages.</p>
-
-<p>For the detailed security status of gsl please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/gsl">https://security-tracker.debian.org/tracker/gsl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3576.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3577.data b/english/lts/security/2023/dla-3577.data
deleted file mode 100644
index 0374d183aa7..00000000000
--- a/english/lts/security/2023/dla-3577.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3577-1 roundcube</define-tag>
-<define-tag report_date>2023-09-22</define-tag>
-<define-tag secrefs>CVE-2023-43770 Bug#1052059</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3577.wml b/english/lts/security/2023/dla-3577.wml
deleted file mode 100644
index 3644db29e6f..00000000000
--- a/english/lts/security/2023/dla-3577.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Niraj Shivtarkar discovered a cross-site scripting (XSS) vulnerability in
-Roundcube, a skinnable AJAX based webmail solution for IMAP servers,
-which could lead to information disclosure via malicious link references
-in <code>plain/text</code> messages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.17+dfsg.1-1~deb10u3.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3577.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3578.data b/english/lts/security/2023/dla-3578.data
deleted file mode 100644
index 1e3f5848ed4..00000000000
--- a/english/lts/security/2023/dla-3578.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3578-1 lldpd</define-tag>
-<define-tag report_date>2023-9-22</define-tag>
-<define-tag secrefs>CVE-2023-41910</define-tag>
-<define-tag packages>lldpd</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3578.wml b/english/lts/security/2023/dla-3578.wml
deleted file mode 100644
index c7cecceb9c3..00000000000
--- a/english/lts/security/2023/dla-3578.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Matteo Memelli discovered a flaw in lldpd, an implementation of the IEEE
-802.1ab protocol. By crafting a CDP PDU packet with specific
-CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd
-daemon to perform an out-of-bounds read on heap memory.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.0.3-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your lldpd packages.</p>
-
-<p>For the detailed security status of lldpd please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/lldpd">https://security-tracker.debian.org/tracker/lldpd</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3578.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3579.data b/english/lts/security/2023/dla-3579.data
deleted file mode 100644
index 0870a19c777..00000000000
--- a/english/lts/security/2023/dla-3579.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3579-1 elfutils</define-tag>
-<define-tag report_date>2023-9-23</define-tag>
-<define-tag secrefs>CVE-2020-21047</define-tag>
-<define-tag packages>elfutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3579.wml b/english/lts/security/2023/dla-3579.wml
deleted file mode 100644
index ae49e9e4ef0..00000000000
--- a/english/lts/security/2023/dla-3579.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in elfutils, a collection of utilities to handle
-ELF objects.
-Due to missing bound checks and reachable asserts, an attacker can
-use crafted elf files to trigger application crashes that result in
-denial-of-services.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.176-1.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your elfutils packages.</p>
-
-<p>For the detailed security status of elfutils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/elfutils">https://security-tracker.debian.org/tracker/elfutils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3579.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3580.data b/english/lts/security/2023/dla-3580.data
deleted file mode 100644
index b953c66ab08..00000000000
--- a/english/lts/security/2023/dla-3580.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3580-1 libapache-mod-jk</define-tag>
-<define-tag report_date>2023-9-24</define-tag>
-<define-tag secrefs>CVE-2023-41081 Bug#1051956</define-tag>
-<define-tag packages>libapache-mod-jk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3580.wml b/english/lts/security/2023/dla-3580.wml
deleted file mode 100644
index b2fba850e35..00000000000
--- a/english/lts/security/2023/dla-3580.wml
+++ /dev/null
@@ -1,30 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The mod_jk component of Apache Tomcat Connectors, an Apache 2 module to
-forward requests from Apache to Tomcat, in some circumstances, such as when
-a configuration included "JkOptions +ForwardDirectories" but the
-configuration did not provide explicit mounts for all possible proxied
-requests, mod_jk would use an implicit mapping and map the request to the
-first defined worker. Such an implicit mapping could result in the
-unintended exposure of the status worker and/or bypass security constraints
-configured in httpd. As of this security update, the implicit mapping
-functionality has been removed and all mappings must now be via explicit
-configuration. This issue affects Apache Tomcat Connectors (mod_jk only).</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:1.2.46-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your libapache-mod-jk packages.</p>
-
-<p>For the detailed security status of libapache-mod-jk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/libapache-mod-jk">https://security-tracker.debian.org/tracker/libapache-mod-jk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3580.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3581.data b/english/lts/security/2023/dla-3581.data
deleted file mode 100644
index 25dc6f927a6..00000000000
--- a/english/lts/security/2023/dla-3581.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3581-1 flac</define-tag>
-<define-tag report_date>2023-09-25</define-tag>
-<define-tag secrefs>CVE-2020-22219</define-tag>
-<define-tag packages>flac</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3581.wml b/english/lts/security/2023/dla-3581.wml
deleted file mode 100644
index f0cf4b7aa2d..00000000000
--- a/english/lts/security/2023/dla-3581.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow vulnerability was found in FLAC, a free lossless audio
-codec, in the bitwriter_grow_ function. This flaw may allow remote
-attackers to run arbitrary code via specially crafted input to the
-encoder.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.2-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your flac packages.</p>
-
-<p>For the detailed security status of flac please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/flac">https://security-tracker.debian.org/tracker/flac</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3581.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3582.data b/english/lts/security/2023/dla-3582.data
deleted file mode 100644
index 7e1f11ef160..00000000000
--- a/english/lts/security/2023/dla-3582.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3582-1 ghostscript</define-tag>
-<define-tag report_date>2023-09-25</define-tag>
-<define-tag secrefs>CVE-2020-21710 CVE-2020-21890</define-tag>
-<define-tag packages>ghostscript</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3582.wml b/english/lts/security/2023/dla-3582.wml
deleted file mode 100644
index 0881c10cb13..00000000000
--- a/english/lts/security/2023/dla-3582.wml
+++ /dev/null
@@ -1,39 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Vulnerabilities were found in ghostscript, an interpreter for pdf
-PostScript language, which allows remote attackers to cause denial of
-service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21710">CVE-2020-21710</a>
-
- <p>Divide by zero caused by custom resolution being too low</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21890">CVE-2020-21890</a>
-
- <p>Buffer Overflow vulnerability in clj_media_size function.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.27~dfsg-2+deb10u9.</p>
-
-<p>We recommend that you upgrade your ghostscript packages.</p>
-
-<p>For the detailed security status of ghostscript please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ghostscript">https://security-tracker.debian.org/tracker/ghostscript</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3582.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3583.data b/english/lts/security/2023/dla-3583.data
deleted file mode 100644
index 2c65cf801d7..00000000000
--- a/english/lts/security/2023/dla-3583.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3583-1 glib2.0</define-tag>
-<define-tag report_date>2023-09-25</define-tag>
-<define-tag secrefs>CVE-2023-29499 CVE-2023-32611 CVE-2023-32665</define-tag>
-<define-tag packages>glib2.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3583.wml b/english/lts/security/2023/dla-3583.wml
deleted file mode 100644
index bc71fda8e00..00000000000
--- a/english/lts/security/2023/dla-3583.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities were found in GLib, a general-purpose utility
-library, used by projects such as GTK+, GIMP, and GNOME.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29499">CVE-2023-29499</a>
-
- <p>GVariant deserialization fails to validate that the input conforms to the
- expected format, leading to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32611">CVE-2023-32611</a>
-
- <p>GVariant deserialization is vulnerable to a slowdown issue where a crafted
- GVariant can cause excessive processing, leading to denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32665">CVE-2023-32665</a>
-
- <p>GVariant deserialization is vulnerable to an exponential blowup issue where
- a crafted GVariant can cause excessive processing, leading to denial of
- service.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.58.3-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your glib2.0 packages.</p>
-
-<p>For the detailed security status of glib2.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/glib2.0">https://security-tracker.debian.org/tracker/glib2.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3583.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3584.data b/english/lts/security/2023/dla-3584.data
deleted file mode 100644
index d0e8d51a5f7..00000000000
--- a/english/lts/security/2023/dla-3584.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3584-1 netatalk</define-tag>
-<define-tag report_date>2023-9-25</define-tag>
-<define-tag secrefs>CVE-2023-42464 Bug#1052087</define-tag>
-<define-tag packages>netatalk</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3584.wml b/english/lts/security/2023/dla-3584.wml
deleted file mode 100644
index 2013b34dbb0..00000000000
--- a/english/lts/security/2023/dla-3584.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Florent Saudel and Arnaud Gatignol discovered a Type Confusion
-vulnerability in the Spotlight RPC functions in afpd in Netatalk. When
-parsing Spotlight RPC packets, one encoded data structure is a key-value
-style dictionary where the keys are character strings, and the values can
-be any of the supported types in the underlying protocol. Due to a lack of
-type checking in callers of the dalloc_value_for_key() function, which
-returns the object associated with a key, a malicious actor may be able to
-fully control the value of the pointer and theoretically achieve Remote
-Code Execution on the host.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.1.12~ds-3+deb10u4.</p>
-
-<p>We recommend that you upgrade your netatalk packages.</p>
-
-<p>For the detailed security status of netatalk please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/netatalk">https://security-tracker.debian.org/tracker/netatalk</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3584.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3585.data b/english/lts/security/2023/dla-3585.data
deleted file mode 100644
index 02c0935f6d2..00000000000
--- a/english/lts/security/2023/dla-3585.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3585-1 exempi</define-tag>
-<define-tag report_date>2023-09-25</define-tag>
-<define-tag secrefs>CVE-2020-18651 CVE-2020-18652 CVE-2021-36045 CVE-2021-36046 CVE-2021-36047 CVE-2021-36048 CVE-2021-36050 CVE-2021-36051 CVE-2021-36052 CVE-2021-36053 CVE-2021-36054 CVE-2021-36055 CVE-2021-36056 CVE-2021-36057 CVE-2021-36058 CVE-2021-36064 CVE-2021-39847 CVE-2021-40716 CVE-2021-40732 CVE-2021-42528 CVE-2021-42529 CVE-2021-42530 CVE-2021-42531 CVE-2021-42532</define-tag>
-<define-tag packages>exempi</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3585.wml b/english/lts/security/2023/dla-3585.wml
deleted file mode 100644
index 58e1cbdf323..00000000000
--- a/english/lts/security/2023/dla-3585.wml
+++ /dev/null
@@ -1,168 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulneratibilities were found in exempi, an implementation of XMP
-(Extensible Metadata Platform).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-18651">CVE-2020-18651</a>
-
- <p>A Buffer Overflow vulnerability was found
- in function ID3_Support::ID3v2Frame::getFrameValue
- allows remote attackers to cause a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-18652">CVE-2020-18652</a>
-
- <p>A Buffer Overflow vulnerability was found in
- WEBP_Support.cpp allows remote attackers to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36045">CVE-2021-36045</a>
-
- <p>An out-of-bounds read vulnerability was found
- that could lead to disclosure of arbitrary memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36046">CVE-2021-36046</a>
-
- <p>A memory corruption vulnerability was found,
- potentially resulting in arbitrary code execution
- in the context of the current use</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36047">CVE-2021-36047</a>
-
- <p>An Improper Input Validation vulnerability was found,
- potentially resulting in arbitrary
- code execution in the context of the current use.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36048">CVE-2021-36048</a>
-
- <p>An Improper Input Validation was found,
- potentially resulting in arbitrary
- code execution in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36050">CVE-2021-36050</a>
-
- <p>A buffer overflow vulnerability was found,
- potentially resulting in arbitrary code execution
- in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36051">CVE-2021-36051</a>
-
- <p>A buffer overflow vulnerability was found,
- potentially resulting in arbitrary code execution
- in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36052">CVE-2021-36052</a>
-
- <p>A memory corruption vulnerability was found,
- potentially resulting in arbitrary code execution
- in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36053">CVE-2021-36053</a>
-
- <p>An out-of-bounds read vulnerability was found,
- that could lead to disclosure of arbitrary memory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36054">CVE-2021-36054</a>
-
- <p>A buffer overflow vulnerability was found potentially
- resulting in local application denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36055">CVE-2021-36055</a>
-
- <p>A use-after-free vulnerability was found that could
- result in arbitrary code execution.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36056">CVE-2021-36056</a>
-
- <p>A buffer overflow vulnerability was found, potentially
- resulting in arbitrary code execution in the context of
- the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36057">CVE-2021-36057</a>
-
- <p>A write-what-where condition vulnerability was found,
- caused during the application's memory allocation process.
- This may cause the memory management functions to become
- mismatched resulting in local application denial of service
- in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36058">CVE-2021-36058</a>
-
- <p>An Integer Overflow vulnerability was found, potentially
- resulting in application-level denial of service in the
- context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36064">CVE-2021-36064</a>
-
- <p>A Buffer Underflow vulnerability was found which
- could result in arbitrary code execution in the context
- of the current user</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39847">CVE-2021-39847</a>
-
- <p>A stack-based buffer overflow vulnerability
- potentially resulting in arbitrary code execution in the
- context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40716">CVE-2021-40716</a>
-
- <p>An out-of-bounds read vulnerability was found that
- could lead to disclosure of sensitive memory</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40732">CVE-2021-40732</a>
-
- <p>A null pointer dereference vulnerability was found,
- that could result in leaking data from certain memory
- locations and causing a local denial of service</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42528">CVE-2021-42528</a>
-
- <p>A Null pointer dereference vulnerability was found
- when parsing a specially crafted file. An unauthenticated attacker
- could leverage this vulnerability to achieve an application
- denial-of-service in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42529">CVE-2021-42529</a>
-
- <p>A stack-based buffer overflow vulnerability was found
- potentially resulting in arbitrary code execution
- in the context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42530">CVE-2021-42530</a>
-
- <p>A stack-based buffer overflow vulnerability was found
- potentially resulting in arbitrary code execution in the
- context of the current user.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42531">CVE-2021-42531</a>
-
- <p>A stack-based buffer overflow vulnerability
- potentially resulting in arbitrary code execution in
- the context of the current user</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-42532">CVE-2021-42532</a>
-
- <p>A stack-based buffer overflow vulnerability
- potentially resulting in arbitrary code execution in the
- context of the current user.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.5.0-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your exempi packages.</p>
-
-<p>For the detailed security status of exempi please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/exempi">https://security-tracker.debian.org/tracker/exempi</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3585.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3586.data b/english/lts/security/2023/dla-3586.data
deleted file mode 100644
index dcbdace946a..00000000000
--- a/english/lts/security/2023/dla-3586.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3586-1 ncurses</define-tag>
-<define-tag report_date>2023-09-28</define-tag>
-<define-tag secrefs>CVE-2020-19189</define-tag>
-<define-tag packages>ncurses</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3586.wml b/english/lts/security/2023/dla-3586.wml
deleted file mode 100644
index f50baada1d3..00000000000
--- a/english/lts/security/2023/dla-3586.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An out-of-bounds read problem was found in the postprocess_terminfo
-function of ncurses, a text-based user interface toolkit, which could
-potentially lead to an exposure of sensitive information or denial of
-service.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-6.1+20181013-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your ncurses packages.</p>
-
-<p>For the detailed security status of ncurses please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ncurses">https://security-tracker.debian.org/tracker/ncurses</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3586.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3587.data b/english/lts/security/2023/dla-3587.data
deleted file mode 100644
index f2799a2dab4..00000000000
--- a/english/lts/security/2023/dla-3587.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3587-1 firefox-esr</define-tag>
-<define-tag report_date>2023-09-29</define-tag>
-<define-tag secrefs>CVE-2023-5169 CVE-2023-5171 CVE-2023-5176</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3587.wml b/english/lts/security/2023/dla-3587.wml
deleted file mode 100644
index 13d50dc6caa..00000000000
--- a/english/lts/security/2023/dla-3587.wml
+++ /dev/null
@@ -1,31 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code.</p>
-
-<p>Debian follows the extended support releases (ESR) of Firefox. Support
-for the 102.x series has ended, so starting with this update we're now
-following the 115.x releases.</p>
-
-<p>Between 102.x and 115.x, Firefox has seen a number of feature updates.
-For more information please refer to
-<a href="https://www.mozilla.org/en-US/firefox/115.0esr/releasenotes/">https://www.mozilla.org/en-US/firefox/115.0esr/releasenotes/</a></p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-115.3.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3587.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3588.data b/english/lts/security/2023/dla-3588.data
deleted file mode 100644
index d3ded58ff4e..00000000000
--- a/english/lts/security/2023/dla-3588.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3588-1 vim</define-tag>
-<define-tag report_date>2023-09-29</define-tag>
-<define-tag secrefs>CVE-2023-4752 CVE-2023-4781</define-tag>
-<define-tag packages>vim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3588.wml b/english/lts/security/2023/dla-3588.wml
deleted file mode 100644
index 36a55a33cd9..00000000000
--- a/english/lts/security/2023/dla-3588.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in vim a text editor.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4752">CVE-2023-4752</a>
-
- <p>A heap use after free was found in ins_compl_get_exp()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4781">CVE-2023-4781</a>
-
- <p>A heap-buffer-overflow was found in vim_regsub_both()</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:8.1.0875-5+deb10u6.</p>
-
-<p>We recommend that you upgrade your vim packages.</p>
-
-<p>For the detailed security status of vim please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vim">https://security-tracker.debian.org/tracker/vim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3588.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3589.data b/english/lts/security/2023/dla-3589.data
deleted file mode 100644
index 890d5c3142f..00000000000
--- a/english/lts/security/2023/dla-3589.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3589-1 python-git</define-tag>
-<define-tag report_date>2023-09-29</define-tag>
-<define-tag secrefs>CVE-2023-41040</define-tag>
-<define-tag packages>python-git</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3589.wml b/english/lts/security/2023/dla-3589.wml
deleted file mode 100644
index 8cab04468f9..00000000000
--- a/english/lts/security/2023/dla-3589.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Santos Gallegos discovered a blind local file inclusion in python-git, a
-Python library to interact with Git repositories, which could lead to
-denial of service or potentially information disclosure.</p>
-
-<p>In order to resolve some git references, python-git reads files from the
-"<code>.git</code>" directory but, due to improper location check, an
-attacker can pass a file located outside this directory thereby making
-python-git read arbitrary file on the system.</p>
-
-<p>It remains unclear whether the attacker can gain access to actual file
-content, but denial of service can be achieved by passing a large or
-infinite file such as <code>/dev/random</code>.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.1.11-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your python-git packages.</p>
-
-<p>For the detailed security status of python-git please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-git">https://security-tracker.debian.org/tracker/python-git</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3589.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3590.data b/english/lts/security/2023/dla-3590.data
deleted file mode 100644
index a4947183200..00000000000
--- a/english/lts/security/2023/dla-3590.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3590-1 python-reportlab</define-tag>
-<define-tag report_date>2023-09-29</define-tag>
-<define-tag secrefs>CVE-2019-19450 CVE-2020-28463</define-tag>
-<define-tag packages>python-reportlab</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3590.wml b/english/lts/security/2023/dla-3590.wml
deleted file mode 100644
index 75ea5276f5e..00000000000
--- a/english/lts/security/2023/dla-3590.wml
+++ /dev/null
@@ -1,43 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security issues were discovered in python-reportlab, a Python library
-for generating PDFs and graphics, which could lead to remote code
-execution or authorization bypass.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-19450">CVE-2019-19450</a>
-
- <p>Ravi Prakash Giri discovered a remote code execution vulnerability
- via crafted XML document where <code>&lt;unichar code="</code> is followed by
- arbitrary Python code.</p>
-
- <p>This issue is similar to <a href="https://security-tracker.debian.org/tracker/CVE-2019-17626">CVE-2019-17626</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28463">CVE-2020-28463</a>
-
- <p>Karan Bamal discovered a Server-side Request Forgery (SSRF)
- vulnerability via <code>&lt;img&gt;</code> tags.
- New settings <code>trustedSchemes</code> and <code>trustedHosts</code>
- have been added as part of the fix/mitigation: they can be used to
- specify an explicit allowlist for remote sources.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.5.13-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your python-reportlab packages.</p>
-
-<p>For the detailed security status of python-reportlab please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-reportlab">https://security-tracker.debian.org/tracker/python-reportlab</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3590.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3591.data b/english/lts/security/2023/dla-3591.data
deleted file mode 100644
index 0d30942f9cf..00000000000
--- a/english/lts/security/2023/dla-3591.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3591-1 firefox-esr</define-tag>
-<define-tag report_date>2023-09-30</define-tag>
-<define-tag secrefs>CVE-2023-5217</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3591.wml b/english/lts/security/2023/dla-3591.wml
deleted file mode 100644
index d06d91bcbb1..00000000000
--- a/english/lts/security/2023/dla-3591.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow in VP8 media stream processing has been found in the
-Mozilla Firefox web browser, which could potentially result in the
-execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-115.3.1esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3591.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3592.data b/english/lts/security/2023/dla-3592.data
deleted file mode 100644
index 6e018203942..00000000000
--- a/english/lts/security/2023/dla-3592.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3592-1 jetty9</define-tag>
-<define-tag report_date>2023-9-30</define-tag>
-<define-tag secrefs>CVE-2023-26048 CVE-2023-26049 CVE-2023-36479 CVE-2023-40167</define-tag>
-<define-tag packages>jetty9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3592.wml b/english/lts/security/2023/dla-3592.wml
deleted file mode 100644
index b96054b81b4..00000000000
--- a/english/lts/security/2023/dla-3592.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security vulnerabilities were found in Jetty, a Java based web server
-and servlet engine.</p>
-
-<p>The org.eclipse.jetty.servlets.CGI class has been deprecated. It is potentially
-unsafe to use it. The upstream developers of Jetty recommend to use Fast CGI
-instead. See also <a href="https://security-tracker.debian.org/tracker/CVE-2023-36479">CVE-2023-36479</a>.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26048">CVE-2023-26048</a>
-
- <p>In affected versions servlets with multipart support (e.g. annotated with
- `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or
- `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the
- client sends a multipart request with a part that has a name but no
- filename and very large content. This happens even with the default
- settings of `fileSizeThreshold=0` which should stream the whole part
- content to disk.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-26049">CVE-2023-26049</a>
-
- <p>Nonstandard cookie parsing in Jetty may allow an attacker to smuggle
- cookies within other cookies, or otherwise perform unintended behavior by
- tampering with the cookie parsing mechanism.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40167">CVE-2023-40167</a>
-
- <p>Prior to this version Jetty accepted the `+` character proceeding the
- content-length value in a HTTP/1 header field. This is more permissive than
- allowed by the RFC and other servers routinely reject such requests with
- 400 responses. There is no known exploit scenario, but it is conceivable
- that request smuggling could result if jetty is used in combination with a
- server that does not close the connection after sending such a 400
- response.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-36479">CVE-2023-36479</a>
-
- <p>Users of the CgiServlet with a very specific command structure may have the
- wrong command executed. If a user sends a request to a
- org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its
- name, the servlet will escape the command by wrapping it in quotation
- marks. This wrapped command, plus an optional command prefix, will then be
- executed through a call to Runtime.exec. If the original binary name
- provided by the user contains a quotation mark followed by a space, the
- resulting command line will contain multiple tokens instead of one.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.4.16-0+deb10u3.</p>
-
-<p>We recommend that you upgrade your jetty9 packages.</p>
-
-<p>For the detailed security status of jetty9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/jetty9">https://security-tracker.debian.org/tracker/jetty9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3592.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3593.data b/english/lts/security/2023/dla-3593.data
deleted file mode 100644
index 77c6494b779..00000000000
--- a/english/lts/security/2023/dla-3593.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3593-1 gerbv</define-tag>
-<define-tag report_date>2023-09-30</define-tag>
-<define-tag secrefs>CVE-2021-40393 CVE-2021-40394 CVE-2023-4508 Bug#1050560</define-tag>
-<define-tag packages>gerbv</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3593.wml b/english/lts/security/2023/dla-3593.wml
deleted file mode 100644
index 76cce0d87d8..00000000000
--- a/english/lts/security/2023/dla-3593.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were fixed in gerbv, a viewer for the Gerber
-format for printed circuit board (PCB) design.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40393">CVE-2021-40393</a>
-
- <p>RS-274X format aperture macro variables out-of-bounds write</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-40394">CVE-2021-40394</a>
-
- <p>RS-274X aperture macro outline primitive integer overflow</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4508">CVE-2023-4508</a>
-
- <p>Out-of-bounds memory access when referencing external files</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.7.0-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your gerbv packages.</p>
-
-<p>For the detailed security status of gerbv please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gerbv">https://security-tracker.debian.org/tracker/gerbv</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3593.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3594.data b/english/lts/security/2023/dla-3594.data
deleted file mode 100644
index 48f3bd03ec6..00000000000
--- a/english/lts/security/2023/dla-3594.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3594-1 cups</define-tag>
-<define-tag report_date>2023-9-30</define-tag>
-<define-tag secrefs>CVE-2023-4504 CVE-2023-32360 Bug##1051953</define-tag>
-<define-tag packages>cups</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3594.wml b/english/lts/security/2023/dla-3594.wml
deleted file mode 100644
index a9203ac503f..00000000000
--- a/english/lts/security/2023/dla-3594.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two issues have been found in cups, the Common UNIX Printing System(tm).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4504">CVE-2023-4504</a>
-
- <p>Due to missing boundary checks a heap-based buffer overflow and code
- execution might be possible by using crafted postscript documents.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-32360">CVE-2023-32360</a>
-
- <p>Unauthorized users might be allowed to fetch recently printed documents.</p>
-
- <p>Since this is a configuration fix, it might be that it does not reach
- you if you are updating the package.
- Please double check your /etc/cups/cupds.conf file, whether it limits
- the access to CUPS-Get-Document with something like the following
- > <Limit CUPS-Get-Document>
- > AuthType Default
- > Require user @OWNER @SYSTEM
- > Order deny,allow
- > </Limit>
- (The important line is the <q>AuthType Default</q> in this section)</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.2.10-6+deb10u9.</p>
-
-<p>We recommend that you upgrade your cups packages.</p>
-
-<p>For the detailed security status of cups please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cups">https://security-tracker.debian.org/tracker/cups</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3594.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3595.data b/english/lts/security/2023/dla-3595.data
deleted file mode 100644
index da86ad74f6e..00000000000
--- a/english/lts/security/2023/dla-3595.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3595-1 trafficserver</define-tag>
-<define-tag report_date>2023-09-30</define-tag>
-<define-tag secrefs>CVE-2022-47185 CVE-2023-33934 Bug#1043430</define-tag>
-<define-tag packages>trafficserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3595.wml b/english/lts/security/2023/dla-3595.wml
deleted file mode 100644
index 885107e4625..00000000000
--- a/english/lts/security/2023/dla-3595.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several cases of improper input validation were fixed in Apache Traffic Server,
-a reverse and forward proxy server.</p>
-
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.1.7-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your trafficserver packages.</p>
-
-<p>For the detailed security status of trafficserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/trafficserver">https://security-tracker.debian.org/tracker/trafficserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3595.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3596.data b/english/lts/security/2023/dla-3596.data
deleted file mode 100644
index ca83f68a063..00000000000
--- a/english/lts/security/2023/dla-3596.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3596-1 firmware-nonfree</define-tag>
-<define-tag report_date>2023-09-30</define-tag>
-<define-tag secrefs>CVE-2022-27635 CVE-2022-36351 CVE-2022-38076 CVE-2022-40964 CVE-2022-46329 Bug#1051892</define-tag>
-<define-tag packages>firmware-nonfree</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3596.wml b/english/lts/security/2023/dla-3596.wml
deleted file mode 100644
index f8412526e53..00000000000
--- a/english/lts/security/2023/dla-3596.wml
+++ /dev/null
@@ -1,89 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Intel® released the INTEL-SA-00766 advisory about potential security
-vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products
-may allow escalation of privilege or denial of service. The full advisory is
-available at [1]</p>
-
-<p>[1] <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html</a></p>
-
-<p>This updated firmware-nonfree package includes the following firmware files:
-</br> - Intel Bluetooth AX2xx series:
-</br> ibt-0041-0041.sfi
-</br> ibt-19-0-0.sfi
-</br> ibt-19-0-1.sfi
-</br> ibt-19-0-4.sfi
-</br> ibt-19-16-4.sfi
-</br> ibt-19-240-1.sfi
-</br> ibt-19-240-4.sfi
-</br> ibt-19-32-0.sfi
-</br> ibt-19-32-1.sfi
-</br> ibt-19-32-4.sfi
-</br> ibt-20-0-3.sfi
-</br> ibt-20-1-3.sfi
-</br> ibt-20-1-4.sfi
-</br> - Intel Wireless 22000 series
-</br> iwlwifi-Qu-b0-hr-b0-77.ucode
-</br> iwlwifi-Qu-b0-jf-b0-77.ucode
-</br> iwlwifi-Qu-c0-hr-b0-77.ucode
-</br> iwlwifi-Qu-c0-jf-b0-77.ucode
-</br> iwlwifi-QuZ-a0-hr-b0-77.ucode
-</br> iwlwifi-cc-a0-77.ucode</p>
-
-<p>The updated firmware files might need updated kernel to work. It is encouraged
-to verify whether the kernel loaded the updated firmware file and take
-additional measures if needed.</p>
-
-<p></p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-27635">CVE-2022-27635</a>
-
- <p>Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM)
- WiFi software may allow a privileged user to potentially enable escalation of
- privilege via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36351">CVE-2022-36351</a>
-
- <p>Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM)
- WiFi software may allow an unauthenticated user to potentially enable denial of
- service via adjacent access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-38076">CVE-2022-38076</a>
-
- <p>Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM)
- WiFi software may allow an authenticated user to potentially enable escalation
- of privilege via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40964">CVE-2022-40964</a>
-
- <p>Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM)
- WiFi software may allow a privileged user to potentially enable escalation of
- privilege via local access.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-46329">CVE-2022-46329</a>
-
- <p>Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software
- may allow a privileged user to potentially enable escalation of privilege via
- local access.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-20190114+really20220913-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your firmware-nonfree packages.</p>
-
-<p>For the detailed security status of firmware-nonfree please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firmware-nonfree">https://security-tracker.debian.org/tracker/firmware-nonfree</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3596.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3597.data b/english/lts/security/2023/dla-3597.data
deleted file mode 100644
index 874a2751a75..00000000000
--- a/english/lts/security/2023/dla-3597.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3597-1 open-vm-tools</define-tag>
-<define-tag report_date>2023-10-01</define-tag>
-<define-tag secrefs>CVE-2023-20900 Bug#1050970</define-tag>
-<define-tag packages>open-vm-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3597.wml b/english/lts/security/2023/dla-3597.wml
deleted file mode 100644
index fe4aaa0d24f..00000000000
--- a/english/lts/security/2023/dla-3597.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A security vulnerability was found in the Open VMware Tools. A malicious actor
-that has been granted Guest Operation Privileges in a target virtual machine
-may be able to elevate their privileges if that target virtual machine has been
-assigned a more privileged Guest Alias.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:10.3.10-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your open-vm-tools packages.</p>
-
-<p>For the detailed security status of open-vm-tools please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/open-vm-tools">https://security-tracker.debian.org/tracker/open-vm-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3597.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3598.data b/english/lts/security/2023/dla-3598.data
deleted file mode 100644
index de9ba4f703e..00000000000
--- a/english/lts/security/2023/dla-3598.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3598-1 libvpx</define-tag>
-<define-tag report_date>2023-10-01</define-tag>
-<define-tag secrefs>CVE-2023-5217 CVE-2023-44488</define-tag>
-<define-tag packages>libvpx</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3598.wml b/english/lts/security/2023/dla-3598.wml
deleted file mode 100644
index 30b5f3eecc2..00000000000
--- a/english/lts/security/2023/dla-3598.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two buffer overflow vulnerabilities were found in libvpx, a multimedia
-library for the VP8 and VP9 video codecs, which could result in the
-execution of arbitrary code if a specially crafted VP8 or VP9 media
-stream is processed.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.7.0-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your libvpx packages.</p>
-
-<p>For the detailed security status of libvpx please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libvpx">https://security-tracker.debian.org/tracker/libvpx</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3598.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3599.data b/english/lts/security/2023/dla-3599.data
deleted file mode 100644
index 6f9a9e08760..00000000000
--- a/english/lts/security/2023/dla-3599.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3599-1 exim4</define-tag>
-<define-tag report_date>2023-10-02</define-tag>
-<define-tag secrefs>CVE-2023-42114 CVE-2023-42116</define-tag>
-<define-tag packages>exim4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3599.wml b/english/lts/security/2023/dla-3599.wml
deleted file mode 100644
index 337b241ccac..00000000000
--- a/english/lts/security/2023/dla-3599.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Exim, a mail transport agent,
-which could result in remote code execution if the SPA/NTLM authenticators
-are used.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.92-8+deb10u8.</p>
-
-<p>We recommend that you upgrade your exim4 packages.</p>
-
-<p>For the detailed security status of exim4 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/exim4">https://security-tracker.debian.org/tracker/exim4</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3599.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3600.data b/english/lts/security/2023/dla-3600.data
deleted file mode 100644
index 3c37647945b..00000000000
--- a/english/lts/security/2023/dla-3600.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3600-1 postgresql-11</define-tag>
-<define-tag report_date>2023-10-04</define-tag>
-<define-tag secrefs>CVE-2023-39417</define-tag>
-<define-tag packages>postgresql-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3600.wml b/english/lts/security/2023/dla-3600.wml
deleted file mode 100644
index b9bf6ce223a..00000000000
--- a/english/lts/security/2023/dla-3600.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A SQL Injection vulnerability was found in PostgreSQL, an
-object-relational SQL database management system.</p>
-
-<p>An extension script is vulnerable if it uses @extowner@, @extschema@,
-or @extschema:...@ inside a quoting construct (dollar quoting, '', or
-"").</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-11.21-0+deb10u2.</p>
-
-<p>We recommend that you upgrade your postgresql-11 packages.</p>
-
-<p>For the detailed security status of postgresql-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3600.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3601.data b/english/lts/security/2023/dla-3601.data
deleted file mode 100644
index 8bbb1f531dc..00000000000
--- a/english/lts/security/2023/dla-3601.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3601-1 thunderbird</define-tag>
-<define-tag report_date>2023-10-09</define-tag>
-<define-tag secrefs>CVE-2023-5169 CVE-2023-5171 CVE-2023-5176 CVE-2023-5217</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3601.wml b/english/lts/security/2023/dla-3601.wml
deleted file mode 100644
index da6ba3f852b..00000000000
--- a/english/lts/security/2023/dla-3601.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>Debian follows the Thunderbird upstream releases. Support for the
-102.x series has ended, so starting with this update we're now
-following the 115.x series.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:115.3.1-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3601.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3602.data b/english/lts/security/2023/dla-3602.data
deleted file mode 100644
index e1da57e9459..00000000000
--- a/english/lts/security/2023/dla-3602.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3602-1 libx11</define-tag>
-<define-tag report_date>2023-10-05</define-tag>
-<define-tag secrefs>CVE-2023-43785 CVE-2023-43786 CVE-2023-43787</define-tag>
-<define-tag packages>libx11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3602.wml b/english/lts/security/2023/dla-3602.wml
deleted file mode 100644
index 86eba5292b7..00000000000
--- a/english/lts/security/2023/dla-3602.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in libx11, the X11 client-side
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43785">CVE-2023-43785</a>
-
- <p>Gregory James Duck discovered an out of bounds memory access in
- _XkbReadKeySyms, which could result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43786">CVE-2023-43786</a>
-
- <p>Yair Mizrahi found an infinite recursion in PutSubImage when
- parsing a crafted file, which would result in stack exhaustion
- and denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43787">CVE-2023-43787</a>
-
- <p>Yair Mizrahi discovered an integer overflow in XCreateImage
- when parsing crafted input, which would result in a small buffer
- allocation leading into a buffer overflow. This could result
- in denial of service or potentially in arbitrary code execution.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.6.7-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your libx11 packages.</p>
-
-<p>For the detailed security status of libx11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libx11">https://security-tracker.debian.org/tracker/libx11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3602.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3603.data b/english/lts/security/2023/dla-3603.data
deleted file mode 100644
index a4d35a2160e..00000000000
--- a/english/lts/security/2023/dla-3603.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3603-1 libxpm</define-tag>
-<define-tag report_date>2023-10-05</define-tag>
-<define-tag secrefs>CVE-2023-43786 CVE-2023-43787 CVE-2023-43788 CVE-2023-43789</define-tag>
-<define-tag packages>libxpm</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3603.wml b/english/lts/security/2023/dla-3603.wml
deleted file mode 100644
index bc7cac3de40..00000000000
--- a/english/lts/security/2023/dla-3603.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were found in libXpm, the X Pixmap (XPM) image
-library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43786">CVE-2023-43786</a>
-
- <p>Yair Mizrahi discovered an infinite recursion issue when parsing
- crafted XPM files, which would result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43787">CVE-2023-43787</a>
-
- <p>Yair Mizrahi discovered a buffer overflow vulnerability in libX11
- when parsing crafted XPM files, which could result in denial of
- service or potentially the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43788">CVE-2023-43788</a>
-
- <p>Alan Coopersmith found an out of bounds read in
- XpmCreateXpmImageFromBuffer, which could result in denial of
- service when parsing crafted XPM files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43789">CVE-2023-43789</a>
-
- <p>Alan Coopersmith discovered an out of bounds read issue when
- parsing corrupted colormaps, which could lead to denial of
- service when parsing crafted XPM files.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.5.12-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your libxpm packages.</p>
-
-<p>For the detailed security status of libxpm please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libxpm">https://security-tracker.debian.org/tracker/libxpm</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3603.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3604.data b/english/lts/security/2023/dla-3604.data
deleted file mode 100644
index f0fb78a7749..00000000000
--- a/english/lts/security/2023/dla-3604.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3604-1 qemu</define-tag>
-<define-tag report_date>2023-10-05</define-tag>
-<define-tag secrefs>CVE-2020-24165 CVE-2023-0330 CVE-2023-3180 Bug#1029155</define-tag>
-<define-tag packages>qemu</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3604.wml b/english/lts/security/2023/dla-3604.wml
deleted file mode 100644
index 9653c6cefa1..00000000000
--- a/english/lts/security/2023/dla-3604.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were discovered in qemu, a fast processor emulator.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24165">CVE-2020-24165</a>
-
- <p>A use-after-free race in the code generator could lead to the
- execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-0330">CVE-2023-0330</a>
-
- <p>A DMA-MMIO reentrancy problem in the lsi53c895a device may lead to
- memory orruption bugs, such as stack overflow or use-after-free.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3180">CVE-2023-3180</a>
-
- <p>The function virtio_crypto_sym_op_helper, part of the implementation
- of qemu's virtual crypto device, did not check that the values of
- <q>src_len</q> and <q>dst_len</q> are the same. This could lead to a heap
- buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.1+dfsg-8+deb10u11.</p>
-
-<p>We recommend that you upgrade your qemu packages.</p>
-
-<p>For the detailed security status of qemu please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/qemu">https://security-tracker.debian.org/tracker/qemu</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3604.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3605.data b/english/lts/security/2023/dla-3605.data
deleted file mode 100644
index f9015f72d20..00000000000
--- a/english/lts/security/2023/dla-3605.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3605-1 grub2</define-tag>
-<define-tag report_date>2023-10-06</define-tag>
-<define-tag secrefs>CVE-2023-4692 CVE-2023-4693</define-tag>
-<define-tag packages>grub2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3605.wml b/english/lts/security/2023/dla-3605.wml
deleted file mode 100644
index 8e54a7f1ac5..00000000000
--- a/english/lts/security/2023/dla-3605.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A couple of security issues were reported in grub2 package, which is
-GRand Unified Bootloader v2, that could cause out-of-bounds write and
-heap-based buffer overflow.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.06-3~deb10u4.</p>
-
-<p>We recommend that you upgrade your grub2 packages.</p>
-
-<p>For the detailed security status of grub2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/grub2">https://security-tracker.debian.org/tracker/grub2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3605.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3606.data b/english/lts/security/2023/dla-3606.data
deleted file mode 100644
index d66ca810d98..00000000000
--- a/english/lts/security/2023/dla-3606.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3606-1 freerdp2</define-tag>
-<define-tag report_date>2023-10-07</define-tag>
-<define-tag secrefs>CVE-2020-4030 CVE-2020-4031 CVE-2020-4032 CVE-2020-4033 CVE-2020-11017 CVE-2020-11018 CVE-2020-11019 CVE-2020-11038 CVE-2020-11039 CVE-2020-11040 CVE-2020-11041 CVE-2020-11042 CVE-2020-11043 CVE-2020-11044 CVE-2020-11045 CVE-2020-11046 CVE-2020-11047 CVE-2020-11048 CVE-2020-11049 CVE-2020-11058 CVE-2020-11085 CVE-2020-11086 CVE-2020-11087 CVE-2020-11088 CVE-2020-11089 CVE-2020-11095 CVE-2020-11096 CVE-2020-11097 CVE-2020-11098 CVE-2020-11099 CVE-2020-13396 CVE-2020-13397 CVE-2020-13398 CVE-2020-15103 CVE-2023-39350 CVE-2023-39351 CVE-2023-39352 CVE-2023-39353 CVE-2023-39354 CVE-2023-39355 CVE-2023-39356 CVE-2023-40567 CVE-2023-40181 CVE-2023-40186 CVE-2023-40188 CVE-2023-40569 CVE-2023-40589 Bug#965979 Bug#1051638</define-tag>
-<define-tag packages>freerdp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3606.wml b/english/lts/security/2023/dla-3606.wml
deleted file mode 100644
index 5f8b901b8be..00000000000
--- a/english/lts/security/2023/dla-3606.wml
+++ /dev/null
@@ -1,416 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilties have been found in freelrdp2, a free
-implementation of the Remote Desktop Protocol (RDP).
-The vulnerabilties potentially allows buffer overreads, buffer overflows,
-interger overflows, use-after-free, DoS vectors.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4030">CVE-2020-4030</a>
-
- <p>In FreeRDP before version 2.1.2, there is an out of bounds read in
- TrioParse. Logging might bypass string length checks due to an
- integer overflow. This is fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4031">CVE-2020-4031</a>
-
- <p>In FreeRDP before version 2.1.2, there is a use-after-free in
- gdi_SelectObject. All FreeRDP clients using compatibility mode with
- /relax-order-checks are affected. This is fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4032">CVE-2020-4032</a>
-
- <p>In FreeRDP before version 2.1.2, there is an integer casting
- vulnerability in update_recv_secondary_order. All clients with
- +glyph-cache /relax-order-checks are affected. This is fixed in
- version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-4033">CVE-2020-4033</a>
-
- <p>In FreeRDP before version 2.1.2, there is an out of bounds read in
- RLEDECOMPRESS. All FreeRDP based clients with sessions with color
- depth < 32 are affected. This is fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11017">CVE-2020-11017</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, by providing manipulated
- input a malicious client can create a double free condition and
- crash the server. This is fixed in version 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11018">CVE-2020-11018</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, a possible resource
- exhaustion vulnerability can be performed. Malicious clients could
- trigger out of bound reads causing memory allocation with random
- size. This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11019">CVE-2020-11019</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, when running with logger set
- to <q>WLOG_TRACE</q>, a possible crash of application could occur due to
- a read of an invalid array index. Data could be printed as string to
- local terminal. This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11038">CVE-2020-11038</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, an Integer Overflow to
- Buffer Overflow exists. When using /video redirection, a manipulated
- server can instruct the client to allocate a buffer with a smaller
- size than requested due to an integer overflow in size calculation.
- With later messages, the server can manipulate the client to write
- data out of bound to the previously allocated buffer. This has been
- patched in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11039">CVE-2020-11039</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, when using a manipulated
- server with USB redirection enabled (nearly) arbitrary memory can be
- read and written due to integer overflows in length checks. This has
- been patched in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11040">CVE-2020-11040</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, there is an out-of-bound
- data read from memory in clear_decompress_subcode_rlex, visualized
- on screen as color. This has been patched in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11041">CVE-2020-11041</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, an outside controlled array
- index is used unchecked for data used as configuration for sound
- backend (alsa, oss, pulse, ...). The most likely outcome is a crash
- of the client instance followed by no or distorted sound or a
- session disconnect. If a user cannot upgrade to the patched version,
- a workaround is to disable sound for the session. This has been
- patched in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11042">CVE-2020-11042</a>
-
- <p>In FreeRDP greater than 1.1 and before 2.0.0, there is an
- out-of-bounds read in update_read_icon_info. It allows reading a
- attacker-defined amount of client memory (32bit unsigned -> 4GB) to
- an intermediate buffer. This can be used to crash the client or
- store information for later retrieval. This has been patched in
- 2.0.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11043">CVE-2020-11043</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds
- read in rfx_process_message_tileset. Invalid data fed to RFX decoder
- results in garbage on screen (as colors). This has been patched in
- 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11044">CVE-2020-11044</a>
-
- <p>In FreeRDP greater than 1.2 and before 2.0.0, a double free in
- update_read_cache_bitmap_v3_order crashes the client application if
- corrupted data from a manipulated server is parsed. This has been
- patched in 2.0.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11045">CVE-2020-11045</a>
-
- <p>In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read
- in in update_read_bitmap_data that allows client memory to be read
- to an image buffer. The result displayed on screen as colour.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11046">CVE-2020-11046</a>
-
- <p>In FreeRDP after 1.0 and before 2.0.0, there is a stream
- out-of-bounds seek in update_read_synchronize that could lead to a
- later out-of-bounds read.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11047">CVE-2020-11047</a>
-
- <p>In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds
- read in autodetect_recv_bandwidth_measure_results. A malicious
- server can extract up to 8 bytes of client memory with a manipulated
- message by providing a short input and reading the measurement
- result data. This has been patched in 2.0.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11048">CVE-2020-11048</a>
-
- <p>In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds
- read. It only allows to abort a session. No data extraction is
- possible. This has been fixed in 2.0.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11049">CVE-2020-11049</a>
-
- <p>In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read
- of client memory that is then passed on to the protocol parser. This
- has been patched in 2.0.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11058">CVE-2020-11058</a>
-
- <p>In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek
- in rdp_read_font_capability_set could lead to a later out-of-bounds
- read. As a result, a manipulated client or server might force a
- disconnect due to an invalid data read. This has been fixed in
- 2.0.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11085">CVE-2020-11085</a>
-
- <p>In FreeRDP before 2.1.0, there is an out-of-bounds read in
- cliprdr_read_format_list. Clipboard format data read (by client or
- server) might read data out-of-bounds. This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11086">CVE-2020-11086</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, there is an out-of-bound
- read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes
- out-of-bound to an internal structure. This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11087">CVE-2020-11087</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, there is an out-of-bound
- read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11088">CVE-2020-11088</a>
-
- <p>In FreeRDP less than or equal to 2.0.0, there is an out-of-bound
- read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11089">CVE-2020-11089</a>
-
- <p>In FreeRDP before 2.1.0, there is an out-of-bound read in irp
- functions (parallel_process_irp_create, serial_process_irp_create,
- drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu,
- serial_process_irp_write). This has been fixed in 2.1.0.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11095">CVE-2020-11095</a>
-
- <p>In FreeRDP before version 2.1.2, an out of bound reads occurs
- resulting in accessing a memory location that is outside of the
- boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES.
- This is fixed in version 2.1.2</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11096">CVE-2020-11096</a>
-
- <p>In FreeRDP before version 2.1.2, there is a global OOB read in
- update_read_cache_bitmap_v3_order. As a workaround, one can disable
- bitmap cache with -bitmap-cache (default). This is fixed in version
- 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11097">CVE-2020-11097</a>
-
- <p>In FreeRDP before version 2.1.2, an out of bounds read occurs
- resulting in accessing a memory location that is outside of the
- boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES.
- This is fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11098">CVE-2020-11098</a>
-
- <p>In FreeRDP before version 2.1.2, there is an out-of-bound read in
- glyph_cache_put. This affects all FreeRDP clients with
- `+glyph-cache` option enabled This is fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11099">CVE-2020-11099</a>
-
- <p>In FreeRDP before version 2.1.2, there is an out of bounds read in
- license_read_new_or_upgrade_license_packet. A manipulated license
- packet can lead to out of bound reads to an internal buffer. This is
- fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13396">CVE-2020-13396</a>
-
- <p>In FreeRDP before version 2.1.2, there is an out of bounds read in
- license_read_new_or_upgrade_license_packet. A manipulated license
- packet can lead to out of bound reads to an internal buffer. This is
- fixed in version 2.1.2.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13397">CVE-2020-13397</a>
-
- <p>An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds
- (OOB) read vulnerability has been detected in security_fips_decrypt
- in libfreerdp/core/security.c due to an uninitialized value.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13398">CVE-2020-13398</a>
-
- <p>An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds
- (OOB) write vulnerability has been detected in crypto_rsa_common in
- libfreerdp/crypto/crypto.c.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-15103">CVE-2020-15103</a>
-
- <p>In FreeRDP less than or equal to 2.1.2, an integer overflow exists
- due to missing input sanitation in rdpegfx channel. All FreeRDP
- clients are affected. The input rectangles from the server are not
- checked against local surface coordinates and blindly accepted. A
- malicious server can send data that will crash the client later on
- (invalid length arguments to a `memcpy`) This has been fixed in
- 2.2.0. As a workaround, stop using command line arguments /gfx,
- /gfx-h264 and /network:auto</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39350">CVE-2023-39350</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. This issue affects Clients
- only. Integer underflow leading to DOS (e.g. abort due to
- `WINPR_ASSERT` with default compilation flags). When an insufficient
- blockLen is provided, and proper length validation is not performed,
- an Integer Underflow occurs, leading to a Denial of Service (DOS)
- vulnerability. This issue has been addressed in versions 2.11.0 and
- 3.0.0-beta3. Users are advised to upgrade. There are no known
- workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39351">CVE-2023-39351</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions of
- FreeRDP are subject to a Null Pointer Dereference leading a crash in
- the RemoteFX (rfx) handling. Inside the
- `rfx_process_message_tileset` function, the program allocates tiles
- using `rfx_allocate_tiles` for the number of numTiles. If the
- initialization process of tiles is not completed for various
- reasons, tiles will have a NULL pointer. Which may be accessed in
- further processing and would cause a program crash. This issue has
- been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised
- to upgrade. There are no known workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39352">CVE-2023-39352</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an invalid offset validation leading to Out Of Bound
- Write. This can be triggered when the values `rect->left` and
- `rect->top` are exactly equal to `surface->width` and
- `surface->height`. eg. `rect->left` == `surface->width` &&
- `rect->top` == `surface->height`. In practice this should cause a
- crash. This issue has been addressed in versions 2.11.0 and
- 3.0.0-beta3. Users are advised to upgrade. There are no known
- workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39353">CVE-2023-39353</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to a missing offset validation leading to Out Of Bound Read.
- In the `libfreerdp/codec/rfx.c` file there is no offset validation
- in `tile->quantIdxY`, `tile->quantIdxCb`, and `tile->quantIdxCr`. As
- a result crafted input can lead to an out of bounds read access
- which in turn will cause a crash. This issue has been addressed in
- versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There
- are no known workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39354">CVE-2023-39354</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data`
- function. The Out-Of-Bounds Read occurs because it processes
- `context->Planes` without checking if it contains data of sufficient
- length. Should an attacker be able to leverage this vulnerability
- they may be able to cause a crash. This issue has been addressed in
- versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There
- are no known workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39355">CVE-2023-39355</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Versions of FreeRDP on the
- 3.x release branch before beta3 are subject to a Use-After-Free in
- processing `RDPGFX_CMDID_RESETGRAPHICS` packets. If
- `context->maxPlaneSize` is 0, `context->planesBuffer` will be freed.
- However, without updating `context->planesBuffer`, this leads to a
- Use-After-Free exploit vector. In most environments this should only
- result in a crash. This issue has been addressed in version
- 3.0.0-beta3 and users of the beta 3.x releases are advised to
- upgrade. There are no known workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39356">CVE-2023-39356</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. In affected versions a
- missing offset validation may lead to an Out Of Bound Read in the
- function `gdi_multi_opaque_rect`. In particular there is no code to
- validate if the value `multi_opaque_rect->numRectangles` is less
- than 45. Looping through `multi_opaque_rect->`numRectangles without
- proper boundary checks can lead to Out-of-Bounds Read errors which
- will likely lead to a crash. This issue has been addressed in
- versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There
- are no known workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40567">CVE-2023-40567</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an Out-Of-Bounds Write in the
- `clear_decompress_bands_data` function in which there is no offset
- validation. Abuse of this vulnerability may lead to an out of bounds
- write. This issue has been addressed in versions 2.11.0 and
- 3.0.0-beta3. Users are advised to upgrade. there are no known
- workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40181">CVE-2023-40181</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an Integer-Underflow leading to Out-Of-Bound Read in the
- `zgfx_decompress_segment` function. In the context of `CopyMemory`,
- it's possible to read data beyond the transmitted packet range and
- likely cause a crash. This issue has been addressed in versions
- 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no
- known workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40186">CVE-2023-40186</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an IntegerOverflow leading to Out-Of-Bound Write
- Vulnerability in the `gdi_CreateSurface` function. This issue
- affects FreeRDP based clients only. FreeRDP proxies are not affected
- as image decoding is not done by a proxy. This issue has been
- addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to
- upgrade. There are no known workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40188">CVE-2023-40188</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an Out-Of-Bounds Read in the `general_LumaToYUV444`
- function. This Out-Of-Bounds Read occurs because processing is done
- on the `in` variable without checking if it contains data of
- sufficient length. Insufficient data for the `in` variable may cause
- errors or crashes. This issue has been addressed in versions 2.11.0
- and 3.0.0-beta3. Users are advised to upgrade. There are no known
- workarounds for this issue.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40569">CVE-2023-40569</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. Affected versions are
- subject to an Out-Of-Bounds Write in the `progressive_decompress`
- function. This issue is likely down to incorrect calculations of the
- `nXSrc` and `nYSrc` variables. This issue has been addressed in
- versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there
- are no known workarounds for this vulnerability.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40589">CVE-2023-40589</a>
-
- <p>FreeRDP is a free implementation of the Remote Desktop Protocol
- (RDP), released under the Apache license. In affected versions there
- is a Global-Buffer-Overflow in the ncrush_decompress function.
- Feeding crafted input into this function can trigger the overflow
- which has only been shown to cause a crash. This issue has been
- addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to
- upgrade. There are no known workarounds for this issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.3.0+dfsg1-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your freerdp2 packages.</p>
-
-<p>For the detailed security status of freerdp2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freerdp2">https://security-tracker.debian.org/tracker/freerdp2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3606.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3607.data b/english/lts/security/2023/dla-3607.data
deleted file mode 100644
index e7da12875b0..00000000000
--- a/english/lts/security/2023/dla-3607.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3607-1 gnome-boxes</define-tag>
-<define-tag report_date>2023-10-07</define-tag>
-<define-tag packages>gnome-boxes</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3607.wml b/english/lts/security/2023/dla-3607.wml
deleted file mode 100644
index dfa2d1c154c..00000000000
--- a/english/lts/security/2023/dla-3607.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It has been found that the update of freerdp2 (see DLA-3606-1) exposed a
-bug in gnome-boxes, which breaks RDP connections with the symtoms of
-hangs and black screens.
-<p><b>Note</b>: sha256 is now used instead of sha1 to fingerprint certificates. This will
-invalidate all hosts in FreeRDP known_hosts2 file, $HOME/.config/freerdp/known_hosts2.
-In case of problems with the connection, try removing that file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.30.3-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your gnome-boxes packages.</p>
-
-<p>For the detailed security status of gnome-boxes please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gnome-boxes">https://security-tracker.debian.org/tracker/gnome-boxes</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3607.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3608.data b/english/lts/security/2023/dla-3608.data
deleted file mode 100644
index 885063df308..00000000000
--- a/english/lts/security/2023/dla-3608.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3608-1 vinagre</define-tag>
-<define-tag report_date>2023-10-07</define-tag>
-<define-tag secrefs>Bug#983533</define-tag>
-<define-tag packages>vinagre</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3608.wml b/english/lts/security/2023/dla-3608.wml
deleted file mode 100644
index a7f8c4a3565..00000000000
--- a/english/lts/security/2023/dla-3608.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It has been found that the update of freerdp2 (see DLA-3606-1) exposed a
-bug in vinagre, which causes crashes and breaks RDP connections with the
-symtoms of hangs and black screens.
-<p><b>Note</b>: sha256 is now used instead of sha1 to fingerprint certificates. This will
-invalidate all hosts in FreeRDP known_hosts2 file, $HOME/.config/freerdp/known_hosts2.
-In case of problems with the connection, try removing that file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.22.0-6+deb10u1.</p>
-
-<p>We recommend that you upgrade your vinagre packages.</p>
-
-<p>For the detailed security status of vinagre please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vinagre">https://security-tracker.debian.org/tracker/vinagre</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3608.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3609.data b/english/lts/security/2023/dla-3609.data
deleted file mode 100644
index 4c6f7e73970..00000000000
--- a/english/lts/security/2023/dla-3609.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3609-1 prometheus-alertmanager</define-tag>
-<define-tag report_date>2023-10-08</define-tag>
-<define-tag secrefs>CVE-2023-40577 Bug#1050558</define-tag>
-<define-tag packages>prometheus-alertmanager</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3609.wml b/english/lts/security/2023/dla-3609.wml
deleted file mode 100644
index 3bfc2aa38f4..00000000000
--- a/english/lts/security/2023/dla-3609.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>prometheus-alertmanager package, a component of Prometheus,
-an application used for event monitoring and alerting,
-was vulnerable to stored XSS type attack.</p>
-
-<p>Alertmanager handles alerts sent by client applications such as the
-Prometheus server. An attacker with the permission to perform POST
-requests on the /api/v1/alerts endpoint could be able to execute
-arbitrary JavaScript code on the users of Prometheus Alertmanager.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.15.3+ds-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your prometheus-alertmanager packages.</p>
-
-<p>For the detailed security status of prometheus-alertmanager please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/prometheus-alertmanager">https://security-tracker.debian.org/tracker/prometheus-alertmanager</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3609.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3610.data b/english/lts/security/2023/dla-3610.data
deleted file mode 100644
index 062fb289c54..00000000000
--- a/english/lts/security/2023/dla-3610.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3610-1 python-urllib3</define-tag>
-<define-tag report_date>2023-10-08</define-tag>
-<define-tag secrefs>CVE-2018-25091 CVE-2019-11236 CVE-2019-11324 CVE-2020-26137 CVE-2023-43804 Bug#927172 Bug#927412 Bug#1053626</define-tag>
-<define-tag packages>python-urllib3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3610.wml b/english/lts/security/2023/dla-3610.wml
deleted file mode 100644
index f75fa8c7525..00000000000
--- a/english/lts/security/2023/dla-3610.wml
+++ /dev/null
@@ -1,67 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security vulnerabilities were found in python-urllib3, an HTTP library
-with thread-safe connection pooling for Python, which could lead to
-information disclosure or authorization bypass.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-25091">CVE-2018-25091</a>
-
- <p>Yoshida Katsuhiko discovered that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-20060">CVE-2018-20060</a>
- did not cover non-titlecase request headers; for instance
- “<code>authorization</code>†request headers were not removed during
- during cross-origin redirects.
- (Per <a href="https://datatracker.ietf.org/doc/html/rfc7230#section-3.2">RFC7230 sec. 3.2</a> header fields are
- to be treated case-insensitively.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11236">CVE-2019-11236</a>
-
- <p>Hanno Böck discovered that an attacker controlling the request
- parameter can inject headers by injecting CR/LF chars. The issue is
- similar to CPython's <a href="https://security-tracker.debian.org/tracker/CVE-2019-9740">CVE-2019-9740</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-11324">CVE-2019-11324</a>
-
- <p>Christian Heimes discovered that when verifying HTTPS connections
- upon passing an <code>SSLContext</code> to urllib3, system CA certificates are
- loaded into the <code>SSLContext</code> by default in addition to any
- manually-specified CA certificates.
- This causes TLS handshakes that should fail given only the manually
- specified certs to succeed based on system CA certs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-26137">CVE-2020-26137</a>
-
- <p>It was discovered that CRLF injection was possible if the attacker
- controls the HTTP request method, as demonstrated by inserting CR
- and LF control characters in the first argument of <code>putrequest()</code>.
- The issue is similar to urllib's <a href="https://security-tracker.debian.org/tracker/CVE-2020-26116">CVE-2020-26116</a>.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43804">CVE-2023-43804</a>
-
- <p>It was discovered that the <code>Cookie</code> request header isn't stripped
- during cross-origin redirects. It is therefore possible for a user
- specifying a <code>Cookie</code> header to unknowingly leak information via HTTP
- redirects to a different origin (unless the user disables redirects
- explicitly). The issue is similar to <a href="https://security-tracker.debian.org/tracker/CVE-2018-20060">CVE-2018-20060</a>, but for <code>Cookie</code>
- request header rather than <code>Authorization</code>.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.24.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your python-urllib3 packages.</p>
-
-<p>For the detailed security status of python-urllib3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-urllib3">https://security-tracker.debian.org/tracker/python-urllib3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3610.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3611.data b/english/lts/security/2023/dla-3611.data
deleted file mode 100644
index fb871bd110d..00000000000
--- a/english/lts/security/2023/dla-3611.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3611-1 inetutils</define-tag>
-<define-tag report_date>2023-10-08</define-tag>
-<define-tag secrefs>CVE-2019-0053 CVE-2023-40303 Bug#945861 Bug#1049365</define-tag>
-<define-tag packages>inetutils</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3611.wml b/english/lts/security/2023/dla-3611.wml
deleted file mode 100644
index 8f1a3e61fb8..00000000000
--- a/english/lts/security/2023/dla-3611.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Security issues were discovered in inetutils, a collection of GNU
-network utilities, which could lead to privilege escalation or
-potentially execution of arbitrary code.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-0053">CVE-2019-0053</a>
-
- <p>Thorsten Alteholz discovered that <a href="https://security-tracker.debian.org/tracker/CVE-2019-0053">CVE-2019-0053</a> was patched
- incorrectly in inetutils 2:1.9.4-7+deb10u2. The original
- vulnerability remained: inetutils' telnet client doesn't
- sufficiently validate environment variables, which can lead to
- stack-based buffer overflows. (This issue is limited to local
- exploitation from restricted shells.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40303">CVE-2023-40303</a>
-
- <p>Jeffrey Bencteux discovered that several <code>setuid()</code>, <code>setgid()</code>,
- <code>seteuid()</code> and <code>setguid()</code> return values were not checked in
- ftpd/rcp/rlogin/rsh/rshd/uucpd code, which may lead to privilege escalation.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.9.4-7+deb10u3.</p>
-
-<p>We recommend that you upgrade your inetutils packages.</p>
-
-<p>For the detailed security status of inetutils please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/inetutils">https://security-tracker.debian.org/tracker/inetutils</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3611.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3612.data b/english/lts/security/2023/dla-3612.data
deleted file mode 100644
index df30a39f290..00000000000
--- a/english/lts/security/2023/dla-3612.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3612-1 lemonldap-ng</define-tag>
-<define-tag report_date>2023-10-08</define-tag>
-<define-tag secrefs>CVE-2023-44469</define-tag>
-<define-tag packages>lemonldap-ng</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3612.wml b/english/lts/security/2023/dla-3612.wml
deleted file mode 100644
index 28a451778e7..00000000000
--- a/english/lts/security/2023/dla-3612.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were discovered in lemonldap-ng:
- * an open redirection when OpenID-Connect configuration isn't generated by
- the manager and if OIDC RP has no oidcRPMetaDataOptionsRedirectUris
- * a Server-Side-Request-Forgery in OpenID-Connect (<a href="https://security-tracker.debian.org/tracker/CVE-2023-44469">CVE-2023-44469</a>)</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.0.2+ds-7+deb10u10.</p>
-
-<p>We recommend that you upgrade your lemonldap-ng packages.</p>
-
-<p>For the detailed security status of lemonldap-ng please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lemonldap-ng">https://security-tracker.debian.org/tracker/lemonldap-ng</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3612.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3613.data b/english/lts/security/2023/dla-3613.data
deleted file mode 100644
index 60d4866a466..00000000000
--- a/english/lts/security/2023/dla-3613.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3613-1 curl</define-tag>
-<define-tag report_date>2023-10-11</define-tag>
-<define-tag secrefs>CVE-2023-28321 CVE-2023-38546</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3613.wml b/english/lts/security/2023/dla-3613.wml
deleted file mode 100644
index d7a0d8cd269..00000000000
--- a/english/lts/security/2023/dla-3613.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were found in Curl, an easy-to-use client-side URL
-transfer library and command line tool.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28321">CVE-2023-28321</a>
-
- <p>Hiroki Kurosawa found that curl could mismatch hostnames with
- wildcards when using its own name matching function.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-38546">CVE-2023-38546</a>
-
- <p>It was discovered that under some circumstances libcurl was
- susceptible to cookie injection.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.64.0-4+deb10u7.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3613.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3614.data b/english/lts/security/2023/dla-3614.data
deleted file mode 100644
index 3f373e4c409..00000000000
--- a/english/lts/security/2023/dla-3614.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3614-1 python3.7</define-tag>
-<define-tag report_date>2023-10-11</define-tag>
-<define-tag secrefs>CVE-2022-48560 CVE-2022-48564 CVE-2022-48565 CVE-2022-48566 CVE-2023-40217</define-tag>
-<define-tag packages>python3.7</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3614.wml b/english/lts/security/2023/dla-3614.wml
deleted file mode 100644
index 5c67b51f445..00000000000
--- a/english/lts/security/2023/dla-3614.wml
+++ /dev/null
@@ -1,54 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities were discovered in Python 3.7.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48560">CVE-2022-48560</a>
-
- <p>A use-after-free problem was found in the heappushpop function in
- the heapq module.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48564">CVE-2022-48564</a>
-
- <p>A potential denial-of-service vulnerability was discovered in the
- read_ints function used when processing certain malformed Apple
- Property List files in binary format.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48565">CVE-2022-48565</a>
-
- <p>An XML External Entity (XXE) issue was discovered. In order to
- avoid possible vulnerabilities, the plistlib module no longer
- accepts entity declarations in XML plist files.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-48566">CVE-2022-48566</a>
-
- <p>Possible constant-time-defeating compiler optimisations were
- discovered in the accumulator variable in hmac.compare_digest.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40217">CVE-2023-40217</a>
-
- <p>It was discovered that it might be possible to bypass some of the
- protections implemented by the TLS handshake in the ssl.SSLSocket
- class. For example, unauthenticated data might be read by a program
- expecting data authenticated by client certificates.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.7.3-2+deb10u6.</p>
-
-<p>We recommend that you upgrade your python3.7 packages.</p>
-
-<p>For the detailed security status of python3.7 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python3.7">https://security-tracker.debian.org/tracker/python3.7</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3614.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3615.data b/english/lts/security/2023/dla-3615.data
deleted file mode 100644
index 01f3b91bf85..00000000000
--- a/english/lts/security/2023/dla-3615.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3615-1 libcue</define-tag>
-<define-tag report_date>2023-10-11</define-tag>
-<define-tag secrefs>CVE-2023-43641</define-tag>
-<define-tag packages>libcue</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3615.wml b/english/lts/security/2023/dla-3615.wml
deleted file mode 100644
index df3cc4a1a9d..00000000000
--- a/english/lts/security/2023/dla-3615.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Kevin Backhouse discovered an out-of-bounds array access in Libcue, a
-library for parsing CD metadata, which could result in the execution of
-arbitrary code.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.2.1-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your libcue packages.</p>
-
-<p>For the detailed security status of libcue please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libcue">https://security-tracker.debian.org/tracker/libcue</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3615.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3616.data b/english/lts/security/2023/dla-3616.data
deleted file mode 100644
index e2f6cbbf119..00000000000
--- a/english/lts/security/2023/dla-3616.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3616-1 org-mode</define-tag>
-<define-tag report_date>2023-10-12</define-tag>
-<define-tag secrefs>CVE-2023-28617</define-tag>
-<define-tag packages>org-mode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3616.wml b/english/lts/security/2023/dla-3616.wml
deleted file mode 100644
index e9ba6bddf98..00000000000
--- a/english/lts/security/2023/dla-3616.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential code injection vulnerability in
-<code>org-mode</code>, a popular add-on for the Emacs text editor.</p>
-
-<p>Attackers could have executed arbitrary shell commands via a filename (or
-directory name) that contained shell metacharacters.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28617">CVE-2023-28617</a>
-
- <p>org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU
- Emacs allows attackers to execute arbitrary commands via a file name or
- directory name that contains shell metacharacters.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-9.1.14+dfsg-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your org-mode packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3616.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3617-2.data b/english/lts/security/2023/dla-3617-2.data
deleted file mode 100644
index e4263b49106..00000000000
--- a/english/lts/security/2023/dla-3617-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3617-2 tomcat9</define-tag>
-<define-tag report_date>2023-10-17</define-tag>
-<define-tag secrefs>CVE-2023-44487</define-tag>
-<define-tag packages>tomcat9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3617-2.wml b/english/lts/security/2023/dla-3617-2.wml
deleted file mode 100644
index 36b6f632350..00000000000
--- a/english/lts/security/2023/dla-3617-2.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A regression was discovered in the Http2UpgradeHandler class of Tomcat 9
-introduced by the patch to fix <a href="https://security-tracker.debian.org/tracker/CVE-2023-44487">CVE-2023-44487</a> (Rapid Reset Attack). A wrong
-value for the overheadcount variable forced HTTP2 connections to close early.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-9.0.31-1~deb10u10.</p>
-
-<p>We recommend that you upgrade your tomcat9 packages.</p>
-
-<p>For the detailed security status of tomcat9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat9">https://security-tracker.debian.org/tracker/tomcat9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3617-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3617.data b/english/lts/security/2023/dla-3617.data
deleted file mode 100644
index 8d24c433798..00000000000
--- a/english/lts/security/2023/dla-3617.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3617-1 tomcat9</define-tag>
-<define-tag report_date>2023-10-13</define-tag>
-<define-tag secrefs>CVE-2023-24998 CVE-2023-41080 CVE-2023-42795 CVE-2023-44487 CVE-2023-45648</define-tag>
-<define-tag packages>tomcat9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3617.wml b/english/lts/security/2023/dla-3617.wml
deleted file mode 100644
index 7daed67cc1d..00000000000
--- a/english/lts/security/2023/dla-3617.wml
+++ /dev/null
@@ -1,60 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in the Tomcat
-servlet and JSP engine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-24998">CVE-2023-24998</a>
-
- <p>Denial of service. Tomcat uses a packaged renamed copy of Apache Commons
- FileUpload to provide the file upload functionality defined in the Jakarta
- Servlet specification. Apache Tomcat was, therefore, also vulnerable to the
- Commons FileUpload vulnerability <a href="https://security-tracker.debian.org/tracker/CVE-2023-24998">CVE-2023-24998</a> as there was no limit to
- the number of request parts processed. This resulted in the possibility of
- an attacker triggering a DoS with a malicious upload or series of uploads.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41080">CVE-2023-41080</a>
-
- <p>Open redirect. If the ROOT (default) web application is configured to use
- FORM authentication then it is possible that a specially crafted URL could
- be used to trigger a redirect to an URL of the attackers choice.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-42795">CVE-2023-42795</a>
-
- <p>Information Disclosure. When recycling various internal objects, including
- the request and the response, prior to re-use by the next request/response,
- an error could cause Tomcat to skip some parts of the recycling process
- leading to information leaking from the current request/response to the
- next.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-44487">CVE-2023-44487</a>
-
- <p>DoS caused by HTTP/2 frame overhead (Rapid Reset Attack)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-45648">CVE-2023-45648</a>
-
- <p>Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A
- specially crafted, invalid trailer header could cause Tomcat to treat a
- single request as multiple requests leading to the possibility of request
- smuggling when behind a reverse proxy.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.0.31-1~deb10u9.</p>
-
-<p>We recommend that you upgrade your tomcat9 packages.</p>
-
-<p>For the detailed security status of tomcat9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/tomcat9">https://security-tracker.debian.org/tracker/tomcat9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3617.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3618.data b/english/lts/security/2023/dla-3618.data
deleted file mode 100644
index 1bd110a639f..00000000000
--- a/english/lts/security/2023/dla-3618.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3618-1 node-babel</define-tag>
-<define-tag report_date>2023-10-19</define-tag>
-<define-tag secrefs>CVE-2023-45133 Bug#https://bugs.debian.org/1053880</define-tag>
-<define-tag packages>node-babel</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3618.wml b/english/lts/security/2023/dla-3618.wml
deleted file mode 100644
index 9edc241af6b..00000000000
--- a/english/lts/security/2023/dla-3618.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>In @babel/traverse prior to versions 7.23.2 and 8.0.0-alpha.4 and all
-versions of `babel-traverse`, using Babel to compile code that was
-specifically crafted by an attacker can lead to arbitrary code execution
-during compilation, when using plugins that rely on the path.evaluate() or
-path.evaluateTruthy() internal Babel methods.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-6.26.0+dfsg-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-babel packages.</p>
-
-<p>For the detailed security status of node-babel please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-babel">https://security-tracker.debian.org/tracker/node-babel</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3618.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3619.data b/english/lts/security/2023/dla-3619.data
deleted file mode 100644
index 16b6812a685..00000000000
--- a/english/lts/security/2023/dla-3619.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3619-1 batik</define-tag>
-<define-tag report_date>2023-10-14</define-tag>
-<define-tag secrefs>CVE-2020-11987 CVE-2022-38398 CVE-2022-38648 CVE-2022-40146 CVE-2022-44729 CVE-2022-44730 Bug#984829 Bug#1020589</define-tag>
-<define-tag packages>batik</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3619.wml b/english/lts/security/2023/dla-3619.wml
deleted file mode 100644
index 45c14c7fcf4..00000000000
--- a/english/lts/security/2023/dla-3619.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Batik is a toolkit for applications or applets that want to use images
-in the Scalable Vector Graphics (SVG) format for various purposes,
-such as viewing, generation or manipulation.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11987">CVE-2020-11987</a>
-
- <p>A server-side request forgery was found,
- caused by improper input validation by the NodePickerPanel.
- By using a specially-crafted argument, an attacker could exploit
- this vulnerability to cause the underlying server to make
- arbitrary GET requests.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-38398">CVE-2022-38398</a>
-
- <p>A Server-Side Request Forgery (SSRF) vulnerability
- was found that allows an attacker to load a url thru the jar
- protocol.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-38648">CVE-2022-38648</a>
-
- <p>A Server-Side Request Forgery (SSRF) vulnerability
- was found that allows an attacker to fetch external resources.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-40146">CVE-2022-40146</a>
-
- <p>A Server-Side Request Forgery (SSRF) vulnerability
- was found that allows an attacker to access files using a Jar url.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44729">CVE-2022-44729</a>
-
- <p>A Server-Side Request Forgery (SSRF) vulnerability
- was found. A malicious SVG could trigger loading external resources
- by default, causing resource consumption or in some
- cases even information disclosure.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-44730">CVE-2022-44730</a>
-
- <p>A Server-Side Request Forgery (SSRF) vulnerability
- was found. A malicious SVG can probe user profile / data and send
- it directly as parameter to a URL.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.10-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your batik packages.</p>
-
-<p>For the detailed security status of batik please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/batik">https://security-tracker.debian.org/tracker/batik</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3619.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3620.data b/english/lts/security/2023/dla-3620.data
deleted file mode 100644
index 940e90ed0dc..00000000000
--- a/english/lts/security/2023/dla-3620.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3620-1 poppler</define-tag>
-<define-tag report_date>2023-10-16</define-tag>
-<define-tag secrefs>CVE-2020-23804 CVE-2022-37050 CVE-2022-37051</define-tag>
-<define-tag packages>poppler</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3620.wml b/english/lts/security/2023/dla-3620.wml
deleted file mode 100644
index f307466d049..00000000000
--- a/english/lts/security/2023/dla-3620.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been fixed in poppler,
-a PDF rendering library.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-23804">CVE-2020-23804</a>
-
- <p>Stack overflow in XRef::readXRefTable()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37050">CVE-2022-37050</a>
-
- <p>Crash in PDFDoc::savePageAs()</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37051">CVE-2022-37051</a>
-
- <p>Crash in the pdfunite tool</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.71.0-5+deb10u3.</p>
-
-<p>We recommend that you upgrade your poppler packages.</p>
-
-<p>For the detailed security status of poppler please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/poppler">https://security-tracker.debian.org/tracker/poppler</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3620.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3621.data b/english/lts/security/2023/dla-3621.data
deleted file mode 100644
index 2658db52d84..00000000000
--- a/english/lts/security/2023/dla-3621.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3621-1 nghttp2</define-tag>
-<define-tag report_date>2023-10-16</define-tag>
-<define-tag secrefs>CVE-2020-11080 CVE-2023-44487 Bug#962145 Bug#1053769</define-tag>
-<define-tag packages>nghttp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3621.wml b/english/lts/security/2023/dla-3621.wml
deleted file mode 100644
index 6cabbc12f12..00000000000
--- a/english/lts/security/2023/dla-3621.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in nghttp2, an implementation
-of the HTTP/2 protocol.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11080">CVE-2020-11080</a>
-
- <p>A denial-of-service could be caused by a large HTTP/2 SETTINGS
- frame payload.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-44487">CVE-2023-44487</a>
-
- <p>A denial-of-service could be caused by resetting many HTTP/2
- streams quickly. This has been observed in the wild since August.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.36.0-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your nghttp2 packages.</p>
-
-<p>For the detailed security status of nghttp2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nghttp2">https://security-tracker.debian.org/tracker/nghttp2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3621.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3622.data b/english/lts/security/2023/dla-3622.data
deleted file mode 100644
index 8d65350f162..00000000000
--- a/english/lts/security/2023/dla-3622.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3622-1 axis</define-tag>
-<define-tag report_date>2023-10-17</define-tag>
-<define-tag secrefs>CVE-2023-40743 Bug#1051288</define-tag>
-<define-tag packages>axis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3622.wml b/english/lts/security/2023/dla-3622.wml
deleted file mode 100644
index 94ccd1c3ac7..00000000000
--- a/english/lts/security/2023/dla-3622.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Letian Yuan discovered a flaw in Apache Axis 1.x, a SOAP implementation written
-in Java. It may not have been obvious that looking up a service through
-<q>ServiceFactory.getService</q> allows potentially dangerous lookup mechanisms such
-as LDAP. When passing untrusted input to this API method, this could expose the
-application to DoS, SSRF and even attacks leading to remote code execution.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.4-28+deb10u1.</p>
-
-<p>We recommend that you upgrade your axis packages.</p>
-
-<p>For the detailed security status of axis please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/axis">https://security-tracker.debian.org/tracker/axis</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3622.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3623.data b/english/lts/security/2023/dla-3623.data
deleted file mode 100644
index e3a3d38152f..00000000000
--- a/english/lts/security/2023/dla-3623.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3623-1 linux-5.10</define-tag>
-<define-tag report_date>2023-10-19</define-tag>
-<define-tag secrefs>CVE-2022-4269 CVE-2022-39189 CVE-2023-1206 CVE-2023-1380 CVE-2023-2002 CVE-2023-2007 CVE-2023-2124 CVE-2023-2269 CVE-2023-2898 CVE-2023-3090 CVE-2023-3111 CVE-2023-3141 CVE-2023-3212 CVE-2023-3268 CVE-2023-3338 CVE-2023-3389 CVE-2023-3609 CVE-2023-3611 CVE-2023-3772 CVE-2023-3773 CVE-2023-3776 CVE-2023-3863 CVE-2023-4004 CVE-2023-4132 CVE-2023-4147 CVE-2023-4194 CVE-2023-4244 CVE-2023-4273 CVE-2023-4622 CVE-2023-4623 CVE-2023-4921 CVE-2023-20588 CVE-2023-21255 CVE-2023-21400 CVE-2023-31084 CVE-2023-34256 CVE-2023-34319 CVE-2023-35788 CVE-2023-35823 CVE-2023-35824 CVE-2023-40283 CVE-2023-42753 CVE-2023-42755 CVE-2023-42756 Bug#871216 Bug#1035359 Bug#1036543 Bug#1044518 Bug#1050622</define-tag>
-<define-tag packages>linux-5.10</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3623.wml b/english/lts/security/2023/dla-3623.wml
deleted file mode 100644
index 613ce1901c9..00000000000
--- a/english/lts/security/2023/dla-3623.wml
+++ /dev/null
@@ -1,322 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation, denial of service or information
-leaks.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-4269">CVE-2022-4269</a>
-
- <p>William Zhao discovered that a flaw in the Traffic Control (TC)
- subsystem when using a specific networking configuration
- (redirecting egress packets to ingress using TC action <q>mirred</q>),
- may allow a local unprivileged user to cause a denial of service
- (triggering a CPU soft lockup).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39189">CVE-2022-39189</a>
-
- <p>Jann Horn discovered that TLB flush operations are mishandled in
- the KVM subsystem in certain KVM_VCPU_PREEMPTED situations, which
- may allow an unprivileged guest user to compromise the guest
- kernel.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1206">CVE-2023-1206</a>
-
- <p>It was discovered that the networking stack permits attackers to
- force hash collisions in the IPv6 connection lookup table, which
- may result in denial of service (significant increase in the cost
- of lookups, increased CPU utilization).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1380">CVE-2023-1380</a>
-
- <p>Jisoo Jang reported a heap out-of-bounds read in the brcmfmac
- Wi-Fi driver. On systems using this driver, a local user could
- exploit this to read sensitive information or to cause a denial of
- service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2002">CVE-2023-2002</a>
-
- <p>Ruiahn Li reported an incorrect permissions check in the Bluetooth
- subsystem. A local user could exploit this to reconfigure local
- Bluetooth interfaces, resulting in information leaks, spoofing, or
- denial of service (loss of connection).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2007">CVE-2023-2007</a>
-
- <p>Lucas Leong and Reno Robert discovered a
- time-of-check-to-time-of-use flaw in the dpt_i2o SCSI controller
- driver. A local user with access to a SCSI device using this
- driver could exploit this for privilege escalation.</p>
-
- <p>This flaw has been mitigated by removing support for the I2OUSRCMD
- operation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2124">CVE-2023-2124</a>
-
- <p>Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing
- metadata validation may result in denial of service or potential
- privilege escalation if a corrupted XFS disk image is mounted.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2269">CVE-2023-2269</a>
-
- <p>Zheng Zhang reported that improper handling of locking in the
- device mapper implementation may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-2898">CVE-2023-2898</a>
-
- <p>It was discovered that missing sanitising in the f2fs file system
- may result in denial of service if a malformed file system is
- accessed.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3090">CVE-2023-3090</a>
-
- <p>It was discovered that missing initialization in ipvlan networking
- may lead to an out-of-bounds write vulnerability, resulting in
- denial of service or potentially the execution of arbitrary code.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3111">CVE-2023-3111</a>
-
- <p>The TOTE Robot tool found a flaw in the Btrfs filesystem driver
- that can lead to a use-after-free. It's unclear whether an
- unprivileged user can exploit this.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3141">CVE-2023-3141</a>
-
- <p>A flaw was discovered in the r592 memstick driver that could lead
- to a use-after-free after the driver is removed or unbound from a
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3212">CVE-2023-3212</a>
-
- <p>Yang Lan discovered that missing validation in the GFS2 filesystem
- could result in denial of service via a NULL pointer dereference
- when mounting a malformed GFS2 filesystem.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3268">CVE-2023-3268</a>
-
- <p>It was discovered that an out-of-bounds memory access in relayfs
- could result in denial of service or an information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3338">CVE-2023-3338</a>
-
- <p>Davide Ornaghi discovered a flaw in the DECnet protocol
- implementation which could lead to a null pointer dereference or
- use-after-free. A local user can exploit this to cause a denial of
- service (crash or memory corruption) and probably for privilege
- escalation.</p>
-
- <p>This flaw has been mitigated by removing the DECnet protocol
- implementation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3389">CVE-2023-3389</a>
-
- <p>Querijn Voet discovered a use-after-free in the io_uring
- subsystem, which may result in denial of service or privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3609">CVE-2023-3609</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2023-3776">CVE-2023-3776</a>
-
- <p>It was discovered that a use-after-free in the cls_fw, cls_u32,
- cls_route and network classifiers may result in denial of service
- or potential local privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3611">CVE-2023-3611</a>
-
- <p>It was discovered that an out-of-bounds write in the traffic
- control subsystem for the Quick Fair Queueing scheduler (QFQ) may
- result in denial of service or privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3772">CVE-2023-3772</a>
-
- <p>Lin Ma discovered a NULL pointer dereference flaw in the XFRM
- subsystem which may result in denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3773">CVE-2023-3773</a>
-
- <p>Lin Ma discovered a flaw in the XFRM subsystem, which may result
- in denial of service for a user with the CAP_NET_ADMIN capability
- in any user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3863">CVE-2023-3863</a>
-
- <p>It was discovered that a use-after-free in the NFC implementation
- may result in denial of service, an information leak or potential
- local privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4004">CVE-2023-4004</a>
-
- <p>It was discovered that a use-after-free in Netfilter's
- implementation of PIPAPO (PIle PAcket POlicies) may result in
- denial of service or potential local privilege escalation for a
- user with the CAP_NET_ADMIN capability in any user or network
- namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4132">CVE-2023-4132</a>
-
- <p>A use-after-free in the driver for Siano SMS1xxx based MDTV
- receivers may result in local denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4147">CVE-2023-4147</a>
-
- <p>Kevin Rich discovered a use-after-free in Netfilter when adding a
- rule with NFTA_RULE_CHAIN_ID, which may result in local privilege
- escalation for a user with the CAP_NET_ADMIN capability in any
- user or network namespace.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4194">CVE-2023-4194</a>
-
- <p>A type confusion in the implementation of TUN/TAP network devices
- may allow a local user to bypass network filters.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4244">CVE-2023-4244</a>
-
- <p>A race condition was found in the nftables subsystem that could
- lead to a use-after-free. A local user could exploit this to
- cause a denial of service (crash), information leak, or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4273">CVE-2023-4273</a>
-
- <p>Maxim Suhanov discovered a stack overflow in the exFAT driver,
- which may result in local denial of service via a malformed file
- system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4622">CVE-2023-4622</a>
-
- <p>Bing-Jhong Billy Jheng discovered a use-after-free within the Unix
- domain sockets component, which may result in local privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4623">CVE-2023-4623</a>
-
- <p>Budimir Markovic reported a missing configuration check in the
- sch_hfsc network scheduler that could lead to a use-after-free or
- other problems. A local user with the CAP_NET_ADMIN capability in
- any user or network namespace could exploit this to cause a denial
- of service (crash or memory corruption) or possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4921">CVE-2023-4921</a>
-
- <p><q>valis</q> reported flaws in the sch_qfq network scheduler that could
- lead to a use-after-free. A local user with the CAP_NET_ADMIN
- capability in any user or network namespace could exploit this to
- cause a denial of service (crash or memory corruption) or possibly
- for privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-20588">CVE-2023-20588</a>
-
- <p>Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Koepf and
- Oleksii Oleksenko discovered that on some AMD CPUs with the Zen1
- micro architecture an integer division by zero may leave stale
- quotient data from a previous division, resulting in a potential
- leak of sensitive data.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-21255">CVE-2023-21255</a>
-
- <p>A use-after-free was discovered in the Android binder driver,
- which may result in local privilege escalation on systems where
- the binder driver is loaded.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-21400">CVE-2023-21400</a>
-
- <p>Ye Zhang and Nicolas Wu discovered a double-free in the io_uring
- subsystem, which may result in denial of service or privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-31084">CVE-2023-31084</a>
-
- <p>It was discovered that the DVB Core driver does not properly
- handle locking of certain events, allowing a local user to cause a
- denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34256">CVE-2023-34256</a>
-
- <p>The syzbot tool found a time-of-check-to-time-of-use flaw in the
- ext4 filesystem driver. An attacker able to mount a disk image or
- device that they can also write to directly could exploit this to
- cause an out-of-bounds read, possibly resulting in a leak of
- sensitive information or denial of service (crash).</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34319">CVE-2023-34319</a>
-
- <p>Ross Lagerwall discovered a buffer overrun in Xen's netback driver
- which may allow a Xen guest to cause denial of service to the
- virtualisation host by sending malformed packets.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35788">CVE-2023-35788</a>
-
- <p>Hangyu Hua discovered that an off-by-one in the Flower traffic
- classifier may result in local denial of service or the execution
- of privilege escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35823">CVE-2023-35823</a>
-
- <p>A flaw was discovered in the saa7134 media driver that could lead
- to a use-after-free after the driver is removed or unbound from a
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-35824">CVE-2023-35824</a>
-
- <p>A flaw was discovered in the dm1105 media driver that could lead
- to a use-after-free after the driver is removed or unbound from a
- device. The security impact of this is unclear.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40283">CVE-2023-40283</a>
-
- <p>A use-after-free was discovered in Bluetooth L2CAP socket
- handling.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-42753">CVE-2023-42753</a>
-
- <p>Kyle Zeng discovered an off-by-one error in the netfilter ipset
- subsystem which could lead to out-of-bounds memory access. A
- local user with the CAP_NET_ADMIN capability in any user or
- network namespace could exploit this to cause a denial of service
- (memory corruption or crash) and possibly for privilege
- escalation.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-42755">CVE-2023-42755</a>
-
- <p>Kyle Zeng discovered missing configuration validation in the
- cls_rsvp network classifier which could lead to out-of-bounds
- reads. A local user with the CAP_NET_ADMIN capability in any user
- or network namespace could exploit this to cause a denial of
- service (crash) or to leak sensitive information.</p>
-
- <p>This flaw has been mitigated by removing the cls_rsvp classifier.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-42756">CVE-2023-42756</a>
-
- <p>Kyle Zeng discovered a race condition in the netfiler ipset
- subsystem which could lead to an assertion failure. A local user
- with the CAP_NET_ADMIN capability in any user or network namespace
- could exploit this to cause a denial of service (crash).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.10.197-1~deb10u1. This update additionally fixes Debian bugs
-<a href="https://bugs.debian.org/871216">#871216</a>,
-<a href="https://bugs.debian.org/1035359">#1035359</a>,
-<a href="https://bugs.debian.org/1036543">#1036543</a>,
-<a href="https://bugs.debian.org/1044518">#1044518</a>, and
-<a href="https://bugs.debian.org/1050622">#1050622</a>; and includes
-many more bug fixes from stable updates 5.10.180-5.10.197
-inclusive.</p>
-
-<p>We recommend that you upgrade your linux-5.10 packages.</p>
-
-<p>For the detailed security status of linux-5.10 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux-5.10">https://security-tracker.debian.org/tracker/linux-5.10</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3623.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3624.data b/english/lts/security/2023/dla-3624.data
deleted file mode 100644
index f205adb0205..00000000000
--- a/english/lts/security/2023/dla-3624.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3624-1 zookeeper</define-tag>
-<define-tag report_date>2023-10-20</define-tag>
-<define-tag secrefs>CVE-2023-44981</define-tag>
-<define-tag packages>zookeeper</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3624.wml b/english/lts/security/2023/dla-3624.wml
deleted file mode 100644
index 3823c60b028..00000000000
--- a/english/lts/security/2023/dla-3624.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>A potential authorisation bypass vulnerability was discovered in Apache
-Zookeeper, a co-ordination service for reliable distributed applications.</p>
-
-<p>Specifically, if SASL Quorum Peer authentication was enabled via
-<code>quorum.auth.enableSasl</code>, authorisation was performed by verifying
-that the instance part in the SASL authentication ID was listed in the
-<code>zoo.cfg</code> server list. However, this value is optional, and, if
-missing (such as in <code>eve@EXAMPLE.COM</code>), the authorisation check will
-be skipped. As a result, an arbitrary endpoint could join the cluster and begin
-propagating counterfeit changes to the leader, essentially giving it complete
-read-write access to the data tree.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-44981">CVE-2023-44981</a>
-
- <p>Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default. Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue. Alternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue. See the documentation for more details on correct cluster administration.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-3.4.13-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your zookeeper packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3624.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3625.data b/english/lts/security/2023/dla-3625.data
deleted file mode 100644
index 4cf70d569b4..00000000000
--- a/english/lts/security/2023/dla-3625.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3625-1 ruby-rmagick</define-tag>
-<define-tag report_date>2023-10-22</define-tag>
-<define-tag secrefs>CVE-2023-5349</define-tag>
-<define-tag packages>ruby-rmagick</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3625.wml b/english/lts/security/2023/dla-3625.wml
deleted file mode 100644
index 491656e8c6b..00000000000
--- a/english/lts/security/2023/dla-3625.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A memory leak was found in ruby-magick an interface between
-Ruby and ImageMagick, that could lead to a Deny of Service
-(DOS) by memory exhaustion.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.16.0-6+deb10u1.</p>
-
-<p>We recommend that you upgrade your ruby-rmagick packages.</p>
-
-<p>For the detailed security status of ruby-rmagick please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ruby-rmagick">https://security-tracker.debian.org/tracker/ruby-rmagick</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3625.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3626.data b/english/lts/security/2023/dla-3626.data
deleted file mode 100644
index cb82faad50a..00000000000
--- a/english/lts/security/2023/dla-3626.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3626-1 krb5</define-tag>
-<define-tag report_date>2023-10-22</define-tag>
-<define-tag secrefs>CVE-2023-36054 Bug#1043431</define-tag>
-<define-tag packages>krb5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3626.wml b/english/lts/security/2023/dla-3626.wml
deleted file mode 100644
index 776ae99afb5..00000000000
--- a/english/lts/security/2023/dla-3626.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Potential freeing of an uninitialized pointer in kadm_rpc_xdr.c
-was fixed in krb5, the MIT implementation of the Kerberos network
-authentication protocol.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.17-3+deb10u6.</p>
-
-<p>We recommend that you upgrade your krb5 packages.</p>
-
-<p>For the detailed security status of krb5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/krb5">https://security-tracker.debian.org/tracker/krb5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3626.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3627.data b/english/lts/security/2023/dla-3627.data
deleted file mode 100644
index 3867d8ea3b0..00000000000
--- a/english/lts/security/2023/dla-3627.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3627-1 redis</define-tag>
-<define-tag report_date>2023-10-23</define-tag>
-<define-tag secrefs>CVE-2023-45145</define-tag>
-<define-tag packages>redis</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3627.wml b/english/lts/security/2023/dla-3627.wml
deleted file mode 100644
index 0044e3f68ab..00000000000
--- a/english/lts/security/2023/dla-3627.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a authentication bypass vulnerability in
-Redis, a popular key-value database similar to memcached.</p>
-
-<p>On startup, Redis began listening on a Unix socket before adjusting its
-permissions to the user-provided configuration. If a permissive
-<code>umask(2)</code> was used, this created a race condition that enabled,
-during a short period of time, another process to establish an otherwise
-unauthorized connection.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-45145">CVE-2023-45145</a>
-
- <p>Redis is an in-memory database that persists on disk. On startup, Redis
- begins listening on a Unix socket before adjusting its permissions to the
- user-provided configuration. If a permissive umask(2) is used, this creates
- a race condition that enables, during a short period of time, another
- process to establish an otherwise unauthorized connection. This problem has
- existed since Redis 2.6.0-RC1. This issue has been addressed in Redis
- versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users
- unable to upgrade, it is possible to work around the problem by disabling
- Unix sockets, starting Redis with a restrictive umask, or storing the Unix
- socket file in a protected directory.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5:5.0.14-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your redis packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3627.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3628.data b/english/lts/security/2023/dla-3628.data
deleted file mode 100644
index ddc42d2339d..00000000000
--- a/english/lts/security/2023/dla-3628.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3628-1 dbus</define-tag>
-<define-tag report_date>2023-10-23</define-tag>
-<define-tag secrefs>CVE-2023-34969</define-tag>
-<define-tag packages>dbus</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3628.wml b/english/lts/security/2023/dla-3628.wml
deleted file mode 100644
index c7ef00e2c65..00000000000
--- a/english/lts/security/2023/dla-3628.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was found that D-Bus, a simple interprocess messaging system, was
-susceptible to a denial of service vulnerability if a monitor was being
-run.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.12.28-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your dbus packages.</p>
-
-<p>For the detailed security status of dbus please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/dbus">https://security-tracker.debian.org/tracker/dbus</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3628.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3629.data b/english/lts/security/2023/dla-3629.data
deleted file mode 100644
index 24eac29197a..00000000000
--- a/english/lts/security/2023/dla-3629.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3629-1 ceph</define-tag>
-<define-tag report_date>2023-10-23</define-tag>
-<define-tag secrefs>CVE-2019-10222 CVE-2020-1700 CVE-2020-1760 CVE-2020-10753 CVE-2020-12059 CVE-2020-25678 CVE-2020-27781 CVE-2021-3524 CVE-2021-3531 CVE-2021-3979 CVE-2021-20288 CVE-2023-43040 Bug#1053690</define-tag>
-<define-tag packages>ceph</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3629.wml b/english/lts/security/2023/dla-3629.wml
deleted file mode 100644
index 876dc6b9456..00000000000
--- a/english/lts/security/2023/dla-3629.wml
+++ /dev/null
@@ -1,117 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were fixed in Ceph, a massively scalable,
-open-source, distributed storage system that runs on commodity hardware
-and delivers object, block and file system storage.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-10222">CVE-2019-10222</a>
-
- <p>A Denial of service was fixed: An unauthenticated attacker could crash
- the Ceph RGW server by sending valid HTTP headers and terminating the
- connection, resulting in a remote denial of service for Ceph RGW clients.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1700">CVE-2020-1700</a>
-
- <p>A Denial of Service was fixed: A flaw was found in the way the Ceph RGW
- Beast front-end handles unexpected disconnects. An authenticated attacker
- can abuse this flaw by making multiple disconnect attempts resulting in a
- permanent leak of a socket connection by radosgw. This flaw could lead to
- a denial of service condition by pile up of CLOSE_WAIT sockets, eventually
- leading to the exhaustion of available resources, preventing legitimate
- users from connecting to the system.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-1760">CVE-2020-1760</a>
-
- <p>A XSS attack was fixed: A flaw was found in the Ceph Object Gateway,
- where it supports request sent by an anonymous user in Amazon S3.
- This flaw could lead to potential XSS attacks due to the lack
- of proper neutralization of untrusted input.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-10753">CVE-2020-10753</a>
-
- <p>A Header Injection attack was fixed: It was possible to
- inject HTTP headers via a CORS ExposeHeader tag in an Amazon S3 bucket. The
- newline character in the ExposeHeader tag in the CORS configuration file
- generates a header injection in the response when the CORS request is
- made.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-12059">CVE-2020-12059</a>
-
- <p>A Denial of Service was fixed: A POST request with an invalid tagging
- XML could crash the RGW process by triggering a NULL pointer exception.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25678">CVE-2020-25678</a>
-
- <p>An Information Disclosure was fixed: ceph stores mgr module passwords
- in clear text. This can be found by searching the mgr logs for grafana and
- dashboard, with passwords visible.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27781">CVE-2020-27781</a>
-
- <p>A Privilege Escalation was fixed: User credentials could be manipulated
- and stolen by Native CephFS consumers of OpenStack Manila, resulting in
- potential privilege escalation. An Open Stack Manila user can request
- access to a share to an arbitrary cephx user, including existing users.
- The access key is retrieved via the interface drivers. Then, all users of
- the requesting OpenStack project can view the access key. This enables the
- attacker to target any resource that the user has access to. This can be
- done to even <q>admin</q> users, compromising the ceph administrator.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3524">CVE-2021-3524</a>
-
- <p>Similar to <a href="https://security-tracker.debian.org/tracker/CVE-2020-10753">CVE-2020-10753</a>, a Header Injection attack was fixed:
- It was possible to inject HTTP headers via a CORS ExposeHeader
- tag in an Amazon S3 bucket</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3531">CVE-2021-3531</a>
-
- <p>A Denial of Service was fixed: When processing a GET Request in Ceph
- Storage RGW for a swift URL that ends with two slashes it could cause the
- rgw to crash, resulting in a denial of service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3979">CVE-2021-3979</a>
-
- <p>A Loss of Confidentiality was fixed: A key length flaw was found in
- Ceph Storage. An attacker could exploit the fact that the key length is
- incorrectly passed in an encryption algorithm to create a non random key,
- which is weaker and can be exploited for loss of confidentiality and
- integrity on encrypted disks.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20288">CVE-2021-20288</a>
-
- <p>A Potential Privilege Escalation was fixed: When handling
- CEPHX_GET_PRINCIPAL_SESSION_KEY requests, ignore CEPH_ENTITY_TYPE_AUTH in
- CephXServiceTicketRequest::keys.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43040">CVE-2023-43040</a>
-
- <p>A flaw was found in Ceph RGW. An unprivileged
- user can write to any bucket(s) accessible by a given key
- if a POST's form-data contains a key called <q>bucket</q>
- with a value matching the name of the bucket used to sign
- the request. The result of this is that a user could actually
- upload to any bucket accessible by the specified access key
- as long as the bucket in the POST policy matches the bucket
- in said POST form part.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-12.2.11+dfsg1-2.1+deb10u1.</p>
-
-<p>We recommend that you upgrade your ceph packages.</p>
-
-<p>For the detailed security status of ceph please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ceph">https://security-tracker.debian.org/tracker/ceph</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3629.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3630.data b/english/lts/security/2023/dla-3630.data
deleted file mode 100644
index 54d20efd1e2..00000000000
--- a/english/lts/security/2023/dla-3630.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3630-1 roundcube</define-tag>
-<define-tag report_date>2023-10-24</define-tag>
-<define-tag secrefs>CVE-2023-5631 Bug#1054079</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3630.wml b/english/lts/security/2023/dla-3630.wml
deleted file mode 100644
index 7e6bdc9dbf7..00000000000
--- a/english/lts/security/2023/dla-3630.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Denys Klymenko discovered a cross-site scripting (XSS) vulnerability in
-Roundcube, a skinnable AJAX based webmail solution for IMAP servers,
-which could allow a remote attacker to load arbitrary JavaScript code
-via a malicious text/html e-mail message with a crafted SVG document.</p>
-
-<p>The issue is due to an incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2020-16145">CVE-2020-16145</a>.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.17+dfsg.1-1~deb10u4.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3630.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3631.data b/english/lts/security/2023/dla-3631.data
deleted file mode 100644
index a3fa39f47e5..00000000000
--- a/english/lts/security/2023/dla-3631.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3631-1 xorg-server</define-tag>
-<define-tag report_date>2023-10-25</define-tag>
-<define-tag secrefs>CVE-2023-5367 CVE-2023-5380</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3631.wml b/english/lts/security/2023/dla-3631.wml
deleted file mode 100644
index dd180680008..00000000000
--- a/english/lts/security/2023/dla-3631.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server,
-which may result in privilege escalation if the X server is running
-privileged.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.20.4-1+deb10u10.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3631.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3632.data b/english/lts/security/2023/dla-3632.data
deleted file mode 100644
index 22c26b35dfd..00000000000
--- a/english/lts/security/2023/dla-3632.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3632-1 firefox-esr</define-tag>
-<define-tag report_date>2023-10-27</define-tag>
-<define-tag secrefs>CVE-2023-5721 CVE-2023-5724 CVE-2023-5725 CVE-2023-5728 CVE-2023-5730 CVE-2023-5732</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3632.wml b/english/lts/security/2023/dla-3632.wml
deleted file mode 100644
index 8a6557102a8..00000000000
--- a/english/lts/security/2023/dla-3632.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, clickjacking, spoofing or information leaks.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-115.4.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3632.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3633.data b/english/lts/security/2023/dla-3633.data
deleted file mode 100644
index 1781cd05a28..00000000000
--- a/english/lts/security/2023/dla-3633.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3633-1 gst-plugins-bad1.0</define-tag>
-<define-tag report_date>2023-10-28</define-tag>
-<define-tag secrefs>CVE-2023-40474 CVE-2023-40475 CVE-2023-40476</define-tag>
-<define-tag packages>gst-plugins-bad1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3633.wml b/english/lts/security/2023/dla-3633.wml
deleted file mode 100644
index a63bee141dd..00000000000
--- a/english/lts/security/2023/dla-3633.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Multiple vulnerabilities were discovered in plugins for the GStreamer
-media framework and its codecs and demuxers, which may result in denial
-of service or potentially the execution of arbitrary code if a malformed
-media file is opened.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.14.4-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-bad1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-bad1.0">https://security-tracker.debian.org/tracker/gst-plugins-bad1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3633.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3634.data b/english/lts/security/2023/dla-3634.data
deleted file mode 100644
index c72f20b20fe..00000000000
--- a/english/lts/security/2023/dla-3634.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3634-1 nss</define-tag>
-<define-tag report_date>2023-10-28</define-tag>
-<define-tag secrefs>CVE-2020-25648 CVE-2023-4421</define-tag>
-<define-tag packages>nss</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3634.wml b/english/lts/security/2023/dla-3634.wml
deleted file mode 100644
index 16d0d90947f..00000000000
--- a/english/lts/security/2023/dla-3634.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in nss, a set of libraries designed
-to support cross-platform development of security-enabled client and
-server applications.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25648">CVE-2020-25648</a>
-
- <p>A flaw was discovered in how NSS handles CipherChangeSpec messages
- in TLS 1.3. It could allow an attacker to send multiple CCS
- messages to servers compiled against NSS, causing denial-of-service.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-4421">CVE-2023-4421</a>
-
- <p>A fuzzing project discovered vulnerabilities to Bleichenbacher
- timing attacks in NSS's facilities for RSA cryptography.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:3.42.1-1+deb10u7.</p>
-
-<p>We recommend that you upgrade your nss packages.</p>
-
-<p>For the detailed security status of nss please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/nss">https://security-tracker.debian.org/tracker/nss</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3634.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3635.data b/english/lts/security/2023/dla-3635.data
deleted file mode 100644
index d86b37269d3..00000000000
--- a/english/lts/security/2023/dla-3635.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3635-1 node-browserify-sign</define-tag>
-<define-tag report_date>2023-10-29</define-tag>
-<define-tag secrefs>CVE-2023-46234 Bug#1054667</define-tag>
-<define-tag packages>node-browserify-sign</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3635.wml b/english/lts/security/2023/dla-3635.wml
deleted file mode 100644
index 2aca64dd024..00000000000
--- a/english/lts/security/2023/dla-3635.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An upper bound check issue in `dsaVerify` function has been discovered in
-node-browserify-sign. This allows an attacker to construct signatures that
-can be successfully verified by any public key, thus leading to a signature
-forgery attack.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-4.0.4-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-browserify-sign packages.</p>
-
-<p>For the detailed security status of node-browserify-sign please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-browserify-sign">https://security-tracker.debian.org/tracker/node-browserify-sign</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3635.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3636.data b/english/lts/security/2023/dla-3636.data
deleted file mode 100644
index 127c147162a..00000000000
--- a/english/lts/security/2023/dla-3636.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3636-1 openjdk-11</define-tag>
-<define-tag report_date>2023-10-29</define-tag>
-<define-tag secrefs>CVE-2023-22081</define-tag>
-<define-tag packages>openjdk-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3636.wml b/english/lts/security/2023/dla-3636.wml
deleted file mode 100644
index 5ab8a51128e..00000000000
--- a/english/lts/security/2023/dla-3636.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been found in the OpenJDK Java runtime, which may
-result in denial of service.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-11.0.21+9-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your openjdk-11 packages.</p>
-
-<p>For the detailed security status of openjdk-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/openjdk-11">https://security-tracker.debian.org/tracker/openjdk-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3636.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3637.data b/english/lts/security/2023/dla-3637.data
deleted file mode 100644
index 4e1d97936cd..00000000000
--- a/english/lts/security/2023/dla-3637.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3637-1 thunderbird</define-tag>
-<define-tag report_date>2023-10-29</define-tag>
-<define-tag secrefs>CVE-2023-5721 CVE-2023-5724 CVE-2023-5725 CVE-2023-5728 CVE-2023-5730 CVE-2023-5732</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3637.wml b/english/lts/security/2023/dla-3637.wml
deleted file mode 100644
index 5b78fdfb23c..00000000000
--- a/english/lts/security/2023/dla-3637.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:115.4.1-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3637.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3638.data b/english/lts/security/2023/dla-3638.data
deleted file mode 100644
index efc7e77a346..00000000000
--- a/english/lts/security/2023/dla-3638.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3638-1 h2o</define-tag>
-<define-tag report_date>2023-10-31</define-tag>
-<define-tag secrefs>CVE-2023-44487 Bug#1054232</define-tag>
-<define-tag packages>h2o</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3638.wml b/english/lts/security/2023/dla-3638.wml
deleted file mode 100644
index e59909d1984..00000000000
--- a/english/lts/security/2023/dla-3638.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability has been identified in h2o, a high-performance web server
-with support for HTTP/2.</p>
-
-<p>A security vulnerability <a href="https://security-tracker.debian.org/tracker/CVE-2023-44487">CVE-2023-44487</a> was discovered that could potentially
-be exploited to disrupt server operation.</p>
-
-<p>The vulnerability in the h2o HTTP/2 server was related to the handling of
-certain types of HTTP/2 requests. In certain scenarios, an attacker could
-send a series of malicious requests, causing the server to process them
-rapidly and exhaust system resources.</p>
-
-<p>The applied upstream patch changes the ABI. Therefore, if your application
-is built against any shared libraries of h2o, you need to rebuild it.
-No Debian package is affected.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.2.5+dfsg2-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your h2o packages.</p>
-
-<p>For the detailed security status of h2o please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/h2o">https://security-tracker.debian.org/tracker/h2o</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3638.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3639.data b/english/lts/security/2023/dla-3639.data
deleted file mode 100644
index 3da4cfbd2d8..00000000000
--- a/english/lts/security/2023/dla-3639.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3639-1 distro-info-data</define-tag>
-<define-tag report_date>2023-10-30</define-tag>
-<define-tag packages>distro-info-data</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3639.wml b/english/lts/security/2023/dla-3639.wml
deleted file mode 100644
index 59dd0ee5880..00000000000
--- a/english/lts/security/2023/dla-3639.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS database update</define-tag>
-<define-tag moreinfo>
-<p>This is a routine update of the distro-info-data database for Debian LTS
-users.</p>
-
-<p>It includes Ubuntu 24.10, and makes some minor updates to older EoL
-dates.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.41+deb10u8.</p>
-
-<p>We recommend that you upgrade your distro-info-data packages.</p>
-
-<p>For the detailed security status of distro-info-data please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/distro-info-data">https://security-tracker.debian.org/tracker/distro-info-data</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3639.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3640.data b/english/lts/security/2023/dla-3640.data
deleted file mode 100644
index 4cf4fd0a912..00000000000
--- a/english/lts/security/2023/dla-3640.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3640-1 distro-info</define-tag>
-<define-tag report_date>2023-10-30</define-tag>
-<define-tag packages>distro-info</define-tag>
-<define-tag isvulnerable>no</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3640.wml b/english/lts/security/2023/dla-3640.wml
deleted file mode 100644
index ca3ece04845..00000000000
--- a/english/lts/security/2023/dla-3640.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS test-suite update</define-tag>
-<define-tag moreinfo>
-<p>This is a non-security update, enabling distro-info to continue to build
-with the distro-info-data update in DLA-3639-1, which broke some
-test-suite assumptions.</p>
-
-<p>This update also allows distro-info to support additional columns in
-distro-info-data, easing future updates.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.21+deb10u1.</p>
-
-<p>We recommend that you upgrade your distro-info packages.</p>
-
-<p>For the detailed security status of distro-info please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/distro-info">https://security-tracker.debian.org/tracker/distro-info</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3640.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3641.data b/english/lts/security/2023/dla-3641.data
deleted file mode 100644
index 468a88ecc51..00000000000
--- a/english/lts/security/2023/dla-3641.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3641-1 jetty9</define-tag>
-<define-tag report_date>2023-10-30</define-tag>
-<define-tag secrefs>CVE-2020-27218 CVE-2023-36478 CVE-2023-44487 Bug#976211</define-tag>
-<define-tag packages>jetty9</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3641.wml b/english/lts/security/2023/dla-3641.wml
deleted file mode 100644
index 78042017642..00000000000
--- a/english/lts/security/2023/dla-3641.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two remotely exploitable security vulnerabilities were discovered in Jetty 9,
-a Java based web server and servlet engine.</p>
-
-<p>The HTTP/2 protocol implementation did not sufficiently verify if HPACK header
-values exceed their size limit. Furthermore the HTTP/2 protocol allowed a
-denial of service (server resource consumption) because request cancellation
-can reset many streams quickly. This problem is also known as Rapid Reset
-Attack.</p>
-
-<p>In addition this version also addresses <a href="https://security-tracker.debian.org/tracker/CVE-2020-27218">CVE-2020-27218</a>.</p>
-
-<p>If GZIP request body inflation is enabled and requests from different clients
-are multiplexed onto a single connection, and if an attacker can send a request
-with a body that is received entirely but not consumed by the application, then
-a subsequent request on the same connection will see that body prepended to its
-body. The attacker will not see any data but may inject data into the body of
-the subsequent request.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-9.4.50-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your jetty9 packages.</p>
-
-<p>For the detailed security status of jetty9 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/jetty9">https://security-tracker.debian.org/tracker/jetty9</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3641.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3642.data b/english/lts/security/2023/dla-3642.data
deleted file mode 100644
index 90a9d805ae7..00000000000
--- a/english/lts/security/2023/dla-3642.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3642-1 request-tracker4</define-tag>
-<define-tag report_date>2023-10-31</define-tag>
-<define-tag secrefs>CVE-2023-41259 CVE-2023-41260 Bug#1054516</define-tag>
-<define-tag packages>request-tracker4</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3642.wml b/english/lts/security/2023/dla-3642.wml
deleted file mode 100644
index e43f4f3923f..00000000000
--- a/english/lts/security/2023/dla-3642.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities have been discovered in Request Tracker, an
-extensible trouble-ticket tracking system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41259">CVE-2023-41259</a>
-
- <p>Tom Wolters reported that Request Tracker is vulnerable to accepting
- unvalidated RT email headers in incoming email and the mail-gateway
- REST interface.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41260">CVE-2023-41260</a>
-
- <p>Tom Wolters reported that Request Tracker is vulnerable to
- information leakage via response messages returned from requests
- sent via the mail-gateway REST interface.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-4.4.3-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your request-tracker4 packages.</p>
-
-<p>For the detailed security status of request-tracker4 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/request-tracker4">https://security-tracker.debian.org/tracker/request-tracker4</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3642.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3643.data b/english/lts/security/2023/dla-3643.data
deleted file mode 100644
index 9f1d30a90b5..00000000000
--- a/english/lts/security/2023/dla-3643.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3643-1 pmix</define-tag>
-<define-tag report_date>2023-10-31</define-tag>
-<define-tag secrefs>CVE-2023-41915</define-tag>
-<define-tag packages>pmix</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3643.wml b/english/lts/security/2023/dla-3643.wml
deleted file mode 100644
index 7f9a27f329a..00000000000
--- a/english/lts/security/2023/dla-3643.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was an arbitrary file overwrite vulnerability
-in pmix, a library used in parallel/cluster computing. Attackers could have
-obtained ownership of arbitrary files via a symlink-related race condition
-during execution of library code with UID 0.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41915">CVE-2023-41915</a>
-
- <p>OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-3.1.2-3+deb10u1.</p>
-
-<p>We recommend that you upgrade your pmix packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3643.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3644.data b/english/lts/security/2023/dla-3644.data
deleted file mode 100644
index 93c6d57081b..00000000000
--- a/english/lts/security/2023/dla-3644.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3644-1 phppgadmin</define-tag>
-<define-tag report_date>2023-11-02</define-tag>
-<define-tag secrefs>CVE-2023-40619</define-tag>
-<define-tag packages>phppgadmin</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3644.wml b/english/lts/security/2023/dla-3644.wml
deleted file mode 100644
index ec49cfd4e15..00000000000
--- a/english/lts/security/2023/dla-3644.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered there was a potential remote code execution vulnerability
-in phppgadmin, a web-based administration tool for the PostgreSQL database
-server. This issue concerned the deserialisation of untrusted data, which may
-have led to remote code execution because user-controlled data was being passed
-directly to the PHP <code>unserialize()</code> function.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40619">CVE-2023-40619</a>
-
- <p>phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of
- untrusted data which may lead to remote code execution because
- user-controlled data is directly passed to the PHP 'unserialize()' function
- in multiple places. An example is the functionality to manage tables in
- 'tables.php' where the 'ma[]' POST parameter is deserialized.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5.1+ds-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your phppgadmin packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3644.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3645.data b/english/lts/security/2023/dla-3645.data
deleted file mode 100644
index 4d15f28e1c3..00000000000
--- a/english/lts/security/2023/dla-3645.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3645-1 trafficserver</define-tag>
-<define-tag report_date>2023-11-05</define-tag>
-<define-tag secrefs>CVE-2023-41752 CVE-2023-44487 Bug#1054427</define-tag>
-<define-tag packages>trafficserver</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3645.wml b/english/lts/security/2023/dla-3645.wml
deleted file mode 100644
index d89b2563948..00000000000
--- a/english/lts/security/2023/dla-3645.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities were fixed in Apache Traffic Server,
-a reverse and forward proxy server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41752">CVE-2023-41752</a>
-
- <p>s3_auth plugin exposes AWSAccessKeyId</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-44487">CVE-2023-44487</a>
-
- <p>HTTP/2 Rapid Reset denial of service</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-8.1.7-0+deb10u3.</p>
-
-<p>We recommend that you upgrade your trafficserver packages.</p>
-
-<p>For the detailed security status of trafficserver please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/trafficserver">https://security-tracker.debian.org/tracker/trafficserver</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3645.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3646.data b/english/lts/security/2023/dla-3646.data
deleted file mode 100644
index ad4897726b3..00000000000
--- a/english/lts/security/2023/dla-3646.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3646-1 open-vm-tools</define-tag>
-<define-tag report_date>2023-11-05</define-tag>
-<define-tag secrefs>CVE-2023-34058 CVE-2023-34059 Bug#1054666</define-tag>
-<define-tag packages>open-vm-tools</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3646.wml b/english/lts/security/2023/dla-3646.wml
deleted file mode 100644
index 2f3afc046e5..00000000000
--- a/english/lts/security/2023/dla-3646.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Brief introduction</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34058">CVE-2023-34058</a>
-
- <p>A file descriptor hijack vulnerability was found in
- the vmware-user-suid-wrapper command.
- A malicious actor with non-root privileges might have been able
- to hijack the /dev/uinput file descriptor allowing
- them to simulate user inputs.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-34059">CVE-2023-34059</a>
-
- <p>A SAML Token Signature Bypass vulnerability was found.
- A malicious actor that has been granted Guest Operation Privileges
- in a target virtual machine might have been able to
- elevate their privileges if that target
- virtual machine has been assigned a more privileged Guest Alias.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:10.3.10-1+deb10u6.</p>
-
-<p>We recommend that you upgrade your open-vm-tools packages.</p>
-
-<p>For the detailed security status of open-vm-tools please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/open-vm-tools">https://security-tracker.debian.org/tracker/open-vm-tools</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3646.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3647.data b/english/lts/security/2023/dla-3647.data
deleted file mode 100644
index 87a6601c8d5..00000000000
--- a/english/lts/security/2023/dla-3647.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3647-1 trapperkeeper-webserver-jetty9-clojure</define-tag>
-<define-tag report_date>2023-11-07</define-tag>
-<define-tag secrefs>Bug#1055348</define-tag>
-<define-tag packages>trapperkeeper-webserver-jetty9-clojure</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3647.wml b/english/lts/security/2023/dla-3647.wml
deleted file mode 100644
index 42134ce3288..00000000000
--- a/english/lts/security/2023/dla-3647.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The recent update of jetty9, released as DLA 3641-1, caused a regression in
-PuppetDB, a major component of Puppet that helps you manage and automate the
-configuration of servers. More specifically another package, trapperkeeperwebserver-jetty9-clojure, still used the deprecated SslContextFactory class
-which made PuppetDB fail to start. This update makes use of the preferred new
-SslContextFactory#Server class now.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.7.0-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your trapperkeeper-webserver-jetty9-clojure
-packages.</p>
-
-<p>For the detailed security status of trapperkeeper-webserver-jetty9-clojure
-please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/trapperkeeper-webserver-jetty9-clojure">https://security-tracker.debian.org/tracker/trapperkeeper-webserver-jetty9-clojure</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3647.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3648.data b/english/lts/security/2023/dla-3648.data
deleted file mode 100644
index 9c9aba2e9b7..00000000000
--- a/english/lts/security/2023/dla-3648.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3648-1 tang</define-tag>
-<define-tag report_date>2023-11-07</define-tag>
-<define-tag secrefs>CVE-2023-1672</define-tag>
-<define-tag packages>tang</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3648.wml b/english/lts/security/2023/dla-3648.wml
deleted file mode 100644
index 616f1652d6d..00000000000
--- a/english/lts/security/2023/dla-3648.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a race condition in Tang, a network-based
-cryptographic binding server. This flaw resulted in a small time window whereby
-newly-generated private keys were readable by other processes on the same
-machine.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-1672">CVE-2023-1672</a>
-
- <p>A race condition exists in the Tang server functionality for key
- generation and key rotation. This flaw results in a small time window where
- Tang private keys become readable by other processes on the same
- host.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-7-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your tang packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3648.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3649.data b/english/lts/security/2023/dla-3649.data
deleted file mode 100644
index 189861bf38b..00000000000
--- a/english/lts/security/2023/dla-3649.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3649-1 python-urllib3</define-tag>
-<define-tag report_date>2023-11-08</define-tag>
-<define-tag secrefs>CVE-2023-43803 Bug#1054226</define-tag>
-<define-tag packages>python-urllib3</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3649.wml b/english/lts/security/2023/dla-3649.wml
deleted file mode 100644
index ac6521b2199..00000000000
--- a/english/lts/security/2023/dla-3649.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>It was discovered that python-urllib3, a user-friendly HTTP client
-library for Python, did not remove the HTTP request body when an HTTP
-redirect response using status 301, 302, or 303 after the request had
-its method changed from one that could accept a request body, like POST,
-to GET, as required by the HTTP RFCs. This could lead to information
-disclosure.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.24.1-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your python-urllib3 packages.</p>
-
-<p>For the detailed security status of python-urllib3 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-urllib3">https://security-tracker.debian.org/tracker/python-urllib3</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3649.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3650.data b/english/lts/security/2023/dla-3650.data
deleted file mode 100644
index 70bea02138a..00000000000
--- a/english/lts/security/2023/dla-3650.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3650-1 audiofile</define-tag>
-<define-tag report_date>2023-11-12</define-tag>
-<define-tag secrefs>CVE-2019-13147 CVE-2022-24599 Bug#931343 Bug#1008017</define-tag>
-<define-tag packages>audiofile</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3650.wml b/english/lts/security/2023/dla-3650.wml
deleted file mode 100644
index 0833113c8b2..00000000000
--- a/english/lts/security/2023/dla-3650.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>The audiofile library allows the processing of audio data to and
-from audio files of many common formats (currently AIFF, AIFF-C,
-WAVE, NeXT/Sun, BICS, and raw data).</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13147">CVE-2019-13147</a>
-
- <p>Audiofile was vulnerable due to an integer overflow.
- Bail out early if NeXT audio files include too many channels.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24599">CVE-2022-24599</a>
-
- <p>A memory leak was found due to reading not null
- terminated copyright field. Preallocate zeroed memory and
- always NUL terminates C strings.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.3.6-5+deb10u1.</p>
-
-<p>We recommend that you upgrade your audiofile packages.</p>
-
-<p>For the detailed security status of audiofile please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/audiofile">https://security-tracker.debian.org/tracker/audiofile</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3650.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3651.data b/english/lts/security/2023/dla-3651.data
deleted file mode 100644
index d26a977a548..00000000000
--- a/english/lts/security/2023/dla-3651.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3651-1 postgresql-11</define-tag>
-<define-tag report_date>2023-11-14</define-tag>
-<define-tag secrefs>CVE-2023-5868 CVE-2023-5869 CVE-2023-5870</define-tag>
-<define-tag packages>postgresql-11</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3651.wml b/english/lts/security/2023/dla-3651.wml
deleted file mode 100644
index e25e7f9f7f7..00000000000
--- a/english/lts/security/2023/dla-3651.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the PostgreSQL
-database system.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-5868">CVE-2023-5868</a>
-
- <p>Jingzhou Fu discovered a memory disclosure flaw in aggregate
- function calls.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-5869">CVE-2023-5869</a>
-
- <p>Pedro Gallegos reported integer overflow flaws resulting in buffer
- overflows in the array modification functions.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-5870">CVE-2023-5870</a>
-
- <p>Hemanth Sandrana and Mahendrakar Srinivasarao reported that the
- pg_cancel_backend role can signal certain superuser processes,
- potentially resulting in denial of service.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-11.22-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your postgresql-11 packages.</p>
-
-<p>For the detailed security status of postgresql-11 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-11">https://security-tracker.debian.org/tracker/postgresql-11</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3651.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3652.data b/english/lts/security/2023/dla-3652.data
deleted file mode 100644
index a9595dd2a78..00000000000
--- a/english/lts/security/2023/dla-3652.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3652-1 ruby-sanitize</define-tag>
-<define-tag report_date>2023-11-14</define-tag>
-<define-tag secrefs>CVE-2023-36823</define-tag>
-<define-tag packages>ruby-sanitize</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3652.wml b/english/lts/security/2023/dla-3652.wml
deleted file mode 100644
index d62a157c025..00000000000
--- a/english/lts/security/2023/dla-3652.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential cross-site scripting (XSS) in
-ruby-sanitize, a whitelist-based HTML sanitizer.</p>
-
-<p>Using carefully crafted input, an attacker may have be able to sneak
-arbitrary HTML and CSS through Sanitize when configured to use the built-in
-<code>relaxed</code> config or when using a custom config that allowed
-<code>style</code> elements and one or more CSS "at"-rules. This could have
-resulted in cross-site scripting (XSS) or other undesired behavior if the
-malicious HTML and CSS were then rendered in a browser.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-36823">CVE-2023-36823</a>
-
- <p>Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully
- crafted input, an attacker may be able to sneak arbitrary HTML and CSS
- through Sanitize starting with version 3.0.0 and prior to version 6.0.2
- when Sanitize is configured to use the built-in "relaxed" config or when
- using a custom config that allows `style` elements and one or more CSS
- at-rules. This could result in cross-site scripting or other undesired
- behavior when the malicious HTML and CSS are rendered in a browser.
- Sanitize 6.0.2 performs additional escaping of CSS in `style` element
- content, which fixes this issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-4.6.6-2.1~deb10u2.</p>
-
-<p>We recommend that you upgrade your ruby-sanitize packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3652.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3653.data b/english/lts/security/2023/dla-3653.data
deleted file mode 100644
index 5bec557a66c..00000000000
--- a/english/lts/security/2023/dla-3653.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3653-1 libclamunrar</define-tag>
-<define-tag report_date>2023-11-15</define-tag>
-<define-tag secrefs>CVE-2023-40477</define-tag>
-<define-tag packages>libclamunrar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3653.wml b/english/lts/security/2023/dla-3653.wml
deleted file mode 100644
index fdf21d65600..00000000000
--- a/english/lts/security/2023/dla-3653.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow was found in the RAR code used by libclamunrar, which
-could result in arbitrary code execution when processing malicious RAR
-archives.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.103.10-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your libclamunrar packages.</p>
-
-<p>For the detailed security status of libclamunrar please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libclamunrar">https://security-tracker.debian.org/tracker/libclamunrar</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3653.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3654.data b/english/lts/security/2023/dla-3654.data
deleted file mode 100644
index c29a6c34956..00000000000
--- a/english/lts/security/2023/dla-3654.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3654-1 freerdp2</define-tag>
-<define-tag report_date>2023-11-17</define-tag>
-<define-tag secrefs>CVE-2021-41160 CVE-2022-24883 CVE-2022-39282 CVE-2022-39283 CVE-2022-39316 CVE-2022-39318 CVE-2022-39319 CVE-2022-39347 CVE-2022-41877 Bug#1001062 Bug#1021659</define-tag>
-<define-tag packages>freerdp2</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3654.wml b/english/lts/security/2023/dla-3654.wml
deleted file mode 100644
index a6aadc1ed23..00000000000
--- a/english/lts/security/2023/dla-3654.wml
+++ /dev/null
@@ -1,92 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Debian Bug : 1001062 1021659</p>
-
-<p>Multiple vulnerabilties have been found in freelrdp2, a free implementation of
-the Remote Desktop Protocol (RDP). The vulnerabilties potentially allows
-authentication bypasses on configuration errors, buffer overreads, DoS vectors,
-buffer overflows or accessing files outside of a shared directory.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-41160">CVE-2021-41160</a>
-
- <p>In affected versions a malicious server might trigger out of bound writes in a
- connected client. Connections using GDI or SurfaceCommands to send graphics
- updates to the client might send `0` width/height or out of bound rectangles to
- trigger out of bound writes. With `0` width or heigth the memory allocation
- will be `0` but the missing bounds checks allow writing to the pointer at this
- (not allocated) region.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-24883">CVE-2022-24883</a>
-
- <p>Prior to version 2.7.0, server side authentication against a `SAM` file might
- be successful for invalid credentials if the server has configured an invalid
- `SAM` file path. FreeRDP based clients are not affected. RDP server
- implementations using FreeRDP to authenticate against a `SAM` file are
- affected. Version 2.7.0 contains a fix for this issue. As a workaround, use
- custom authentication via `HashCallback` and/or ensure the `SAM` database path
- configured is valid and the application has file handles left.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39282">CVE-2022-39282</a>
-
- <p>FreeRDP based clients on unix systems using `/parallel` command line switch
- might read uninitialized data and send it to the server the client is currently
- connected to. FreeRDP based server implementations are not affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-39283">CVE-2023-39283</a>
-
- <p>All FreeRDP based clients when using the `/video` command line switch might
- read uninitialized data, decode it as audio/video and display the result.
- FreeRDP based server implementations are not affected.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39316">CVE-2022-39316</a>
-
- <p>In affected versions there is an out of bound read in ZGFX decoder component of
- FreeRDP. A malicious server can trick a FreeRDP based client to read out of
- bound data and try to decode it likely resulting in a crash.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39318">CVE-2022-39318</a>
-
- <p>Affected versions of FreeRDP are missing input validation in `urbdrc` channel.
- A malicious server can trick a FreeRDP based client to crash with division by
- zero.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39319">CVE-2022-39319</a>
-
- <p>Affected versions of FreeRDP are missing input length validation in the
- `urbdrc` channel. A malicious server can trick a FreeRDP based client to read
- out of bound data and send it back to the server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-39347">CVE-2022-39347</a>
-
- <p>Affected versions of FreeRDP are missing path canonicalization and base path
- check for `drive` channel. A malicious server can trick a FreeRDP based client
- to read files outside the shared directory.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-41877">CVE-2022-41877</a>
-
- <p>Affected versions of FreeRDP are missing input length validation in `drive`
- channel. A malicious server can trick a FreeRDP based client to read out of
- bound data and send it back to the server.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.3.0+dfsg1-2+deb10u4.</p>
-
-<p>We recommend that you upgrade your freerdp2 packages.</p>
-
-<p>For the detailed security status of freerdp2 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freerdp2">https://security-tracker.debian.org/tracker/freerdp2</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
-
-</ul>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3654.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3655.data b/english/lts/security/2023/dla-3655.data
deleted file mode 100644
index 52c6df3ac85..00000000000
--- a/english/lts/security/2023/dla-3655.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3655-1 lwip</define-tag>
-<define-tag report_date>2023-11-18</define-tag>
-<define-tag secrefs>CVE-2020-22283 Bug#991646</define-tag>
-<define-tag packages>lwip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3655.wml b/english/lts/security/2023/dla-3655.wml
deleted file mode 100644
index 9ce4c381689..00000000000
--- a/english/lts/security/2023/dla-3655.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow vulnerability has been found in lwip, a small independent
-implementation of the TCP/IPv4/IPv6 protocol suite, which allows an attacker
-to access information via a crafted ICMPv6 package. This vulnerability
-has been assigned <a href="https://security-tracker.debian.org/tracker/CVE-2020-22283">CVE-2020-22283</a>.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.0.3-3+deb10u2.</p>
-
-<p>We recommend that you upgrade your lwip packages.</p>
-
-<p>For the detailed security status of lwip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/lwip">https://security-tracker.debian.org/tracker/lwip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3655.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3656.data b/english/lts/security/2023/dla-3656.data
deleted file mode 100644
index 552da1f9b17..00000000000
--- a/english/lts/security/2023/dla-3656.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3656-1 netty</define-tag>
-<define-tag report_date>2023-11-19</define-tag>
-<define-tag secrefs>CVE-2023-44487 Bug#1054234</define-tag>
-<define-tag packages>netty</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3656.wml b/english/lts/security/2023/dla-3656.wml
deleted file mode 100644
index 2f6473513d4..00000000000
--- a/english/lts/security/2023/dla-3656.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in Netty,&nbsp;a Java NIO client/server socket framework. The
-HTTP/2 protocol implementation allowed a denial of service (server resource
-consumption) because request cancellation can reset many streams quickly.
-This problem is also known as Rapid Reset Attack.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1:4.1.33-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your netty packages.</p>
-
-<p>For the detailed security status of netty please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/netty">https://security-tracker.debian.org/tracker/netty</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3656.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3657.data b/english/lts/security/2023/dla-3657.data
deleted file mode 100644
index 45d3da0b0bf..00000000000
--- a/english/lts/security/2023/dla-3657.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3657-1 activemq</define-tag>
-<define-tag report_date>2023-11-20</define-tag>
-<define-tag secrefs>CVE-2020-13920 CVE-2021-26117 CVE-2023-46604 Bug#1054909 Bug#982590</define-tag>
-<define-tag packages>activemq</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3657.wml b/english/lts/security/2023/dla-3657.wml
deleted file mode 100644
index 482cf3325d5..00000000000
--- a/english/lts/security/2023/dla-3657.wml
+++ /dev/null
@@ -1,49 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in ActiveMQ, a Java
-message broker.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-13920">CVE-2020-13920</a>
-
- <p>Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI
- registry and binds the server to the <q>jmxrmi</q> entry. It is possible to connect
- to the registry without authentication and call the rebind method to rebind
- jmxrmi to something else. If an attacker creates another server to proxy the
- original, and bound that, he effectively becomes a man in the middle and is
- able to intercept the credentials when an user connects.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-26117">CVE-2021-26117</a>
-
- <p>The optional ActiveMQ LDAP login module can be configured to use anonymous
- access to the LDAP server.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-46604">CVE-2023-46604</a>
-
- <p>The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution.
- This vulnerability may allow a remote attacker with network access to either a
- Java-based OpenWire broker or client to run arbitrary shell commands by
- manipulating serialized class types in the OpenWire protocol to cause either
- the client or the broker (respectively) to instantiate any class on the
-classpath.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.15.16-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your activemq packages.</p>
-
-<p>For the detailed security status of activemq please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/activemq">https://security-tracker.debian.org/tracker/activemq</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3657.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3658.data b/english/lts/security/2023/dla-3658.data
deleted file mode 100644
index e98957a89f2..00000000000
--- a/english/lts/security/2023/dla-3658.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3658-1 wordpress</define-tag>
-<define-tag report_date>2023-11-20</define-tag>
-<define-tag secrefs>CVE-2023-5561 CVE-2023-39999</define-tag>
-<define-tag packages>wordpress</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3658.wml b/english/lts/security/2023/dla-3658.wml
deleted file mode 100644
index ad8a3da3367..00000000000
--- a/english/lts/security/2023/dla-3658.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Several security vulnerabilities have been discovered in Wordpress, a
-popular content management framework, which may lead to exposure of sensitive
-information to an unauthorized actor in WordPress or allowing unauthenticated
-attackers to discern the email addresses of users who have published public
-posts on an affected website via an Oracle style attack.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-5.0.20+dfsg1-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your wordpress packages.</p>
-
-<p>For the detailed security status of wordpress please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/wordpress">https://security-tracker.debian.org/tracker/wordpress</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3658.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3659.data b/english/lts/security/2023/dla-3659.data
deleted file mode 100644
index 207eecbba75..00000000000
--- a/english/lts/security/2023/dla-3659.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3659-1 gimp</define-tag>
-<define-tag report_date>2023-11-21</define-tag>
-<define-tag secrefs>CVE-2022-30067 CVE-2023-44442 CVE-2023-44444 Bug#1055984</define-tag>
-<define-tag packages>gimp</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3659.wml b/english/lts/security/2023/dla-3659.wml
deleted file mode 100644
index 8d6c3853c08..00000000000
--- a/english/lts/security/2023/dla-3659.wml
+++ /dev/null
@@ -1,38 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were fixed in GIMP,
-the GNU Image Manipulation Program.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-30067">CVE-2022-30067</a>
-
- <p>Out-of-memory with crafted XCF file.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-44442">CVE-2023-44442</a>
-
- <p>PSD file parsing buffer overflow.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-44444">CVE-2023-44444</a>
-
- <p>PSP file parsing buffer overflow.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2.10.8-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your gimp packages.</p>
-
-<p>For the detailed security status of gimp please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gimp">https://security-tracker.debian.org/tracker/gimp</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3659.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3660.data b/english/lts/security/2023/dla-3660.data
deleted file mode 100644
index 7b91824ad53..00000000000
--- a/english/lts/security/2023/dla-3660.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3660-1 gnutls28</define-tag>
-<define-tag report_date>2023-11-22</define-tag>
-<define-tag secrefs>CVE-2023-5981 Bug#1056188</define-tag>
-<define-tag packages>gnutls28</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3660.wml b/english/lts/security/2023/dla-3660.wml
deleted file mode 100644
index e1ac3a3575b..00000000000
--- a/english/lts/security/2023/dla-3660.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A vulnerability was found in GnuTLS, a secure communications library, which
-may facilitate a timing attack to compromise a cryptographic system. The
-response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ
-from response times of ciphertexts with correct PKCS#1 v1.5 padding. Only
-TLS ciphertext processing is affected.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.6.7-4+deb10u11.</p>
-
-<p>We recommend that you upgrade your gnutls28 packages.</p>
-
-<p>For the detailed security status of gnutls28 please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/gnutls28">https://security-tracker.debian.org/tracker/gnutls28</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3660.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3661.data b/english/lts/security/2023/dla-3661.data
deleted file mode 100644
index 60494655e4a..00000000000
--- a/english/lts/security/2023/dla-3661.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3661-1 firefox-esr</define-tag>
-<define-tag report_date>2023-11-23</define-tag>
-<define-tag secrefs>CVE-2023-6204 CVE-2023-6205 CVE-2023-6206 CVE-2023-6207 CVE-2023-6208 CVE-2023-6209 CVE-2023-6212</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3661.wml b/english/lts/security/2023/dla-3661.wml
deleted file mode 100644
index 740fb663f60..00000000000
--- a/english/lts/security/2023/dla-3661.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, information leaks or clickjacking.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-115.5.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3661.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3662.data b/english/lts/security/2023/dla-3662.data
deleted file mode 100644
index d712b78b19a..00000000000
--- a/english/lts/security/2023/dla-3662.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3662-1 freeimage</define-tag>
-<define-tag report_date>2023-11-25</define-tag>
-<define-tag secrefs>CVE-2020-21427 CVE-2020-21428 CVE-2020-22524 CVE-2020-21427 CVE-2020-21428 CVE-2020-22524</define-tag>
-<define-tag packages>freeimage</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3662.wml b/english/lts/security/2023/dla-3662.wml
deleted file mode 100644
index bc43c3bd8ac..00000000000
--- a/english/lts/security/2023/dla-3662.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were discovered in freeimage, library for graphics
-image formats.</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-21427">CVE-2020-21427</a>
- Buffer overflow vulnerability in function LoadPixelDataRLE8
- in PluginBMP.cpp allows remote attackers to run arbitrary code and cause
- other impacts via crafted image file.</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-21428">CVE-2020-21428</a>
- Buffer overflow vulnerability in function LoadRGB in
- PluginDDS.cpp allows remote attackers to run arbitrary code and cause other
- impacts via crafted image file.</p>
-
- <p><a href="https://security-tracker.debian.org/tracker/CVE-2020-22524">CVE-2020-22524</a>
- Buffer overflow vulnerability in FreeImage_Load function
- allows remote attackers to run arbitrary code and cause other
- impacts via crafted PFM file.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.18.0+ds2-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your freeimage packages.</p>
-
-<p>For the detailed security status of freeimage please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/freeimage">https://security-tracker.debian.org/tracker/freeimage</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3662.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3663.data b/english/lts/security/2023/dla-3663.data
deleted file mode 100644
index 967d6b56c19..00000000000
--- a/english/lts/security/2023/dla-3663.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3663-1 strongswan</define-tag>
-<define-tag report_date>2023-11-24</define-tag>
-<define-tag secrefs>CVE-2023-41913</define-tag>
-<define-tag packages>strongswan</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3663.wml b/english/lts/security/2023/dla-3663.wml
deleted file mode 100644
index 7f90b3a5141..00000000000
--- a/english/lts/security/2023/dla-3663.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential buffer overflow in strongswan,
-a IPsec-based VPN (Virtual Private Network) server.</p>
-
-<p>A vulnerability related to processing public Diffie-Hellman key exchange
-values could have resulted in a buffer overflow and potentially remote code
-execution as a result.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41913">CVE-2023-41913</a>
-
- <p>A vulnerability in charon-tkm related to processing DH public values was
- discovered in strongSwan that can result in a buffer overflow and
- potentially remote code execution. All versions since 5.3.0 are
- affected.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5.7.2-1+deb10u4.</p>
-
-<p>We recommend that you upgrade your strongswan packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3663.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3664.data b/english/lts/security/2023/dla-3664.data
deleted file mode 100644
index da5dc20dbed..00000000000
--- a/english/lts/security/2023/dla-3664.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3664-1 symfony</define-tag>
-<define-tag report_date>2023-11-24</define-tag>
-<define-tag secrefs>CVE-2023-46734 Bug#1055774</define-tag>
-<define-tag packages>symfony</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3664.wml b/english/lts/security/2023/dla-3664.wml
deleted file mode 100644
index ec474e1ddb7..00000000000
--- a/english/lts/security/2023/dla-3664.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Pierre Rudloff discovered a potential XSS vulnerability in Symfony, a PHP
-framework. Some Twig filters in CodeExtension use `is_safe=html` but do not
-actually ensure their input is safe. Symfony now escapes the output of the
-affected filters.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.4.22+dfsg-2+deb10u3.</p>
-
-<p>We recommend that you upgrade your symfony packages.</p>
-
-<p>For the detailed security status of symfony please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/symfony">https://security-tracker.debian.org/tracker/symfony</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3664.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3665.data b/english/lts/security/2023/dla-3665.data
deleted file mode 100644
index 49faa80d346..00000000000
--- a/english/lts/security/2023/dla-3665.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3665-1 node-json5</define-tag>
-<define-tag report_date>2023-11-25</define-tag>
-<define-tag secrefs>CVE-2022-46175 Bug#1027145</define-tag>
-<define-tag packages>node-json5</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3665.wml b/english/lts/security/2023/dla-3665.wml
deleted file mode 100644
index 46486d14c57..00000000000
--- a/english/lts/security/2023/dla-3665.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>node-json5 a pure javascript implementation of JSON5 standard,
-was vulnerable to prototype injection during parsing.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.5.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your node-json5 packages.</p>
-
-<p>For the detailed security status of node-json5 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/node-json5">https://security-tracker.debian.org/tracker/node-json5</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3665.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3666.data b/english/lts/security/2023/dla-3666.data
deleted file mode 100644
index 62915186d9f..00000000000
--- a/english/lts/security/2023/dla-3666.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3666-1 reportbug</define-tag>
-<define-tag report_date>2023-11-26</define-tag>
-<define-tag packages>reportbug</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3666.wml b/english/lts/security/2023/dla-3666.wml
deleted file mode 100644
index afc5b2fb85a..00000000000
--- a/english/lts/security/2023/dla-3666.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS update</define-tag>
-<define-tag moreinfo>
-<p>Python version reported by reportbug, a debian tool for bug reporting
-was incorrect (not PEP440 compliant) and may break unreleated
-software like pip, a python package manager, used for local
-development of python packages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-7.5.3~deb10u2.</p>
-
-<p>We recommend that you upgrade your reportbug packages.</p>
-
-<p>For the detailed security status of reportbug please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/reportbug">https://security-tracker.debian.org/tracker/reportbug</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3666.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3667.data b/english/lts/security/2023/dla-3667.data
deleted file mode 100644
index bd642ae78a9..00000000000
--- a/english/lts/security/2023/dla-3667.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3667-1 python-requestbuilder</define-tag>
-<define-tag report_date>2023-11-27</define-tag>
-<define-tag packages>python-requestbuilder</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3667.wml b/english/lts/security/2023/dla-3667.wml
deleted file mode 100644
index 4d071df1315..00000000000
--- a/english/lts/security/2023/dla-3667.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS update</define-tag>
-<define-tag moreinfo>
-<p>python-requestbuilder python version was non conformant to PEP440,
-and may break unreleated
-software like pip, a python package manager, used for local
-development of python packages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-0.5.2-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your python-requestbuilder packages.</p>
-
-<p>For the detailed security status of python-requestbuilder please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/python-requestbuilder">https://security-tracker.debian.org/tracker/python-requestbuilder</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3667.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3668.data b/english/lts/security/2023/dla-3668.data
deleted file mode 100644
index 3b043093ad6..00000000000
--- a/english/lts/security/2023/dla-3668.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3668-1 opensc</define-tag>
-<define-tag report_date>2023-11-27</define-tag>
-<define-tag secrefs>CVE-2023-40660 CVE-2023-40661 Bug#1055521 Bug#1055522</define-tag>
-<define-tag packages>opensc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3668.wml b/english/lts/security/2023/dla-3668.wml
deleted file mode 100644
index 9598389f446..00000000000
--- a/english/lts/security/2023/dla-3668.wml
+++ /dev/null
@@ -1,64 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Vulnerabilities were found in opensc, a set of libraries and utilities
-to access smart cards, which could lead to application crash or
-authentication bypass.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40660">CVE-2023-40660</a>
-
- <p>When the token/card was plugged into the computer and authenticated
- from one process, it could be used to provide cryptographic
- operations from different process when the empty, zero-length PIN
- and the token can track the login status using some of its
- internals. This is dangerous for OS logon/screen unlock and small
- tokens that are plugged permanently to the computer.</p>
-
- <p>The bypass was removed and explicit logout implemented for most of
- the card drivers to prevent leaving unattended logged-in tokens.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40661">CVE-2023-40661</a>
-
- <p>This advisory summarizes automatically reported issues from dynamic
- analyzers reports in pkcs15-init that are security relevant.</p>
-
- <p><ul>
- <li>stack buffer overflow in <code>sc_pkcs15_get_lastupdate()</code> in pkcs15init;</li>
- <li> heap buffer overflow in <code>setcos_create_key()</code> in pkcs15init;</li>
- <li> heap buffer overflow in <code>cosm_new_file()</code> in pkcs15init;</li>
- <li> stack buffer overflow in <code>cflex_delete_file()</code> in pkcs15init;</li>
- <li> heap buffer overflow in <code>sc_hsm_write_ef()</code> in pkcs15init;</li>
- <li> stack buffer overflow while parsing pkcs15 profile files;</li>
- <li> stack buffer overflow in muscle driver in pkcs15init; and</li>
- <li> stack buffer overflow in cardos driver in pkcs15init.</li>
- </ul></p>
-
- <p>All of these require physical access to the computer at the time
- user or administrator would be enrolling the cards (generating keys
- and loading certificates, other card/token management) operations.
- The attack requires crafted USB device or smart card that would
- present the system with specially crafted responses to the APDUs so
- they are considered a high-complexity and low-severity. This issue
- is not exploitable just by using a PKCS#11 module as done in most of
- the end-user deployments.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.19.0-1+deb10u3.</p>
-
-<p>We recommend that you upgrade your opensc packages.</p>
-
-<p>For the detailed security status of opensc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/opensc">https://security-tracker.debian.org/tracker/opensc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3668.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3669.data b/english/lts/security/2023/dla-3669.data
deleted file mode 100644
index 7a04b5da141..00000000000
--- a/english/lts/security/2023/dla-3669.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3669-1 cryptojs</define-tag>
-<define-tag report_date>2023-11-27</define-tag>
-<define-tag secrefs>CVE-2023-46233 Bug#1055525</define-tag>
-<define-tag packages>cryptojs</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3669.wml b/english/lts/security/2023/dla-3669.wml
deleted file mode 100644
index 9cd265c294f..00000000000
--- a/english/lts/security/2023/dla-3669.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Thomas Neil James Shadwell reported that cryptojs, a collection of
-cryptographic algorithms implemented in JavaScript, had default PBKDF2
-settings 1000 times weaker than when specified back in 1993, and 1.3M
-times weaker than OWASP's current recommendations.</p>
-
-<p>The default settings are now changed to use SHA256 with 250k iterations.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.1.2+dfsg-2+deb10u1.</p>
-
-<p>We recommend that you upgrade your cryptojs packages.</p>
-
-<p>For the detailed security status of cryptojs please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/cryptojs">https://security-tracker.debian.org/tracker/cryptojs</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3669.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3670.data b/english/lts/security/2023/dla-3670.data
deleted file mode 100644
index 6aabcb42191..00000000000
--- a/english/lts/security/2023/dla-3670.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3670-1 minizip</define-tag>
-<define-tag report_date>2023-11-27</define-tag>
-<define-tag secrefs>CVE-2023-45853</define-tag>
-<define-tag packages>minizip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3670.wml b/english/lts/security/2023/dla-3670.wml
deleted file mode 100644
index ca73d4071a9..00000000000
--- a/english/lts/security/2023/dla-3670.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in minizip, a compression library.
-When using long filenames, an integer overflow might happen, which results
-in a heap-based buffer overflow in zipOpenNewFileInZip4_64().</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.1-8+deb10u1.</p>
-
-<p>We recommend that you upgrade your minizip packages.</p>
-
-<p>For the detailed security status of minizip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/minizip">https://security-tracker.debian.org/tracker/minizip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3670.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3671.data b/english/lts/security/2023/dla-3671.data
deleted file mode 100644
index 4de20941baa..00000000000
--- a/english/lts/security/2023/dla-3671.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3671-1 mediawiki</define-tag>
-<define-tag report_date>2023-11-28</define-tag>
-<define-tag secrefs>CVE-2023-3550 CVE-2023-45362 CVE-2023-45363</define-tag>
-<define-tag packages>mediawiki</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3671.wml b/english/lts/security/2023/dla-3671.wml
deleted file mode 100644
index 5af02ba8ea1..00000000000
--- a/english/lts/security/2023/dla-3671.wml
+++ /dev/null
@@ -1,46 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilities were found in mediawiki, a website engine for
-collaborative work, that could lead to information disclosure, privilege
-escalation, or denial of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-3550">CVE-2023-3550</a>
-
- <p>Carlos Bello reported a stored cross-site scripting (XSS)
- vulnerability when uploading crafted XML file to <code>Special:Upload</code>,
- which can lead to privilege escalation. (However <code>.xml</code> file uploads
- are not allowed in the default configuration.)</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-45362">CVE-2023-45362</a>
-
- <p>Tobias Frei discovered that diff-multi-sameuser (“X intermediate
- revisions by the same user not shownâ€) ignores username suppression,
- which can lead to information leak.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-45363">CVE-2023-45363</a>
-
- <p>It was discovered that querying pages redirected to other variants
- with <code>redirects</code> and <code>converttitles</code> parameters set would cause
- a denial of service (unbounded loop and <code>RequestTimeoutException</code>).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:1.31.16-1+deb10u7.</p>
-
-<p>We recommend that you upgrade your mediawiki packages.</p>
-
-<p>For the detailed security status of mediawiki please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/mediawiki">https://security-tracker.debian.org/tracker/mediawiki</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3671.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3672.data b/english/lts/security/2023/dla-3672.data
deleted file mode 100644
index f7564bb9356..00000000000
--- a/english/lts/security/2023/dla-3672.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3672-1 postgresql-multicorn</define-tag>
-<define-tag report_date>2023-11-28</define-tag>
-<define-tag packages>postgresql-multicorn</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3672.wml b/english/lts/security/2023/dla-3672.wml
deleted file mode 100644
index 4996e60c351..00000000000
--- a/english/lts/security/2023/dla-3672.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS update</define-tag>
-<define-tag moreinfo>
-<p>postgresql-mulicorn python version was non conformant to PEP440,
-and may break unreleated
-software like pip, a python package manager, used for local
-development of python packages.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.4-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your postgresql-multicorn packages.</p>
-
-<p>For the detailed security status of postgresql-multicorn please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/postgresql-multicorn">https://security-tracker.debian.org/tracker/postgresql-multicorn</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3672.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3673.data b/english/lts/security/2023/dla-3673.data
deleted file mode 100644
index d8fb51bab2f..00000000000
--- a/english/lts/security/2023/dla-3673.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3673-1 gst-plugins-bad1.0</define-tag>
-<define-tag report_date>2023-11-28</define-tag>
-<define-tag secrefs>CVE-2023-44446</define-tag>
-<define-tag packages>gst-plugins-bad1.0</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3673.wml b/english/lts/security/2023/dla-3673.wml
deleted file mode 100644
index a7209d0702d..00000000000
--- a/english/lts/security/2023/dla-3673.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>An issue has been found in gst-plugins-bad1.0, which contains several
-GStreamer plugins from the <q>bad</q> set.
-The issue is related to use-after-free of some pointers within the MXF
-demuxer.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.14.4-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your gst-plugins-bad1.0 packages.</p>
-
-<p>For the detailed security status of gst-plugins-bad1.0 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-bad1.0">https://security-tracker.debian.org/tracker/gst-plugins-bad1.0</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3673.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3674.data b/english/lts/security/2023/dla-3674.data
deleted file mode 100644
index 0a987eb6c87..00000000000
--- a/english/lts/security/2023/dla-3674.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3674-1 thunderbird</define-tag>
-<define-tag report_date>2023-11-30</define-tag>
-<define-tag secrefs>CVE-2023-6204 CVE-2023-6205 CVE-2023-6206 CVE-2023-6207 CVE-2023-6208 CVE-2023-6209 CVE-2023-6212</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3674.wml b/english/lts/security/2023/dla-3674.wml
deleted file mode 100644
index 41a892ad61c..00000000000
--- a/english/lts/security/2023/dla-3674.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service or the execution of arbitrary code.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:115.5.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3674.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3675.data b/english/lts/security/2023/dla-3675.data
deleted file mode 100644
index 9971f644b47..00000000000
--- a/english/lts/security/2023/dla-3675.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3675-1 zbar</define-tag>
-<define-tag report_date>2023-12-04</define-tag>
-<define-tag secrefs>CVE-2023-40889 CVE-2023-40890 Bug#1051724</define-tag>
-<define-tag packages>zbar</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3675.wml b/english/lts/security/2023/dla-3675.wml
deleted file mode 100644
index edc4293990e..00000000000
--- a/english/lts/security/2023/dla-3675.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>zbar, a barcode and qrcode scanner was vulnerable.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40889">CVE-2023-40889</a>
-
- <p>A heap-based buffer overflow existed
- in the qr_reader_match_centers function.
- Specially crafted QR codes may lead to information disclosure
- and/or arbitrary code execution. To trigger this
- vulnerability, an attacker can digitally input the
- malicious QR code, or prepare it to be physically scanned
- by the vulnerable scanner.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-40890">CVE-2023-40890</a>
-
- <p>A stack overflow was present in lookup_sequence
- function. Specially crafted QR codes may lead
- to information disclosure and/or arbitrary code execution.
- To trigger this vulnerability, an attacker can digitally input
- the malicious QR code, or prepare it to be physically scanned
- by the vulnerable scanner.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-0.22-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your zbar packages.</p>
-
-<p>For the detailed security status of zbar please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/zbar">https://security-tracker.debian.org/tracker/zbar</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3675.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3676.data b/english/lts/security/2023/dla-3676.data
deleted file mode 100644
index e147fb7840e..00000000000
--- a/english/lts/security/2023/dla-3676.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3676-1 libde265</define-tag>
-<define-tag report_date>2023-11-30</define-tag>
-<define-tag secrefs>CVE-2023-27102 CVE-2023-27103 CVE-2023-43887 CVE-2023-47471</define-tag>
-<define-tag packages>libde265</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3676.wml b/english/lts/security/2023/dla-3676.wml
deleted file mode 100644
index 909b3d93d8c..00000000000
--- a/english/lts/security/2023/dla-3676.wml
+++ /dev/null
@@ -1,44 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple issues were found in libde265, an open source implementation of the h.265 video codec.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27102">CVE-2023-27102</a>
-
- <p>NULL pointer dereference in function decoder_context::process_slice_segment_header
- at decctx.cc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27103">CVE-2023-27103</a>
-
- <p>Heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43887">CVE-2023-43887</a>
-
- <p>Multiple buffer overflows via the num_tile_columns and num_tile_row parameters in
- the function pic_parameter_set::dump.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-47471">CVE-2023-47471</a>
-
- <p>Buffer overflow vulnerability in strukturag may cause a denial of service via
- the slice_segment_header function in the slice.cc component.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1.0.11-0+deb10u5.</p>
-
-<p>We recommend that you upgrade your libde265 packages.</p>
-
-<p>For the detailed security status of libde265 please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/libde265">https://security-tracker.debian.org/tracker/libde265</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3676.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3677.data b/english/lts/security/2023/dla-3677.data
deleted file mode 100644
index f8e00a9a4ad..00000000000
--- a/english/lts/security/2023/dla-3677.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3677-1 gimp-dds</define-tag>
-<define-tag report_date>2023-11-30</define-tag>
-<define-tag secrefs>CVE-2023-44441</define-tag>
-<define-tag packages>gimp-dds</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3677.wml b/english/lts/security/2023/dla-3677.wml
deleted file mode 100644
index 57d3d7c7e77..00000000000
--- a/english/lts/security/2023/dla-3677.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>File parsing heap buffer overflow was fixed in gimp-dds,
-a DDS (DirectDraw Surface) plugin for GIMP.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.0.1-1+deb10u1.</p>
-
-<p>We recommend that you upgrade your gimp-dds packages.</p>
-
-<p>For the detailed security status of gimp-dds please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/gimp-dds">https://security-tracker.debian.org/tracker/gimp-dds</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3677.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3678.data b/english/lts/security/2023/dla-3678.data
deleted file mode 100644
index b853fa8172f..00000000000
--- a/english/lts/security/2023/dla-3678.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3678-1 horizon</define-tag>
-<define-tag report_date>2023-12-01</define-tag>
-<define-tag secrefs>CVE-2022-45582</define-tag>
-<define-tag packages>horizon</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3678.wml b/english/lts/security/2023/dla-3678.wml
deleted file mode 100644
index 7ef483a9362..00000000000
--- a/english/lts/security/2023/dla-3678.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Phan Nguyên Long discovered an Open Redirect vulnerability in horizon, a
-web application to control an OpenStack cloud, which could lead to
-phishing.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3:14.0.2-3+deb10u3.</p>
-
-<p>We recommend that you upgrade your horizon packages.</p>
-
-<p>For the detailed security status of horizon please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/horizon">https://security-tracker.debian.org/tracker/horizon</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3678.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3679.data b/english/lts/security/2023/dla-3679.data
deleted file mode 100644
index 8e362bb5db7..00000000000
--- a/english/lts/security/2023/dla-3679.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3679-1 vlc</define-tag>
-<define-tag report_date>2023-11-30</define-tag>
-<define-tag secrefs>CVE-2023-47359 CVE-2023-47360</define-tag>
-<define-tag packages>vlc</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3679.wml b/english/lts/security/2023/dla-3679.wml
deleted file mode 100644
index c9eab437250..00000000000
--- a/english/lts/security/2023/dla-3679.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two vulnerabilities in the MMS over HTTP protocol have been fixed in the
-VLC media player, which has also been upgraded to the latest upstream version.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-47359">CVE-2023-47359</a>
-
- <p>Heap buffer overflow in the MMSH module.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-47360">CVE-2023-47360</a>
-
- <p>Integer underflow in the MMSH module.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-3.0.20-0+deb10u1.</p>
-
-<p>We recommend that you upgrade your vlc packages.</p>
-
-<p>For the detailed security status of vlc please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/vlc">https://security-tracker.debian.org/tracker/vlc</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3679.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3680.data b/english/lts/security/2023/dla-3680.data
deleted file mode 100644
index 7de526a5f0a..00000000000
--- a/english/lts/security/2023/dla-3680.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3680-1 opendkim</define-tag>
-<define-tag report_date>2023-12-03</define-tag>
-<define-tag secrefs>CVE-2022-48521 Bug#1041107</define-tag>
-<define-tag packages>opendkim</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3680.wml b/english/lts/security/2023/dla-3680.wml
deleted file mode 100644
index c8bcb5322a8..00000000000
--- a/english/lts/security/2023/dla-3680.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>An issue (<a href="https://security-tracker.debian.org/tracker/CVE-2022-48521">CVE-2022-48521</a>) was discovered in OpenDKIM through 2.10.3, and
-2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers
-when removing fake Authentication-Results header fields, which allows a
-remote attacker to craft an e-mail message with a fake sender address
-such that programs that rely on Authentication-Results from OpenDKIM
-will treat the message as having a valid DKIM signature when in fact it
-has none.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.11.0~alpha-12+deb10u1.</p>
-
-<p>We recommend that you upgrade your opendkim packages.</p>
-
-<p>For the detailed security status of opendkim please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/opendkim">https://security-tracker.debian.org/tracker/opendkim</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3680.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3681.data b/english/lts/security/2023/dla-3681.data
deleted file mode 100644
index 225fa510eaa..00000000000
--- a/english/lts/security/2023/dla-3681.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3681-1 amanda</define-tag>
-<define-tag report_date>2023-12-03</define-tag>
-<define-tag secrefs>CVE-2022-37703 CVE-2022-37705 CVE-2023-30577 Bug#1021017 Bug#1029829 Bug#1055253</define-tag>
-<define-tag packages>amanda</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3681.wml b/english/lts/security/2023/dla-3681.wml
deleted file mode 100644
index c17336795d9..00000000000
--- a/english/lts/security/2023/dla-3681.wml
+++ /dev/null
@@ -1,55 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple vulnerabilties have been found in Amanda,a backup system
-designed to archive many computers on a network to a single
-large-capacity tape drive. The vulnerabilties potentially allows local
-privilege escalation from the backup user to root or leak information
-whether a directory exists in the filesystem.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37703">CVE-2022-37703</a>
-
- <p>In Amanda 3.5.1, an information leak vulnerability was found in the
- calcsize SUID binary. An attacker can abuse this vulnerability to
- know if a directory exists or not anywhere in the fs. The binary
- will use `opendir()` as root directly without checking the path,
- letting the attacker provide an arbitrary path.</p>
-
-<p></p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-37705">CVE-2022-37705</a>
-
- <p>A privilege escalation flaw was found in Amanda 3.5.1 in which the
- backup user can acquire root privileges. The vulnerable component is
- the runtar SUID program, which is a wrapper to run /usr/bin/tar with
- specific arguments that are controllable by the attacker. This
- program mishandles the arguments passed to tar binary.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-30577">CVE-2023-30577</a>
-
- <p>The SUID binary <q>runtar</q> can accept the possibly malicious GNU tar
- options if fed with some non-argument option starting with
- "--exclude" (say --exclude-vcs). The following option will be
- accepted as <q>good</q> and it could be an option passing some
- script/binary that would be executed with root permissions.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:3.5.1-2+deb10u2.</p>
-
-<p>We recommend that you upgrade your amanda packages.</p>
-
-<p>For the detailed security status of amanda please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/amanda">https://security-tracker.debian.org/tracker/amanda</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3681.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3682.data b/english/lts/security/2023/dla-3682.data
deleted file mode 100644
index 3e8b29aa298..00000000000
--- a/english/lts/security/2023/dla-3682.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3682-1 ncurses</define-tag>
-<define-tag report_date>2023-12-03</define-tag>
-<define-tag secrefs>CVE-2021-39537 CVE-2023-29491 Bug#1034372</define-tag>
-<define-tag packages>ncurses</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3682.wml b/english/lts/security/2023/dla-3682.wml
deleted file mode 100644
index 32977a94276..00000000000
--- a/english/lts/security/2023/dla-3682.wml
+++ /dev/null
@@ -1,47 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Issues were found in ncurses, a collection of shared libraries for
-terminal handling, which could lead to denial of service.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-39537">CVE-2021-39537</a>
-
- <p>It has been discovered that the <code>tic(1)</code> utility is susceptible to a
- heap overflow on crafted input due to improper bounds checking.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-29491">CVE-2023-29491</a>
-
- <p>Jonathan Bar Or, Michael Pearse and Emanuele Cozzi have discovered
- that when ncurses is used by a setuid application, a local user can
- trigger security-relevant memory corruption via malformed data in a
- terminfo database file found in <code>$HOME/.terminfo</code> or reached via the
- <code>TERMINFO</code> or <code>TERM</code> environment variables.</p>
-
- <p>In order to mitigate this issue, ncurses now further restricts
- programs running with elevated privileges (setuid/setgid programs).
- Programs run by the superuser remain able to load custom terminfo
- entries.</p>
-
- <p>This change aligns ncurses' behavior in buster-security with that of
- Debian Bullseye's latest point release (6.2+20201114-2+deb11u2).</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-6.1+20181013-2+deb10u5.</p>
-
-<p>We recommend that you upgrade your ncurses packages.</p>
-
-<p>For the detailed security status of ncurses please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/ncurses">https://security-tracker.debian.org/tracker/ncurses</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3682.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3683.data b/english/lts/security/2023/dla-3683.data
deleted file mode 100644
index 338f3e26332..00000000000
--- a/english/lts/security/2023/dla-3683.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3683-1 roundcube</define-tag>
-<define-tag report_date>2023-12-05</define-tag>
-<define-tag secrefs>CVE-2023-47272 Bug#1055421</define-tag>
-<define-tag packages>roundcube</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3683.wml b/english/lts/security/2023/dla-3683.wml
deleted file mode 100644
index 5d68410e3e1..00000000000
--- a/english/lts/security/2023/dla-3683.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Rene Rehme discovered a cross-site scripting (XSS) vulnerability in
-Roundcube, a skinnable AJAX based webmail solution for IMAP servers,
-which could allow a remote attacker to load arbitrary JavaScript code
-from attachment preview/download via crafted <code>Content-Type</code>
-and/or <code>Content-Disposition</code> values.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-1.3.17+dfsg.1-1~deb10u5.</p>
-
-<p>We recommend that you upgrade your roundcube packages.</p>
-
-<p>For the detailed security status of roundcube please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/roundcube">https://security-tracker.debian.org/tracker/roundcube</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3683.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3684.data b/english/lts/security/2023/dla-3684.data
deleted file mode 100644
index 6a92a2d722f..00000000000
--- a/english/lts/security/2023/dla-3684.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3684-1 tzdata</define-tag>
-<define-tag report_date>2023-12-07</define-tag>
-<define-tag secrefs>Bug#1036104 Bug#1057185 Bug#1057186</define-tag>
-<define-tag packages>tzdata</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3684.wml b/english/lts/security/2023/dla-3684.wml
deleted file mode 100644
index 954335546bb..00000000000
--- a/english/lts/security/2023/dla-3684.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>This update includes the latest changes to the leap second list,
-including an update to its expiry date, which was set for the end of
-December.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2021a-0+deb10u12.</p>
-
-<p>We recommend that you upgrade your tzdata packages.</p>
-
-<p>For the detailed security status of tzdata please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/tzdata">https://security-tracker.debian.org/tracker/tzdata</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3684.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3685.data b/english/lts/security/2023/dla-3685.data
deleted file mode 100644
index a32313fa250..00000000000
--- a/english/lts/security/2023/dla-3685.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3585-1 debian-security-support</define-tag>
-<define-tag report_date>2023-12-13</define-tag>
-<define-tag packages>debian-security-support</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3685.wml b/english/lts/security/2023/dla-3685.wml
deleted file mode 100644
index ea4844b6679..00000000000
--- a/english/lts/security/2023/dla-3685.wml
+++ /dev/null
@@ -1,34 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>debian-security-support, the Debian security support coverage checker,
-has been updated in buster-security to mark the end of life of the
-following packages:</p>
-
- <li>gnupg1: see <a href="https://bugs.debian.org/982258">#982258</a>.</li>
- <li>pluxml: removed from Debian. No upstream response to CVE.</li>
- <li>tor: see <a href="https://lists.debian.org/debian-lts/2023/11/msg00019.html">https://lists.debian.org/debian-lts/2023/11/msg00019.html</a>
- and <a href="https://bugs.debian.org/1056606">#1056606</a>.</li>
-
-<p>Additionally these packages are now marked with limited support:</p>
-<ul>
- <li>samba: support limited to non-AD DC uses cases: see <a href="https://bugs.debian.org/1053109">#1053109</a> and
- <a href="https://lists.debian.org/debian-security-announce/2021/msg00201.html">https://lists.debian.org/debian-security-announce/2021/msg00201.html</a></li>
- <li> webkit2gtk: see commit/0980414e8fc86d705ff9a7656c637af7b1170c6f</li>
-</ul>
-
-<p>For Debian 10 buster, this has been documented in version 1:10+2023.13.12.</p>
-
-<p>We recommend that you upgrade your debian-security-support packages.</p>
-
-<p>For the detailed security status of debian-security-support please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/debian-security-support">https://security-tracker.debian.org/tracker/debian-security-support</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3685.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3686-2.data b/english/lts/security/2023/dla-3686-2.data
deleted file mode 100644
index 03a08f03520..00000000000
--- a/english/lts/security/2023/dla-3686-2.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3686-2 xorg-server</define-tag>
-<define-tag report_date>2023-12-17</define-tag>
-<define-tag secrefs>CVE-2023-6377</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3686-2.wml b/english/lts/security/2023/dla-3686-2.wml
deleted file mode 100644
index 779cd31f993..00000000000
--- a/english/lts/security/2023/dla-3686-2.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>The initial fix for <a href="https://security-tracker.debian.org/tracker/CVE-2023-6377">CVE-2023-6377</a> as applied in DLA 3686-1 did not fully
-fix the vulnerability. Updated packages correcting this issue including
-the upstream merged commit are now available.</p>
-
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2:1.20.4-1+deb10u12.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3686-2.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3686.data b/english/lts/security/2023/dla-3686.data
deleted file mode 100644
index 019f36aa586..00000000000
--- a/english/lts/security/2023/dla-3686.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3686-1 xorg-server</define-tag>
-<define-tag report_date>2023-12-13</define-tag>
-<define-tag secrefs>CVE-2023-6377 CVE-2023-6478</define-tag>
-<define-tag packages>xorg-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3686.wml b/english/lts/security/2023/dla-3686.wml
deleted file mode 100644
index 93ea2c3f63f..00000000000
--- a/english/lts/security/2023/dla-3686.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server,
-which may result in privilege escalation if the X server is running
-privileged.</p>
-
-
-<p>For Debian 10 buster, these problems have been fixed in version
-2:1.20.4-1+deb10u11.</p>
-
-<p>We recommend that you upgrade your xorg-server packages.</p>
-
-<p>For the detailed security status of xorg-server please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/xorg-server">https://security-tracker.debian.org/tracker/xorg-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3686.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3687.data b/english/lts/security/2023/dla-3687.data
deleted file mode 100644
index 4b1701ca0e9..00000000000
--- a/english/lts/security/2023/dla-3687.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3687-1 rabbitmq-server</define-tag>
-<define-tag report_date>2023-12-13</define-tag>
-<define-tag secrefs>CVE-2023-46118 Bug#1056723</define-tag>
-<define-tag packages>rabbitmq-server</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3687.wml b/english/lts/security/2023/dla-3687.wml
deleted file mode 100644
index abaea9ba77c..00000000000
--- a/english/lts/security/2023/dla-3687.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>RabbitMQ is a multi-protocol messaging and streaming broker. The HTTP API
-did not enforce an HTTP request body limit, making it vulnerable for denial
-of service (DoS) attacks with very large messages by an authenticated user
-with sufficient credentials.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.8.2-1+deb10u2.</p>
-
-<p>We recommend that you upgrade your rabbitmq-server packages.</p>
-
-<p>For the detailed security status of rabbitmq-server please refer to
-its security tracker page at:
-<a rel="nofollow" href="https://security-tracker.debian.org/tracker/rabbitmq-server">https://security-tracker.debian.org/tracker/rabbitmq-server</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3687.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3688.data b/english/lts/security/2023/dla-3688.data
deleted file mode 100644
index d54625eea35..00000000000
--- a/english/lts/security/2023/dla-3688.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3688-1 haproxy</define-tag>
-<define-tag report_date>2023-12-14</define-tag>
-<define-tag secrefs>CVE-2023-45539</define-tag>
-<define-tag packages>haproxy</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3688.wml b/english/lts/security/2023/dla-3688.wml
deleted file mode 100644
index bda7a616442..00000000000
--- a/english/lts/security/2023/dla-3688.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was a potential information disclosure
-vulnerability in HAProxy, a reverse proxy server used to load balance
-HTTP requests across multiple servers.</p>
-
-<p>HAProxy formerly accepted the <code>#</code> (ie. the "pound" or "hash")
-symbol as part of a URI component. This might have allowed remote attackers to
-obtain sensitive information upon HAProxy's misinterpretation of a
-<code>path_end</code> rule, such as by routing <code>index.html#.png</code> to
-a static server.</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-45539">CVE-2023-45539</a>
-
- <p>HAProxy before 2.8.2 accepts # as part of the URI component, which might
- allow remote attackers to obtain sensitive information or have unspecified
- other impact upon misinterpretation of a path_end rule, such as routing
- index.html#.png to a static server.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-1.8.19-1+deb10u5.</p>
-
-<p>We recommend that you upgrade your haproxy packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3688.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3689.data b/english/lts/security/2023/dla-3689.data
deleted file mode 100644
index 1d07b868e3a..00000000000
--- a/english/lts/security/2023/dla-3689.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3689-1 bluez</define-tag>
-<define-tag report_date>2023-12-14</define-tag>
-<define-tag secrefs>CVE-2023-45866</define-tag>
-<define-tag packages>bluez</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3689.wml b/english/lts/security/2023/dla-3689.wml
deleted file mode 100644
index 4ebd67af89b..00000000000
--- a/english/lts/security/2023/dla-3689.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-
-<p>It was discovered that there was FIXME in bluez a ...</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-45866">CVE-2023-45866</a>
-
- <p>Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.</p></li>
-
-</ul>
-
-<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
-5.50-1.2~deb10u4.</p>
-
-<p>We recommend that you upgrade your bluez packages.</p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3689.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3690.data b/english/lts/security/2023/dla-3690.data
deleted file mode 100644
index 9be4b198895..00000000000
--- a/english/lts/security/2023/dla-3690.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3690-1 intel-microcode</define-tag>
-<define-tag report_date>2023-12-17</define-tag>
-<define-tag secrefs>CVE-2023-23583 Bug#1055962</define-tag>
-<define-tag packages>intel-microcode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3690.wml b/english/lts/security/2023/dla-3690.wml
deleted file mode 100644
index 7a388ccdde7..00000000000
--- a/english/lts/security/2023/dla-3690.wml
+++ /dev/null
@@ -1,27 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa
-Milburn, Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi,
-Josh Eads, Salman Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela,
-Doug Kwan, and Kostik Shtoyk discovered that some Intel processors
-mishandle repeated sequences of instructions leading to unexpected
-behavior, which may result in privilege escalation, information
-disclosure or denial of service.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.20231114.1~deb10u1.</p>
-
-<p>We recommend that you upgrade your intel-microcode packages.</p>
-
-<p>For the detailed security status of intel-microcode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/intel-microcode">https://security-tracker.debian.org/tracker/intel-microcode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3690.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3691.data b/english/lts/security/2023/dla-3691.data
deleted file mode 100644
index 9686492d5da..00000000000
--- a/english/lts/security/2023/dla-3691.data
+++ /dev/null
@@ -1,9 +0,0 @@
-<define-tag pagetitle>DLA-3691-1 spip</define-tag>
-<define-tag report_date>2023-12-18</define-tag>
-<define-tag packages>spip</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3691.wml b/english/lts/security/2023/dla-3691.wml
deleted file mode 100644
index 1281c17b31b..00000000000
--- a/english/lts/security/2023/dla-3691.wml
+++ /dev/null
@@ -1,22 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in SPIP, a content management
-system, which could lead to denial of service or information disclosure.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-3.2.4-1+deb10u12.</p>
-
-<p>We recommend that you upgrade your spip packages.</p>
-
-<p>For the detailed security status of spip please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/spip">https://security-tracker.debian.org/tracker/spip</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3691.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3692.data b/english/lts/security/2023/dla-3692.data
deleted file mode 100644
index 2e341f63be4..00000000000
--- a/english/lts/security/2023/dla-3692.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3692-1 curl</define-tag>
-<define-tag report_date>2023-12-22</define-tag>
-<define-tag secrefs>CVE-2023-28322 CVE-2023-46218 Bug#926148 Bug#1036239 Bug#1057646</define-tag>
-<define-tag packages>curl</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3692.wml b/english/lts/security/2023/dla-3692.wml
deleted file mode 100644
index 207b527839d..00000000000
--- a/english/lts/security/2023/dla-3692.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Two security issues were found in Curl, an easy-to-use client-side URL
-transfer library and command line tool.
-
-Additionally, the command line tool does now display the Debian revision in "curl --version", and does no longer output verbose "Expire in" messsages with "curl -v"</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-28322">CVE-2023-28322</a>
-
- <p>POST-after-PUT confusion.</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-46218">CVE-2023-46218</a>
-
- <p>Cookie mixed case PSL bypass.</p></li>
-
-</ul>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-7.64.0-4+deb10u8.</p>
-
-<p>We recommend that you upgrade your curl packages.</p>
-
-<p>For the detailed security status of curl please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/curl">https://security-tracker.debian.org/tracker/curl</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3692.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3693.data b/english/lts/security/2023/dla-3693.data
deleted file mode 100644
index e4388d8a343..00000000000
--- a/english/lts/security/2023/dla-3693.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3693-1 osslsigncode</define-tag>
-<define-tag report_date>2023-12-23</define-tag>
-<define-tag secrefs>CVE-2023-36377 Bug#1035875</define-tag>
-<define-tag packages>osslsigncode</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3693.wml b/english/lts/security/2023/dla-3693.wml
deleted file mode 100644
index e0ed8b6944f..00000000000
--- a/english/lts/security/2023/dla-3693.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>A Buffer Overflow vulnerability has been found in osslsigncode, a
-OpenSSL based Authenticode signing tool for PE/MSI/Java CAB files, which
-possibly allows an malicious attacker to execute arbitrary code when
-signing a crafted file.</p>
-
-<p>For Debian 10 buster, this problem has been fixed in version
-2.0+really2.5-4+deb10u1.</p>
-
-<p>We recommend that you upgrade your osslsigncode packages.</p>
-
-<p>For the detailed security status of osslsigncode please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/osslsigncode">https://security-tracker.debian.org/tracker/osslsigncode</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3693.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3697.data b/english/lts/security/2023/dla-3697.data
deleted file mode 100644
index 854ffb9061c..00000000000
--- a/english/lts/security/2023/dla-3697.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3697-1 firefox-esr</define-tag>
-<define-tag report_date>2023-12-29</define-tag>
-<define-tag secrefs>CVE-2023-6856 CVE-2023-6857 CVE-2023-6858 CVE-2023-6859 CVE-2023-6860 CVE-2023-6861 CVE-2023-6862 CVE-2023-6863 CVE-2023-6864 CVE-2023-6865 CVE-2023-6867</define-tag>
-<define-tag packages>firefox-esr</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3697.wml b/english/lts/security/2023/dla-3697.wml
deleted file mode 100644
index f199a27327d..00000000000
--- a/english/lts/security/2023/dla-3697.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues have been found in the Mozilla Firefox web
-browser, which could potentially result in the execution of arbitrary
-code, sandbox escape or clickjacking.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-115.6.0esr-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your firefox-esr packages.</p>
-
-<p>For the detailed security status of firefox-esr please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3697.data"
-# $Id: $
diff --git a/english/lts/security/2023/dla-3698.data b/english/lts/security/2023/dla-3698.data
deleted file mode 100644
index d4cd922d0b2..00000000000
--- a/english/lts/security/2023/dla-3698.data
+++ /dev/null
@@ -1,10 +0,0 @@
-<define-tag pagetitle>DLA-3698-1 thunderbird</define-tag>
-<define-tag report_date>2023-12-29</define-tag>
-<define-tag secrefs>CVE-2023-6856 CVE-2023-6857 CVE-2023-6858 CVE-2023-6859 CVE-2023-6860 CVE-2023-6861 CVE-2023-6862 CVE-2023-6864 CVE-2023-6873 CVE-2023-50761 CVE-2023-50762</define-tag>
-<define-tag packages>thunderbird</define-tag>
-<define-tag isvulnerable>yes</define-tag>
-<define-tag fixed>yes</define-tag>
-<define-tag fixed-section>no</define-tag>
-
-#use wml::debian::security
-
diff --git a/english/lts/security/2023/dla-3698.wml b/english/lts/security/2023/dla-3698.wml
deleted file mode 100644
index 02a9999dee9..00000000000
--- a/english/lts/security/2023/dla-3698.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-<define-tag description>LTS security update</define-tag>
-<define-tag moreinfo>
-<p>Multiple security issues were discovered in Thunderbird, which could
-result in denial of service, the execution of arbitrary code or spoofing
-of signed PGP/MIME and SMIME emails.</p>
-
-<p>For Debian 10 buster, these problems have been fixed in version
-1:115.6.0-1~deb10u1.</p>
-
-<p>We recommend that you upgrade your thunderbird packages.</p>
-
-<p>For the detailed security status of thunderbird please refer to
-its security tracker page at:
-<a href="https://security-tracker.debian.org/tracker/thunderbird">https://security-tracker.debian.org/tracker/thunderbird</a></p>
-
-<p>Further information about Debian LTS security advisories, how to apply
-these updates to your system and frequently asked questions can be
-found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/lts/security/2023/dla-3698.data"
-# $Id: $
diff --git a/english/lts/security/2023/index.wml b/english/lts/security/2023/index.wml
deleted file mode 100644
index f31322a00f0..00000000000
--- a/english/lts/security/2023/index.wml
+++ /dev/null
@@ -1,11 +0,0 @@
-<define-tag pagetitle>LTS Security Advisories from 2023</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list_security
-
-<:= get_directory_security_list ('.', '$(ENGLISHDIR)/lts/security/2023' ) :>
-
-<p>You can get the latest Debian LTS security advisories by subscribing to the
-<a href="https://lists.debian.org/debian-lts-announce/">\
-<strong>debian-lts-announce</strong></a> mailing list.
-You can also <a href="https://lists.debian.org/debian-lts-announce/">\
-browse the archives</a> for the list.</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy